"key algorithm" in GnuPG's signature verification output

gnupgpacker gnupgpacker at on.yourweb.de
Tue Dec 9 11:58:47 CET 2014

Hash: SHA512


signing with two keys in one block can be done. But also, if unequal technology used (e.g. RSA+edDSA)?

Verifying of MFPA's signature with Gpg-1.4.18 gave me:

gpg: Unterschrift vom 06.12.2014 16:56:22 mittels RSA-Schlüssel ID B31F25F0
gpg: FALSCHE Unterschrift von "0x251BCCEB547B7194" [unbekannt]
gpg: Unterschrift vom 06.12.2014 16:56:33 mittels ?-Schlüssel ID 1AF778E4
gpg: Unterschrift kann nicht geprüft werden: Unbekanntes Public-Key-Verfahren
Time: 09.12.2014 11:45:53 (09.12.2014 10:45:53 UTC)

Gpg-1.4.8 isn't captable using edDAS.
In my opinion output would be ok if a new edDSA key has been used!?
If RSA signing key has been used, there might be some fault...

Regards, Chris

(Testkey 0x3e2e0598, DSA-2048-sig)

> It seems that you (MFPA) changed your signing practice after I noted that
> I can't verify signatures created with your key “1AF778E4”. I did not know
> that one could sign a message with two keys in one signing block.

> I am wondering if there is a way to collapse the verification result for a
> multi-key signature down to a single “good” or “bad” value/result, because
> Enigmail gave me some ambiguous message about your signatures.



More information about the Gnupg-users mailing list