Page MenuHome GnuPG
Feed Advanced Search

Dec 9 2015

aheinecke claimed T2135: Keyring locking on Windows broken.
Dec 9 2015, 8:54 PM · Bug Report, gpg4win, Windows, gnupg, Windows 32
bernhard added a comment to T1817: Changing expiration on subkeys breaks subkeys.

Some more infos:

https://www.openkeychain.org/faq/#importing-your-own-key-from-gnupg-fails
says that this is a problem for a number of people.

Werner told me that porting the fix back would mean to basically
migrate 2.0 to 2.1, which is useless because 2.1 is already 2.1.

Another possibility would be to change --export to mix public keys (certs)
with secret keys. This would create other problems and thus is not
adviable for a stable version.

So I think this is "won't fix" because it (technically) does not make
sense to fix in 1.4 or 2.0. Solutions: Use 2.1 or wait for 2.2.
As importing implementation: Be tolerant for this problem man use the cert
information if you can.

Dec 9 2015, 3:55 PM · Won't Fix, gnupg (gpg20), gnupg (gpg14), Bug Report, gnupg
bernhard closed T1817: Changing expiration on subkeys breaks subkeys as Resolved.
Dec 9 2015, 3:55 PM · Won't Fix, gnupg (gpg20), gnupg (gpg14), Bug Report, gnupg
bernhard removed projects from T1817: Changing expiration on subkeys breaks subkeys: Stalled, maybe.
Dec 9 2015, 3:55 PM · Won't Fix, gnupg (gpg20), gnupg (gpg14), Bug Report, gnupg
bernhard changed Version from 1.4.18 & 2.0.26 to 1.4.18, 2.0.26 on T1817: Changing expiration on subkeys breaks subkeys.
Dec 9 2015, 3:55 PM · Won't Fix, gnupg (gpg20), gnupg (gpg14), Bug Report, gnupg
bernhard added projects to T1817: Changing expiration on subkeys breaks subkeys: gnupg (gpg20), Won't Fix.
Dec 9 2015, 3:55 PM · Won't Fix, gnupg (gpg20), gnupg (gpg14), Bug Report, gnupg
werner added a comment to T1166: Connecting once-per-key for keys with keyserver preference vs server violate reconnection limit.

The keyserver preferences are major privacy problem. They should not be used
and in fact they are ignored in Tor mode. Thus we should not put too much work
in fixing this wish.

Dec 9 2015, 3:27 PM · Ubuntu, gnupg, Feature Request
werner added a comment to T2106: Support SHA-256 fingerprints for ssh.

6.7 still shows MD5 fingerprints thus switching won't be easy. Does the SHA-256
fingerprint use Base32? If that is the case it might be a serious UX problem
because most people are used to look for colon separated hex digits.

Dec 9 2015, 3:11 PM · gnupg (gpg22), gnupg, ssh, Feature Request

Dec 8 2015

justus added a comment to T1827: Allow to batch up key refreshs in dirmngr.

Related issue: #1166.

Dec 8 2015, 11:46 AM · gnupg, Feature Request, dirmngr
justus claimed T1827: Allow to batch up key refreshs in dirmngr.
Dec 8 2015, 11:46 AM · gnupg, Feature Request, dirmngr
justus added a comment to T1166: Connecting once-per-key for keys with keyserver preference vs server violate reconnection limit.

Now that we have a dirmngr daemon, this should be feasible. I plan to implement
it like this:

Add two flags to the KS_GET command, --enqueue and --drain-queue. --enqueue
merely enqueues the key id and returns immediately, unless --drain-queue is
given.

This will also help us address issue #1827.

Dec 8 2015, 11:45 AM · Ubuntu, gnupg, Feature Request
justus claimed T1166: Connecting once-per-key for keys with keyserver preference vs server violate reconnection limit.
Dec 8 2015, 11:45 AM · Ubuntu, gnupg, Feature Request

Dec 7 2015

dhoffend added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

After looking at the gnupg 2.0 branch I would say the patch could be applied
to the 2.0 and 2.1 branch to fix the issue in both branches stable/modern
since both version are affected (tested with 2.1.9 and 2.0.29 from gpg2win)

Dec 7 2015, 10:49 PM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
dhoffend added projects to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon: Windows 32, Windows, scd, gnupg (gpg21), gnupg (gpg20), Windows 64, patch.
Dec 7 2015, 10:49 PM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
aheinecke added projects to T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected: gnupg (gpg21), gpgagent, gnupg, Bug Report.
Dec 7 2015, 6:02 PM · gnupg24, gnupg26, Bug Report, gpgagent, gnupg (gpg21)
aheinecke updated subscribers of T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected.
Dec 7 2015, 6:02 PM · gnupg24, gnupg26, Bug Report, gpgagent, gnupg (gpg21)
dhoffend added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

