keybase-issues icon indicating copy to clipboard operation
keybase-issues copied to clipboard

Private keys are hard.. ERROR decrypt error: unable to find a PGP decryption key for this message

Open 0xdevalias opened this issue 5 years ago • 11 comments

Let's add to the 'keybase fails at my private key' class of issues, given that seems to be one of the most important aspects of it.

Other references from a quick search:

  • https://github.com/keybase/keybase-issues/issues/2259
  • https://github.com/keybase/keybase-issues/issues/1901
  • https://github.com/keybase/keybase-issues/issues/2193
⇒  keybase --version
keybase version 3.1.2-20190312142912+4c383e6a53

So I have 3 keys according to keybase pgp list:

⇒  keybase pgp list
Keybase Key ID:  010189ab82ec42643b35bb376036696daf7598585c81bbc299678432723bf42efea60a
PGP Fingerprint: 406458647390bd36e4157974482e543a4fe7484b
PGP Identities:
   keybase.io/devalias <[email protected]>
..snip..

For that key, I have a public key according to the CLI:

⇒  keybase pgp export --unencrypted --query 406458647390bd36e4157974482e543a4fe7484b
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1

..snip...

But I don't have a private key:

⇒  keybase pgp export -s --unencrypted --query 406458647390bd36e4157974482e543a4fe7484b
▶ ERROR No matching keys found

I can encrypt a message to myself, which I obviously can't decrypt locally, since I don't have a private key:

keybase pgp encrypt -m foo -k 406458647390bd36e4157974482e543a4fe7484b
-----BEGIN PGP MESSAGE-----
Comment: https://keybase.io/download
Version: Keybase Go 3.1.2 (darwin)
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=Obij
-----END PGP MESSAGE-----

Which I can't decrypt, presumably because I don't have the private key:

⇒  pbpaste | keybase pgp decrypt
▶ ERROR decrypt error: unable to find a PGP decryption key for this message

But if I go to the keybase website, I can decrypt it there: paste

But then other times I can encrypt a message:

⇒  keybase pgp encrypt -m "Computers are hard" -k 406458647390bd36e4157974482e543a4fe7484b
-----BEGIN PGP MESSAGE-----
Comment: https://keybase.io/download
Version: Keybase Go 3.1.2 (darwin)
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=QhYr
-----END PGP MESSAGE-----

And it may (non-deterministically) decrypt fine:

⇒  pbpaste | keybase pgp decrypt
Computers are hard%

Except most times it won't:

⇒  pbpaste | keybase pgp decrypt
▶ ERROR decrypt error: unable to find a PGP decryption key for this message

But I can still do it from the website: image

This seems to happen regardless of what version of gpg I tell keybase to use.. so it doesn't seem to be a gpg2 thing..

⇒  keybase config get gpg
"/usr/local/bin/gpg2"

⇒  /usr/local/bin/gpg2 --version
gpg (GnuPG) 2.2.11
libgcrypt 1.8.4
Copyright (C) 2018 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <https://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: /Users/devalias/.gnupg
Supported algorithms:
Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
        CAMELLIA128, CAMELLIA192, CAMELLIA256
Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2

⇒  pbpaste | keybase pgp decrypt
▶ ERROR decrypt error: unable to find a PGP decryption key for this message
⇒  which gpg1
/usr/local/bin/gpg1

⇒  keybase config set gpg /usr/local/bin/gpg1
⇒  keybase config get gpg
"/usr/local/bin/gpg1"

⇒  /usr/local/bin/gpg1 --version
gpg (GnuPG) 1.4.23
Copyright (C) 2015 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: ~/.gnupg
Supported algorithms:
Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
        CAMELLIA128, CAMELLIA192, CAMELLIA256
Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2

⇒  pbpaste | keybase pgp decrypt
▶ ERROR decrypt error: unable to find a PGP decryption key for this message

Some vague snippets that may be interesting from pbpaste | keybase -d pgp decrypt:

..snip..

2019-03-21T10:03:55.182595+11:00 ▶ [DEBU keybase ui.go:622] 00b Can't set GPG_TTY; discover failed

..snip..

