Page MenuHome GnuPG
Feed Advanced Search

Nov 6 2015

neal added a comment to T1245: Error-Message: gpg: DBG: rndw32: get performance data problem.

According to Werner's comment, this is not a bug so closing.

Nov 6 2015, 12:50 PM · Feature Request, gnupg
neal added a comment to T1143: better heuristic for choosing an encryption key based on a User ID.

Note: T1232 is related.

Nov 6 2015, 12:39 PM · Duplicate, gnupg, Feature Request
neal added a comment to T1213: Missing fopencookie and libassuan 2.0.0.

The warning is in the documentation. I'm closing this.

Nov 6 2015, 12:36 PM · Feature Request
neal closed T1213: Missing fopencookie and libassuan 2.0.0 as Resolved.
Nov 6 2015, 12:36 PM · Feature Request
neal added a comment to T1210: gpgkey2ssh aborting when run without parameters.

The main complaint was fixed in 2b27acc and the program was marked as deprecated
in the documentation.

Nov 6 2015, 12:32 PM · Fedora, Feature Request
neal closed T1210: gpgkey2ssh aborting when run without parameters as Resolved.
Nov 6 2015, 12:32 PM · Fedora, Feature Request
neal added a comment to T1173: gpg has no easy way to view the reason and description of revocation sigs.

Where should this output be displayed? When doing gpg2 -K, revoked user ids are
not shown. Perhaps in --edit-key? Nevertheless, it would be nice to have a
command line option to get this information directly.

Nov 6 2015, 12:12 PM · gnupg, Debian, Feature Request
neal closed T1128: gpg should detect ambigious keys specifications as Resolved.
Nov 6 2015, 12:05 PM · Feature Request, Debian, gnupg
neal added a comment to T1128: gpg should detect ambigious keys specifications.

Checked in (e8c53fc).

Nov 6 2015, 12:05 PM · Feature Request, Debian, gnupg
neal updated subscribers of T1147: Certificate serial number in hexadecimal base should be marked as such.
Nov 6 2015, 11:36 AM · Feature Request, dirmngr
neal added a comment to T1147: Certificate serial number in hexadecimal base should be marked as such.

Werner: This patch is still relevant and it only changes diagnostics so it
shouldn't impact any existing code. Okay to apply?

Nov 6 2015, 11:36 AM · Feature Request, dirmngr
neal added a comment to T1140: Link to PocketConsole (and PocketGPG) is dead.

I can't find any current information about PocketConsole or PocketGnuPG on the
web. I'm assuming that the software is not supported anymore and, as such, I've
removed the link.

Nov 6 2015, 11:19 AM · gpgweb, Feature Request
neal closed T1140: Link to PocketConsole (and PocketGPG) is dead as Resolved.
Nov 6 2015, 11:19 AM · gpgweb, Feature Request
werner added a comment to T1128: gpg should detect ambigious keys specifications.

With 'wait' I mean: Push, release, wait for complaints.

log_error (_("no such key corresponding to: %s\n"),t->d)
if (!opt.quiet)

  log_info ("(check argument of option '%s')\n", option);

However, we need to check all error messages to make sure they use a common
scheme. For example at some places we use

key 123445567: This is is not usable
Nov 6 2015, 10:57 AM · Feature Request, Debian, gnupg
neal added a comment to T1128: gpg should detect ambigious keys specifications.
  • When you say let's wait, what do you mean? In particular, how are we going to

get a user response without checking the code in?

  • Ok. I will return an error code.
  • I already do this, e.g.:

log_error (_("no such key corresponding to %s (passed to %s)\n"),

t->d, option);
Nov 6 2015, 7:55 AM · Feature Request, Debian, gnupg

Nov 5 2015

werner added a comment to T1128: gpg should detect ambigious keys specifications.

Some comments:

  • Always checking this _might_ slow down things. Let's wait for user response.
  • Please do not die in that function. We may want to use it a other places too (server mode). Better return an error (NULL) and let the caller decide what to do.
  • The strings should be changed to ease translation: For example put the second part into its own message: log_info ("(check argument of option '%s')\n", "--local-user");
Nov 5 2015, 6:23 PM · Feature Request, Debian, gnupg
neal added a comment to T1128: gpg should detect ambigious keys specifications.

