Page MenuHome GnuPG
Feed Advanced Search

Nov 17 2015

neal closed T1428: --fingerprint and --with-fingerprint create slightly different results as Resolved.
Nov 17 2015, 9:31 PM · gnupg (gpg21), Debian, Bug Report, gnupg
neal added a comment to T1428: --fingerprint and --with-fingerprint create slightly different results.

It looks like this problem has been fixed in the meantime. As such, I'm marking
this bug as resolved. Thanks.

$ gpg2 --with-fingerprint 4F43C989.txt
pub rsa1024/4F43C989 2015-11-17

Key fingerprint = A8D8 E9B9 D25D 6AB8 9997  AEE4 3817 872D 4F43 C989

uid Testing <testing@testing.com>
sub rsa1024/3CAD33EE 2015-11-17
sub rsa1024/FE39BBA1 2015-11-17
sub elg1024/A10351BD 2015-11-17
$ gpg2 --fingerprint 4F43C989
pub rsa1024/4F43C989 2015-11-17

Key fingerprint = A8D8 E9B9 D25D 6AB8 9997  AEE4 3817 872D 4F43 C989

uid [ unknown] Testing <testing@testing.com>
sub rsa1024/3CAD33EE 2015-11-17
sub rsa1024/FE39BBA1 2015-11-17
sub elg1024/A10351BD 2015-11-17

Nov 17 2015, 9:31 PM · gnupg (gpg21), Debian, Bug Report, gnupg
neal closed T1423: Description of 'key' command could be improved as Resolved.
Nov 17 2015, 9:24 PM · gnupg, Debian, Feature Request
neal added a comment to T1423: Description of 'key' command could be improved.

I've fixed this with commit 0b86c74 by making it possible to select keys using
the key id. Consider:

gpg> key 4BFA08E4

pub rsa4096/D21739E9

created: 2007-06-02  expires: 2016-01-21  usage: SC  
validity: unknown

sub rsa4096/21484CFF

created: 2007-06-02  expired: 2015-02-26  usage: E

sub* rsa2048/4BFA08E4

created: 2008-06-19  expires: 2016-01-21  usage: A

sub rsa4096/1BFDFA5C

created: 2013-03-12  expires: 2016-01-21  usage: S

sub rsa2432/0CA757FB

created: 2013-09-11  expires: 2016-09-14  usage:

sub ed25519/BD7CFAB5

created: 2014-11-07  expired: 2015-05-06  usage: A

sub rsa4096/14D5DA70

created: 2015-01-21  expires: 2016-01-21  usage: E

sub ed25519/BD7CFAB5

created: 2014-11-07  expired: 2015-05-06  usage: A

sub ed25519/BD7CFAB5

created: 2014-11-07  expired: 2015-05-06  usage: A

sub ed25519/BD7CFAB5

created: 2014-11-07  expired: 2015-05-06  usage: A

sub ed25519/BD7CFAB5

created: 2014-11-07  expired: 2015-05-06  usage: A

[ unknown] (1). Daniel Kahn Gillmor <dkg@fifthhorseman.net>
[ unknown] (2) Daniel Kahn Gillmor <dkg@openflows.com>
[ revoked] (3) Daniel Kahn Gillmor <dkg@astro.columbia.edu>
[ revoked] (4) Daniel Kahn Gillmor <dkg-debian.org@fifthhorseman.net>
[ unknown] (5) [jpeg image of size 3515]
[ unknown] (6) Daniel Kahn Gillmor <dkg@debian.org>
[ unknown] (7) Daniel Kahn Gillmor <dkg@aclu.org>

Nov 17 2015, 9:24 PM · gnupg, Debian, Feature Request

Nov 13 2015

werner added a comment to T1128: gpg should detect ambigious keys specifications.

Oops. I used a plain old keyring and not a keybox. However the effect is the same.

Nov 13 2015, 9:53 AM · Feature Request, Debian, gnupg

Nov 12 2015

werner changed Version from 1.4.10 to master on T1173: gpg has no easy way to view the reason and description of revocation sigs.
Nov 12 2015, 9:20 AM · gnupg, Debian, Feature Request
werner added a comment to T1173: gpg has no easy way to view the reason and description of revocation sigs.

