Page MenuHome GnuPG
Feed Advanced Search

Jul 25 2014

werner added a comment to T1646: Include support for signing file digests (e.g. for obs-sign).

No, the patch is a hack which works just for you and not for other environments.

As I already explained a proper solution will be quite complicated and it won't
be the Unix way.

I like to help with the proposed 2.1 solution. However, the fastest thing to do
is to change the system to sign a manifest file. That is more flexible and
makes it easier to add additional signatures.

Jul 25 2014, 3:27 PM · gnupg, Feature Request
werner removed a project from T1674: garbled characters on command line on windows with on-ascii locales: gpg4win.
Jul 25 2014, 3:19 PM · Feature Request, gnupg
werner added a project to T1674: garbled characters on command line on windows with on-ascii locales: gnupg.
Jul 25 2014, 3:19 PM · Feature Request, gnupg
werner removed a project from T1674: garbled characters on command line on windows with on-ascii locales: Bug Report.
Jul 25 2014, 3:18 PM · Feature Request, gnupg
werner added a project to T1674: garbled characters on command line on windows with on-ascii locales: Feature Request.
Jul 25 2014, 3:18 PM · Feature Request, gnupg

Jul 23 2014

strzibny added a comment to T1646: Include support for signing file digests (e.g. for obs-sign).

Any progress on this? Thank you.

Jul 23 2014, 3:41 PM · gnupg, Feature Request

Jul 10 2014

class101 set Version to 2.1.0-beta751 on T1672: 2.1.* and no-use-standard-socket no more supported on Windows ??.
Jul 10 2014, 2:25 PM · Bug Report, gnupg
class101 added projects to T1672: 2.1.* and no-use-standard-socket no more supported on Windows ??: Feature Request, gnupg.
Jul 10 2014, 2:25 PM · Bug Report, gnupg

Jul 8 2014

strzibny added a comment to T1646: Include support for signing file digests (e.g. for obs-sign).

Thanks for your ideas. Nonetheless, this patch is used by OBS project for years
in production so we would like to use this solution we know works fine rather
then creating something else. If you would like to see more how it works
internally, look at sign.c[0] and sign daemon[1].

Can we please get to some resolution? Please tell me whether:
1, you will accept such a patch
2, you would accept with changes
3, you don't want anything alike in gnupg for the moment

For the maintainer of gnupg in Fedora is important that we don't include
something that you would include as well, but differently. Thank you!

[0]https://github.com/openSUSE/obs-sign/blob/master/signc
[1]https://github.com/openSUSE/obs-sign/blob/master/signd

Jul 8 2014, 9:13 AM · gnupg, Feature Request

Jul 4 2014

werner added a comment to T1646: Include support for signing file digests (e.g. for obs-sign).

You should have said this directly ;-) IIRC, we have a similar request
in the bug tracker. The problem here is that you need to save the
internal state of the hash computation, then restore the hash on the
server and continue the hashing, and finally return the state of the
hashing to the signing box which will then finalize it. There are all
kind of complication with that (e.g. marshaling and unmarshaling the
state) so most people turned to the simple and easier to understand
solution of signing a MANIFEST file.

However, with 2.1 it is possible to implement a more elegant solution:
You run gpg on the server and gpg-agent on the client. gpg-agent
takes care of the secret key operations while gpg does the bulk data
and public key stuff. To implement that the gpg<->gpg-agent IPC needs
to be changed from local sockets to TCP over some encrypted tunnel. I
have not checked whether ssh is already able to proxy a local socket -
but if it can do so, you have an instant solution.

Jul 4 2014, 1:33 PM · gnupg, Feature Request

Jul 3 2014

strzibny added a comment to T1646: Include support for signing file digests (e.g. for obs-sign).

Hi,
I see no progress on this RFE report, therefore I want to clarify it more verbosely.
In T1646 (wk on Jun 16 2014, 08:29 AM / Roundup) you asked, why we could not use:

ssh REMOTE 'cd DIR && sha256sum *dat' | gpg -s >files.sig

We could not use this because this will create sign the checksum - not the
payload of this checksum. In other words:
sha256sum create digest, then gpg2 internally create digest of this digest and
will create signature.
What we want to achieve is to bypass creating of digest in gpg2 and accept it as
parameter.

We have 'package build server' and normal signing process means:

  1. copy data to signing server
  2. gpg2 -sb
  3. copy signature back
  4. pass signature to rpmsign

But if the data is some iso/docker image or rpm package several gigabytes big,
then we have bottleneck problem. So we
changed the work-flow to:

  1. make digest of the data
  2. copy digest to signing server
  3. gpg2 -sb --digest-algo <algo> --file-is-digest <digest>
  4. copy signature back
  5. pass signature to rpmsign

If we would do in step 3:

echo <signature> |gpg2 -bs

it would not be signature of header+payload which we want to sign and the
signature would not match.

To sum it up - we want to bypass computation of digest inside of gpg2. As digest
computation is in fact not secret and
it can be delegated somewhere else. Of course you have to trust those
environment which compute that digest. Which we do.
It allows separation of signing server apart from building server and allows us
to secure private keys even more, while
it allows no degradation of performance.

I hope that this clarify it little bit.

Jul 3 2014, 4:34 PM · gnupg, Feature Request
werner added a project to T1661: Gnupg directories not variable in the documentation: Feature Request.
Jul 3 2014, 11:28 AM · Feature Request, Debian, gnupg
werner lowered the priority of T1661: Gnupg directories not variable in the documentation from Normal to Wishlist.
Jul 3 2014, 11:28 AM · Feature Request, Debian, gnupg
werner removed a project from T1661: Gnupg directories not variable in the documentation: Bug Report.
Jul 3 2014, 11:28 AM · Feature Request, Debian, gnupg
werner added a comment to T1665: gpg4win: No HTTPS mirrors available; no HTTPS hash available.

PKIX is entirely broken. Even the most expensive SSL certificate does not get
you any assurance. To avoid man-in-the-middle threats, please check the OpenPGP
signature with an existing version of gpg4win or compare the published
SHA-1checksums with those from the announcement mails.

Jul 3 2014, 11:13 AM · Feature Request, gpg4win
werner added projects to T1665: gpg4win: No HTTPS mirrors available; no HTTPS hash available: gpg4win, Feature Request.
Jul 3 2014, 11:09 AM · Feature Request, gpg4win

Jun 30 2014

werner added a comment to T1042: Auto-generate a revocation certificate?.

Done for 2.1 with commit 03018ef

Jun 30 2014, 4:44 PM · gnupg, Debian, Feature Request
werner closed T1042: Auto-generate a revocation certificate? as Resolved.
Jun 30 2014, 4:44 PM · gnupg, Debian, Feature Request
werner changed Version from 2.x to 2.1 on T1042: Auto-generate a revocation certificate?.
Jun 30 2014, 4:44 PM · gnupg, Debian, Feature Request
werner closed T1653: Always disallow group- and other-readable permission as Resolved.
Jun 30 2014, 9:16 AM · gnupg (gpg21), gnupg, Feature Request
werner added a comment to T1653: Always disallow group- and other-readable permission.

Fic for master with commit c434de4. However decryptyed files are not subject to
this because that would for sure breakk too man applications.

Jun 30 2014, 9:16 AM · gnupg (gpg21), gnupg, Feature Request

Jun 27 2014

tsndcb reopened T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN) as "Open".
Jun 27 2014, 1:16 PM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
tsndcb added a comment to T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN).

Just for my information, do you have done some tests for GnuPG2 on boot (because existant script are based on gpg) ?

Jun 27 2014, 1:16 PM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
werner removed a project from T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN): In Progress.
Jun 27 2014, 12:59 PM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
werner closed T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN) as Resolved.
Jun 27 2014, 12:59 PM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
werner added a comment to T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN).

okay.

Jun 27 2014, 12:59 PM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
tsndcb added a comment to T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN).

Hello Werner,

Jun 27 2014, 11:57 AM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
werner closed T1638: scdaemon: need quirk for Gemalto IDBridge CT30 (aka PC-TR) as Resolved.
Jun 27 2014, 10:18 AM · Feature Request, gnupg, scd
werner removed a project from T1638: scdaemon: need quirk for Gemalto IDBridge CT30 (aka PC-TR): In Progress.
Jun 27 2014, 10:18 AM · Feature Request, gnupg, scd
werner added a comment to T1638: scdaemon: need quirk for Gemalto IDBridge CT30 (aka PC-TR).

Applied to master and 2.0.

Jun 27 2014, 10:18 AM · Feature Request, gnupg, scd
werner added a comment to T1638: scdaemon: need quirk for Gemalto IDBridge CT30 (aka PC-TR).

I'll apply the patch. Thanks.

Jun 27 2014, 9:38 AM · Feature Request, gnupg, scd
werner added a project to T1638: scdaemon: need quirk for Gemalto IDBridge CT30 (aka PC-TR): In Progress.
Jun 27 2014, 9:38 AM · Feature Request, gnupg, scd
werner added a comment to T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN).

I don't think that it is worth the trouble. A pinpad reader make most sense on
desktop machines and there we have 2.x. 1.4 is maintained for use on servers
where card support is anyway hard to operate.

Jun 27 2014, 9:36 AM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
tsndcb added a comment to T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN).

I can confirm to you as I've write last time, but this time with new gnupg2 (2.0.24)
and gnupg (1.4.16) version, than Vega reader works fine with gpg-agent, but failed without it.

Jun 27 2014, 8:38 AM · Won't Fix, gnupg (gpg14), Feature Request, gnupg

Jun 26 2014

thomasq added a comment to T1638: scdaemon: need quirk for Gemalto IDBridge CT30 (aka PC-TR).

It seems that you missed the patch attached to the original submission, which
has all the required info: vendor ID is VENDOR_GEMPC (0x08e6), product ID is
0x3437, and the change to be applied indeed is in the internal CCID driver.

The reader is supported by PC/SC-lite, which never uses non-null NADs.

Jun 26 2014, 2:31 PM · Feature Request, gnupg, scd
gniibe renamed T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN) from reader covadis vega-alpha => cannot used secure PIN to 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN).
Jun 26 2014, 2:03 AM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
gniibe claimed T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN).
Jun 26 2014, 2:03 AM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
gniibe added a comment to T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN).

In 2.1.x (development), scdaemon and its pinpad support has been improved
(including name change from "keypad" support), and it's backported to 2.0.x.

However, it is not backported to 1.4.x. For gpg of 1.4.x, it only works when
you use gpg-agent and scdaemon of 2.?.x.

Some fixes (such as PC/SC support for MacOS) are backported to 1.4.x, though.

For Covadis Vega-Alpha, we would need to backport pinpad support improvement, as
well as CCID driver support improvement (for no auto configuration feature).

Changes are not trivial to merge, I don't know if it's worth for 1.4.x.

Jun 26 2014, 2:03 AM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
gniibe added a comment to T1638: scdaemon: need quirk for Gemalto IDBridge CT30 (aka PC-TR).

Could you please give more information, such as its USB vendor ID and product ID?
I assume that you are using GnuPG's internal CCID driver.
If you have a patch, please attach it here.
Is the reader supported by PC/SC-lite? If so, we could see how it is handled.

Jun 26 2014, 1:35 AM · Feature Request, gnupg, scd
gniibe claimed T1638: scdaemon: need quirk for Gemalto IDBridge CT30 (aka PC-TR).
Jun 26 2014, 1:35 AM · Feature Request, gnupg, scd

Jun 25 2014

werner closed T1548: [PATCH] Allow cert-only keys on smartcards as Resolved.
Jun 25 2014, 9:25 AM · Feature Request, gnupg
werner removed projects from T1548: [PATCH] Allow cert-only keys on smartcards: gnupg (gpg21), forwardport, In Progress.
Jun 25 2014, 9:25 AM · Feature Request, gnupg
werner added a comment to T1548: [PATCH] Allow cert-only keys on smartcards.

Fixed in master.