I was looking a bit deeper into the gnupg code and debug messages. As soon as I
plug out the yubikey the usb smartcard reader including the internal smartcard
is no longer available. GnuPG is sending the following messages:

  1. this call is still okay 2015-12-06 23:20:31 scdaemon[10940] DBG: enter: apdu_get_status: slot=0

hang=0

2015-12-06 23:20:31 scdaemon[10940] DBG: leave: apdu_get_status => sw=0x0

status=7 changecnt=1

  1. here the card is no longer available 2015-12-06 23:20:31 scdaemon[10940] DBG: enter: apdu_get_status: slot=0

hang=0

2015-12-06 23:20:31 scdaemon[10940] pcsc_get_status_change failed: no

service (0x8010001d)

2015-12-06 23:20:31 scdaemon[10940] DBG: leave: apdu_get_status =>

sw=0x1000b status=7 changecnt=1

Error Message 0x8010001d == SCARD_E_NO_SERVICE (The Smart card resource manager
is not running.)
https://pcsclite.alioth.debian.org/api/group__ErrorCodes.html#gad4729ab109ff490
285d2ad881c04bee8

Now there's an internal mapping happing from 0x8010001d to sw=0x1000b
http://git.gnupg.org/cgi-bin/gitweb.cgi?
p=gnupg.git;a=blob;f=scd/apdu.c;h=95a25611b7ff46c87e2e888643bec0a10454f894;hb=H
EAD#l899

The SCD internal resulting error is 0x1000b means SW_HOST_GENERAL_ERROR which
is the default error if nothing else has matched yet.

The next lines in the logfiles are showing a different pcsc error code.

2015-12-06 23:20:32 scdaemon[10940] DBG: enter: apdu_get_status: slot=0

hang=0

2015-12-06 23:20:32 scdaemon[10940] pcsc_get_status_change failed: service

stopped (0x8010001e)

2015-12-06 23:20:32 scdaemon[10940] DBG: leave: apdu_get_status =>

sw=0x1000b status=7 changecnt=1

Error Message 0x8010001d == SCARD_E_SERVICE_STOPPED (The Smart card resource
manager has shut down.)
https://pcsclite.alioth.debian.org/api/group__ErrorCodes.html#ga262c34297ab1b65
db1c9516ccc0dd9a0

The pcsc error code is still mapped to the generic error code (0x1000b)

--

possible resolution: I've no clue if the error codes 0x8010001d or 0x8010001e
are thrown in different scenarios. But if we would map those 2 messages to the
internal SW_HOST_NO_READER error the scdaemon would like remove the (likely
disconnected usb) reader from the current list, resulting in freeing up the
used card.

I can't verify this idea cause I'm not able to compile gnupg under windows but
I've attached a solution patch in this ticket

Dec 7 2015, 12:20 AM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
dhoffend added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

D339: 732_0001-scd-Fix-removal-of-unplugged-usb-readers.patch

Dec 7 2015, 12:20 AM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report

Dec 4 2015

justus added a comment to T2106: Support SHA-256 fingerprints for ssh.

I generalized the ssh key fingerprinting code so that we can select the digest algorithm.

Now I'm a little unsure how to proceed. We can easily include both the MD5 and the SHA256 digest
in the sshcontrol file. But what shall we use for expanding '%F' in key descriptions? If we
transition too soon or too late, users might not recognize their key. Displaying both surely is
too verbose. We could make it configurable, or at least a compile time option.

What do you think?

Dec 4 2015, 3:49 PM · gnupg (gpg22), gnupg, ssh, Feature Request
justus closed T1038: Specify and use multiple keyservers as Resolved.
Dec 4 2015, 1:08 PM · gnupg (gpg21), gnupg, Debian, Feature Request
justus added a comment to T1038: Specify and use multiple keyservers.

Err, fixed in 6ac57a48.

Dec 4 2015, 1:08 PM · gnupg (gpg21), gnupg, Debian, Feature Request
justus added a comment to T1038: Specify and use multiple keyservers.

Fixed in

Dec 4 2015, 1:07 PM · gnupg (gpg21), gnupg, Debian, Feature Request
justus added a comment to T1221: gpg misinterprets under-implemented keyservers as empty, misreports search results to users.

Fixed in a8308ba5.

