|
- gnupg - Now that `sshcontrol` has been deprecated, how to use gpg key . . .
The GnuPG Manual states that: This [sshcontrol] file is deprecated in favor of the quot;Use-for-ssh quot; attribute in the key files What is now the correct way to configure gpg gpg-agent to
- gnupg - gpg: decryption failed: No secret key - Information Security . . .
The steps depend on your specific environment, but checking (or creating) the pinentry-program option in ~ gnupg gpg-agent conf is a good place to start In my case (on OS X with Homebrew-installed gpg and pinentry-mac ) I had to create that file with the following contents:
- gnupg - GPG encryption failed - Unusable public key - Information . . .
The version of gnupg that comes with Amazon Linux is too old to support ECC cryptography If you look at the output of gpg --list-key 40BXFE61 , you can check for any pub or sub entries that have cv25519 or nistp256 in them, e g :
- gnupg - Create backup Yubikey with identical PGP keys - Information . . .
I've recently bought two Yubikeys Neo which I'd like to use primarily for encryption and authentification by using the smartcard feature with GnuPG I've read a few how-to on the subject (most notably here and here ) and I've managed to generate and export to the Yubikey a keyring with the 3 subkeys for signing, encrypting and authenticating
- gnupg - Which Elliptic curve cryptography (ECC) algorithm to choose . . .
I want to generate a key pair with gpg2 2 1 11 and libgcrypt 1 6 5 I use the command gpg2 --expert --full-key-gen This allows me to choose an ECC: Please select what kind of key you want: (1
- gnupg - Sending the GPG key to keyserver - Information Security Stack . . .
Today I started learning how to work with GPG keys I successfully generated a pair for me, and imported some other keys, encrypted some files and successfully decrypted them I want to send my GP
- gnupg - Why does ECC not have an encrypt capability in GPG, but RSA . . .
When you generate key, first you need to generate sign-only primary key While RSA allows encryption and signing for the same key (i e it can have encrypting primary key), for ECC there are different key algorithms for ECC:
- gnupg - PGP expired encryption subkey : renew or replace? - Information . . .
Strategy 1 (by default with GnuPG) : an [E] subkey without expiration date Advantage : the most easy setup to administrate, nothing to do; If the private [E] subkey is compromised (but not the master key), I can always revoke that subkey Caveats : I have no influence on how often other users update my public key
|
|
|