D106: 719_0001-gpg-Check-for-ambiguous-or-non-matching-key-specs.patch

Nov 5 2015, 5:38 PM · Feature Request, Debian, gnupg
neal added a comment to T1128: gpg should detect ambigious keys specifications.

The following patch adds checks for --default-key, --local-user and --remote-user.

Check that any user id specifications passed to --local-user
and --remote-user correspond to exactly 1 user. Check that any user
id specifications passed to --default-key correspond to at most 1
user. Warn if any user id specifications passed to --local-user or
--default-user are possible ambiguous (are not specified by long keyid
or fingerprint).

$ gpg2 -s -a -r testing
gpg: WARNING: recipients (-r) given without using public key encryption
gpg: Error: the key specification 'testing' is ambiguous (passed to --encrypt-to).
gpg: 'testing' matches at least: 362D3527F53AAD1971AAFDE658859975EE37CF96 and
439D954F18F79CC4F71BED91CACED996BC15C85A.
$ gpg2 -s -a --local-user testing
gpg: Warning: value 'testing' for --local-user should be a long keyid or a
fingerprint.
gpg: Error: the key specification 'testing' is ambiguous (passed to --local-user).
gpg: 'testing' matches at least: 362D3527F53AAD1971AAFDE658859975EE37CF96 and
439D954F18F79CC4F71BED91CACED996BC15C85A.
$ gpg2 -s -a --default-key testing
gpg: Warning: value 'testing' for --default-key should be a long keyid or a
fingerprint.
gpg: Error: the key specification 'testing' is ambiguous (passed to --default-key).
gpg: 'testing' matches at least: 362D3527F53AAD1971AAFDE658859975EE37CF96 and
439D954F18F79CC4F71BED91CACED996BC15C85A.

Nov 5 2015, 5:38 PM · Feature Request, Debian, gnupg
neal removed a project from T1073: [PATCH] fix confusing "Invalid character in name" message: Stalled.
Nov 5 2015, 2:34 PM · Feature Request, gnupg
neal closed T1073: [PATCH] fix confusing "Invalid character in name" message as Resolved.
Nov 5 2015, 2:34 PM · Feature Request, gnupg
neal reopened T1143: better heuristic for choosing an encryption key based on a User ID as "Open".
Nov 5 2015, 2:34 PM · Duplicate, gnupg, Feature Request
neal added a comment to T1143: better heuristic for choosing an encryption key based on a User ID.

Whoops, I closed the wrong bug report, sorry. Reopening.

Nov 5 2015, 2:34 PM · Duplicate, gnupg, Feature Request
neal added a comment to T1073: [PATCH] fix confusing "Invalid character in name" message.

Comitted in a958ffd.

Nov 5 2015, 2:33 PM · Feature Request, gnupg
neal closed T1143: better heuristic for choosing an encryption key based on a User ID as Resolved.
Nov 5 2015, 2:32 PM · Duplicate, gnupg, Feature Request
neal added a comment to T1143: better heuristic for choosing an encryption key based on a User ID.

Comitted in a958ffd.

Nov 5 2015, 2:32 PM · Duplicate, gnupg, Feature Request
civ added a comment to T1736: FIPS 186-4 compliance patches.

The patches are now rebased on top of f7505b550dd591e33d3a3fab9277c43c460f1bad.

In addition to these a modified rsa generator is needed to be FIPS 186-4 compliant.

We ended up using this patch from Fedora:
http://pkgs.fedoraproject.org/cgit/libgcrypt.git/tree/libgcrypt-1.6.3-rsa-fips-keygen.patch

Nov 5 2015, 2:25 PM · libgcrypt, Feature Request
neal added a comment to T1060: extract signature from encrypted and signed file/message.

Committed (ec409e6).

Nov 5 2015, 2:21 PM · gnupg (gpg21), gnupg, Debian, Feature Request
civ added a comment to T1736: FIPS 186-4 compliance patches.