% g10/gpg2 --keyserver hkp://keyring.debian.org --search-keys dkg
gpg: NOTE: THIS IS A DEVELOPMENT VERSION!
gpg: It is only intended for test purposes and should NOT be
gpg: used in a production environment or with production keys!
gpg: error searching keyserver: Not implemented
gpg: keyserver search failed: Not implemented

Dec 4 2015, 1:02 PM · Feature Request, gnupg
justus closed T1221: gpg misinterprets under-implemented keyservers as empty, misreports search results to users as Resolved.
Dec 4 2015, 1:02 PM · Feature Request, gnupg
werner closed T2050: «keyserver receive failed: General error» when using HKPS as Resolved.
Dec 4 2015, 9:18 AM · gnupg, Bug Report
werner closed T2130: Using HKPS gives me "gpg: error searching keyserver: General error" as Resolved.
Dec 4 2015, 9:17 AM · gnupg, Bug Report

Dec 3 2015

dhoffend added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

Well ... the udev can only be a workaround. Killing the scdaemon from the
outside is not the correct way to handle this issue.

scdaemon should realize it itself that it's connection to the smartcard has
been stopped/killed/canceled/disconnected (whatever) and kill/reset and
restart it's internal process leading to removing the previously loaded card
from the memory.

There should be no need for an outside trigger.

I tested this with a fresh windows10 (which has never seen a yubikey
before). I installed gnupg 2.1.9 binaries and gnupg was able to speak with
the card with no additional drivers needed. (the problem with disconnecting
the card still occours).

And without the need of special drivers there should be no need for any
special rules to be applied.

Dec 3 2015, 8:33 PM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
justus claimed T1221: gpg misinterprets under-implemented keyservers as empty, misreports search results to users.
Dec 3 2015, 5:54 PM · Feature Request, gnupg
justus added a comment to T1221: gpg misinterprets under-implemented keyservers as empty, misreports search results to users.

The problem here is that the hkp client code folds all http status codes other
than 200 and 3xx into GPG_ERR_NO_DATA. This is also a problem for issue #1038.

Dec 3 2015, 5:54 PM · Feature Request, gnupg
justus claimed T2106: Support SHA-256 fingerprints for ssh.
Dec 3 2015, 5:19 PM · gnupg (gpg22), gnupg, ssh, Feature Request
justus claimed T1038: Specify and use multiple keyservers.
Dec 3 2015, 5:02 PM · gnupg (gpg21), gnupg, Debian, Feature Request
guilhem added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

In the meantime, a workaround is to add an udev rule to scdaemon whenever the
Yubikey is plugged in:
https://github.com/Yubico/yubikey-personalization/issues/36 . I guess it doesn't
work on Windows, though.

Dec 3 2015, 1:38 PM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
guilhem set External Link to https://lists.gnupg.org/pipermail/gnupg-users/2010-September/039502.html on T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.
Dec 3 2015, 1:33 PM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
guilhem updated subscribers of T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.
Dec 3 2015, 1:30 PM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
dhoffend added projects to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon: gnupg, Bug Report.
Dec 3 2015, 12:57 AM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
dhoffend set Version to 2.1.9 on T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.
Dec 3 2015, 12:57 AM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
dhoffend added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

Dec 3 2015, 12:57 AM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report

Dec 2 2015

archange added a comment to T2050: «keyserver receive failed: General error» when using HKPS.

OK, so things have changed regarding how this is handled since 2.1. That’s
probably why people like me think it’s still bogus, because behind the true bug
there was also another underlying change.

I can confirm it now works once correctly configured. Thanks for your help.

This, 2123 and 2130 can be closed I think.

Dec 2 2015, 10:51 PM · gnupg, Bug Report
tpreissler added a comment to T2130: Using HKPS gives me "gpg: error searching keyserver: General error".

On Wed, Dec 02, 2015 at 12:55:23PM +0000, Justus Winter via BTS wrote:

Justus Winter <justus@g10code.com> added the comment:

I can reproduce this without the proper configuration described in https://sks-
keyservers.net/overview-of-pools.php#pool_hkps:

Dec 2 2015, 10:06 PM · gnupg, Bug Report
justus added a comment to T1989: Missing support for IPv4 may lead to problems..

I'm not sure, I reverted said change, and it still works for me:

% echo -e "KEYSERVER hkp://ipv6.pool.sks-keyservers.net/\nKS_SEARCH CADE3658\n"

dirmngr/dirmngr 2>&1grep dead

dirmngr[10105.0]: marking host '[2a01:4f8:192:f5::3]' as dead
dirmngr[10105.0]: marking host '[2001:41d0:2:a8b4::10]' as dead
dirmngr[10105.0]: marking host '[2001:67c:2050:1000::3:4]' as dead
dirmngr[10105.0]: marking host 'hufu.ki.iif.hu' as dead

Dec 2 2015, 3:16 PM · Bug Report, gnupg, dirmngr
justus closed T1351: Gpg-zip script problem creating tarball compressed archives. as Resolved.
Dec 2 2015, 3:07 PM · Bug Report, gnupg
justus added a comment to T2050: «keyserver receive failed: General error» when using HKPS.

