Error - Encryption Command Failed Unusable Secret Key
Contents |
[ date ] [ thread ] [ subject ] [ author ] Hello, I'm having another problem, again not in the FAQ: sql.gz: encryption failed: unusable public key This happens when I try to encrypt a file with my public key. gpg: skipped: unusable public key This is what I'm trying to do: I want to backup a remote database regularly gpg encryption failed no public key but I'd like to transmit it encrypted. So I want to run this command: sqldump ... | gzip -c | gpg ... -o gpg: [stdin]: encryption failed: no public key backup.gpg And then send the file backup.gpg to the client. This should be more than enogh for my needs. So, I have gpg installed in the server. I imported my public key and I didn't see any errors. there is no assurance this key belongs to the named user I went to the .gnupg directory and pubring.gpg is there and has a non-zero size. When I do a --list-keys on the server I see my public key there: /path/to/.gnupg/pubring.gpg -------------------------------------------------------- pub 1024D/42713DE9 2006-03-21 Daniel Carrera
Gpg Batch Unusable Public Key
by a pipe later. When I run this command from a PHP script I get this error: gpg: F2EB9C97: There is no indication that this key really belongs to the owner gpg: sql.gz: encryption failed: unusable public key I don't care about the first line. I don't plan to have a secret key on the server. But that first line does show that it located the correct public key. I don't understand how the public key can be unusable if it can identify the key ID correctly. What are the chances of that? Could it be that I don't have a secret key? Why would a secret key be required if I just want to encrypt? Could it be because I'm running this from a PHP script? Why would that make the key unusable? I'm sure I'm not the first person who has thought of putting gpg on a server and using only a public key for encryption. Help? Any suggestions would be most appreciated. Cheers, Daniel. -- /\/`) http://opendocumentfellowship.org /\/_/ /\/_/ A life? Sounds great! \/_/ Do you know where I could download one? / Previous message: segfault in gnupg14 (was: How to sign with non-subkey?) Next message: Error: "unusable public key" Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] More information about the Gnupg-users mailing list
communities company blog Stack Exchange Inbox Reputation and Badges sign up log in tour help Tour Start here for a quick overview of the site Help Center Detailed answers to any questions you might have Meta Discuss the workings and policies of this site
Gpg Extend Expiration Date
About Us Learn more about Stack Overflow the company Business Learn more about hiring gpg trust public key developers or posting ads with us Ask Ubuntu Questions Tags Users Badges Unanswered Ask Question _ Ask Ubuntu is a gpg: no valid addressees question and answer site for Ubuntu users and developers. Join them; it only takes a minute: Sign up Here's how it works: Anybody can ask a question Anybody can answer The best answers are https://lists.gnupg.org/pipermail/gnupg-users/2006-March/028211.html voted up and rise to the top Error using GPG encryption in Evolution up vote 1 down vote favorite After I did fresh install of Ubuntu 15.10 I had to setup GPG encryption with Evolution again and it is not working properly (prior to fresh install it worked fine on Ubuntu 15.04 After I select Option > GPG encrypt I am getting this error: Because "gpg: CEF41E5C: http://askubuntu.com/questions/691050/error-using-gpg-encryption-in-evolution skipped: unusable public key gpg: [stdin]: encryption failed: unusable public key ", you may need to select different mail options. How to fix this error? thanks in advance :) evolution gnupg openpgp share|improve this question edited Oct 31 '15 at 10:21 asked Oct 28 '15 at 12:58 edward torvalds 3,58022659 What does gpg -K print? –Jens Erat Oct 28 '15 at 14:41 @JensErat it prints this sprunge.us/FdaB –edward torvalds Oct 28 '15 at 15:54 This tells your private key should be available. Some days ago there was another post with similar problems, but not necessarily a duplicate (although chances are high): askubuntu.com/questions/690548/… –Jens Erat Oct 28 '15 at 18:57 From GnuPG, and especially to Enigmail. gpg -K (or the long version gpg --list-secret-keys) prints the secret keys available in your key chain. –Jens Erat Oct 29 '15 at 8:39 @JensErat see my answer, dont forget to vote up :) –edward torvalds Oct 31 '15 at 4:32 add a comment| 1 Answer 1 active oldest votes up vote 0 down vote accepted I found the solution by myself. You have two keys, one is pub and other is sub edward@computer:~$ gpg --edit
