-
-
Notifications
You must be signed in to change notification settings - Fork 920
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
gpg key with id 85194C08421980C9 not found on keyservers #1055
Comments
@Byron Meanwhile the key in question has appeared on the SKS infrastructure. Unfortunately the README still states your previous key as the one to verify against. I will not be able to update to 3.1.8 (or beyond) until a chain of trust between the old and the new key is established. |
Thanks for your help on this. Indeed I did my best to manually bring the new key into a few keyservers, and apparently it worked. Just now I have updated the README to match the new key, everything seems to pan out. Since I am unable (see eb411ee) to establish a chain of trust I guess that is it with Arch linux releases. It's sad to see them go because of that. After all, this should not have happened and I am refraining from blaming myself too much for it. GPG is just a great mess and I don't trust it a bit specially when smartcards/yubikeys are involved. I think it really just lost the connection to the smartcard, so doesn't know where to look for the key. I have no idea how to restore this except for looking in backups, and tbh I would rather let that particular key die (it's USB-A) than spending more time on it. Update: Apparently there is no connection to the card because gpg claims to have the private key, but when trying to use it, it seems to have no signing key.
The best chain of trust I can establish is through keybase. Depending on your threat model, this may or may not be enough. In any case, thanks for all the effort that you have inevitably put into maintaining the Arch linux packages, and it would be sad to see them go. |
Hm, maybe you misunderstood me there. I did not say that I will not maintain this package any further. Only that I can't upgrade it willy-nilly if a chain of trust can not be established! :) Hm, it's unfortunate that you have issues with your yubikey. Do you have an update of either key in a safe location? |
Unfortunately that 'old' yubikey had an on-device key only, no backups exist nor is there a revocation key. For the current one I didn't make the same mistakes at least. However, looking at how keybase works, I believe it serves as prove of ownership of the private key portion of the keys listed there, here is the docs of the respective command.
Since I was able to add the 'AFFA' key later, I must have had the private portion of it. As Keybase also has proof that this github account is under control of the user who own the keybase account, I think it should be reasonable to assume that this is indeed the person I claim to be. Maybe this boils down to how much one trusts keybase. Whats your take on it? |
Upstream broke a hardware key and had no backups: gitpython-developers/GitPython#1055 Switch to '27C50E7F590947D7273A741E85194C08421980C9' as new key for source verification. git-svn-id: file:///srv/repos/svn-community/svn@744670 9fca08f4-af9d-4005-b8df-a31f2cc04f65
Upstream broke a hardware key and had no backups: gitpython-developers/GitPython#1055 Switch to '27C50E7F590947D7273A741E85194C08421980C9' as new key for source verification. git-svn-id: file:///srv/repos/svn-community/svn@744670 9fca08f4-af9d-4005-b8df-a31f2cc04f65
Works for me. Hardware failure is a very unfortunate situation. Always make sure, that there are backups!! :) |
Switch to current signing key in use by upstream. gitpython-developers/smmap#45 Analoguous to python-gitpython a hardware failure forced the use of a new key: gitpython-developers/GitPython#1055 git-svn-id: file:///srv/repos/svn-community/svn@829687 9fca08f4-af9d-4005-b8df-a31f2cc04f65
Switch to current signing key in use by upstream. gitpython-developers/smmap#45 Analoguous to python-gitpython a hardware failure forced the use of a new key: gitpython-developers/GitPython#1055 git-svn-id: file:///srv/repos/svn-community/svn@829687 9fca08f4-af9d-4005-b8df-a31f2cc04f65
Hi! When trying to package 3.1.8 for Arch Linux I was unable to retrieve your public key from the keyservers.
Can you upload it? If it has already been uploaded to one of the SKS servers, consider using something like the following to force-push the key to every keyserver (note: will take some time and some of the keyservers are probably not around anymore):
The SKS stuff is pretty broken and syncing may take days or never happen.
Apart from that: Is there any commit or document that documents the change in signing key to establish a chain of trust?
The text was updated successfully, but these errors were encountered: