626_unnamed860 BDownload
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Jun 5 2015
Jun 5 2015
dkg set Version to 0.9.3 on T1996: pinentry-gtk-2 returns an empty passphrase string if typed passphrase is longer than 32 chars.
Jun 4 2015
Jun 4 2015
OK, I'll try that too.
625_unnamed1 KBDownload
I will try this afternoon.
Also, see if you can reproduce the problem without screen. Thanks.
I tried your screen configuration and I couldn't reproduce the problem.
Perhaps putty is configuring something differently. Can you reproduce the
problem when putty is not used (e.g., directly on the console or ssh'ing from a
GNU/Linux box)?
Jun 3 2015
Jun 3 2015
624_unnamed1002 BDownload
On Tue, Jun 2, 2015, 11:19 PM Neal Walfield via BTS <gnupg@bugs.g10code.com>
wrote:
623_.screenrc321 BDownload
Here is my .screenrc
#change the hardstatus settings to give
an window list at the bottom of the
#screen, with the time and date and with
the current window highlighted
hardstatus alwayslastline
hardstatus string '%{= bK}%-Lw%{=
KW}%50>%n%f* %t%{= bK}%+Lw%< %{= kG}%-=%D
%d %M %Y %c:%s%{+b y} %H %l'
deflogin on
shell /usr/bin/bash
vbell on
Thanks for your quick reply. I meant: what program were you running on your
Debian box in screen? I doubt you directly called pinentry. Were you running
mutt? Were you running gpg?
Thanks.
622_unnamed1 KBDownload
I was using PuTTY 6.4 on Windows 7 64 bit.
Jun 1 2015
Jun 1 2015
I just tried running pinentry-curses under screen on debian in an
xfce4-terminal. (You can run it directly from the command line by running
pinentry-curses and then typing 'getpin'.) I wasn't able to reproduce what I
saw in your screenshot. Also, I saw the proper symbolic characters to paint the
widget's borders (see screenshot).
I've make some changes to pinentry-curses recently. Perhaps you can try that
version (git). If you get the same results, does hitting control-L correctly
repaint the screen?
What program were you running? Perhaps it messed with the terminal settings.
May 21 2015
May 21 2015
bjmgeek added projects to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen: pinentry, Debian, Bug Report.
bjmgeek set Version to 0.9.0 on T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.
May 19 2015
May 19 2015
• gniibe added a comment to T1422: Improve misleading message when trying to decrypt a file without the public key available.
Fixed in b3fd30451a5464b124b0296afbc341cb98b3977c.
May 18 2015
May 18 2015
• gniibe added a comment to T1422: Improve misleading message when trying to decrypt a file without the public key available.
Now, we have a patch to fix in the Debian bug tracker.
May 11 2015
May 11 2015
• werner changed Version from 1.4.9 to master on T1098: Better ordering of "help" output in --edit-key mode.
• werner added a project to T1098: Better ordering of "help" output in --edit-key mode: Documentation.
• werner removed a project from T1098: Better ordering of "help" output in --edit-key mode: Stalled.
This is about updating the docs. Will be done for 2.1 only.
• werner added a comment to T1089: Please store requests in a cache to avoid sending out duplicate requests (mailto: interface).
This reminds me that we don't have a mail keyserver in 2.1 yet. Need to
evaluate whether it will be useful.
• werner raised the priority of T1089: Please store requests in a cache to avoid sending out duplicate requests (mailto: interface) from Wishlist to Normal.
(funny due date removed)
Lot of things pertaining to keyservers changed in the meantime and we have a
couple of other things in mind as well.
• werner removed a project from T1792: hkps: Hostname verification uses the wrong hostname: Restricted Project.
• werner set External Link to https://bugs.debian.org/778480 on T1841: gpg-connect-agent: percent+ function doesn't encode '+'.
• werner added a project to T1841: gpg-connect-agent: percent+ function doesn't encode '+': Restricted Project.