2019-03-21T10:03:57.832599+11:00 ▶ [DEBU keybase log_ui.go:36] 0b3 - API GET https://api-0.core.keybaseapi.com/_/api/1.0/key/fetch_private.json?version=32: err=ok, status="200 OK", jsonwBytes=65 [tags:ENG=YYJlfZ19olvG,API=mzcfvNxs_6Bl]
2019-03-21T10:03:57.832936+11:00 ▶ [DEBU keybase log_ui.go:36] 0b4 - api.doRequestShared -> ok [time=1.169139007s] [tags:API=mzcfvNxs_6Bl,ENG=YYJlfZ19olvG]
2019-03-21T10:03:57.833197+11:00 ▶ [DEBU keybase log_ui.go:36] 0b5 - API call key/fetch_private success [tags:ENG=YYJlfZ19olvG,API=mzcfvNxs_6Bl]
2019-03-21T10:03:57.833454+11:00 ▶ [DEBU keybase log_ui.go:36] 0b6 | syncFromServer -> ok [tags:ENG=YYJlfZ19olvG]
2019-03-21T10:03:57.833685+11:00 ▶ [DEBU keybase log_ui.go:36] 0b7 | Returned object: {Status: {0 OK}, Version: 32, #pgpkeys: 0, #devices: 0} [tags:ENG=YYJlfZ19olvG]
2019-03-21T10:03:57.833919+11:00 ▶ [DEBU keybase log_ui.go:36] 0b8 | not changing synced keys: synced version 32 not newer than existing version 32 [tags:ENG=YYJlfZ19olvG]

..snip..

2019-03-21T10:03:58.071490+11:00 ▶ [DEBU keybase log_ui.go:36] 0d4 Account: loading keyring for devalias [tags:ENG=YYJlfZ19olvG]
2019-03-21T10:03:58.071632+11:00 ▶ [DEBU keybase log_ui.go:36] 0d5 + Loading SKB keyring: /Users/devalias/Library/Application Support/Keybase/secretkeys.devalias.mpack
2019-03-21T10:03:58.072507+11:00 ▶ [DEBU keybase log_ui.go:36] 0d6 - Loaded SKB keyring: /Users/devalias/Library/Application Support/Keybase/secretkeys.devalias.mpack -> ok
2019-03-21T10:03:58.073176+11:00 ▶ [DEBU keybase log_ui.go:36] 0d7 | Indexed 3 secret keys
2019-03-21T10:03:58.073414+11:00 ▶ [DEBU keybase log_ui.go:36] 0d8 - ActiveDevice#Keyring -> ok [tags:ENG=YYJlfZ19olvG]

..snip..

