Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upImprove Split GPG documentation #1890
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Apr 3, 2016
Member
However, in none of the AppVMs that I added the
QUBES_GPG_DOMAIN=my-vaultvalue to seem to function. Running bothgpg -Kandgpg2 -Kreturns nothing and seems to only be accessing the keychain in that VM.
That's expected behaviour. You need to call qubes-gpg-client-wrapper to
actually use split gpg. And configure applications you use to call this
instead of gpg/gpg2.
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
That's expected behaviour. You need to call qubes-gpg-client-wrapper to Best Regards, |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
bnvk
Apr 3, 2016
@marmarek ah right, thanks for clarifying. I will tweak the docs page to make this a lil more clear!
bnvk
commented
Apr 3, 2016
|
@marmarek ah right, thanks for clarifying. I will tweak the docs page to make this a lil more clear! |
bnvk
self-assigned this
Apr 3, 2016
bnvk
added
the
C: doc
label
Apr 3, 2016
bnvk
changed the title from
Unable to get Split GPG to function
to
Improve Split GPG documentation
Apr 3, 2016
andrewdavidwong
added this to the
Documentation/website milestone
Apr 6, 2016
andrewdavidwong
added
enhancement
P: minor
labels
Apr 7, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mfc
May 24, 2016
Member
it would probably be useful in the documentation to have each step be numbered, to avoid these types of issues (I also had issues by accidentally skipping a step).
more generally, it may be good to also have a "good practices" section or something. for example, similar to a pgp smartcard, it probably makes sense to shutdown your split-gpg vm when you are away from your computer, in order to prevent potentially malicious vms from hammering your split-gpg to decrypt things (given the split-gpg access log has no timestamps).
|
it would probably be useful in the documentation to have each step be numbered, to avoid these types of issues (I also had issues by accidentally skipping a step). more generally, it may be good to also have a "good practices" section or something. for example, similar to a pgp smartcard, it probably makes sense to shutdown your split-gpg vm when you are away from your computer, in order to prevent potentially malicious vms from hammering your split-gpg to decrypt things (given the split-gpg access log has no timestamps). |
bnvk commentedApr 3, 2016
Trying configure Split GPG on my Qubes 3.1 install, I cannot get it to function. When I first started, I made sure I had
qubes-gpg-split-dom0installed in dom0. The Konsole said it was already installed, same for my Fedora 23 Template. However in Debian Standalone, I did need to install the package.However, in none of the AppVMs that I added the
QUBES_GPG_DOMAIN=my-vaultvalue to seem to function. Running bothgpg -Kandgpg2 -Kreturns nothing and seems to only be accessing the keychain in that VM.Upon double checking in dom0 that the package was installed, I now see the following error (even after restarting machine).