-
-
Notifications
You must be signed in to change notification settings - Fork 187
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add fepitre-bot public key inside distribution trusted keys to test QubesOS 4.1 #1010
Comments
@fepitre :
So basically, Heads code for importing public distro key does not behave any differently then above, hence that public key is processed but not imported since lacking a UID. Consequently, botting from Heads that ISO fails when verifying detached signature, since that public key is not imported (and unknown) and fails to boot. What is your procedure to import such key without a user ID? Would you consider renewing this public distro signing key so that it is considered valid? |
AFAIK GnuPG doesn't support keys without User ID. The problem is that you downloaded it from keys.openpgp.org, which distributes User IDs only after explicit confirmation by the owner of the email address in the User ID. Just download the key from https://qubes.notset.fr/repo/notset/RPM-GPG-KEY-notset this should include the User ID for that public key. |
Key: https://keys.openpgp.org/search?q=1C8714D640F30457EC953050656946BA873DDEC1
To test those builds: https://forum.qubes-os.org/t/qubesos-4-1-alpha-signed-weekly-builds/3601/4
Direct link to download test detached signed builds: https://qubes.notset.fr/iso/
Heads users ask it (and would be useful to troubleshoot #789 on sandy/ivy bridges based laptops).
The text was updated successfully, but these errors were encountered: