Page MenuHome GnuPG
Feed Advanced Search

Aug 18 2016

werner removed a project from T2437: please document forward-compatible expectations for machine-readable formats: Unreleased.
Aug 18 2016, 11:09 PM · gnupg, Feature Request
werner added a comment to T2437: please document forward-compatible expectations for machine-readable formats.

Done with commit d25db3c for 2.1.15

Aug 18 2016, 12:46 PM · gnupg, Feature Request
werner closed T2437: please document forward-compatible expectations for machine-readable formats as Resolved.
Aug 18 2016, 12:46 PM · gnupg, Feature Request
werner added a project to T2437: please document forward-compatible expectations for machine-readable formats: Unreleased.
Aug 18 2016, 12:46 PM · gnupg, Feature Request

Aug 16 2016

nwf added a comment to T2440: scdaemon grabs card exclusively; it'd be nice if it didn't.

Yeah, at the moment I shoot scdaemon with SIGTERM whenever I need to use the PIV
app, which is rare, and have carefully avoided any kind of automated invocation
of the smartcard through scdaemon (e.g. my statusbar polls via ykinfo directly,
rather than invoking gpg --card-status.)

I know essentially nothing about smart cards or PC/SC's design, but what goes
wrong holding the card open shared rather than exclusively? Can other shared
lock holders do drastic things like insert or remove keys, causing scdaemon's
cache to become stale? I would have (naively) guessed that shared holders could
only do things like cryptographic operations which won't pose an issue to
scdaemon's cache. (Admittedly, cryptography is not side-effect free; counters
get incremented, random numbers get generated, but none of that is the kind of
thing that scdaemon caches, right?)

Thanks for thinking about this. :)

Aug 16 2016, 3:36 AM · scd, gnupg, Feature Request
gniibe added a comment to T1756: gpg-agent doesn't accept ssh certificates.

FYI.

https://lists.gnupg.org/pipermail/gnupg-devel/2016-August/031479.html
^-- In this experiment, I tried another half of supporting OpenSSH certificates.

I found that it doesn't work as I had thought.

I think that the lower level support of gpg-agent is ready to add this feature
of accepting OpenSSH certificates, but modification of OpenSSH will be required
too, so that it works well.

Currently, the OpenSSH certificate file itself is still needed even if ssh-agent
supports OpenSSH certificates. When it returns a certificate to ssh client, ssh
client only uses the information of the key in the certificate. It is the file
which ssh client uses communicating to the server.

Aug 16 2016, 2:41 AM · gnupg, Feature Request
gniibe claimed T2440: scdaemon grabs card exclusively; it'd be nice if it didn't.
Aug 16 2016, 2:29 AM · scd, gnupg, Feature Request
gniibe added a project to T2440: scdaemon grabs card exclusively; it'd be nice if it didn't: gnupg.
Aug 16 2016, 2:29 AM · scd, gnupg, Feature Request
gniibe added a comment to T2440: scdaemon grabs card exclusively; it'd be nice if it didn't.

Scdaemon grabs the device after its first use; it gets information on the
card/token and it operates (sign/decrypt) based on those information. If it
releases the device, it should get the info.
Current design of scdaemon is state-full: it caches the information on the card
so that operations can be soon done.
more state-less design could be possible, with the cost of each operation will
be heavy (by getting information each time).

I don't know the PIV app of Yubikey, but, in most cases, such an app can be
written stopping scdaemon beforehand (by a line of gpgconf --reload scdaemon, if
it's a script). It's a simple workaround for now.

Aug 16 2016, 2:29 AM · scd, gnupg, Feature Request

Aug 14 2016

nwf added a project to T2440: scdaemon grabs card exclusively; it'd be nice if it didn't: Feature Request.
Aug 14 2016, 10:42 PM · scd, gnupg, Feature Request
nwf added a project to T2439: Optionally always prompt for key confirmation for requests from restricted sockets: Feature Request.
Aug 14 2016, 10:35 PM · gpgagent, Feature Request

