Page MenuHome GnuPG
Feed Advanced Search

Oct 12 2015

revi added projects to T2124: KLDP link in doc/guide.html other doc section is dead: Feature Request, gpgweb.
Oct 12 2015, 10:41 AM · gpgweb, Feature Request
revi added a comment to T2124: KLDP link in doc/guide.html other doc section is dead.

D333: 691_0001-Remove-Korean-documentations.patch

Oct 12 2015, 10:41 AM · gpgweb, Feature Request

Oct 6 2015

werner added a project to T2120: Supporte tilde (~) expansion for dirmngr option hkp-cacert: Restricted Project.
Oct 6 2015, 1:16 PM · Feature Request, dirmngr
werner added a comment to T2120: Supporte tilde (~) expansion for dirmngr option hkp-cacert.

Done with commit 9db6547. Thanks for reminding me about this annoyance.

Oct 6 2015, 1:16 PM · Feature Request, dirmngr

Oct 3 2015

languitar set Version to 2.1.8 on T2120: Supporte tilde (~) expansion for dirmngr option hkp-cacert.
Oct 3 2015, 2:25 PM · Feature Request, dirmngr
languitar added projects to T2120: Supporte tilde (~) expansion for dirmngr option hkp-cacert: dirmngr, Feature Request.
Oct 3 2015, 2:25 PM · Feature Request, dirmngr

Oct 2 2015

werner renamed T2119: dimngr should auto-detect the format of a CA certificate from dimngr should auto-deect the format of a CA certifciate to dimngr should auto-detect the format of a CA certificate.
Oct 2 2015, 12:52 PM · gnupg, Feature Request, dirmngr
werner added projects to T2119: dimngr should auto-detect the format of a CA certificate: dirmngr, Feature Request, gnupg.
Oct 2 2015, 12:51 PM · gnupg, Feature Request, dirmngr

Sep 30 2015

dkg added projects to T2116: add option to export transferable public key with only latest signatures from some specific key: Feature Request, gnupg.
Sep 30 2015, 10:16 AM · gnupg, Feature Request

Sep 23 2015

werner closed T2098: gpg not built with large secure memory buffer. Ignoring --enable-large-rsa as Resolved.
Sep 23 2015, 10:12 AM · Won't Fix, gnupg, Feature Request

Sep 22 2015

werner renamed T2106: Support SHA-256 fingerprints for ssh from Support SHA-256 fingerrpitns for ssh to Support SHA-256 fingerprints for ssh.
Sep 22 2015, 9:40 AM · gnupg (gpg22), gnupg, ssh, Feature Request
werner added projects to T2106: Support SHA-256 fingerprints for ssh: Feature Request, ssh, gnupg.
Sep 22 2015, 9:39 AM · gnupg (gpg22), gnupg, ssh, Feature Request

Sep 21 2015

werner removed a project from T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256: Restricted Project.
Sep 21 2015, 8:55 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME
werner closed T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256 as Resolved.
Sep 21 2015, 8:55 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME
werner removed a project from T1951: gpg-agent needs an API to verify a passphrase: Restricted Project.
Sep 21 2015, 8:51 AM · gnupg, gpgagent, Feature Request
werner closed T1951: gpg-agent needs an API to verify a passphrase as Resolved.
Sep 21 2015, 8:51 AM · gnupg, gpgagent, Feature Request

Sep 17 2015

werner added a project to T2103: Improve the pinentry password quality indication: Feature Request.
Sep 17 2015, 3:50 PM · gnupg (gpg23), Feature Request
werner removed a project from T2103: Improve the pinentry password quality indication: Bug Report.
Sep 17 2015, 3:50 PM · gnupg (gpg23), Feature Request

Sep 11 2015

civ added a comment to T1736: FIPS 186-4 compliance patches.

Thank you, I'll send the DCO.
Also, I'll rebase the patches against current git master and adjust them to
conform with the doc/HACKING requirements.

