Page MenuHome GnuPG
Feed All Stories

Nov 8 2012

werner closed T1406: libmpi inlining results in multiple definitions of symbols (when compiled by clang) as Resolved.
Nov 8 2012, 3:48 PM · Bug Report, libgcrypt
werner removed a project from T1435: duplicate syms in libmpi: Won't Fix.
Nov 8 2012, 3:47 PM · clang, gnupg, Bug Report
werner added a comment to T1435: duplicate syms in libmpi.

Fixed in git for gnupg 1.4.13, Libgcrypt 1.5.1 and Libgcrypt 1.6.0.

The reason why I was not able to replicate this bug was that
I didn't use -std=c99 with gcc >= 4.3.

Nov 8 2012, 3:47 PM · clang, gnupg, Bug Report
werner changed Version from 1.4.10 to all on T1347: More informative error message for unusable keys.
Nov 8 2012, 2:46 PM · gnupg, Feature Request
werner added a comment to T1347: More informative error message for unusable keys.

We won't do this for 1.4.

Nov 8 2012, 2:46 PM · gnupg, Feature Request
werner removed a project from T1347: More informative error message for unusable keys: gnupg (gpg14).
Nov 8 2012, 2:46 PM · gnupg, Feature Request
werner added a comment to T1173: gpg has no easy way to view the reason and description of revocation sigs.

I would say this should go into 2.1.

Nov 8 2012, 2:44 PM · gnupg, Debian, Feature Request
me closed T1451: Compile gpgme-1.3.2 under cygwin (crippled paths when calling configure) as Resolved.
Nov 8 2012, 2:44 PM · gpgme, Bug Report
me added a comment to T1451: Compile gpgme-1.3.2 under cygwin (crippled paths when calling configure).

Thank You werner for the explanations.

As a workaround I copied to C:\GNU\GnuPG\ and this helped.
Now I have other issues but this one is solved.

Thanks again and bye.
me.

Nov 8 2012, 2:44 PM · gpgme, Bug Report
werner closed T1238: scdaemon often needs restarting after removing OpenPGP smartcard as Resolved.
Nov 8 2012, 2:38 PM · backport, gnupg, scd, Bug Report
werner removed a project from T1238: scdaemon often needs restarting after removing OpenPGP smartcard: In Progress.
Nov 8 2012, 2:38 PM · backport, gnupg, scd, Bug Report
werner added a comment to T1238: scdaemon often needs restarting after removing OpenPGP smartcard.

Meanwhile gniibe fixed a lot more bugs and also ported them back to 2.0. Thus I
close this bug.

Nov 8 2012, 2:38 PM · backport, gnupg, scd, Bug Report
werner closed T1407: Segmentation fault as Resolved.
Nov 8 2012, 2:34 PM · Info Needed, Bug Report, gnupg
werner added a project to T1407: Segmentation fault: Info Needed.
Nov 8 2012, 2:34 PM · Info Needed, Bug Report, gnupg

Nov 7 2012

werner added a comment to T1406: libmpi inlining results in multiple definitions of symbols (when compiled by clang).

This problem also happens with gcc if run in -std=c99 mode. It is due to a
change in gcc 4.3. It has been fixed in for stable and master. It is thus
likely that the problem is also solved for clang.

Nov 7 2012, 6:19 PM · Bug Report, libgcrypt
werner removed projects from T1406: libmpi inlining results in multiple definitions of symbols (when compiled by clang): clang, Not A Bug.
Nov 7 2012, 6:19 PM · Bug Report, libgcrypt
werner added a project to T1439: Windows: race condition on random_seed: In Progress.
Nov 7 2012, 6:15 PM · libgcrypt, Bug Report
werner removed a project from T1439: Windows: race condition on random_seed: Restricted Project.
Nov 7 2012, 6:15 PM · libgcrypt, Bug Report
werner added a comment to T1439: Windows: race condition on random_seed.

I have implemented your suggestion for 1.4. Check out commit b1abc01 of GnuPG.

