keybase / keybase-issues

A single repo for managing publicly recognized issues with the keybase client, installer, and website.
900 stars 37 forks source link

Can't login - ERROR GPG error: exit status 2 #2209

Closed mythmon closed 7 years ago

mythmon commented 8 years ago

When I run keybase login, after entering a public name for this device, I get an error "ERROR GPG error: exit status 2", and the login fails. I'm running Arch Linux.

$ keybase version
Client:  1.0.15
Service: 1.0.15

Here is the output of running keybase -d login:

2016-04-14T11:15:04.846255 ▶ [DEBU keybase json.go:50] 001 + loading config file: /home/mythmon/.config/keybase/config.json
2016-04-14T11:15:04.846327 ▶ [DEBU keybase json.go:78] 002 - successfully loaded config file
2016-04-14T11:15:04.846522 ▶ [DEBU keybase globals.go:238] 003 Created LinkCache, max size: 65536, clean dur: 1m0s
2016-04-14T11:15:04.847060 ▶ [DEBU keybase ui.go:512] 004 Setting GPG_TTY to /dev/pts/1
2016-04-14T11:15:04.847093 ▶ [DEBU keybase globals.go:219] 005 Keybase CLI 1.0.15
2016-04-14T11:15:04.847103 ▶ [DEBU keybase globals.go:219] 006 - Built with go1.6
2016-04-14T11:15:04.847112 ▶ [DEBU keybase globals.go:219] 007 - Visit https://keybase.io for more details
2016-04-14T11:15:04.847123 ▶ [DEBU keybase main.go:133] 008 + configureProcesses
2016-04-14T11:15:04.847178 ▶ [DEBU keybase fork_server.go:47] 009 Getting flock
2016-04-14T11:15:04.847210 ▶ [DEBU keybase fork_server.go:64] 00a The server is still up
2016-04-14T11:15:04.847220 ▶ [DEBU keybase versionfix.go:58] 00b + FixVersionClash
2016-04-14T11:15:04.847229 ▶ [DEBU keybase socket_nix.go:23] 00c Dialing unix:/run/user/1000/keybase/keybased.sock
2016-04-14T11:15:04.847817 ▶ [DEBU keybase versionfix.go:84] 00d | Contacted service; got version: 1.0.15
2016-04-14T11:15:04.847853 ▶ [DEBU keybase versionfix.go:106] 00e | version check 1.0.15 v 1.0.15
2016-04-14T11:15:04.847871 ▶ [DEBU keybase versionfix.go:108] 00f | versions check out
2016-04-14T11:15:04.847883 ▶ [DEBU keybase versionfix.go:64] 010 - FixVersionClash -> <nil>
2016-04-14T11:15:04.847897 ▶ [DEBU keybase main.go:209] 011 | After forks; newProc=false
2016-04-14T11:15:04.847907 ▶ [DEBU keybase main.go:229] 012 + configureLogging
2016-04-14T11:15:04.847924 ▶ [DEBU keybase socket_nix.go:23] 013 Dialing unix:/run/user/1000/keybase/keybased.sock
2016-04-14T11:15:04.848535 ▶ [DEBU keybase log.go:30] 014 Registering logger: CLI client @ level 1
2016-04-14T11:15:04.848562 ▶ [DEBU keybase main.go:231] 015 - configureLogging
2016-04-14T11:15:04.848702 ▶ [DEBU keybase log.go:30] 016 Registered logger: CLI client: level 1, handle id 16
2016-04-14T11:15:04.848782 ▶ [DEBU keybase main.go:135] 017 - configureProcesses -> <nil>
2016-04-14T11:15:04.848945 ▶ [DEBU keybase log.go:30] 018 - LogHandler::RegisterLogger -> ok
2016-04-14T11:15:04.849122 ▶ [DEBU keybase log.go:30] 019 SetPath: service path = /home/mythmon/bin:/home/mythmon/.cabal/bin:/home/mythmon/node_modules/.bin:/home/mythmon/.gem/ruby/2.0.0/bin:/home/mythmon/bin:/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/lib/jvm/default/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl
2016-04-14T11:15:04.849279 ▶ [DEBU keybase log.go:30] 01a SetPath: client path =  /home/mythmon/bin:/home/mythmon/.cabal/bin:/home/mythmon/node_modules/.bin:/home/mythmon/.gem/ruby/2.0.0/bin:/home/mythmon/bin:/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/lib/jvm/default/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl
2016-04-14T11:15:04.849428 ▶ [DEBU keybase log.go:30] 01b + RunEngine(Login)
2016-04-14T11:15:04.849547 ▶ [DEBU keybase log.go:30] 01c | getUI(libkb.SecretUIKind) returned nil
2016-04-14T11:15:04.849701 ▶ [DEBU keybase log.go:30] 01d + UIRouter.GetSecretUI
2016-04-14T11:15:04.849843 ▶ [DEBU keybase log.go:30] 01e + RunEngine(loginProvisionedDevice)
2016-04-14T11:15:04.849985 ▶ [DEBU keybase log.go:30] 01f | getUI(libkb.SecretUIKind) returned nil
2016-04-14T11:15:04.850132 ▶ [DEBU keybase log.go:30] 020 + UIRouter.GetSecretUI
2016-04-14T11:15:04.850276 ▶ [DEBU keybase log.go:30] 021 + Account "LoggedInProvisionedLoad"
2016-04-14T11:15:04.850415 ▶ [DEBU keybase log.go:30] 022 + Loading session
2016-04-14T11:15:04.850552 ▶ [DEBU keybase log.go:30] 023 + loading session file: /home/mythmon/.cache/keybase/session.json
2016-04-14T11:15:04.850699 ▶ [DEBU keybase log.go:30] 024 No session file found; tried /home/mythmon/.cache/keybase/session.json
2016-04-14T11:15:04.850833 ▶ [DEBU keybase log.go:30] 025 - Loaded session
2016-04-14T11:15:04.850967 ▶ [DEBU keybase log.go:30] 026 - Account "LoggedInProvisionedLoad"
2016-04-14T11:15:04.851101 ▶ [DEBU keybase log.go:30] 027 | using current username
2016-04-14T11:15:04.851241 ▶ [DEBU keybase log.go:30] 028 LoadUser: {Contextified:{g:<nil>} UID: Name: PublicKeyOptional:true NoCacheResult:false Self:true ForceReload:true AllKeys:false LoginContext:<nil> AbortIfSigchainUnchanged:false ResolveBody:<nil>}
2016-04-14T11:15:04.851382 ▶ [DEBU keybase log.go:30] 029 + Account "G - GetMyUID - GetUID"
2016-04-14T11:15:04.851530 ▶ [DEBU keybase log.go:30] 02a - Account "G - GetMyUID - GetUID"
2016-04-14T11:15:04.851687 ▶ [DEBU keybase log.go:30] 02b + LoadUser(uid=a51c6428ed197315fc0344e24da64d00, name=)
2016-04-14T11:15:04.851839 ▶ [DEBU keybase log.go:30] 02c | resolved to a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:04.851979 ▶ [DEBU keybase log.go:30] 02d + loadUserFromLocalStorage(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:04.852147 ▶ [DEBU keybase log.go:30] 02e | Loaded successfully
2016-04-14T11:15:04.852292 ▶ [DEBU keybase log.go:30] 02f + ParseKeyFamily
2016-04-14T11:15:04.853275 ▶ [DEBU keybase log.go:30] 030 adding PGP kid 010168f6265d925f3a98b67b534902ae35451a03c3b9390f3bd4a9a6906fa5cd87d80a with full hash b34d4e48714177d82f024737fc33e8a699f21f298e57326265f91978fa85ef07
2016-04-14T11:15:04.854369 ▶ [DEBU keybase log.go:30] 031 adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash e6aab2f63c8a0fbc9c8eba45763fecae528dad8729547222bbd31a921827a957
2016-04-14T11:15:04.855983 ▶ [DEBU keybase log.go:30] 032 adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 0836daf3e9cc8005a7af15a244d5b81eb2f12bf6e7540c1b4074d86be6b72ba6
2016-04-14T11:15:04.858055 ▶ [DEBU keybase log.go:30] 033 adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 002f8054ea50d6f9754377fb0c618b984d8da5e0bca487fed722859065ac7472
2016-04-14T11:15:04.860110 ▶ [DEBU keybase log.go:30] 034 adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 002f8054ea50d6f9754377fb0c618b984d8da5e0bca487fed722859065ac7472
2016-04-14T11:15:04.861998 ▶ [DEBU keybase log.go:30] 035 adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 1c0f21d8261c2ef2fd67b336b5fdf2df1167b9c0bba2901cd71a539d2d9b5bd3
2016-04-14T11:15:04.862138 ▶ [DEBU keybase log.go:30] 036 - ParseKeyFamily -> ok
2016-04-14T11:15:04.862258 ▶ [DEBU keybase log.go:30] 037 | Loaded username mythmon (uid=a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:04.862378 ▶ [DEBU keybase log.go:30] 038 - loadUserFromLocalStorage(mythmon,a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:04.862518 ▶ [DEBU keybase log.go:30] 039 + MerkleClient.LookupUser(map[uid:a51c6428ed197315fc0344e24da64d00 poll:10])
2016-04-14T11:15:04.862638 ▶ [DEBU keybase log.go:30] 03a + MerkleClient.LoadRoot()
2016-04-14T11:15:04.862791 ▶ [DEBU keybase log.go:30] 03b - MerkleClient.LoadRoot() -> &{{0xc820196340} 442582 [3 225 70 205 175 129 54 104 10 213 102 145 42 50 52 12 236 140 148 146] 0xc8202913b0 {"body":{"kbfs":{"private":{"root":"iKNlcGvEIKfO37STZn0fbiCrdXZRKUyvU73yFCYZl74tglbypSFYoWjEQHcdisrsyj2fdBLWGS/+ORsHddSmxfT3yk0Fey9RIiydFpm71gxJoNVgsLiphhMKl6CS1YoRB7mYuJA6QAcktS2jbm9uxBhCrx1wmOZg67oIKtkzUH+ipzEAFJjWcJOicHLEQHRaqQ59y3ZnQP6ayzjEpVdXPCnaK0+aM9iIIU6WzXrmmGUZkQ9UweU+k/f8C5o2NvUEjYdwgt80RLz4p55t5tqic27NBK2hdAKidHPOVw/bdaF2AQ==","version":1},"public":{"root":"hqFoxEAIG+Xp52lJJM+Ye2asoxzavgAO1XWxNFNUVVbt0UJnVgk9x8DPcYv6JjmcN0D1+awKmomdWaAcQklH3JQe7Ba/onByxEDtpAUF/zq1Lm+KHtPwQ6bHt0/dvqTzvTm7plmktOumTvZZBuPb3R9SzK+tWPzC8yCS4V95aBuBQjsR7J95HH7ConNuzQStoXQBonRzzlcP22ChdgE=","version":1}},"key":{"fingerprint":"03e146cdaf8136680ad566912a32340cec8c9492","key_id":"2A32340CEC8C9492"},"legacy_uid_root":"d3450288d233fe9125d0b6f8196dbc93447bca2630300898781a637a44752032","prev":"2c6e540dfabb22807d27f97f2dd2e876aa91b723f5afe332f46d57707fd995624497bf0fd2b4020d09558c405d25a062bf00291b9bb8cb0c7e7583859dbaf4bc","root":"a95ee9c6afcded5ac2ed3ec9cb23176d0239fb2353324e2a1cb9a1753298a3b37a26b62e325e6d61e7219a40bb2bc42b52bba156da0ffc6b13b17930e89abcdc","seqno":442582,"txid":"01655fdabe06d339953f60a738cdeb15","type":"merkle_root","version":1},"ctime":1460657605,"tag":"signature"} 0xc8202915f0 [169 94 233 198 175 205 237 90 194 237 62 201 203 35 23 109 2 57 251 35 83 50 78 42 28 185 161 117 50 152 163 179 122 38 182 46 50 94 109 97 231 33 154 64 187 43 196 43 82 187 161 86 218 15 252 107 19 177 121 48 232 154 188 220] [211 69 2 136 210 51 254 145 37 208 182 248 25 109 188 147 68 123 202 38 48 48 8 152 120 26 99 122 68 117 32 50] 1460657605}
2016-04-14T11:15:04.862924 ▶ [DEBU keybase log.go:30] 03c | LookupPath
2016-04-14T11:15:04.863030 ▶ [DEBU keybase log.go:30] 03d + API GET request to https://keybase.io/_/api/1.0/merkle/path.json?poll=10&uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:05.018699 ▶ [DEBU keybase log.go:30] 03e | Result is: 200 OK
2016-04-14T11:15:05.097762 ▶ [DEBU keybase log.go:30] 03f - successful API call
2016-04-14T11:15:05.097979 ▶ [DEBU keybase log.go:30] 040 | VerifyRoot
2016-04-14T11:15:05.098133 ▶ [DEBU keybase log.go:30] 041 | Merkle root: got back 442582, >= cached 442582
2016-04-14T11:15:05.098269 ▶ [DEBU keybase log.go:30] 042 | VerifyUser
2016-04-14T11:15:05.100255 ▶ [DEBU keybase log.go:30] 043 + ParsingMerkleUserLeaf
2016-04-14T11:15:05.100408 ▶ [DEBU keybase log.go:30] 044 - ParsingMerkleUserLeaf -> ok
2016-04-14T11:15:05.100530 ▶ [DEBU keybase log.go:30] 045 | VerifyUsername
2016-04-14T11:15:05.100666 ▶ [DEBU keybase log.go:30] 046 | Failed to map Username mythmon -> UID a51c6428ed197315fc0344e24da64d00 via direct hash
2016-04-14T11:15:05.101295 ▶ [DEBU keybase log.go:30] 047 | Username mythmon mapped to a51c6428ed197315fc0344e24da64d00 via Merkle lookup
2016-04-14T11:15:05.101422 ▶ [DEBU keybase log.go:30] 048 - MerkleClient.LookupUser(map[uid:a51c6428ed197315fc0344e24da64d00 poll:10]) -> OK
