Page MenuHome GnuPG
Feed Advanced Search

Jun 13 2016

werner closed T2372: Cannot use DNIe with gpg/2 as Resolved.
Jun 13 2016, 12:31 PM · gnupg, Support, Not A Bug, Bug Report
werner added a comment to T2372: Cannot use DNIe with gpg/2.

scdaemon is part of GnuPG.
OpenSC is entirely unrelated to GnuPG.

Please take this to a mailing list (e.g. gnupg-users)

Jun 13 2016, 12:31 PM · gnupg, Support, Not A Bug, Bug Report
werner added a comment to T2383: letter case and other text corrections and improvements.

Yes, "ascii" could be written uppercase, but it looks better in
lowercase here and we won't change it after >18 years w/o complains

"keyserver" is the common spelling and thus used this way.

The algorithm names are listed in the way the various options require them.

Btw, Taher Elgamal wants his surname spelled without uppercase 'G".

Jun 13 2016, 12:28 PM · gnupg
gniibe added a comment to T1675: gpg --verify has race conditions when used concurrently.

Finally, I managed to reproduce the same (I suppose) situation.
Please see: https://lists.gnupg.org/pipermail/gnupg-devel/2016-June/031211.html
It is READ vs. WRITE race condition.

Jun 13 2016, 4:39 AM · gnupg, Bug Report
bugreport added a project to T2383: letter case and other text corrections and improvements: gnupg.
Jun 13 2016, 12:55 AM · gnupg

Jun 10 2016

gniibe added a comment to T1675: gpg --verify has race conditions when used concurrently.

I think that this patch improve the situation.
It moves the creation of the hash table to the place where it creates version
record (holding the lock).

Jun 10 2016, 7:56 AM · gnupg, Bug Report
gniibe added a comment to T1675: gpg --verify has race conditions when used concurrently.

D205: 846_gpg14-create_hashtable-fix.diff

Jun 10 2016, 7:56 AM · gnupg, Bug Report

Jun 9 2016

gfontenot added a comment to T2358: gnupg 2.1, gpg-agent crashing on 'assertion failed' (OS X, Homebrew).

Sorry for going AWOL on this, Werner. Do you still need a backtrace from me, or is the
one from 2371 enough?

Jun 9 2016, 4:58 PM · gpgrt, Duplicate, gpgagent, gnupg (gpg21), Bug Report
gniibe added a comment to T1675: gpg --verify has race conditions when used concurrently.

Thank you for update.
msg8431 seems to be another race condition. I only fixed one race in 2015.

My saying in T1675 (gniibe on May 25 2015, 07:38 AM / Roundup) sounds wrong (now, for me).
For example, create_hashtable does lseek to SEEK_END.
When some another process is adding new entry (say, also calling
create_hashtable), we have a valid race condition here.
I mean,

(1) process A calls lseek with SEEK_END, seek goes to a point.
    Then, context switch.
(2) process B calls lseek with SEEK_END. seek goes same point as A.
(3) process B update info using the point.  context switch to A.
(4) process A wrongly overrides info using the point.
    It results inconsistent data.
Jun 9 2016, 4:21 AM · gnupg, Bug Report
gniibe added a comment to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".

It was fixed in db1ecc8212defdd183abbb6b1407fcc8d2dc9552 for 2.1.
In 2.1, HDRLEN=0 for all callers, so, there will be no same "Ohhhh jeeee" any more.

In 1.4 and 2.0, HDRLEN is used as a hint. There is no need to change 1.4 and
2.0. Detail is described in:
https://lists.gnupg.org/pipermail/gnupg-devel/2016-June/031178.html

Jun 9 2016, 12:56 AM · Bug Report, gnupg, Duplicate
gniibe closed T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!" as Resolved.
Jun 9 2016, 12:56 AM · Bug Report, gnupg, Duplicate
gniibe removed a project from T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!": In Progress.
Jun 9 2016, 12:56 AM · Bug Report, gnupg, Duplicate
gniibe added a project to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!": Unreleased.
Jun 9 2016, 12:56 AM · Bug Report, gnupg, Duplicate

Jun 8 2016

aheinecke added a comment to T1143: better heuristic for choosing an encryption key based on a User ID.