D253: 718_0011-Fix-testsuite-after-the-FIPS-adjustments.patch

Nov 5 2015, 2:19 PM · libgcrypt, Feature Request
civ added a comment to T1736: FIPS 186-4 compliance patches.

D254: 717_0010-Add-new-pss-option-to-fipsdrv.patch

Nov 5 2015, 2:19 PM · libgcrypt, Feature Request
civ added a comment to T1736: FIPS 186-4 compliance patches.

D255: 716_0009-Add-possibility-to-specify-salt-length-for-PSS-verif.patch

Nov 5 2015, 2:19 PM · libgcrypt, Feature Request
civ added a comment to T1736: FIPS 186-4 compliance patches.

D256: 715_0008-fipsdrv-Add-support-for-RSA-keygen-tests.patch

Nov 5 2015, 2:19 PM · libgcrypt, Feature Request
civ added a comment to T1736: FIPS 186-4 compliance patches.

D257: 714_0007-Fixes-for-RSA-testsuite-in-FIPS-mode.patch

Nov 5 2015, 2:19 PM · libgcrypt, Feature Request
civ added a comment to T1736: FIPS 186-4 compliance patches.

D258: 713_0005-Use-2048-bit-RSA-keys-for-selftest.patch

Nov 5 2015, 2:18 PM · libgcrypt, Feature Request
civ added a comment to T1736: FIPS 186-4 compliance patches.

D259: 712_0004-Disable-non-allowed-algorithms-in-FIPS-mode.patch

Nov 5 2015, 2:18 PM · libgcrypt, Feature Request
civ added a comment to T1736: FIPS 186-4 compliance patches.

D260: 711_0003-PBKDF2-add-upper-bound-for-derived-key-length.patch

Nov 5 2015, 2:18 PM · libgcrypt, Feature Request
civ added a comment to T1736: FIPS 186-4 compliance patches.

D261: 710_0002-ECDSA-adjustments-for-FIPS-186-4.patch

Nov 5 2015, 2:18 PM · libgcrypt, Feature Request
civ added a comment to T1736: FIPS 186-4 compliance patches.

D262: 709_0001-DSA-adjustments-to-conform-with-FIPS-186-4.patch

Nov 5 2015, 2:18 PM · libgcrypt, Feature Request
neal closed T1067: Please document gpgkey2ssh as Resolved.
Nov 5 2015, 2:16 PM · gnupg, Debian, Feature Request
neal added a comment to T1067: Please document gpgkey2ssh.

Fix in cd2d685.

Nov 5 2015, 2:16 PM · gnupg, Debian, Feature Request
neal added a comment to T1060: extract signature from encrypted and signed file/message.

Verifying the unwrapped data also works:

$ gpg2 --decrypt --unwrap /tmp/a > /tmp/b
Please enter the passphrase to unlock the OpenPGP secret key:
"Testing (insecure!)"
1024-bit RSA key, ID 6EA74366,
created 2015-09-18 (main key ID EE37CF96).

Passphrase:
gpg: encrypted with 1024-bit RSA key, ID 6EA74366, created 2015-09-18

"Testing (insecure!)"

$ gpg2 --verify /tmp/b
gpg: Signature made Wed 04 Nov 2015 01:53:31 PM CET using RSA key ID EE37CF96
gpg: Good signature from "Testing (insecure!)" [full]
gpg: Verified 7 messages signed by "Testing (insecure!)" (key: 362D 3527 F53A
AD19 71AA FDE6 5885 9975 EE37 CF96, policy: good) in the past 1 day, 20 hours.
The most recent message was verified 22 hours, 40 minutes ago.

Nov 5 2015, 12:35 PM · gnupg (gpg21), gnupg, Debian, Feature Request
neal added a comment to T1060: extract signature from encrypted and signed file/message.

D89: 708_0002-gpg-Add-support-for-unwrapping-the-outer-level-of-en.patch

Nov 5 2015, 12:32 PM · gnupg (gpg21), gnupg, Debian, Feature Request
neal added a project to T1060: extract signature from encrypted and signed file/message: In Progress.
Nov 5 2015, 12:32 PM · gnupg (gpg21), gnupg, Debian, Feature Request
neal added a comment to T1060: extract signature from encrypted and signed file/message.