Sep 11 2015, 5:03 PM · libgcrypt, Feature Request
civ updated subscribers of T1736: FIPS 186-4 compliance patches.
Sep 11 2015, 5:03 PM · libgcrypt, Feature Request
werner added a comment to T2098: gpg not built with large secure memory buffer. Ignoring --enable-large-rsa.

Nope. Search for the original discussion on the debian bug tracker. We
introduced this option just for one Debian user and it shall in general not be
used. Thus who feel that they need a longer key should anywa switch to ecc.

Sep 11 2015, 9:11 AM · Won't Fix, gnupg, Feature Request
werner added a project to T2098: gpg not built with large secure memory buffer. Ignoring --enable-large-rsa: Won't Fix.
Sep 11 2015, 9:11 AM · Won't Fix, gnupg, Feature Request
fa6bb37c set Version to 2.1.8 on T2098: gpg not built with large secure memory buffer. Ignoring --enable-large-rsa.
Sep 11 2015, 2:41 AM · Won't Fix, gnupg, Feature Request
fa6bb37c added projects to T2098: gpg not built with large secure memory buffer. Ignoring --enable-large-rsa: Feature Request, gnupg.
Sep 11 2015, 2:41 AM · Won't Fix, gnupg, Feature Request

Sep 10 2015

werner added a project to T1804: HKPS scheme support for Windows Installer: Feature Request.
Sep 10 2015, 4:13 PM · Bug Report, gnupg, dirmngr
werner removed a project from T1804: HKPS scheme support for Windows Installer: Bug Report.
Sep 10 2015, 4:13 PM · Bug Report, gnupg, dirmngr

Sep 9 2015

werner added a comment to T2058: Change gpg-agent to support passing command line options to pinentry.

gpg-agent has a --allow-emacs-pinentry option which should solve dkg's concerns
of unintended use of the emapcs pinebtry feature.

Thus I change your request for a generic method to pass options to pinentry to a
feature request.

Sep 9 2015, 4:28 PM · Feature Request, gnupg
werner added a project to T2058: Change gpg-agent to support passing command line options to pinentry: Feature Request.
Sep 9 2015, 4:28 PM · Feature Request, gnupg
micah added projects to T2093: agent confirm default: Feature Request, pinentry.
Sep 9 2015, 4:17 PM · pinentry, Feature Request
werner closed T2025: gpgv 2.1.x should be able to use a keybox for --keyring arguments as Resolved.
Sep 9 2015, 4:06 PM · gnupg, Feature Request
werner removed a project from T2025: gpgv 2.1.x should be able to use a keybox for --keyring arguments: Restricted Project.
Sep 9 2015, 4:06 PM · gnupg, Feature Request
werner added a comment to T2022: dutch localizations for GnuPG.

Sorry, I missed that for 2.0.29

Sep 9 2015, 3:58 PM · gnupg, gnupg (gpg20), gnupg (gpg14), i18n, Feature Request

Sep 8 2015

werner added a comment to T2091: allow s/mime encryption without issuer certificates present.

This should be something similar to gpg --always-trust

Sep 8 2015, 8:51 AM · gnupg, S/MIME, Feature Request
werner added projects to T2091: allow s/mime encryption without issuer certificates present: S/MIME, gnupg.
Sep 8 2015, 8:51 AM · gnupg, S/MIME, Feature Request

Sep 7 2015

werner added a comment to T1682: whirlpool amd64 assembly.

No DCO received, no review, won't apply. Sorry.