Just noticed this issue as it was mentioned in T2359 which is "my" issue
about this topic ;-)
I've actually implemented the algorithm outlined in T1143 (dkg on Sep 23 2009, 06:53 PM / Roundup) in libkleo/ QGgpME
for a better opportunistic encryption support in kmail (
https://phabricator.kde.org/T2520 )

Werner told me that something like that will be done in GnuPG itself. Afaik the
current plan is to have --locate-keys use a similar algorithm to return exactly
one "best" key if a mailbox is given. And if I understood werner correctly this
would then also be the key used when you would do a "gpg -er <mailbox>"

Should this be closed as Superseded?

Jun 8 2016, 7:15 PM · Duplicate, gnupg, Feature Request
werner added a project to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!": In Progress.
Jun 8 2016, 6:51 PM · Bug Report, gnupg, Duplicate
werner added a comment to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".

So, how do we proceed? Release 2.1.13 and wait for potential problems?

Jun 8 2016, 6:50 PM · Bug Report, gnupg, Duplicate
werner added a comment to T2359: Query which key will be used for a given mailbox.

related: T1143

Jun 8 2016, 6:10 PM · gnupg (gpg22), gnupg, Feature Request
werner closed T1394: man page documents some unsupported parameters as Resolved.
Jun 8 2016, 6:06 PM · gnupg, Debian, Feature Request
werner added a comment to T1394: man page documents some unsupported parameters.

Fixed in the repo (commit 536c721)

Jun 8 2016, 6:06 PM · gnupg, Debian, Feature Request
werner closed T1444: Check keyid after downloading key from keyserver and before importing it as Resolved.
Jun 8 2016, 5:56 PM · gnupg, Feature Request
werner added a comment to T1444: Check keyid after downloading key from keyserver and before importing it.

We have meanwhile implemented such a check.

Jun 8 2016, 5:56 PM · gnupg, Feature Request
werner removed a project from T1831: Remove gpgkey2ssh, source and build target: Stalled.
Jun 8 2016, 5:53 PM · gnupg, Feature Request
werner added a comment to T1831: Remove gpgkey2ssh, source and build target.

gpgkey2ssh has been removed from master (2.1)

Jun 8 2016, 5:53 PM · gnupg, Feature Request
werner closed T1831: Remove gpgkey2ssh, source and build target as Resolved.
Jun 8 2016, 5:53 PM · gnupg, Feature Request
werner added a comment to T459: gnupg could provide more detailed debugging error codes - especially for enigmail.

Most thingd have probably been implemented in the meantime.

Jun 8 2016, 5:50 PM · gnupg, Feature Request
werner added a project to T2382: space separated fingerprints not accepted as user ids: gnupg (gpg20).
Jun 8 2016, 4:50 PM · Bug Report, gnupg, gnupg (gpg20)
werner added a comment to T2382: space separated fingerprints not accepted as user ids.

Seem to be a regression in 2.0. 2.1 works as expected.

Jun 8 2016, 4:50 PM · Bug Report, gnupg, gnupg (gpg20)

Jun 7 2016

bernhard added projects to T2382: space separated fingerprints not accepted as user ids: gnupg, Bug Report.
Jun 7 2016, 4:14 PM · Bug Report, gnupg, gnupg (gpg20)
bernhard set Version to 2.0.30 on T2382: space separated fingerprints not accepted as user ids.
Jun 7 2016, 4:14 PM · Bug Report, gnupg, gnupg (gpg20)

Jun 6 2016

smoser added a comment to T1675: gpg --verify has race conditions when used concurrently.

I'm still able to make this fail, though quite less often.
Example is here.

