Page MenuHome GnuPG
Feed Advanced Search

Jun 18 2015

yuuma added a comment to T2018: Show passphrase constraint errors as password prompt errors instead of one-button prompts.

D312: 643_0001-Show-passphrase-constraints-errors-as-password-promp.patch

Jun 18 2015, 5:21 AM · Bug Report, gnupg

Jun 17 2015

lenharo added a comment to T2015: GET_PASSPHRASE with --no-ask always return error in gnupg 2.1.5.

Jun 17 2015, 5:36 PM · gpgagent, Bug Report, gnupg
lenharo added a comment to T2015: GET_PASSPHRASE with --no-ask always return error in gnupg 2.1.5.

Sorry not giving you more details at first time. Actually I'm using
gpg-preset-passphrase.
Executing the steps you mentioned works for me as well. The problem seems to be
when gpg-preset-passphrase is used.

$ gpg-connect-agent 'getinfo version' /bye

D 2.1.5

OK

$ echo "asd"|/usr/lib/gnupg/gpg-preset-passphrase --preset XXXXXXXXXX

$ gpg-connect-agent 'GET_PASSPHRASE --no-ask XXXXXXXXXX a a a' /bye
ERR 67108922 No data <GPG Agent>

-------

$ gpg-connect-agent 'getinfo version' /bye

D 2.1.4

OK

$ echo "asd"|/usr/lib/gnupg/gpg-preset-passphrase --preset XXXXXXXXXX

$ gpg-connect-agent 'GET_PASSPHRASE --no-ask XXXXXXXXXX a a a' /bye
OK 617364

Distro: Archlinux 64bit

Jun 17 2015, 4:44 PM · gpgagent, Bug Report, gnupg
rdieter added a comment to T2017: consider using $XDG_RUNTIME_DIR for gpg-agent socket communication.

Followup details about XDG_RUNTIME_DIR if you're not familiar, see:
http://standards.freedesktop.org/basedir-spec/basedir-spec-latest.html

"$XDG_RUNTIME_DIR defines the base directory relative to which user-specific non-
essential runtime files and other file objects (such as sockets, named pipes,
...) should be stored. The directory MUST be owned by the user, and he MUST be
the only one having read and write access to it. Its Unix access mode MUST be
0700.

The lifetime of the directory MUST be bound to the user being logged in. It MUST
be created when the user first logs in and if the user fully logs out the
directory MUST be removed. If the user logs in more than once he should get
pointed to the same directory, and it is mandatory that the directory continues
to exist from his first login to his last logout on the system, and not removed
in between. Files in the directory MUST not survive reboot or a full logout/login
cycle.

The directory MUST be on a local file system and not shared with any other
system. The directory MUST by fully-featured by the standards of the operating
system. More specifically, on Unix-like operating systems AF_UNIX sockets,
symbolic links, hard links, proper permissions, file locking, sparse files,
memory mapping, file change notifications, a reliable hard link count must be
supported, and no restrictions on the file name character set should be imposed.
Files in this directory MAY be subjected to periodic clean-up. To ensure that
your files are not removed, they should have their access time timestamp modified
at least once every 6 hours of monotonic time or the 'sticky' bit should be set
on the file.

If $XDG_RUNTIME_DIR is not set applications should fall back to a replacement
directory with similar capabilities and print a warning message. Applications
should use this directory for communication and synchronization purposes and
should not place larger files in it, since it might reside in runtime memory and
cannot necessarily be swapped out to disk."

Jun 17 2015, 3:35 PM · Won't Fix, gnupg, Feature Request
rdieter added projects to T2017: consider using $XDG_RUNTIME_DIR for gpg-agent socket communication: Feature Request, gnupg.
Jun 17 2015, 3:33 PM · Won't Fix, gnupg, Feature Request
rdieter set Version to 2.1 on T2017: consider using $XDG_RUNTIME_DIR for gpg-agent socket communication.
Jun 17 2015, 3:33 PM · Won't Fix, gnupg, Feature Request
werner added a comment to T2016: write-env-file fails sliently with enable-ssh-support.

Done with commit 010d26a for 2.1.6

Jun 17 2015, 1:02 PM · gnupg, Feature Request
werner closed T2016: write-env-file fails sliently with enable-ssh-support as Resolved.
Jun 17 2015, 1:02 PM · gnupg, Feature Request
aheinecke added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

In valgrind it did not crash. The keylisting exited normally. But showed several
errors.

Attached is the valigrind log.

Jun 17 2015, 12:57 PM · gnupg, Bug Report, S/MIME, dirmngr
aheinecke added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

Jun 17 2015, 12:57 PM · gnupg, Bug Report, S/MIME, dirmngr
werner lowered the priority of T2016: write-env-file fails sliently with enable-ssh-support from Normal to Wishlist.
Jun 17 2015, 12:39 PM · gnupg, Feature Request
werner removed a project from T2016: write-env-file fails sliently with enable-ssh-support: Bug Report.
Jun 17 2015, 12:39 PM · gnupg, Feature Request
werner added a project to T2016: write-env-file fails sliently with enable-ssh-support: Feature Request.
Jun 17 2015, 12:39 PM · gnupg, Feature Request
werner added a comment to T2016: write-env-file fails sliently with enable-ssh-support.

