apt – gpg: key server reception failed: connection has expired with Ubuntu Bionic


I want to add apt-key to Ubuntu Bionic


Ubuntu Bionic 18.04.3

I send:

/usr/bin/apt-key adv --no-tty --keyserver keyserver.ubuntu.com --recv E084DAB9


/usr/bin/apt-key adv --no-tty --keyserver hkp://keyserver.ubuntu.com:80 --recv E298A3A825C0D65DFD57CBB651716619E084DAB9


"stderr": "Warning: the output of the apt key should not be parsed (stdout is not a terminal) ngpg: the reception of the key server has failed: the connection has timed out n", "stderr_lines" : ("Warning: the output of the apt key must not be analyzed (stdout is not a terminal)", "gpg: the reception of the key server has failed: the connection has expired"

Additional Information:

  • This works fine for Ubuntu Xenial but does not work for Ubuntu Bionic.

  • I am running this command inside the Ubuntu Bionic Docker container. I took this ubuntu bionic image in my store and ran /usr/bin/apt-key adv --no-tty --keyserver hkp://keyserver.ubuntu.com:80 --recv E298A3A825C0D65DFD57CBB651716619E084DAB9That seems to be working fine.

/usr/bin/apt-key adv --no-tty --keyserver hkp://keyserver.ubuntu.com:80 --recv E298A3A825C0D65DFD57CBB651716619E084DAB9
Executing: /tmp/apt-key-gpghome.rA90EMTH3h/gpg.1.sh --no-tty --keyserver hkp://keyserver.ubuntu.com:80 --recv E298A3A825C0D65DFD57CBB651716619E084DAB9
gpg: key 51716619E084DAB9: public key "Michael Rutter " imported
gpg: Total number processed: 1
gpg:               imported: 1

But nevertheless, /usr/bin/apt-key adv --no-tty --keyserver keyserver.ubuntu.com --recv E084DAB9 it does not work and the timeout in the Ubuntu Bionic Docker container runs out.

Does anyone face a similar problem? Any help is appreciated. Thanks in advance!

gnupg: What should I do next in my GPG key after my computer is confiscated by the authority?

Unfortunately, although my passwords are password protected, I fear it is not secure enough. I assume that I lost control of all my private keys now. I still have a backup copy of my private keys, what I want to know is, for my privacy, if I generate a new subkey from my old master key and revoke the other old subkeys, or I must generate a completely new key, sign my new key with the old key and then revoke the old key? Also, my old key is in the "strong set" of WoT. If I generate a new password, does that mean I need to build a trust network from the beginning?

GPG fatal error there is not enough space

I have been trying to generate a 16k PGP key in Windows 10 size, but I still get this error: there is not enough space. Should I update the RAM of my laptop? What should I do to avoid this error?

gnupg – Generation of subkey and unattended ECC key of GPG

I want to generate an ECC key whose primary key is only for cert and has 3 subkeys for authentication, sign, code.

The following command works in interactitve mode

gpg2 --expert --full-gen-key

Key information

sec ed25519 / 0x5842AA66BB63DA36 2019-07-17 [C] [expires: 2020-07-16]
      Fingerprint = FF1F E580 F6D3 453E BA88 DD98 5842 AA66 BB63 DA36
uid                   [ultimate] NAMEXXXX (Tests) 
ssb ed25519 / 0x4F33E67F4B554A73 2019-07-17 [S] [expires: 2020-07-16]

ssb cv25519 / 0xDE2253D7DAD20F1A 2019-07-17 [E] [expires: 2020-07-16]

ssb ed25519 / 0x46A28F2FCC84A822 2019-07-17 [A] [expires: 2020-07-16]

But I want the generation of unattended keys through

gpg --batch -generate-key

I read How to batch generate the ECC key, but the configuration file wrote the correct error

Use of specified subkey not allowed for something 18

Configuration contents

% echo generating an OpenPGP key
Type of code: eddsa
Curve of keys: Ed25519
Use of key: cert
Subkey-type: ecdh
Subclave-Curve: Curve25519
Subkey-Usage: sign, auth, encrypt
Pass phrase: 1Qaz @ wsX
Name-Comment: Unattended tests
Expiration date: 0
% eco made

If I just configured Subkey-Usage: encrypt works.

If I put

Subclave-Type: eddsa
Sub-curve: ed25519
Subclause-Usage: sign, auth

It also works, but sign, authentication are listed in the same subkey.

How should I change the configuration file to do is it works. Thank you.

gnupg: How can you read the time in the GPG literal data package?

RFC 4880 says that the timestamp of the literal data packet has a length of four octets. The list of packages shows that it has five octets in length, at least in GnuPG 2.2.6.

The timestamp comes after the word "created" and is composed of digits 0 through 9. How can you read?


: literal data package:
b mode (62), created 1562530941, name = "My file"

gpg how to ask for password in terminal

I have a Manjaro Deepin.

When I use gpg always ask for the password in a window of the GUI box by default. I want gpg to request the password in the terminal, not in a GUI.

How do I achieve this?

Get my GPG fingerprint in Ubuntu 16.04 LTS

I want to receive help on how I can get my GPG fingerprint on Ubuntu 16.04 LTS. The few guides I have seen online have not been so clear to me.

Thank you.

pgp – Import / Register GPG keys from a SmartCard / Yubi

I used my desktop to configure my GPG keys, added them to my Yubikey and then removed them from my desk so that when I was asked for the key I would be asked to use my Yubikey, instead of asking for a password.

On my laptop I have the keys, but I ask for a password, I assume because those keys are on the laptop. How can I make the laptop request my Yubikey instead of a password?

gnupg: why gpg –list-secret-keys shows keys in pubring.kbx

When I do gpg –list-secret-keys, I get a response from a key that I imported but that is in ~ / .gnupg / pubring.kbx

I exported my public.key and private.key each with gpg –import and when I imported the private.key I asked for my secret password, so I assumed that everything went fine.

I saw a previous blog post and its output from –list-secret-keys returned a result located in ~ / .gnupg / secring.gpg, where my result comes from ~ / .gnupg / pubring.kbx

My concern is that I have imported them badly. Is it okay for me to return my private key from the pubring file? Or is this simply because my paired public key is there?

gnupg: Is it allowed to use GPG without an encryption key?

Do you disapprove or disapprove me very much if I choose to implement and use GnuPG without an encryption key? E.g. I generate keys manually and I omit the encryption key completely.

The reason is that I do not plan to receive encrypted communications with GPG mainly due to the lack of PFS, which offers almost everything else that it offers today. Even the same website comes with PFS. Not even mentioning the anecdotal inconvenience Receiving blue encrypted emails. What was very good in 1991 is not so good in 2019. (However, do not be offended, it's just that OpenPGP was not designed with PFS in mind).

Well, considering the above, I could have gone ahead if GnuPG did not behave badly if there was not an encryption key, which makes me think
If there could be an important real technical Which is why I should really get an encryption key. Is there?

For example, given a known public key that can not be encrypted, GPG reports an error and waits for more input indefinitely:

$ gpg --version
gpg (GnuPG) 2.2.12
libgcrypt 1.8.4
$ gpg --recv-key 4AEE18F83AFDEB23
$ gpg -k 4AEE18F83AFDEB23
pub rsa2048 2017-08-16 [SC]
uid           [ unknown] GitHub (web flow confirmation signature) 
$ touch example.txt
$ gpg -ear noreply@github.com example.txt
gpg: error when retrieving & # 39; noreply@github.com & # 39; via Local: Unusable public key

Otherwise, should I use other means to announce that I do not want things to be encrypted in my name?