D90: 707_0001-common-Add-a-function-for-copying-data-from-one-iobu.patch

Nov 5 2015, 12:31 PM · gnupg (gpg21), gnupg, Debian, Feature Request
neal added a comment to T1060: extract signature from encrypted and signed file/message.

This implements the requested --unwrap feature. It strips the first level of
encryption and then dumps the data.

$ gpg2 --decrypt --unwrap /tmp/a | gpg2 --list-packets
Please enter the passphrase to unlock the OpenPGP secret key:
"Testing (insecure!)"
1024-bit RSA key, ID 6EA74366,
created 2015-09-18 (main key ID EE37CF96).

Passphrase:
gpg: encrypted with 1024-bit RSA key, ID 6EA74366, created 2015-09-18

"Testing (insecure!)"

off=0 ctb=a3 tag=8 hlen=1 plen=0 indeterminate

:compressed packet: algo=2

off=2 ctb=90 tag=4 hlen=2 plen=13

:onepass_sig packet: keyid 58859975EE37CF96
version 3, sigclass 0x00, digest 8, pubkey 1, last=1

off=17 ctb=cb tag=11 hlen=2 plen=13 new-ctb

:literal data packet:
mode b (62), created 1446641593, name="",
raw data: 7 bytes

off=32 ctb=88 tag=2 hlen=2 plen=156

:signature packet: algo 1, keyid 58859975EE37CF96
version 4, created 1446641611, md5len 0, sigclass 0x00
digest algo 8, begin of digest b7 8a
hashed subpkt 2 len 4 (sig created 2015-11-04)
subpkt 16 len 8 (issuer key ID 58859975EE37CF96)
data: [1023 bits]

Nov 5 2015, 12:31 PM · gnupg (gpg21), gnupg, Debian, Feature Request

Nov 4 2015

neal closed T1041: --multifile --sign (or: --sign multiple files in one pass) as Resolved.
Nov 4 2015, 1:41 PM · Debian, Feature Request
neal added a comment to T1041: --multifile --sign (or: --sign multiple files in one pass).

Based on Werner's response, I believe that the underlying issue is resolved.
Thus, I'm going to close this.

Nov 4 2015, 1:41 PM · Debian, Feature Request
neal closed T807: encrypt-to-self option as Resolved.
Nov 4 2015, 1:21 PM · gnupg, Feature Request
neal added a comment to T807: encrypt-to-self option.

Committed in de9b234.

Nov 4 2015, 1:21 PM · gnupg, Feature Request
neal closed T806: default-key could take a list of keys to try as Resolved.
Nov 4 2015, 1:21 PM · gnupg, Feature Request
neal added a comment to T806: default-key could take a list of keys to try.

Committed in e16d716.

Nov 4 2015, 1:21 PM · gnupg, Feature Request
werner added a comment to T807: encrypt-to-self option.

Frankly, I do not like the hidden key feature in particular if used to
encrypt-to-self. The problem is that if someone encrypts to a group and forgets
to add your key, gpg will do a trial decrypt which is pretty annoying. Maybe we
can add a second kind of wildcard keyid to rfc4880bis which states that this has
been encrypted to the key of the sender

Nov 4 2015, 10:49 AM · gnupg, Feature Request
aheinecke closed T617: Register GPGol as trusted extension as Resolved.
Nov 4 2015, 10:47 AM · Feature Request, gpgol
aheinecke added a comment to T617: Register GPGol as trusted extension.

I have no idea what a trusted extension is and I can happily read / modify the
body through OOM.

I'm marking this as resolved as I don't see anything to do here.

Nov 4 2015, 10:47 AM · Feature Request, gpgol
neal closed T1023: gtksecentry.[ch] warning fixes as Resolved.
Nov 4 2015, 12:15 AM · Feature Request
neal added a comment to T1023: gtksecentry.[ch] warning fixes.

We don't ship gtksecmementry any more so that is definitely no longer relevant.
Closing.

Nov 4 2015, 12:14 AM · Feature Request

Nov 3 2015

neal added a comment to T1004: http://www.gnupg.org/howtos/vn/index.html does not exist.