The log clearly states the problem:

2015-10-09 10:27:37 dirmngr[2516.0] TLS verification of peer failed: The
certificate is NOT trusted. The certificate issuer is unknown.

Please see https://sks-keyservers.net/overview-of-pools.php#pool_hkps for how to
configure gpg properly. With the CA for the pool, this works as expected.
(remember to kill the old dirmngr daemon):

% gpg2 --keyserver hkps://hkps.pool.sks-keyservers.net --recv-keys
5EE1DBA789C809CB
gpg: NOTE: THIS IS A DEVELOPMENT VERSION!
gpg: It is only intended for test purposes and should NOT be
gpg: used in a production environment or with production keys!
gpg: key 89C809CB: public key "git-annex distribution signing key (for Joey
Hess) <id@joeyh.name>" imported
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
gpg: Total number processed: 1
gpg: imported: 1

Dec 2 2015, 2:01 PM · gnupg, Bug Report
justus added a comment to T2130: Using HKPS gives me "gpg: error searching keyserver: General error".

I can reproduce this without the proper configuration described in https://sks-
keyservers.net/overview-of-pools.php#pool_hkps:

% :> /home/teythoon/repos/g10/local/gnupghome/dirmngr.conf
% gpg2 --keyserver hkps://hkps.pool.sks-keyservers.net --search-keys 2071B08A33BD3F06
gpg: NOTE: THIS IS A DEVELOPMENT VERSION!
gpg: It is only intended for test purposes and should NOT be
gpg: used in a production environment or with production keys!
gpg: error searching keyserver: General error
gpg: keyserver search failed: General error

But with it, it seems to work fine. Remember to kill the old daemon first:

% echo hkp-cacert /home/teythoon/repos/g10/sks-keyservers.netCA.pem >
/home/teythoon/repos/g10/local/gnupghome/dirmngr.conf
% pkill dirmngr
% gpg2 --keyserver hkps://hkps.pool.sks-keyservers.net --search-keys 2071B08A33BD3F06
gpg: NOTE: THIS IS A DEVELOPMENT VERSION!
gpg: It is only intended for test purposes and should NOT be
gpg: used in a production environment or with production keys!
gpg: data source: https://jarvis.alpha-labs.net:443
(1) NIIBE Yutaka (GnuPG Release Key) <gniibe@fsij.org>

          2048 bit RSA key 33BD3F06, created: 2014-10-29, expires: 2016-10-28

You can talk to the dirmngr directly like this:

% echo -e "KEYSERVER hkps://hkps.pool.sks-keyservers.net\nKS_SEARCH 2071B08A33BD3F06\n" | dirmngr

If this still does not work for you, please paste the output of the above invocation.

Dec 2 2015, 1:55 PM · gnupg, Bug Report
justus added a comment to T1935: gpg-zip not installed by default.

'gpg-zip' is being phased out. It will be shipped with gpg-classic, and dropped
from gpg-modern. Furthermore, I just checked that we no longer install gpg-
zip.1.

Dec 2 2015, 1:10 PM · gnupg
justus removed a project from T1935: gpg-zip not installed by default: Bug Report.
Dec 2 2015, 1:10 PM · gnupg
justus closed T1935: gpg-zip not installed by default as Invalid.
Dec 2 2015, 1:10 PM · gnupg
ivansopin added a comment to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent.

Dec 2 2015, 4:26 AM · Restricted Project, gnupg, Bug Report
ivansopin added a comment to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent.

UPDATE: The latest gpg on an AIX box that I could get my hands on does not work
at all, so until that problem is resolved I cannot really test further.

When we invoke gpgme a process just hangs, but as far as we can tell from the
strace, gpg is busy closing file descriptors in the entire file descriptor
range! If we limit the file descriptor range to a smaller number (by, say,
"limit descriptors 4096 ; limit -h descriptors 4096"), we get a fast failure.

The gpg versions we have installed are 2.0.26 and 1.4.18. It seems that the
pinentry program never even gets invoked. Attached is a program you can test with.

Dec 2 2015, 4:26 AM · Restricted Project, gnupg, Bug Report

Dec 1 2015

werner added a comment to T1825: Add a re-encrypt to additional key.

Right, or for example to re-encrypt a message to a workmate.

Dec 1 2015, 7:01 PM · Restricted Project, gnupg24, Feature Request
werner added a comment to T2160: --delete-key doesn't delete the same amount of keys obtained with --recv-key.

I have no examples. However I have seen too many scripts using gpg in often
very strange ways. Thus I always hesitate to change anything even if it is
clearly stated that this is not a documented interface.

People often hack something, it works for them, and they continue with other
work. Years later things break and nobody is left knowing what the code
actually does. Not good but that is how things are.