Aug 12 2016

werner removed a project from T2359: Query which key will be used for a given mailbox: gnupg (gpg21).
Aug 12 2016, 11:16 AM · gnupg (gpg22), gnupg, Feature Request
werner added a project to T2359: Query which key will be used for a given mailbox: gnupg (gpg22).
Aug 12 2016, 11:16 AM · gnupg (gpg22), gnupg, Feature Request
werner removed a project from T2360: Add support for TOFU in GpgME: gnupg (gpg21).
Aug 12 2016, 11:14 AM · gnupg (gpg22), gpgme, Feature Request
werner added a project to T2360: Add support for TOFU in GpgME: gnupg (gpg22).
Aug 12 2016, 11:14 AM · gnupg (gpg22), gpgme, Feature Request

Aug 10 2016

werner added a comment to T2314: Improve detection of gpgme_data_identify.

PNGs are noe rejected.

Aug 10 2016, 3:38 PM · gpgme, Feature Request, gpg4win

Aug 9 2016

werner added a project to T2429: Allow Assuan flags to be set: Restricted Project.
Aug 9 2016, 3:49 PM · gpgme, Feature Request
werner added a comment to T2429: Allow Assuan flags to be set.

Fixed with commit b5e16b0

Aug 9 2016, 3:49 PM · gpgme, Feature Request
werner closed T1958: Use vfork/posix_spawn in gpgme as Resolved.
Aug 9 2016, 3:41 PM · Info Needed, gpgme, Feature Request
werner renamed T2385: support more than 1024 fds. from _gpgme_io_select crashes if fd > 1024 to support more than 1024 fds..
Aug 9 2016, 11:49 AM · gpgrt, Feature Request, gpgme
werner added a comment to T2385: support more than 1024 fds..

I changed this ussie to a feature request.

Aug 9 2016, 11:49 AM · gpgrt, Feature Request, gpgme
werner added a project to T2385: support more than 1024 fds.: Feature Request.
Aug 9 2016, 11:49 AM · gpgrt, Feature Request, gpgme

Aug 8 2016

werner added a comment to T2429: Allow Assuan flags to be set.

Debian's codesearch shows that gpgme_op_assuan_transact is only used by gpa and
a configure test in kdelibpim for its own copy of gpgme. In gpa it is harmless
to enable this. The only effect is that a status line callback will see a
status keyword "#" and status callbacks should always ignore unknown status lines.

Let's enable it by default.

Aug 8 2016, 4:55 PM · gpgme, Feature Request

Aug 6 2016

dkg added projects to T2437: please document forward-compatible expectations for machine-readable formats: Feature Request, gnupg.
Aug 6 2016, 6:20 PM · gnupg, Feature Request
dkg set Version to 2.1.14 on T2437: please document forward-compatible expectations for machine-readable formats.
Aug 6 2016, 6:20 PM · gnupg, Feature Request

Aug 5 2016

aheinecke added a project to T2420: TOFU Info for a Key: Duplicate.
Aug 5 2016, 10:49 AM · Duplicate, gpgme, gnupg (gpg21), Feature Request
aheinecke added a comment to T2420: TOFU Info for a Key.

This was already mentioned in T2360 so let's not clutter the tracker.
Resolved as duplicate.

Aug 5 2016, 10:49 AM · Duplicate, gpgme, gnupg (gpg21), Feature Request
aheinecke added a comment to T2420: TOFU Info for a Key.

Duplicate of T2360

Aug 5 2016, 10:49 AM · Duplicate, gpgme, gnupg (gpg21), Feature Request
aheinecke closed T2420: TOFU Info for a Key as Resolved.
Aug 5 2016, 10:49 AM · Duplicate, gpgme, gnupg (gpg21), Feature Request

Aug 3 2016

aheinecke added a comment to T2359: Query which key will be used for a given mailbox.

To piggyback something on this issue.

To quote T2359 (aheinecke on May 17 2016, 11:59 AM / Roundup):

e.g. an API to check which key: gpg -er aheinecke@intevation.de

I did not have groups on the radar for this. If a recipient is a group then
gnupg would use multiple keys in this command.

I think locate-keys would be a great mechanism to support this easily in MUAs.
When we change it that for a given mailbox only the single most valid Key is
returned we could also have the semantic that if then multiple Keys are returned
we have a group.