That should go into the keylisting. Here is a listing of a revoked
key:

  pub   dsa1024/269E78D84738350A 1999-08-16 [revoked: 2011-02-15]
        Key fingerprint = 72A2 A242 8623 84A9 5910  C454 269E 78D8 4738 350A
        Keygrip = 2BBB5EF3D036022DD66EF4386680C194352A2EC2
  uid                 [ revoked] Florian Lohoff <flo@[...]>
  uid                 [ revoked] Florian Lohoff <flo@[...]>
  uid                 [ revoked] Florian Lohoff <flor[...]>

Another line after the Keygrip line could show key revocation
information. To show user id revocations a list option is anyway
required:

  $ gpg --list-options show-unusable-uids  \
     --with-fingerprint  --with-keygrip -k 6C7EE1B8621CC013
  pub   dsa1024/6C7EE1B8621CC013 1998-07-07 [expired: 2004-12-31]
        Key fingerprint = ECAF 7590 EB34 43B5 C7CF  3ACB 6C7E E1B8 621C C013
        Keygrip = E3003A38C3CCB63DFB39998A6C8A78EB9498E42A
  uid                 [ expired] Werner Koch <wk@gnupg.org>
  uid                 [ expired] Werner Koch <werner.koch@guug.de>
  uid                 [ expired] Werner Koch <wk@[...].com>
  uid                 [ revoked] Werner Koch <wk@openit.de>

A similar formatted revocation reason could be shown after the revoked
user id. It would be best to indent that to align with the [revoked]
string.

And of course we also need to come up with a --with-colon format for
both cases.

Iff we do this it should only go into 2.1 thus I changed the Version field.

Nov 12 2015, 9:20 AM · gnupg, Debian, Feature Request
werner changed Version from 1.4.10 to master on T1128: gpg should detect ambigious keys specifications.
Nov 12 2015, 8:59 AM · Feature Request, Debian, gnupg
werner added a comment to T1128: gpg should detect ambigious keys specifications.

My problem was a different one. Here is what I wrote to gnupg-devel:

$ ../g10/gpg2 -vsbau 0xE3FDFF218E45B72B </etc/motd >/dev/null

[...]

gpg: Error: the key specification '0xE3FDFF218E45B72B' is ambiguous.

gpg: (check argument of option '--local-user')

gpg: error reading key block for '0xE3FDFF218E45B72B': Unknown system error.

gpg: Error: the key specification '1E42B367' is ambiguous.

gpg: (check argument of option '--encrypt-to')

gpg: error reading key block for '1E42B367': Unknown system error.

gpg: Warning: value '1E42B367' for --default-key should be a long keyid or a

fingerprint.

gpg: Error: the key specification '1E42B367' is ambiguous.
gpg: (check argument of option '--default-key')
gpg: error reading key block for '1E42B367': Unknown system error.
gpg: writing to stdout
gpg: EDDSA/SHA256 signature from: "E3FDFF218E45B72B Werner Koch (wheatstone

commit signing)"

  wk@wheatstone:~/b/gnupg/tmp$ echo $?
  2

Note that I have only specified a short key id because this is pretty
common and gpg prints only a warning. Okay.

The real problem is that there are several error messages - one is
sufficient to let gpg exit with a failure and git won't continue. There
are 2 different kinds of errors:

  gpg: Error: the key specification '0xE3FDFF218E45B72B' is ambiguous.

This is the keyid I specified on the command line. Let's check it:

$ ../g10/gpg2 -k 0xE3FDFF218E45B72B

[...]

gpg: Error: the key specification '1E42B367' is ambiguous.

gpg: (check argument of option '--encrypt-to')

gpg: error reading key block for '1E42B367': Unknown system error.

gpg: Warning: value '1E42B367' for --default-key should be a long keyid or a

fingerprint.

  gpg: Error: the key specification '1E42B367' is ambiguous.
  gpg: (check argument of option '--default-key')
  gpg: error reading key block for '1E42B367': Unknown system error.
  gpg: please do a --check-trustdb
  pub   ed25519/E3FDFF218E45B72B 2015-02-18 [expires: 2025-02-15]
  uid                 [ultimate] Werner Koch (wheatstone commit signing)

(and -k shows the same result).
What is the ambiguity here?

The other two error messages are identical one for --encrypt-to and one
for --default-key:

  gpg: Error: the key specification '1E42B367' is ambiguous.

Let's check it:

$ ../g10/gpg2 -k 1E42B367

[...]

gpg: Error: the key specification '1E42B367' is ambiguous.

gpg: (check argument of option '--encrypt-to')

gpg: error reading key block for '1E42B367': Unknown system error.

gpg: Warning: value '1E42B367' for --default-key should be a long keyid or a

fingerprint.

  gpg: Error: the key specification '1E42B367' is ambiguous.
  gpg: (check argument of option '--default-key')
  gpg: error reading key block for '1E42B367': Unknown system error.
  gpg: please do a --check-trustdb
  pub   dsa2048/F2AD85AC1E42B367 2007-12-31 [expires: 2018-12-31]
  uid                 [ unknown] Werner Koch <wk@gnupg.org>
  uid                 [ unknown] Werner Koch <wk@g10code.com>
  uid                 [ unknown] Werner Koch <werner@eifzilla.de>
  sub   dsa1024/4F0540D577F95F95 2011-11-02
  sub   rsa2048/1E0FE11D664D7444 2014-01-02 [expires: 2016-12-31]

Also not ambiguous.

