Page MenuHome GnuPG
Feed Advanced Search

Jul 26 2016

justus added a project to T2419: gpg --list-packets hangs on file containing single zero byte: gnupg.
Jul 26 2016, 6:39 PM · gnupg, Bug Report
ilovezfs added a comment to T2425: 2.1.14 intermittent `make check` failure on gpgtar.scm.

Hi Justus,

Thanks for your response. In further testing, I was able to trigger the "FAIL:
gpgtar.scm" during a make check for 2.1.13 (actually "FAIL: gpgtar.test" for
2.1.13 since it's pre-tiny-scheme). In particular, it's vanilla 2.1.13 + your
fix in 8f79c31b. So I think what may be going on is that 8f79c31b didn't
actually fully resolve that problem after all since I've now seen it occur, with
that commit included, in 2.1.13, and in 2.1.14, and in HEAD.

Tbere were two cases where a more specific error was emitted:

In one run, I saw this:

((/private/tmp/gnupg21-20160725-43964-l18ixl/gnupg-2.1.14/tools/gpgtar --gpg
/private/tmp/gnupg21-20160725-43964-l18ixl/gnupg-2.1.14/g10/gpg --gpg-args
--no-permission-warning --always-trust --tar-args --directory=. --decrypt
/tmp/gpgscm-PgAlmV/archive) failed: gpgtar: gpg: [don't know]: invalid packet
(ctb=2d)
gpgtar: gpg: [don't know]: invalid packet (ctb=2a)
gpgtar: error running
'/private/tmp/gnupg21-20160725-43964-l18ixl/gnupg-2.1.14/g10/gpg': exit status 2
) 
FAIL: gpgtar.scm

and in another run I saw this

Checking gpgtar with signature 
((/private/tmp/gnupg21-20160726-74591-maikty/gnupg-2.1.14/tools/gpgtar --gpg
/private/tmp/gnupg21-20160726-74591-maikty/gnupg-2.1.14/g10/gpg --gpg-args
--no-permission-warning --always-trust --tar-args --directory=. --decrypt
/tmp/gpgscm-0U4bUB/archive) failed: gpgtar: gpg: Fatal: zlib inflate problem:
invalid block type
gpgtar: error running
'/private/tmp/gnupg21-20160726-74591-maikty/gnupg-2.1.14/g10/gpg': exit status 2
) 
FAIL: gpgtar.scm

It's also worth noting that I've only been able to trigger the problem on
Jenkins during CI, not locally, so I don't know if the lack of TTY is relevant
or something like that.

I will do the ssh check you requested.

Jul 26 2016, 6:37 PM · MacOS, gnupg, gnupg (gpg22), Bug Report
justus added a comment to T2425: 2.1.14 intermittent `make check` failure on gpgtar.scm.

Thanks for letting us know. Unfortunately, we do not test on MacOS yet, but we are working
on that.

I have neither experience with debugging on MacOS, nor do I have access to such a machine.
I'm afraid you are on your own for now.

The ssh test is new, so we need to figure out why it does not work. Please do

  make -C tests/openpgp check TESTS="setup.scm ssh.scm" verbose=2

This lets us see what ssh-add prints to stderr. It might be related to the version of
OpenSSH shipped with the OS.

Jul 26 2016, 4:43 PM · MacOS, gnupg, gnupg (gpg22), Bug Report
justus claimed T2425: 2.1.14 intermittent `make check` failure on gpgtar.scm.
Jul 26 2016, 4:43 PM · MacOS, gnupg, gnupg (gpg22), Bug Report
justus added projects to T2425: 2.1.14 intermittent `make check` failure on gpgtar.scm: gnupg (gpg22), gnupg.
Jul 26 2016, 4:43 PM · MacOS, gnupg, gnupg (gpg22), Bug Report
justus added a comment to T2421: General error after update 2.1.12 -> 2.1.13 on gpgme_op_edit().

The API of pyme3 is almost identical to that of pyme, the former being a port to Python3,
while the latter is for Python2. We also added a more idiomatic interface on top of that, but
porting pyme applications should be easy. It is different to the API of pygpgme though.

I don't know exactly when 1.7 will be released, but it is overdue, so I'd say next month.

Jul 26 2016, 11:10 AM · gnupg
ignatenkobrain added a comment to T2421: General error after update 2.1.12 -> 2.1.13 on gpgme_op_edit().

how different pyme3 with bindings which we will get within 1.7 release? is there
any ETA on releasing 1.7?

Jul 26 2016, 10:29 AM · gnupg
justus removed a project from T2421: General error after update 2.1.12 -> 2.1.13 on gpgme_op_edit(): Bug Report.
Jul 26 2016, 10:21 AM · gnupg
justus closed T2421: General error after update 2.1.12 -> 2.1.13 on gpgme_op_edit() as Invalid.
Jul 26 2016, 10:21 AM · gnupg
justus lowered the priority of T2421: General error after update 2.1.12 -> 2.1.13 on gpgme_op_edit() from High to Normal.
Jul 26 2016, 10:21 AM · gnupg
justus claimed T2421: General error after update 2.1.12 -> 2.1.13 on gpgme_op_edit().
Jul 26 2016, 10:21 AM · gnupg
justus added a comment to T2421: General error after update 2.1.12 -> 2.1.13 on gpgme_op_edit().

That is not a bad commit, that is Werner evolving our software. pygpgme is unmaintained since

  1. My guess is that it cannot cope with the new status code being emitted by GnuPG.

I ran the testsuite myself, and I can reproduce the issue, among many other failures: 24 if I'm
using the GnuPG components from Debian/unstable, 9 if I am using more recent components.

One of them is test_encrypt_to_signonly, which tries to encrypt a mail to a key only usable for
signing, and expects a general error, which all recent versions of GPGME return in this case, but
this was a bug, fixed in GPGME master, which returns the correct error.

Updating pygpgme is out of scope for us. If you merely need any binding, consider using the pyme3
bindings that we merged into GPGME proper, and will release with 1.7. You can also find it on
pypi, it requires GPGME 1.6.x to build.