You need to to set SSH_AUTH_SOCK yourself. See the example section in the
gpg-agent man page.

I will consider to print a warning.

Jun 17 2015, 12:39 PM · gnupg, Feature Request
werner added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

Can you start dirmngr under valgrind?

gpgconf --kill dirmngr
valgrind --log-file=vg.log dirmngr --daemon --homedir /my/gnupg/home/dir

Jun 17 2015, 12:32 PM · gnupg, Bug Report, S/MIME, dirmngr
Vality set Version to 2.1.4 on T2016: write-env-file fails sliently with enable-ssh-support.
Jun 17 2015, 11:26 AM · gnupg, Feature Request
Vality added projects to T2016: write-env-file fails sliently with enable-ssh-support: gnupg, Bug Report.
Jun 17 2015, 11:26 AM · gnupg, Feature Request
aheinecke added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

I've compiled current master and it works for the testcase. But when I start
kleopatra and it runs the keylist/verify dirmngr now crashes.

Can be triggered with gpgme: run-keylist --validate --cms

It crashes at different points but it never gets through all my certificates.

An example of the debug output that is collected before it crashes (differs
between crashes):

2015-06-16 19:09:15 dirmngr[9303.1] no CRL available for issuer id
18F071EAAC08885C9434A7DE1DB3AFC30F27DD32
2015-06-16 19:09:15 dirmngr[9303.1] DBG: chan_1 -> INQUIRE SENDCERT
2015-06-16 19:09:15 dirmngr[9303.1] DBG: chan_1 <- [ 44 20 30 82 04 7d 30 82 03
65 a0 03 02 01 02 02 ...(982 byte(s) skipped) ]
2015-06-16 19:09:15 dirmngr[9303.1] DBG: chan_1 <- [ 44 20 14 34 6d f5 07 c2 04
86 4a ba a1 71 50 b0 ...(187 byte(s) skipped) ]
2015-06-16 19:09:15 dirmngr[9303.1] DBG: chan_1 <- END
2015-06-16 19:09:15 dirmngr[9303.1] checking distribution points
2015-06-16 19:09:15 dirmngr[9303.1] no distribution point - trying issuer name
2015-06-16 19:09:15 dirmngr[9303.1] fetching CRL from default location
2015-06-16 19:09:15 dirmngr[9303.1] ldap wrapper 10199 started (reader
0x00007f6a580337a0)
2015-06-16 19:09:15 dirmngr[9303.0] ldap wrapper 10198 ready: exitcode=1
2015-06-16 19:09:15 dirmngr[9303.0] ldap worker stati:
2015-06-16 19:09:15 dirmngr[9303.0] c=0x00007f6a58033740 pid=10199/10199
rdr=0x00007f6a580337a0 ctrl=0x00007f6a580008c0/1 la=1434474555 rdy=0
2015-06-16 19:09:15 dirmngr[9303.0] c=0x00007f6a58022520 pid=-1/10198
rdr=0x0000000000000000 ctrl=0x0000000000000000/0 la=1434474554 rdy=1
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10199]: processing url 'ldap://'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10199]: host
'directory.verisign.com'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10199]: port 389
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10198]: processing url 'ldap://'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10198]: host
'directory.verisign.com'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10198]: port 389
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10199]: DN
'1.2.840.113549.1.9.1=#4865696E65636B656E40676D61696C2E636F6D,CN=Common
Name,ST=Some-State,C=DE'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10199]: filter
'objectClass=*'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10199]: attr
'certificateRevocationList'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10198]: DN
'1.2.840.113549.1.9.1=#4865696E65636B656E40676D61696C2E636F6D,CN=Common
Name,ST=Some-State,C=DE'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10198]: filter
'objectClass=*'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10198]: attr
'certificateRevocationList'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10198]: searching 'ldap://'
failed: No such object
2015-06-16 19:09:15 dirmngr[9303.0] ldap worker stati:
2015-06-16 19:09:15 dirmngr[9303.0] c=0x00007f6a58033740 pid=10199/10199
rdr=0x00007f6a580337a0 ctrl=0x00007f6a580008c0/1 la=1434474555 rdy=0
2015-06-16 19:09:15 dirmngr[9303.0] c=0x00007f6a58022520 pid=-1/10198
rdr=0x0000000000000000 ctrl=0x0000000000000000/0 la=1434474555 rdy=1
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10199]: searching 'ldap://'
failed: No such object
2015-06-16 19:09:15 dirmngr[9303.0] ldap wrapper 10199 ready: exitcode=1
2015-06-16 19:09:15 dirmngr[9303.0] ldap worker stati:
2015-06-16 19:09:15 dirmngr[9303.0] c=0x00007f6a58033740 pid=-1/10199
rdr=0x0000000000000000 ctrl=0x00007f6a580008c0/1 la=1434474555 rdy=1

