Connect and share knowledge within a single location that is structured and easy to search. For me as hobby server admin it was always pretty clear. Use the built it gpg for all the hybrid encryption needs. But yesterday I had a problem with gpg so the package called gnupg in finding a key on a keyserver. I tried, but I did not manage to do it. Then I came across someone that said there is something like "gpg2" and that you have to use that for it.
I did not know there is something like gpg2 so the package gnupg2 and I installed it. Now I am really confused.
Why there are different versions? Using gpg2 worked, but I could not create any ECC keys. It is clear that I don't want to use 2 separate programs and import all keys in the 2 just to have a marginal change of features. Which one should I use moving forward will be updated in the future and I am more likely to receive new features?
Sign up to join this community. The best answers are voted up and rise to the top. Stack Overflow for Teams — Collaborate and share knowledge with a private group. We use cookies on our websites to deliver our online services. Details about how we use cookies and how you may disable them are set out in our Privacy Statement. By using this website you agree to our use of cookies.
Posted: May 19, by Susan Lauber. GnuPG, also known as GPG, can be used to encrypt files for confidentiality or sign files for integrity and authenticity. This article explores the minimum commands needed to encrypt a file or check a signature. It has a robust key management system and integrates easily with other applications. Package repositories are mirrored around the world. Digital signatures are used to ensure that you get an exact copy from the original packager and not a malicious version from a compromised site.
Local disk encryption protects data at rest for your powered-off laptop. However, to make sure that only the intended recipient can open a file you send by email or drop into a shared folder, you need to encrypt that individual file. The TLS certificates used with email or web-based drop boxes only protect the transfer on the wire. OpenPGP products can encrypt a file with a shared symmetric key or with asymmetric key pairs.
The installed binary is likely named gpg , but because of the recent version changes, you may want to check that as well. Early adopters of version 2. Now that version 1. The first time you run any gpg command, a configuration directory and keyring will be created in your home directory.
For example, if you run gpg --list-keys to display keys you may see the following message:. Simply having GnuPG installed is enough to encrypt or decrypt a file with a shared secret. To specify symmetric encryption, use the -c or --symmetric option and pass the file you wish to encrypt. You are prompted to enter and reenter a passphrase for the encrypted file.
In some specific cases, like using x keys, the script fails because of this. The text was updated successfully, but these errors were encountered:. One possible solution is to use the official GnuPG python bindings. However, the con to this is that the bindings are a pain to build and install. Prebuilt binaries of easy-gpg-to-paper would be a necessity in this case to maintain "easy". A better solution is to probably pipe a key directly into easy-gpg-to-paper for exporting and to pipe a reassembled key to stdout for importing.
Then the script is totally independent of gpg. Usage of the script would then be something like:. Sorry, something went wrong. I perfer the piping method. This should allow the user to take in account of their current gpg software. On Ubuntu you usually have gpg and gpg2 together, which often confuse various programs to no end.
0コメント