2016-04-14T11:15:05.101545 ▶ [DEBU keybase log.go:30] 049 | Local basics version is up-to-date @ version 518
2016-04-14T11:15:05.101659 ▶ [DEBU keybase log.go:30] 04a | Freshness: basics=true; for a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:05.101778 ▶ [DEBU keybase log.go:30] 04b + Load User from server: a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:05.101883 ▶ [DEBU keybase log.go:30] 04c + API GET request to https://keybase.io/_/api/1.0/user/lookup.json?uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:05.235913 ▶ [DEBU keybase log.go:30] 04d | Result is: 200 OK
2016-04-14T11:15:05.237353 ▶ [DEBU keybase log.go:30] 04e - successful API call
2016-04-14T11:15:05.237487 ▶ [DEBU keybase log.go:30] 04f + ParseKeyFamily
2016-04-14T11:15:05.239237 ▶ [DEBU keybase log.go:30] 050 adding PGP kid 010168f6265d925f3a98b67b534902ae35451a03c3b9390f3bd4a9a6906fa5cd87d80a with full hash b34d4e48714177d82f024737fc33e8a699f21f298e57326265f91978fa85ef07
2016-04-14T11:15:05.240356 ▶ [DEBU keybase log.go:30] 051 adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash e6aab2f63c8a0fbc9c8eba45763fecae528dad8729547222bbd31a921827a957
2016-04-14T11:15:05.241953 ▶ [DEBU keybase log.go:30] 052 adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 0836daf3e9cc8005a7af15a244d5b81eb2f12bf6e7540c1b4074d86be6b72ba6
2016-04-14T11:15:05.243973 ▶ [DEBU keybase log.go:30] 053 adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 002f8054ea50d6f9754377fb0c618b984d8da5e0bca487fed722859065ac7472
2016-04-14T11:15:05.245928 ▶ [DEBU keybase log.go:30] 054 adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 002f8054ea50d6f9754377fb0c618b984d8da5e0bca487fed722859065ac7472
2016-04-14T11:15:05.247881 ▶ [DEBU keybase log.go:30] 055 adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 1c0f21d8261c2ef2fd67b336b5fdf2df1167b9c0bba2901cd71a539d2d9b5bd3
2016-04-14T11:15:05.248159 ▶ [DEBU keybase log.go:30] 056 - ParseKeyFamily -> ok
2016-04-14T11:15:05.248269 ▶ [DEBU keybase log.go:30] 057 - Load user from server: a51c6428ed197315fc0344e24da64d00 -> ok
2016-04-14T11:15:05.248439 ▶ [DEBU keybase log.go:30] 058 + SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:05.248581 ▶ [DEBU keybase log.go:30] 059 | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) GetFingerprint
2016-04-14T11:15:05.248728 ▶ [DEBU keybase log.go:30] 05a | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) AccessPreload
2016-04-14T11:15:05.248868 ▶ [DEBU keybase log.go:30] 05b | Preload failed
2016-04-14T11:15:05.248983 ▶ [DEBU keybase log.go:30] 05c | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) LoadLinksFromStorage
2016-04-14T11:15:05.249112 ▶ [DEBU keybase log.go:30] 05d + SigChainLoader.LoadFromStorage(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:05.249266 ▶ [DEBU keybase log.go:30] 05e | Setting loadKID=0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a
2016-04-14T11:15:05.249394 ▶ [DEBU keybase log.go:30] 05f | Loaded 33 links
2016-04-14T11:15:05.249516 ▶ [DEBU keybase log.go:30] 060 - SigChainLoader.LoadFromStorage(a51c6428ed197315fc0344e24da64d00) -> ok
2016-04-14T11:15:05.249634 ▶ [DEBU keybase log.go:30] 061 | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) MakeSigChain
2016-04-14T11:15:05.249748 ▶ [DEBU keybase log.go:30] 062 | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) VerifyChain
2016-04-14T11:15:05.249855 ▶ [DEBU keybase log.go:30] 063 + SigChain::VerifyChain()
2016-04-14T11:15:05.249962 ▶ [DEBU keybase log.go:30] 064 - SigChain::VerifyChain() -> ok
2016-04-14T11:15:05.250085 ▶ [DEBU keybase log.go:30] 065 | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) CheckFreshness
2016-04-14T11:15:05.250212 ▶ [DEBU keybase log.go:30] 066 + CheckFreshness
2016-04-14T11:15:05.250348 ▶ [DEBU keybase log.go:30] 067 | Server triple: &{33 8b4ffa29b469d8e9b08168b8d9ecdd33ab14339bc90b5759ef086122d98d4fbd 65f0c01b93fb5d75893179a4b823adc2550b4da927c693d3a466bab11a06028f0f}
2016-04-14T11:15:05.250496 ▶ [DEBU keybase log.go:30] 068 | Client triple: &{33 8b4ffa29b469d8e9b08168b8d9ecdd33ab14339bc90b5759ef086122d98d4fbd 65f0c01b93fb5d75893179a4b823adc2550b4da927c693d3a466bab11a06028f0f}
2016-04-14T11:15:05.250661 ▶ [DEBU keybase log.go:30] 069 | Future triple=nil
2016-04-14T11:15:05.250786 ▶ [DEBU keybase log.go:30] 06a | Local chain version is up-to-date @ version 33
2016-04-14T11:15:05.250912 ▶ [DEBU keybase log.go:30] 06b - CheckFreshness (a51c6428ed197315fc0344e24da64d00) -> (false,ok)
2016-04-14T11:15:05.251051 ▶ [DEBU keybase log.go:30] 06c | Sigchain was fully cached. Short-circuiting verification.
2016-04-14T11:15:05.251162 ▶ [DEBU keybase log.go:30] 06d - SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) -> (true, ok)
2016-04-14T11:15:05.251282 ▶ [DEBU keybase log.go:30] 06e * SigChainLoader.Load: mythmon: 399.058µs
2016-04-14T11:15:05.251425 ▶ [DEBU keybase log.go:30] 06f * LoadSigChains: mythmon: 409.989µs
2016-04-14T11:15:05.251591 ▶ [DEBU keybase log.go:30] 070 + LoadSigHints(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:05.251702 ▶ [DEBU keybase log.go:30] 071 | SigHints loaded @v9
2016-04-14T11:15:05.251893 ▶ [DEBU keybase log.go:30] 072 - LoadSigHints(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:05.252102 ▶ [DEBU keybase log.go:30] 073 + Refresh SigHints() for uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:05.252267 ▶ [DEBU keybase log.go:30] 074 + API GET request to https://keybase.io/_/api/1.0/sig/hints.json?low=9&uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:05.326083 ▶ [DEBU keybase log.go:30] 075 | Result is: 200 OK
2016-04-14T11:15:05.326299 ▶ [DEBU keybase log.go:30] 076 - successful API call
2016-04-14T11:15:05.326448 ▶ [DEBU keybase log.go:30] 077 | No changes; version 9 was up-to-date
2016-04-14T11:15:05.326581 ▶ [DEBU keybase log.go:30] 078 - Refresh SigHints() for uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:05.326836 ▶ [DEBU keybase log.go:30] 079 + Store user mythmon
2016-04-14T11:15:05.326977 ▶ [DEBU keybase log.go:30] 07a + SigHints.Store() for uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:05.327101 ▶ [DEBU keybase log.go:30] 07b | SigHints.Store() skipped; wasn't dirty
2016-04-14T11:15:05.327239 ▶ [DEBU keybase log.go:30] 07c - SigHints.Store() for uid=a51c6428ed197315fc0344e24da64d00 -> ok
2016-04-14T11:15:05.327367 ▶ [DEBU keybase log.go:30] 07d + StoreTopLevel
2016-04-14T11:15:05.327504 ▶ [DEBU keybase log.go:30] 07e - StoreTopLevel -> ok
2016-04-14T11:15:05.327708 ▶ [DEBU keybase log.go:30] 07f - Store user mythmon -> OK
Your keybase username or email address: 2016-04-14T11:15:05.327939 ▶ [DEBU keybase log.go:30] 080 + HasActiveKey
2016-04-14T11:15:05.328081 ▶ [DEBU keybase log.go:30] 081 | Checking user's ComputedKeyFamily
2016-04-14T11:15:05.328208 ▶ [DEBU keybase log.go:30] 082 - HasActiveKey -> true
2016-04-14T11:15:05.328336 ▶ [DEBU keybase log.go:30] 083 + IdentityTable::populate
2016-04-14T11:15:05.328481 ▶ [DEBU keybase log.go:30] 084 - IdentityTable::populate -> ok
2016-04-14T11:15:05.328613 ▶ [DEBU keybase log.go:30] 085 + VerifySelfSig for user mythmon
2016-04-14T11:15:05.328763 ▶ [DEBU keybase log.go:30] 086 | Found self-signature for mythmon @uid=a51c6428ed197315fc0344e24da64d00, seq=33, link=8b4ffa29b469d8e9b08168b8d9ecdd33ab14339bc90b5759ef086122d98d4fbd
2016-04-14T11:15:05.328897 ▶ [DEBU keybase log.go:30] 087 - VerifySelfSig via SigChain
2016-04-14T11:15:05.329024 ▶ [DEBU keybase log.go:30] 088 * LoadUser: {Contextified:{g:<nil>} UID: Name: PublicKeyOptional:true NoCacheResult:false Self:true ForceReload:true AllKeys:false LoginContext:<nil> AbortIfSigchainUnchanged:false ResolveBody:<nil>}: 478.090799ms
2016-04-14T11:15:05.329193 ▶ [DEBU keybase log.go:30] 089 + getSibkeyKidForDevice(5a9fcfe4ffd54c0dfdcf1410e405dd18)
2016-04-14T11:15:05.329355 ▶ [DEBU keybase log.go:30] 08a | Devices map: map[]
2016-04-14T11:15:05.329495 ▶ [DEBU keybase log.go:30] 08b device 5a9fcfe4ffd54c0dfdcf1410e405dd18 not found in cki.Devices
2016-04-14T11:15:05.329685 ▶ [DEBU keybase log.go:30] 08c current device is not valid
2016-04-14T11:15:05.329817 ▶ [DEBU keybase log.go:30] 08d - RunEngine(loginProvisionedDevice) -> ERROR: No device provisioned locally for this user
2016-04-14T11:15:05.329976 ▶ [DEBU keybase log.go:30] 08e loginProvisionedDevice error: No device provisioned locally for this user (continuing with device provisioning...)
2016-04-14T11:15:05.330116 ▶ [DEBU keybase log.go:30] 08f attempting device provisioning
2016-04-14T11:15:05.330259 ▶ [DEBU keybase log.go:30] 090 + Login "logout"
2016-04-14T11:15:05.330385 ▶ [DEBU keybase log.go:30] 091 + Loading session
2016-04-14T11:15:05.330543 ▶ [DEBU keybase log.go:30] 092 - Skipped; already loaded
2016-04-14T11:15:05.330681 ▶ [DEBU keybase log.go:30] 093 clearing cached secret keys
2016-04-14T11:15:05.330844 ▶ [DEBU keybase log.go:30] 094 - Login "logout"
2016-04-14T11:15:05.330996 ▶ [DEBU keybase log.go:30] 095 + Account "LoginState - Shutdown"
2016-04-14T11:15:05.331121 ▶ [DEBU keybase log.go:30] 096 - Account "LoginState - Shutdown"
2016-04-14T11:15:05.331241 ▶ [DEBU keybase log.go:30] 097 + RunEngine(loginLoadUser)
2016-04-14T11:15:05.331386 ▶ [DEBU keybase log.go:30] 098 | getUI(libkb.SecretUIKind) returned nil
2016-04-14T11:15:05.331538 ▶ [DEBU keybase log.go:30] 099 + UIRouter.GetSecretUI
2016-04-14T11:15:05.331699 ▶ [DEBU keybase log.go:30] 09a LoginState: Running request loop
mythmon
2016-04-14T11:15:09.831002 ▶ [DEBU keybase log.go:30] 09b loginLoadUser: found username "mythmon"
2016-04-14T11:15:09.831231 ▶ [DEBU keybase log.go:30] 09c LoadUser: {Contextified:{g:0xc820196340} UID: Name:mythmon PublicKeyOptional:true NoCacheResult:false Self:false ForceReload:false AllKeys:false LoginContext:<nil> AbortIfSigchainUnchanged:false ResolveBody:<nil>}
2016-04-14T11:15:09.831441 ▶ [DEBU keybase log.go:30] 09d + LoadUser(uid=, name=mythmon)
2016-04-14T11:15:09.831623 ▶ [DEBU keybase log.go:30] 09e + Resolving username mythmon
2016-04-14T11:15:09.831830 ▶ [DEBU keybase log.go:30] 09f + Account "G - GetMyUID - GetUID"
2016-04-14T11:15:09.831977 ▶ [DEBU keybase log.go:30] 0a0 - Account "G - GetMyUID - GetUID"
