by

Where communities thrive


  • Join over 1.5M+ people
  • Join over 100K+ communities
  • Free without limits
  • Create your own community
People
Repo info
Activity
  • 08:16
    FabianHenneke commented #926
  • 03:48

    Skrilltrax on develop

    Sync strings from Crowdin (#111… (compare)

  • 03:48
    Skrilltrax closed #1117
  • Sep 21 18:16
    msfjarvis synchronize #1117
  • Sep 21 18:14

    msfjarvis on develop

    Remove Autofill onboarding prom… (compare)

  • Sep 21 18:14
    msfjarvis closed #1116
  • Sep 21 17:47
    msfjarvis commented #1117
  • Sep 21 17:46
    msfjarvis synchronize #1117
  • Sep 21 17:44
    msfjarvis synchronize #1117
  • Sep 21 17:42
    msfjarvis labeled #1117
  • Sep 21 17:42
    msfjarvis milestoned #1117
  • Sep 21 17:42
    msfjarvis review_requested #1117
  • Sep 21 17:42
    msfjarvis review_requested #1117
  • Sep 21 17:42
    msfjarvis opened #1117
  • Sep 21 17:34
    msfjarvis edited #1116
  • Sep 21 17:34
    msfjarvis synchronize #1116
  • Sep 21 17:27
    FabianHenneke synchronize #1116
  • Sep 21 17:26

    FabianHenneke on develop

    Refactor auth mode check/unchec… (compare)

