I have a master private key (Certify Only) stored in Vault, separate Encryption and Sign secrete_subkeys generated in Vault and stored in networkless work-gpg. All public keys stored in a separate AppVM for 'qubes-gpg-client' command to access the work-gpg VM via the Split GPG protocol.
I have succesfully tested signing and verifying text with my new key, and decrypting messages to my new key. My one issue has been encrypting messages to other keys:
`export QUBES_GPG_DOMAIN=work-gpg`
`cat InFile | qubes-gpg-client --encrypt --recipient RECIPIENT`
Results in the error:
>gpg: There is no assurance this key belongs to the named user
>gpg: cannot open '/dev/tty': No such device or address
Well, I can't sign the public key, that is a documented downside of SplitGPG with Subkeys. As for the second, I tried adding `no-tty` to ~/.gnupg/gpg.conf in work-gpg
trying the above command again results in the new error:
`EOF` with no change to the file. So I try a new approach:
`export QUBES_GPG_DOMAIN=work-gpg` (I'll stop repeating this line so I don't annoy you all)
`qubes-gpg-client --output OutFile --encrypt --recipient RECIPIENT InFile`
Error:
>Only '-' argument supported for --output option
^^I have no idea what that is about.
So, remove the output file request and just attempt to write over:
`qubes-gpg-client --encrypt --recipient RECIPIENT InFile`
Error:
>gpg: There is no assurance this key belongs to the names user
>gpg: Sorry, no terminal at all requested - can't get input'
Let's remove the conf line we added earlier, and run again:
Error:
>There is no assurance this key belongs to the named user
>gpg: cannot open '/dev/tty': No such device or address'
I give up!
Does anyone have any idea what is going on here?
>
Read my last message - you dont actually type the angle brackets
This is simply a bash script, you can inspect for yourself: it's at
/usr/bin/qubes-gpg-client-wrapper
I'm not sure I understand your clarification - in any case, use the
command line I cited without the angle brackets.
Once the simple variant works, try a more complicated one...