AUR PGP Issue

well, seems you did not do the pgp --import... after downloading

Anyways, better fix the other mess that @pebcak mentioned. That’s probably the root cause why gpg get’s nuts.

2 Likes

Changed permissions to 700 for nastikaa321518. still error

nastikaa321518@NastikaasP330SatTosh ~]$ sudo chown $USER:$USER /home/nastikaa321518/.gnupg/dirmngr_ldapservers.conf
[nastikaa321518@NastikaasP330SatTosh ~]$ sudo chmod 700 $USER:$USER /home/nastikaa321518/.gnupg/dirmngr_ldapservers.conf
chmod: cannot access ‘nastikaa321518:nastikaa321518’: No such file or directory
[nastikaa321518@NastikaasP330SatTosh ~]$ ls -al /home/nastikaa321518/.gnupg/dirmngr_ldapservers.conf
-rwx------ 1 nastikaa321518 nastikaa321518 0 Sep 10 02:12 /home/nastikaa321518/.gnupg/dirmngr_ldapservers.conf
[nastikaa321518@NastikaasP330SatTosh ~]$ gpg --keyserver hkps://keyserver.ubuntu.com --search-keys E57235D22764129FA4F2F4D17F52608ED0E49D76
gpg: error searching keyserver: Operation not permitted
gpg: keyserver search failed: Operation not permitted

Fixed permissions to 700 for user as suggested by @pebcak and issued command as below

gpg --import E57235D22764129FA4F2F4D17F52608ED0E49D76
gpg: can’t open ‘E57235D22764129FA4F2F4D17F52608ED0E49D76’: No such file or directory
gpg: Total number processed: 0

Why are you doing this?

I posted the exact commands before. Just copy/paste them.

curl "https://keyserver.ubuntu.com/pks/lookup?op=get&search=0xe57235d22764129fa4f2f4d17f52608ed0e49d76" -o some_pub.key
pgp --import some_pub.key

However, after fixing the permissions, yay/gpg is probably able to do it itself now.

1 Like

should it be

gpg --import some_pub.key

instead?

2 Likes

Did that. It downloaded some 3990KB data. After that result as follows
yay ntpsec

> :: (1/1) Parsing SRCINFO: ntpsec
**> **
> :: PGP keys need importing:
> → E57235D22764129FA4F2F4D17F52608ED0E49D76, required by: ntpsec
> :: Import? [Y/n] n
> ==> Making package: ntpsec 1.2.1-0 (Sunday, September 18, 2022 AM01:31:09)
> ==> Retrieving sources…
> → Downloading ntpsec-1.2.1.tar.gz…
> % Total % Received % Xferd Average Speed Time Time Time Current
> Dload Upload Total Spent Left Speed
> 100 2618k 100 2618k 0 0 365k 0 0:00:07 0:00:07 --:–:-- 567k
> → Downloading ntpsec-1.2.1.tar.gz.asc…
> % Total % Received % Xferd Average Speed Time Time Time Current
> Dload Upload Total Spent Left Speed
> 100 833 100 833 0 0 240 0 0:00:03 0:00:03 --:–:-- 240
> → Found use-arch-pool.patch
> → Found ntpsec.sysusers
> ==> Validating source files with sha512sums…
> ntpsec-1.2.1.tar.gz … Passed
> ntpsec-1.2.1.tar.gz.asc … Passed
> use-arch-pool.patch … Passed
> ntpsec.sysusers … Passed
> ==> Verifying source file signatures with gpg…
> ntpsec-1.2.1.tar.gz … FAILED (unknown public key 7F52608ED0E49D76)
> ==> ERROR: One or more PGP signatures could not be verified!
**> → error downloading sources: ntpsec **
**> context: exit status 1 **
**> **
**> **
> ==> Making package: ntpsec 1.2.1-0 (Sunday, September 18, 2022 AM01:31:25)
> ==> Checking runtime dependencies…
> ==> Checking buildtime dependencies…
> ==> Retrieving sources…
> → Found ntpsec-1.2.1.tar.gz
> → Found ntpsec-1.2.1.tar.gz.asc
> → Found use-arch-pool.patch
> → Found ntpsec.sysusers
> ==> Validating source files with sha512sums…
> ntpsec-1.2.1.tar.gz … Passed
> ntpsec-1.2.1.tar.gz.asc … Passed
> use-arch-pool.patch … Passed
> ntpsec.sysusers … Passed
> ==> Verifying source file signatures with gpg…
> ntpsec-1.2.1.tar.gz … FAILED (unknown public key 7F52608ED0E49D76)
> ==> ERROR: One or more PGP signatures could not be verified!
> → error making: ntpsec