Nov 7 2012, 6:14 PM · libgcrypt, Bug Report
werner added a project to T1439: Windows: race condition on random_seed: Restricted Project.
Nov 7 2012, 6:13 PM · libgcrypt, Bug Report
werner removed a project from T1439: Windows: race condition on random_seed: In Progress.
Nov 7 2012, 6:13 PM · libgcrypt, Bug Report
werner added a project to T1439: Windows: race condition on random_seed: In Progress.
Nov 7 2012, 5:21 PM · libgcrypt, Bug Report
werner added a comment to T1439: Windows: race condition on random_seed.

Yes, mandatory locks are a problem. LockFile works on a separate lockfile to
implement such an advisory locking. If we would lock the random_seed file
directly reads or writes will fail and we won't be able to lock the creation of
that file.

You suggestion for 1.4. makes sense.

Nov 7 2012, 5:21 PM · libgcrypt, Bug Report
werner removed a project from T1377: gpg-agent ignores default-cache-ttl-ssh: Bug Report.
Nov 7 2012, 3:26 PM · Not A Bug, Debian, gnupg, gpgagent
werner closed T1377: gpg-agent ignores default-cache-ttl-ssh as Invalid.
Nov 7 2012, 3:26 PM · Not A Bug, Debian, gnupg, gpgagent
werner added a project to T1377: gpg-agent ignores default-cache-ttl-ssh: Not A Bug.
Nov 7 2012, 3:25 PM · Not A Bug, Debian, gnupg, gpgagent
werner added a comment to T1377: gpg-agent ignores default-cache-ttl-ssh.

This is not a bug. The description of --max-cache-ttl reads:

  Set the maximum time a cache entry is valid to @var{n} seconds.  After
  this time a cache entry will be expired even if it has been accessed
  recently.  The default is 2 hours (7200 seconds).

Thus even if you set the cache-ttl-ssh > max-cache-ttl, it will expire after
max-cache-ttl seconds.

Nov 7 2012, 3:25 PM · Not A Bug, Debian, gnupg, gpgagent
werner added a comment to T1451: Compile gpgme-1.3.2 under cygwin (crippled paths when calling configure).

Some autoconf tests may choke on spaces in file names. Of course it is
possible to avoid this problem, but for development tools, it is not really
justified. Hacker's don't have spaces in there file names - they lead to all
kind of problems. Sometimes there is even a check for this problem:

  1. Reject unsafe characters in $HOME, $tsdir and cwd. We consider spaces
  2. as unsafe because it is too easy to get scripts wrong in this regard.

am_lf='
'
case pwd in

*[\;\\\"\#\$\&\'\`$am_lf\ \	]*)
  echo "unsafe working directory name"; DIE=yes;;

esac

But most packages don't have these checks, yet.

You should try to install into another directory - without strange characters
like spaces or parentheses.

Nov 7 2012, 3:20 PM · gpgme, Bug Report

Nov 6 2012

me set Version to 1.3.2 on T1451: Compile gpgme-1.3.2 under cygwin (crippled paths when calling configure).
Nov 6 2012, 11:46 PM · gpgme, Bug Report
me added projects to T1451: Compile gpgme-1.3.2 under cygwin (crippled paths when calling configure): Bug Report, gpgme.
Nov 6 2012, 11:46 PM · gpgme, Bug Report
werner set External Link to http://bugs.debian.org/606759 on T1377: gpg-agent ignores default-cache-ttl-ssh.
Nov 6 2012, 11:31 PM · Not A Bug, Debian, gnupg, gpgagent

Oct 31 2012

ajb added projects to T1450: Broken link for Brazilian Portuguese GPH: gpgweb, Bug Report.
Oct 31 2012, 5:17 PM · Bug Report, gpgweb

Oct 21 2012

tim added projects to T1449: dirmngr should be able to use LDAPv3: dirmngr, Feature Request.
Oct 21 2012, 8:15 PM · gnupg, Feature Request, dirmngr

Oct 20 2012

syscomet added a comment to T1446: hkps SRV lookup discards port from SRV.

The behaviour matches that observed in released versions; I was debugging a
problem observed in the released versions, not reviewing code looking for issues.