Aug 3 2016, 12:29 PM · gnupg (gpg22), gnupg, Feature Request

Aug 2 2016

aheinecke added projects to T2435: gpgsm combined sign and encrypt: Feature Request, kleopatra, gnupg.
Aug 2 2016, 3:57 PM · gnupg, kleopatra, Feature Request

Jul 28 2016

justus added projects to T2429: Allow Assuan flags to be set: Feature Request, gpgme.
Jul 28 2016, 2:12 PM · gpgme, Feature Request
justus set Version to master on T2428: Implement returning data from inquire callbacks.
Jul 28 2016, 2:07 PM · gpgme, Feature Request
justus added projects to T2428: Implement returning data from inquire callbacks: Feature Request, gpgme.
Jul 28 2016, 2:07 PM · gpgme, Feature Request

Jul 25 2016

justus added a comment to T1955: Prefer keys with no or cached passphrase..

I have a possible solution pushed to branch justus/issue1955. The idea is to try
to parse the message with PINENTRY_MODE_CANCEL first, and should that fail, we
retry with the configured pinentry mode. Not sure if that is too hacky, or what
side-effects parsing the message may have that we must not do twice. Werner,
what do you think?

Jul 25 2016, 10:52 AM · gnupg (gpg23), Feature Request

Jul 22 2016

aheinecke added a comment to T2314: Improve detection of gpgme_data_identify.

While the detection works now to distinguish between PGP and S/MIME data it
might be more robust if it would do some more sanity checking on the packet.

E.g. PNG Graphics are detected as PGP Signatures because they start with 0x89

But this is not super neccessary as for the use case of file extension support
valid data will be detected correctly.

Jul 22 2016, 2:28 PM · gpgme, Feature Request, gpg4win

Jul 20 2016

aheinecke added projects to T2420: TOFU Info for a Key: Feature Request, gnupg (gpg21), gpgme.
Jul 20 2016, 2:31 PM · Duplicate, gpgme, gnupg (gpg21), Feature Request
aheinecke set External Link to https://phabricator.kde.org/T2520 on T2420: TOFU Info for a Key.
Jul 20 2016, 2:31 PM · Duplicate, gpgme, gnupg (gpg21), Feature Request

Jul 14 2016

werner removed a project from T2402: New option to encrypt with a key taken from a file: Unreleased.
Jul 14 2016, 7:13 PM · gnupg, OpenPGP, Feature Request

Jul 7 2016

werner added a comment to T2314: Improve detection of gpgme_data_identify.

I think that the charset header in the armor is not a good idea. In fact gpg
does not consider it at all. The armor headers are not protected and thus they
should not not chnage the semantics of the encrypted message. There is also no
way to keep this information after removing the armor or to re-create the header
from a binary message.

I consider a new flag for the Literal Data Packet to indicate theat the content
is a MIME message to be better. Standard MIME methods can then be used to
describe the content. Right now we only have an 'u' flag to indicate UTF-8
encoding (which to some interpretation of OpenPGP is anyway the default).
An 'm' flag would make it explicit that the content is MIME encoded and there
would be no more need to derive that info from the context.

Jul 7 2016, 9:05 AM · gpgme, Feature Request, gpg4win
werner added a comment to T2314: Improve detection of gpgme_data_identify.

I also created a set of examples messages. They are in
gnupg/tests/openpgp/samplemsgs/

Jul 7 2016, 8:56 AM · gpgme, Feature Request, gpg4win

Jul 6 2016

werner added a project to T2402: New option to encrypt with a key taken from a file: Unreleased.
Jul 6 2016, 4:10 PM · gnupg, OpenPGP, Feature Request
werner added a comment to T2402: New option to encrypt with a key taken from a file.

We got it for 2.1: -f or --recipient-file

Jul 6 2016, 4:10 PM · gnupg, OpenPGP, Feature Request
werner closed T2402: New option to encrypt with a key taken from a file as Resolved.
Jul 6 2016, 4:10 PM · gnupg, OpenPGP, Feature Request
werner added a comment to T2404: gpg-connect-agent should have an --scdaemon option in parallel to the --dirmngr option.

The only reason I can see that scdaemon is not started by gpg-agent are
processes which run before a login, for example from PAM. But then the
autostart feature probably not needed.