So this new feature break existing installations. This is a complaint
as mentioned in T1128 (wk on Nov 06 2015, 10:57 AM / Roundup). Not due to performance but due to severe
breakage. This needs a lot more testing before we can release it.

Nov 12 2015, 8:59 AM · Feature Request, Debian, gnupg

Nov 11 2015

neal added a comment to T1128: gpg should detect ambigious keys specifications.

I've fixed the problem that Niibe reported in 7546e81.

Nov 11 2015, 11:20 PM · Feature Request, Debian, gnupg
werner reopened T1128: gpg should detect ambigious keys specifications as "Open".
Nov 11 2015, 8:38 AM · Feature Request, Debian, gnupg
werner added a comment to T1128: gpg should detect ambigious keys specifications.

(commit e8c53fc was for master)

This introduces a regression. I had to revert this commit to be able to keep on
using gpg in my configuration. A description of the problem can be found at:
https://lists.gnupg.org/pipermail/gnupg-devel/2015-November/030549.html

Nov 11 2015, 8:38 AM · Feature Request, Debian, gnupg

Nov 6 2015

neal added a comment to T1394: man page documents some unsupported parameters.

In 2.1, these options are supported. They are not support in 1.4, but they are
in 1.4's manual.

Nov 6 2015, 3:01 PM · gnupg, Debian, Feature Request
neal closed T1241: gnupg: need an option to automatically refuse signing photo-ids as Resolved.
Nov 6 2015, 1:17 PM · gnupg, Debian, Feature Request
neal added a comment to T1241: gnupg: need an option to automatically refuse signing photo-ids.

Added the option --only-sign-text-ids in 28e1982

Nov 6 2015, 1:17 PM · gnupg, Debian, Feature Request
neal added a comment to T1206: no check for non spaces behind a keyid.

Fix in f99830b.

Nov 6 2015, 12:31 PM · Debian, Bug Report, gnupg
neal closed T1206: no check for non spaces behind a keyid as Resolved.
Nov 6 2015, 12:31 PM · Debian, Bug Report, gnupg
neal added a comment to T1173: gpg has no easy way to view the reason and description of revocation sigs.

Where should this output be displayed? When doing gpg2 -K, revoked user ids are
not shown. Perhaps in --edit-key? Nevertheless, it would be nice to have a
command line option to get this information directly.

Nov 6 2015, 12:12 PM · gnupg, Debian, Feature Request
neal closed T1128: gpg should detect ambigious keys specifications as Resolved.
Nov 6 2015, 12:05 PM · Feature Request, Debian, gnupg
neal added a comment to T1128: gpg should detect ambigious keys specifications.

Checked in (e8c53fc).

Nov 6 2015, 12:05 PM · Feature Request, Debian, gnupg
werner added a comment to T1128: gpg should detect ambigious keys specifications.

With 'wait' I mean: Push, release, wait for complaints.

log_error (_("no such key corresponding to: %s\n"),t->d)
if (!opt.quiet)

  log_info ("(check argument of option '%s')\n", option);

However, we need to check all error messages to make sure they use a common
scheme. For example at some places we use

key 123445567: This is is not usable
Nov 6 2015, 10:57 AM · Feature Request, Debian, gnupg
neal added a comment to T1128: gpg should detect ambigious keys specifications.
  • When you say let's wait, what do you mean? In particular, how are we going to

get a user response without checking the code in?

  • Ok. I will return an error code.
  • I already do this, e.g.:

log_error (_("no such key corresponding to %s (passed to %s)\n"),

t->d, option);
Nov 6 2015, 7:55 AM · Feature Request, Debian, gnupg

Nov 5 2015

werner added a comment to T1128: gpg should detect ambigious keys specifications.

Some comments:

  • Always checking this _might_ slow down things. Let's wait for user response.
  • Please do not die in that function. We may want to use it a other places too (server mode). Better return an error (NULL) and let the caller decide what to do.
  • The strings should be changed to ease translation: For example put the second part into its own message: log_info ("(check argument of option '%s')\n", "--local-user");
Nov 5 2015, 6:23 PM · Feature Request, Debian, gnupg
neal added a comment to T1128: gpg should detect ambigious keys specifications.