  • Sep 21 17:26
    FabianHenneke closed #1115
  • Sep 21 17:02
    msfjarvis labeled #1116
oren
@oren
awesome
Imre Majer
@imre0_gitlab
Hey, I started having some issues recently (with version 1.10.1). Essentially I cannot encrypt any new files with following error message:
"Error from OpenKeychain : Missing key for encryption: %s"
I guess somehow my encryption key is not being used properly. It worked before and also tested whether I can encrypt directly files and text from OpenKeyChain and it works.
My encryption subkey uses the ECDH (curve25519) protocol if that helps.
Imre Majer
@imre0_gitlab
Decryption and SSH authentication (also via OpenKeyChain) works as usual though.
Fabian Henneke
@FabianHenneke
@imre0_gitlab Could you provide us with the exact contents of your .gpg-id? We switched to honoring its contents in 1.10.0 and may not have fixed all bugs in 1.10.1.
Imre Majer
@imre0_gitlab
Ah, I actually fixed it. Thanks.
So my .gpg-id contained the ID for the the encryption subkey and not the master key.
I replaced it with the ID for the master key and now I can encrypt as well.
On the desktop with pass it didn't seem to matter though, not sure how requesting a key from OpenKeyChain works on Android.
Rio6
@Rio6
Hi, I'm trying to clone my password private repo from github but I can't get it to work.
Trying to clone using https gives me this error with debug logging enabled
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute: org.eclipse.jgit.api.errors.TransportException: https://github.com/Rio6/password-store: not authorized
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     at org.eclipse.jgit.api.FetchCommand.call(FetchCommand.java:30)
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     at org.eclipse.jgit.api.CloneCommand.fetch(CloneCommand.java:40)
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     at org.eclipse.jgit.api.CloneCommand.call(CloneCommand.java:4)
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     at org.eclipse.jgit.api.CloneCommand.call(CloneCommand.java:1)
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     at com.zeapo.pwdstore.git.GitCommandExecutor$execute$3.invokeSuspend(GitCommandExecutor.kt:2)
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:3)
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     at kotlinx.coroutines.DispatchedTask.run(DispatchedTask.kt:15)
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     at kotlinx.coroutines.scheduling.CoroutineScheduler.runSafely(CoroutineScheduler.kt:1)
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.run(CoroutineScheduler.kt:13)
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute: Caused by: org.eclipse.jgit.errors.TransportException: https://github.com/Rio6/password-store: not authorized
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     at org.eclipse.jgit.transport.TransportHttp.connect(TransportHttp.java:27)
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     at org.eclipse.jgit.transport.TransportHttp.openFetch(TransportHttp.java:1)
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     at org.eclipse.jgit.transport.FetchProcess.executeImp(FetchProcess.java:1)
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     at org.eclipse.jgit.transport.Transport.fetch(Transport.java:20)
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     at org.eclipse.jgit.api.FetchCommand.call(FetchCommand.java:23)
08-21 18:26:26.441  8990  8990 E GitCommandExecutor$execute:     ... 8 more
and trying to import ssh key gives me
08-21 18:11:34.088  8203  8203 E AndroidRuntime: Caused by: android.content.ActivityNotFoundException: No Activity found to handle Intent { act=android.intent.action.OPEN_DOCUMENT typ=*/* (has extras) }
08-21 18:11:34.088  8203  8203 E AndroidRuntime:     at android.app.Instrumentation.checkStartActivityResult(Instrumentation.java:2022)
08-21 18:11:34.088  8203  8203 E AndroidRuntime:     at android.app.Instrumentation.execStartActivity(Instrumentation.java:1677)
08-21 18:11:34.088  8203  8203 E AndroidRuntime:     at android.app.Activity.startActivityForResult(Activity.java:4701)
08-21 18:11:34.088  8203  8203 E AndroidRuntime:     at androidx.activity.ComponentActivity.startActivityForResult(ComponentActivity.java:2)
08-21 18:11:34.088  8203  8203 E AndroidRuntime:     at androidx.core.app.ActivityCompat.startActivityForResult(ActivityCompat.java:1)
08-21 18:11:34.088  8203  8203 E AndroidRuntime:     at androidx.activity.ComponentActivity$2.onLaunch(ComponentActivity.java:27)
08-21 18:11:34.088  8203  8203 E AndroidRuntime:     at com.zeapo.pwdstore.UserPreference.getSshKey(UserPreference.kt:5)
08-21 18:11:34.088  8203  8203 E AndroidRuntime:     at com.zeapo.pwdstore.UserPreference.onCreate(UserPreference.kt:5)
08-21 18:11:34.088  8203  8203 E AndroidRuntime:     at android.app.Activity.performCreate(Activity.java:7339)
08-21 18:11:34.088  8203  8203 E AndroidRuntime:     at android.app.Activity.performCreate(Activity.java:7330)
08-21 18:11:34.088  8203  8203 E AndroidRuntime:     at android.app.Instrumentation.callActivityOnCreate(Instrumentation.java:1275)
08-21 18:11:34.088  8203  8203 E AndroidRuntime:     at android.app.ActivityThread.performLaunchActivity(ActivityThread.java:3101)
08-21 18:11:34.088  8203  8203 E AndroidRuntime:     ... 11 more
Any help? thanks
cloning from a public repo works
Rio6
@Rio6
ok now I reinstalled it from F-droid, and https cloning works now
but I still can't import ssh key
Harsh Shandilya
@msfjarvis
Sorry for the radio silence here @Rio6. The HTTPS authentication error has been resolved on the current v1.11.3 release but due to how F-Droid operates their build server our updates simply fail to build for them and thus their users are unable to get the latest versions. For the failure to import an SSH key, it appears that your device does not have any file manager with the ability to provide a file picker. They typically come installed from the OEM so I'm not sure why you don't have one. What device is that?
Rio6
@Rio6
Thanks for the reply. Yeah I thought it looks like it can't find a file manager for me, but I do have 2 installed (the default one and FX file manager). I don't have many apps that also uses open file feature, but both gmail and firefox works fine choosing files.
My phone is a Samsung J4
Harsh Shandilya
@msfjarvis
Thanks for the info @Rio6, I'll try to reproduce the crash on my own Samsung device and see if we can do something about it.
Jorge de la Guia
@dlagg
Hi everyone. I'm configuring OpenKeyChain app for use it with Android-password-store. I created my Private Key, what next? For read the gpg password files I need to import the Public key that uses my pass program in Linux?
Harsh Shandilya
@msfjarvis
@dlagg you'll need to provide your GPG private key to OpenKeychain
Jorge de la Guia
@dlagg
@msfjarvis private key of my unix gpg? is secure? shouldn't openkeychain get the public key?
Harsh Shandilya
@msfjarvis
Yes, and yes it's secure. You cannot encrypt a file by knowing just the public key so providing the private key is essential.
Jorge de la Guia
@dlagg
the typical asymmetric key exchange? public keys and keep privates in its keyrings
Harsh Shandilya
@msfjarvis
Sorry, meant decrypt, not encrypt there.
OpenKeychain is your keyring in this scenario @dlagg
Jorge de la Guia
@dlagg
@msfjarvis I have 2 keyring A( Linux GnuPg) <--> pass <--> remote repo for password-storage.
B:( OpenKeyChain) <--> Remote Repo.
I mean , exchange public keys of gnupg with openkeychain
password-store*
Harsh Shandilya
@msfjarvis
OpenKeychain cannot decrypt your files with just the public key
Password Store does not actually handle your GPG key material and instead provides the encrypted file as a data stream to OpenKeychain, which then gives back a stream of decrypted data.
Jorge de la Guia
@dlagg
@msfjarvis password-store serves .gpg files encrypted with private-public crypto. , right? pass-store rely on openpgp client (gnupg or openkeychain). When you reads the .gpg file you are decrypting w your private key.
or its all based in symmetric crypto? one key for encryption?
Harsh Shandilya
@msfjarvis
The model is identical to GnuPG, but where pass on Linux shells out to the gpg binary, Password Store defers to OpenKeychain. OpenKeychain needs your private key for the same reason you'd provide it to GnuPG on Linux.
Jorge de la Guia
@dlagg
I don't feel safe at all exporting my private K into another keyring :S , I though this works with the classic private-public model, exchanging public keys.. it makes sense to me that way..
Harsh Shandilya
@msfjarvis
How did you think decryption was going to work with just your public key?
If it helps in any way, OpenKeychain has passed a security audit which found zero critical issues and the firm conducting the audit commended them for being able to maintain a significant codebase without glaring security holes.
Jorge de la Guia
@dlagg
@msfjarvis https://www.coengoedegebure.com/content/images/2019/04/asymmetric.gif private keys never left it's keyrings
Harsh Shandilya
@msfjarvis
But this is not an Alice-Bob situation
It's Alice on both ends
Jorge de la Guia
@dlagg
Alice : gnupg , Bob openkeychain?
Harsh Shandilya
@msfjarvis
Most certainly not.
The same person will be encrypting and decrypting files on both your Linux device and your Android device
Jorge de la Guia
@dlagg
and that method isn't to risky?
Harsh Shandilya
@msfjarvis
No? Why do you think it is?
Jorge de la Guia
@dlagg
you are exposing twice your private k
Harsh Shandilya
@msfjarvis
Android devices today are safer than standard Linux distros
You're actually being more unsafe by keeping the file on a Linux machine than a recent Android phone
Just yesterday we added support for Password Store to keep generated SSH keys in an Android phone's Keystore that makes it inaccessible to any attacker even with root access
Jorge de la Guia
@dlagg
i see.. ok I need to think about
thx for the info
Harsh Shandilya
@msfjarvis
Sure thing.
Rio6
@Rio6
or you can create another key pair just for password encryption purpose