Jul 6 2016, 4:09 PM · gnupg, Feature Request

Jul 5 2016

dkg added a comment to T2404: gpg-connect-agent should have an --scdaemon option in parallel to the --dirmngr option.

hm, if there's a guarantee that scdaemon will only ever be launched as a
subprocess from gpg-agent, then maybe we don't need it.

If there's ever any expectation that some other program will launch scdaemon,
then it would be nice to use the unified launch mechanism provided by gpgconf.

Jul 5 2016, 11:31 PM · gnupg, Feature Request
aheinecke closed T2295: Provide 64-bit gpgol.dll for new 64-bit versions of Office as Resolved.
Jul 5 2016, 2:47 PM · Windows 64, Windows, Feature Request, gpgol
aheinecke added a comment to T2295: Provide 64-bit gpgol.dll for new 64-bit versions of Office.

Gpg4win 2.3.1 and 2.3.2 included 64 bit versions of gpgol.

Jul 5 2016, 2:47 PM · Windows 64, Windows, Feature Request, gpgol

Jul 4 2016

werner added a comment to T2404: gpg-connect-agent should have an --scdaemon option in parallel to the --dirmngr option.

Do you really want to use it? The problem is that you won't have a Pinentry and
some other minor goodies. The better way is to let gpg-agent route command to
scdaemon. For example

  gpg-connect-agent "scd help" /bye

shows scdaemons help.

Jul 4 2016, 12:41 PM · gnupg, Feature Request

Jul 2 2016

jukivili added a comment to T2388: Inform callers about memory alignment requirements of a cipher implementation.

Currently, there is no need for alignmask API. Implementations that we have at
the moment can handle unaligned data and some have fast paths for word-aligned
in/out buffers (which malloc can provide).

We could add section in documentation about appropiate memory alignment for best
performance, and tell to align buffers to cacheline size.

Jul 2 2016, 1:53 PM · libgcrypt, Feature Request

Jul 1 2016

aheinecke claimed T2314: Improve detection of gpgme_data_identify.
Jul 1 2016, 11:02 AM · gpgme, Feature Request, gpg4win
aheinecke added a comment to T2314: Improve detection of gpgme_data_identify.

Fix for the difference in detection of armored vs. binary detached signatures
was trivial so I've pushed it with rev. 570bf2a

Looks good to me know. I'll start using it in Kleopatra and we will see what
breaks :-)

Have not tested different S/MIME messages yet.

Jul 1 2016, 11:02 AM · gpgme, Feature Request, gpg4win

Jun 30 2016

dkg added projects to T2404: gpg-connect-agent should have an --scdaemon option in parallel to the --dirmngr option: Feature Request, gnupg.
Jun 30 2016, 6:36 PM · gnupg, Feature Request
aheinecke added a comment to T2381: Add more support for profiles in gpgconf.

Talked to werner about it. The way something like trust-model should be
switchable would be best to handle with profiles.

There is at least one profile planned for EasyGPG. Something like "Silent" or
automated. Riseup and VSNFD will probably also want to create profiles.

I think apply-defaults could be extended for this with a defaults file for each
profile.
Then something like:

gpgconf --list-defaults

    List all available default files.

Where the output format could be similar to list-components.
name:description:filename:

filename is the path to the config file.

Then --apply-defaults could be extended to take an optional filename as an
argument. (Like --list-config, --check-config)

With --dry-run it should only check if all the settings marked as no-change are
set correctly and indicate it through the return code.

For EasyGPG I think a config file could be:

  • gpg-agent max-cache-ttl [change] 30758400 gpg-agent default-cache-ttl [change] 30758400 gpg trust-model [no-change] tofu+pgp gpg auto-key-retrieve [change] gpg auto-key-locate [change] local,wkd,dane,pka,cert,keyserver
Jun 30 2016, 4:00 PM · In Progress, gnupg (gpg22), gnupg, Feature Request
aheinecke renamed T2381: Add more support for profiles in gpgconf from Expose trust-model through gpgconf to Add support for profiles in gpgconf.
Jun 30 2016, 4:00 PM · In Progress, gnupg (gpg22), gnupg, Feature Request

Jun 29 2016

werner added projects to T2402: New option to encrypt with a key taken from a file: Feature Request, OpenPGP, gnupg.
Jun 29 2016, 12:40 PM · gnupg, OpenPGP, Feature Request

Jun 24 2016

aheinecke added a comment to T2314: Improve detection of gpgme_data_identify.