Sep 7 2015, 6:32 PM · Won't Fix, libgcrypt, Feature Request
werner closed T1682: whirlpool amd64 assembly as Resolved.
Sep 7 2015, 6:32 PM · Won't Fix, libgcrypt, Feature Request
werner added a project to T1682: whirlpool amd64 assembly: Won't Fix.
Sep 7 2015, 6:32 PM · Won't Fix, libgcrypt, Feature Request
werner added a project to T1883: missing test case for buf_cpy: Info Needed.
Sep 7 2015, 6:28 PM · Info Needed, Feature Request, libgcrypt
werner closed T1883: missing test case for buf_cpy as Resolved.
Sep 7 2015, 6:28 PM · Info Needed, Feature Request, libgcrypt
werner added a comment to T1701: SP 800-90A deterministic Random Bit Generator.

To be considered for 1.7

Sep 7 2015, 6:27 PM · patch, libgcrypt, Feature Request
werner added a comment to T1736: FIPS 186-4 compliance patches.

We can consider that for 1.7.
Can you please send a DCO to gcrypt-devel (see doc/HACKING).

Sep 7 2015, 6:26 PM · libgcrypt, Feature Request
werner added a project to T2037: please add pkg-config file for libgcrypt: Won't Fix.
Sep 7 2015, 6:19 PM · Won't Fix, libgcrypt, Feature Request
werner closed T2037: please add pkg-config file for libgcrypt as Resolved.
Sep 7 2015, 6:19 PM · Won't Fix, libgcrypt, Feature Request
werner added a comment to T2037: please add pkg-config file for libgcrypt.

Sorry, we won't do that.

(Please do not try to continue a discussion here but take it to gcrypt-devel
instead - but I doubt that you will convince us).

Sep 7 2015, 6:19 PM · Won't Fix, libgcrypt, Feature Request
rh added a project to T2091: allow s/mime encryption without issuer certificates present: Feature Request.
Sep 7 2015, 11:50 AM · gnupg, S/MIME, Feature Request

Sep 4 2015

aheinecke closed T1919: Libgcrypt in Gpg4Win has AES-NI support disabled as Resolved.
Sep 4 2015, 12:39 PM · libgcrypt, Feature Request, gpg4win
aheinecke added a comment to T1919: Libgcrypt in Gpg4Win has AES-NI support disabled.

AESNI is enabled in the gnupg 2.1 installer which we will use with gpg4win 3.0

Sep 4 2015, 12:39 PM · libgcrypt, Feature Request, gpg4win

Sep 1 2015

neal added a project to T1798: request: smartcard stub keys with multiple serial numbers: gnupg.
Sep 1 2015, 2:18 PM · gnupg, Feature Request
neal added a project to T2022: dutch localizations for GnuPG: gnupg.
Sep 1 2015, 2:14 PM · gnupg, gnupg (gpg20), gnupg (gpg14), i18n, Feature Request
neal added a project to T2037: please add pkg-config file for libgcrypt: libgcrypt.
Sep 1 2015, 2:13 PM · Won't Fix, libgcrypt, Feature Request

Aug 31 2015

neal removed a project from T1806: Pinentry-qt should have support for Qt5: Restricted Project.
Aug 31 2015, 12:36 AM · pinentry, Feature Request
neal closed T1806: Pinentry-qt should have support for Qt5 as Resolved.
Aug 31 2015, 12:36 AM · pinentry, Feature Request

Aug 27 2015

werner added a comment to T2081: g10/keydb.c:maybe_create_keyring_or_box doesn't check for EACCESS.

Did you mean:
In this case we should also return 0 ?

Aug 27 2015, 12:46 PM · gnupg, Feature Request
neal added projects to T2081: g10/keydb.c:maybe_create_keyring_or_box doesn't check for EACCESS: Feature Request, gnupg.
Aug 27 2015, 10:18 AM · gnupg, Feature Request

Aug 24 2015

werner added a comment to T1958: Use vfork/posix_spawn in gpgme.

ANy news?