D106: 719_0001-gpg-Check-for-ambiguous-or-non-matching-key-specs.patch

Nov 5 2015, 5:38 PM · Feature Request, Debian, gnupg
neal added a comment to T1128: gpg should detect ambigious keys specifications.

The following patch adds checks for --default-key, --local-user and --remote-user.

Check that any user id specifications passed to --local-user
and --remote-user correspond to exactly 1 user. Check that any user
id specifications passed to --default-key correspond to at most 1
user. Warn if any user id specifications passed to --local-user or
--default-user are possible ambiguous (are not specified by long keyid
or fingerprint).

$ gpg2 -s -a -r testing
gpg: WARNING: recipients (-r) given without using public key encryption
gpg: Error: the key specification 'testing' is ambiguous (passed to --encrypt-to).
gpg: 'testing' matches at least: 362D3527F53AAD1971AAFDE658859975EE37CF96 and
439D954F18F79CC4F71BED91CACED996BC15C85A.
$ gpg2 -s -a --local-user testing
gpg: Warning: value 'testing' for --local-user should be a long keyid or a
fingerprint.
gpg: Error: the key specification 'testing' is ambiguous (passed to --local-user).
gpg: 'testing' matches at least: 362D3527F53AAD1971AAFDE658859975EE37CF96 and
439D954F18F79CC4F71BED91CACED996BC15C85A.
$ gpg2 -s -a --default-key testing
gpg: Warning: value 'testing' for --default-key should be a long keyid or a
fingerprint.
gpg: Error: the key specification 'testing' is ambiguous (passed to --default-key).
gpg: 'testing' matches at least: 362D3527F53AAD1971AAFDE658859975EE37CF96 and
439D954F18F79CC4F71BED91CACED996BC15C85A.

Nov 5 2015, 5:38 PM · Feature Request, Debian, gnupg
neal added a comment to T1060: extract signature from encrypted and signed file/message.

Committed (ec409e6).

Nov 5 2015, 2:21 PM · gnupg (gpg21), gnupg, Debian, Feature Request
neal closed T1067: Please document gpgkey2ssh as Resolved.
Nov 5 2015, 2:16 PM · gnupg, Debian, Feature Request
neal added a comment to T1067: Please document gpgkey2ssh.

Fix in cd2d685.

Nov 5 2015, 2:16 PM · gnupg, Debian, Feature Request
neal added a comment to T1060: extract signature from encrypted and signed file/message.

Verifying the unwrapped data also works:

$ gpg2 --decrypt --unwrap /tmp/a > /tmp/b
Please enter the passphrase to unlock the OpenPGP secret key:
"Testing (insecure!)"
1024-bit RSA key, ID 6EA74366,
created 2015-09-18 (main key ID EE37CF96).

Passphrase:
gpg: encrypted with 1024-bit RSA key, ID 6EA74366, created 2015-09-18

"Testing (insecure!)"

$ gpg2 --verify /tmp/b
gpg: Signature made Wed 04 Nov 2015 01:53:31 PM CET using RSA key ID EE37CF96
gpg: Good signature from "Testing (insecure!)" [full]
gpg: Verified 7 messages signed by "Testing (insecure!)" (key: 362D 3527 F53A
AD19 71AA FDE6 5885 9975 EE37 CF96, policy: good) in the past 1 day, 20 hours.
The most recent message was verified 22 hours, 40 minutes ago.

Nov 5 2015, 12:35 PM · gnupg (gpg21), gnupg, Debian, Feature Request
neal added a comment to T1060: extract signature from encrypted and signed file/message.

D89: 708_0002-gpg-Add-support-for-unwrapping-the-outer-level-of-en.patch

Nov 5 2015, 12:32 PM · gnupg (gpg21), gnupg, Debian, Feature Request
neal added a project to T1060: extract signature from encrypted and signed file/message: In Progress.
Nov 5 2015, 12:32 PM · gnupg (gpg21), gnupg, Debian, Feature Request
neal added a comment to T1060: extract signature from encrypted and signed file/message.

D90: 707_0001-common-Add-a-function-for-copying-data-from-one-iobu.patch

Nov 5 2015, 12:31 PM · gnupg (gpg21), gnupg, Debian, Feature Request
neal added a comment to T1060: extract signature from encrypted and signed file/message.

This implements the requested --unwrap feature. It strips the first level of
encryption and then dumps the data.

$ gpg2 --decrypt --unwrap /tmp/a | gpg2 --list-packets
Please enter the passphrase to unlock the OpenPGP secret key:
"Testing (insecure!)"
1024-bit RSA key, ID 6EA74366,
created 2015-09-18 (main key ID EE37CF96).