Dec 1 2015, 6:57 PM · gnupg, Bug Report
werner added a project to T2166: gpg 2048R - why encryption data length is different if text data 36 bytes: Support.
Dec 1 2015, 6:51 PM · Support, gnupg
werner closed T2166: gpg 2048R - why encryption data length is different if text data 36 bytes as Invalid.
Dec 1 2015, 6:27 PM · Support, gnupg
werner updated subscribers of T2166: gpg 2048R - why encryption data length is different if text data 36 bytes.
Dec 1 2015, 6:27 PM · Support, gnupg
werner lowered the priority of T2166: gpg 2048R - why encryption data length is different if text data 36 bytes from High to Normal.
Dec 1 2015, 6:27 PM · Support, gnupg
werner added a comment to T2166: gpg 2048R - why encryption data length is different if text data 36 bytes.

There is no guarantee how long the output will be. Several factors influence
this. For example the compression or removed leading zero bytes in encrypted
random session keys can have this effect.

If you have more questions about this, please direct them to one of the mailing
lists.

Dec 1 2015, 6:27 PM · Support, gnupg
werner removed a project from T2166: gpg 2048R - why encryption data length is different if text data 36 bytes: Bug Report.
Dec 1 2015, 6:27 PM · Support, gnupg
inharinath added projects to T2166: gpg 2048R - why encryption data length is different if text data 36 bytes: gnupg, Bug Report.
Dec 1 2015, 7:44 AM · Support, gnupg

Nov 30 2015

werner added a comment to T2135: Keyring locking on Windows broken.

I just double checked the code from 2.1 - it looks really okay.
I need to look at the 2.x branch, though.

Nov 30 2015, 9:01 PM · Bug Report, gpg4win, Windows, gnupg, Windows 32
werner added a project to T1973: Wrong line endings when decrypting to console: Info Needed.
Nov 30 2015, 4:17 PM · Windows 32, Windows, Bug Report, gnupg
werner added a comment to T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer".

FWIW, with commit 19545e3a from 2015-09-09 I had bumped the limit up to 20MiB.
This should solve all current practical problems.

Nov 30 2015, 4:16 PM · gnupg, gnupg (gpg21), Debian, Bug Report
werner closed T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer" as Resolved.
Nov 30 2015, 4:16 PM · gnupg, gnupg (gpg21), Debian, Bug Report
werner removed a project from T2165: dirmngr doc references missing keyserver-options documention: Bug Report.
Nov 30 2015, 4:09 PM · gnupg, Documentation, Feature Request, dirmngr
werner added projects to T2165: dirmngr doc references missing keyserver-options documention: Feature Request, Documentation, gnupg.
Nov 30 2015, 4:09 PM · gnupg, Documentation, Feature Request, dirmngr

Nov 27 2015

aheinecke added a comment to T2135: Keyring locking on Windows broken.

Test data from: http://keyserver.borgnet.us/dump/sks-dump-0000.pgp.bz2

In one console window:
mkdir c:\test-issue2135
set GNUPGHOME=c:\test-issue2135
gpg2 --import c:\users\aheinecke\Desktop\sks-dump-0000.pgp

in another:
set GNUPGHOME=c:\test-issue2135
gpg2 -k

Triggers this: (And the error messages also look wrong)

gpg: waiting for lock c:/test-issue2135/pubring.gpg.lock...
gpg: renaming c:/test-issue2135/pubring.gpg' to c:/test-issue2135/pubring.bak'
failed: Permission
denied
gpg: error writing keyring `c:/test-issue2135/pubring.gpg': Permission denied
gpg: key CBB511F4: public key "[User ID not found]" imported
gpg: error reading `c:\\Users\\aheinecke\\Desktop\\sks-dump-0000.pgp':
Permission denied
gpg: import from `c:\\Users\\aheinecke\\Desktop\\sks-dump-0000.pgp' failed:
Permission denied
gpg: Total number processed: 278
gpg: w/o user IDs: 14
gpg: imported: 265 (RSA: 82)
gpg: renaming c:/test-issue2135/pubring.gpg' to c:/test-issue2135/pubring.bak'
failed: Permission
denied
gpg: failed to rebuild keyring cache: Permission denied
gpg: no ultimately trusted keys found

Nov 27 2015, 11:35 AM · Bug Report, gpg4win, Windows, gnupg, Windows 32
neal added a comment to T2160: --delete-key doesn't delete the same amount of keys obtained with --recv-key.

werner: Are you suggesting that there are programs that use an ambiguous
specification in order to delete just one key? I'm trying to imagine how this
is not undesirable behavior. Do you have any examples of this?

Nov 27 2015, 11:22 AM · gnupg, Bug Report
werner added a comment to T2160: --delete-key doesn't delete the same amount of keys obtained with --recv-key.

neal: What you describe are two a different things/bugs.