Aug 24 2015, 9:39 PM · Info Needed, gpgme, Feature Request
werner closed T2044: GPGME needs better support for managing keys as Resolved.
Aug 24 2015, 12:42 PM · Feature Request, gpgme

Aug 13 2015

werner added a comment to T1211: gpg-agent should disable ptrace.

c) Run gpg-agent under gdb
d) Run a modified gpg-agent (rm ~/S.gpg-agent; my-gpg-agent --daemon)
e) Hook into the tty and use pinentry-curses
f) scp ~/.gnupg/private-keys-v1.d/* mybox: and sniff the passphrase.

Aug 13 2015, 6:36 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
werner renamed T1544: www.gnupg.org does not use ECC from the HTTPS on www.gnupg.org is not secure to www.gnupg.org does not use ECC.
Aug 13 2015, 6:27 PM · Feature Request, gpgweb
werner added a project to T1544: www.gnupg.org does not use ECC: Feature Request.
Aug 13 2015, 6:26 PM · Feature Request, gpgweb
werner added a comment to T1756: gpg-agent doesn't accept ssh certificates.

re 1) ssh-rsa-cert-v01@openssh.com is the certifiate as used by sshd/ssh. The
agent protocols however uses an ssh-rsa-cert-v00@openssh.com format to send the
private key to the agent. We should be easy to support this if it is sufficient
to just get the private key from the ssh-rsa-cert-v00.

re 2) I need to look close on how this is handled by the ssh-agent protocol.

gpg-agent should not look for an ssh file directly because its API is based on
the ssh-agent protocol. Thus a modified ssh is required. I noticed an
ssh-agent object related to card - this needs futher investigations.

Aug 13 2015, 4:16 PM · gnupg, Feature Request

Aug 12 2015

dkg reopened T1211: gpg-agent should disable ptrace as "Open".
Aug 12 2015, 3:53 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
dkg added a comment to T1211: gpg-agent should disable ptrace.

so far, the proposed mechanisms for getting at gpg-agent's memory from a peer
process running as the same user are:

a) ptrace (e.g. via /usr/bin/gcore or /usr/bin/strace)
b) /proc/$PID/mem, which is owned by the user and mode 0600

DarkStarSword's patch effectively closes (a) (by rejecting ptrace connections)
and appears on my GNU/Linux system to close (b) as well: /proc/$PID/mem is
root-owned when the patch is applied instead of being user-owned.

Are there other channels for per-process memory access that we should be
thinking about?

I agree with Werner and Neal that the UNIX model is probably insufficient to
close all the holes easily, but i also don't think that's a good reason to avoid
closing those holes we can close.

If there are other ways that another process by the same user can get at the
RAM, please point them out and i'll look into ways to address them too.

In the meantime, i'll also look into ways to facilitate running the process as a
separate user account entirely.

Aug 12 2015, 3:53 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
werner closed T1211: gpg-agent should disable ptrace as Resolved.
Aug 12 2015, 10:09 AM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
werner added a project to T1211: gpg-agent should disable ptrace: Won't Fix.
Aug 12 2015, 10:09 AM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
werner added a comment to T1211: gpg-agent should disable ptrace.

I am closing this.

BTW: I can't share DarkStarSword's fear about prioritizing ease of debugging
over security - I would never do that for a real security problem; Neal and me
both explained why this proposed fix does can't help against an attack.

Aug 12 2015, 10:09 AM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
dkg added a comment to T1211: gpg-agent should disable ptrace.

D128: 666_0003-Avoid-simple-memory-dumps-via-ptrace.patch

Aug 12 2015, 2:55 AM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
dkg added a comment to T1211: gpg-agent should disable ptrace.

I'm going to introduce the prctl(SET_DUMPABLE, 0) change to main in
agent/gpg-agent.c in the debian 2.1.x series as of 2.1.7-1, using the patch i'm
attaching here.

I make no representations that this solves all possible memory leakages, but it
does address one specific and relatively straightforward attack.

As to Werner's legitimate concerns about making debugging harder, there remain
at least two options: ptrace as the superuser, and launching gpg-agent itself
under gdb directly.