Jun 25 2014, 9:25 AM · Feature Request, gnupg
werner added a project to T1548: [PATCH] Allow cert-only keys on smartcards: gnupg (gpg21).
Jun 25 2014, 9:20 AM · Feature Request, gnupg
werner added a comment to T1548: [PATCH] Allow cert-only keys on smartcards.

I meant 2.0.24 of course.

Jun 25 2014, 9:20 AM · Feature Request, gnupg
werner removed projects from T1548: [PATCH] Allow cert-only keys on smartcards: gnupg (gpg20), patch.
Jun 25 2014, 9:20 AM · Feature Request, gnupg

Jun 24 2014

werner added projects to T1548: [PATCH] Allow cert-only keys on smartcards: In Progress, forwardport.
Jun 24 2014, 2:53 PM · Feature Request, gnupg
werner added a comment to T1548: [PATCH] Allow cert-only keys on smartcards.

Done for 2.0.14 with commit e790671c

Jun 24 2014, 2:53 PM · Feature Request, gnupg
werner added a project to T1653: Always disallow group- and other-readable permission: gnupg (gpg21).
Jun 24 2014, 2:51 PM · gnupg (gpg21), gnupg, Feature Request
werner added a comment to T1653: Always disallow group- and other-readable permission.

I consider to do this for 2.1

Jun 24 2014, 2:51 PM · gnupg (gpg21), gnupg, Feature Request
werner closed T1655: Expand/modify man explanation on exporting keys as Resolved.
Jun 24 2014, 1:37 PM · gnupg, Feature Request
werner added a comment to T1655: Expand/modify man explanation on exporting keys.

I improved the description in GIT master. This will be used for all
new releases. For 2.1 it reads:

     --export-secret-keys
     --export-secret-subkeys

              Same as --export, but exports the secret keys instead.
              The exported keys are written to STDOUT or to the file
              given with option --output.  This command is often used
              along with the option --armor to allow easy printing of
              the key for paper backup; however the external tool
              paperkey does a better job for creating backups on
              paper.  Note that exporting a secret key can be a
              security risk if the exported keys are send over an
              insecure channel.

              The second form of the command has the special property
              to render the secret part of the primary key useless;
              this is a GNU extension to OpenPGP and other
              implementations can not be expected to successfully
              import such a key.  Its intended use is to generated a
              full key with an additional signing subkey on a
              dedicated machine and then using this command to export
              the key without the primary key to the main machine.

              GnuPG may ask you to enter the passphrase for the key.
              This is required because the internal protection method
              of the secret key is different from the one specified
              in the OpenPGP protocol.

Thanks

Jun 24 2014, 1:37 PM · gnupg, Feature Request

Jun 23 2014

werner added a project to T1548: [PATCH] Allow cert-only keys on smartcards: gnupg (gpg20).
Jun 23 2014, 3:52 PM · Feature Request, gnupg

Jun 22 2014

kingu closed T1657: Improvement of translation string 29 in description.txt of GnuPG as Resolved.
Jun 22 2014, 4:57 PM · patch, gnupg, Feature Request, Not A Bug
kingu added projects to T1657: Improvement of translation string 29 in description.txt of GnuPG: Not A Bug, Feature Request, gnupg, patch.
Jun 22 2014, 3:22 PM · patch, gnupg, Feature Request, Not A Bug

Jun 16 2014

f-a added a comment to T1655: Expand/modify man explanation on exporting keys.

Jun 16 2014, 10:55 PM · gnupg, Feature Request
f-a set Version to 1.4.12 on T1655: Expand/modify man explanation on exporting keys.
Jun 16 2014, 10:55 PM · gnupg, Feature Request
f-a added projects to T1655: Expand/modify man explanation on exporting keys: Feature Request, gnupg.
Jun 16 2014, 10:55 PM · gnupg, Feature Request
werner added projects to T1654: Add group aliases to key listings: Feature Request, gpa.
Jun 16 2014, 8:36 AM · gpa, Feature Request
werner added a comment to T1646: Include support for signing file digests (e.g. for obs-sign).