This is still the case.

Nov 3 2015, 11:58 PM · gpgweb, Feature Request
neal updated subscribers of T1004: http://www.gnupg.org/howtos/vn/index.html does not exist.
Nov 3 2015, 11:58 PM · gpgweb, Feature Request
neal added a comment to T1022: Please split GtkSecureEntry into a library.

GtkSecureEntry has been removed from pinentry.

Nov 3 2015, 11:52 PM · Won't Fix, Feature Request
neal closed T1022: Please split GtkSecureEntry into a library as Resolved.
Nov 3 2015, 11:52 PM · Won't Fix, Feature Request
neal closed T846: GnuPG Shell as Resolved.
Nov 3 2015, 11:45 PM · gpgweb, Feature Request
neal added a comment to T807: encrypt-to-self option.

The attached patch builds on the patch in #806. It provides a
--encrypt-to-default-key. One could imagine adding an
--hidden-encrypt-to-default-key as well. Werner: is this acceptable?

Nov 3 2015, 11:41 PM · gnupg, Feature Request
neal added a comment to T807: encrypt-to-self option.

D44: 706_0001-gpg-Add-encrypt-to-default-key.patch

Nov 3 2015, 11:41 PM · gnupg, Feature Request
neal added a comment to T806: default-key could take a list of keys to try.

I implemented this as follows: it is possible to specify --default-key multiple
times. The last specified key for which a secret key is available is taken. If
multiple such keys are available, the others are simply ignored. The patch is a
bit noisy, because we need to pass the ctrl structure around. But, I've tested
it as follows:

  gpg2 -a -s --default-key 58859975EE37CF96 --default-key 58859975EE37CF95

and it correctly takes the 96 key, which is available (95 is not).

Werner: thoughts?

Nov 3 2015, 11:20 PM · gnupg, Feature Request
neal added a comment to T806: default-key could take a list of keys to try.

D43: 705_0001-gpg-Allow-multiple-default-key-options.-Take-the-las.patch

Nov 3 2015, 11:20 PM · gnupg, Feature Request
neal added a comment to T758: Provide an option to choose the name of saved files.

Fix in ea99f88.

Nov 3 2015, 10:10 PM · gpa, Feature Request
neal added a project to T758: Provide an option to choose the name of saved files: Restricted Project.
Nov 3 2015, 10:10 PM · gpa, Feature Request

Nov 2 2015

bernhard updated subscribers of T2139: pinentry option to see the password in cleartext.

Hi!

@dkg:
Can you tell me more about your tab-return use case? Do you have hints/personal
observations about how many people are affected?
In the gtk2 pinentry this did not work so far (See my T2139 (bernhard on Oct 29 2015, 04:42 PM / Roundup)) other
implementation do not seem to allow it (I've also tested kdm login screen)
and it does not make much sense either when you can press "return" right away.
So to me it is still unclear how many people are affected.

@aheinecke: Thanks for contributing another case.
I think it is a good solution for a system login screen, where a login-change
probably is harder to do.
I think this slightly changes when you think about passphrases for pinentry
that may get entered less often and some people keep a backup on paper (which is
actually good under some circumstances) and I would claim that a passphrase
change on a key on average is easier to do than a system password.

@werner: You wrote that you've checked some other implementation, it would be cool
to have a list of those. Screenshots would be even better.

@all, my current design ideas are

  • to have a text below the entry field, close to it, saying "show password" and a on-off switch or second best a check-box, third best a button.

Rationale: Because the space requirement is mainly in width. An on-off switch

probably has the most natural mapping, but this depend on the overal GUI design
of the system. On some a real slider-switch may not be available or look alien,
then we should use what ever users will recognise as an on-off thing.
The text is much less work than to select/design an icon and it uses
less height.
  • It is okay to have that in the accessibility tab list, even after the entry field, because I personally believe that a lot more people want the natural order when using tab at all. Right now the data for how many people actually have the tab-enter habit is unknown, maybe Daniel can help us out here.
Nov 2 2015, 10:09 AM · pinentry, Feature Request, gpg4win

Oct 30 2015

aheinecke added a comment to T2139: pinentry option to see the password in cleartext.