Backtrace for this log (also differs):

#0 0x00007f6a69109cc9 in GI_raise (sig=sig@entry=6) at
../nptl/sysdeps/unix/sysv/linux/raise.c:56
#1 0x00007f6a6910d0d8 in
GI_abort () at abort.c:89
#2 0x00007f6a69146394 in __libc_message (do_abort=do_abort@entry=1,

fmt=fmt@entry=0x7f6a69254b28 "*** Error in `%s': %s: 0x%s ***\n") at

../sysdeps/posix/libc_fatal.c:175
#3 0x00007f6a6915266e in malloc_printerr (ptr=<optimized out>,
str=0x7f6a69254cf0 "double free or corruption (fasttop)", action=1)

at malloc.c:4996

#4 _int_free (av=<optimized out>, p=<optimized out>, have_lock=0) at malloc.c:3840
#5 0x00007f6a69d4fd2d in ?? () from /opt/gnupg/lib/libgcrypt.so.20
#6 0x0000000000428802 in ldap_wrapper (ctrl=ctrl@entry=0x7f6a580008c0,
reader=reader@entry=0x7f6a64c05cd0,

argv=argv@entry=0x7f6a64c05a80) at ldap-wrapper.c:772

#7 0x000000000042218c in run_ldap_wrapper (ctrl=ctrl@entry=0x7f6a580008c0,
multi_mode=multi_mode@entry=0, proxy=0x0,

host=<optimized out>, port=<optimized out>, user=<optimized out>, pass=0x0, 
dn=dn@entry=0x7f6a58001d50

"1.2.840.113549.1.9.1=#4865696E65636B656E40676D61696C2E636F6D,CN=Common
Name,ST=Some-State,C=DE",

filter=filter@entry=0x44dcc1 "objectClass=*", attr=attr@entry=0x44b50a

"certificateRevocationList", url=url@entry=0x0,

reader=reader@entry=0x7f6a64c05cd0, ignore_timeout=0) at ldap.c:191

#8 0x00000000004228ea in attr_fetch_ldap (ctrl=0x7f6a580008c0,

dn=0x7f6a58001d50

"1.2.840.113549.1.9.1=#4865696E65636B656E40676D61696C2E636F6D,CN=Common
Name,ST=Some-State,C=DE",

attr=attr@entry=0x44b50a "certificateRevocationList",

reader=reader@entry=0x7f6a64c05cd0) at ldap.c:287
#9 0x0000000000414aed in crl_fetch_default (ctrl=ctrl@entry=0x7f6a580008c0,

issuer=issuer@entry=0x7f6a58001d50

"1.2.840.113549.1.9.1=#4865696E65636B656E40676D61696C2E636F6D,CN=Common
Name,ST=Some-State,C=DE", reader=reader@entry=0x7f6a64c05cd0) at crlfetch.c:319
#10 0x000000000041439d in crl_cache_reload_crl (ctrl=ctrl@entry=0x7f6a580008c0,
cert=0x7f6a58002740) at crlcache.c:2554
#11 0x000000000040e1d5 in inquire_cert_and_load_crl (ctx=0x7f6a58000950) at
server.c:589
#12 cmd_isvalid (ctx=0x7f6a58000950, line=<optimized out>) at server.c:901
#13 0x00007f6a6a23e96a in ?? () from /opt/gnupg/lib/libassuan.so.0
#14 0x00007f6a6a23ed49 in assuan_process () from /opt/gnupg/lib/libassuan.so.0
#15 0x000000000040edc7 in start_command_handler (fd=fd@entry=1) at server.c:2243
#16 0x000000000040ada5 in start_connection_thread (arg=arg@entry=0x1) at
dirmngr.c:1937
#17 0x00007f6a69908dbc in thread_start (startup_arg=<optimized out>) at npth.c:265
#18 0x00007f6a696f1182 in start_thread (arg=0x7f6a64c06700) at pthread_create.c:312
#19 0x00007f6a691cd47d in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:111

A different backtrace:

#0 0x00007fe9e9805cc9 in GI_raise (sig=sig@entry=6) at
../nptl/sysdeps/unix/sysv/linux/raise.c:56
#1 0x00007fe9e98090d8 in
GI_abort () at abort.c:89
#2 0x00007fe9e9842394 in __libc_message (do_abort=do_abort@entry=1,

fmt=fmt@entry=0x7fe9e9950b28 "*** Error in `%s': %s: 0x%s ***\n") at

../sysdeps/posix/libc_fatal.c:175
#3 0x00007fe9e984dac2 in malloc_printerr (ptr=<optimized out>,
str=0x7fe9e994cbfc "corrupted double-linked list", action=1)

