Page MenuHome GnuPG

broken keyring on 2.1.1
Closed, ResolvedPublic

Description

GnuPG 2.1.1 is unable to list the keys in my keyring.

Note that not only the (probably?) tricky keys with an offline main key are not
listed; neither are any other keys except for one. To protect my privacy, I
replaced personal data using a (hopefully) consistent pattern.

[user@host ~]$ gpg --version
gpg (GnuPG) 2.1.1
libgcrypt 1.6.2
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: ~/.gnupg
Unterstützte Verfahren:
Öff. Schlüssel: RSA, ELG, DSA, ECDH, ECDSA, EDDSA
Verschlü.: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,

CAMELLIA128, CAMELLIA192, CAMELLIA256

Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Komprimierung: nicht komprimiert, ZIP, ZLIB, BZIP2
[user@host ~]$ gpg -K

/home/user/.gnupg/pubring.gpg

sec rsa2048...valid main key
uid [ultimate] user user <user@email.com>
ssb rsa2048...
valid subkey

gpg: keyring_get_keyblock: read error: Ungültiges Paket
gpg: keydb_get_keyblock failed: Ungültiger Schlüsselbund

Downgrading to 2.1.0 does the trick:

[user@host ~]$ gpg --version
gpg (GnuPG) 2.1.0
libgcrypt 1.6.2
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: ~/.gnupg
Unterstützte Verfahren:
Öff. Schlüssel: RSA, ELG, DSA, ECDH, ECDSA, EDDSA
Verschlü.: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,

CAMELLIA128, CAMELLIA192, CAMELLIA256

Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Komprimierung: nicht komprimiert, ZIP, ZLIB, BZIP2
[user@host ~]$ gpg -K

/home/user/.gnupg/pubring.gpg

sec rsa2048...valid main key
uid [ultimate] user user <user@email.com>
ssb rsa2048...
valid subkey

sec rsa4096...valid main key
uid [ultimate] user
ssb rsa4096...
valid subkey

sec# rsa4096...//valid main key [verfallen: $DATE]
uid [ expired] user
uid [ expired] user user (Hauptschlüssel)
uid [ expired] user user <user@email.com>

sec rsa1024...//valid main key [verfallen: $DATE]
uid [ expired] user <user@email.com>

sec# rsa4096...valid main key [verfällt: $DATE]
uid [ultimate] user user (Smartcard) <user@email.com>
uid [ultimate] user user (Smartcard) <user@email.com>
ssb# rsa3072...
valid subkey [verfällt: $DATE]
ssb rsa3072...valid subkey [verfällt: $DATE]
ssb# rsa3072...
valid subkey [verfällt: $DATE]

sec# rsa4096...valid main key [verfällt: $DATE]
uid [ultimate] user user (Smartcard) <user@email.com>
uid [ultimate] user user (Smartcard) <user@email.com>
ssb rsa4096...
valid subkey [verfällt: $DATE]
ssb rsa4096...valid subkey [verfällt: $DATE]
ssb rsa4096...
valid subkey [verfällt: $DATE]

I'm running Arch Linux. For the package in question pacman states:

pacman -Qi gnupg

Name : gnupg
Version : 2.1.1-1
Beschreibung : Complete and free implementation of the OpenPGP standard
Architektur : x86_64
URL : http://www.gnupg.org/
Lizenzen : GPL
Gruppen : Nichts
Stellt bereit : dirmngr gnupg2=2.1.1
Hängt ab von : npth libgpg-error libgcrypt libksba libassuan
pinentry bzip2 readline gnutls
Optionale Abhängigkeiten: libldap: gpg2keys_ldap [Installiert]

libusb-compat: scdaemon [Installiert]

Benötigt von : duplicity gpgme
Optional für : Nichts
In Konflikt mit : dirmngr gnupg2
Ersetzt : dirmngr gnupg2
Installationsgröße : 8,32 MiB
Packer : Gaetan Bisson <bisson@archlinux.org>
Erstellt am : Di 16 Dez 2014 20:39:55 CET
Installiert am : Fr 02 Jan 2015 13:24:31 CET
Installationsgrund : Installiert als Abhängigkeit für ein anderes Paket
Installations-Skript : Ja
Verifiziert durch : Signatur

If you need more info, contact me.

Event Timeline

edit: This is probably a duplicate of 1793

Yes, that is very likely. Check the list for a workaround.

werner claimed this task.
werner removed a project: In Progress.

1793 has been fixed thus we can close this.