2016-04-14T11:15:09.832138 ▶ [DEBU keybase log.go:30] 0a1 | resolved to a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:09.832337 ▶ [DEBU keybase log.go:30] 0a2 + loadUserFromLocalStorage(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:09.832509 ▶ [DEBU keybase log.go:30] 0a3 | Loaded successfully
2016-04-14T11:15:09.832656 ▶ [DEBU keybase log.go:30] 0a4 + ParseKeyFamily
2016-04-14T11:15:09.834233 ▶ [DEBU keybase log.go:30] 0a5 adding PGP kid 010168f6265d925f3a98b67b534902ae35451a03c3b9390f3bd4a9a6906fa5cd87d80a with full hash b34d4e48714177d82f024737fc33e8a699f21f298e57326265f91978fa85ef07
2016-04-14T11:15:09.835325 ▶ [DEBU keybase log.go:30] 0a6 adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash e6aab2f63c8a0fbc9c8eba45763fecae528dad8729547222bbd31a921827a957
2016-04-14T11:15:09.836927 ▶ [DEBU keybase log.go:30] 0a7 adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 0836daf3e9cc8005a7af15a244d5b81eb2f12bf6e7540c1b4074d86be6b72ba6
2016-04-14T11:15:09.838928 ▶ [DEBU keybase log.go:30] 0a8 adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 002f8054ea50d6f9754377fb0c618b984d8da5e0bca487fed722859065ac7472
2016-04-14T11:15:09.840925 ▶ [DEBU keybase log.go:30] 0a9 adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 002f8054ea50d6f9754377fb0c618b984d8da5e0bca487fed722859065ac7472
2016-04-14T11:15:09.842806 ▶ [DEBU keybase log.go:30] 0aa adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 1c0f21d8261c2ef2fd67b336b5fdf2df1167b9c0bba2901cd71a539d2d9b5bd3
2016-04-14T11:15:09.842943 ▶ [DEBU keybase log.go:30] 0ab - ParseKeyFamily -> ok
2016-04-14T11:15:09.843083 ▶ [DEBU keybase log.go:30] 0ac | Loaded username mythmon (uid=a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:09.843193 ▶ [DEBU keybase log.go:30] 0ad - loadUserFromLocalStorage(mythmon,a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:09.843307 ▶ [DEBU keybase log.go:30] 0ae + MerkleClient.LookupUser(map[uid:a51c6428ed197315fc0344e24da64d00 poll:10])
2016-04-14T11:15:09.843404 ▶ [DEBU keybase log.go:30] 0af + MerkleClient.LoadRoot()
2016-04-14T11:15:09.843553 ▶ [DEBU keybase log.go:30] 0b0 - MerkleClient.LoadRoot() -> &{{0xc820196340} 442582 [3 225 70 205 175 129 54 104 10 213 102 145 42 50 52 12 236 140 148 146] 0xc820164ea0 {"body":{"kbfs":{"private":{"root":"iKNlcGvEIKfO37STZn0fbiCrdXZRKUyvU73yFCYZl74tglbypSFYoWjEQHcdisrsyj2fdBLWGS/+ORsHddSmxfT3yk0Fey9RIiydFpm71gxJoNVgsLiphhMKl6CS1YoRB7mYuJA6QAcktS2jbm9uxBhCrx1wmOZg67oIKtkzUH+ipzEAFJjWcJOicHLEQHRaqQ59y3ZnQP6ayzjEpVdXPCnaK0+aM9iIIU6WzXrmmGUZkQ9UweU+k/f8C5o2NvUEjYdwgt80RLz4p55t5tqic27NBK2hdAKidHPOVw/bdaF2AQ==","version":1},"public":{"root":"hqFoxEAIG+Xp52lJJM+Ye2asoxzavgAO1XWxNFNUVVbt0UJnVgk9x8DPcYv6JjmcN0D1+awKmomdWaAcQklH3JQe7Ba/onByxEDtpAUF/zq1Lm+KHtPwQ6bHt0/dvqTzvTm7plmktOumTvZZBuPb3R9SzK+tWPzC8yCS4V95aBuBQjsR7J95HH7ConNuzQStoXQBonRzzlcP22ChdgE=","version":1}},"key":{"fingerprint":"03e146cdaf8136680ad566912a32340cec8c9492","key_id":"2A32340CEC8C9492"},"legacy_uid_root":"d3450288d233fe9125d0b6f8196dbc93447bca2630300898781a637a44752032","prev":"2c6e540dfabb22807d27f97f2dd2e876aa91b723f5afe332f46d57707fd995624497bf0fd2b4020d09558c405d25a062bf00291b9bb8cb0c7e7583859dbaf4bc","root":"a95ee9c6afcded5ac2ed3ec9cb23176d0239fb2353324e2a1cb9a1753298a3b37a26b62e325e6d61e7219a40bb2bc42b52bba156da0ffc6b13b17930e89abcdc","seqno":442582,"txid":"01655fdabe06d339953f60a738cdeb15","type":"merkle_root","version":1},"ctime":1460657605,"tag":"signature"} 0xc8201650b0 [169 94 233 198 175 205 237 90 194 237 62 201 203 35 23 109 2 57 251 35 83 50 78 42 28 185 161 117 50 152 163 179 122 38 182 46 50 94 109 97 231 33 154 64 187 43 196 43 82 187 161 86 218 15 252 107 19 177 121 48 232 154 188 220] [211 69 2 136 210 51 254 145 37 208 182 248 25 109 188 147 68 123 202 38 48 48 8 152 120 26 99 122 68 117 32 50] 1460657605}
2016-04-14T11:15:09.843696 ▶ [DEBU keybase log.go:30] 0b1 | LookupPath
2016-04-14T11:15:09.843804 ▶ [DEBU keybase log.go:30] 0b2 + API GET request to https://keybase.io/_/api/1.0/merkle/path.json?poll=10&uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:10.002833 ▶ [DEBU keybase log.go:30] 0b3 | Result is: 200 OK
2016-04-14T11:15:10.091705 ▶ [DEBU keybase log.go:30] 0b4 - successful API call
2016-04-14T11:15:10.092307 ▶ [DEBU keybase log.go:30] 0b5 | VerifyRoot
2016-04-14T11:15:10.092835 ▶ [DEBU keybase log.go:30] 0b6 | Merkle root: got back 442582, >= cached 442582
2016-04-14T11:15:10.093256 ▶ [DEBU keybase log.go:30] 0b7 | VerifyUser
2016-04-14T11:15:10.098538 ▶ [DEBU keybase log.go:30] 0b8 + ParsingMerkleUserLeaf
2016-04-14T11:15:10.098904 ▶ [DEBU keybase log.go:30] 0b9 - ParsingMerkleUserLeaf -> ok
2016-04-14T11:15:10.099327 ▶ [DEBU keybase log.go:30] 0ba | VerifyUsername
2016-04-14T11:15:10.099733 ▶ [DEBU keybase log.go:30] 0bb | Failed to map Username mythmon -> UID a51c6428ed197315fc0344e24da64d00 via direct hash
2016-04-14T11:15:10.101230 ▶ [DEBU keybase log.go:30] 0bc | Username mythmon mapped to a51c6428ed197315fc0344e24da64d00 via Merkle lookup
2016-04-14T11:15:10.101585 ▶ [DEBU keybase log.go:30] 0bd - MerkleClient.LookupUser(map[uid:a51c6428ed197315fc0344e24da64d00 poll:10]) -> OK
2016-04-14T11:15:10.101964 ▶ [DEBU keybase log.go:30] 0be | Local basics version is up-to-date @ version 518
2016-04-14T11:15:10.102416 ▶ [DEBU keybase log.go:30] 0bf | Freshness: basics=true; for a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:10.102782 ▶ [DEBU keybase log.go:30] 0c0 + SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:10.103127 ▶ [DEBU keybase log.go:30] 0c1 | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) GetFingerprint
2016-04-14T11:15:10.103475 ▶ [DEBU keybase log.go:30] 0c2 | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) AccessPreload
2016-04-14T11:15:10.103793 ▶ [DEBU keybase log.go:30] 0c3 | Preload failed
2016-04-14T11:15:10.104101 ▶ [DEBU keybase log.go:30] 0c4 | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) LoadLinksFromStorage
2016-04-14T11:15:10.104364 ▶ [DEBU keybase log.go:30] 0c5 + SigChainLoader.LoadFromStorage(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:10.104640 ▶ [DEBU keybase log.go:30] 0c6 | Setting loadKID=0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a
2016-04-14T11:15:10.104917 ▶ [DEBU keybase log.go:30] 0c7 | Loaded 33 links
2016-04-14T11:15:10.105182 ▶ [DEBU keybase log.go:30] 0c8 - SigChainLoader.LoadFromStorage(a51c6428ed197315fc0344e24da64d00) -> ok
2016-04-14T11:15:10.105441 ▶ [DEBU keybase log.go:30] 0c9 | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) MakeSigChain
2016-04-14T11:15:10.105687 ▶ [DEBU keybase log.go:30] 0ca | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) VerifyChain
2016-04-14T11:15:10.105971 ▶ [DEBU keybase log.go:30] 0cb + SigChain::VerifyChain()
2016-04-14T11:15:10.106224 ▶ [DEBU keybase log.go:30] 0cc - SigChain::VerifyChain() -> ok
2016-04-14T11:15:10.106471 ▶ [DEBU keybase log.go:30] 0cd | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) CheckFreshness
2016-04-14T11:15:10.106733 ▶ [DEBU keybase log.go:30] 0ce + CheckFreshness
2016-04-14T11:15:10.107004 ▶ [DEBU keybase log.go:30] 0cf | Server triple: &{33 8b4ffa29b469d8e9b08168b8d9ecdd33ab14339bc90b5759ef086122d98d4fbd 65f0c01b93fb5d75893179a4b823adc2550b4da927c693d3a466bab11a06028f0f}
2016-04-14T11:15:10.107260 ▶ [DEBU keybase log.go:30] 0d0 | Client triple: &{33 8b4ffa29b469d8e9b08168b8d9ecdd33ab14339bc90b5759ef086122d98d4fbd 65f0c01b93fb5d75893179a4b823adc2550b4da927c693d3a466bab11a06028f0f}
2016-04-14T11:15:10.107511 ▶ [DEBU keybase log.go:30] 0d1 | Future triple=nil
2016-04-14T11:15:10.107748 ▶ [DEBU keybase log.go:30] 0d2 | Local chain version is up-to-date @ version 33
2016-04-14T11:15:10.107984 ▶ [DEBU keybase log.go:30] 0d3 - CheckFreshness (a51c6428ed197315fc0344e24da64d00) -> (false,ok)
2016-04-14T11:15:10.108244 ▶ [DEBU keybase log.go:30] 0d4 | Sigchain was fully cached. Short-circuiting verification.
2016-04-14T11:15:10.108498 ▶ [DEBU keybase log.go:30] 0d5 - SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) -> (true, ok)
2016-04-14T11:15:10.108767 ▶ [DEBU keybase log.go:30] 0d6 * SigChainLoader.Load: mythmon: 1.122884ms
2016-04-14T11:15:10.109070 ▶ [DEBU keybase log.go:30] 0d7 * LoadSigChains: mythmon: 1.169315ms
2016-04-14T11:15:10.109357 ▶ [DEBU keybase log.go:30] 0d8 + LoadSigHints(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:10.109620 ▶ [DEBU keybase log.go:30] 0d9 | SigHints loaded @v9
2016-04-14T11:15:10.109904 ▶ [DEBU keybase log.go:30] 0da - LoadSigHints(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:10.110181 ▶ [DEBU keybase log.go:30] 0db + Refresh SigHints() for uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:10.110527 ▶ [DEBU keybase log.go:30] 0dc + API GET request to https://keybase.io/_/api/1.0/sig/hints.json?low=9&uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:10.181948 ▶ [DEBU keybase log.go:30] 0dd | Result is: 200 OK
2016-04-14T11:15:10.182377 ▶ [DEBU keybase log.go:30] 0de - successful API call
2016-04-14T11:15:10.182685 ▶ [DEBU keybase log.go:30] 0df | No changes; version 9 was up-to-date
2016-04-14T11:15:10.182914 ▶ [DEBU keybase log.go:30] 0e0 - Refresh SigHints() for uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:10.183127 ▶ [DEBU keybase log.go:30] 0e1 + Store user mythmon
2016-04-14T11:15:10.183356 ▶ [DEBU keybase log.go:30] 0e2 + SigHints.Store() for uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:10.183595 ▶ [DEBU keybase log.go:30] 0e3 | SigHints.Store() skipped; wasn't dirty
2016-04-14T11:15:10.183885 ▶ [DEBU keybase log.go:30] 0e4 - SigHints.Store() for uid=a51c6428ed197315fc0344e24da64d00 -> ok
2016-04-14T11:15:10.184124 ▶ [DEBU keybase log.go:30] 0e5 - Store for mythmon skipped; user wasn't dirty
2016-04-14T11:15:10.184491 ▶ [DEBU keybase log.go:30] 0e6 + HasActiveKey
2016-04-14T11:15:10.184697 ▶ [DEBU keybase log.go:30] 0e7 | Checking user's ComputedKeyFamily
2016-04-14T11:15:10.184907 ▶ [DEBU keybase log.go:30] 0e8 - HasActiveKey -> true
2016-04-14T11:15:10.185091 ▶ [DEBU keybase log.go:30] 0e9 + IdentityTable::populate
2016-04-14T11:15:10.185282 ▶ [DEBU keybase log.go:30] 0ea - IdentityTable::populate -> ok
2016-04-14T11:15:10.185472 ▶ [DEBU keybase log.go:30] 0eb + VerifySelfSig for user mythmon
2016-04-14T11:15:10.185675 ▶ [DEBU keybase log.go:30] 0ec | Found self-signature for mythmon @uid=a51c6428ed197315fc0344e24da64d00, seq=33, link=8b4ffa29b469d8e9b08168b8d9ecdd33ab14339bc90b5759ef086122d98d4fbd