No. It still does not explain why you need a new option for gpg. Something like

ssh REMOTE 'cd DIR && sha256sum *dat' | gpg -s >files.sig

does what you want.

Jun 16 2014, 8:29 AM · gnupg, Feature Request

Jun 13 2014

istvanchung added projects to T1653: Always disallow group- and other-readable permission: Feature Request, gnupg.
Jun 13 2014, 2:50 AM · gnupg (gpg21), gnupg, Feature Request

Jun 12 2014

strzibny added a comment to T1646: Include support for signing file digests (e.g. for obs-sign).

In our use case we need to sign big RPMs, DVDs and Docker images. We have a
separate signing server to sign those files and sending all content to the
signing server is a huge overhead for us. Therefore we would like to sign only
headers of that files. In our setup we trust both servers so we can assume that
the signed digest of the given file really corresponds to that file.

Is it more clear now?

Jun 12 2014, 2:16 PM · gnupg, Feature Request

Jun 7 2014

tsndcb added a comment to T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN).

Hello Werner,

Jun 7 2014, 8:16 PM · Won't Fix, gnupg (gpg14), Feature Request, gnupg

Jun 6 2014

werner added projects to T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN): In Progress, gnupg (gpg14).
Jun 6 2014, 5:37 PM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
werner added a comment to T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN).

This has recently been discussed at gnupg-devel. We have patches ready for 1.4

Jun 6 2014, 5:37 PM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
werner removed a project from T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN): Restricted Project.
Jun 6 2014, 5:37 PM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
werner added a comment to T1647: configure error: libgpg-error: tests/Makefile.in missing in git repo.

Ah well, you better do not use automake 1.13 - the test suite may or may not
work with that braindead new defaults of that version.

Jun 6 2014, 5:34 PM · Feature Request, Not A Bug, gnupg
werner closed T1647: configure error: libgpg-error: tests/Makefile.in missing in git repo as Resolved.
Jun 6 2014, 5:34 PM · Feature Request, Not A Bug, gnupg
werner added a comment to T1646: Include support for signing file digests (e.g. for obs-sign).

That still does not explain why you need to change gpg for this. I know every
well why a list of checksums is sometimes useful. It is actually a pretty
standard use pattern. I can't see the problem you try to solve.

Jun 6 2014, 5:32 PM · gnupg, Feature Request
werner removed a project from T1648: Missing step in instructions for verifying integrity: Bug Report.
Jun 6 2014, 5:29 PM · gpgweb, Feature Request
werner added projects to T1648: Missing step in instructions for verifying integrity: Feature Request, gpgweb.
Jun 6 2014, 5:29 PM · gpgweb, Feature Request

Jun 3 2014

mschauler added a project to T1647: configure error: libgpg-error: tests/Makefile.in missing in git repo: Feature Request.
Jun 3 2014, 11:08 PM · Feature Request, Not A Bug, gnupg
strzibny added a comment to T1646: Include support for signing file digests (e.g. for obs-sign).

It's because the signer for signing the packages lives on another server and
moving all data there to do the signing is inefficient. Therefore this patch
adds the option to sign files using file digests.

Jun 3 2014, 10:22 AM · gnupg, Feature Request
tsndcb added a comment to T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN).

Hello Yutaka,

Jun 3 2014, 9:56 AM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
gniibe added a comment to T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN).

With current 2.0 branch of git repository, I believe that Vega-Alpha works fine.
Please confirm.

Jun 3 2014, 7:31 AM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
gniibe added a project to T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN): Restricted Project.
Jun 3 2014, 7:31 AM · Won't Fix, gnupg (gpg14), Feature Request, gnupg

Jun 2 2014

werner removed a project from T1417: Unhashed signature subpacket "preferred keyserver" ignored for document signatures: Not A Bug.
Jun 2 2014, 8:09 PM · Feature Request, gnupg

May 30 2014

werner added a comment to T1646: Include support for signing file digests (e.g. for obs-sign).

Please explain why you need new options in gpg.

May 30 2014, 9:45 AM · gnupg, Feature Request

May 27 2014

strzibny added a comment to T1646: Include support for signing file digests (e.g. for obs-sign).

