[11:59] <TheLemonMan> hello, I had a launchpad account (not a ubuntu one one), how can I recover the password ?
[12:13] <mapreri> perhaps with the "Forgot your password?" bottom?
[12:14] <TheLemonMan> if only it didn't mutter something about OpenID failing every damn time
[12:16] <TheLemonMan> let's retry for the third time, you know, third time's a charm
[12:36] <wgrant> TheLemonMan: If you've ever had a Launchpad account, you have an Ubuntu One account. Ubuntu One now handles all authentication to Launchpad.
[12:36] <wgrant> The forgotten password button doesn't use OpenID, so it won't be giving an OpenID failure.
[12:36] <wgrant> What exactly have you tried, and what is the failure you're seeing?
[12:37] <TheLemonMan> it kept spewing an openID error, but the third time it went ok
[15:28] <elk5> Hi guys! I've been using single PGP key with my LP account for a while. Now I want to get more security and try pgpcard applet on yubikey neo to manage my keys (it behaves like a regular smartcard). Pgp card automatically generates 3 keys (master key for signing and two subkeys for auth and encryption). I plan to upload all three to the keyserver but which one I should choose in my LP account? I'd say master key (used for signing) because I need to sign
[15:28] <elk5> virtually all transactions (e.g. uploading packages). But I'm not sure because LP may send me an encrypted message which I won't be able to decrypt (gpg uses encryption subkey to decrypt automatically and I don't know how to force it to decrypt with my sign key). Any recommendations or success stories with yubikey neo? Thanks for helping.
[15:30] <cjwatson> Launchpad doesn't send any encrypted messages right now, and I'm not aware of any plans to do so.
[15:31] <cjwatson> The point of the key registered in Launchpad is to indicate that you intend to sign things with it, so I'd use the signing key.
[15:33] <elk5> cjwatson: Thanks Colin!
[15:58] <teward> elk5: FYI: pgpcard on YubiKey NEO needs a lot more changes in udev and some disabling of the built in gpg agents and reworking everything to make it recognize - this is a know bug/issue
[15:58] <teward> but as cjwatson said LP doesn't send encrypted messages, and such
[16:01] <elk5> teward: Thanks! Yeah, I already met number of issues with yubikey (any smartcard actually) vs gnome-keyring. After a few tries, it seems to me that just a single (woo-hoo) change is really needed with 14.04 (add one line to gpg-agent's upstart session). It still looks a bit hackish but seems to work (I hope).
[16:02] <teward> cjwatson: i thought the only encrypted messages that LP sends are when you try and add a pgp key to the account - in that it forces you to decrypt the message to get the verify link and such
[16:02] <elk5> teward: The only change needed is the following. You need to export SSH_AUTH_SOCK inside gpg-agent's upstart session. It overwrites gnome-keyring's one and you're done.
[16:02] <teward> elk5: document it and put it on a blog somewhere?
[16:03] <elk5> teward: Will do. Want to make sure that it really works. I tried signing/encrypting but didn't do any real-world tests. Want to start with LP because I used it often.
[16:04] <elk5> teward: Ouch, decrypting stuff may be problematic. I need to understand if pgp can use my sign key for this.
[16:29] <maxb> Unless the card is doing something weird, the encryption key should be a subkey of the signing key, and it all just works.
[16:34] <elk5> maxb: You mean that the LP will use encryption subkey automatically?
[16:36] <maxb> yes, unless the card is doing something very odd
[16:36] <maxb> I think LP has a backup verification flow for sign-only keys too
[16:40] <cjwatson> teward: It will encrypt that, yes, but only if the key has encryption capability.
[16:41] <cjwatson> (lib/lp/services/verification/model/logintoken.py:LoginToken.sendGPGValidationRequest
[16:41] <cjwatson> )
[17:00] <elk5> cjwatson: teward: maxb: Thanks for helping guys. I'll give yubikey a try with LP and let you know how it goes.