here for a quick overview of the site Help Center Detailed answers to any questions you might have Meta Discuss the http://stackoverflow.com/questions/13116457/how-to-make-auto-trust-gpg-public-key workings and policies of this site About Us Learn more about Stack Overflow the company Business Learn more about hiring developers or posting ads with us Stack Overflow Questions https://alexcabal.com/creating-the-perfect-gpg-keypair/ Jobs Documentation Tags Users Badges Ask Question x Dismiss Join the Stack Overflow Community Stack Overflow is a community of 4.7 million programmers, just like you, helping each other. public key Join them; it only takes a minute: Sign up How to make auto trust gpg public key? up vote 7 down vote favorite 3 I am trying to add my GPG public key as a part of our appliance installation process. The purpose of it to encrypt any important files like logs before admin pulling them into his local unusable public key using admin portal and then decrypt them using private key. The plan is to export public key into a file and make appliance installation process to import it using gpg --import command. But I realized, the key is needed to be trusted/signed before do any encryption. How to make this key is trusted without any human intervention at the time of installation? Btw, our appliance os is ubuntu vm and we use kickstart to automate. Advance thanks for all help. encryption ubuntu-12.04 gnupg appliance share|improve this question edited Oct 29 '12 at 5:57 asked Oct 29 '12 at 5:45 user1366786 1681415 add a comment| 8 Answers 8 active oldest votes up vote 5 down vote Your question is really "How do I encrypt to a key without gpg balking at the fact that the key is untrusted?" One answer is you could sign the key. gpg --edit-key YOUR_RECIPIENT sign yes save The other is you could tell gpg to go ahead and trust. gpg --encrypt --recipient YOUR_RECIPIENT --trust-model always YOUR_FILE share|improve this answer answer
produces liberated ebooks for the true book lover. Creating the perfect GPG keypair March 13th, 2013 Before you start reading, keep in mind that I’m a layperson, just like you. This guide was created by synthesizing a lot of different information and tutorials available online, but I’m not a GPG developer, or even a cryptography professional. I'm just an enthusiast who thinks encryption is a critical part of modern society. The encryption technology landscape can change rapidly, the PGP standard is bewilderingly complex, and GPG is a stunningly obtuse piece of software on the best of days. There are a lot of ways of creating a functional keypair, and my perfect way may not be your perfect way. Please make sure to do your own research to ensure the explanations and steps below make sense for you and your situation. While I’ll do my best to keep this guide updated with what I personally consider to be the latest best practice, I can’t guarantee anything and I can’t answer any GPG-related questions. There’s a lot of information online on how to create a new GPG keypair. Unfortunately a lot of it is old advice and recommends settings that today might be unsafe. There also isn’t too much information on how to protect your keypair if you use a laptop that might get lost or stolen. Protecting your keypair on a laptop is tricky. On one hand, you need your private key with you to decrypt or sign messages. On the other hand, if your laptop is stolen then you risk losing your entire online identity, perhaps going back years, because the thief would have access to your private key and could then impersonate you. You’d think that today, where laptops and world travel are commonplace, there’d be a little more information on how to secure a private key you have to travel with. But I could only find one resource: the Debian Wiki entry on subkeys. Fortunately it turns out this wiki page has exactly the solution we need. Subkeys help protect your identity in case of private key (laptop) theft If a thief gets ahold of the laptop with your private key on it, it’s pretty much game over. The thief can not only decrypt messages intended for you, they can also impersonate you by signing messages with your private key. Your only recourse would be to revoke your key, but that would mean losing years of signatures o