  1. Indicating that a specification is ambigious. We do this at other places as well
  1. Continue to show (with -k) or ask (with --delete-key) the other matching keys.

For the later I don't think that there is a need to do this with --delete-key
because we would have already printed that the specification is ambigious.
However a "gpg -k shortkeyid" should list all matching short keyids. A quick
test with:

0F26563A76B8337A
D1EC50AA76B8337A

shows that this is not the case. Note that we need to take care when modifiying
--delete-key. Not all programs using this are well written but implicity assume
the current behavious. And unfortunately many authors do not use --with-colons
and rely on the human output. Not deleting is better than accidently deleting
something.

Nov 27 2015, 9:43 AM · gnupg, Bug Report
aheinecke added a comment to T2135: Keyring locking on Windows broken.

In this case I'm pretty sure that it does not. I check that I can come up with a
testcase that does not involve kleo.

Nov 27 2015, 9:31 AM · Bug Report, gpg4win, Windows, gnupg, Windows 32
werner added a project to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent: Info Needed.
Nov 27 2015, 9:29 AM · Restricted Project, gnupg, Bug Report
werner added a comment to T2135: Keyring locking on Windows broken.

Is Kleopatra messing around with files in ~/.gnupg in any way? IIRC, Kleo
sometimes bypasses gpgme. For example does it open pubring.gpg ?

Nov 27 2015, 9:28 AM · Bug Report, gpg4win, Windows, gnupg, Windows 32

Nov 25 2015

ivansopin added a comment to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent.

No, keys were never moved. I have a test case ready, but I am trying to get a
hold of a newer AIX box to test it there. I will upload it shortly.

Nov 25 2015, 4:30 PM · Restricted Project, gnupg, Bug Report
neal added a project to T2160: --delete-key doesn't delete the same amount of keys obtained with --recv-key: gnupg.
Nov 25 2015, 1:25 PM · gnupg, Bug Report
werner added a comment to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent.

Ivan: Did you create the key on a fast machine and then moved it to a slower
one. Each use of a passphrases takes about 100ms for security reasons. Use
"gpg --passwd KEYID" to change the passphrase and adjust it to the speed of your
system.

A correctly installed system will start the agent either on the fly only the
first time or you need to start gpg-agent manually. See the man page for details.

Nov 25 2015, 11:30 AM · Restricted Project, gnupg, Bug Report
werner closed T2028: gpg: renaming `C:/GnuPG\pubring.gpg' to `C:/GnuPG\pubring.bak' failed: Permission denied as Resolved.
Nov 25 2015, 11:22 AM · Windows 32, gnupg (gpg14), Windows, Bug Report, gnupg
werner added a comment to T1989: Missing support for IPv4 may lead to problems..

May this be related to you fix for

if(ai->family != AF_INET6)

commit 23ea641b ?

Nov 25 2015, 11:20 AM · Bug Report, gnupg, dirmngr
werner closed T2152: iobuf_esopen uninitialized var len as Resolved.
Nov 25 2015, 11:17 AM · Bug Report, gnupg
werner added a comment to T2150: Generating keys on OpenPGP card yields wrong public key.

Please run

  gpg --with-keygrip --with-fingerprint --with-fingerprint -K 30A99F9A

and

  gpg --with-keygrip --with-fingerprint --with-fingerprint -K 9BA84708

If one of the commands does not show a key run it again with -k
(lowercase). Also run

gpg --version
Nov 25 2015, 11:16 AM · Bug Report, gnupg, gnupg (gpg21)
werner lowered the priority of T2150: Generating keys on OpenPGP card yields wrong public key from Unbreak Now! to Normal.
Nov 25 2015, 11:16 AM · Bug Report, gnupg, gnupg (gpg21)

Nov 24 2015

ivansopin added a comment to T2054: All of max-cache-ttl, default-cache-ttl, and no-allow-external-cache are ignored.

Nov 24 2015, 10:53 PM · Bug Report, gnupg
ivansopin added a comment to T2054: All of max-cache-ttl, default-cache-ttl, and no-allow-external-cache are ignored.

OK, based on my findings, I have to clarify that it is the environment of the
agent program that is cached, thus rendering the pinentry program oblivious to
the further changes of the environment, even though it is those changes that
"guide" it in the retrieval of the correct passphrase.

Attached is a test program. I apologize that it is TCSH, but that is what we use
in our shop (for portability). Running test.csh should produce an output like
this:

    > test.csh < /dev/null
    ---------------------------------------------------
     GPG version:
    ---------------------------------------------------
    gpg (GnuPG) 2.1.9
    libgcrypt 1.6.3
    Copyright (C) 2015 Free Software Foundation, Inc.
    License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
    This is free software: you are free to change and redistribute it.
    There is NO WARRANTY, to the extent permitted by law.
    