The way I see it is that the pygpgme bindings and its test suite are way too unmaintained and the
test suite too noisy to demonstrate a bug in GnuPG or GPGME. Feel free to reopen this bug if you
have compelling evidence that we broke something, preferably a small test case not using pygpgme.

Jul 26 2016, 10:21 AM · gnupg

Jul 25 2016

justus added a comment to T2118: Command --quick-gen-key ignores --default-cert-expire, --edit-key ignores --default-sig-expire.

The document you cite also states that UID/UAT lines only use field 10.

Also, neither UID nor UAT packets encode an expiration date [0], the way an UID/UAT can expire
is that the self-signature expires [1].

0: https://tools.ietf.org/html/rfc4880#section-5.11
1: https://tools.ietf.org/html/rfc4880#section-5.2.3.3

I do no longer agree with your first problem. Key expiration is different from signature
expiration, the way to quickly generate a key that expires in one year is:

    $ g10/gpg --quick-gen-key quick_test - - 1y

I guess one could argue that if one specifies --default-cert-expire=X when adding an uid, that
the self-signature for the new uid should expire. But to be honest, I doubt that this matches
user expectations.

What would be the use case really? I know that I'll lose access to that mail address in X years
and hence want my uid to expire then.

Jul 25 2016, 2:15 PM · Won't Fix, gnupg (gpg21), Bug Report, gnupg
justus closed T2346: Invalid import result in gnupg 2.1 when importing secret keys as Resolved.
Jul 25 2016, 12:54 PM · Bug Report, gnupg, gnupg (gpg21)
justus added a comment to T2346: Invalid import result in gnupg 2.1 when importing secret keys.

Fixed in 4ba11251.

Jul 25 2016, 12:54 PM · Bug Report, gnupg, gnupg (gpg21)
justus updated subscribers of T2346: Invalid import result in gnupg 2.1 when importing secret keys.
Jul 25 2016, 11:32 AM · Bug Report, gnupg, gnupg (gpg21)
justus claimed T2346: Invalid import result in gnupg 2.1 when importing secret keys.
Jul 25 2016, 11:32 AM · Bug Report, gnupg, gnupg (gpg21)
justus added a comment to T2346: Invalid import result in gnupg 2.1 when importing secret keys.

How did you create the key? I tried to reproduce it, and my numbers are even funnier:

% gpg2 --list-packets key2
gpg: NOTE: THIS IS A DEVELOPMENT VERSION!
gpg: It is only intended for test purposes and should NOT be
gpg: used in a production environment or with production keys!

off=0 ctb=95 tag=5 hlen=3 plen=919

:secret key packet:

version 4, algo 1, created 1262304006, expires 0
pkey[0]: [2048 bits]
pkey[1]: [17 bits]
skey[2]: [2046 bits]
skey[3]: [1024 bits]
skey[4]: [1024 bits]
skey[5]: [1016 bits]
checksum: 4197
keyid: 576109131A46786C

off=922 ctb=b4 tag=13 hlen=2 plen=29

:user ID packet: "Test Keyyy <test@example.org>"

off=953 ctb=89 tag=2 hlen=3 plen=311

:signature packet: algo 1, keyid 576109131A46786C

version 4, created 1262304006, md5len 0, sigclass 0x13
digest algo 8, begin of digest 79 38
hashed subpkt 2 len 4 (sig created 2010-01-01)
hashed subpkt 27 len 1 (key flags: 03)
hashed subpkt 11 len 4 (pref-sym-algos: 9 8 7 2)
hashed subpkt 21 len 5 (pref-hash-algos: 8 9 10 11 2)
hashed subpkt 22 len 3 (pref-zip-algos: 2 3 1)
hashed subpkt 30 len 1 (features: 01)
hashed subpkt 23 len 1 (keyserver preferences: 80)
subpkt 16 len 8 (issuer key ID 576109131A46786C)
data: [2045 bits]

off=1267 ctb=9d tag=7 hlen=3 plen=920

:secret sub key packet:

version 4, algo 1, created 1262304006, expires 0
pkey[0]: [2048 bits]
pkey[1]: [17 bits]
skey[2]: [2047 bits]
skey[3]: [1024 bits]
skey[4]: [1024 bits]
skey[5]: [1024 bits]
checksum: 4233
keyid: 2D1354FDD1343C83

off=2190 ctb=89 tag=2 hlen=3 plen=287

:signature packet: algo 1, keyid 576109131A46786C

version 4, created 1262304006, md5len 0, sigclass 0x18
digest algo 8, begin of digest 49 47
hashed subpkt 2 len 4 (sig created 2010-01-01)
hashed subpkt 27 len 1 (key flags: 0C)
subpkt 16 len 8 (issuer key ID 576109131A46786C)
data: [2047 bits]

% GNUPGHOME=$(mktemp -d) gpg2 --import key2
gpg: NOTE: THIS IS A DEVELOPMENT VERSION!
gpg: It is only intended for test purposes and should NOT be
gpg: used in a production environment or with production keys!
gpg: keybox '/tmp/tmp.vt2HmFYk11/pubring.kbx' created
gpg: /tmp/tmp.vt2HmFYk11/trustdb.gpg: trustdb created
gpg: key 576109131A46786C: public key "Test Keyyy <test@example.org>" imported
gpg: key 576109131A46786C: secret key imported
gpg: Total number processed: 3
gpg: imported: 1
gpg: secret keys read: 3
gpg: secret keys imported: 2

I'd say 'Total number processed' and 'secret keys read' is off by one even if one counts the
subkeys.

Jul 25 2016, 11:32 AM · Bug Report, gnupg, gnupg (gpg21)
justus added a comment to T2355: --import of a keypair together with --batch results in no pinentry and i/o errors.

Ah, I misunderstood your problem. In the future, please paste all program interactions in one chunk
in the right order. We did merge some changes related to exporting of secret keys, so it may very
well be solved by that.

Thanks for caring :)

Jul 25 2016, 11:02 AM · Bug Report, gpgagent, gnupg (gpg21), Windows, gnupg, Windows 32, pinentry
justus closed T2355: --import of a keypair together with --batch results in no pinentry and i/o errors as Resolved.
Jul 25 2016, 11:02 AM · Bug Report, gpgagent, gnupg (gpg21), Windows, gnupg, Windows 32, pinentry
justus added a comment to T1955: Prefer keys with no or cached passphrase..