2019-03-21T10:03:58.073599+11:00 ▶ [DEBU keybase log_ui.go:36] 0d9 + ScanKeys#coalesceBlocks [tags:ENG=YYJlfZ19olvG]
2019-03-21T10:03:58.073740+11:00 ▶ [DEBU keybase log_ui.go:36] 0da | Setting UID on SKB to bce450642a38f6c0faeafb4920854400
2019-03-21T10:03:58.073899+11:00 ▶ [DEBU keybase log_ui.go:36] 0db - ScanKeys#coalesceBlocks -> ok [tags:ENG=YYJlfZ19olvG]
2019-03-21T10:03:58.074013+11:00 ▶ [DEBU keybase log_ui.go:36] 0dc - NewScanKeys -> ok [tags:ENG=YYJlfZ19olvG]
2019-03-21T10:03:58.074158+11:00 ▶ [DEBU keybase log_ui.go:36] 0dd | PGPDecrypt [tags:ENG=YYJlfZ19olvG]
2019-03-21T10:03:58.074299+11:00 ▶ [DEBU keybase log_ui.go:36] 0de Calling into openpgp ReadMessage for decryption
2019-03-21T10:03:58.074640+11:00 ▶ [DEBU keybase log_ui.go:36] 0df ScanKeys:KeysById(955e3e34dbf3ab44) => 0 keys match in memory [tags:ENG=YYJlfZ19olvG]
2019-03-21T10:03:58.074849+11:00 ▶ [DEBU keybase out_of_date.go:14] 0e0 + PrintOutOfDateWarnings
2019-03-21T10:03:58.074880+11:00 ▶ [DEBU keybase socket.go:65] 0e2 + GetSocket
2019-03-21T10:03:58.074898+11:00 ▶ [DEBU keybase rpc.go:25] 0e3 - GetSocket -> ok
2019-03-21T10:03:58.074854+11:00 ▶ [DEBU keybase log_ui.go:36] 0e1 - PGPDecrypt#Run -> decrypt error: unable to find a PGP decryption key for this message libkb.NoDecryptionKeyError [tags:ENG=YYJlfZ19olvG]
2019-03-21T10:03:58.075094+11:00 ▶ [DEBU keybase log_ui.go:36] 0e4 - RunEngine(PGPDecrypt) -> decrypt error: unable to find a PGP decryption key for this message libkb.NoDecryptionKeyError [tags:ENG=YYJlfZ19olvG]
2019-03-21T10:03:58.075098+11:00 ▶ [DEBU keybase out_of_date.go:28] 0e5 Got OutOfDateInfo: keybase1.OutOfDateInfo{UpgradeTo:"", UpgradeURI:"", CustomMessage:"", CriticalClockSkew:0}
2019-03-21T10:03:58.075174+11:00 ▶ [DEBU keybase out_of_date.go:44] 0e6 - PrintOutOfDateWarnings
2019-03-21T10:03:58.178451+11:00 ▶ [DEBU keybase globals.go:669] 0e7 GlobalContext#Shutdown(0xc420280c00)
2019-03-21T10:03:58.178584+11:00 ▶ [DEBU keybase globals.go:715] 0e8 exiting shutdown code=0; err=<nil>
2019-03-21T10:03:58.178629+11:00 ▶ [DEBU keybase identify3.go:192] 0e9 identify3State#runExpireThread: exiting on shutdown
2019-03-21T10:03:58.178632+11:00 ▶ [ERRO keybase main.go:86] 0ea decrypt error: unable to find a PGP decryption key for this message

So it seems it has the 3 secret keys, it can see that it has the 3 secret keys, yet.. it can't use the correct secret key from that list.. So I wonder.. is there a way for me to 'force' it to update those keys from the server. Or is there some way I can delete it's local 'cache' of those keys so it's forced to refetch them, etc?

For funsies I tried removing the keybase secret keyring to see if it would automagically recreate it, but it seems to just silently fail with the same error as before.. so my theory is maybe that something in that secret keyring is somehow broken/corrupted/in a bad state:

..snip..
2019-03-21T10:12:20.290324+11:00 ▶ [DEBU keybase log_ui.go:36] 0d3 Account: loading keyring for devalias [tags:ENG=p2YIB-v--0t1]
2019-03-21T10:12:20.290500+11:00 ▶ [DEBU keybase log_ui.go:36] 0d4 + Loading SKB keyring: /Users/devalias/Library/Application Support/Keybase/secretkeys.devalias.mpack
2019-03-21T10:12:20.290619+11:00 ▶ [DEBU keybase log_ui.go:36] 0d5 | Keybase secret keyring doesn't exist: /Users/devalias/Library/Application Support/Keybase/secretkeys.devalias.mpack
2019-03-21T10:12:20.290848+11:00 ▶ [DEBU keybase log_ui.go:36] 0d6 - ActiveDevice#Keyring -> ok [tags:ENG=p2YIB-v--0t1]
..snip..
2019-03-21T10:12:20.396969+11:00 ▶ [ERRO keybase main.go:86] 0e6 decrypt error: unable to find a PGP decryption key for this message

0xdevalias avatar Mar 20 '19 22:03 0xdevalias

So because non-determinism is fun.. let's brute force it! I put the above encrypted message into testmsg.txt, then used this script:

./brute-decrypt.sh

for i in {1..100}
do
   echo "Loop ${i}"
   keybase pgp decrypt -i testmsg.txt
  echo
done

With some results:

⇒  ./brute-decrypt.sh
Loop 1
▶ ERROR decrypt error: unable to find a PGP decryption key for this message

Loop 2
▶ ERROR decrypt error: unable to find a PGP decryption key for this message