Jun 24 2016, 2:35 PM · gpgme, Feature Request, gpg4win
aheinecke added a comment to T2314: Improve detection of gpgme_data_identify.

Thanks.

I've created some examples to test it. They are all done with alfa@example.com
test key. Found an issue through that.

-ba (detached ascii armored signature) is detected as PGP-Signed and not as
PGP-Signature.

examples/plain.txt.asc: PGP-signed

A discussion about KMail handling PGP/Inline encodings [1] also makes me wonder
if data_identfiy should also return the output charset of text messages if it is
provided in the Armor Header. Afaik there is currently no API in gpgme to check
this and semantically It would make sense to me to parse this in identify, too.
But this is more of a question wether or not you think it makes sense to do this
directly. I'm not strongly opinionated about this.

1: https://bugs.kde.org/show_bug.cgi?id=248058

Jun 24 2016, 2:35 PM · gpgme, Feature Request, gpg4win
syscomet added projects to T2398: finger support using SRV DNS records: dirmngr, Feature Request.
Jun 24 2016, 12:23 PM · gnupg, Feature Request, dirmngr

Jun 23 2016

werner added a project to T2314: Improve detection of gpgme_data_identify: Restricted Project.
Jun 23 2016, 10:18 AM · gpgme, Feature Request, gpg4win
werner removed a project from T2314: Improve detection of gpgme_data_identify: In Progress.
Jun 23 2016, 10:18 AM · gpgme, Feature Request, gpg4win
werner added a comment to T2314: Improve detection of gpgme_data_identify.

Done with commit cf37a57.
Note that only the first 2k are inspected.

Jun 23 2016, 10:18 AM · gpgme, Feature Request, gpg4win

Jun 21 2016

werner added a comment to T2314: Improve detection of gpgme_data_identify.

Binary PGP messages are now detected. Not well tested but the run-verify test
tool can help to check the feature.

Jun 21 2016, 4:25 PM · gpgme, Feature Request, gpg4win
werner added a project to T2314: Improve detection of gpgme_data_identify: In Progress.
Jun 21 2016, 4:25 PM · gpgme, Feature Request, gpg4win
werner renamed T2314: Improve detection of gpgme_data_identify from Improve detection of gpgme_data_indentify to Improve detection of gpgme_data_identify.
Jun 21 2016, 10:46 AM · gpgme, Feature Request, gpg4win

Jun 20 2016

werner added a comment to T2314: Improve detection of gpgme_data_identify.

I need to implement a partial OpenPGP parser to decide what a certain PGP
Message is about and also bot all binary OpenPGP files. Please have some patience.

Jun 20 2016, 9:40 PM · gpgme, Feature Request, gpg4win

Jun 18 2016

dkg added a comment to T2348: Improve detection of IPv6 and IPv4 availibility.

(that last comment was with 2.1.13)

Jun 18 2016, 1:35 AM · gnupg, Feature Request, dirmngr
dkg set Version to 2.1.13 on T2348: Improve detection of IPv6 and IPv4 availibility.
Jun 18 2016, 1:35 AM · gnupg, Feature Request, dirmngr
dkg added a comment to T2348: Improve detection of IPv6 and IPv4 availibility.

fwiw, when i'm on a network that doesn't support IPv6, i get this:

0 dkg@alice:~$ gpg --send $KEYID
gpg: sending key REDACTED to hkps://hkps.pool.sks-keyservers.net
gpg: keyserver send failed: Invalid argument
gpg: keyserver send failed: Invalid argument
2 dkg@alice:~$

in dirmngr's logs:

2016-06-17 19:30:17 dirmngr[27999.2] DBG: gnutls:L3: ASSERT: mpi.c:246
2016-06-17 19:30:17 dirmngr[27999.2] DBG: gnutls:L5: REC[0x7f61f400fc10]:
Allocating epoch #0
2016-06-17 19:30:17 dirmngr[27999.2] can't connect to '2001:ba8:1f1:f2d4::2':
Invalid argument
2016-06-17 19:30:17 dirmngr[27999.2] error connecting to
'https://[2001:ba8:1f1:f2d4::2]:443': Invalid argument
2016-06-17 19:30:17 dirmngr[27999.2] DBG: gnutls:L5: REC[0x7f61f400fc10]: Start
of epoch cleanup
2016-06-17 19:30:17 dirmngr[27999.2] DBG: gnutls:L5: REC[0x7f61f400fc10]: End of
epoch cleanup

I think this instance of dirmngr was started on a network that has both IPv4 and
IPv6.

if i do:

     gpg-connect-agent --dirmngr killdirmngr /bye

and then try the --send again, it goes through fine.

Jun 18 2016, 1:35 AM · gnupg, Feature Request, dirmngr

Jun 17 2016

aheinecke added a comment to T2314: Improve detection of gpgme_data_identify.

Would it be possible to also detect if data should be decrypt_verified or just
verified?

I'm having trouble with PGP MESSAGES that can be either encrypted or Opaque
Signed, or nothing.

If I do a decrypt_verify I get a No Data error in the result because decryption
failed. Should I just ignore No Data error and check for the status of the
signatures in that case?

Jun 17 2016, 4:23 PM · gpgme, Feature Request, gpg4win
smueller_chronox.de added projects to T2388: Inform callers about memory alignment requirements of a cipher implementation: Feature Request, libgcrypt.
Jun 17 2016, 11:30 AM · libgcrypt, Feature Request

Jun 13 2016

TARehman added a comment to T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo.

I did not see anything in the FAQ dealing specifically with the GUI not
working. That is what this bug is about. I agree that changing the cipher-algo
should be done cautiously, but either the front-end should not permit it to
appear to happen, or the front-end should actually do the expected behavior
(namely, changing the config files).

Jun 13 2016, 10:02 PM · gnupg, Bug Report, S/MIME
TARehman reopened T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo as "Open".
Jun 13 2016, 10:02 PM · gnupg, Bug Report, S/MIME

Jun 8 2016

aheinecke added a comment to T1143: better heuristic for choosing an encryption key based on a User ID.

Just noticed this issue as it was mentioned in T2359 which is "my" issue
about this topic ;-)
I've actually implemented the algorithm outlined in T1143 (dkg on Sep 23 2009, 06:53 PM / Roundup) in libkleo/ QGgpME
for a better opportunistic encryption support in kmail (
https://phabricator.kde.org/T2520 )

Werner told me that something like that will be done in GnuPG itself. Afaik the
current plan is to have --locate-keys use a similar algorithm to return exactly
one "best" key if a mailbox is given. And if I understood werner correctly this
would then also be the key used when you would do a "gpg -er <mailbox>"

Should this be closed as Superseded?

Jun 8 2016, 7:15 PM · Duplicate, gnupg, Feature Request
werner added a comment to T2359: Query which key will be used for a given mailbox.

related: T1143

Jun 8 2016, 6:10 PM · gnupg (gpg22), gnupg, Feature Request
werner closed T1394: man page documents some unsupported parameters as Resolved.
Jun 8 2016, 6:06 PM · gnupg, Debian, Feature Request
werner added a comment to T1394: man page documents some unsupported parameters.

Fixed in the repo (commit 536c721)

Jun 8 2016, 6:06 PM · gnupg, Debian, Feature Request
werner closed T1444: Check keyid after downloading key from keyserver and before importing it as Resolved.
Jun 8 2016, 5:56 PM · gnupg, Feature Request
werner added a comment to T1444: Check keyid after downloading key from keyserver and before importing it.

We have meanwhile implemented such a check.

Jun 8 2016, 5:56 PM · gnupg, Feature Request
werner removed a project from T1831: Remove gpgkey2ssh, source and build target: Stalled.
Jun 8 2016, 5:53 PM · gnupg, Feature Request
werner added a comment to T1831: Remove gpgkey2ssh, source and build target.

gpgkey2ssh has been removed from master (2.1)

Jun 8 2016, 5:53 PM · gnupg, Feature Request
werner closed T1831: Remove gpgkey2ssh, source and build target as Resolved.
Jun 8 2016, 5:53 PM · gnupg, Feature Request
werner added a comment to T459: gnupg could provide more detailed debugging error codes - especially for enigmail.