If this experiment proves disastrous somehow (i'm not seeing how), we can always
revert the patch.

Aug 12 2015, 2:55 AM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug

Aug 11 2015

rrt reopened T1648: Missing step in instructions for verifying integrity as "Open".
Aug 11 2015, 12:57 PM · gpgweb, Feature Request
rrt added a project to T1648: Missing step in instructions for verifying integrity: In Progress.
Aug 11 2015, 12:57 PM · gpgweb, Feature Request
rrt added a comment to T1648: Missing step in instructions for verifying integrity.

The issue is not resolved: if "gpg --recv-keys" is not sufficient, then some
other step must be added to the instructions, as currently they do not work, at
least not for this non-expert user.

There are two problems:

  1. This sentence does not make sense: "You should see a message indicating that

the signature is good and made by of the signing keys." (Maybe the solution is
as simple as deleting "of"?)

  1. The following instructions are too brief: "Make sure that you have the right

key, either by checking the fingerprint of that key with other sources or by
checking that the key has been signed by a trustworthy other key." Someone who
is trying to download GnuPG as part of bootstrapping a secure environment for
the first time (e.g. so they can download other software such as Tor in a
trustworthy way), will not know how to follow either of those suggestions.
Concrete instructions are needed.

If I simply download the GPG sources and corresponding signature, and run the
gpg --verify command that is given, I get the following output:

gpg: directory `/home/rrt/.gnupg' created
gpg: new configuration file `/home/rrt/.gnupg/gpg.conf' created
gpg: WARNING: options in `/home/rrt/.gnupg/gpg.conf' are not yet active during
this run
gpg: keyring `/home/rrt/.gnupg/pubring.gpg' created
gpg: Signature made Wed 01 Jul 2015 13:56:58 BST using RSA key ID 4F25E3B6
gpg: Can't check signature: public key not found
gpg: Signature made Thu 02 Jul 2015 05:31:06 BST using RSA key ID 33BD3F06
gpg: Can't check signature: public key not found

In other words, it doesn't seem to do anything useful.

Aug 11 2015, 12:57 PM · gpgweb, Feature Request
werner closed T1332: bugs.g10code.com server missing cert chain as Resolved.
Aug 11 2015, 12:31 PM · Feature Request, gpgweb
werner added a comment to T1648: Missing step in instructions for verifying integrity.

This is on purpose. --recv-key is not sufficient.

Aug 11 2015, 12:31 PM · gpgweb, Feature Request
werner closed T1648: Missing step in instructions for verifying integrity as Resolved.
Aug 11 2015, 12:31 PM · gpgweb, Feature Request
werner closed T1258: Company add to gnupg Support page as Resolved.
Aug 11 2015, 12:30 PM · gpgweb, Feature Request
werner added a comment to T1258: Company add to gnupg Support page.

Please send mail and follow the instructions on the page.

Aug 11 2015, 12:30 PM · gpgweb, Feature Request

Aug 9 2015

DarkStarSword added a comment to T1211: gpg-agent should disable ptrace.

Glad I was able to help get one bug fixed at least :)

The in-memory encryption will definitely help in this scenario (that is, a
casual attack by e.g. a colleague or another student having a laugh as their
friend left their screen unlocked... real attack - I should know, I've done it,
and had it done to me, as had several of my friends back in uni (to be fair -
that was on Firefox password manager, but it could just as easily have been
gpg-agent)... This is not about stopping a motivated attacker with physical
access to the system as they could always subvert the system in other ways e.g.
adding a shell alias to run a trojaned gpg-agent instead of the real thing,
install a key logger, etc).