$ wget https://bugs.gnupg.org/gnupg/file443/show-race.sh -O show-race.sh
$ chmod 755 show-race.sh
$ dpkg-query --show gnupg
$ gnupg --version
gpg (GnuPG) 1.4.20
Copyright (C) 2015 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: ~/.gnupg
Supported algorithms:
Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,

CAMELLIA128, CAMELLIA192, CAMELLIA256

Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2

$ sed -i.dist -e 's,precise-updates,precise,' -e
's,20101020ubuntu136.15,current,' show-race.sh
$ diff -u show-race.sh.dist show-race.sh

  • show-race.sh.dist 2016-06-06 16:37:25.845783450 -0400

+++ show-race.sh 2016-06-06 16:37:26.645771713 -0400
@@ -37,7 +37,7 @@

mkdir "$GNUPGHOME" && chmod 700 "$GNUPGHOME"

fi

-url="http://archive.ubuntu.com/ubuntu/dists/precise-updates/main/installer-amd64/20101020ubuntu136.15/images"
+url="http://archive.ubuntu.com/ubuntu/dists/precise/main/installer-amd64/current/images"
kr=/usr/share/keyrings/ubuntu-archive-keyring.gpg
for f in SHA256SUMS SHA256SUMS.gpg; do

   [ -f "$f" ] && continue

$ i=0; while i=$(($i+1)); do rm -Rf out*; echo -n "$i "; ./show-race.sh ||
break; done
1 max=100 cmd=gpg --verify args:
2 max=100 cmd=gpg --verify args:
3 max=100 cmd=gpg --verify args:
4 max=100 cmd=gpg --verify args:
...
67 max=100 cmd=gpg --verify args:
68 max=100 cmd=gpg --verify args:
69 max=100 cmd=gpg --verify args:
3 failed: out.3 [2]

$ cat out.3
gpg: Signature made Mon 23 Apr 2012 03:52:09 PM EDT using DSA key ID 437D05B5
gpg: error opening lockfile `/tmp/xt/out.gnupghome/trustdb.gpg.lock': No such
file or directory
gpg: lockfile disappeared
gpg: 12: read expected rec type 10, got 0
gpg: lookup_hashtable failed: trust database error
gpg: trustdb: searching trust record failed: trust database error
gpg: Error: The trustdb is corrupted.
gpg: You may try to re-create the trustdb using the commands:
gpg: cd /tmp/xt/out.gnupghome
gpg: gpg2 --export-ownertrust > otrust.tmp
gpg: rm trustdb.gpg
gpg: gpg2 --import-ownertrust < otrust.tmp
gpg: If that does not work, please consult the manual

Jun 6 2016, 10:52 PM · gnupg, Bug Report
smoser reopened T1675: gpg --verify has race conditions when used concurrently as "Open".
Jun 6 2016, 10:52 PM · gnupg, Bug Report
werner added a project to T2379: default to --with-fingerprint, introduce --without-fingerprint: Restricted Project.
Jun 6 2016, 5:08 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

7257ea2 switches to none.

There is also a new option --with-subkey-fingerprint which keeps the compact
fingerprint format also for subkeys. The Lead-in text for fingerprints n the
listing is in any case not anymore printed if keyid-format is none.

Jun 6 2016, 5:08 PM · gnupg, Feature Request
werner removed a project from T2379: default to --with-fingerprint, introduce --without-fingerprint: In Progress.
Jun 6 2016, 5:08 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

Just pushed the --keyid-format=none feature. Changing the default will be done
with another commit.

Jun 6 2016, 4:06 PM · gnupg, Feature Request
werner added a project to T2379: default to --with-fingerprint, introduce --without-fingerprint: In Progress.
Jun 6 2016, 4:06 PM · gnupg, Feature Request
aheinecke added a comment to T2380: Auto-refresh key if it is close to its expiration date..

Replacing revoked keys made me wonder if we actually need an auto-refresh key.
If we try to return one valid key with --locate-keys wouldn't it make more sense
semantically if we use the auto-key-locate mechanisms with locate-keys when a
key is expired in the local store?

This would also work better for revoked keys where a Parcimonie style auto
refresh would pick up the revocation and locate-keys would then look for a new key.

Jun 6 2016, 3:56 PM · gnupg, OpenPGP, Feature Request
aheinecke added a comment to T2359: Query which key will be used for a given mailbox.