Passphrase:
gpg: encrypted with 1024-bit RSA key, ID 6EA74366, created 2015-09-18

"Testing (insecure!)"

off=0 ctb=a3 tag=8 hlen=1 plen=0 indeterminate

:compressed packet: algo=2

off=2 ctb=90 tag=4 hlen=2 plen=13

:onepass_sig packet: keyid 58859975EE37CF96
version 3, sigclass 0x00, digest 8, pubkey 1, last=1

off=17 ctb=cb tag=11 hlen=2 plen=13 new-ctb

:literal data packet:
mode b (62), created 1446641593, name="",
raw data: 7 bytes

off=32 ctb=88 tag=2 hlen=2 plen=156

:signature packet: algo 1, keyid 58859975EE37CF96
version 4, created 1446641611, md5len 0, sigclass 0x00
digest algo 8, begin of digest b7 8a
hashed subpkt 2 len 4 (sig created 2015-11-04)
subpkt 16 len 8 (issuer key ID 58859975EE37CF96)
data: [1023 bits]

Nov 5 2015, 12:31 PM · gnupg (gpg21), gnupg, Debian, Feature Request

Nov 4 2015

neal closed T1041: --multifile --sign (or: --sign multiple files in one pass) as Resolved.
Nov 4 2015, 1:41 PM · Debian, Feature Request
neal added a comment to T1041: --multifile --sign (or: --sign multiple files in one pass).

Based on Werner's response, I believe that the underlying issue is resolved.
Thus, I'm going to close this.

Nov 4 2015, 1:41 PM · Debian, Feature Request

Nov 2 2015

gniibe set External Link to https://bugs.debian.org/771263 on T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.
Nov 2 2015, 9:21 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian
gniibe claimed T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.
Nov 2 2015, 9:21 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian

Oct 20 2015

iprok closed T2111: ssh-agent support broken as Resolved.
Oct 20 2015, 4:30 PM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh
iprok changed Version from 2.1.9 to 2.1.8 on T2111: ssh-agent support broken.
Oct 20 2015, 4:30 PM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh
iprok added a comment to T2111: ssh-agent support broken.

Removing and readding key helped. Thanks. Seems to be solved in 2.1.9

Oct 20 2015, 4:30 PM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh
gniibe added a comment to T2111: ssh-agent support broken.

Please remove your private key(s) of ed25519 and register it again.

Please see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798956#24

Oct 20 2015, 12:42 PM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh
iprok changed Version from 2.1.8 to 2.1.9 on T2111: ssh-agent support broken.
Oct 20 2015, 11:31 AM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh
iprok added a comment to T2111: ssh-agent support broken.

The same issue in 2.1.9

Oct 20 2015, 11:31 AM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh
iprok renamed T2111: ssh-agent support broken from ssh-agent support broken in 2.1.8 to ssh-agent support broken.
Oct 20 2015, 11:31 AM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh

Sep 28 2015

gniibe added a comment to T2111: ssh-agent support broken.

For no pinentry pop-up, I think that this is same cause described in the Issue 2112.
Please try the patch in T2112

Sep 28 2015, 10:35 AM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh
gniibe claimed T2111: ssh-agent support broken.
Sep 28 2015, 10:35 AM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh

Sep 24 2015

iprok added a comment to T2111: ssh-agent support broken.

I use several key of near all types: ed25519, rsa, dsa, ecdsa. All of them have
stopped working.

Sep 24 2015, 10:15 PM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh
werner added a project to T2111: ssh-agent support broken: ssh.
Sep 24 2015, 10:42 AM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh
werner removed a project from T2111: ssh-agent support broken: gpgagent.
Sep 24 2015, 10:42 AM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh
werner added a comment to T2111: ssh-agent support broken.

Duplicate of T2096

Sep 24 2015, 10:42 AM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh
werner added a project to T2111: ssh-agent support broken: Duplicate.
Sep 24 2015, 10:42 AM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh
werner added a comment to T2111: ssh-agent support broken.

Are you using an Ed25519 key? There was a regression in 2.1.8 which has
meanwhile be fixed in the repo. See also T2096.