I'm still not super happy that a casual attacker could walk away with a core
file containing the encrypted passphrase and the key to decrypt it. What started
as a casual attack for a laugh could later transform into a more serious attack
given that they can hold onto this information indefinitely. I'm not a motivated
attacker, but that would tempt the hell out of me if I was even slightly so
inclined. I should know, because I've been in a similar situation in the past
where I obtained an unshadowed passwd file (through a purely casual attack when
I was looking up a friend's uid and discovered the passwd file was not
shadowed... so of course I made a copy). I could have left it alone, but it
tempted the hell out of me and I ended up running john over it for two straight
weeks (never did much with the result, but that's not the point)!

I would hope that the developers of any security product learns to think like an
attacker.

I must say I am deeply troubled by the priority seeming to be on the ease of
debugging a security product which has the sole purpose of keeping a passphrase
safe. As the saying goes security is always a trade-off, but given that
gpg-agent is a security product and not a word processor, this particular trade
off does not sit right with me. I would expect the development team to have root
access on their own systems, which avoids the issue as the root user can always
attach a debugger with or without this change - is there truly a reason that
they need to attach to a running gpg-agent on a system they don't have root on?
And what about the thousands of gpg-agents running on other systems in the wild
that should never need to attach a debugger (and if they do... sudo)?

The information about FIPS mode and SELinux is good to know, at least for people
running distributions that support and enable them by default. But from what I
can gather FIPS mode is a RHEL only feature (I may be wrong - I'm not all that
familiar with it), and SELinux is still either not enabled, or in permissive
mode in many distributions by default (including Debian and Ubuntu).

As I mentioned in the original report, an alternative way to protect the memory
of gpg-agent is to install it with the setgid bit set (ssh-agent does both the
prctl() and setgid for example - now there's some developers I applaud). Unlike
SELinux and FIPS mode this works in every distribution and has been supported
for donkeys years.

Aug 9 2015, 3:17 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug

Aug 7 2015

werner added a project to T2025: gpgv 2.1.x should be able to use a keybox for --keyring arguments: Restricted Project.
Aug 7 2015, 3:55 PM · gnupg, Feature Request
werner added a comment to T2025: gpgv 2.1.x should be able to use a keybox for --keyring arguments.

With my tests it works with keyrings when specified using --keyring.

However, gpgv should also work with a keybox by default. This is now
implemented:

trustedkeys.kbx is now the default. If that does not exists gpgv also tries to
use trustedkeys.gpg (keybox or keyring) for backward compatibility. Right there
is a minor backward compatibility problem if a file "trustedkeys.kbx" alread
exists and you migrate to 2.1 - but I do not think that this is a real world
problem.

Aug 7 2015, 3:55 PM · gnupg, Feature Request
werner added a comment to T2064: please allow unattended secret key deletion.

I am not sure how to to this in gpg and gpgme, thus for now only the gpg-agent part.

Aug 7 2015, 1:01 PM · gnupg, Feature Request
werner added a comment to T2064: please allow unattended secret key deletion.

Okay, I added a --force option to gpg-agent.

gpg-connect-agent 'DELETE_KEY --force <KEYGRIP>' /bye

Does now do the same as

rm ~/.gnupg/private-keys-v1.d/<KEYGRIP>.key
Aug 7 2015, 1:00 PM · gnupg, Feature Request
werner added a comment to T1211: gpg-agent should disable ptrace.

This identified another bug: To be prepared for FIPS evaluation,
gpg-agent does not store the cached passphrases in the clear but
encrypts them in memory. Right this is security by obscurity but if
we ever have a way to store that key in a secured RAM (e.g. TPM, ARM
TrustZone) we can indeed limit the time a passphrase is available in
the clear to the period it is really needed. This all seems to work
but your tests shows that libassuan does not clear its internal line
buffers so that you can actually find the passphrase in the core
file. I just pushed a fix for this.

IIRC, FIPS mode in Linux inhibits all access to process memory system
wide. Changing this just a for a single user process does not make
much sense.

Further, being able to attach to a running processing is one of the
best debug methods we have. Giving up on this without for a perceived
extra protection is not going to work. There are too many ways to get
the passphrase using other ways. Linux can't protect a user to get
data belonging to him. Iff gpg-agent were a system daemon things
would be different and extra protection would make sense as a
fallback.