How do you plan to handle the case that "local" lookup only yields expired or
revoked keys. Will GnuPG then automatically fall back to other locate-keys methods?
This would be my wish so that a MUA / User of that command does not have to care
about that case :-)

Jun 6 2016, 3:50 PM · gnupg (gpg22), gnupg, Feature Request
aheinecke added projects to T2381: Add more support for profiles in gpgconf: Feature Request, gnupg (gpg21), gnupg.
Jun 6 2016, 2:22 PM · In Progress, gnupg (gpg22), gnupg, Feature Request
werner added projects to T2380: Auto-refresh key if it is close to its expiration date.: Feature Request, OpenPGP, gnupg.
Jun 6 2016, 11:40 AM · gnupg, OpenPGP, Feature Request
yajo added a comment to T2372: Cannot use DNIe with gpg/2.

Ah sorry I understood you were saying the bug is in OpenSC. Where can I report
to scdaemon? I can't find it.

Jun 6 2016, 9:47 AM · gnupg, Support, Not A Bug, Bug Report

Jun 5 2016

werner added a comment to T2372: Cannot use DNIe with gpg/2.

FireFox is not GnuPG and does not support the OpenPGP card.

As I said, the card may work with gpgsm because I once developed support for the
Belgian eID card. But it is likely to need some tweaking (gnupg/scd/app-p15.c)

Jun 5 2016, 10:09 PM · gnupg, Support, Not A Bug, Bug Report
yajo reopened T2372: Cannot use DNIe with gpg/2 as "Open".
Jun 5 2016, 12:20 PM · gnupg, Support, Not A Bug, Bug Report
yajo added a comment to T2372: Cannot use DNIe with gpg/2.

I saw that it says not supported, but DNIe is actually supported. I can use it
flawlessly with Firefox for instance.

Please see:
https://github.com/OpenSC/OpenSC/wiki/DNIe-%28OpenDNIe%29#update-2013-08-27
https://github.com/OpenSC/OpenSC/issues/774#issuecomment-222468916

Thanks!

Jun 5 2016, 12:20 PM · gnupg, Support, Not A Bug, Bug Report

Jun 4 2016

werner lowered the priority of T2377: On Red Hat Enterprise Linux 7 server, we are unable to generate the gpg key. from Unbreak Now! to Normal.
Jun 4 2016, 9:27 PM · Support, gnupg
werner added a project to T2377: On Red Hat Enterprise Linux 7 server, we are unable to generate the gpg key.: Support.
Jun 4 2016, 9:27 PM · Support, gnupg
werner closed T2377: On Red Hat Enterprise Linux 7 server, we are unable to generate the gpg key. as Invalid.
Jun 4 2016, 9:27 PM · Support, gnupg
werner removed a project from T2377: On Red Hat Enterprise Linux 7 server, we are unable to generate the gpg key.: Bug Report.
Jun 4 2016, 9:27 PM · Support, gnupg
werner added a comment to T2377: On Red Hat Enterprise Linux 7 server, we are unable to generate the gpg key..

Please ask on the gnupg-users mailing list for help.

Some quick hints:
Is your pinentry properly installed? Is gpg-agent running? Does gnome-keyring
interfere with gpg-agent?

Jun 4 2016, 9:26 PM · Support, gnupg
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

This is the current output with keyid-format=none

pub dsa2048 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>
uid [ full ] Werner Koch <wk@[...]>
uid [ unknown] Werner Koch <werner@[...]>
sub dsa1024 2011-11-02 [S]
sub rsa2048 2014-01-02 [E] [expires: 2016-12-31]

The problem I have is how to decide when to use the compact fingerprint format.
My idea is to always use the compact format unless --fingerprint switched back
to the old format (which is easier to read).

Jun 4 2016, 9:23 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

I started working on this.

Jun 4 2016, 9:10 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

I tried it but I think it looks prettier without. A rationale might be that the
fingerprint is a property of the "pub" (public key) and the line should be
considered a continuation line.

Jun 4 2016, 7:40 PM · gnupg, Feature Request
dkg added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

This looks great to me. I've always been frustrated by the c+p difficulty.

Does it make sense to put an "fpr" at the beginning of the fingerprint line, to
match with "pub" and "uid" ?