Sep 24 2015, 10:42 AM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh

Sep 23 2015

iprok added projects to T2111: ssh-agent support broken: gnupg (gpg21), gpgagent, gnupg, Bug Report, Debian.
Sep 23 2015, 6:51 PM · Debian, Bug Report, gnupg, Duplicate, gnupg (gpg21), ssh

Sep 21 2015

werner removed a project from T1841: gpg-connect-agent: percent+ function doesn't encode '+': Restricted Project.
Sep 21 2015, 8:53 AM · Debian, Bug Report, gnupg
werner closed T1841: gpg-connect-agent: percent+ function doesn't encode '+' as Resolved.
Sep 21 2015, 8:53 AM · Debian, Bug Report, gnupg
werner removed a project from T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8: In Progress.
Sep 21 2015, 8:47 AM · gnupg, Bug Report, Debian
werner closed T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8 as Resolved.
Sep 21 2015, 8:47 AM · gnupg, Bug Report, Debian

Sep 9 2015

werner added a comment to T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8.

Solution (c) will be used for 2.1.8.

Won't fix in 1.4 because that version is mostly useful on old systems and those
don't have proper utf-8 supoort anyway.

Sep 9 2015, 4:20 PM · gnupg, Bug Report, Debian
werner added a project to T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8: In Progress.
Sep 9 2015, 4:20 PM · gnupg, Bug Report, Debian

Aug 31 2015

neal added a project to T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8: gnupg.
Aug 31 2015, 7:03 PM · gnupg, Bug Report, Debian
werner added a comment to T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer".

Originally dirmngr was a system wide daemon. Thus a limit made a lot of sense
so that users could not oincrease the memory usage of dirmngr. As a user daemon
this is not too problematic anymore but (in contrast to GNU policy), having
limits is still good to avoid DoS. The packet parser also employs certain
limits, like 2K for a user ID or 16M for an attribute packet.

I assume keyservers also have some limit - or at least they should have one to
help against misuse as cheap storage provider. What about using this limit?

Aug 31 2015, 7:26 AM · gnupg, gnupg (gpg21), Debian, Bug Report
dkg added a comment to T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer".

can you explain why the limit is useful? e.g. does it increase efficiency in
some metric? defend against certain classes of attack? something else? sorry
that i don't understand the tradeoff fully.

a runtime configuration would be better than a hard fail, but in either case it
seems like we're asking the user to fiddle with things that they shouldn't have
to think about or understand. is there a way that we can automatically detect
the reason for the failure and make things Just Work for normal users without
opening up the tooling to more problems?

Aug 31 2015, 12:42 AM · gnupg, gnupg (gpg21), Debian, Bug Report

Aug 28 2015

aheinecke added a comment to T2077: gpgsm: Can't create certificate.

To clarify werners comment. The revert is part of the 2.0 branch. I've
confoirmed the fix works so -> resolved) But awaiting a package / downstream
deployment.
The default for 2.0 won't be changed away from SHA-1.

This will be part of the next gpg4win release.

(Btw. Good to see you here sandro ;-) )

Aug 28 2015, 11:00 PM · Bug Report, Debian, gnupg
aheinecke closed T2077: gpgsm: Can't create certificate as Resolved.
Aug 28 2015, 11:00 PM · Bug Report, Debian, gnupg
werner added a comment to T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer".

The limit set by dirmngr is in general useful. Shall we make the limit
configurable at runtime?

Aug 28 2015, 10:35 AM · gnupg, gnupg (gpg21), Debian, Bug Report
werner added a comment to T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer".

Oh well, the hang is indeed a libassuan bug. The assuan_inquire fucntion
stopped reading as soon as a supplied limit was reached and returned to the
caller. The caller (dirmngr), printed an error and sends back an ERR line.
Hwoever, the client kept on sending the remaining lines and thus messed uo the
protocol.

Just fixed it in libassuan (5a52404) by reading up the extra lines before
returing from assuan_inquire.

Aug 28 2015, 10:33 AM · gnupg, gnupg (gpg21), Debian, Bug Report

Aug 27 2015

werner claimed T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer".
Aug 27 2015, 3:35 PM · gnupg, gnupg (gpg21), Debian, Bug Report
werner changed Version from 2.2.0 to 2.1 on T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer".
Aug 27 2015, 3:35 PM · gnupg, gnupg (gpg21), Debian, Bug Report
werner added projects to T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer": gnupg (gpg21), gnupg.
Aug 27 2015, 3:35 PM · gnupg, gnupg (gpg21), Debian, Bug Report
werner set External Link to https://bugs.debian.org/770592 on T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer".
Aug 27 2015, 3:35 PM · gnupg, gnupg (gpg21), Debian, Bug Report
werner removed a project from T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer": libassuan.
Aug 27 2015, 3:35 PM · gnupg, gnupg (gpg21), Debian, Bug Report
werner added a comment to T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer".