I have fixed it for the gca functions percent and percent+ but won't do it in
the generic percent_exacpe C function. Changing the latter may introduce
regressions.
Fixed for 2.0 and 2.1.
Apr 3 2015
Apr 3 2015
• gniibe added a comment to T1509: gnupg2 (gpg-agent): Disable producing of core dumps for gpg-agent via prctl(PR_SET_DUMPABLE, 0) as ssh-agent does.
As I wrote to #712744, distribution nowadays is conservative enough for its
default kernel settings, and it doesn't require each application to have special
settings.
I think that we will be able to close this soon.
Mar 19 2015
Mar 19 2015
• werner added projects to T1792: hkps: Hostname verification uses the wrong hostname: Restricted Project, gnupg.
Thanks. Fixed with commit dc10d46.
Mar 17 2015
Mar 17 2015
The attached patch fixes hkps: hostname verification and makes
hkps: use SNI correctly.
The patch is against GnuPG 2.1.2. It has been tested successfully against
hkps://hkps.pool.sks-keyservers.net on FreeBSD 10.1 using GnuTLS 3.2.21 and the
2.1 setup instructions at https://sks-keyservers.net/overview-of-pools.php#pool_hkps
Mar 16 2015
Mar 16 2015
Feb 17 2015
Feb 17 2015
Feb 16 2015
Feb 16 2015
dkg added projects to T1841: gpg-connect-agent: percent+ function doesn't encode '+': gnupg, Bug Report, Debian.
Feb 4 2015
Feb 4 2015
Jan 27 2015
Jan 27 2015
Jan 26 2015
Jan 26 2015
Should be fixed by commit 017c6f8fba9ae141a46084d6961ba60c4230f97a
on 2014-06-24.
Jan 19 2015
Jan 19 2015
• werner added a comment to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.
Given that it seems not easy to reproduce this bug can you please test
commit 8adb5ff or the attsched patch to see whether this helps.
If it does not help, can you do a gpg build with debug symbols and run your case
again. If possible attach a debugger for a backtrace or produce it with a dump file.
Jan 18 2015
Jan 18 2015
freg set Version to 1.4.18 on T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.
Dec 22 2014
Dec 22 2014
Well, that is quite possible. I have seen other reports about this. I have not
yet come around to look at the hkps bugs.
Dec 20 2014
Dec 20 2014
kyrias added projects to T1792: hkps: Hostname verification uses the wrong hostname: dirmngr, Debian, Bug Report.
Dec 11 2014
Dec 11 2014
• werner added a project to T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable: Not A Bug.
Yes, this is the case for a very long time. I also won't call this a
bug.
There is no way to protect an update by a lock without having write
permissions to the same directory. Well, one could setup a second
file system hierarchy below /var/run and use that for the locking
file. However, this assume that all process accessing the files are
on the local machine. One of the reasons why we can't use a locking
API are remotely mounted file systems. See the comments in
common/dotlock.c .
And yes, we need lock the file even if the local process as no write
permissions to the directory - other processes may have and the
reading process may thus read garbage.
By using --lock-never you assert that there is no other processing
writing to the gpg data files. Thus using this is the Right Thing.
• werner removed a project from T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call: Too Old.
• werner added a comment to T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call.
I assume this is related to T1630 which has been fixed
Dec 8 2014
Dec 8 2014
• werner set External Link to https://bugs.debian.org/771976 on T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable.
Dec 4 2014
Dec 4 2014
oh, and this appears to be the case for 1.4.x, 2.0.x, and 2.1.x
That link to the debian bts is a little wacky, somehow roundup is attaching the
comma to the end of it. it should be: https://bugs.debian.org/771976
dkg added projects to T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable: gnupg, Bug Report, Debian.
Oct 3 2014
Oct 3 2014
• werner set External Link to https://bugs.debian.org/739424 on T1732: Don't break existing keys larger than 4k.
dkg developed a reasonsable patch which will be included in the next 1.4 version.