For example:

pub dsa2048 2007-12-31 [SC] [expires: 2018-12-31]
fpr 80615870F5BAD690333686D0F2AD85AC1E42B367
uid [ full ] Werner Koch <wk@gnupg.org>

Have you started work on this change or would you like patches?

Jun 4 2016, 5:55 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

The current --with-fingerprint output is

pub dsa2048/F2AD85AC1E42B367 2007-12-31 [SC] [expires: 2018-12-31]

Key fingerprint = 8061 5870 F5BA D690 3336  86D0 F2AD 85AC 1E42 B367

uid [ full ] Werner Koch <wk@gnupg.org>

One problem I have with this format is the c+p of the fingerrpint is
not easy, because you need to mark the entire fingerprint and then use
quotes to use it. What about changing the default format (i.e. w/o
any fingerprint options to

pub dsa2048/F2AD85AC1E42B367 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>

or

pub dsa2048/1E42B367 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>

or

pub dsa2048 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>

or aligned in some other way?

Personally I would like to keep the long keyid at least for subkeys
because it makes the key listing easier to read and forced selection
of a signing subkey easier. However, removing information which is
in most cases useless and partly dangerous has a higher priority.
Thus a listing of my key may look like this:

pub dsa2048 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>
uid [ full ] Werner Koch <wk@[...]>
uid [ full ] Werner Koch <werner@[...]>
sub dsa1024 2011-11-02 [S]
sub rsa2048 2014-01-02 [E] [expires: 2016-12-31]

To implement that I would indeed suggest a keyid format "none" which
will be the default and select the above new listing format.

Jun 4 2016, 11:26 AM · gnupg, Feature Request
werner claimed T2379: default to --with-fingerprint, introduce --without-fingerprint.
Jun 4 2016, 11:26 AM · gnupg, Feature Request
werner added a project to T1445: keyid-format fingerprint: gnupg.
Jun 4 2016, 11:03 AM · Duplicate, gnupg, Feature Request
werner added a project to T1445: keyid-format fingerprint: Duplicate.
Jun 4 2016, 11:03 AM · Duplicate, gnupg, Feature Request
werner closed T1445: keyid-format fingerprint as Resolved.
Jun 4 2016, 11:03 AM · Duplicate, gnupg, Feature Request

Jun 3 2016

dkg added projects to T2379: default to --with-fingerprint, introduce --without-fingerprint: Feature Request, gnupg.
Jun 3 2016, 11:08 PM · gnupg, Feature Request
sarathingpg updated subscribers of T2377: On Red Hat Enterprise Linux 7 server, we are unable to generate the gpg key..
Jun 3 2016, 10:20 PM · Support, gnupg
sarathingpg assigned T2377: On Red Hat Enterprise Linux 7 server, we are unable to generate the gpg key. to werner.
Jun 3 2016, 10:20 PM · Support, gnupg
sarathingpg added projects to T2377: On Red Hat Enterprise Linux 7 server, we are unable to generate the gpg key.: gnupg, Bug Report.
Jun 3 2016, 10:19 PM · Support, gnupg
sarathingpg set Version to 2.0.22 on T2377: On Red Hat Enterprise Linux 7 server, we are unable to generate the gpg key..
Jun 3 2016, 10:19 PM · Support, gnupg

Jun 2 2016

werner reassigned T1506: New key generation usability enhancements from justus to gnupg-hackers.
Jun 2 2016, 11:17 PM · In Progress, gnupg, Feature Request
werner added a comment to T1506: New key generation usability enhancements.

Not really making it simpler but --quick-gen-key can now take an expiration date.

Let's keep this bug open to track other improvements.

Jun 2 2016, 11:17 PM · In Progress, gnupg, Feature Request
werner updated subscribers of T1506: New key generation usability enhancements.
Jun 2 2016, 11:17 PM · In Progress, gnupg, Feature Request
aheinecke added a comment to T2280: Wish for a new keygen API.

Ok,
Let me summarize how I understand the workflow is supposed to be:

  • Generate a Key with the limited batch keygen.
  • After key creation add subkeys as wanted with --quick-addkey
  • Add additional UID's with --quick-adduid

I think I can work with that.
For full flexibility T2364 would be nice so that one could create a certify
only key this way and subkeys for everything else.