I have a possible solution pushed to branch justus/issue1955. The idea is to try
to parse the message with PINENTRY_MODE_CANCEL first, and should that fail, we
retry with the configured pinentry mode. Not sure if that is too hacky, or what
side-effects parsing the message may have that we must not do twice. Werner,
what do you think?

Jul 25 2016, 10:52 AM · gnupg (gpg23), Feature Request

Jul 24 2016

ignatenkobrain added a comment to T2421: General error after update 2.1.12 -> 2.1.13 on gpgme_op_edit().

ff71521d9698c7c5df94831a1398e948213af433 is the first bad commit
commit ff71521d9698c7c5df94831a1398e948213af433
Author: Werner Koch <wk@gnupg.org>
Date: Fri May 13 16:24:59 2016 +0200

    gpg: Emit new status line KEY_CONSIDERED.
    
    * common/status.h (STATUS_KEY_CONSIDERED): New.
    * g10/getkey.c: Include status.h.
    (LOOKUP_NOT_SELECTED, LOOKUP_ALL_SUBKEYS_EXPIRED): New.
    (finish_lookup): Add arg R_FLAGS.  Count expired and revoked keys and
    set flag.  Check a requested usage before checking for expiraion or
    revocation.
    (print_status_key_considered): New.
    (lookup): Print new status.
    
    Signed-off-by: Werner Koch <wk@gnupg.org>

:040000 040000 33853092f4376553defb24e39a31bdcbc13c51d2
7da8083e3f39b2fabfe0c3beab0b9f43a2a2cc32 M common
:040000 040000 468469de2419e59efddd718b7b24d5a8cead3005
d2c77b1e1bbab29cd506b29dc359d44c841dbc99 M doc
:040000 040000 044148a54b854a31a0f6ad6605a50a57cc46dfcd
e229f5d63dc27377a7fa1d50ff512a040a389f1f M g10

Jul 24 2016, 10:18 PM · gnupg
ignatenkobrain added a comment to T2423: configure: error: Sorry, the current implemenation requires mmap. due to empty CFLAGS (missing -fPIC).

D378: 864_0001-configure.ac-restore-user-CFLAGS-before-checking-fun.patch

Jul 24 2016, 9:29 PM · gnupg (gpg22), Bug Report, gnupg
ignatenkobrain added a comment to T2423: configure: error: Sorry, the current implemenation requires mmap. due to empty CFLAGS (missing -fPIC).

Update patch to cover libraries search (e.g. iconv).

Jul 24 2016, 9:29 PM · gnupg (gpg22), Bug Report, gnupg
ignatenkobrain added projects to T2423: configure: error: Sorry, the current implemenation requires mmap. due to empty CFLAGS (missing -fPIC): gnupg, Bug Report.
Jul 24 2016, 9:16 PM · gnupg (gpg22), Bug Report, gnupg

Jul 22 2016

dranft added a comment to T2355: --import of a keypair together with --batch results in no pinentry and i/o errors.

I think the problem is that your key export fails, because you pointed
--homedir at the (presumably) empty directory "%tmp%\_tempKeyring".

The export did not use any filter and tried to export a key as can be seen in
Msg8313 "error receiving key from agent"
The import itself also stated no errors as it can be seen in T2355 (dranft on May 12 2016, 03:00 PM / Roundup), but this
imported secret key cannot be used (or exported) anymore.
Also important: This is no longer reproducible in 2.1.14 (which might be enough
to set the bug to fixed)

Jul 22 2016, 3:11 PM · Bug Report, gpgagent, gnupg (gpg21), Windows, gnupg, Windows 32, pinentry
justus claimed T2355: --import of a keypair together with --batch results in no pinentry and i/o errors.
Jul 22 2016, 2:48 PM · Bug Report, gpgagent, gnupg (gpg21), Windows, gnupg, Windows 32, pinentry
justus added a comment to T2355: --import of a keypair together with --batch results in no pinentry and i/o errors.

I don't believe this demonstrates a bug.

I think the problem is that your key export fails, because you pointed --homedir at the (presumably)
empty directory "%tmp%\_tempKeyring". This leads to the not very helpful error message about the
eof. If the export were successful, gpg would have written the key to stdout.

For reference, here is what I tried. First GNUPGHOME points to a home with the key I want to export:

    $ echo $GNUPGHOME
    /tmp/tmp.T7I4M9RIc3
    $ g10/gpg --list-keys alpha
    gpg: please do a --check-trustdb
    pub   dsa1024 1999-03-08 [SCA]
          A0FF4590BB6122EDEF6E3C542D727CC768697734
    uid           [ unknown] Alfa Test (demo key) <alfa@example.net>
    uid           [ unknown] Alpha Test (demo key) <alpha@example.net>
    uid           [ unknown] Alice (demo key)
    sub   elg1024 1999-03-08 [E]

You need some kind of pinentry program, because you may be asked for the current passphrase or an
export passphrase:

    $ cat $GNUPGHOME/gpg-agent.conf
    pinentry-program /usr/bin/pinentry-x11

Now export the key:

    $ g10/gpg --export-secret-keys alpha >/tmp/alpha.gpg

Now I create an empty home, and import the key in batch mode:

    $ export GNUPGHOME=$(mktemp -d)
    $ g10/gpg --batch --import /tmp/alpha.gpg
    gpg: keybox '/tmp/tmp.bL2caQmZri/pubring.kbx' created
    gpg: /tmp/tmp.bL2caQmZri/trustdb.gpg: trustdb created
    gpg: key 2D727CC768697734: public key "Alfa Test (demo key) <alfa@example.net>" imported
    gpg: key 2D727CC768697734: secret key imported
    gpg: Total number processed: 3
    gpg:               imported: 1
    gpg:       secret keys read: 3
    gpg:   secret keys imported: 2

Could you please check if that works for you?