    Home: /tmp/gpg-caching/.gnupg
    Supported algorithms:
    Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA
    Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
            CAMELLIA128, CAMELLIA192, CAMELLIA256
    Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
    Compression: Uncompressed, ZIP, ZLIB, BZIP2
    
    ---------------------------------------------------
     Available keys:
    ---------------------------------------------------
    /tmp/gpg-caching/.gnupg/pubring.kbx
    -----------------------------------
    pub   dsa1024/E65831AC 2015-11-24
    uid         [ultimate] user1 <user1@email.com>
    sub   rsa2048/95F85202 2015-11-24
    
    pub   dsa1024/B0731F16 2015-11-24
    uid         [ultimate] user2 <user2@email.com>
    sub   rsa2048/67841B64 2015-11-24
    
    
    ---------------------------------------------------
     Key 1 decrypted using gpg2 directly:
    ---------------------------------------------------
    gpg: encrypted with 2048-bit RSA key, ID 95F85202, created 2015-11-24
          "user1 <user1@email.com>"
    32-bit-long key for user1 (ONE).
    
    ---------------------------------------------------
     Key 2 decrypted using gpg2 directly:
    ---------------------------------------------------
    gpg: encrypted with 2048-bit RSA key, ID 67841B64, created 2015-11-24
          "user2 <user2@email.com>"
    gpg: public key decryption failed: Broken pipe  
    gpg: decryption failed: No secret key
    
    
    ---------------------------------------------------
     Key 1 decrypted using gpgme:
    ---------------------------------------------------
    32-bit-long key for user1 (ONE).
    
    ---------------------------------------------------
     Key 2 decrypted using gpgme:
    ---------------------------------------------------
    Error while accessing key file user2.key: Decryption failed

This test creates two private/public key pairs in the same keyring; the password
to the private key of the first is "password1"; that of the second is
"password2". It then generates two files (user1.key and user2.key), one encrypted
with the first public key, the other with the second. The contents of those files
are "32-bit-long key for user1 (ONE)." and "32-bit-long key for user2 (TWO).",
respectively. The test also involves a simplistic pinentry program that returns
the value of $password to the agent. The point is to demonstrate that once the
gpg agent is started, it caches the environment, such that even updating
$password to the right value is of no use. And that is why only user1.key is
decrypted successfully (the agent was started to decrypt it).

Nov 24 2015, 10:53 PM · Bug Report, gnupg
Safari reopened T2152: iobuf_esopen uninitialized var len as "Open".
Nov 24 2015, 4:11 PM · Bug Report, gnupg
Safari added a comment to T2152: iobuf_esopen uninitialized var len.

Very conveniently in git:

Found using the Clang Static Analyzer.
Signed-off-by: Justus Winter <justus@g10code.com>
Nov 24 2015, 4:11 PM · Bug Report, gnupg
werner added a comment to T2156: remove some dead assignments, add some NULL pointer checks.

Please describe problems and do not just send a patch. You may however send a
patch to gnupg-devel.

Nov 24 2015, 3:14 PM · Info Needed, Bug Report, gnupg
werner closed T2152: iobuf_esopen uninitialized var len as Resolved.
Nov 24 2015, 3:09 PM · Bug Report, gnupg
werner added a comment to T2152: iobuf_esopen uninitialized var len.

Fixed with commit eb957ffc. Thanks.

However, this is not a problem because that value is not used.

Nov 24 2015, 3:09 PM · Bug Report, gnupg
werner added a comment to T2155: check_cert_policy does not check strpbrk ret val for NULL.

If you check the do-while above you will notice that after the loop LINE is
guaranteed to always end with a LF. Thus strpbrk will always succeed.

Nov 24 2015, 2:59 PM · Not A Bug, Bug Report, gnupg
werner added a project to T2155: check_cert_policy does not check strpbrk ret val for NULL: Not A Bug.
Nov 24 2015, 2:57 PM · Not A Bug, Bug Report, gnupg
justus added a comment to T1989: Missing support for IPv4 may lead to problems..

Werner, in https://lists.gnupg.org/pipermail/gnupg-users/2015-May/053617.html you wrote:

The real bug is that dirmngr does not mark the v6 address dead and
retry anotyer server (or the v4 address).

I cannot reproduce this. I pointed dirnmngr to ipv6.pool.sks-keyservers.net and servers
got marked as dead as expected.

Nov 24 2015, 11:39 AM · Bug Report, gnupg, dirmngr

Nov 23 2015

neal updated subscribers of T2019: Order of magnitude degradation in performance in gpg2 cf gpg.

@guilhem, @dkg I've cc'd you on this since you seem to be interested in this code.

