problems sending to the list

Matthias Apitz guru at unixarea.de
Sun Feb 11 09:29:58 CET 2018


Hello,

Sometimes I do SSH into my server of my ISP and send email to the list
from there. This always failes with the message below.

Can some list admin please check, why? Thanks

	matthias

----- Forwarded message from Mail Delivery System <Mailer-Daemon at sh4-5.1blu.de> -----

Date: Fri, 09 Feb 2018 11:14:13 +0100
From: Mail Delivery System <Mailer-Daemon at sh4-5.1blu.de>
To: ftp51246-2575596 at sh4-5.1blu.de
Subject: Mail delivery failed: returning message to sender

This message was created automatically by mail delivery software.

A message that you sent could not be delivered to one or more of its
recipients. This is a permanent error. The following address(es) failed:

  gnupg-users at gnupg.org
    host kerckhoffs.g10code.com [217.69.77.222]
    SMTP error from remote mail server after RCPT TO:<gnupg-users at gnupg.org>:
    451 Could not complete sender verify callout:
    retry timeout exceeded

Reporting-MTA: dns; sh4-5.1blu.de

Action: failed
Final-Recipient: rfc822;gnupg-users at gnupg.org
Status: 5.0.0
Remote-MTA: dns; kerckhoffs.g10code.com
Diagnostic-Code: smtp; 451 Could not complete sender verify callout: retry timeout exceeded

Date: Mon, 5 Feb 2018 11:12:12 +0100
From: Matthias Apitz <guru at unixarea.de>
To: gnupg-users at gnupg.org
Subject: OpenPGP card && exporting secret keys


Hello,

I'm using an OpenPGP card and gnupg 2.1.19 on my FreeBSD workstations
and my Ubuntu mobile device to store crypted passwords (tool: password-store),
to lock/unlock desktop sessions and to sign emails. This is all working
fine and without any hick-ups.

What makes me worry, is that single point of failure: the OpenPGP card.

While I do backups of alls the encrypted password files, they would be
all useless in case of lost/teft of the token or hardware fault of the SIM
card.

What I do at the moment is something like:

$ find ~/.password-store -name '*.gpg' -exec printf "%s:\n" {} \;
  -and -exec gpg2 -d {} 2> /dev/null \; 
  -and -exec echo \; > /tmp/clear-password-store.txt

$ GNUPGHOME=...
$ gpg -ea /tmp/clear-password-store.txt
$ mv /tmp/clear-password-store.txt.asc $GNUPGHOME
$ rm -P /tmp/clear-password-store.txt

where the other GNUPGHOME contains secret and pub-keys created for this
special purpose and living outside (i.e. without) the OpenPGP card.
ANd in case of lost/teft of the token I could recover at least all
passwords again...

Is there any way to export the secret keys from the OpenPGP card to use
them directly (with a passphrase) and without the OpenPGP card?

Thanks

	matthias

----- End forwarded message -----

-- 
Matthias Apitz, ✉ guru at unixarea.de, ⌂ http://www.unixarea.de/  📱 +49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub

Thanks to the Soviet Army for the Victory in Stalingrad! -- Победа в Сталинградской битве!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20180211/157d9093/attachment.sig>


More information about the Gnupg-users mailing list