Whether or not it's used in the current development branch, this has caused an
interoperability issue in the real world for the keyserver operators, causing a
functionality deployment to be rolled back and resulting in filtered results,
reducing the pool of available keyservers.

Since Issue1447 is a security impacting issue which will need a CVE and a security
release to fix anyway, it would really be nice to try to get the fix for client
behaviour into a version which is likely to be pushed out widely. Not critical,
security comes first, but if we can leverage the security release to improve
interop, that would be helpful.

In practice, we (the keyserver operators and pool operators) are stuck not able to
use SRV to point to non-default ports for at least a couple of years. This is
very unfortunate, given the efforts currently being made to make deployments more
robust, with TLS more widely deployed.

Oct 20 2012, 8:08 AM · Bug Report, gnupg

Oct 19 2012

ralf added a comment to T1448: gpgconf lists options which break gpg1 when gpg2 is also installed.

So you are saying, every distribution supporting a co-installation should patch
GPG to fix this?
The user might not even know what gpg is, that several major versions exist, or
which options are available where. He just sees email encryption not working any
longer. In most cases, he won't have decided to install both versions - he just
has software installed which, indirectly, depends on both.

Oct 19 2012, 2:45 PM · Not A Bug, Bug Report, gnupg
werner added a comment to T1446: hkps SRV lookup discards port from SRV.

Well, it might still exists, but it is not used anymore. Remember that this is
the development branch.

Oct 19 2012, 11:45 AM · Bug Report, gnupg
werner added a comment to T1448: gpgconf lists options which break gpg1 when gpg2 is also installed.

The one who decided to install both versions while at the same time using an
option not available for gpg1. It might be caused by a package manager.

Oct 19 2012, 11:43 AM · Not A Bug, Bug Report, gnupg

Oct 11 2012

ralf added a comment to T1448: gpgconf lists options which break gpg1 when gpg2 is also installed.

Of course it can be fixed by changing the config files. However, the default
behaviour (if I start gpgconf as a new user) is to use the shared config file
for both versions. As I see it, programs are responsible to set up the
configuration in the user's home directory if they need one - at least, that's
common practice in my experience.
If this is not a bug in GnuPG, then whose installation problem is this?

Oct 11 2012, 9:54 PM · Not A Bug, Bug Report, gnupg
syscomet added a comment to T1446: hkps SRV lookup discards port from SRV.

% git remote -v
origin git://git.gnupg.org/gnupg.git (fetch)
origin git://git.gnupg.org/gnupg.git (push)
% git status

On branch master

nothing to commit (working directory clean)
%

I did the pull on the day I filed the bug, and as of the commit stated, the
directory exists. I just did a "git pull", no change. I didn't write "git current"
in this bug.

http://www.gnupg.org/download/cvs_access.en.html still points to the repo above, so
that's what I pulled. If that's no longer correct, I can pull another repo.

But still, if you check out the revision stated, you'll see the behaviour, which is
reflected in current releases of GnuPG.

Oct 11 2012, 8:23 PM · Bug Report, gnupg
werner lowered the priority of T1448: gpgconf lists options which break gpg1 when gpg2 is also installed from High to Normal.
Oct 11 2012, 6:03 PM · Not A Bug, Bug Report, gnupg
werner removed a project from T1448: gpgconf lists options which break gpg1 when gpg2 is also installed: Bug Report.
Oct 11 2012, 6:03 PM · Not A Bug, Bug Report, gnupg
werner closed T1448: gpgconf lists options which break gpg1 when gpg2 is also installed as Invalid.
Oct 11 2012, 6:03 PM · Not A Bug, Bug Report, gnupg
werner added a comment to T1448: gpgconf lists options which break gpg1 when gpg2 is also installed.

