Upgrading 2.0.20 to 2.2.24

felix at crowfix.com felix at crowfix.com
Mon Jun 18 15:06:22 CEST 2018

On Mon, Jun 18, 2018 at 08:36:38AM +0200, Werner Koch wrote:
> On Mon, 18 Jun 2018 07:44, skquinn at rushpost.com said:
> > The format secret keys are stored in changed between 2.0.x and 2.1.x. It
> > is possible that 2.2.x no longer has the code in it to migrate to the
> 2.2 still has the migration code.  However, once a migration is done it
> will not be done again.  Thus adding a new key with an old version of gpg
> at least the secret key won't show up in a newer gpg version.
> > new format, in which case you might need to import secring.gpg manually
> > and set the trust to ultimate manually as well.
> Right.  The official way to do this is to run 
>   gpg --export-secret-key KEYID >FILE
> using the old version of gpg and then to run
>   gpg --import <FILE
> using the new version of gpg.  It is also possible to delete the file
> ~/.gnupg/.gpg-v21-migrated so that a migration will be triggered again.

Thanks -- but that didn't do the trick.

  $ gpg --list-secret-keys
  gpg: starting migration from earlier GnuPG versions
  gpg: porting secret keys from '/home/felix/.gnupg/secring.gpg' to gpg-agent
  gpg: key 783876E9182E8151: secret key imported
  gpg: key 44752F7C4D3D351A: secret key imported
  gpg: migration succeeded
  $ gpg --list-secret-keys

Says it imported the secret keys, but doesn't show them.  Don't think it's
permissions; the only read-only files are options, gpg-agent.conf, and
.gpg-agent-info.  Killed gpg-agent; it restarted fine, but gpg still doesn't
show the secret keys.

I'll have to try the export-import angle later; the old machine is old enough
that physically copying files requires some legwork.

            ... _._. ._ ._. . _._. ._. ___ .__ ._. . .__. ._ .. ._.
     Felix Finch: scarecrow repairman & wood chipper / felix at crowfix.com
  GPG = E987 4493 C860 246C 3B1E  6477 7838 76E9 182E 8151 ITAR license #4933
I've found a solution to Fermat's Last Theorem but I see I've run out of room o

More information about the Gnupg-users mailing list