I've just updated the branch with a few small bug fixes. Most importantly, I
fixed the memory problem by limiting the read-ahead cache to 20 MB. @guilhem:
I'd be interested to hear whether this fixes the problem that you observed.

@bernhard Sorry for not getting back to you sooner. If you checkout neal/kdb,
you'll get the latest code for the kdb format. Set --homedir or GNUPGHOME
appropriately, import your keyring and then try some operations:

$ mkdir /tmp/gnupg-kbx

$ gpg2 --export | time gpg2 --homedir /tmp/gnupg-kbx --no-default-keyring

--keyring gnupg-kdb:pubring.kdb --import /tmp/keys 2>/dev/null

This makes 6.5 seconds on my box using the kdb format and just under 2 min using
kdb. See
https://lists.gnupg.org/pipermail/gnupg-devel/2015-November/030525.html for some
example benchmarks.

I'm particularly interested to hear whether this fixes the major performance
problem that you're experiencing.

Thanks.

Nov 23 2015, 3:13 PM · Stalled, Bug Report, gnupg
justus added a comment to T1843: dirmngr-client doesn't auto-launch dirmngr.

Fixed in a9e0b1dd.

Nov 23 2015, 1:44 PM · gnupg, Bug Report, dirmngr
justus closed T1843: dirmngr-client doesn't auto-launch dirmngr as Resolved.
Nov 23 2015, 1:44 PM · gnupg, Bug Report, dirmngr
neal added a comment to T1944: Global changing of expiration date for mainkey and subkeys.

To be clear: the limitation is that GnuPG doesn't currently allow selecting the
main key and subkeys at the same time.

Nov 23 2015, 12:20 PM · gnupg, Feature Request
neal added a comment to T1944: Global changing of expiration date for mainkey and subkeys.

In b64b33b, I've added the ability to update multiple subkeys at once. Note: it
is still not possible to update the main key and the subkeys at the same time,
but this should be a significant improvement, I think.

Nov 23 2015, 12:19 PM · gnupg, Feature Request
neal added a comment to T2054: All of max-cache-ttl, default-cache-ttl, and no-allow-external-cache are ignored.

I've tried to reproduce this issue by setting max-cache-ttl and default-
cache-ttl to 0 in my gpg-agent.conf and running echo | gpg2 -s -a multiple times
in a row. The behavior is such that I have to enter the password each time. I
also traced the control flow in gpg-agent using gdb. The point where the
password is cached is in agent/cache.c:agent_put_cache. The passed ttl is 0 and
opt.def.cache_ttl is also 0. Thus, the password is not cached in my experiments.

Can you please confirm using the most recent version of GnuPG (2.1.9 as of
today) that a gpg-agent.conf with just the above options set caches the password
for you? Does the problem only occur when you are using your gpgme-based
application?

Thanks!

Nov 23 2015, 10:48 AM · Bug Report, gnupg
justus claimed T1843: dirmngr-client doesn't auto-launch dirmngr.
Nov 23 2015, 10:29 AM · gnupg, Bug Report, dirmngr
NoN changed Version from 1.4.11 (d64aa7) to 1.4.16, 2.0.22 on T1396: Subkey expiring breaks other subkeys.
Nov 23 2015, 12:26 AM · Too Old, Bug Report, gnupg
NoN added a comment to T1396: Subkey expiring breaks other subkeys.

Thank you for quick response)

I couldn't build and test 2.1.9 right now, but bug is still here in 1.4.16 and
2.0.22.

I've created test script for this case:
https://gist.github.com/anton-ryzhov/a0dcfcaabe18fc6ad35e

Run ./gen.sh in some working folder and then try ./runtest.sh several times,
expire different subkeys, compare the result.

Nov 23 2015, 12:26 AM · Too Old, Bug Report, gnupg

Nov 20 2015

neal added a comment to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent.

Ivan: it would be very helpful if you could create a small example demonstrating
the problem. Thanks!

Nov 20 2015, 10:30 PM · Restricted Project, gnupg, Bug Report
werner added a comment to T2011: gnupg should notify cancellation of its operation to gpg-agent to kill pinentry.

Keep the bug open. We won't fix it for the next release.

Nov 20 2015, 2:06 PM · Bug Report, gpgagent
neal added a comment to T2028: gpg: renaming `C:/GnuPG\pubring.gpg' to `C:/GnuPG\pubring.bak' failed: Permission denied.

As Werner stated, this appears to be a user support inquiry, which is better
answered elsewhere. As such, I'm marking this issue as resolved.

Nov 20 2015, 1:47 PM · Windows 32, gnupg (gpg14), Windows, Bug Report, gnupg
neal added a comment to T2027: Non-breaking space in French translation.

I'm marking this issue as resolved.

Nov 20 2015, 1:46 PM · Not A Bug, gnupg