Gpgconf uses the configuration file as advertised by gpg.
For example:

  $ gpg2 --gpgconf-list | grep ^gpgconf-gpg.conf:
  gpgconf-gpg.conf:16:"/home/wk/.gnupg/gpg.conf
  $ gpg --gpgconf-list | grep ^gpgconf-gpg.conf:
  gpgconf-gpg.conf:16:"/home/wk/.gnupg/gpg.conf

  $ touch ~/.gnupg/gpg.conf-1

  $ gpg2 --gpgconf-list | grep ^gpgconf-gpg.conf:
  gpgconf-gpg.conf:16:"/home/wk/.gnupg/gpg.conf
  $ gpg --gpgconf-list | grep ^gpgconf-gpg.conf:
  gpgconf-gpg.conf:16:"/home/wk/.gnupg/gpg.conf-1

Thus you only need to create a gpg.conf-1 (or conf-2) and you are
done. This is an installation problem.

Oct 11 2012, 6:03 PM · Not A Bug, Bug Report, gnupg
werner added a comment to T1446: hkps SRV lookup discards port from SRV.

What do you mean by "git current"? The current "git master" has no keyserver/
stuff.

Oct 11 2012, 5:55 PM · Bug Report, gnupg

Oct 9 2012

ralf added projects to T1448: gpgconf lists options which break gpg1 when gpg2 is also installed: gnupg, Bug Report.
Oct 9 2012, 11:40 AM · Not A Bug, Bug Report, gnupg
ralf set Version to 2.0.19 on T1448: gpgconf lists options which break gpg1 when gpg2 is also installed.
Oct 9 2012, 11:40 AM · Not A Bug, Bug Report, gnupg
syscomet added a comment to T1447: TLS hostname selection uses insecure SRV data.

Kristian has removed the SRV records at _pgpkey-https._tcp.hkps.sks-
keyservers.net, so the explanation in step 3 might seem to not match reality, but
that's a change, because of this Issue and Issue1446.

If you set up your own DNS pool for testing, I'm happy to send you a CSR for a new
vhost to help with debugging.

Oct 9 2012, 12:12 AM · Bug Report, gnupg

Oct 8 2012

syscomet added projects to T1447: TLS hostname selection uses insecure SRV data: gnupg, Bug Report.
Oct 8 2012, 11:06 PM · Bug Report, gnupg

Oct 7 2012

syscomet added projects to T1446: hkps SRV lookup discards port from SRV: gnupg, Bug Report.
Oct 7 2012, 4:31 AM · Bug Report, gnupg
syscomet set Version to git current on T1446: hkps SRV lookup discards port from SRV.
Oct 7 2012, 4:31 AM · Bug Report, gnupg

Sep 26 2012

jegrp added a comment to T1439: Windows: race condition on random_seed.

I'm not sure what you mean by "no portable advisory locking in Windows".
There's LockFile()/UnlockFile() as used in the new dotlock code. Would it be a
problem if the locks on random_seed were mandatory locks? If so, then using the
dotlock code is certainly the shortest path to a perfect solution.

Regarding gpg 1.4, however: The reason why I opened this bug is that gpg
randomly fails to encrypt what it was told to encrypt. This is as bad as if it
would be randomly crashing. I don't mind an occasional "note: random_seed file
is empty" message nor a performance penalty from needlessly re-generating the
seed file. Modifying the error handling after read() as I tried to outline in
my previous message ought to be enough to get rid of the random fatal errors.
Do you consider such a change suitable for gpg 1.4?

Sep 26 2012, 5:52 PM · libgcrypt, Bug Report
werner added a comment to T1444: Check keyid after downloading key from keyserver and before importing it.

What is your threat model?

Sep 26 2012, 3:22 PM · gnupg, Feature Request
werner closed T1441: Increase Key Size as Resolved.
Sep 26 2012, 3:21 PM · Won't Fix, Feature Request
werner added a comment to T1441: Increase Key Size.

It is already available in the latest 2.1-beta.

Sep 26 2012, 3:21 PM · Won't Fix, Feature Request
werner added a project to T1445: keyid-format fingerprint: Won't Fix.
Sep 26 2012, 3:20 PM · gnupg, Duplicate, Feature Request
werner added a comment to T1445: keyid-format fingerprint.