Oct 2 2014
Oct 2 2014
No bug and I already set this bug to resolved.
Oct 1 2014
Oct 1 2014
Judging by the lack of reply, I assume that this bug won't be fixed, correct?
Sep 26 2014
Sep 26 2014
I read that. It says that RSA-2048 keys are going to be safe until 2030. Doesn't
sound like a lot to me... Considering the average human lifespan, I could be
around until 2070. So, nope, not enough.
If all the emails I sent till now have been intercepted and stored (which seems
to be the case according to Snowden), using a RSA-2048 key simply means that all
my private correspondence is going to be public (or at least accessible) in 16
years time. Now, the only thing I'm asking is to raise the amount of secure
memory allocated by GnuPG to 128k to let people use key sizes up to 16384,
something that was even allowed by the keygen itself.
Please read the FAQ starting with
https://gnupg.org/faq/gnupg-faq.html#default_rsa2048
By the way, is this all bullshit?
AES-256 == RSA-15360 / DSA-15360 (NIST)
http://csrc.nist.gov/groups/SMA/ispab/documents/minutes/2006-03/E_Barker-
March2006-ISPAB.pdf
AES=256 == RSA-15424 / DSA-15424 (ECRYPT2)
http://www.ecrypt.eu.org/documents/D.SPA.20.pdf
Sep 25 2014
Sep 25 2014
Ok, got it. So I can just throw away my key and make a new one?
Fantastic. Thanks a lot.
Sounds a lot like "640K ought to be enough for anybody".
So long, and thanks for all the good work on GnuPG (seriously).
No.
Please read the FAQ on key sizes and if you have a lot of time the countless
discussions on gnupg-users. No, you are not paranoid but you are tuning the
wrong parameters. IT will never be a standard. There will never be any keys
larger than 4k RSA in real use.
Yes, I know how to change the code and make it work on _my_ machine.
There is the tiny problem that everyone else has to do it, too.
Can we make that change the default? I don't see a big problem in using 64k or
128k instead of 32k of secure memory.
By the way, 16k of key size is ridiculous now, but it's going to be kind of
standard in the not so distant future. Or am I too paranoid? :)
Just trying to have a GnuPG key which is future-proof, also taking in
consideration the possible use of quantum computers in the future.
Sorry, there is a limit on the size of secret keys which depends on
several factors. We allow for way longer keys than can be generated
by gpg to take the fuzziness in account, but only up to some limit.
You are on your own if you want to use ridiculous long keys.
Hint: You may increase the size of the secure memory my changing the
line
/* initialize the secure memory. */ got_secmem=secmem_init( 32768 );
in g10/gpg.c. Use a larger value there and it will work.
Sep 17 2014
Sep 17 2014
Sep 3 2014
Sep 3 2014
• werner added a comment to T1622: exits with a fatal error regarding missing trustdb although key is imported.
also fixed in 2.0
Jul 3 2014
Jul 3 2014
• werner added a project to T1661: Gnupg directories not variable in the documentation: Feature Request.
• werner lowered the priority of T1661: Gnupg directories not variable in the documentation from Normal to Wishlist.
• werner removed a project from T1661: Gnupg directories not variable in the documentation: Bug Report.
Jul 1 2014
Jul 1 2014
• aheinecke set External Link to https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725804 on T1661: Gnupg directories not variable in the documentation.
• aheinecke added projects to T1661: Gnupg directories not variable in the documentation: gnupg, Bug Report, Debian.
Jun 30 2014
Jun 30 2014
Done for 2.1 with commit 03018ef
Jun 23 2014
Jun 23 2014
• werner removed a project from T1622: exits with a fatal error regarding missing trustdb although key is imported: Restricted Project.
Mar 7 2014
Mar 7 2014
• werner added a comment to T1622: exits with a fatal error regarding missing trustdb although key is imported.
Also applied to master.