2016-04-14T11:15:10.185905 ▶ [DEBU keybase log.go:30] 0ed - VerifySelfSig via SigChain
2016-04-14T11:15:10.186149 ▶ [DEBU keybase log.go:30] 0ee * LoadUser: {Contextified:{g:0xc820196340} UID: Name:mythmon PublicKeyOptional:true NoCacheResult:false Self:false ForceReload:false AllKeys:false LoginContext:<nil> AbortIfSigchainUnchanged:false ResolveBody:<nil>}: 351.644342ms
2016-04-14T11:15:10.186343 ▶ [DEBU keybase log.go:30] 0ef loginLoadUser: found user a51c6428ed197315fc0344e24da64d00 for username "mythmon"
2016-04-14T11:15:10.186523 ▶ [DEBU keybase log.go:30] 0f0 - RunEngine(loginLoadUser) -> ok
2016-04-14T11:15:10.186708 ▶ [DEBU keybase log.go:30] 0f1 + getSibkeyKidForDevice(5a9fcfe4ffd54c0dfdcf1410e405dd18)
2016-04-14T11:15:10.186888 ▶ [DEBU keybase log.go:30] 0f2 | Devices map: map[]
2016-04-14T11:15:10.187069 ▶ [DEBU keybase log.go:30] 0f3 device 5a9fcfe4ffd54c0dfdcf1410e405dd18 not found in cki.Devices
2016-04-14T11:15:10.187246 ▶ [DEBU keybase log.go:30] 0f4 + RunEngine(loginProvision)
2016-04-14T11:15:10.187423 ▶ [DEBU keybase log.go:30] 0f5 | getUI(libkb.SecretUIKind) returned nil
2016-04-14T11:15:10.187595 ▶ [DEBU keybase log.go:30] 0f6 + UIRouter.GetSecretUI
2016-04-14T11:15:10.187779 ▶ [DEBU keybase log.go:30] 0f7 + LoginWithPrompt(mythmon) called
2016-04-14T11:15:10.187966 ▶ [DEBU keybase log.go:30] 0f8 + Login "loginWithPromptHelper"
2016-04-14T11:15:10.188137 ▶ [DEBU keybase log.go:30] 0f9 + checkedLoggedIn()
2016-04-14T11:15:10.188315 ▶ [DEBU keybase log.go:30] 0fa + Loading session
2016-04-14T11:15:10.188502 ▶ [DEBU keybase log.go:30] 0fb + loading session file: /home/mythmon/.cache/keybase/session.json
2016-04-14T11:15:10.188688 ▶ [DEBU keybase log.go:30] 0fc No session file found; tried /home/mythmon/.cache/keybase/session.json
2016-04-14T11:15:10.188861 ▶ [DEBU keybase log.go:30] 0fd - Loaded session
2016-04-14T11:15:10.189071 ▶ [DEBU keybase log.go:30] 0fe - checkedLoggedIn() -> false, ok
2016-04-14T11:15:10.189258 ▶ [DEBU keybase log.go:30] 0ff | Already configured as user=mythmon
2016-04-14T11:15:10.189435 ▶ [DEBU keybase log.go:30] 100 | Successfully switched user to mythmon
2016-04-14T11:15:10.189620 ▶ [DEBU keybase log.go:30] 101 + pubkeyLoginHelper()
2016-04-14T11:15:10.189824 ▶ [DEBU keybase log.go:30] 102 LoadUser: {Contextified:{g:0xc820196340} UID: Name:mythmon PublicKeyOptional:false NoCacheResult:false Self:false ForceReload:false AllKeys:false LoginContext:0xc82001a480 AbortIfSigchainUnchanged:false ResolveBody:<nil>}
2016-04-14T11:15:10.189997 ▶ [DEBU keybase log.go:30] 103 + LoadUser(uid=, name=mythmon)
2016-04-14T11:15:10.190178 ▶ [DEBU keybase log.go:30] 104 + Resolving username mythmon
2016-04-14T11:15:10.190345 ▶ [DEBU keybase log.go:30] 105 | resolved to a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:10.190510 ▶ [DEBU keybase log.go:30] 106 + loadUserFromLocalStorage(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:10.190675 ▶ [DEBU keybase log.go:30] 107 | Loaded successfully
2016-04-14T11:15:10.190829 ▶ [DEBU keybase log.go:30] 108 + ParseKeyFamily
2016-04-14T11:15:10.191006 ▶ [DEBU keybase log.go:30] 109 adding PGP kid 010168f6265d925f3a98b67b534902ae35451a03c3b9390f3bd4a9a6906fa5cd87d80a with full hash b34d4e48714177d82f024737fc33e8a699f21f298e57326265f91978fa85ef07
2016-04-14T11:15:10.191179 ▶ [DEBU keybase log.go:30] 10a adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash e6aab2f63c8a0fbc9c8eba45763fecae528dad8729547222bbd31a921827a957
2016-04-14T11:15:10.192168 ▶ [DEBU keybase log.go:30] 10b adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 0836daf3e9cc8005a7af15a244d5b81eb2f12bf6e7540c1b4074d86be6b72ba6
2016-04-14T11:15:10.194283 ▶ [DEBU keybase log.go:30] 10c adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 002f8054ea50d6f9754377fb0c618b984d8da5e0bca487fed722859065ac7472
2016-04-14T11:15:10.196277 ▶ [DEBU keybase log.go:30] 10d adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 002f8054ea50d6f9754377fb0c618b984d8da5e0bca487fed722859065ac7472
2016-04-14T11:15:10.198163 ▶ [DEBU keybase log.go:30] 10e adding PGP kid 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a with full hash 1c0f21d8261c2ef2fd67b336b5fdf2df1167b9c0bba2901cd71a539d2d9b5bd3
2016-04-14T11:15:10.198303 ▶ [DEBU keybase log.go:30] 10f - ParseKeyFamily -> ok
2016-04-14T11:15:10.198482 ▶ [DEBU keybase log.go:30] 110 | Loaded username mythmon (uid=a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:10.198612 ▶ [DEBU keybase log.go:30] 111 - loadUserFromLocalStorage(mythmon,a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:10.198758 ▶ [DEBU keybase log.go:30] 112 + MerkleClient.LookupUser(map[uid:a51c6428ed197315fc0344e24da64d00 poll:10])
2016-04-14T11:15:10.199509 ▶ [DEBU keybase log.go:30] 113 + MerkleClient.LoadRoot()
2016-04-14T11:15:10.199665 ▶ [DEBU keybase log.go:30] 114 - MerkleClient.LoadRoot() -> &{{0xc820196340} 442582 [3 225 70 205 175 129 54 104 10 213 102 145 42 50 52 12 236 140 148 146] 0xc820165260 {"body":{"kbfs":{"private":{"root":"iKNlcGvEIKfO37STZn0fbiCrdXZRKUyvU73yFCYZl74tglbypSFYoWjEQHcdisrsyj2fdBLWGS/+ORsHddSmxfT3yk0Fey9RIiydFpm71gxJoNVgsLiphhMKl6CS1YoRB7mYuJA6QAcktS2jbm9uxBhCrx1wmOZg67oIKtkzUH+ipzEAFJjWcJOicHLEQHRaqQ59y3ZnQP6ayzjEpVdXPCnaK0+aM9iIIU6WzXrmmGUZkQ9UweU+k/f8C5o2NvUEjYdwgt80RLz4p55t5tqic27NBK2hdAKidHPOVw/bdaF2AQ==","version":1},"public":{"root":"hqFoxEAIG+Xp52lJJM+Ye2asoxzavgAO1XWxNFNUVVbt0UJnVgk9x8DPcYv6JjmcN0D1+awKmomdWaAcQklH3JQe7Ba/onByxEDtpAUF/zq1Lm+KHtPwQ6bHt0/dvqTzvTm7plmktOumTvZZBuPb3R9SzK+tWPzC8yCS4V95aBuBQjsR7J95HH7ConNuzQStoXQBonRzzlcP22ChdgE=","version":1}},"key":{"fingerprint":"03e146cdaf8136680ad566912a32340cec8c9492","key_id":"2A32340CEC8C9492"},"legacy_uid_root":"d3450288d233fe9125d0b6f8196dbc93447bca2630300898781a637a44752032","prev":"2c6e540dfabb22807d27f97f2dd2e876aa91b723f5afe332f46d57707fd995624497bf0fd2b4020d09558c405d25a062bf00291b9bb8cb0c7e7583859dbaf4bc","root":"a95ee9c6afcded5ac2ed3ec9cb23176d0239fb2353324e2a1cb9a1753298a3b37a26b62e325e6d61e7219a40bb2bc42b52bba156da0ffc6b13b17930e89abcdc","seqno":442582,"txid":"01655fdabe06d339953f60a738cdeb15","type":"merkle_root","version":1},"ctime":1460657605,"tag":"signature"} 0xc820165590 [169 94 233 198 175 205 237 90 194 237 62 201 203 35 23 109 2 57 251 35 83 50 78 42 28 185 161 117 50 152 163 179 122 38 182 46 50 94 109 97 231 33 154 64 187 43 196 43 82 187 161 86 218 15 252 107 19 177 121 48 232 154 188 220] [211 69 2 136 210 51 254 145 37 208 182 248 25 109 188 147 68 123 202 38 48 48 8 152 120 26 99 122 68 117 32 50] 1460657605}
2016-04-14T11:15:10.199798 ▶ [DEBU keybase log.go:30] 115 | LookupPath
2016-04-14T11:15:10.199918 ▶ [DEBU keybase log.go:30] 116 + API GET request to https://keybase.io/_/api/1.0/merkle/path.json?poll=10&uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:10.282980 ▶ [DEBU keybase log.go:30] 117 | Result is: 200 OK
2016-04-14T11:15:10.296902 ▶ [DEBU keybase log.go:30] 118 - successful API call
2016-04-14T11:15:10.297057 ▶ [DEBU keybase log.go:30] 119 | VerifyRoot
2016-04-14T11:15:10.297204 ▶ [DEBU keybase log.go:30] 11a | Merkle root: got back 442582, >= cached 442582
2016-04-14T11:15:10.297348 ▶ [DEBU keybase log.go:30] 11b | VerifyUser
2016-04-14T11:15:10.299404 ▶ [DEBU keybase log.go:30] 11c + ParsingMerkleUserLeaf
2016-04-14T11:15:10.299564 ▶ [DEBU keybase log.go:30] 11d - ParsingMerkleUserLeaf -> ok
2016-04-14T11:15:10.299685 ▶ [DEBU keybase log.go:30] 11e | VerifyUsername
2016-04-14T11:15:10.299825 ▶ [DEBU keybase log.go:30] 11f | Failed to map Username mythmon -> UID a51c6428ed197315fc0344e24da64d00 via direct hash
2016-04-14T11:15:10.300524 ▶ [DEBU keybase log.go:30] 120 | Username mythmon mapped to a51c6428ed197315fc0344e24da64d00 via Merkle lookup
2016-04-14T11:15:10.300756 ▶ [DEBU keybase log.go:30] 121 - MerkleClient.LookupUser(map[uid:a51c6428ed197315fc0344e24da64d00 poll:10]) -> OK
2016-04-14T11:15:10.300926 ▶ [DEBU keybase log.go:30] 122 | Local basics version is up-to-date @ version 518
2016-04-14T11:15:10.301059 ▶ [DEBU keybase log.go:30] 123 | Freshness: basics=true; for a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:10.301204 ▶ [DEBU keybase log.go:30] 124 + SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:10.301354 ▶ [DEBU keybase log.go:30] 125 | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) GetFingerprint
2016-04-14T11:15:10.301489 ▶ [DEBU keybase log.go:30] 126 | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) AccessPreload
2016-04-14T11:15:10.301630 ▶ [DEBU keybase log.go:30] 127 | Preload failed
2016-04-14T11:15:10.301754 ▶ [DEBU keybase log.go:30] 128 | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) LoadLinksFromStorage
2016-04-14T11:15:10.301879 ▶ [DEBU keybase log.go:30] 129 + SigChainLoader.LoadFromStorage(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:10.301995 ▶ [DEBU keybase log.go:30] 12a | Setting loadKID=0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a
2016-04-14T11:15:10.302128 ▶ [DEBU keybase log.go:30] 12b | Loaded 33 links
2016-04-14T11:15:10.302244 ▶ [DEBU keybase log.go:30] 12c - SigChainLoader.LoadFromStorage(a51c6428ed197315fc0344e24da64d00) -> ok
2016-04-14T11:15:10.302379 ▶ [DEBU keybase log.go:30] 12d | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) MakeSigChain
2016-04-14T11:15:10.302519 ▶ [DEBU keybase log.go:30] 12e | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) VerifyChain
2016-04-14T11:15:10.302637 ▶ [DEBU keybase log.go:30] 12f + SigChain::VerifyChain()
2016-04-14T11:15:10.302762 ▶ [DEBU keybase log.go:30] 130 - SigChain::VerifyChain() -> ok
2016-04-14T11:15:10.302882 ▶ [DEBU keybase log.go:30] 131 | SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) CheckFreshness
2016-04-14T11:15:10.303001 ▶ [DEBU keybase log.go:30] 132 + CheckFreshness
2016-04-14T11:15:10.303150 ▶ [DEBU keybase log.go:30] 133 | Server triple: &{33 8b4ffa29b469d8e9b08168b8d9ecdd33ab14339bc90b5759ef086122d98d4fbd 65f0c01b93fb5d75893179a4b823adc2550b4da927c693d3a466bab11a06028f0f}
2016-04-14T11:15:10.303290 ▶ [DEBU keybase log.go:30] 134 | Client triple: &{33 8b4ffa29b469d8e9b08168b8d9ecdd33ab14339bc90b5759ef086122d98d4fbd 65f0c01b93fb5d75893179a4b823adc2550b4da927c693d3a466bab11a06028f0f}
2016-04-14T11:15:10.303418 ▶ [DEBU keybase log.go:30] 135 | Future triple=nil
2016-04-14T11:15:10.303544 ▶ [DEBU keybase log.go:30] 136 | Local chain version is up-to-date @ version 33
