Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 20 Jul 2018 05:52:51 -0700
From:      David Wolfskill <david@catwhisker.org>
To:        freebsd-ports@freebsd.org
Subject:   After mutt-1.10.0_1 -> mutt-1.10.1 upgrade, gnupg fails
Message-ID:  <20180720125251.GE12958@albert.catwhisker.org>

next in thread | raw e-mail | index | archive | help

--Tt0oXuFDeiK1hyxO
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

This is running:

FreeBSD g1-215.catwhisker.org 11.2-STABLE FreeBSD 11.2-STABLE #685  r336523=
M/336541:1102501: Fri Jul 20 03:40:05 PDT 2018     root@g1-215.catwhisker.o=
rg:/common/S1/obj/usr/src/sys/CANARY  amd64

and after updating all installed ports to reflect the ports "head"
branch at r475002.

A symptom is that an attempt to send a signed, unencrypted message
yields a failure, with the messages:

| gpg: skipped "0x6757003D": Unusable secret key
| gpg: signing failed: Unusable secret key

This works on another machine (the one I'm using to send this
message), with the same gnupg/mutt setup, but running mutt-1.10.0_1.

I have not configured mutt to use gpgme, though I'm willing to try
it.  I recall that I needed to tweak ~/.muttrc a bit after the
gnupg-2.0 -> gnupg-2.1 update -- though that change was merely
commenting out the 'pgp_verify_command' line.

I note that a result of the mutt upgrade is that
/usr/local/share/examples/mutt/gpg.rc has changed, but that change
was merely to remove the pgp_decryption_okay setting (which I don't
have) and add 'set pgp_check_gpg_decrypt_status_fd'; I tried adding
that, to no avail.

Any hints or suggestions?

Thanks!

Peace,
david
--=20
David H. Wolfskill				david@catwhisker.org
Trump is providing aid and comfort to a regime that is hostile to US intere=
sts.

See http://www.catwhisker.org/~david/publickey.gpg for my public key.

--Tt0oXuFDeiK1hyxO
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQGTBAEBCgB9FiEEzLfO+ReoAfQwZNd7FTnMQKBJ7hcFAltR2yNfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEND
QjdDRUY5MTdBODAxRjQzMDY0RDc3QjE1MzlDQzQwQTA0OUVFMTcACgkQFTnMQKBJ
7heqpAgAjnSGB8nyeHIU4y5mWgQb2vEYEZf5PTVVxx0VO8MN/W7jRFxDaG5isG8f
Ou3vjiGLOs9ymvg7Y5qqWq0ZqGdOOQyTFlZ8oU9hy6fQd1tBahDaV6oYhHoAR1VC
I3htNJk3S63yvgvOfrVQZvlsr8NzbDyiV5L/31MdrY9REvAETtoaAz7lyJhx4+rL
fYHgj+xoJ3l8Z3+ER7IiKvCOW2X/AMXDPOppFBoM1dXA7bOE2ARAwnYeMapyzvpD
I/1/4p3bFFR17PUuQLJ5n04JJuHocmyatxHKfFFD0iK7haqDLZstAJt8aYE7bnT4
w71fSYI3nOYTIETz4L9dLCQ1g7uDKQ==
=TPcf
-----END PGP SIGNATURE-----

--Tt0oXuFDeiK1hyxO--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20180720125251.GE12958>