Btw. The Windows 10 login screen implements this as a button that you can not
tab to and only shows the password for as long as you keep clicking it.
It also disables / hides the show password button once the password entry field
loses input focus.

They use a heavily abstracted eye icon and no tooltip. Probably with the
rationale that if a user clicks there and it shows the password
(unintentionally) he can quickly release the mouse button again before someone
can read the password.

Oct 30 2015, 1:30 PM · pinentry, Feature Request, gpg4win

Oct 29 2015

dkg added a comment to T2139: pinentry option to see the password in cleartext.

On Thu 2015-10-29 04:34:03 -0400, Bernhard Reiter via BTS wrote:

Oct 29 2015, 6:51 PM · pinentry, Feature Request, gpg4win
bernhard added a comment to T2139: pinentry option to see the password in cleartext.

@dkg: I have been thinking about your use case:

Some people are used to pinentry and
have a common keyboard-based type, tab, hit enter workflow.

I wonder about what fraction of people we are speaking of.
In many applications, just like pinentry, you can just hit "enter" right away
so there is no need to first hit "tab". First hitting "tab" does not make sense
for these kind of dialoges.

Then in some implementation like pinentry-gtk2 0.8.3-2,
this does not work right now, because the next tab is "cancel" which users then
would reach. So it depends on the standard for dialog windows where the
ok and cancel buttons are. Was there any problem report on pinentry-gtk-2?
I am not sure if any pinentry-gtk-2 user actually had this problem?

Oct 29 2015, 4:42 PM · pinentry, Feature Request, gpg4win
bernhard updated subscribers of T2139: pinentry option to see the password in cleartext.
Oct 29 2015, 9:34 AM · pinentry, Feature Request, gpg4win
bernhard added a comment to T2139: pinentry option to see the password in cleartext.

Daniel:
Thanks for your comment and adding the use case. I saw your suggestions
on the list like changing the tab order.

More specifically: Would it be fine with you to implement this without
a warning dialog that requires another click or attention?

Oct 29 2015, 9:34 AM · pinentry, Feature Request, gpg4win

Oct 28 2015

dkg added a comment to T2139: pinentry option to see the password in cleartext.

Some people are used to pinentry and have a common keyboard-based type, tab, hit
enter workflow.

Please make sure that this workflow doesn't accidentally switch their password
to visible when this change is implemented.

Oct 28 2015, 6:57 PM · pinentry, Feature Request, gpg4win
bernhard added a comment to T2139: pinentry option to see the password in cleartext.

My suggestion is also, to seek for an icon that is more self-explanatory.
Actually I would like the "gtk_switch" gui component, though Werner is right
that it takes up a bit more of space.

Oct 28 2015, 5:46 PM · pinentry, Feature Request, gpg4win
bernhard added projects to T2139: pinentry option to see the password in cleartext: gpg4win, Feature Request, pinentry, gnupg (gpg21).
Oct 28 2015, 5:45 PM · pinentry, Feature Request, gpg4win
werner removed a project from T1518: New website mirror: gnupg.
Oct 28 2015, 5:14 PM · Too Old, gpgweb, Feature Request
werner closed T1518: New website mirror as Resolved.
Oct 28 2015, 5:14 PM · Too Old, gpgweb, Feature Request
werner added projects to T1518: New website mirror: gpgweb, Too Old.
Oct 28 2015, 5:14 PM · Too Old, gpgweb, Feature Request
werner closed T2017: consider using $XDG_RUNTIME_DIR for gpg-agent socket communication as Resolved.
Oct 28 2015, 5:12 PM · Won't Fix, gnupg, Feature Request

Oct 21 2015

werner added a comment to T2120: Supporte tilde (~) expansion for dirmngr option hkp-cacert.

re T2120 (wk on Oct 19 2015, 07:54 PM / Roundup): of course I meant "Now".