2016-04-14T11:15:10.303679 ▶ [DEBU keybase log.go:30] 137 - CheckFreshness (a51c6428ed197315fc0344e24da64d00) -> (false,ok)
2016-04-14T11:15:10.303814 ▶ [DEBU keybase log.go:30] 138 | Sigchain was fully cached. Short-circuiting verification.
2016-04-14T11:15:10.303942 ▶ [DEBU keybase log.go:30] 139 - SigChainLoader.Load(a51c6428ed197315fc0344e24da64d00) -> (true, ok)
2016-04-14T11:15:10.304079 ▶ [DEBU keybase log.go:30] 13a * SigChainLoader.Load: mythmon: 410.353µs
2016-04-14T11:15:10.304235 ▶ [DEBU keybase log.go:30] 13b * LoadSigChains: mythmon: 421.408µs
2016-04-14T11:15:10.304369 ▶ [DEBU keybase log.go:30] 13c + LoadSigHints(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:10.304507 ▶ [DEBU keybase log.go:30] 13d | SigHints loaded @v9
2016-04-14T11:15:10.304640 ▶ [DEBU keybase log.go:30] 13e - LoadSigHints(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:10.304778 ▶ [DEBU keybase log.go:30] 13f + Refresh SigHints() for uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:10.304915 ▶ [DEBU keybase log.go:30] 140 + API GET request to https://keybase.io/_/api/1.0/sig/hints.json?low=9&uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:10.377381 ▶ [DEBU keybase log.go:30] 141 | Result is: 200 OK
2016-04-14T11:15:10.377682 ▶ [DEBU keybase log.go:30] 142 - successful API call
2016-04-14T11:15:10.377909 ▶ [DEBU keybase log.go:30] 143 | No changes; version 9 was up-to-date
2016-04-14T11:15:10.378103 ▶ [DEBU keybase log.go:30] 144 - Refresh SigHints() for uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:10.378294 ▶ [DEBU keybase log.go:30] 145 + Store user mythmon
2016-04-14T11:15:10.378484 ▶ [DEBU keybase log.go:30] 146 + SigHints.Store() for uid=a51c6428ed197315fc0344e24da64d00
2016-04-14T11:15:10.378615 ▶ [DEBU keybase log.go:30] 147 | SigHints.Store() skipped; wasn't dirty
2016-04-14T11:15:10.378776 ▶ [DEBU keybase log.go:30] 148 - SigHints.Store() for uid=a51c6428ed197315fc0344e24da64d00 -> ok
2016-04-14T11:15:10.378927 ▶ [DEBU keybase log.go:30] 149 - Store for mythmon skipped; user wasn't dirty
2016-04-14T11:15:10.379067 ▶ [DEBU keybase log.go:30] 14a + HasActiveKey
2016-04-14T11:15:10.379209 ▶ [DEBU keybase log.go:30] 14b | Checking user's ComputedKeyFamily
2016-04-14T11:15:10.379361 ▶ [DEBU keybase log.go:30] 14c - HasActiveKey -> true
2016-04-14T11:15:10.379511 ▶ [DEBU keybase log.go:30] 14d + IdentityTable::populate
2016-04-14T11:15:10.379667 ▶ [DEBU keybase log.go:30] 14e - IdentityTable::populate -> ok
2016-04-14T11:15:10.379819 ▶ [DEBU keybase log.go:30] 14f + VerifySelfSig for user mythmon
2016-04-14T11:15:10.379962 ▶ [DEBU keybase log.go:30] 150 | Found self-signature for mythmon @uid=a51c6428ed197315fc0344e24da64d00, seq=33, link=8b4ffa29b469d8e9b08168b8d9ecdd33ab14339bc90b5759ef086122d98d4fbd
2016-04-14T11:15:10.380116 ▶ [DEBU keybase log.go:30] 151 - VerifySelfSig via SigChain
2016-04-14T11:15:10.381945 ▶ [DEBU keybase log.go:30] 152 * LoadUser: {Contextified:{g:0xc820196340} UID: Name:mythmon PublicKeyOptional:false NoCacheResult:false Self:false ForceReload:false AllKeys:false LoginContext:0xc82001a480 AbortIfSigchainUnchanged:false ResolveBody:<nil>}: 194.967005ms
2016-04-14T11:15:10.382154 ▶ [DEBU keybase log.go:30] 153 + Syncer.Load(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:10.382328 ▶ [DEBU keybase log.go:30] 154 | loadFromStorage -> found=true, err=ok
2016-04-14T11:15:10.382501 ▶ [DEBU keybase log.go:30] 155 | Loaded version 0
2016-04-14T11:15:10.382653 ▶ [DEBU keybase log.go:30] 156 | Won't sync with server since we're not logged in
2016-04-14T11:15:10.382796 ▶ [DEBU keybase log.go:30] 157 - Syncer.Load(a51c6428ed197315fc0344e24da64d00) -> ok
2016-04-14T11:15:10.382943 ▶ [DEBU keybase log.go:30] 158 | No synced devices, pubkey login impossible.
2016-04-14T11:15:10.383070 ▶ [DEBU keybase log.go:30] 159 - pubkeyLoginHelper() -> ERROR: No device found no synced devices during pubkey login
2016-04-14T11:15:10.383215 ▶ [DEBU keybase log.go:30] 15a | Public key login failed, falling back: No device found no synced devices during pubkey login
2016-04-14T11:15:10.383342 ▶ [DEBU keybase log.go:30] 15b + LoginState.passphraseLogin (username=mythmon)
2016-04-14T11:15:10.383472 ▶ [DEBU keybase log.go:30] 15c + API GET request to https://keybase.io/_/api/1.0/getsalt.json?email_or_username=mythmon
2016-04-14T11:15:10.456578 ▶ [DEBU keybase secret_entry.go:32] 15d + SecretEntry.Init()
2016-04-14T11:15:10.456649 ▶ [DEBU keybase pinentry_nix.go:62] 15e + FindPinentry()
2016-04-14T11:15:10.456667 ▶ [DEBU keybase pinentry_nix.go:71] 15f | Check fullpath /usr/local/MacGPG2/libexec/pinentry-mac.app/Contents/MacOS/pinentry-mac
2016-04-14T11:15:10.456674 ▶ [DEBU keybase log.go:30] 160 | Result is: 200 OK
2016-04-14T11:15:10.456707 ▶ [DEBU keybase pinentry_nix.go:87] 161 | Looking for pinentry-gtk-2 in standard PATH /home/mythmon/bin:/home/mythmon/.cabal/bin:/home/mythmon/node_modules/.bin:/home/mythmon/.gem/ruby/2.0.0/bin:/home/mythmon/bin:/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/lib/jvm/default/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl
2016-04-14T11:15:10.456861 ▶ [DEBU keybase pinentry_nix.go:90] 162 - Found /usr/bin/pinentry-gtk-2
2016-04-14T11:15:10.456881 ▶ [DEBU keybase secret_entry.go:49] 163 | Pinentry initialized
2016-04-14T11:15:10.456906 ▶ [DEBU keybase secret_entry.go:61] 164 - SecretEntry.Init() -> ok
2016-04-14T11:15:10.456929 ▶ [DEBU keybase pinentry.go:79] 165 + Pinentry::Get()
2016-04-14T11:15:10.456951 ▶ [DEBU keybase pinentry.go:132] 167 + pinentryInstance::Init()
2016-04-14T11:15:10.456947 ▶ [DEBU keybase log.go:30] 166 - successful API call
2016-04-14T11:15:10.457576 ▶ [DEBU keybase log.go:30] 168 + stretchPassphraseIfNecessary (mythmon)
2016-04-14T11:15:10.457781 ▶ [DEBU keybase log.go:30] 169 | stretchPassphraseIfNecessary: getting keybase passphrase via ui
2016-04-14T11:15:10.457969 ▶ [DEBU keybase log.go:30] 16a SecretUI:GetPassphrase, sessionID = 0
2016-04-14T11:15:10.469516 ▶ [DEBU keybase pinentry.go:158] 16b setting ttyname to /dev/pts/1
2016-04-14T11:15:10.469592 ▶ [DEBU keybase pinentry.go:165] 16c setting ttytype to rxvt-unicode-256color
2016-04-14T11:15:10.469616 ▶ [DEBU keybase pinentry.go:172] 16d - pinentryInstance::Init() -> <nil>
2016-04-14T11:15:11.503570 ▶ [DEBU keybase pinentry.go:96] 16e - Pinentry::Get() -> <nil>
2016-04-14T11:15:11.640242 ▶ [DEBU keybase log.go:30] 16f - stretchPassphraseIfNecessary -> ok
2016-04-14T11:15:11.640483 ▶ [DEBU keybase log.go:30] 170 + API Post request to https://keybase.io/_/api/1.0/login.json
2016-04-14T11:15:11.906597 ▶ [DEBU keybase log.go:30] 171 | Result is: 200 OK
2016-04-14T11:15:11.908399 ▶ [DEBU keybase log.go:30] 172 - successful API call
2016-04-14T11:15:11.908641 ▶ [DEBU keybase log.go:30] 173 | SetUserConfig(mythmon)
2016-04-14T11:15:11.908871 ▶ [DEBU keybase log.go:30] 174 + saving config file /home/mythmon/.config/keybase/config.json.MTYVZVZQUEUZVFTHQLG4MPFI
2016-04-14T11:15:11.909101 ▶ [DEBU keybase log.go:30] 175 - saved config file /home/mythmon/.config/keybase/config.json.MTYVZVZQUEUZVFTHQLG4MPFI
2016-04-14T11:15:11.909445 ▶ [DEBU keybase log.go:30] 176 + saving session file /home/mythmon/.cache/keybase/session.json.NUSBJLIIIZ7FEKYLUT3PIYMZ
2016-04-14T11:15:11.909673 ▶ [DEBU keybase log.go:30] 177 - saved session file /home/mythmon/.cache/keybase/session.json.NUSBJLIIIZ7FEKYLUT3PIYMZ
2016-04-14T11:15:11.909909 ▶ [DEBU keybase log.go:30] 178 + Commit config rewrite /home/mythmon/.cache/keybase/session.json.NUSBJLIIIZ7FEKYLUT3PIYMZ
2016-04-14T11:15:11.910171 ▶ [DEBU keybase log.go:30] 179 | Commit: making parent directories for "/home/mythmon/.cache/keybase/session.json"
2016-04-14T11:15:11.910434 ▶ [DEBU keybase log.go:30] 17a | Commit : renaming "/home/mythmon/.cache/keybase/session.json.NUSBJLIIIZ7FEKYLUT3PIYMZ" => "/home/mythmon/.cache/keybase/session.json"
2016-04-14T11:15:11.910665 ▶ [DEBU keybase log.go:30] 17b - Commit config rewrite ok
2016-04-14T11:15:11.910911 ▶ [DEBU keybase log.go:30] 17c passphraseLogin success
2016-04-14T11:15:11.911139 ▶ [DEBU keybase log.go:30] 17d - LoginState.passphraseLogin -> ok
2016-04-14T11:15:11.911360 ▶ [DEBU keybase log.go:30] 17e + User.GetSyncedSecretKeyLogin()
2016-04-14T11:15:11.911614 ▶ [DEBU keybase log.go:30] 17f + Syncer.Load(a51c6428ed197315fc0344e24da64d00)
2016-04-14T11:15:11.911839 ▶ [DEBU keybase log.go:30] 180 | loadFromStorage -> found=true, err=ok
2016-04-14T11:15:11.912088 ▶ [DEBU keybase log.go:30] 181 | Loaded version 0
2016-04-14T11:15:11.912329 ▶ [DEBU keybase log.go:30] 182 | adding version 0 to fetch_private call
2016-04-14T11:15:11.912582 ▶ [DEBU keybase log.go:30] 183 + API GET request to https://keybase.io/_/api/1.0/key/fetch_private.json?version=0
2016-04-14T11:15:12.040974 ▶ [DEBU keybase log.go:30] 184 | Result is: 200 OK
2016-04-14T11:15:12.041203 ▶ [DEBU keybase log.go:30] 185 - successful API call
2016-04-14T11:15:12.041414 ▶ [DEBU keybase log.go:30] 186 | syncFromServer -> ok
2016-04-14T11:15:12.042550 ▶ [DEBU keybase log.go:30] 187 | not changing synced keys: synced version 0 not newer than existing version 0
2016-04-14T11:15:12.042712 ▶ [DEBU keybase log.go:30] 188 - Syncer.Load(a51c6428ed197315fc0344e24da64d00) -> ok
2016-04-14T11:15:12.042837 ▶ [DEBU keybase log.go:30] 189 - User.GetSyncedSecretKeyLogin() -> ok
2016-04-14T11:15:12.042956 ▶ [DEBU keybase log.go:30] 18a - Login "loginWithPromptHelper"
2016-04-14T11:15:12.043107 ▶ [DEBU keybase log.go:30] 18b - LoginWithPrompt -> ERROR: No synced secret PGP key found on keybase.io
2016-04-14T11:15:12.043237 ▶ [DEBU keybase log.go:30] 18c no synced pgp key found, trying GPG
2016-04-14T11:15:12.043363 ▶ [DEBU keybase log.go:30] 18d | configured GPG w/ path: /usr/bin/gpg2
2016-04-14T11:15:12.043495 ▶ [DEBU keybase log.go:30] 18e | running Gpg: /usr/bin/gpg2 [--no-tty --with-colons --fingerprint -K]
2016-04-14T11:15:12.212304 ▶ [DEBU keybase log.go:30] 18f matching gpg key: &{GpgBaseKey:{Type:sec Trust:u Bits:4096 Algo:1 ID64:CD8D37A46031DC1C Created:1392787401 Expires:1517437930 fingerprint:0xc820484620} subkeys:[0xc820a18180 0xc820a18360] identities:[0xc8204a0180 0xc8204a0480 0xc820d6a210 0xc820d6a000 0xc820d6a0f0] top:0xc820a18360}
In order to authorize this installation, keybase needs to sign this installation
with your GPG secret key CD8D37A46031DC1C.