at malloc.c:4996

#4 malloc_consolidate (av=av@entry=0x7fe9d8000020) at malloc.c:4165
#5 0x00007fe9e984edf8 in _int_malloc (av=0x7fe9d8000020, bytes=1025) at
malloc.c:3423
#6 0x00007fe9e98517b0 in GI_libc_malloc (bytes=1025) at malloc.c:2891
#7 0x00007fe9ea44ad11 in ?? () from /opt/gnupg/lib/libgcrypt.so.20
#8 0x00007fe9ea44bc19 in ?? () from /opt/gnupg/lib/libgcrypt.so.20
#9 0x00007fe9ea93b284 in init_membuf (maxlen=0, initiallen=<optimized out>,
mb=0x7fe9e53018e0, ctx=0x7fe9d8000950)

at assuan-inquire.c:64

#10 assuan_inquire (ctx=ctx@entry=0x7fe9d8000950, keyword=keyword@entry=0x44774b
"SENDCERT",

r_buffer=r_buffer@entry=0x7fe9e5301d50,

r_length=r_length@entry=0x7fe9e5301d60, maxlen=maxlen@entry=0) at
assuan-inquire.c:169
#11 0x000000000040dfca in inquire_cert_and_load_crl (ctx=0x7fe9d8000950) at
server.c:567
#12 cmd_isvalid (ctx=0x7fe9d8000950, line=<optimized out>) at server.c:901
#13 0x00007fe9ea93a96a in dispatch_command (ctx=0x7fe9d8000950, line=<optimized
out>, linelen=<optimized out>)

at assuan-handler.c:675

#14 0x00007fe9ea93ad49 in process_request (ctx=0x7fe9d8000950) at
assuan-handler.c:871
#15 assuan_process (ctx=0x7fe9d8000950) at assuan-handler.c:894
#16 0x000000000040edc7 in start_command_handler (fd=fd@entry=6) at server.c:2243
#17 0x000000000040ada5 in start_connection_thread (arg=arg@entry=0x6) at
dirmngr.c:1937
#18 0x00007fe9ea004dbc in thread_start (startup_arg=<optimized out>) at npth.c:265
#19 0x00007fe9e9ded182 in start_thread (arg=0x7fe9e5302700) at pthread_create.c:312
#20 0x00007fe9e98c947d in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:111

Jun 17 2015, 10:02 AM · gnupg, Bug Report, S/MIME, dirmngr
werner added a comment to T2015: GET_PASSPHRASE with --no-ask always return error in gnupg 2.1.5.

Sorry, I can't replicate this. First I enter "123" as passphrase
using

  $ gpg-connect-agent 'GET_PASSPHRASE  XXXXXXXXXX a a a' /bye
  OK 616263

Then I ask for it with --no-ask

  $ gpg-connect-agent 'GET_PASSPHRASE --no-ask XXXXXXXXXX a a a' /bye
  OK 616263

Now let's delete it from the cache:

  $ gpgconf --reload gpg-agent

and ask again:

  $ gpg-connect-agent 'GET_PASSPHRASE --no-ask XXXXXXXXXX a a a' /bye
  ERR 67108922 No data <GPG Agent>
  OK

I am using

  $ gpg-connect-agent 'getinfo version' /bye
  D 2.1.6-beta3

but that did not changed things in this part of GnuPG.

Jun 17 2015, 8:54 AM · gpgagent, Bug Report, gnupg
werner added a comment to T2000: PGP-2 Keys are handled as if their Fingerprint is always zero.

Fixed with commit be34857.

PGP-2 fingerprints are enabled again but a warning is printed. There is no need
to reject the signature because the key itself maybe valid if it uses non-MD5
self-signatures. GUIs however should detect a 16 byte fingerprint and also
print an appropriate warning.

Jun 17 2015, 8:43 AM · Bug Report, gnupg
werner added a project to T2000: PGP-2 Keys are handled as if their Fingerprint is always zero: Restricted Project.
Jun 17 2015, 8:43 AM · Bug Report, gnupg

Jun 16 2015

lenharo added projects to T2015: GET_PASSPHRASE with --no-ask always return error in gnupg 2.1.5: gnupg, Bug Report.
Jun 16 2015, 6:46 PM · gpgagent, Bug Report, gnupg
werner added a comment to T1838: Dirmngr ldap CRL checks leave zombie dirmngr_ldap processes (2.1.x).

Weel, your patch defeated the code to properly log all output from the ldap
helper and only then cleanup the wrappers. For the actual fix please see T1978.

Fixed with commit 685b782.

Jun 16 2015, 6:18 PM · Duplicate, gnupg, Bug Report, dirmngr
werner closed T1838: Dirmngr ldap CRL checks leave zombie dirmngr_ldap processes (2.1.x) as Resolved.
Jun 16 2015, 6:18 PM · Duplicate, gnupg, Bug Report, dirmngr
werner added a comment to T1838: Dirmngr ldap CRL checks leave zombie dirmngr_ldap processes (2.1.x).