Re-assigning to gnupg. libassuan works correctly, afaics.
When trying to send back Zack's key I had the same problem last week and
increased the limit in dirmngr (84f4c8811fc5bdd78693c4dc289389a8337cc257).
I also mentioned that in a comment to another Debian bug report.

However, their should not be a hang but a proper error diagnostic; it is on my list.

Aug 27 2015, 3:35 PM · gnupg, gnupg (gpg21), Debian, Bug Report
dkg added a comment to T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer".

with 2.1.7, i see no hang, but i do see failure with certain large certificates,
like 0xB27B944E34884E85:

0 dkg@alice:~$ gpg2 --send 0xB27B944E34884E85
gpg: sending key 0xB27B944E34884E85 to hkps server hkps.pool.sks-keyservers.net
gpg: keyserver send failed: Too much data for IPC layer
gpg: keyserver send failed: Too much data for IPC layer
2 dkg@alice:~$

maybe the boundary is 500KiB? I don't have this problem with my own OpenPGP cert:

0 dkg@alice:~$ gpg2 --export 0EE5BE979282D80B9F7540F1CCD2ED94D21739E9 | wc

3126   11384  481051

0 dkg@alice:~$ gpg2 --export 0xB27B944E34884E85 | wc

4310   13779  541937

0 dkg@alice:~$

Aug 27 2015, 3:03 PM · gnupg, gnupg (gpg21), Debian, Bug Report

Aug 24 2015

werner added a comment to T2077: gpgsm: Can't create certificate.

This is a regression in 2.0.28. The fix is
commit 35d3ced4fda90a5410a579850ca92ea6a356b402
which reverts to use SHA-1 for a CSR.

It works fine in 2.1 but backporting the changes is not planned.

Aug 24 2015, 3:23 PM · Bug Report, Debian, gnupg
werner added a project to T2077: gpgsm: Can't create certificate: gnupg.
Aug 24 2015, 3:18 PM · Bug Report, Debian, gnupg
werner set Version to 2.0.28 on T2077: gpgsm: Can't create certificate.
Aug 24 2015, 3:18 PM · Bug Report, Debian, gnupg
hefee added projects to T2077: gpgsm: Can't create certificate: Debian, Bug Report.
Aug 24 2015, 1:49 PM · Bug Report, Debian, gnupg
hefee set External Link to https://bugs.debian.org/796774 on T2077: gpgsm: Can't create certificate.
Aug 24 2015, 1:49 PM · Bug Report, Debian, gnupg

Aug 18 2015

anarcat added a comment to T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8.

i prefer solution (c): we should assume utf8, if we are going to assume anything
at all.

if the user doesn't provide UTF8 *and* doesn't have the proper locale set, then
we should exit with a meaningful message.

that way, things break for people that don't have a properly configured locale
*and* try to input non-UTF8 as opposed to just fail if locale is *not
configured*, which is a pretty common scenario.

Aug 18 2015, 1:30 AM · gnupg, Bug Report, Debian
anarcat changed External Link from https://bugs.debian.org/795229, to https://bugs.debian.org/795229 on T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8.
Aug 18 2015, 1:30 AM · gnupg, Bug Report, Debian

Aug 13 2015

werner claimed T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8.
Aug 13 2015, 6:16 PM · gnupg, Bug Report, Debian

Aug 12 2015

dkg added a comment to T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8.

hm, common/utf8conv.c says this:

  /* Note that we silently assume that plain ASCII is actually meant
     as Latin-1.  This makes sense because many Unix system don't have
     their locale set up properly and thus would get annoying error
     messages and we have to handle all the "bug" reports. Latin-1 has
     always been the character set used for 8 bit characters on Unix
     systems. */

I wonder if this is still the best choice. In my experience, far more machines
have text in some UTF-8 encoding today than in Latin-1. this is especially true
for systems that deal with OpenPGP User IDs, where UTF-8 is the canonical
representation.

If the user's environment claims that it's plain ASCII and we're seeing 8-bit
characters, gpg does have to make a decision about what to do. i see four options:

a) report an error and fail.

b) pretend that the 8-bit characters are Latin-1 (this is "OK" because any
bytestring is a valid Latin-1 string)

c) pretend that the 8-bit characters are UTF-8

d) do some sort of autodetection on the bytestring (e.g. if it is a valid UTF-8
byte sequence then treat as UTF-8, otherwise treat as Latin-1)

option (a) is annoying and likely a cause of spurious complaints, as the comment
notes. GnuPG is currently going with option (b). Option (c) seems more
reasonable to me because of OpenPGP's relationship with UTF-8, but introduces
some error cases (what do we do where the bytestring is not valid UTF-8?).
Option (d) avoids error cases but might be a bit more delicate to implement.