You have two options.

(1) Keybase can use GPG commands to sign the installation.

(2) Keybase can export your secret key from GPG and save it to keybase's local encrypted
    keyring. This way, it can be used in 'keybase pgp sign' and 'keybase pgp decrypt' 
    going forward.
Which do you prefer?: 1
2016-04-14T11:15:13.775010 ▶ [DEBU keybase log.go:30] 190 using gpg key &{{sec u 4096 1 CD8D37A46031DC1C 1392787401 1517437930 0xc820484620} [0xc820a18180 0xc820a18360] [0xc8204a0180 0xc8204a0480 0xc820d6a210 0xc820d6a000 0xc820d6a0f0] 0xc820a18360} for provisioning
2016-04-14T11:15:13.775541 ▶ [DEBU keybase log.go:30] 191 + LoginWithPrompt(mythmon) called
2016-04-14T11:15:13.776057 ▶ [DEBU keybase log.go:30] 192 + Login "loginWithPromptHelper"
2016-04-14T11:15:13.776490 ▶ [DEBU keybase log.go:30] 193 + checkedLoggedIn()
2016-04-14T11:15:13.776880 ▶ [DEBU keybase log.go:30] 194 + Loading session
2016-04-14T11:15:13.777296 ▶ [DEBU keybase log.go:30] 195 - Skipped; already loaded
2016-04-14T11:15:13.777696 ▶ [DEBU keybase log.go:30] 196 + Checking session
2016-04-14T11:15:13.778128 ▶ [DEBU keybase log.go:30] 197 + API GET request to https://keybase.io/_/api/1.0/sesscheck.json
2016-04-14T11:15:13.908461 ▶ [DEBU keybase log.go:30] 198 | Result is: 200 OK
2016-04-14T11:15:13.908905 ▶ [DEBU keybase log.go:30] 199 - successful API call
2016-04-14T11:15:13.909483 ▶ [DEBU keybase log.go:30] 19a | Stored session checked out
Enter a public name for this device: 2016-04-14T11:15:13.910023 ▶ [DEBU keybase log.go:30] 19b + saving session file /home/mythmon/.cache/keybase/session.json.KFBKGDMXO4G4X7JG2ZKJ5LVP
2016-04-14T11:15:13.910504 ▶ [DEBU keybase log.go:30] 19c - saved session file /home/mythmon/.cache/keybase/session.json.KFBKGDMXO4G4X7JG2ZKJ5LVP
2016-04-14T11:15:13.910978 ▶ [DEBU keybase log.go:30] 19d + Commit config rewrite /home/mythmon/.cache/keybase/session.json.KFBKGDMXO4G4X7JG2ZKJ5LVP
2016-04-14T11:15:13.911440 ▶ [DEBU keybase log.go:30] 19e | Commit: making parent directories for "/home/mythmon/.cache/keybase/session.json"
2016-04-14T11:15:13.911948 ▶ [DEBU keybase log.go:30] 19f | Commit : renaming "/home/mythmon/.cache/keybase/session.json.KFBKGDMXO4G4X7JG2ZKJ5LVP" => "/home/mythmon/.cache/keybase/session.json"
2016-04-14T11:15:13.912394 ▶ [DEBU keybase log.go:30] 1a0 - Commit config rewrite ok
2016-04-14T11:15:13.912857 ▶ [DEBU keybase log.go:30] 1a1 - Checked session
2016-04-14T11:15:13.913331 ▶ [DEBU keybase log.go:30] 1a2 | Our session token is still valid; we're logged in
2016-04-14T11:15:13.913768 ▶ [DEBU keybase log.go:30] 1a3 - checkedLoggedIn() -> true, ok
nitrogen
2016-04-14T11:15:18.716544 ▶ [DEBU keybase log.go:30] 1a4 + RunEngine(DeviceWrap)
2016-04-14T11:15:18.716983 ▶ [DEBU keybase log.go:30] 1a5 + RunEngine(DeviceRegister)
2016-04-14T11:15:18.717088 ▶ [DEBU keybase log.go:30] 1a6 Setting Device ID to 7d1bd2edeec09080f8ca35eba29ba018
2016-04-14T11:15:18.719444 ▶ [DEBU keybase log.go:30] 1a7 + getSibkeyKidForDevice(5a9fcfe4ffd54c0dfdcf1410e405dd18)
2016-04-14T11:15:18.719876 ▶ [DEBU keybase log.go:30] 1a8 | Devices map: map[]
2016-04-14T11:15:18.720242 ▶ [DEBU keybase log.go:30] 1a9 device 5a9fcfe4ffd54c0dfdcf1410e405dd18 not found in cki.Devices
2016-04-14T11:15:18.720611 ▶ [DEBU keybase log.go:30] 1aa Device name:   nitrogen
2016-04-14T11:15:18.720964 ▶ [DEBU keybase log.go:30] 1ab Device ID:     7d1bd2edeec09080f8ca35eba29ba018
2016-04-14T11:15:18.721330 ▶ [DEBU keybase log.go:30] 1ac | Setting DeviceID to 7d1bd2edeec09080f8ca35eba29ba018
2016-04-14T11:15:18.721670 ▶ [DEBU keybase log.go:30] 1ad | SetUserConfig(mythmon)
2016-04-14T11:15:18.722013 ▶ [DEBU keybase log.go:30] 1ae + saving config file /home/mythmon/.config/keybase/config.json.MTYVZVZQUEUZVFTHQLG4MPFI
2016-04-14T11:15:18.722333 ▶ [DEBU keybase log.go:30] 1af - saved config file /home/mythmon/.config/keybase/config.json.MTYVZVZQUEUZVFTHQLG4MPFI
2016-04-14T11:15:18.722711 ▶ [DEBU keybase log.go:30] 1b0 - RunEngine(DeviceRegister) -> ok
2016-04-14T11:15:18.723031 ▶ [DEBU keybase log.go:30] 1b1 + RunEngine(DeviceKeygen)
2016-04-14T11:15:18.723340 ▶ [DEBU keybase log.go:30] 1b2 + Loading session
2016-04-14T11:15:18.723657 ▶ [DEBU keybase log.go:30] 1b3 - Skipped; already loaded
2016-04-14T11:15:18.723977 ▶ [DEBU keybase log.go:30] 1b4 + Checking session
2016-04-14T11:15:18.724316 ▶ [DEBU keybase log.go:30] 1b5 - session is recent, short-circuiting
2016-04-14T11:15:18.724642 ▶ [DEBU keybase log.go:30] 1b6 + LKsec:Encrypt()
2016-04-14T11:15:18.725001 ▶ [DEBU keybase log.go:30] 1b7 + LKSec::Load()
2016-04-14T11:15:18.725344 ▶ [DEBU keybase log.go:30] 1b8 | ServerHalf already loaded
2016-04-14T11:15:18.725651 ▶ [DEBU keybase log.go:30] 1b9 | Making XOR'ed secret key for Local Key Security (LKS)
2016-04-14T11:15:18.725979 ▶ [DEBU keybase log.go:30] 1ba - LKSec::Load() -> ok
2016-04-14T11:15:18.726196 ▶ [DEBU keybase log.go:30] 1bb - LKSec::Encrypt() -> ok
2016-04-14T11:15:18.726419 ▶ [DEBU keybase log.go:30] 1bc + Loading session
2016-04-14T11:15:18.726650 ▶ [DEBU keybase log.go:30] 1bd - Skipped; already loaded
2016-04-14T11:15:18.726879 ▶ [DEBU keybase log.go:30] 1be + Checking session
2016-04-14T11:15:18.727100 ▶ [DEBU keybase log.go:30] 1bf - session is recent, short-circuiting
2016-04-14T11:15:18.727370 ▶ [DEBU keybase log.go:30] 1c0 + Loading SKB keyring: /home/mythmon/.config/keybase/secretkeys.mythmon.mpack
2016-04-14T11:15:18.727596 ▶ [DEBU keybase log.go:30] 1c1 - Loaded SKB keyring: /home/mythmon/.config/keybase/secretkeys.mythmon.mpack -> ok
2016-04-14T11:15:18.727825 ▶ [DEBU keybase log.go:30] 1c2 | Indexed 20 secret keys
2016-04-14T11:15:18.728091 ▶ [DEBU keybase log.go:30] 1c3 + Writing to /home/mythmon/.config/keybase/secretkeys.mythmon.mpack
2016-04-14T11:15:18.728321 ▶ [DEBU keybase log.go:30] 1c4 | Temporary file generated: /home/mythmon/.config/keybase/secretkeys.mythmon.mpack.LK6EMCLRWKQ6S33WMKPBDXZVNU2OFUTU
2016-04-14T11:15:18.728562 ▶ [DEBU keybase log.go:30] 1c5 + WriteTo
2016-04-14T11:15:18.728826 ▶ [DEBU keybase log.go:30] 1c6 - WriteTo
2016-04-14T11:15:18.729048 ▶ [DEBU keybase log.go:30] 1c7 - Wrote to /home/mythmon/.config/keybase/secretkeys.mythmon.mpack -> ok
2016-04-14T11:15:18.729265 ▶ [DEBU keybase log.go:30] 1c8 Updated keyring /home/mythmon/.config/keybase/secretkeys.mythmon.mpack
2016-04-14T11:15:18.729458 ▶ [DEBU keybase log.go:30] 1c9 + LKsec:Encrypt()
2016-04-14T11:15:18.729642 ▶ [DEBU keybase log.go:30] 1ca + LKSec::Load()
2016-04-14T11:15:18.729827 ▶ [DEBU keybase log.go:30] 1cb | Short-circuit; we already know the full secret
2016-04-14T11:15:18.730035 ▶ [DEBU keybase log.go:30] 1cc - LKSec::Load() -> ok
2016-04-14T11:15:18.730243 ▶ [DEBU keybase log.go:30] 1cd - LKSec::Encrypt() -> ok
2016-04-14T11:15:18.730306 ▶ [DEBU keybase gpg_cli.go:63] 1ce | configured GPG w/ path: /usr/bin/gpg2
2016-04-14T11:15:18.730470 ▶ [DEBU keybase log.go:30] 1cf + Loading session
2016-04-14T11:15:18.731039 ▶ [DEBU keybase log.go:30] 1d0 - Skipped; already loaded
2016-04-14T11:15:18.731263 ▶ [DEBU keybase log.go:30] 1d1 + Checking session
2016-04-14T11:15:18.731493 ▶ [DEBU keybase log.go:30] 1d2 - session is recent, short-circuiting
2016-04-14T11:15:18.731675 ▶ [DEBU keybase log.go:30] 1d3 + Writing to /home/mythmon/.config/keybase/secretkeys.mythmon.mpack
2016-04-14T11:15:18.731892 ▶ [DEBU keybase log.go:30] 1d4 | Temporary file generated: /home/mythmon/.config/keybase/secretkeys.mythmon.mpack.ARGK5XQ72P6NKMPHOTS7I3J7HDORTYHP
2016-04-14T11:15:18.732069 ▶ [DEBU keybase log.go:30] 1d5 + WriteTo
2016-04-14T11:15:18.732284 ▶ [DEBU keybase log.go:30] 1d6 - WriteTo
2016-04-14T11:15:18.732511 ▶ [DEBU keybase log.go:30] 1d7 - Wrote to /home/mythmon/.config/keybase/secretkeys.mythmon.mpack -> ok
2016-04-14T11:15:18.732737 ▶ [DEBU keybase log.go:30] 1d8 Updated keyring /home/mythmon/.config/keybase/secretkeys.mythmon.mpack
2016-04-14T11:15:18.732939 ▶ [DEBU keybase log.go:30] 1d9 - RunEngine(DeviceKeygen) -> ok
2016-04-14T11:15:18.733138 ▶ [DEBU keybase log.go:30] 1da + Delegator.Run()
2016-04-14T11:15:18.733328 ▶ [DEBU keybase log.go:30] 1db + Delegator::checkArgs()
2016-04-14T11:15:18.733538 ▶ [DEBU keybase log.go:30] 1dc | Picked passed-in signing key
2016-04-14T11:15:18.733723 ▶ [DEBU keybase log.go:30] 1dd | Picked key 0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a for signing
2016-04-14T11:15:18.733941 ▶ [DEBU keybase log.go:30] 1de - Delegator::checkArgs()
2016-04-14T11:15:18.734203 ▶ [DEBU keybase log.go:30] 1df + GetLastKnownSeqno()
2016-04-14T11:15:18.734456 ▶ [DEBU keybase log.go:30] 1e0 + GetLastLoadedSeqno()
2016-04-14T11:15:18.734625 ▶ [DEBU keybase gpg_cli.go:221] 1e1 GPG version:
gpg (GnuPG) 2.1.11
libgcrypt 1.6.5
Copyright (C) 2016 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: ~/.gnupg
Supported algorithms:
Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
        CAMELLIA128, CAMELLIA192, CAMELLIA256
Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2
2016-04-14T11:15:18.734708 ▶ [DEBU keybase gpg_cli.go:320] 1e3 | running Gpg: /usr/bin/gpg2 [--armor --sign -u dafe0a2f0b0290b57ac35186cd8d37a46031dc1c]
2016-04-14T11:15:18.734693 ▶ [DEBU keybase log.go:30] 1e2 | Fetched from main chain
2016-04-14T11:15:18.735474 ▶ [DEBU keybase log.go:30] 1e4 - GetLastLoadedSeqno() -> 33
2016-04-14T11:15:18.735760 ▶ [DEBU keybase log.go:30] 1e5 - GetLastKnownSeqno() -> 33
2016-04-14T11:15:18.736141 ▶ [DEBU keybase log.go:30] 1e6 + MerkleClient.LoadRoot()
