Package Details: gnupg1 1.4.23-1

Git Clone URL: https://aur.archlinux.org/gnupg1.git (read-only, click to copy)
Package Base: gnupg1
Description: GNU Privacy Guard - a complete and free implementation of the OpenPGP standard.
Upstream URL: http://www.gnupg.org/
Keywords: gnupg gnupg1
Licenses: GPL3
Conflicts: gnupg1, gnupg1-extended
Provides: gnupg1
Replaces: gnupg1, gnupg1-extended
Submitter: Xyne
Maintainer: Xyne (andrcmdr)
Last Packager: andrcmdr
Votes: 36
Popularity: 0.000000
First Submitted: 2012-03-29 00:05 (UTC)
Last Updated: 2021-11-18 23:30 (UTC)

Latest Comments

« First ‹ Previous 1 2 3 4 5 Next › Last »

Xyne commented on 2016-06-11 18:04 (UTC)

@Tebro The valid keys are listed on the GnuPG website: https://www.gnupg.org/signature_key.html The values in the PKGBUILD are up-to-date. I have no idea where 2071B08A33BD3F06 came from. Building the package with the current PKGBUILD works as expected here. I would be very wary if a signature from an unknown key was downloaded instead of the expected one. Are you in a country that is likely to intercept web traffic and inject content?

Tebro commented on 2016-06-07 15:32 (UTC)

Getting this: gnupg-1.4.20.tar.bz2 ... FAILED (unknown public key 2071B08A33BD3F06)

gavinhungry commented on 2016-03-02 17:59 (UTC)

@Xyne, Can you change the source from "ftp://ftp.gnupg.org/" to "https://gnupg.org/ftp/"? I'm constantly having issues connecting to their FTP. gnupg in Core uses https now as well: https://projects.archlinux.org/svntogit/packages.git/tree/trunk/PKGBUILD?h=packages/gnupg

gubz commented on 2016-02-25 09:41 (UTC)

New version 1.4.20 is out. Change SHA1 to cbc9d960e3d8488c32675019a79fbfbf8680387e

Xyne commented on 2015-08-10 23:34 (UTC)

As most users are likely not using this package exclusively with TOR I have not enabled those options by default. I have, however, added them to the PKGBUILD to make users aware of them. TOR users can easily edit the PKGBUILD before building. Thanks for the info.

voidnull commented on 2015-08-10 03:23 (UTC)

./configure \ --disable-dns-cert \ --disable-dns-pka \ --disable-dns-srv \ --disable-ldap would eliminate DNS leaks https://trac.torproject.org/projects/tor/ticket/2846

max-k commented on 2015-03-30 07:00 (UTC)

@geekinthesticks : gpg --keyserver pgpkeys.mit.edu --recv-keys 2071B08A33BD3F06

geekinthesticks commented on 2015-01-23 10:43 (UTC)

I am now getting: ==> Verifying source file signatures with gpg... gnupg-1.4.18.tar.bz2 ... FAILED (unknown public key 249B39D24F25E3B6) ==> ERROR: One or more PGP signatures could not be verified!

EtiennePerot commented on 2015-01-19 04:29 (UTC)

Can you add armv6h to the list of supported architectures, so that this can be used on a Raspberry Pi?