That is not possible for two reasons:

  1. For v3 keys the fingerprint is different from the keyID.
  2. We often have only the keyID but not the fingerprint available.
Sep 26 2012, 3:20 PM · gnupg, Duplicate, Feature Request
werner set Due Date to Oct 31 2012, 1:00 AM on T1439: Windows: race condition on random_seed.
Sep 26 2012, 3:15 PM · libgcrypt, Bug Report
werner changed Version from 1.4.12 to all on T1439: Windows: race condition on random_seed.
Sep 26 2012, 3:15 PM · libgcrypt, Bug Report
werner added a project to T1439: Windows: race condition on random_seed: libgcrypt.
Sep 26 2012, 3:15 PM · libgcrypt, Bug Report
werner removed projects from T1439: Windows: race condition on random_seed: gnupg, Windows 32, Windows.
Sep 26 2012, 3:15 PM · libgcrypt, Bug Report
werner added a comment to T1439: Windows: race condition on random_seed.

Yeah sure, I meant "NOT a problem".

Yes I know what you mean. But without locking you will never be able
to get it right.

As you noted there is actually a problem with Libgcrypt under
Windows. In Libgcrypt we lock the seed file and thus the fatal error
is the right thing to do. But.....

  #ifdef __GCC__
  #warning Check whether we can lock on Windows.
  #endif
  #if LOCK_SEED_FILE

Thus we should implement locking for Windows. The problem here is
that there is no portable advisory locking in Windows. And frankly our
fcntl locking approach does not work on all Unices either and worse it
does not work if the home partition is on certain remote file systems.

The only solution I see is to employ the new dotlock code from GnuPG
here. It is slower than fcntl locking but very portable.

I don't think we will fix this in gpg 1.4.

Sep 26 2012, 3:15 PM · libgcrypt, Bug Report
werner added a project to T1443: gpg always leaves files world-readable (security): Not A Bug.
Sep 26 2012, 2:57 PM · Bug Report, Not A Bug, gnupg
werner added a comment to T1443: gpg always leaves files world-readable (security).

Make sure your umask is setup properly. This is standard Unix behaviour and
nothing GPG can do about. Whether you use --output or the usual redirection
shall not make a difference.

In any case we can't change the behaviour of --output created files becuase that
would break all kind of users.

Sep 26 2012, 2:57 PM · Bug Report, Not A Bug, gnupg

Sep 22 2012

ilf added a project to T1445: keyid-format fingerprint: Feature Request.
Sep 22 2012, 11:25 PM · gnupg, Duplicate, Feature Request

Sep 20 2012

mvo added a project to T1444: Check keyid after downloading key from keyserver and before importing it: Feature Request.
Sep 20 2012, 11:20 AM · gnupg, Feature Request

Sep 19 2012

mweckbecker_suse.de added projects to T1443: gpg always leaves files world-readable (security): gnupg, Bug Report.
Sep 19 2012, 11:24 AM · Bug Report, Not A Bug, gnupg

Sep 18 2012

jegrp added a comment to T1439: Windows: race condition on random_seed.

This is known but a problem from a security POV.

I suppose you mean "NOT a problem"? I think it might be a problem in
opportunistic encryption scenarios if gpg encryption failures caused by
random_seed access conflicts are ignored like failures caused by missing keys.
But usually it's just a nuisance like any other randomly failing program.

The non-locking read is on purpose - if it works: okay. Otherwise we
re-generate a seed file.

I see that the code tries to tolerate access conflicts, but there's still a race
condition if the random_seed file is truncated between fstat() and read(). The
read() error handling is incomplete. Maybe this pseudo-patch explains best what
I mean:

diff -ru gnupg-1.4.12/cipher/random.c gnupg-1.4.12/cipher/random.c

  • gnupg-1.4.12/cipher/random.c 2012-01-24 09:45:41.000000000 +0100

+++ gnupg-1.4.12/cipher/random.c 2012-09-18 19:47:54.449578800 +0200
@@ -492,11 +492,17 @@

    do {
	n = read( fd, buffer, POOLSIZE );
    } while( n == -1 && errno == EINTR );
  • if( n != POOLSIZE ) {

+ if( n == -1 ) {

	log_fatal(_("can't read `%s': %s\n"), seed_file_name,strerror(errno) );
	close(fd);
	return 0;
    }

+ else if ( n == 0 ) {
+ ... handle like sb.st_size == 0
+ }
+ else if ( n != POOLSIZE ) {
+ ...
handle like sb.st_size != POOLSIZ
+ }

     close(fd);

Yes, we could do the file locking

Proper locking would be the ideal solution, but a better read() error handling
would already be sufficient to avoid the sporadic fatal errors on random_seed
accesses.

and iirc, we do this in libgcrypt (GnuPG-2).