2016-04-14T11:15:18.736444 ▶ [DEBU keybase log.go:30] 1e7 - MerkleClient.LoadRoot() -> &{{0xc820196340} 442582 [3 225 70 205 175 129 54 104 10 213 102 145 42 50 52 12 236 140 148 146] 0xc820450e10 {"body":{"kbfs":{"private":{"root":"iKNlcGvEIKfO37STZn0fbiCrdXZRKUyvU73yFCYZl74tglbypSFYoWjEQHcdisrsyj2fdBLWGS/+ORsHddSmxfT3yk0Fey9RIiydFpm71gxJoNVgsLiphhMKl6CS1YoRB7mYuJA6QAcktS2jbm9uxBhCrx1wmOZg67oIKtkzUH+ipzEAFJjWcJOicHLEQHRaqQ59y3ZnQP6ayzjEpVdXPCnaK0+aM9iIIU6WzXrmmGUZkQ9UweU+k/f8C5o2NvUEjYdwgt80RLz4p55t5tqic27NBK2hdAKidHPOVw/bdaF2AQ==","version":1},"public":{"root":"hqFoxEAIG+Xp52lJJM+Ye2asoxzavgAO1XWxNFNUVVbt0UJnVgk9x8DPcYv6JjmcN0D1+awKmomdWaAcQklH3JQe7Ba/onByxEDtpAUF/zq1Lm+KHtPwQ6bHt0/dvqTzvTm7plmktOumTvZZBuPb3R9SzK+tWPzC8yCS4V95aBuBQjsR7J95HH7ConNuzQStoXQBonRzzlcP22ChdgE=","version":1}},"key":{"fingerprint":"03e146cdaf8136680ad566912a32340cec8c9492","key_id":"2A32340CEC8C9492"},"legacy_uid_root":"d3450288d233fe9125d0b6f8196dbc93447bca2630300898781a637a44752032","prev":"2c6e540dfabb22807d27f97f2dd2e876aa91b723f5afe332f46d57707fd995624497bf0fd2b4020d09558c405d25a062bf00291b9bb8cb0c7e7583859dbaf4bc","root":"a95ee9c6afcded5ac2ed3ec9cb23176d0239fb2353324e2a1cb9a1753298a3b37a26b62e325e6d61e7219a40bb2bc42b52bba156da0ffc6b13b17930e89abcdc","seqno":442582,"txid":"01655fdabe06d339953f60a738cdeb15","type":"merkle_root","version":1},"ctime":1460657605,"tag":"signature"} 0xc8204516b0 [169 94 233 198 175 205 237 90 194 237 62 201 203 35 23 109 2 57 251 35 83 50 78 42 28 185 161 117 50 152 163 179 122 38 182 46 50 94 109 97 231 33 154 64 187 43 196 43 82 187 161 86 218 15 252 107 19 177 121 48 232 154 188 220] [211 69 2 136 210 51 254 145 37 208 182 248 25 109 188 147 68 123 202 38 48 48 8 152 120 26 99 122 68 117 32 50] 1460657605}
2016-04-14T11:15:18.736705 ▶ [DEBU keybase log.go:30] 1e8 + GetLastKnownSeqno()
2016-04-14T11:15:18.736884 ▶ [DEBU keybase log.go:30] 1e9 + GetLastLoadedSeqno()
2016-04-14T11:15:18.737064 ▶ [DEBU keybase log.go:30] 1ea | Fetched from main chain
2016-04-14T11:15:18.737238 ▶ [DEBU keybase log.go:30] 1eb - GetLastLoadedSeqno() -> 33
2016-04-14T11:15:18.737434 ▶ [DEBU keybase log.go:30] 1ec - GetLastKnownSeqno() -> 33
2016-04-14T11:15:18.737636 ▶ [DEBU keybase log.go:30] 1ed + MerkleClient.LoadRoot()
2016-04-14T11:15:18.737820 ▶ [DEBU keybase log.go:30] 1ee - MerkleClient.LoadRoot() -> &{{0xc820196340} 442582 [3 225 70 205 175 129 54 104 10 213 102 145 42 50 52 12 236 140 148 146] 0xc82042f6b0 {"body":{"kbfs":{"private":{"root":"iKNlcGvEIKfO37STZn0fbiCrdXZRKUyvU73yFCYZl74tglbypSFYoWjEQHcdisrsyj2fdBLWGS/+ORsHddSmxfT3yk0Fey9RIiydFpm71gxJoNVgsLiphhMKl6CS1YoRB7mYuJA6QAcktS2jbm9uxBhCrx1wmOZg67oIKtkzUH+ipzEAFJjWcJOicHLEQHRaqQ59y3ZnQP6ayzjEpVdXPCnaK0+aM9iIIU6WzXrmmGUZkQ9UweU+k/f8C5o2NvUEjYdwgt80RLz4p55t5tqic27NBK2hdAKidHPOVw/bdaF2AQ==","version":1},"public":{"root":"hqFoxEAIG+Xp52lJJM+Ye2asoxzavgAO1XWxNFNUVVbt0UJnVgk9x8DPcYv6JjmcN0D1+awKmomdWaAcQklH3JQe7Ba/onByxEDtpAUF/zq1Lm+KHtPwQ6bHt0/dvqTzvTm7plmktOumTvZZBuPb3R9SzK+tWPzC8yCS4V95aBuBQjsR7J95HH7ConNuzQStoXQBonRzzlcP22ChdgE=","version":1}},"key":{"fingerprint":"03e146cdaf8136680ad566912a32340cec8c9492","key_id":"2A32340CEC8C9492"},"legacy_uid_root":"d3450288d233fe9125d0b6f8196dbc93447bca2630300898781a637a44752032","prev":"2c6e540dfabb22807d27f97f2dd2e876aa91b723f5afe332f46d57707fd995624497bf0fd2b4020d09558c405d25a062bf00291b9bb8cb0c7e7583859dbaf4bc","root":"a95ee9c6afcded5ac2ed3ec9cb23176d0239fb2353324e2a1cb9a1753298a3b37a26b62e325e6d61e7219a40bb2bc42b52bba156da0ffc6b13b17930e89abcdc","seqno":442582,"txid":"01655fdabe06d339953f60a738cdeb15","type":"merkle_root","version":1},"ctime":1460657605,"tag":"signature"} 0xc82042f950 [169 94 233 198 175 205 237 90 194 237 62 201 203 35 23 109 2 57 251 35 83 50 78 42 28 185 161 117 50 152 163 179 122 38 182 46 50 94 109 97 231 33 154 64 187 43 196 43 82 187 161 86 218 15 252 107 19 177 121 48 232 154 188 220] [211 69 2 136 210 51 254 145 37 208 182 248 25 109 188 147 68 123 202 38 48 48 8 152 120 26 99 122 68 117 32 50] 1460657605}
2016-04-14T11:15:18.738004 ▶ [DEBU keybase log.go:30] 1ef + GPGKey Signing {"body":{"device":{"ctime":0,"id":"7d1bd2edeec09080f8ca35eba29ba018","kid":"01202895b6d3c6307eca55d5f1ad8c68591cc5a7fcf26b8a98bccdea0bfc80b96aaf0a","mtime":0,"name":"nitrogen","status":1,"type":"desktop"},"key":{"eldest_kid":"0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a","host":"keybase.io","kid":"0101901cb09087a70749f775fed47598ac9a51922c06e7a0e1581c534d9cd4b5bef10a","uid":"a51c6428ed197315fc0344e24da64d00","username":"mythmon"},"sibkey":{"kid":"01202895b6d3c6307eca55d5f1ad8c68591cc5a7fcf26b8a98bccdea0bfc80b96aaf0a","reverse_sig":"g6Rib2R5hqhkZXRhY2hlZMOpaGFzaF90eXBlCqNrZXnEIwEgKJW208YwfspV1fGtjGhZHMWn/PJripi8zeoL/IC5aq8Kp3BheWxvYWTFA957ImJvZHkiOnsiZGV2aWNlIjp7ImN0aW1lIjowLCJpZCI6IjdkMWJkMmVkZWVjMDkwODBmOGNhMzVlYmEyOWJhMDE4Iiwia2lkIjoiMDEyMDI4OTViNmQzYzYzMDdlY2E1NWQ1ZjFhZDhjNjg1OTFjYzVhN2ZjZjI2YjhhOThiY2NkZWEwYmZjODBiOTZhYWYwYSIsIm10aW1lIjowLCJuYW1lIjoibml0cm9nZW4iLCJzdGF0dXMiOjEsInR5cGUiOiJkZXNrdG9wIn0sImtleSI6eyJlbGRlc3Rfa2lkIjoiMDEwMTkwMWNiMDkwODdhNzA3NDlmNzc1ZmVkNDc1OThhYzlhNTE5MjJjMDZlN2EwZTE1ODFjNTM0ZDljZDRiNWJlZjEwYSIsImhvc3QiOiJrZXliYXNlLmlvIiwia2lkIjoiMDEwMTkwMWNiMDkwODdhNzA3NDlmNzc1ZmVkNDc1OThhYzlhNTE5MjJjMDZlN2EwZTE1ODFjNTM0ZDljZDRiNWJlZjEwYSIsInVpZCI6ImE1MWM2NDI4ZWQxOTczMTVmYzAzNDRlMjRkYTY0ZDAwIiwidXNlcm5hbWUiOiJteXRobW9uIn0sInNpYmtleSI6eyJraWQiOiIwMTIwMjg5NWI2ZDNjNjMwN2VjYTU1ZDVmMWFkOGM2ODU5MWNjNWE3ZmNmMjZiOGE5OGJjY2RlYTBiZmM4MGI5NmFhZjBhIiwicmV2ZXJzZV9zaWciOm51bGx9LCJ0eXBlIjoic2lia2V5IiwidmVyc2lvbiI6MX0sImNsaWVudCI6eyJuYW1lIjoia2V5YmFzZS5pbyBnbyBjbGllbnQiLCJ2ZXJzaW9uIjoiMS4wLjE1In0sImN0aW1lIjoxNDYwNjU3NzE4LCJleHBpcmVfaW4iOjUwNDU3NjAwMCwibWVya2xlX3Jvb3QiOnsiY3RpbWUiOjE0NjA2NTc2MDUsImhhc2giOiJhOTVlZTljNmFmY2RlZDVhYzJlZDNlYzljYjIzMTc2ZDAyMzlmYjIzNTMzMjRlMmExY2I5YTE3NTMyOThhM2IzN2EyNmI2MmUzMjVlNmQ2MWU3MjE5YTQwYmIyYmM0MmI1MmJiYTE1NmRhMGZmYzZiMTNiMTc5MzBlODlhYmNkYyIsInNlcW5vIjo0NDI1ODJ9LCJwcmV2IjoiOGI0ZmZhMjliNDY5ZDhlOWIwODE2OGI4ZDllY2RkMzNhYjE0MzM5YmM5MGI1NzU5ZWYwODYxMjJkOThkNGZiZCIsInNlcW5vIjozNCwidGFnIjoic2lnbmF0dXJlIn2jc2lnxECVTIvLblHJQIYBLgYvjWGMyLB2hpXij68hWmHj8fbNERxbg6OxJhkoecC7cppeTbhDDfhRiJImOq9jH4FkG/4AqHNpZ190eXBlIKN0YWfNAgKndmVyc2lvbgE="},"type":"sibkey","version":1},"client":{"name":"keybase.io go client","version":"1.0.15"},"ctime":1460657718,"expire_in":504576000,"merkle_root":{"ctime":1460657605,"hash":"a95ee9c6afcded5ac2ed3ec9cb23176d0239fb2353324e2a1cb9a1753298a3b37a26b62e325e6d61e7219a40bb2bc42b52bba156da0ffc6b13b17930e89abcdc","seqno":442582},"prev":"8b4ffa29b469d8e9b08168b8d9ecdd33ab14339bc90b5759ef086122d98d4fbd","seqno":34,"tag":"signature"}
2016-04-14T11:15:18.738191 ▶ [DEBU keybase log.go:30] 1f0 | GPGKey reverse delegate to CLI
2016-04-14T11:15:18.756736 ▶ [DEBU keybase gpg_cli.go:299] 1f1 gpg: signing failed: Card error
2016-04-14T11:15:18.756877 ▶ [DEBU keybase gpg_cli.go:299] 1f2 gpg: signing failed: Card error
2016-04-14T11:15:18.757552 ▶ [DEBU keybase log.go:30] 1f3 - GPGKey Signing -> GPG error: exit status 2
2016-04-14T11:15:18.757681 ▶ [DEBU keybase log.go:30] 1f4 | Failure in SignJson()
2016-04-14T11:15:18.757811 ▶ [DEBU keybase log.go:30] 1f5 - Delegator.Run() -> ERROR: GPG error: exit status 2
2016-04-14T11:15:18.757933 ▶ [DEBU keybase log.go:30] 1f6 - RunEngine(DeviceWrap) -> ERROR: GPG error: exit status 2
2016-04-14T11:15:18.758068 ▶ [DEBU keybase log.go:30] 1f7 - Login "loginWithPromptHelper"
2016-04-14T11:15:18.758207 ▶ [DEBU keybase log.go:30] 1f8 - LoginWithPrompt -> ERROR: GPG error: exit status 2
2016-04-14T11:15:18.758335 ▶ [DEBU keybase log.go:30] 1f9 an error occurred during provisioning, logging out
2016-04-14T11:15:18.758463 ▶ [DEBU keybase log.go:30] 1fa + Login "logout"
2016-04-14T11:15:18.758585 ▶ [DEBU keybase log.go:30] 1fb + Loading session
2016-04-14T11:15:18.758719 ▶ [DEBU keybase log.go:30] 1fc - Skipped; already loaded
2016-04-14T11:15:18.758852 ▶ [DEBU keybase log.go:30] 1fd + API Post request to https://keybase.io/_/api/1.0/logout.json
2016-04-14T11:15:18.898580 ▶ [DEBU keybase log.go:30] 1fe | Result is: 200 OK
2016-04-14T11:15:18.898885 ▶ [DEBU keybase log.go:30] 1ff - successful API call
2016-04-14T11:15:18.899066 ▶ [DEBU keybase log.go:30] 200 + invalidating session
2016-04-14T11:15:18.899261 ▶ [DEBU keybase log.go:30] 201 + Sending logout notfication
2016-04-14T11:15:18.899441 ▶ [DEBU keybase log.go:30] 202 - Logout notification sent
2016-04-14T11:15:18.899620 ▶ [DEBU keybase log.go:30] 203 - session invalidated
2016-04-14T11:15:18.899795 ▶ [DEBU keybase log.go:30] 204 + nuke file /home/mythmon/.cache/keybase/session.json
2016-04-14T11:15:18.899962 ▶ [DEBU keybase log.go:30] 205 - nuke file /home/mythmon/.cache/keybase/session.json -> ok
2016-04-14T11:15:18.900108 ▶ [DEBU keybase log.go:30] 206 clearing cached secret keys
2016-04-14T11:15:18.900274 ▶ [DEBU keybase log.go:30] 207 - Login "logout"
2016-04-14T11:15:18.900429 ▶ [DEBU keybase log.go:30] 208 + Account "LoginState - Shutdown"
2016-04-14T11:15:18.900585 ▶ [DEBU keybase log.go:30] 209 - Account "LoginState - Shutdown"
2016-04-14T11:15:18.900756 ▶ [DEBU keybase log.go:30] 20a - RunEngine(loginProvision) -> ERROR: GPG error: exit status 2
2016-04-14T11:15:18.900942 ▶ [DEBU keybase log.go:30] 20b + Aborting config rewrite /home/mythmon/.config/keybase/config.json.MTYVZVZQUEUZVFTHQLG4MPFI
2016-04-14T11:15:18.901109 ▶ [DEBU keybase log.go:30] 20c - Abort -> <nil>
2016-04-14T11:15:18.901278 ▶ [DEBU keybase log.go:30] 20d - RunEngine(Login) -> ERROR: GPG error: exit status 2
2016-04-14T11:15:18.901442 ▶ [DEBU keybase log.go:30] 20e LoginState: Running request loop
2016-04-14T11:15:18.999173 ▶ [DEBU keybase globals.go:266] 20f Calling shutdown first time through
2016-04-14T11:15:18.999235 ▶ [DEBU keybase login_state.go:953] 210 + Account "LoginState - Shutdown"
2016-04-14T11:15:18.999280 ▶ [DEBU keybase login_state.go:955] 211 - Account "LoginState - Shutdown"
2016-04-14T11:15:18.999302 ▶ [DEBU keybase globals.go:312] 212 exiting shutdown code=0; err=<nil>
2016-04-14T11:15:18.999321 ▶ [ERRO keybase standard.go:197] 213 GPG error: exit status 2
maxtaco commented 8 years ago

