Package Details: gnupg1 1.4.21-1

Git Clone URL: https://aur.archlinux.org/gnupg1.git (read-only)
Package Base: gnupg1
Description: GNU Privacy Guard - a PGP replacement tool
Upstream URL: http://www.gnupg.org/
Licenses: GPL3
Submitter: Xyne
Maintainer: Xyne
Last Packager: Xyne
Votes: 38
Popularity: 0.074827
First Submitted: 2012-03-29 00:05
Last Updated: 2016-08-24 15:49

Latest Comments

Xyne commented on 2016-07-17 13:53

@EtiennePerot
done

EtiennePerot commented on 2016-07-17 00:10

Confirmed that this builds and runs on architecture aarch64.
Might as well also add armv6l, armv7h, armv7l, armv8h, armv8l.

versusvoid commented on 2016-06-22 09:07

@Xyne
From https://www.gnupg.org/signature_key.html

pub rsa2048/33BD3F06 2014-10-29 [expires: 2016-10-28]
Key fingerprint = 031E C253 6E58 0D8E A286 A9F2 2071 B08A 33BD 3F06
uid NIIBE Yutaka (GnuPG Release Key) <gniibe 'at' fsij.org>

2071B08A33BD3F06
2071 B08A 33BD 3F06

After importing their public key manually (gpg --import), package builds.

Xyne commented on 2016-06-11 18:04

@Tebro
The valid keys are listed on the GnuPG website:

https://www.gnupg.org/signature_key.html

The values in the PKGBUILD are up-to-date. I have no idea where 2071B08A33BD3F06 came from. Building the package with the current PKGBUILD works as expected here. I would be very wary if a signature from an unknown key was downloaded instead of the expected one. Are you in a country that is likely to intercept web traffic and inject content?

Tebro commented on 2016-06-07 15:32

Getting this: gnupg-1.4.20.tar.bz2 ... FAILED (unknown public key 2071B08A33BD3F06)

gavinhungry commented on 2016-03-02 17:59

@Xyne,

Can you change the source from "ftp://ftp.gnupg.org/" to "https://gnupg.org/ftp/"? I'm constantly having issues connecting to their FTP.

gnupg in Core uses https now as well:
https://projects.archlinux.org/svntogit/packages.git/tree/trunk/PKGBUILD?h=packages/gnupg

gubz commented on 2016-02-25 09:41

New version 1.4.20 is out. Change SHA1 to cbc9d960e3d8488c32675019a79fbfbf8680387e

Xyne commented on 2015-08-10 23:34

As most users are likely not using this package exclusively with TOR I have not enabled those options by default. I have, however, added them to the PKGBUILD to make users aware of them. TOR users can easily edit the PKGBUILD before building.

Thanks for the info.

voidnull commented on 2015-08-10 03:23

./configure \
--disable-dns-cert \
--disable-dns-pka \
--disable-dns-srv \
--disable-ldap

would eliminate DNS leaks

https://trac.torproject.org/projects/tor/ticket/2846

max-k commented on 2015-03-30 07:00

@geekinthesticks :

gpg --keyserver pgpkeys.mit.edu --recv-keys 2071B08A33BD3F06

All comments