Jul 22 2016, 2:48 PM · Bug Report, gpgagent, gnupg (gpg21), Windows, gnupg, Windows 32, pinentry
justus claimed T2276: keyring_search failed and failed to rebuild keyring cache: Legacy key.
Jul 22 2016, 2:21 PM · Bug Report, gnupg, gnupg (gpg21)
justus closed T2276: keyring_search failed and failed to rebuild keyring cache: Legacy key as Resolved.
Jul 22 2016, 2:21 PM · Bug Report, gnupg, gnupg (gpg21)
justus added a comment to T2276: keyring_search failed and failed to rebuild keyring cache: Legacy key.

Fixed in d9839c9d.

Jul 22 2016, 2:21 PM · Bug Report, gnupg, gnupg (gpg21)
lechten added a comment to T2118: Command --quick-gen-key ignores --default-cert-expire, --edit-key ignores --default-sig-expire.

On 2016-07-19, Justus Winter via BTS wrote:

Jul 22 2016, 11:14 AM · Won't Fix, gnupg (gpg21), Bug Report, gnupg

Jul 21 2016

justus updated subscribers of T2405: Possible timing problem with TOFU.
Jul 21 2016, 6:57 PM · gnupg, gnupg (gpg22), Bug Report
justus reassigned T2405: Possible timing problem with TOFU from justus to neal.
Jul 21 2016, 6:57 PM · gnupg, gnupg (gpg22), Bug Report
justus added a comment to T2405: Possible timing problem with TOFU.

Ok, I pushed a fix related to this problem 45bb9a2a, this had the amusing effect of
reversing the behavior:

% rm -f $GNUPGHOME/tofu.db ; ( g10/gpg --verify --status-fd=1 /tmp/testmsg
)2>/dev/null | grep TOFU_STATS
[GNUPG:] TOFU_STATS 1 0 0 none
[GNUPG:] TOFU_STATS 2 1 0 auto 0 0
[GNUPG:] TOFU_STATS_LONG Verified 1 message signed by "Alpha Test (demo key)
<alpha@example.net>"%0Ain the past 0~seconds.
[GNUPG:] TOFU_STATS 2 1 0 auto 0 0
[GNUPG:] TOFU_STATS_LONG Verified 1 message signed by "Alice (demo key)"%0Ain the
past 0~seconds.

The difference stems from tofu_register setting already_verified to 0 for the first
uid, and to 1 for the second. In the former case, show_statistics is asked to ignore
the current message.

I guess the intention was to handle the very first message differently, but now we
are handling the first *uid* upon receiving the first message differently instead.
I'm not sure how to proceed, hence reassigning to Neal.

Jul 21 2016, 6:57 PM · gnupg, gnupg (gpg22), Bug Report
justus added a comment to T2405: Possible timing problem with TOFU.

This is a GnuPG problem:

teythoon@europa ~/repos/g10/gpgme/obj/tests (git)-[master] % rm $GNUPGHOME/tofu.db && ( gpg2 --verify --with-
colons --status-fd=1 /tmp/testmsg )2>/dev/null | grep TOFU_STATS
[GNUPG:] TOFU_STATS 1 0 0 auto
[GNUPG:] TOFU_STATS_LONG Verified 0 messages signed by "Alfa Test (demo key) <alfa@example.net>".
[GNUPG:] TOFU_STATS 1 0 0 none
[GNUPG:] TOFU_STATS 1 0 0 none
teythoon@europa ~/repos/g10/gpgme/obj/tests (git)-[master] % rm $GNUPGHOME/tofu.db && ( gpg2 --verify --with-
colons --status-fd=1 /tmp/testmsg && gpg2 --verify --with-colons --status-fd=1 /tmp/testmsg && sleep 1 && gpg2 -
-verify --with-colons --status-fd=1 /tmp/testmsg )2>/dev/null | grep TOFU_STATS
[GNUPG:] TOFU_STATS 1 0 0 auto
[GNUPG:] TOFU_STATS_LONG Verified 0 messages signed by "Alfa Test (demo key) <alfa@example.net>".
[GNUPG:] TOFU_STATS 1 0 0 none
[GNUPG:] TOFU_STATS 1 0 0 none
[GNUPG:] TOFU_STATS 1 0 0 none
[GNUPG:] TOFU_STATS 1 0 0 none
[GNUPG:] TOFU_STATS 1 0 0 none
[GNUPG:] TOFU_STATS 2 1 0 auto 1 1
[GNUPG:] TOFU_STATS_LONG Verified 1 message signed by "Alfa Test (demo key) <alfa@example.net>"%0Ain the past
1~second.
[GNUPG:] TOFU_STATS 2 1 0 auto 1 1
[GNUPG:] TOFU_STATS_LONG Verified 1 message signed by "Alpha Test (demo key) <alpha@example.net>"%0Ain the past
1~second.
[GNUPG:] TOFU_STATS 2 1 0 auto 1 1
[GNUPG:] TOFU_STATS_LONG Verified 1 message signed by "Alice (demo key)"%0Ain the past 1~second.

Jul 21 2016, 1:44 PM · gnupg, gnupg (gpg22), Bug Report
justus added projects to T2405: Possible timing problem with TOFU: gnupg (gpg22), gnupg.
Jul 21 2016, 1:44 PM · gnupg, gnupg (gpg22), Bug Report
justus removed a project from T2405: Possible timing problem with TOFU: gpgme.
Jul 21 2016, 1:44 PM · gnupg, gnupg (gpg22), Bug Report

Jul 20 2016

ignatenkobrain added a comment to T2421: General error after update 2.1.12 -> 2.1.13 on gpgme_op_edit().

Looks like other folks are experiencing same issues:
https://lists.gnupg.org/pipermail/gnupg-users/2016-March/055421.html

Jul 20 2016, 8:20 PM · gnupg
ignatenkobrain set Version to 2.1.13 on T2421: General error after update 2.1.12 -> 2.1.13 on gpgme_op_edit().
Jul 20 2016, 8:03 PM · gnupg
ignatenkobrain added a comment to T2421: General error after update 2.1.12 -> 2.1.13 on gpgme_op_edit().