But yeah thats icing on the cake.

Still does not solve the Problem how to figure out which algrithms with which
parameters / capabilities are supportet but meh, I guess you can't have everything..

Jun 2 2016, 4:24 PM · gnupg, gnupg (gpg21), Feature Request
werner added a comment to T1506: New key generation usability enhancements.

We also have --quick-addkey now.

Jun 2 2016, 4:13 PM · In Progress, gnupg, Feature Request
werner added a project to T2280: Wish for a new keygen API: Restricted Project.
Jun 2 2016, 4:11 PM · gnupg, gnupg (gpg21), Feature Request
werner added a comment to T2280: Wish for a new keygen API.

We now have gpg --quick-addkey fpr algo usage expire
(for2.1.13)

Jun 2 2016, 4:11 PM · gnupg, gnupg (gpg21), Feature Request
werner added a project to T2064: please allow unattended secret key deletion: In Progress.
Jun 2 2016, 4:08 PM · gnupg, Feature Request
gniibe added a comment to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".

In 1.4 and 2.0, --import just copies the block, so the bug doesn't hit. In 2.1,
when it tries to write to keybox, the bug hits.

Jun 2 2016, 6:57 AM · Bug Report, gnupg, Duplicate
gniibe added a comment to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".

The check what Neal introduced is somehow orthogonal to the change of mine.

The key in question, there is a User ID packet of length >= 256 (because he
include ssh key string in his User ID).
In the code of build-packet.c, gpg assumed the length of User ID is < 256 and it
is hard coded to have header length 2.
With the check (in gpg 2.1), it causes an error. I think that, in gpg 1.4 and
2.0, gpg creates malformed packet with incorrect length (LSB of the length).

Jun 2 2016, 1:50 AM · Bug Report, gnupg, Duplicate

Jun 1 2016

dkg added a comment to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".

fwiw, i first encountered this by doing a full-keyring refresh from the
keyservers. Dying rather than adjusting or accomodating the malformed header
meant that all keys after this one failed to refresh.

In general, dying outright seems likely to make an observed problem worse than
it needs to be.

Jun 1 2016, 3:27 PM · Bug Report, gnupg, Duplicate
bernhard added a comment to T2324: gpg --batch --export-secret-key fails (requires user interaction) if key has no passphrase.

I can confirm one defect with 2.1.11:
The ability to export a secret key without passphrase available in gnupg2.0
is gone. My use case is to write a testcase that automatically imports the key.

Jun 1 2016, 3:27 PM · gnupg, OpenPGP, Bug Report
bernhard added a project to T2070: Can not leave passphrase empty when exporting secret key: Duplicate.
Jun 1 2016, 3:25 PM · Duplicate, Bug Report, gnupg
bernhard added a comment to T2070: Can not leave passphrase empty when exporting secret key.

Duplicate of T2324

Jun 1 2016, 3:25 PM · Duplicate, Bug Report, gnupg
bernhard closed T2070: Can not leave passphrase empty when exporting secret key as Resolved.
Jun 1 2016, 3:25 PM · Duplicate, Bug Report, gnupg
bernhard added a comment to T2070: Can not leave passphrase empty when exporting secret key.

I am resolving this issue as duplicate of T2324
in the case of intented empty passphrase for the exported key.
(the export-reset-subkey-passwd flag should be taken to an entirely different
issue.)

Jun 1 2016, 3:25 PM · Duplicate, Bug Report, gnupg
neal added a comment to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".

FWIW, I added the stricter check. Previously, we specified the header size, but
didn't check that it was respected. When discussing this with Werner, he said
that respecting the header size was important, which is why I chose to die
rather than silently change the header size.