Loop 3
▶ ERROR decrypt error: unable to find a PGP decryption key for this message

Loop 4
▶ ERROR decrypt error: unable to find a PGP decryption key for this message

Loop 5
▶ ERROR decrypt error: unable to find a PGP decryption key for this message

Loop 6
▶ ERROR decrypt error: unable to find a PGP decryption key for this message

Loop 7
▶ ERROR decrypt error: unable to find a PGP decryption key for this message

Loop 8
Computers are hard
Loop 9
Computers are hard
Loop 10
▶ ERROR decrypt error: unable to find a PGP decryption key for this message

Loop 11
Computers are hard
Loop 12
▶ ERROR decrypt error: unable to find a PGP decryption key for this message

..snip..

0xdevalias avatar Mar 20 '19 23:03 0xdevalias

Improving on the above concept:

./brute-decrypt.sh

for i in {1..100}
do
  echo "Loop ${i}"
  keybase -d pgp decrypt -i testmsg.txt 2> "loop/${i}.txt"
  RC=$?
  if [[ $RC -eq 0 ]]; then
    echo
    echo "Success on loop ${i}, quitting.."
    exit
  fi
done

Results:

⇒  ./brute-decrypt.sh
Loop 1
..snip..
Loop 17
Computers are hard
Success on loop 17, quitting..

So now we have debug output for a successful run as well. I can provide both a success and a fail debug.. but hesitant to put directly here in case there are any secret things in it.. so.. let me know?

Here is the last snippet where it finds the right key now:

..snip..
2019-03-21T10:31:09.084966+11:00 ▶ [DEBU keybase log_ui.go:36] 0d1 Account: loading keyring for devalias [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.085093+11:00 ▶ [DEBU keybase log_ui.go:36] 0d2 + Loading SKB keyring: /Users/devalias/Library/Application Support/Keybase/secretkeys.devalias.mpack
2019-03-21T10:31:09.085332+11:00 ▶ [DEBU keybase log_ui.go:36] 0d3 - Loaded SKB keyring: /Users/devalias/Library/Application Support/Keybase/secretkeys.devalias.mpack -> ok
2019-03-21T10:31:09.085518+11:00 ▶ [DEBU keybase log_ui.go:36] 0d4 | Indexed 3 secret keys
2019-03-21T10:31:09.085675+11:00 ▶ [DEBU keybase log_ui.go:36] 0d5 - ActiveDevice#Keyring -> ok [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.085805+11:00 ▶ [DEBU keybase log_ui.go:36] 0d6 + ScanKeys#coalesceBlocks [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.085921+11:00 ▶ [DEBU keybase log_ui.go:36] 0d7 | Setting UID on SKB to bce450642a38f6c0faeafb4920854400
2019-03-21T10:31:09.086051+11:00 ▶ [DEBU keybase log_ui.go:36] 0d8 - ScanKeys#coalesceBlocks -> ok [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.086158+11:00 ▶ [DEBU keybase log_ui.go:36] 0d9 - NewScanKeys -> ok [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.086272+11:00 ▶ [DEBU keybase log_ui.go:36] 0da | PGPDecrypt [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.086397+11:00 ▶ [DEBU keybase log_ui.go:36] 0db Calling into openpgp ReadMessage for decryption
2019-03-21T10:31:09.086531+11:00 ▶ [DEBU keybase log_ui.go:36] 0dc + SKB#PromptAndUnlock(PGP Decryption) [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.086676+11:00 ▶ [DEBU keybase log_ui.go:36] 0dd + SKB#UnlockNoPrompt [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.086809+11:00 ▶ [DEBU keybase log_ui.go:36] 0de MetaContext#ActiveDevice: global [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.086925+11:00 ▶ [DEBU keybase log_ui.go:36] 0df + SKB#UnlockSecretKey [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.087045+11:00 ▶ [DEBU keybase log_ui.go:36] 0e0 case: Triplesec [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.088102+11:00 ▶ [DEBU keybase log_ui.go:36] 0e1 - SKB#UnlockSecretKey -> ok [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.088221+11:00 ▶ [DEBU keybase log_ui.go:36] 0e2 | Unlocked key with cached 3Sec and passphrase stream [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.088337+11:00 ▶ [DEBU keybase log_ui.go:36] 0e3 - SKB#UnlockNoPrompt -> ok [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.088448+11:00 ▶ [DEBU keybase log_ui.go:36] 0e4 - SKB#PromptAndUnlock(PGP Decryption) -> ok [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.088581+11:00 ▶ [DEBU keybase log_ui.go:36] 0e5 ScanKeys:KeysById(955e3e34dbf3ab44) => 1 keys match in memory [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.088695+11:00 ▶ [DEBU keybase log_ui.go:36] 0e6 ScanKeys:KeysById(955e3e34dbf3ab44) => owner == me (devalias) [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.104075+11:00 ▶ [DEBU keybase log_ui.go:36] 0e7 PGPDecrypt: copied 18 bytes to writer
2019-03-21T10:31:09.104312+11:00 ▶ [DEBU keybase log_ui.go:36] 0e8 | Sink Close [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.104613+11:00 ▶ [DEBU keybase log_ui.go:36] 0e9 - PGPDecrypt#Run -> ok [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.104806+11:00 ▶ [DEBU keybase log_ui.go:36] 0ea - RunEngine(PGPDecrypt) -> ok [tags:ENG=zZlozHc-1HFK]
2019-03-21T10:31:09.104810+11:00 ▶ [DEBU keybase out_of_date.go:14] 0eb + PrintOutOfDateWarnings
2019-03-21T10:31:09.104889+11:00 ▶ [DEBU keybase socket.go:65] 0ec + GetSocket
2019-03-21T10:31:09.104908+11:00 ▶ [DEBU keybase rpc.go:25] 0ed - GetSocket -> ok
2019-03-21T10:31:09.105098+11:00 ▶ [DEBU keybase out_of_date.go:28] 0ee Got OutOfDateInfo: keybase1.OutOfDateInfo{UpgradeTo:"", UpgradeURI:"", CustomMessage:"", CriticalClockSkew:0}
2019-03-21T10:31:09.105146+11:00 ▶ [DEBU keybase out_of_date.go:44] 0ef - PrintOutOfDateWarnings
2019-03-21T10:31:09.207242+11:00 ▶ [DEBU keybase globals.go:669] 0f0 GlobalContext#Shutdown(0xc4200bac00)
2019-03-21T10:31:09.207406+11:00 ▶ [DEBU keybase globals.go:715] 0f1 exiting shutdown code=0; err=<nil>