Jul 20 2016, 8:03 PM · gnupg
ignatenkobrain added projects to T2421: General error after update 2.1.12 -> 2.1.13 on gpgme_op_edit(): gnupg, Bug Report.
Jul 20 2016, 8:03 PM · gnupg
aheinecke closed T2306: Rare smartcard errors with gnupg master as Resolved.
Jul 20 2016, 3:06 PM · Bug Report, gnupg, scd
aheinecke added a comment to T2306: Rare smartcard errors with gnupg master.

My problems are resolved. I have not encountered a problem since your last
fixes. Although I sometimes have to reenter pin so I think the errors still
occur occassionally but gnupg recovers.

Thanks.

Jul 20 2016, 3:06 PM · Bug Report, gnupg, scd
aheinecke removed a project from T2306: Rare smartcard errors with gnupg master: Restricted Project.
Jul 20 2016, 3:06 PM · Bug Report, gnupg, scd
gniibe added a comment to T2128: KEYTOCARD does not configure the card's key length.

It is handled in scdaemon (not in g10/keyedit.c).

When the keysize is different, it changes key attribute automatically.
For 2.1, it was fixed by f10b427d0e2be333776fee2df8150145da36e587 on 2015-09-07
which is in 2.1.8.

Jul 20 2016, 9:02 AM · Bug Report, gnupg, scd

Jul 19 2016

justus added a comment to T2118: Command --quick-gen-key ignores --default-cert-expire, --edit-key ignores --default-sig-expire.

This has nothing to do with faking time one way or another.

You are reporting two problems. In the future, please create two issues.

I agree with your first problem, even though there is additional syntax for specifying the
expiration date with --quick-gen-key. This is easy to fix.

Your second problem is less clear. First of all, your command line makes no sense. --
default-sig-expire only affects signatures over data. Furthermore, user ids do not
expire, merely the (self-)signatures may do so. Do you want that?

Jul 19 2016, 6:09 PM · Won't Fix, gnupg (gpg21), Bug Report, gnupg
justus claimed T2118: Command --quick-gen-key ignores --default-cert-expire, --edit-key ignores --default-sig-expire.
Jul 19 2016, 6:09 PM · Won't Fix, gnupg (gpg21), Bug Report, gnupg
justus added a comment to T2316: ssh-add ignores keys already in private-keys-v1.d but not in sshcontrol.

I do consider it a bug, at least because we did not signal an error to ssh-add.
Fortunately, this was easy to fix.

Fixed in 270f7f7b.

Jul 19 2016, 4:54 PM · gnupg, Not A Bug, Bug Report, ssh, gpgagent, gnupg (gpg21)
justus closed T2316: ssh-add ignores keys already in private-keys-v1.d but not in sshcontrol as Resolved.
Jul 19 2016, 4:54 PM · gnupg, Not A Bug, Bug Report, ssh, gpgagent, gnupg (gpg21)
justus added a project to T2358: gnupg 2.1, gpg-agent crashing on 'assertion failed' (OS X, Homebrew): gpgrt.
Jul 19 2016, 12:01 PM · gpgrt, Duplicate, gpgagent, gnupg (gpg21), Bug Report
justus closed T2358: gnupg 2.1, gpg-agent crashing on 'assertion failed' (OS X, Homebrew) as Resolved.
Jul 19 2016, 12:01 PM · gpgrt, Duplicate, gpgagent, gnupg (gpg21), Bug Report

Jul 18 2016

neal added a comment to T2391: Assertion "! db->batch_update" in tofu_closedbs failed (../../g10/tofu.c:1083).

I don't have time to look at this immediately, but it looks related to Werner's
recent change to the tofu db code.

Jul 18 2016, 2:34 PM · gnupg (gpg22), Bug Report, gnupg
justus assigned T2391: Assertion "! db->batch_update" in tofu_closedbs failed (../../g10/tofu.c:1083) to neal.
Jul 18 2016, 2:31 PM · gnupg (gpg22), Bug Report, gnupg
justus added a project to T2391: Assertion "! db->batch_update" in tofu_closedbs failed (../../g10/tofu.c:1083): gnupg (gpg22).
Jul 18 2016, 2:31 PM · gnupg (gpg22), Bug Report, gnupg
justus changed Version from 2.1.13 to 2.1.14 on T2391: Assertion "! db->batch_update" in tofu_closedbs failed (../../g10/tofu.c:1083).
Jul 18 2016, 2:31 PM · gnupg (gpg22), Bug Report, gnupg
justus added a comment to T2391: Assertion "! db->batch_update" in tofu_closedbs failed (../../g10/tofu.c:1083).

So the key listing is enclosed in tofu_{begin,end}_batch_update:

#0 tofu_begin_batch_update () at ../../g10/tofu.c:389
#1 0x0000000000452515 in public_key_list (ctrl=0x715870, list=0x0,

locate_mode=0) at ../../g10/keylist.c:137

#2 0x000000000040e496 in main (argc=0, argv=0x7fffffffdc08)

at ../../g10/gpg.c:4153

#0 tofu_begin_batch_update () at ../../g10/tofu.c:389
#1 0x0000000000452515 in public_key_list (ctrl=0x715870, list=0x0,

locate_mode=0) at ../../g10/keylist.c:137

#2 0x000000000040e496 in main (argc=0, argv=0x7fffffffdc08)

    at ../../g10/gpg.c:4153

Then an transaction is started on the email and key db:

#0 begin_transaction (db=0x733bc0, only_batch=0) at ../../g10/tofu.c:278
#1 0x0000000000497365 in record_binding (dbs=0x71cf40,

fingerprint=0x71c980 "362D3527F53AAD1971AAFDE658859975EE37CF96", 
email=0x71cf60 "testing (insecure!)", 
user_id=0x71ab30 "Testing (insecure!)", policy=TOFU_POLICY_AUTO, 
show_old=0) at ../../g10/tofu.c:1202

#2 0x0000000000498e36 in get_trust (dbs=0x71cf40, pk=0x71a8a0,

fingerprint=0x71c980 "362D3527F53AAD1971AAFDE658859975EE37CF96", 
email=0x71cf60 "testing (insecure!)", 
user_id=0x71ab30 "Testing (insecure!)", may_ask=0) at ../../g10/tofu.c:2182