Aug 7 2015, 12:47 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
DarkStarSword added a comment to T1211: gpg-agent should disable ptrace.

Without this I can do gcore pidof gpg-agent and QUITE CLEARLY see my
passphrase in the produced dump:

ian@draal~ [i]> gcore (pidof gpg-agent)
0x00007fb8f8849293 in __select_nocancel () at

../sysdeps/unix/syscall-template.S:81

81      ../sysdeps/unix/syscall-template.S: No such file or directory.
warning: target file /proc/1560/cmdline contained unexpected null characters
warning: Memory read failed for corefile section, 8192 bytes at 0x7ffce0a12000.
Saved corefile core.1560
0x00007f2dd583c293 in __select_nocancel () at

../sysdeps/unix/syscall-template.S:81

81      ../sysdeps/unix/syscall-template.S: No such file or directory.
warning: target file /proc/1540/cmdline contained unexpected null characters
warning: Memory read failed for corefile section, 8192 bytes at 0x7ffccfbe3000.
Saved corefile core.1540
ian@draal~ [i]> strings core.1560 | grep pass
passwd
This is my ultra secure passphrase - I definitely expect any program that

manages this to take reasonable steps to keep it safe even if I accidentally
leave my screen unlocked one day!

Invalid passphrase; please try again
You need a passphrase to unlock the secret key for user:%0A"test123

<test@test.com>"%0A2048-bit RSA key, ID DE3A7EAB, created 2015-08-06 (main key
ID F459B571)%0A

    SETERROR Invalid passphrase; please try again
    his is my ultra secure passphrase - IQ
    ian@draal~ [i]>

With this one line change I cannot do the above - that's the definition of
reducing the attack surface last time I checked.

You absolutely can still use gdb to debug it - you just have to start it under
gdb as opposed to attaching to an existing process, or attach the debugger as
root. You could also just disable the syscall in a debug build.

Aug 7 2015, 12:02 AM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug

Aug 6 2015

werner added a comment to T2064: please allow unattended secret key deletion.

The problem is that the same secret key may be used for OpenPGP, S/MIME, Ssh,
and possible other cleints directly accessing gpg-agent.

Thus I am not sure how to best do it. The direct gpg-agent interface of gpgme
could be used to delete a key if we add a --force option to the agent's
DELETE_KEY command.

Aug 6 2015, 9:13 PM · gnupg, Feature Request
werner added a comment to T1211: gpg-agent should disable ptrace.

It does not reduce the attack surface. And yes, it complicates things
because you can't anymore debug the process without changing the code
or using other tricks (aka attack). I have not tested the SELinux
feature for quite some time but gnupg supports SELinux if configured
with --enable-selinux-support. If you want some protection better use
that.

dkg: We disable core dumps for the simple reason that we do not want
to see core files on disk. Disk sectors have a longer lifetime than a
process and a user session - thus avoiding core files is a real world
threat mitigation.

Aug 6 2015, 9:08 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
aheinecke added a comment to T1117: German Umlaute are wrong in console.

This has since been handled in: T1691
It is fixed in Gpg4win.

Aug 6 2015, 6:18 PM · Feature Request, Windows 32, gnupg, Windows
aheinecke closed T1117: German Umlaute are wrong in console as Resolved.
Aug 6 2015, 6:18 PM · Feature Request, Windows 32, gnupg, Windows

Aug 5 2015

DarkStarSword added a comment to T1211: gpg-agent should disable ptrace.

So a single syscall to demonstrably reduce the attack surface really complicates
things does it?

News to me.

Aug 5 2015, 4:31 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
dkg added a comment to T1211: gpg-agent should disable ptrace.

I agree with you that the standard UNIX model is generally insufficient here.