Duplicate of T1978

Jun 16 2015, 6:16 PM · Duplicate, gnupg, Bug Report, dirmngr
werner added a project to T1838: Dirmngr ldap CRL checks leave zombie dirmngr_ldap processes (2.1.x): Duplicate.
Jun 16 2015, 6:16 PM · Duplicate, gnupg, Bug Report, dirmngr
werner added a project to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating: Restricted Project.
Jun 16 2015, 6:15 PM · gnupg, Bug Report, S/MIME, dirmngr
werner added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

Well, there was the ldap-reaper thread still running and due to a bug in the log
output handing code it was not able to remove its context structures and thus it
kept on spinning.

Fixed with commit 685b782.

Jun 16 2015, 6:15 PM · gnupg, Bug Report, S/MIME, dirmngr
neal added projects to T2014: pinentry offers to save symmetric passwords in libsecret: gnupg, Bug Report.
Jun 16 2015, 4:34 PM · Feature Request, gnupg
neal added a comment to T2009: max-cache-ttl appears to be ignored if default-cache-ttl is unset.

D310: 640_0001-Don-t-raise-max-cache-ttl-to-default-cache-ttl.patch

Jun 16 2015, 4:15 PM · Bug Report, gnupg
neal added a comment to T2009: max-cache-ttl appears to be ignored if default-cache-ttl is unset.

The attached patch fixes this problem, by not adjusting opt.max_cache_ttl or
opt.max_cache_ttl_ssh. Okay to apply?

Jun 16 2015, 4:15 PM · Bug Report, gnupg
neal closed T1976: loopback pinentry mode asks passphrase twice on symmetric encryption as Resolved.
Jun 16 2015, 4:07 PM · Bug Report, gnupg
neal added a comment to T1976: loopback pinentry mode asks passphrase twice on symmetric encryption.

I've now pushed this to master.

Jun 16 2015, 4:07 PM · Bug Report, gnupg
neal added a comment to T1976: loopback pinentry mode asks passphrase twice on symmetric encryption.

D300: 639_0001-Don-t-prompt-for-the-password-multiple-times-in-pine.patch

Jun 16 2015, 4:05 PM · Bug Report, gnupg
neal added a comment to T1976: loopback pinentry mode asks passphrase twice on symmetric encryption.

The attached patch forces opt.passphrase_repeat to 0 if we are in pinentry
loopback mode.

Jun 16 2015, 4:05 PM · Bug Report, gnupg
werner added projects to T2012: Add support for keyservers specified as IP address: dirmngr, gnupg (gpg21), gnupg, Bug Report.
Jun 16 2015, 10:40 AM · Bug Report, gnupg, gnupg (gpg21), dirmngr
werner set Version to 2.1 on T2012: Add support for keyservers specified as IP address.
Jun 16 2015, 10:40 AM · Bug Report, gnupg, gnupg (gpg21), dirmngr
werner added a comment to T2011: gnupg should notify cancellation of its operation to gpg-agent to kill pinentry.

Just checked:

  /* Reset the pinentry (in case of popup messages). */
  agent_reset_query (ctrl);

Thus the pinentry is only closed if it is used as a simple popup winode (e.g.
"Insert card with serial number xxx") but not for a regular Pinentry.

Jun 16 2015, 9:10 AM · Bug Report, gpgagent
werner added a comment to T2011: gnupg should notify cancellation of its operation to gpg-agent to kill pinentry.

Actually there should be no need for gpg to notigy gpg-agent and thus pinentry
about a Ctrl-C. Due to Ctrl-C the gpg process dies and thus the connection to
gpg-agent receives an EOF/SIGPIPE and gpg-agent will shuot it down. Thus the
connection cleanup handler of gpg-agent needs to kill an open pinentry - I
tought this is already done.

Or is it the case that gpg does not see the Ctrl-C?

Jun 16 2015, 9:07 AM · Bug Report, gpgagent
gniibe closed T1846: gpg2.1 keytocard removes secret key as Resolved.
Jun 16 2015, 6:25 AM · Bug Report, gnupg
gniibe removed a project from T1846: gpg2.1 keytocard removes secret key: Restricted Project.
Jun 16 2015, 6:25 AM · Bug Report, gnupg
gniibe added a comment to T1846: gpg2.1 keytocard removes secret key.

Fixed in 2.1.3.

Jun 16 2015, 6:25 AM · Bug Report, gnupg
gniibe closed T1930: PATCH: Be more flexible on PC/SC reader selection as Resolved.
Jun 16 2015, 6:22 AM · gnupg, Feature Request, scd
gniibe removed a project from T1930: PATCH: Be more flexible on PC/SC reader selection: Restricted Project.
Jun 16 2015, 6:22 AM · gnupg, Feature Request, scd
gniibe added a comment to T1930: PATCH: Be more flexible on PC/SC reader selection.

Fixed in 2.0.28 (and in 2.1.x).

Jun 16 2015, 6:22 AM · gnupg, Feature Request, scd
gniibe added a comment to T2004: scd: insufficient buffer error when using reader pinpad.

