I am trying to install the latest Tor Browser Bundle on Arch Linux:
$ makepkg --syncdeps --install
[...]
==> Verifying source file signatures with gpg...
tor-browser-linux64-4.0.8_en-US.tar.xz ... FAILED (unknown public key 2E1AC68ED40814E0)
==> ERROR: One or more PGP signatures could not be verified!
I am not able to import the GPG key:
$ gpg --keyserver keys.gnupg.net --recv-keys 2E1AC68ED40814E0
gpg: keyserver receive failed: No keyserver available
$ gpg --keyserver pgp.mit.edu --recv-keys 2E1AC68ED40814E0
gpg: keyserver receive failed: No keyserver available
The command fails immediately every time. This has happened before with other keys, and I'm wondering if GPG gets itself into a bind sometimes. I am perfectly able to use the Internet otherwise, and I have a bare bones GPG configuration:
$ grep -ve '^#' -e '^$' ~/.gnupg/gpg.conf
require-cross-certification
keyserver hkp://pgp.mit.edu
What can I do to actually download and import the key using gpg
? sudo pacman-key --recv-key 2E1AC68ED40814E0
runs fine, but it appears that keyring isn't used by makepkg
.
https
? I don't think you want to import keys which were downloaded on a plaintext connection. – l0b0 Aug 26 '15 at 22:00