Perhaps the distros could weigh in with mechanisms to facilitate
secondary-account creation for agents and the like. I've opened
https://bugs.debian.org/794667 about this.

However, i don't think the weak UNIX permissions model is a reason to avoid a
small piece of code like that offered by DarkStarSword below. Closing off one
avenue of attack is still worthwhile, even if other avenues remain. As werner
said, gpg-agent won't create a coredump (even though other avenues of attack are
possible).

Is there something about the complexity of prctl(PR_SET_DUMPABLE, 0); that makes
it undesirable?

Aug 5 2015, 4:28 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
neal added a comment to T1211: gpg-agent should disable ptrace.

dkg: The problem is that the underlying architecture is broken. Unix's stock
permission model is about protecting users from other users, not protecting
processes from other processes. Thus, I don't think it makes any sense to
complicate the code by implementing these effectively useless protections.

FWIW, a widely used practical system that does a much better job at this is
Android. Android runs every program under its own uid. We could do the same
thing with gpg-agent. In fact, this is currently possible with a little help
from ssh. Unfortunately, this requires a fair amount of work by the user to set
up. In particular, the user needs to create a secondary account. It would be
nice if distributions provided a simply way for an unprivileged user to allocate
additional uids, but this is probably a lot of work.

Aug 5 2015, 3:31 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug

Aug 4 2015

werner renamed T1211: gpg-agent should disable ptrace from gpg-agent allows ptrace to gpg-agent should disable ptrace.
Aug 4 2015, 12:43 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
werner added a project to T1211: gpg-agent should disable ptrace: Feature Request.
Aug 4 2015, 12:42 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
werner removed a project from T1211: gpg-agent should disable ptrace: Bug Report.
Aug 4 2015, 12:42 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
aheinecke added a comment to T1826: Cannot decrypt (PGP-MIME) message from Enigmail.

The Mail you show is a so called PGP/MIME mail.

We are well aware that GpgOL for Outlook 2010 and later versions only provides a
very basic OpenPGP support and no PGP/MIME Support. It is mentioned on the
website and in the documentation.

We are hoping to develop this but this is a huge Feature and very problematic to
implement given Outlook's extension API.

Aug 4 2015, 11:12 AM · Feature Request, gpg4win, gpgol
aheinecke claimed T1826: Cannot decrypt (PGP-MIME) message from Enigmail.
Aug 4 2015, 11:12 AM · Feature Request, gpg4win, gpgol
aheinecke added projects to T1826: Cannot decrypt (PGP-MIME) message from Enigmail: gpg4win, Feature Request.
Aug 4 2015, 11:12 AM · Feature Request, gpg4win, gpgol
dkg added projects to T2064: please allow unattended secret key deletion: Feature Request, gnupg.
Aug 4 2015, 12:36 AM · gnupg, Feature Request

Jul 28 2015

aheinecke added a comment to T1806: Pinentry-qt should have support for Qt5.

This was done with 26ab44b.

I'm now using pinentry-qt5 as my main pinentry but I doubt that there will be
any problems. After dropping the "Secure widgets" There were no code changes
necessary to support Qt5.

Jul 28 2015, 3:22 PM · pinentry, Feature Request
aheinecke added a project to T1806: Pinentry-qt should have support for Qt5: Restricted Project.
Jul 28 2015, 3:22 PM · pinentry, Feature Request

Jul 22 2015

pinky closed T2030: file names should not be embedded in the ciphertext as Resolved.
Jul 22 2015, 6:07 PM · Feature Request, gnupg
pinky added a comment to T2030: file names should not be embedded in the ciphertext.

Solution is fine for me from a usability point of view.

For other users, it is not fine because they will first have to find this
solution, which probably will not happen before having fallen into the pit. So I
would prefer a changed default behavior.

I will try to convince the authors of the OpenPGP standard to remove some of the
complexity of the standard as well as the resulting issues.

Jul 22 2015, 6:07 PM · Feature Request, gnupg