I'm just checking this and ... sorry, no. The gpg2.exe from Gpg4win 2.1.0 shows
the very same error:

note: random_seed file is empty
note: random_seed file is empty
Fatal: can't read `C:/Dokumente und
Einstellungen/jechternach/Anwendungsdaten/GnuPG /random_seed': No such file or
directory

This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
note: random_seed file is empty

Sep 18 2012, 7:52 PM · libgcrypt, Bug Report
mm added projects to T1442: tar and tar-args in gpg-zip not working correctly: gnupg, Bug Report.
Sep 18 2012, 6:18 PM · Bug Report, gnupg
mm set Version to 2.0.19 on T1442: tar and tar-args in gpg-zip not working correctly.
Sep 18 2012, 6:18 PM · Bug Report, gnupg

Sep 17 2012

Securityx added a comment to T1441: Increase Key Size.

Ok I did some more research on this topic and it appears ECC is the fix for RSA
additional key sizes. Do you have any idea when ECC will be implemented into
this gem? This draft appears to be expired though so its unknown to me if there
are plans to get this implemented into the default software without requiring a
patch.

Draft: https://tools.ietf.org/html/draft-jivsov-openpgp-ecc-11

Once again thanks for the feedback. I tried to search but I kept getting errors
so I apologize if this was previously addressed.

Sep 17 2012, 10:12 PM · Won't Fix, Feature Request
Securityx reopened T1441: Increase Key Size as "Open".
Sep 17 2012, 10:12 PM · Won't Fix, Feature Request
werner set Due Date to Sep 30 2012, 2:00 AM on T1440: gpgme_op_encrypt_sign fails with GPG_ERR_INV_VALUE when doing symmetric encryption.
Sep 17 2012, 3:02 PM · gpgme, Bug Report
werner added a comment to T1439: Windows: race condition on random_seed.

This is known but a problem from a security POV. The seed file is a cache. If
the seed file can't be read a new one is created. Right, there might be a
performance issue but at least on Windows this is not as severe as on certain
Linux systems.

The non-locking read is on purpose - if it works: okay. Otherwise we
re-generate a seed file. Yes, we could do the file locking and iirc, we do this
in libgcrypt (GnuPG-2).

The error on short reads is also on purpose. We want those 600 bytes at once
and nothing else. If another process is writing the seed file we may see the
short reads. But in this case there is no clear answer waht to do - thus we
assume the "no seed file" case.

Sep 17 2012, 2:59 PM · libgcrypt, Bug Report
werner lowered the priority of T1439: Windows: race condition on random_seed from High to Normal.
Sep 17 2012, 2:59 PM · libgcrypt, Bug Report
werner added a project to T1439: Windows: race condition on random_seed: gnupg.
Sep 17 2012, 2:59 PM · libgcrypt, Bug Report
werner added a project to T1441: Increase Key Size: Won't Fix.
Sep 17 2012, 2:46 PM · Won't Fix, Feature Request
werner closed T1441: Increase Key Size as Resolved.
Sep 17 2012, 2:46 PM · Won't Fix, Feature Request
werner added a comment to T1441: Increase Key Size.

No.

Please read all the long threads on gnupg-users to learn why this is not a good
idea. You may also want to read Ross Anderson's "Security Engineering".