What do you think?

Aug 12 2015, 7:46 PM · gnupg, Bug Report, Debian
dkg added a comment to T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8.

I think werner means --utf8-strings instead of --utf-strings.

Aug 12 2015, 4:24 PM · gnupg, Bug Report, Debian
werner set External Link to https://bugs.debian.org/795229, on T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8.
Aug 12 2015, 9:58 AM · gnupg, Bug Report, Debian
werner added a comment to T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8.

I did a couple of tests but I do not understand what is going on.
There is also an older key of Antoine 231A87628530E205 which encodes
his name in Latin-1 (wrong charset during creation or PGP was used).

Using

  gpg -vvv ....

shows the character set used by gpg. Maybe this gives some insights.
If you know that the command line is UTF-8 you may use the option
--utf-strings to avoid any conversion.

FWIW, gpg uses LC_ALL, LC_LANG, LANG in that order to determine the
locale. Antoine's original report shows

  Locale: LANG=fr_CA.UTF-8, LC_CTYPE=fr_CA.UTF-8 (charmap=UTF-8)

and thus UTF-8 should be used due do LC_CTYPE. gpg converts command
line arguments back and forth as needed but passes them as utf-8 to
the keyserver (which is the reason that the "searching for =..."
message renders it differently.

Aug 12 2015, 9:58 AM · gnupg, Bug Report, Debian
dkg added projects to T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8: Debian, Bug Report.
Aug 12 2015, 3:35 AM · gnupg, Bug Report, Debian

Jun 23 2015

werner closed T1661: Gnupg directories not variable in the documentation as Resolved.
Jun 23 2015, 12:09 PM · Feature Request, Debian, gnupg
werner removed a project from T1661: Gnupg directories not variable in the documentation: Restricted Project.
Jun 23 2015, 12:09 PM · Feature Request, Debian, gnupg

Jun 12 2015

neal added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

Hi Brian,

Jun 12 2015, 4:26 PM · Bug Report, Debian, pinentry
bjmgeek added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

Jun 12 2015, 4:26 PM · Bug Report, Debian, pinentry
bjmgeek added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

I tried it in PuTTY without screen and it was not skewed. The line draw
characters looked funny (which I'm assuming is a Unicode thing), but they
were in a rectangle.

Jun 12 2015, 4:26 PM · Bug Report, Debian, pinentry
neal added a comment to T1992: pinentry in text mode is skewed when using PuTTY and GNU screen.

bjmgeek: ping

Jun 12 2015, 3:16 PM · Bug Report, Debian, pinentry

Jun 9 2015

werner removed Due Date on T1661: Gnupg directories not variable in the documentation.
Jun 9 2015, 9:33 PM · Feature Request, Debian, gnupg
werner added a project to T1661: Gnupg directories not variable in the documentation: Restricted Project.
Jun 9 2015, 9:33 PM · Feature Request, Debian, gnupg
werner added a comment to T1661: Gnupg directories not variable in the documentation.

Done with commit 25331bb for 2.1.5.
Won't be backported to 2.0 or 1.4.

This also changes the publication date to the date of the last commit for one of
the texi files. This was the original intention of the version.texi file but
that did not worked in a git world.

Jun 9 2015, 9:33 PM · Feature Request, Debian, gnupg

Jun 8 2015

werner set Due Date to Jun 30 2015, 2:00 AM on T1661: Gnupg directories not variable in the documentation.
Jun 8 2015, 8:09 PM · Feature Request, Debian, gnupg
werner added a comment to T1661: Gnupg directories not variable in the documentation.

Won't be done for 2.0 but I will try to implement that for 2.1

Jun 8 2015, 8:08 PM · Feature Request, Debian, gnupg

Jun 5 2015

neal added a comment to T1996: pinentry-gtk-2 returns an empty passphrase string if typed passphrase is longer than 32 chars.

I've now applied the patch.

Jun 5 2015, 5:18 PM · Bug Report, Debian, pinentry
neal closed T1996: pinentry-gtk-2 returns an empty passphrase string if typed passphrase is longer than 32 chars as Resolved.
Jun 5 2015, 5:18 PM · Bug Report, Debian, pinentry
dkg added a comment to T1996: pinentry-gtk-2 returns an empty passphrase string if typed passphrase is longer than 32 chars.

ah, right! the other option is to pass mb->size instead of size in the memset call.

We should really synchronize secmem.c between libgcrypt:src/secmem.c,
pinentry:secmem/secmem.c, and gpg-STABLE-BRANCH-1-4:util/secmem.c :/

Jun 5 2015, 5:46 AM · Bug Report, Debian, pinentry