D309: 638_scd-add-zero.diff

Jun 16 2015, 6:13 AM · Bug Report, gnupg
gniibe added a comment to T2004: scd: insufficient buffer error when using reader pinpad.

Thank you for your testing.
For in-stock CCID driver, could you please test this patch?
For PC/SC, I'm going to investigate the issue.

Jun 16 2015, 6:13 AM · Bug Report, gnupg
gniibe added projects to T2011: gnupg should notify cancellation of its operation to gpg-agent to kill pinentry: gpgagent, pinentry, gnupg, Bug Report.
Jun 16 2015, 4:40 AM · Bug Report, gpgagent

Jun 15 2015

asdil12 added a comment to T2004: scd: insufficient buffer error when using reader pinpad.

(1) pinpadtest.py with no option works? Prompt on the reader? And you can input PIN?

The padlock LED on the reader blinks and I enter the pin. When I press
the green return button on the reader, the traceback is shown.
Also the PIN retry counter is decremented (which was quite a cavecat for
debugging)

Jun 15 2015, 5:02 PM · Bug Report, gnupg
gniibe removed a project from T1675: gpg --verify has race conditions when used concurrently: Restricted Project.
Jun 15 2015, 7:49 AM · gnupg, Bug Report
gniibe closed T1675: gpg --verify has race conditions when used concurrently as Resolved.
Jun 15 2015, 7:49 AM · gnupg, Bug Report
gniibe added a comment to T1675: gpg --verify has race conditions when used concurrently.

Fixed in master which was released as 2.1.5.
Fixed in the repo of 1.4 and 2.0.

Jun 15 2015, 7:49 AM · gnupg, Bug Report

Jun 12 2015

neal updated subscribers of T2009: max-cache-ttl appears to be ignored if default-cache-ttl is unset.
Jun 12 2015, 11:35 PM · Bug Report, gnupg
neal assigned T2009: max-cache-ttl appears to be ignored if default-cache-ttl is unset to werner.
Jun 12 2015, 11:35 PM · Bug Report, gnupg
neal set Version to 2.1 on T2009: max-cache-ttl appears to be ignored if default-cache-ttl is unset.
Jun 12 2015, 11:35 PM · Bug Report, gnupg
neal added projects to T2009: max-cache-ttl appears to be ignored if default-cache-ttl is unset: gnupg, Bug Report.
Jun 12 2015, 11:35 PM · Bug Report, gnupg
dkg added a comment to T1951: gpg-agent needs an API to verify a passphrase.

Hm, you make a good point about this being undesirable in the general case --
access to a normal gpg-agent shouldn't provide an attacker with a way to guess
passwords silently.

However, consider the mailpile case -- where gpg-agent is running on the
webserver, and the login webpage wants to verify a given user based on the
password for the user's secret key (and wants to avoid keeping some extra
/etc/shadow-equivalent file lying around).

Maybe such an application would start gpg-agent in a different/simpler mode? Or
should we recommend that such an application test the provided passphrase in
some other way, without using gpg-agent at all?

Jun 12 2015, 6:34 PM · gnupg, Feature Request, gpgagent
neal added a comment to T1825: Add a re-encrypt to additional key.

Does encrypt-to/hidden-encrypt-to in gpg.conf do this?

Jun 12 2015, 4:12 PM · gpd5x (gpd-5.0.0), gnupg26, Feature Request
neal added a comment to T1945: pin entry prompt should include more structured metadata.

This feature has landed in the latest 2.0 and 2.1 branches and support has been
added in pinentry. I'm closing this now.

Jun 12 2015, 4:03 PM · Feature Request, gnupg
neal removed a project from T1945: pin entry prompt should include more structured metadata: Restricted Project.
Jun 12 2015, 4:03 PM · Feature Request, gnupg
neal closed T1945: pin entry prompt should include more structured metadata as Resolved.
Jun 12 2015, 4:03 PM · Feature Request, gnupg
neal added a comment to T1951: gpg-agent needs an API to verify a passphrase.

Hi dkg,

On the mailing list and in T1928, we discussed
why it shouldn't be possible for a program to pass the passphrase to gpg agent.
This feature request is at odds with the conclusion drawn there. Should this
issue be closed as WONTFIX?

Thanks,

:) Neal

Jun 12 2015, 4:01 PM · gnupg, Feature Request, gpgagent
neal added a comment to T1954: Password too long.

Hi, thomai,

Please run something like the following:

  echo | gpg2 --sign

Does gpg2 complain the the connection to gpg agent was hijacked? If so, please
disable GNOME Keyring and try to reproduce the problem.

If the problem continues to exist, can you tell me approximately how long your
password is?