Jun 1 2016, 2:49 PM · Bug Report, gnupg, Duplicate
werner renamed T2363: warn user about private key's expiration from warn user about key's expiration to warn user about private key's expiration.
Jun 1 2016, 2:24 PM · gnupg, Feature Request
werner renamed T2346: Invalid import result in gnupg 2.1 when importing secret keys from Changed gpgme import result count in gnupg 2.1 when importing secret keys to Invalid import result in gnupg 2.1 when importing secret keys.
Jun 1 2016, 2:15 PM · Bug Report, gnupg, gnupg (gpg21)
werner updated subscribers of T2346: Invalid import result in gnupg 2.1 when importing secret keys.
Jun 1 2016, 2:13 PM · Bug Report, gnupg, gnupg (gpg21)
werner lowered the priority of T2346: Invalid import result in gnupg 2.1 when importing secret keys from Normal to Low.
Jun 1 2016, 2:13 PM · Bug Report, gnupg, gnupg (gpg21)
werner placed T2346: Invalid import result in gnupg 2.1 when importing secret keys up for grabs.
Jun 1 2016, 2:13 PM · Bug Report, gnupg, gnupg (gpg21)
werner added a comment to T2346: Invalid import result in gnupg 2.1 when importing secret keys.

Bernhard: Please do not assign bugs to me without my consent.

Jun 1 2016, 2:13 PM · Bug Report, gnupg, gnupg (gpg21)
werner closed T2372: Cannot use DNIe with gpg/2 as Resolved.
Jun 1 2016, 2:07 PM · gnupg, Support, Not A Bug, Bug Report
werner added projects to T2372: Cannot use DNIe with gpg/2: Not A Bug, Support, gnupg.
Jun 1 2016, 2:07 PM · gnupg, Support, Not A Bug, Bug Report
werner added a project to T2307: Failure to export secret key (Can't encode length=518 in a 2 byte header!): Duplicate.
Jun 1 2016, 2:01 PM · Duplicate, Bug Report, gnupg, gnupg (gpg21)
werner added a comment to T2307: Failure to export secret key (Can't encode length=518 in a 2 byte header!).

Duplicate of T2374

Jun 1 2016, 2:01 PM · Duplicate, Bug Report, gnupg, gnupg (gpg21)
werner added a project to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!": Duplicate.
Jun 1 2016, 1:59 PM · Bug Report, gnupg, Duplicate
werner added a comment to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".

Duplicate of T2307

Jun 1 2016, 1:59 PM · Bug Report, gnupg, Duplicate
werner added a comment to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".

We need to look at the history of the patch which introduced the stricter
checks. The problem we have is that some packets are indeed malformed but must
be exported/re-packaged exactly in their original broekn format.

Jun 1 2016, 1:59 PM · Bug Report, gnupg, Duplicate
gniibe added a comment to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".

I don't know the reason, but User ID length is hardcoded.

diff --git a/g10/build-packet.c b/g10/build-packet.c
index 4bfc2ac..1353a86 100644

  • a/g10/build-packet.c

+++ b/g10/build-packet.c
@@ -329,7 +329,7 @@ do_user_id( IOBUF out, int ctb, PKT_user_id *uid )

  }
else
  {
  • write_header2( out, ctb, uid->len, 2 );

+ write_header2( out, ctb, uid->len, 0 );

    rc = iobuf_write( out, uid->name, uid->len );
  }
return rc;
Jun 1 2016, 1:49 PM · Bug Report, gnupg, Duplicate
gniibe claimed T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".
Jun 1 2016, 1:49 PM · Bug Report, gnupg, Duplicate

May 31 2016

dkg added projects to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!": gnupg, Bug Report.
May 31 2016, 10:42 PM · Bug Report, gnupg, Duplicate
dkg set Version to 2.1.12 on T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".
May 31 2016, 10:42 PM · Bug Report, gnupg, Duplicate
dkg added a comment to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".

May 31 2016, 10:42 PM · Bug Report, gnupg, Duplicate
bernhard renamed T2346: Invalid import result in gnupg 2.1 when importing secret keys from Invalid import result in gnupg 2.1 when importing secret keys to Changed gpgme import result count in gnupg 2.1 when importing secret keys.
May 31 2016, 4:54 PM · Bug Report, gnupg, gnupg (gpg21)
bernhard updated subscribers of T2346: Invalid import result in gnupg 2.1 when importing secret keys.
May 31 2016, 4:54 PM · Bug Report, gnupg, gnupg (gpg21)