#3 0x000000000049a44d in tofu_get_validity (ctrl=0x715870, pk=0x71a8a0,

user_id=0x71ab30 "Testing (insecure!)", may_ask=0) at ../../g10/tofu.c:2946

#4 0x000000000048f4b2 in tdb_get_validity_core (ctrl=0x715870, pk=0x71a8a0,

uid=0x71aac0, main_pk=0x71a8a0, sig=0x0, may_ask=0)
at ../../g10/trustdb.c:1074

#5 0x000000000048cd9d in get_validity (ctrl=0x715870, pk=0x71a8a0,

uid=0x71aac0, sig=0x0, may_ask=0) at ../../g10/trust.c:338

#6 0x000000000048caeb in uid_trust_string_fixed (ctrl=0x715870, key=0x71a8a0,

uid=0x71aac0) at ../../g10/trust.c:154

#7 0x00000000004544bc in list_keyblock_print (ctrl=0x715870,

keyblock=0x71a9c0, secret=0, fpr=0, listctx=0x7fffffffd560)
at ../../g10/keylist.c:950

#8 0x00000000004567aa in list_keyblock (ctrl=0x715870, keyblock=0x71a9c0,
---Type <return> to continue, or q <return> to quit---

secret=0, has_secret=0, fpr=0, listctx=0x7fffffffd560)
at ../../g10/keylist.c:1604

#9 0x00000000004533bc in list_all (ctrl=0x715870, secret=0, mark_secret=0)

at ../../g10/keylist.c:556

#10 0x000000000045254e in public_key_list (ctrl=0x715870, list=0x0,

locate_mode=0) at ../../g10/keylist.c:143

#11 0x000000000040e496 in main (argc=0, argv=0x7fffffffdc08)

    at ../../g10/gpg.c:4153

... and later ended, but since !! batch_update, it is not actually committed.

Now when tofu_end_batch_update is called and batch_update drops to zero, it iterates
over db_cache and commits all transactions using end_transaction, but db_cache is
empty. This is actually not that surprising, because the only place I see db_cache
being populated is in tofu_closedbs, a few lines after the failing assertion.

Jul 18 2016, 2:31 PM · gnupg (gpg22), Bug Report, gnupg
justus added a comment to T2015: GET_PASSPHRASE with --no-ask always return error in gnupg 2.1.5.

Fixed in f4742493.

Jul 18 2016, 12:59 PM · gpgagent, Bug Report, gnupg
justus closed T2015: GET_PASSPHRASE with --no-ask always return error in gnupg 2.1.5 as Resolved.
Jul 18 2016, 12:59 PM · gpgagent, Bug Report, gnupg

Jul 15 2016

gniibe added a comment to T2209: minimal dsa/elg bitsize during expert keygen outdated.

For the T2238, it was backported in effect (not intentional, though).

1.4: ca1fc59
2.0: 1c15136

Jul 15 2016, 2:53 AM · backport, Bug Report, gnupg, gnupg (gpg20), gnupg (gpg14), gnupg (gpg21)
gniibe closed T2282: Invalid flag adding encryption subkey with Curve 25519 as Resolved.
Jul 15 2016, 1:50 AM · Not A Bug, Bug Report, gnupg
gniibe removed a project from T2282: Invalid flag adding encryption subkey with Curve 25519: Restricted Project.
Jul 15 2016, 1:50 AM · Not A Bug, Bug Report, gnupg
fornwall added a comment to T2418: Wrong check for Android in configure.ac.

The attached patch was lost, but is available at
https://gist.githubusercontent.com/fornwall/751acc6fbe9eb8e703c60c222a2dba33/raw/ece6b6
8fe0346b2039be6ba3323e5e29e25685ef/configure.ac.patch

Jul 15 2016, 1:35 AM · Bug Report, gnupg
fornwall set Version to 2.1.14 on T2418: Wrong check for Android in configure.ac.
Jul 15 2016, 1:34 AM · Bug Report, gnupg
fornwall added projects to T2418: Wrong check for Android in configure.ac: gnupg, Bug Report.
Jul 15 2016, 1:34 AM · Bug Report, gnupg

Jul 14 2016

werner removed a project from T2402: New option to encrypt with a key taken from a file: Unreleased.
Jul 14 2016, 7:13 PM · gnupg, OpenPGP, Feature Request
werner removed a project from T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!": Unreleased.
Jul 14 2016, 7:12 PM · Bug Report, Duplicate, gnupg
werner removed a project from T2376: Dirmgnr: LDAPv3 only Server leads to error: Unreleased.
Jul 14 2016, 7:11 PM · gnupg, Bug Report, dirmngr
werner removed a project from T2351: Segfault in gpg --update-trustdb: Unreleased.
Jul 14 2016, 7:10 PM · Bug Report, gnupg
werner added a comment to T2412: gpg2 fails on keyserver fingerprint search while gpg succeeds.

You should better use --recv-key if you already know the fingerprint. Anyway,
this is a regression and will be fixed for 2.1.14 with commit 0342369. Thanks.

Jul 14 2016, 2:04 PM · Bug Report, gnupg
werner added a project to T2412: gpg2 fails on keyserver fingerprint search while gpg succeeds: Restricted Project.
Jul 14 2016, 2:04 PM · Bug Report, gnupg
werner closed T2409: Verifying with Fully Trusted Key Shows as Undefined as Resolved.
Jul 14 2016, 9:42 AM · Not A Bug, Bug Report, gnupg
gniibe added a comment to T2409: Verifying with Fully Trusted Key Shows as Undefined.

You are welcome. If my bad English makes it difficult, here is another document.

http://web.monkeysphere.info/doc/trust-models/
You can find the explanation:

So "full" ownertrust on a key is only meaningful as long as there is a trust
path to some User ID on that key already. "ultimate" ownertrust is meaningful
anyway, because presumably you control that key.

Jul 14 2016, 6:56 AM · Not A Bug, Bug Report, gnupg
atclaus added a comment to T2409: Verifying with Fully Trusted Key Shows as Undefined.

Ok I think I get it. I appreciate you taking the time to explain it.
Thanks.

Jul 14 2016, 5:49 AM · Not A Bug, Bug Report, gnupg
atclaus added a comment to T2409: Verifying with Fully Trusted Key Shows as Undefined.