Sep 17 2012, 2:46 PM · Won't Fix, Feature Request

Sep 13 2012

Securityx added a project to T1441: Increase Key Size: Feature Request.
Sep 13 2012, 4:56 AM · Won't Fix, Feature Request

Sep 1 2012

kylehuff added projects to T1440: gpgme_op_encrypt_sign fails with GPG_ERR_INV_VALUE when doing symmetric encryption: Bug Report, gpgme.
Sep 1 2012, 8:47 PM · gpgme, Bug Report
kylehuff set Version to 1.3.2 on T1440: gpgme_op_encrypt_sign fails with GPG_ERR_INV_VALUE when doing symmetric encryption.
Sep 1 2012, 8:47 PM · gpgme, Bug Report
kylehuff added a comment to T1440: gpgme_op_encrypt_sign fails with GPG_ERR_INV_VALUE when doing symmetric encryption.

D159: 359_gpgme_op_encrypt_sign-symmetric.patch

Sep 1 2012, 8:47 PM · gpgme, Bug Report

Aug 29 2012

jegrp added projects to T1439: Windows: race condition on random_seed: Windows, Windows 32, Bug Report.
Aug 29 2012, 6:03 PM · libgcrypt, Bug Report
jegrp set Version to 1.4.12 on T1439: Windows: race condition on random_seed.
Aug 29 2012, 6:03 PM · libgcrypt, Bug Report

Aug 17 2012

gatuno added a comment to T1241: gnupg: need an option to automatically refuse signing photo-ids.

May I ask for the status of this bug?

Aug 17 2012, 9:10 PM · gnupg, Debian, Feature Request
gatuno added a comment to T807: encrypt-to-self option.

Is this going to be implemented in the gnupg 2.x series?

Aug 17 2012, 9:08 PM · gnupg, Feature Request
gatuno added a comment to T1098: Better ordering of "help" output in --edit-key mode.

May I ask what happen with this bug?

Just trying to keep track of these bugs in Debian Bug Tracking System.

Aug 17 2012, 9:06 PM · Documentation, gnupg, Debian, Feature Request

Aug 14 2012

werner removed a project from T1323: Poldi should allow password entry when a card is not inserted: Bug Report.
Aug 14 2012, 8:45 PM · Feature Request, poldi
werner added a project to T1323: Poldi should allow password entry when a card is not inserted: Feature Request.
Aug 14 2012, 8:45 PM · Feature Request, poldi
werner added a comment to T1365: GpgEX IPC Connect fails after some uptime.

Can you please also test with GPA?

Aug 14 2012, 8:44 PM · Bug Report, gpgex, gpg4win
werner added a comment to T1077: GPA does not support symmetric en-/decryption.

Makese sense.

Aug 14 2012, 8:43 PM · gpa, Feature Request
werner closed T1218: Private Key indicated when have/not have as Resolved.
Aug 14 2012, 8:42 PM · Too Old, Bug Report, gpa
werner added a project to T1218: Private Key indicated when have/not have: Too Old.
Aug 14 2012, 8:42 PM · Too Old, Bug Report, gpa
werner added a project to T1250: GPA crash when verifying encryption in clipboard viewer: Too Old.
Aug 14 2012, 8:42 PM · Too Old, gpa, Bug Report
werner closed T1250: GPA crash when verifying encryption in clipboard viewer as Resolved.
Aug 14 2012, 8:42 PM · Too Old, gpa, Bug Report
werner added a comment to T1305: assuan-uds.c:211:3: warning: dereferencing type-punned pointer will break strict-aliasing rules.

Marked as resolved in Gentoo.

Aug 14 2012, 8:41 PM · Gentoo, Feature Request
werner closed T1305: assuan-uds.c:211:3: warning: dereferencing type-punned pointer will break strict-aliasing rules as Resolved.
Aug 14 2012, 8:41 PM · Gentoo, Feature Request
werner added projects to T1388: SSL Certificate for bugs.g10code.com has expired: Feature Request, Too Old.
Aug 14 2012, 8:40 PM · Too Old, Feature Request
werner closed T1388: SSL Certificate for bugs.g10code.com has expired as Resolved.
Aug 14 2012, 8:40 PM · Too Old, Feature Request
werner removed a project from T1388: SSL Certificate for bugs.g10code.com has expired: Bug Report.
Aug 14 2012, 8:40 PM · Too Old, Feature Request