0xdevalias avatar Mar 20 '19 23:03 0xdevalias

We'll take a look, thanks for the detailed report

cc @zapu

maxtaco avatar Mar 20 '19 23:03 maxtaco

I'm having this issue, or at least a similar one, today. For me, it seems to be failing 100% of the time, rather that intermittently. I ran the loop script (which requires bash, FWIW... it won't run with just sh) and it failed all 100 times.

echosa avatar Mar 26 '19 13:03 echosa

As requested, have sent logs with keybase log send my log id: d6c1dbf7e1075b8fcb42d01c

0xdevalias avatar Apr 01 '19 20:04 0xdevalias

@0xdevalias apologies for radio silence. This has left us baffled for some time but right now we finally have a repro. Fix is coming, thank you for your patience.

zapu avatar May 01 '19 19:05 zapu

Any idea when this might land in a stable release channel?

0xdevalias avatar May 29 '19 05:05 0xdevalias

Any news here?

RootMePLS avatar Feb 26 '21 10:02 RootMePLS

anything?

adamdiy avatar Oct 29 '21 09:10 adamdiy

This did work for me for the moment: https://github.com/keybase/client/pull/17307#issuecomment-558860752

thilinapiy avatar Feb 07 '22 18:02 thilinapiy

This did work for me for the moment: keybase/client#17307 (comment)

keybase pgp select --import --multi doesn't work for me. It prompts me to enter the passphrase to export the OpenPGP secretkey: .... which I don't know which one. I entered passphrases that I have, but no luck.

Help please! Thank you

laurentiuspurba avatar Feb 01 '24 21:02 laurentiuspurba