Oct 21 2015, 8:29 AM · Feature Request, dirmngr
werner closed T2120: Supporte tilde (~) expansion for dirmngr option hkp-cacert as Resolved.
Oct 21 2015, 8:29 AM · Feature Request, dirmngr

Oct 19 2015

dkg removed a project from T2127: enable deprecation of specific digest algorithms: Restricted Project.
Oct 19 2015, 11:52 PM · gnupg, Feature Request
dkg added a comment to T2127: enable deprecation of specific digest algorithms.

Yes, thanks for the quick review and merge! I assume this will be released in
whatever release comes after 2.1.9.

I'm setting the status here to "resolved".

Oct 19 2015, 11:52 PM · gnupg, Feature Request
dkg closed T2127: enable deprecation of specific digest algorithms as Resolved.
Oct 19 2015, 11:52 PM · gnupg, Feature Request
languitar added a comment to T2120: Supporte tilde (~) expansion for dirmngr option hkp-cacert.

Thanks for the quick fix!

Oct 19 2015, 8:08 PM · Feature Request, dirmngr
languitar reopened T2120: Supporte tilde (~) expansion for dirmngr option hkp-cacert as "Open".
Oct 19 2015, 8:08 PM · Feature Request, dirmngr
werner closed T2120: Supporte tilde (~) expansion for dirmngr option hkp-cacert as Resolved.
Oct 19 2015, 7:54 PM · Feature Request, dirmngr
werner removed a project from T2120: Supporte tilde (~) expansion for dirmngr option hkp-cacert: Restricted Project.
Oct 19 2015, 7:54 PM · Feature Request, dirmngr
werner added a comment to T2120: Supporte tilde (~) expansion for dirmngr option hkp-cacert.

No available with 2.1.9.

Oct 19 2015, 7:54 PM · Feature Request, dirmngr
werner added a comment to T2127: enable deprecation of specific digest algorithms.

I already applied your pacthes. May I close that bug?

Oct 19 2015, 7:53 PM · gnupg, Feature Request
werner added a project to T2127: enable deprecation of specific digest algorithms: Restricted Project.
Oct 19 2015, 7:53 PM · gnupg, Feature Request
dkg added projects to T2127: enable deprecation of specific digest algorithms: Feature Request, gnupg.
Oct 19 2015, 12:15 AM · gnupg, Feature Request

Oct 16 2015

aheinecke added a project to T618: use the attachment hooks to decrypt and verify attachmantes: Won't Fix.
Oct 16 2015, 2:51 PM · Won't Fix, Feature Request, gpgol
aheinecke closed T618: use the attachment hooks to decrypt and verify attachmantes as Resolved.
Oct 16 2015, 2:51 PM · Won't Fix, Feature Request, gpgol
aheinecke added a comment to T618: use the attachment hooks to decrypt and verify attachmantes.

With the informsec code we had "decent" support for encrypted / decrypted
attachments.

With 1.3.0 we have very nice read support for MIME Attachments (including
Outlook's internal preview). And send support is on the roadmap.

But this is event based code. I'd say we can close this issue.

Oct 16 2015, 2:51 PM · Won't Fix, Feature Request, gpgol
aheinecke claimed T1095: Sig/enc status should be used when forwarding/answering a crypto message.
Oct 16 2015, 2:37 PM · gpgol, Feature Request
aheinecke added a comment to T1095: Sig/enc status should be used when forwarding/answering a crypto message.

I have to check if this is possible (Depending on the parameters in the forward
reply events this could even be trivial)

Oct 16 2015, 2:37 PM · gpgol, Feature Request
aheinecke added a comment to T1826: Cannot decrypt (PGP-MIME) message from Enigmail.

You may want to try out the latest 1.3.0 Beta version which supports reading
PGP/MIME mails. See:

https://wiki.gnupg.org/GpgOL/Development/Testversions

Oct 16 2015, 2:36 PM · Feature Request, gpg4win, gpgol

Oct 13 2015

werner closed T2124: KLDP link in doc/guide.html other doc section is dead as Resolved.
Oct 13 2015, 7:02 AM · gpgweb, Feature Request
werner added a comment to T2124: KLDP link in doc/guide.html other doc section is dead.

Fixed in the repo. Will show up with the next site rebuild. Thanks.

Oct 13 2015, 7:02 AM · gpgweb, Feature Request