Thanks,

Neal

Jun 12 2015, 3:56 PM · Info Needed, gnupg (gpg20), Bug Report, gnupg
werner claimed T1838: Dirmngr ldap CRL checks leave zombie dirmngr_ldap processes (2.1.x).
Jun 12 2015, 1:55 PM · Duplicate, gnupg, Bug Report, dirmngr
werner claimed T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.
Jun 12 2015, 1:55 PM · gnupg, Bug Report, S/MIME, dirmngr
werner set Due Date to Jun 20 2015, 2:00 AM on T1838: Dirmngr ldap CRL checks leave zombie dirmngr_ldap processes (2.1.x).
Jun 12 2015, 1:49 PM · Duplicate, gnupg, Bug Report, dirmngr
gniibe claimed T2004: scd: insufficient buffer error when using reader pinpad.
Jun 12 2015, 1:09 PM · Bug Report, gnupg
gniibe added a comment to T2004: scd: insufficient buffer error when using reader pinpad.

Let's confirm facts.
(1) pinpadtest.py with no option works? Prompt on the reader? And you can input PIN?
(2) Or else, pinpadtest.py --add works?
(3) When (1) and (2) fail, pinpadtest.py --pinmin 6 --pinmax 15 works?
(4) When (1), (2), and (3) fail, pinpadtest.py --pinmin 6 --pinmax 15 --add works?

Jun 12 2015, 1:09 PM · Bug Report, gnupg
asdil12 added a comment to T2004: scd: insufficient buffer error when using reader pinpad.

I'm pretty sure that the reader supports varlength pinpad input - it is the same
device that was used here: T1549

Jun 12 2015, 9:27 AM · Bug Report, gnupg
gniibe added a comment to T2004: scd: insufficient buffer error when using reader pinpad.

asdil12 <dominik@heidler.eu> added the comment:

Same error when using gnupg's CCID.

Jun 12 2015, 7:54 AM · Bug Report, gnupg
gniibe added a comment to T2004: scd: insufficient buffer error when using reader pinpad.

Thank you for testing.

Jun 12 2015, 4:13 AM · Bug Report, gnupg

Jun 11 2015

florianfieber added projects to T2008: --list-options broken when using --with-colons: gnupg, Bug Report.
Jun 11 2015, 6:07 PM · Bug Report, gnupg
florianfieber set Version to 2.1.5 on T2008: --list-options broken when using --with-colons.
Jun 11 2015, 6:07 PM · Bug Report, gnupg
asdil12 added a comment to T2004: scd: insufficient buffer error when using reader pinpad.

Jun 11 2015, 3:49 PM · Bug Report, gnupg
asdil12 added a comment to T2004: scd: insufficient buffer error when using reader pinpad.

Same error when using gnupg's CCID.

Jun 11 2015, 3:49 PM · Bug Report, gnupg
asdil12 added a comment to T2004: scd: insufficient buffer error when using reader pinpad.

$ ./pinpadtest.py
Reader/Token: Cherry GmbH SmartTerminal ST-2xxx [Vendor Interface] (000004fa) 00 00
ATR: 3B DA 18 FF 81 B1 FE 75 1F 03 00 31 C5 73 C0 01 40 00 90 00 0C
Please input User's PIN
Traceback (most recent call last):

File "./pinpadtest.py", line 378, in <module>
  main(who, method, add_a_byte, pinmin, pinmax, change_by_two_steps, fixed)
File "./pinpadtest.py", line 242, in main
  card.cmd_verify_pinpad(who)
File "./pinpadtest.py", line 138, in cmd_verify_pinpad
  raise ValueError, ("cmd_verify_pinpad %02x %02x" % (sw1, sw2))

ValueError: cmd_verify_pinpad 69 82

Jun 11 2015, 3:40 PM · Bug Report, gnupg

Jun 10 2015

gniibe added a comment to T2004: scd: insufficient buffer error when using reader pinpad.

When you are using PC/SC service and Python and pyscard works
well on your system, please try my pinpadtest.py script.

Jun 10 2015, 11:33 AM · Bug Report, gnupg

Jun 9 2015

werner removed Due Date on T1661: Gnupg directories not variable in the documentation.
Jun 9 2015, 9:33 PM · Feature Request, Debian, gnupg
werner added a project to T1661: Gnupg directories not variable in the documentation: Restricted Project.
Jun 9 2015, 9:33 PM · Feature Request, Debian, gnupg
werner added a comment to T1661: Gnupg directories not variable in the documentation.

Done with commit 25331bb for 2.1.5.
Won't be backported to 2.0 or 1.4.

This also changes the publication date to the date of the last commit for one of
the texi files. This was the original intention of the version.texi file but
that did not worked in a git world.

Jun 9 2015, 9:33 PM · Feature Request, Debian, gnupg
gniibe added a comment to T2004: scd: insufficient buffer error when using reader pinpad.

Thank you for your registering an issue at BTS.

Jun 9 2015, 3:15 PM · Bug Report, gnupg
werner added a project to T1842: dirmngr crashes if DIR.txt is empty: Restricted Project.
Jun 9 2015, 11:34 AM · gnupg, Bug Report, dirmngr
werner removed Due Date on T1842: dirmngr crashes if DIR.txt is empty.
Jun 9 2015, 11:34 AM · gnupg, Bug Report, dirmngr
werner added a comment to T1842: dirmngr crashes if DIR.txt is empty.