Something is messed up on your computer.
It is working on mine

: Proceed with installation? [Y/n]: 
:: keys need to be imported:
     E57235D22764129FA4F2F4D17F52608ED0E49D76 wanted by: ntpsec-1.2.1-0
:: import? [Y/n]: 
gpg: key 7F52608ED0E49D76: public key "NTPsec Security Reporting <security@ntpsec.org>" imported
gpg: Total number processed: 1
gpg:               imported: 1
resolving dependencies...
looking for conflicting packages...

==> Verifying source file signatures with gpg...
    ntpsec-1.2.1.tar.gz ... Passed

P.S.
Please use code blocks for your output like I did. Makes it more readable.

1 Like

I know that my PC has been made a play ground by insider/outsider hackers of network.They are protected.Their logs will never be verified. ISP has no norms in compliance with IEEE and IETF standards.Any one can do anything. Paying ISP to get head ache from criminals. More over outer space attacks are much powerful. I can not prevent a guy who can access intel,amd,nvidia chips using laser or infrared.
Should i Re install OS?.

Did you import the key with gpg after downloading???
To me it does not look like that:


Again. Issue these commands, one after another and please share the terminal output:

curl "https://keyserver.ubuntu.com/pks/lookup?op=get&search=0xe57235d22764129fa4f2f4d17f52608ed0e49d76" -o some_pub.key
gpg --import some_pub.key

edit: corrected typo pgpgpg

1 Like

Success. Thanks for all hardwork.Appreciate it. @moson @pebcak @sradjoker @joekamprad @jonathon @anon11595408 @anon63071375

maybe mark @moson 's post as solution since it solved your issue?

1 Like

I did that. But ntpsec.org categorized it as not an ultimate trusted key
Just for future reference.
pgp --import some_pub.key
bash: pgp: command not found
[nastikaa321518@NastikaasP330SatTosh ~]$ gpg --import some_pub.key

  • gpg:

key 7F52608ED0E49D76: 1 signature not checked due to a missing key
gpg: key 7F52608ED0E49D76: public key “NTPsec Security Reporting security@ntpsec.org” imported
gpg: Total number processed: 1
gpg: imported: 1
gpg: no ultimately trusted keys found

Wooops. Totally my fault. It should have been gpg not pgp

yes.

1 Like

wau creative I love it :wink: :heart_eyes:

3 Likes

Access by infrared or laser has been a routine practice of any National security agency.
But it is limited to them only, as per constitution.
If some anti social or criminal hires a hacker and fetches them National Security agency infrastructure, it is not considered creative.
It is nothing but a Brutal murder and only death penalty is appropriate to those who intrude by misuse of national/international security infrastructure and its privileges as per INTERPOL norms.
Killing people with laser also considered creative as there wont be any blood. Clean murder.
Can we accept it?

Thank (the non-existent) god that NSA did not find my laser-sword yet.
I’m defending any outer-space attacks with it since years btw.

Simply don’t connect your PC to the internet then you won’t get those NSA guys infiltrating it.
They did not (yet) get to the point to use magic

/S

1 Like

IoT, Quantum,5G, Satellites can infiltrate into any PC now. Can Break any encryption. 256 or 128 bit
I know as long as we reside in a country where law&order is a havoc,nothing can be done.
Less than a year. I will be fast jumping out of this hell.
Few countries still have rules and follow them. They don’t keep/leave it lose
Attack by a unsolicited criminal is an unexpected event.Any country need mitigation with that

Nah. No way.
I use ROT13 encryption two times. And ROT26 on top of it again just to be sure.

/S

You are an exception. Great.
US Military web sites, Recently Texas oil company database have been compromised.Several such incidents with Social media FB,Twitter and many more
Even Jeff Bezos (Amazon) and other people belonging to Fortune 500 companies at helm experienced set backs by hackers several times.
US always blamed some other country as they don’t have any idea as to who has done it

This topic was automatically closed 2 days after the last reply. New replies are no longer allowed.