Jul 14 2016, 5:49 AM · Not A Bug, Bug Report, gnupg
atclaus added a comment to T2409: Verifying with Fully Trusted Key Shows as Undefined.

Ok I think I get it now. Thank you for explaining it to me. I appreciate it

Jul 14 2016, 4:49 AM · Not A Bug, Bug Report, gnupg
gniibe added a comment to T2409: Verifying with Fully Trusted Key Shows as Undefined.

Adding "ultimate" trust means: you are specifying it's your own key. GnuPG
doesn't check if your own key is signed by another your own key (or you really
have corresponding private key).

Let me explain the validity of public keys.

  • Start with a set of key(s) with "ultimate" trust. Ultimate keys are all valid,

put them to a set of valid keys.

  • Pick a key from valid keys. Collect all keys signed by this key (locally or

globally), it's all valid. Put them to a set of valid keys.

Next, it checks "full" or "marginal" trust to a public key.

  • Start with the set of public keys which are valid (by the computation so far).
  • Pick a key from the set. If it has "full" trust, mark all keys which are

signed by this key as it's reachable by "full" trust.

  • If it has "marginal" trust, mark all keys which are signed by this key as it's

reachable by "marginal" trust adding a point.

  • Scan all marked key. If it can be reachable by "full" trust. It will be in

the set of valid keys. If it can be reachable by "marginal" trust by 3
(default) different keys, it will be also in the set of valid keys.

  • Add checked keys to the set of valid keys. And apply(repeat) this procedure

recursively, to the newly added valid keys. Don't repeat too far. Stop if it
goes 5 (default) times.

In other words, adding trust (by --edit-key) to a valid key makes it possible
for another key to be validated by that key. Adding trust (by --edit-key) to an
invalid key doesn't make that invalid key valid. (If it's "full" or "marginal".)

Jul 14 2016, 2:05 AM · Not A Bug, Bug Report, gnupg

Jul 13 2016

atclaus added a comment to T2409: Verifying with Fully Trusted Key Shows as Undefined.

But why does marking it as ultimately trusted ignore that it was never signed?

Jul 13 2016, 9:44 PM · Not A Bug, Bug Report, gnupg
werner added a comment to T1985: Option --try-all-secrets doesn't work.

I forgot to apply Daiki's patch. Done now with commit 82b90ee.

I won't work on the other mentioned change now and this commit is actually about
a regression. Thus bumping to testing.

Jul 13 2016, 6:33 PM · gnupg (gpg21), Bug Report, gnupg
werner added a project to T1985: Option --try-all-secrets doesn't work: Restricted Project.
Jul 13 2016, 6:33 PM · gnupg (gpg21), Bug Report, gnupg
werner added a comment to T2406: Sockets created in GNUPGHOME instead of /run/user/UID/gnupg if specified..

If you want to use a different home directory and a /run/user based socket, you
need to create a directory for that socket first. We don't do this on-the-fly
to avoid cluttering the /run/user with directories.

With GNUPGHOME set, you only need to run

gpgconf --create-socketdir

man gpgconf

Jul 13 2016, 5:04 PM · Not A Bug, Bug Report, gnupg
werner added a project to T2406: Sockets created in GNUPGHOME instead of /run/user/UID/gnupg if specified.: Not A Bug.
Jul 13 2016, 5:04 PM · Not A Bug, Bug Report, gnupg
werner added a project to T2409: Verifying with Fully Trusted Key Shows as Undefined: Not A Bug.
Jul 13 2016, 4:57 PM · Not A Bug, Bug Report, gnupg
werner added a comment to T2408: implicit declaration of function ‘gpg_err_set_errno’ in common/w32-afunix.c:65.

We won't fix that bug but remove the entire file as indicated by the #warning.

Jul 13 2016, 3:10 PM · Bug Report, gnupg
gniibe added a comment to T2403: make check failed for t-stringhelp (AIX 7.1).

Jul 13 2016, 10:54 AM · Bug Report, gnupg
gniibe added a comment to T2403: make check failed for t-stringhelp (AIX 7.1).

In T2403 (gniibe on Jul 13 2016, 10:53 AM / Roundup), I said wrongly. It's tests/Makefile.in.
Here is tests/Makefile.am modified.

Jul 13 2016, 10:54 AM · Bug Report, gnupg
gniibe added a comment to T2403: make check failed for t-stringhelp (AIX 7.1).

Jul 13 2016, 10:53 AM · Bug Report, gnupg
gniibe added a comment to T2403: make check failed for t-stringhelp (AIX 7.1).

Attached is modified Makefile.in, so that 'make check' can run t-fork test program.

Jul 13 2016, 10:53 AM · Bug Report, gnupg
roertel added a comment to T2403: make check failed for t-stringhelp (AIX 7.1).

Yes - I install the patched Npth library into the System. Can you please give
me the expected tests/Makefile.in and tests/Makefile.am.

Jul 13 2016, 8:27 AM · Bug Report, gnupg
gniibe added a comment to T2409: Verifying with Fully Trusted Key Shows as Undefined.

There are two different concepts: trust and validity.

It makes nothing when you edit a key to mark "full" trust which has unknown
validity. (A key's validity should be valid.)

Marking trust (full or marginal) to a valid key makes validation of other keys
will be possible by that key.

In the beginning, you can make a key valid by signing (sign or lsign) by your
ultimately trusted key.

Jul 13 2016, 7:30 AM · Not A Bug, Bug Report, gnupg

Jul 11 2016

pcolmer added a comment to T2332: Cannot authenticate with LDAP keyserver.

This issue still stands with 2.1.13. It may be a bug or it may be a
documentation issue but I really do need this to be investigated and resolved,
please.

Jul 11 2016, 1:01 PM · gnupg, dirmngr, Bug Report

Jul 10 2016

gms added projects to T2412: gpg2 fails on keyserver fingerprint search while gpg succeeds: gnupg, Bug Report.
Jul 10 2016, 10:57 AM · Bug Report, gnupg
gms set Version to 2.1.11 on T2412: gpg2 fails on keyserver fingerprint search while gpg succeeds.
Jul 10 2016, 10:57 AM · Bug Report, gnupg

Jul 9 2016

Jens_Erat added a comment to T2400: GnuPG 2.1 regression in unattended key generation.