Fixed with commit 255dadd.

Jun 9 2015, 11:34 AM · gnupg, Bug Report, dirmngr
werner added a comment to T1955: Prefer keys with no or cached passphrase..

This also extends to keys stored on smartcards, see
https://lists.gnupg.org/pipermail/gnupg-devel/2015-June/029959.html

Jun 9 2015, 10:06 AM · gnupg (gpg23), Feature Request

Jun 8 2015

werner set Due Date to Jun 30 2015, 2:00 AM on T1661: Gnupg directories not variable in the documentation.
Jun 8 2015, 8:09 PM · Feature Request, Debian, gnupg
werner added a comment to T1661: Gnupg directories not variable in the documentation.

Won't be done for 2.0 but I will try to implement that for 2.1

Jun 8 2015, 8:08 PM · Feature Request, Debian, gnupg
werner changed Version from 1.1.1, 2.1.2 to 2.1.2 on T1842: dirmngr crashes if DIR.txt is empty.
Jun 8 2015, 8:06 PM · gnupg, Bug Report, dirmngr
werner added a project to T1842: dirmngr crashes if DIR.txt is empty: gnupg.
Jun 8 2015, 8:06 PM · gnupg, Bug Report, dirmngr
werner added a project to T1950: gpg --refresh-keys fails with large keyrings over hkps: gnupg.
Jun 8 2015, 8:05 PM · gnupg, Bug Report, dirmngr
werner added projects to T1955: Prefer keys with no or cached passphrase.: gnupg (gpg21), gnupg.
Jun 8 2015, 8:03 PM · gnupg (gpg23), Feature Request
asdil12 added projects to T2004: scd: insufficient buffer error when using reader pinpad: gnupg, Bug Report.
Jun 8 2015, 4:48 PM · Bug Report, gnupg
bernhard added a comment to T2000: PGP-2 Keys are handled as if their Fingerprint is always zero.

On Monday 08 June 2015 at 12:50:23, Werner Koch via BTS wrote:

Workaround: --allow-weak-digest-algos

Jun 8 2015, 2:42 PM · Bug Report, gnupg
werner added a comment to T2000: PGP-2 Keys are handled as if their Fingerprint is always zero.

Workaround: --allow-weak-digest-algos

But I agree that this is not a good option. We better reject the signature.

Jun 8 2015, 12:50 PM · Bug Report, gnupg
werner added a comment to T1998: Can't use extended characters in passphrase.

GnuPG takes the passphrase as a verbatim string of bytes. It does not do any
recoding. I have not looked into the deatils why this is not working for you.

The workround is to use "gpg --passwd" on the old system to change the
passphrase to ascii-only, switch to the other system, and if you want change the
passphrase again.

FWIW: The PKCS#12 import of gpgsm has a similar problem. There is no agreeement
on how passphrases are encoded and thus all tools do whatever they like. To
mitigate that gpgsm has a list of common encodings and on import failure it
tries using a different encoding. If that encoding problem on gpg evolves into
a common problem, we might build a tool which tries to re-encrypt a passphrase.

Jun 8 2015, 12:47 PM · pinentry, Not A Bug, Bug Report, gnupg

Jun 5 2015

exi added a comment to T1928: regression --passphrase-file ignored in gnupg 2.1.2.

How would the suggested method of programmatically using gpg be?

I'm maintaining a service that uses gpg as a streaming encryption/decryption
backend and we need to provide the passphrase for the keys somehow in a
convenient manner.

Priming the agent is not optimal too because it would force me to restart the
agent every time i add new keys.

Maybe give me the possibility to provide new passphrases to the agent via the
agent socket?

Jun 5 2015, 8:29 PM · Bug Report, gnupg, Arch
neal added projects to T2001: gpg-agent isn't used for getting password with --gen-key: gnupg, Bug Report.
Jun 5 2015, 7:55 PM · Bug Report, gnupg
neal added a comment to T1928: regression --passphrase-file ignored in gnupg 2.1.2.

In another message (<874mnnlqxn.fsf@alice.fifthhorseman.net>) DKG notes that we
shouldn't allow loopback mode or preseeding to prevent passphrase-guessing attacks.

Jun 5 2015, 7:52 PM · Bug Report, gnupg, Arch
dkg added a comment to T1999: gpg --check-trustdb returns data on stdout when --verbose --verbose is present?.

D306: 630_0001-gpg-Avoid-cluttering-stdout-with-trustdb-info-in-ver-STABLE-1-4.patch

Jun 5 2015, 7:32 PM · gnupg (gpg14), backport, Bug Report, gnupg
dkg added a comment to T1999: gpg --check-trustdb returns data on stdout when --verbose --verbose is present?.

And here is a backport to STABLE-BRANCH-1-4

Jun 5 2015, 7:32 PM · gnupg (gpg14), backport, Bug Report, gnupg