Looks like the shell-out to gpg failed. Does the following work when you try it on the command line?

echo "foo" | /usr/bin/gpg2 --armor --sign -u dafe0a2f0b0290b57ac35186cd8d37a46031dc1c
cjb commented 8 years ago

Are you using something like a Yubikey or other crypto device?

mythmon commented 8 years ago

I have a Yubikey, and have a detached master key I keep on a USB drive. Ideally I'd like the detached master key to not be involved.

@maxtaco's command works fine, and produced an armored PGP message.

maxtaco commented 8 years ago

maybe try again? sometimes gpg needs to compact its DB or something crazy like that and sends us a non-zero exit code as a result! likely it won't help, but there's a chance it will. i'm really not sure why it wouldn't work though if you can sign without an issue from the command-line directly

mythmon commented 8 years ago

I've tried this several times, with the same result. By the way, that was the output when I have the master key attached. When I detach the master key, I get

▶ ERROR bad signature: Can't find a key for 74ab8817639d69c1: No keys match the given key IDs (error 1002)

I think that keybase is trying to use my master key instead of the available signing key, so it rejects the signature it got.

maxtaco commented 8 years ago

We'll take a look this upcoming sprint. Just to circle back, did you find a workaround or are you still blocked?

mythmon commented 8 years ago

I did not find a work around.

elyscape commented 8 years ago

@mythmon I had a similar issue. The cause turned out to be that I have two YubiKeys, each with a different signing subkey. When keybase asked GPG to sign the proof, it specified the primary key. When this happens, GPG will for some reason always choose the last (non-expired?) subkey with signing permissions, even if the private key for that subkey is not available. This seems like an oversight but maybe there's a reason for it. In any event, I was trying to use the first YubiKey I registered, but GPG wanted to use the second signing subkey. The solution for me ended up being to switch which key I keep in safe storage and use the second registered YubiKey as my primary. The keybase client was able to register my public key fine once I plugged in the second YubiKey.

Spydar007 commented 8 years ago

@maxtaco, I am also having this issue, running Keybase 1.0.16. Would really appreciate a fix.

maxtaco commented 8 years ago

@spydar007 are you also running a yubikey? I can maybe look at your problem but no promises. Can you do a 'keybase log send'? Btw guys, the client is open source and we welcome patches.

Spydar007 commented 8 years ago

I am not running YubiKey. I have just sent the log. Log ID: e6cc9c420ff9825b5c2e6a1c

maxtaco commented 8 years ago

For some reason we're failing to sign with your gpg when we shell out to it. It might be a pinentry problem, but I can't tell. What happens when you run:

echo "foo" | /usr/local/bin/gpg2 --no-tty -a --sign -u 221F38B1D3364A0B 

?

Spydar007 commented 8 years ago

I get:

gpg: signing failed: No pinentry
-----BEGIN PGP MESSAGE-----
Version: GnuPG v2

gpg: signing failed: No pinentry

The thing is, I have pinentry installed. The same happens if I run the command with 89ae437abb227a8ed5829ac4221f38b1d3364a0b, which I tried earlier.

maxtaco commented 8 years ago

so this is a local misconfig on your part. my guess is once you get this working, then your login will work.

Spydar007 commented 8 years ago

Completely removing all versions of pinentry and then reinstalling from source works. Thanks.