If this is unsupported by GnuPG 2.1 and unlikely to change, at least the
documentation should be updated.

Jul 9 2016, 2:20 PM · gnupg (gpg22), Bug Report, gnupg

Jul 7 2016

gniibe added a comment to T2403: make check failed for t-stringhelp (AIX 7.1).

Please manually edit tests/Makefile.in and tests/Makefile.am, so that you can
compile and run t-fork test program.
Have you install the patched Npth library into the system, so that you can use
patched Npth library with GnuPG?

Jul 7 2016, 1:03 PM · Bug Report, gnupg
roertel added a comment to T2403: make check failed for t-stringhelp (AIX 7.1).

Yes - I install teh patch and build the Npth library.

make check

Making check in src
make[1]: Entering directory '/develop/npth-1.2/src'
make[1]: Nothing to be done for 'check'.
make[1]: Leaving directory '/develop/npth-1.2/src'
Making check in tests
make[1]: Entering directory '/develop/npth-1.2/tests'
make check-TESTS
make[2]: Entering directory '/develop/npth-1.2/tests'
PASS: t-mutex

PASS: t-thread

All 2 tests passed

make[2]: Leaving directory '/develop/npth-1.2/tests'
make[1]: Leaving directory '/develop/npth-1.2/tests'
make[1]: Entering directory '/develop/npth-1.2'
make[1]: Leaving directory '/develop/npth-1.2'

Jul 7 2016, 11:45 AM · Bug Report, gnupg
gniibe added a comment to T2403: make check failed for t-stringhelp (AIX 7.1).

Thanks a lot.

5636336: 23330877: sem_post(0xF1299434) Err#13 EACCES

This is the problem.
Did you really got success by "make check" of Npth library?
Have you installed the patched Npth library?
Please confirm.

Jul 7 2016, 11:19 AM · Bug Report, gnupg
roertel added a comment to T2403: make check failed for t-stringhelp (AIX 7.1).

5636336: 23330877: sigprocmask(2, 0xF02E6968, 0x2FF1E3E0) = 0
5636336: 23330877: _sigaction(31, 0x2FF1E438, 0x00000000) = 0
5636336: 23330877: thread_setmymask_fast(0x00000000, 0x00000000,
0x00000000, 0x1164003D, 0x0001F0B0, 0x00000000, 0xE0283800, 0x00000000) =
0x00000000
5636336: 23330877: sigprocmask(2, 0xF02E6968, 0x2FF1E3E0) = 0
5636336: 23330877: _sigaction(2, 0x2FF1E438, 0x00000000) = 0
5636336: 23330877: thread_setmymask_fast(0x00000000, 0x00000000,
0x00000000, 0x1164003D, 0x0001F0B0, 0x00000000, 0xE0283800, 0x00000000) =
0x00000000
5636336: 23330877: sigprocmask(2, 0xF02E6968, 0x2FF1E3E0) = 0
5636336: 23330877: _sigaction(15, 0x2FF1E438, 0x00000000) = 0
5636336: 23330877: thread_setmymask_fast(0x00000000, 0x00000000,
0x00000000, 0x1164003D, 0x0001F0B0, 0x00000000, 0xE0283800, 0x00000000) =
0x00000000
5636336: 23330877: thread_setmymask_fast(0x60004003, 0x00000000,
0x00000000, 0x0000D032, 0x0001F0B0, 0x00000000, 0xE0283800, 0x00000000) =
0x00000000
5636336: 23330877: sem_post(0xF1299434) Err#13 EACCES
5636336: 23330877: kwrite(2, " A s s e r t i o n f a".., 18) = 18
5636336: 23330877: kwrite(2, " _ _ E X", 4) = 4
5636336: 23330877: kwrite(2, " , f i l e ", 8) = 8
5636336: 23330877: kwrite(2, " n p t h . c", 6) = 6
5636336: 23330877: kwrite(2, " , l i n e 1 4 9\n", 11) = 11
5636336: 23330877: kfcntl(1, F_GETFL, 0x1164003D) = 67108865
5636336: 23330877: kfcntl(2, F_GETFL, 0x1164003D) = 67108865
5636336: 23330877: _getpid() = 5636336
5636336: 23330877: thread_kill(-1, 6) = 0
5636336: Received signal #6, SIGABRT [default]
5636336: * process killed *
6815982: 16842893: thread_setmymask_fast(0x00000000, 0x00000000, 0x00000000,
0xD0551900, 0x00000000, 0x1101008D, 0x1101008D, 0x00000000) = 0x00000000
6815982: Received signal #20, SIGCHLD [default]
6815982: 16842893: close(3) = 0
6815982: 16842893: sigprocmask(2, 0x20003AC8, 0x00000000) = 0
6815982: 16842893: __loadx(0x04400000, 0x2FF22080, 0x00000800, 0xD05516A4,
0x00000000) = 0x00000000
6815982: 16842893: kfcntl(1, F_GETFL, 0x1101008D) = 67110922
6815982: 16842893: kfcntl(2, F_GETFL, 0x1101008D) = 67110922
6815982: 16842893: _exit(0)

Jul 7 2016, 10:47 AM · Bug Report, gnupg
gniibe added a comment to T2403: make check failed for t-stringhelp (AIX 7.1).

Thank you for your testing. The patch is to the repository. You need manual
edit to tests/Makefile.am which add t-fork as a test program. I think that
"make check" should go successfully for Npth with the patch.

Could you please trace the gnupg-agent with children processes?
If you are using truss, -f option (follow childres), please.

Jul 7 2016, 9:53 AM · Bug Report, gnupg
werner added a comment to T2400: GnuPG 2.1 regression in unattended key generation.

That is not easy to change. By design gpg-agent generates the key and does not
return it (except for a hack to support --export-secret-key).

2,1 has the goal to replace 1.4 and thus I see the need to support creating a
key w/o string it in private-keys-v1.d/.

Jul 7 2016, 9:14 AM · gnupg (gpg22), Bug Report, gnupg