Setting up wks/ error parsing submission email

Fabian A. Santiago fsantiago at deviltracks.net
Wed Dec 26 16:12:44 CET 2018


On 2018-12-23 05:59, Werner Koch wrote:
> On Fri, 21 Dec 2018 15:18, fsantiago at deviltracks.net said:
> 
>> webkey at mail:/var/vmail/procmail$ /usr/lib/gnupg/gpg-wks-client
>> --verbose --debug crypto --receive --send < sample2.txt
> 
>> gpg-wks-client: gpg: Good signature from
>> "key-submission at deviltracks.net" [unknown]
> 
> The signature from the server.  The server signs the confirmation
> request to allow the client to detect malicious requests before 
> annoying
> the user with a request to decrypt the challenge.  All good here.
> 
>> gpg-wks-client: DBG: gpg status: ENC_TO FAD6496868B818DD 1 0
>> gpg-wks-client: gpg: encrypted with RSA key, ID FAD6496868B818DD
> 
> The encrypted challenge.  The client must be able to decrypt this to
> confirm the publication requests he sent.
> 
>> gpg-wks-client: DBG: gpg status: NO_SECKEY FAD6496868B818DD
> 
> But for whatever reason the client does now own that private key.
> 
>> gpg-wks-client: error running '/usr/bin/gpg': exit status 2
> 
> Sure that this is the same gpg version you used to create the 
> challenge?
> 
>> that key id mentioned as missing, "FAD6496868B818DD", is that of my
>> test123 address from my client testbed. i would have assumed it would
>> be encrypted to the key-submission address' key. am i wrong? is it so
> 
> No.  You encrypt your publication request to the submission address
> key.  This is not required for the protocol but we want to encrypt as 
> much
> traffic as possible.
> 
> The server then encrypts to the key you want to have published.
> 
>> that i could also read the message in my sent folder so it's encrypted
>> to both of us? i'm just thinking aloud. let me know what you
> 
> The server does not need to decrypt its own challenge again.
> 
> 
> Shalom-Salam,
> 
>    Werner

yes, confirmed same gpg version between both ends. thanks for the 
explanation.

-- 
--

Thanks,

Fabian S.

OpenPGP:  0xE05BF5EEFDD6549DAD3EDF64AE4E3D03B4F2DF29



More information about the Gnupg-devel mailing list