What to do when Roundcube says: Decryption failed: Key password required, and: Could not decrypt this message

Roundcube is great. Easy to get up and running, but it surprises me that I couldn't find the following solution online, so I'm making a post here.

Roundcube error: Decryption failed: Key password required.When you receive an email (say, from a public key generator) that is encrypted by your own PRIVATE key and you haven't fully configured encryption, it looks like this:

In addition, you'll see a little message in the corner that looks like this:

Could not decrypt this message: Error: Unknown ASCII armor type

 

 

 

What's happening is that you haven't imported the key into Roundcube which will be used to decrypt the message. It would be nice if the error message said this more explicitly, but I guess it's not common that people (effectively) send an email to themselves using a key they haven't yet imported. I get it. It's an obscure defect.

So you need to find the key, wherever it is, and then import it. You may still need to export it from site where you generated it. Make sure this key is stored in a safe place.

Do the following:

  1. Go to Settings, PGP Keys.
  2. In the top menu bar, toward the right, click on "Import."
  3. You get an "import keys" popup which requests you to browse for a file on your local computer.
  4. Look for the PRIVATE key that goes with the email, select the file, and then click "Import."
  5. You'll be prompted for the private key password or passphrase that you used to create the key.
  6. Enter the passphrase and click "OK".

Now you should be able to read the email.

 

A whole new way into heart meditation reveals... light... on Thanksgiving morning

A year of mindful meditation Here it is early the morning of Thanksgiving 2023 and I just discovered a rather deep heartful meditation which took about a year to learn. The essential idea is quite simple and took only a few minutes to comprehend, but it took a year of preparation so that I could  […]

Continue reading

"I want to break this apart and put it back together again" -- while trying to solve the Rubik's cube

Rubik's cube

This is a weblog post about what makes a hacker, and why there are "good" hackers and "bad" hackers (which is about quality, not whitehat vs blackhat), an insight I discovered while in a brief conversation with my 10-year-old daughter. My daughter has discovered the Rubik's cube,  […]

Continue reading

Awaken the deep: insights from a meditative adventure on the nature of Speaking and Being

The Deep

First, a brief summary. This morning during meditation I was deep in my heart, listening, when I found myself arriving into a rare condition of clarity. It seemed to me as though I had entered a holy place within my soul, where the veil between heaven and earth is fading. My attention was in a  […]

Continue reading

Discovering David Wray and not realizing he was the conductor, and thereby seeing a window into sublime joy

The longer I listen to classical music, the deeper grows my ability to discern a depth of quality which I previously missed. I grow hungry for that depth -- or is it a height? -- of quality, and suffer through many mediocre performances in search of the gorgeous ones. And then I find one and am  […]

Continue reading

The binary perceptive lens is not for the purpose of dividing everything, but for the purpose of uniting everything

A recent essay where I invented the word trivulet as the name of the fundamental ternary logic element ended up becoming a fertile field for new insights. This is now the second post derived from ideas discovered while writing that one. While explaining how ternary logic is different from binary  […]

Continue reading

On why to use "trivulet" instead of "trit" to describe computing with the fundamental ternary logic element

In the ongoing labor to develop an internally-coherent way of perceiving ternary logic -- and its most famous derivative, binary logic -- I have come to an understanding of how ternary logic is the proper logic of the continuum; not of particles, division, or separation. Particles, division, and  […]

Continue reading

Upon realizing the Riemann Sphere theory I'm working on is gaining traction independently of me

In a brand new article published yesterday on Medium, Kasper Müller writes about The Riemann Sphere: A world where you can divide by zero in a manner which weaves in some insights that have been the endpoints of several private thought experiments. So as I'm reading the article, not only do I  […]

Continue reading

Somewheres about 10,000 hours into solving the Riemann Hypothesis, one encounters Dante's lion, wolf, and leopard

Map of Mathematics

Introduction I'm not good at basic math. I struggle with many things which any decent mathematician aces early. For example, a few elements of calculus still remain over my head, although I have climbed the slopes of that mountain several times. Linear algebra is only just starting to make sense to  […]

Continue reading

Upon realizing I independently discovered _another_ new theory in mathematics

A few months ago, I found that one of the more beautiful ideas I had been developing alone for several years had already been discovered by other mathematicians, who had published rigorous papers on the idea. While my own insights were not yet rigorous, they were developed well enough that I quickly  […]

Continue reading

A few OSINT (Open Source Intelligence) tools to quickly check your network vulnerabilities

External Network Asset Discovery and Vulnerability Scans This is a list of OSINT (Open Source Intelligence) tools which will quickly give you an awareness of your cybersecurity risk profile. I put this list together when someone said they were quoted $40,000 for security analysis, and wondered if  […]

Continue reading

Page top