Accidentally deleted ~/.gnupg/pubring.gpg
renws
renws at protonmail.com
Tue Aug 18 17:01:09 CEST 2020
It worked, and it was much easier than I expected, thank you so much!
WS
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Monday, August 17, 2020 6:31 PM, Werner Koch <wk at gnupg.org> wrote:
> On Sun, 16 Aug 2020 04:33, renws said:
>
> > And I don't have any backup of my public key, so I would like to know
> > whether it's possible to decrypt my files (I've still got
> > ~/.gnupg/private-keys-v1.d, which I think stores my private key?).
>
> If you just want to decrypt your files, you can do this:
>
> - Create a new key, best using the mail address you used in your lost
> key.
>
> - Add a subkey so you can decrypt old data, for example
>
> $ gpg --expert --edit-key NEWKEYID
> Secret key is available.
>
> [Prints infor about that key]
>
> gpg> addkey
> Please select what kind of key you want:
> (3) DSA (sign only)
> (4) RSA (sign only)
> (5) Elgamal (encrypt only)
> (6) RSA (encrypt only)
> (7) DSA (set your own capabilities)
> (8) RSA (set your own capabilities)
> (10) ECC (sign only)
> (11) ECC (set your own capabilities)
> (12) ECC (encrypt only)
> (13) Existing key
> (14) Existing key from card
> Your selection? 13
> Enter the keygrip:
>
> here you need to enter the keygrip of your lost key. That is the
> name of the file in private-keys-v1.d/ without the ".key" suffix.
> With your new key you should have 4 files in that directory, chekc
> the date to pick the right one; if it does not work, you picked then
> signing key and not the encryption key. Start over in this case.
>
> Enter "save" and you have a new encryption subkey which matches the
> old one mathematically.
>
> - To decrypt with the new/old file you need to add the option:
>
> --try-all-secrets
>
> The last point is an obvious drawback but it is the easiest way to get
> to your data.
>
> Salam-Shalom,
>
> Werner
>
> --
> Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
>
More information about the Gnupg-users
mailing list