D200: 437_0001-Add-file-is-digest-option.patch

May 27 2014, 11:05 AM · gnupg, Feature Request
strzibny added a comment to T1646: Include support for signing file digests (e.g. for obs-sign).

Adding the right rebased-to-master patch

May 27 2014, 11:05 AM · gnupg, Feature Request
strzibny added projects to T1646: Include support for signing file digests (e.g. for obs-sign): Feature Request, gnupg.
May 27 2014, 9:41 AM · gnupg, Feature Request
strzibny added a comment to T1646: Include support for signing file digests (e.g. for obs-sign).

May 27 2014, 9:41 AM · gnupg, Feature Request

May 20 2014

yanosz added projects to T1643: gpgex context menu should allow symmetric encryption: Feature Request, gpgex.
May 20 2014, 7:45 PM · gpgex, Feature Request
yanosz set Version to 1.0.0 on T1643: gpgex context menu should allow symmetric encryption.
May 20 2014, 7:45 PM · gpgex, Feature Request

May 15 2014

werner added a project to T1641: Add native support for PK 8192: Won't Fix.
May 15 2014, 5:41 PM · gnupg, Feature Request, Won't Fix
werner removed projects from T1641: Add native support for PK 8192: patch, In Progress.
May 15 2014, 5:41 PM · gnupg, Feature Request, Won't Fix
werner closed T1641: Add native support for PK 8192 as Resolved.
May 15 2014, 5:41 PM · gnupg, Feature Request, Won't Fix
werner added a comment to T1641: Add native support for PK 8192.

Won't happen. Please read the FAQ. IF you need to discuss this, please do that
at gnupg-users@

May 15 2014, 5:41 PM · gnupg, Feature Request, Won't Fix
jack.thomas-712349u added projects to T1641: Add native support for PK 8192: In Progress, Feature Request, gnupg, patch.
May 15 2014, 2:51 AM · gnupg, Feature Request, Won't Fix
jack.thomas-712349u set External Link to http://cryptome.org/2014/05/cincinnatus-pk.htm on T1641: Add native support for PK 8192.
May 15 2014, 2:51 AM · gnupg, Feature Request, Won't Fix

May 9 2014

werner added projects to T1638: scdaemon: need quirk for Gemalto IDBridge CT30 (aka PC-TR): scd, Feature Request.
May 9 2014, 4:45 PM · Feature Request, gnupg, scd
werner lowered the priority of T1638: scdaemon: need quirk for Gemalto IDBridge CT30 (aka PC-TR) from Normal to Wishlist.
May 9 2014, 4:45 PM · Feature Request, gnupg, scd

May 5 2014

fk added a comment to T1637: Let gpa detect detached *.asc signatures.

As it turns out the patch also prevents false negatives when
using the "verify" button on the signature file instead of
the signed file.

A couple of screenshots:
http://www.fabiankeil.de/bilder/screenshots/patched-gpa/

May 5 2014, 7:06 PM · gpa, Bug Report
fk added a project to T1637: Let gpa detect detached *.asc signatures: Bug Report.
May 5 2014, 7:06 PM · gpa, Bug Report
fk set Version to 0.9.4 on T1637: Let gpa detect detached *.asc signatures.
May 5 2014, 6:24 PM · gpa, Bug Report
fk added projects to T1637: Let gpa detect detached *.asc signatures: Feature Request, gpa.
May 5 2014, 6:24 PM · gpa, Bug Report
werner closed T1636: Output format option for Textmode conversion as Resolved.
May 5 2014, 4:52 PM · Feature Request, Trash
werner added a project to T1636: Output format option for Textmode conversion: Trash.
May 5 2014, 4:52 PM · Feature Request, Trash
werner added a comment to T1636: Output format option for Textmode conversion.

That was some kind of spam. The attachment was a made up page with an innocent
text linking to some other side.

May 5 2014, 4:51 PM · Feature Request, Trash

May 1 2014

gengshu added a comment to T1636: Output format option for Textmode conversion.

May 1 2014, 4:53 PM · Feature Request, Trash