Most thingd have probably been implemented in the meantime.

Jun 8 2016, 5:50 PM · gnupg, Feature Request

Jun 6 2016

werner added a project to T2379: default to --with-fingerprint, introduce --without-fingerprint: Restricted Project.
Jun 6 2016, 5:08 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

7257ea2 switches to none.

There is also a new option --with-subkey-fingerprint which keeps the compact
fingerprint format also for subkeys. The Lead-in text for fingerprints n the
listing is in any case not anymore printed if keyid-format is none.

Jun 6 2016, 5:08 PM · gnupg, Feature Request
werner removed a project from T2379: default to --with-fingerprint, introduce --without-fingerprint: In Progress.
Jun 6 2016, 5:08 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

Just pushed the --keyid-format=none feature. Changing the default will be done
with another commit.

Jun 6 2016, 4:06 PM · gnupg, Feature Request
werner added a project to T2379: default to --with-fingerprint, introduce --without-fingerprint: In Progress.
Jun 6 2016, 4:06 PM · gnupg, Feature Request
aheinecke added a comment to T2380: Auto-refresh key if it is close to its expiration date..

Replacing revoked keys made me wonder if we actually need an auto-refresh key.
If we try to return one valid key with --locate-keys wouldn't it make more sense
semantically if we use the auto-key-locate mechanisms with locate-keys when a
key is expired in the local store?

This would also work better for revoked keys where a Parcimonie style auto
refresh would pick up the revocation and locate-keys would then look for a new key.

Jun 6 2016, 3:56 PM · vsd34, gnupg, OpenPGP, Feature Request
aheinecke added a comment to T2359: Query which key will be used for a given mailbox.

How do you plan to handle the case that "local" lookup only yields expired or
revoked keys. Will GnuPG then automatically fall back to other locate-keys methods?
This would be my wish so that a MUA / User of that command does not have to care
about that case :-)

Jun 6 2016, 3:50 PM · gnupg (gpg22), gnupg, Feature Request
aheinecke added projects to T2381: Add more support for profiles in gpgconf: Feature Request, gnupg (gpg21), gnupg.
Jun 6 2016, 2:22 PM · In Progress, gnupg (gpg22), gnupg, Feature Request
werner added projects to T2380: Auto-refresh key if it is close to its expiration date.: Feature Request, OpenPGP, gnupg.
Jun 6 2016, 11:40 AM · vsd34, gnupg, OpenPGP, Feature Request

Jun 4 2016

werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

This is the current output with keyid-format=none

pub dsa2048 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>
uid [ full ] Werner Koch <wk@[...]>
uid [ unknown] Werner Koch <werner@[...]>
sub dsa1024 2011-11-02 [S]
sub rsa2048 2014-01-02 [E] [expires: 2016-12-31]

The problem I have is how to decide when to use the compact fingerprint format.
My idea is to always use the compact format unless --fingerprint switched back
to the old format (which is easier to read).

Jun 4 2016, 9:23 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

I started working on this.

Jun 4 2016, 9:10 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

I tried it but I think it looks prettier without. A rationale might be that the
fingerprint is a property of the "pub" (public key) and the line should be
considered a continuation line.

Jun 4 2016, 7:40 PM · gnupg, Feature Request
dkg added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

This looks great to me. I've always been frustrated by the c+p difficulty.

Does it make sense to put an "fpr" at the beginning of the fingerprint line, to
match with "pub" and "uid" ?

For example:

pub dsa2048 2007-12-31 [SC] [expires: 2018-12-31]
fpr 80615870F5BAD690333686D0F2AD85AC1E42B367
uid [ full ] Werner Koch <wk@gnupg.org>

Have you started work on this change or would you like patches?

Jun 4 2016, 5:55 PM · gnupg, Feature Request
werner added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

The current --with-fingerprint output is

pub dsa2048/F2AD85AC1E42B367 2007-12-31 [SC] [expires: 2018-12-31]

Key fingerprint = 8061 5870 F5BA D690 3336  86D0 F2AD 85AC 1E42 B367

uid [ full ] Werner Koch <wk@gnupg.org>

One problem I have with this format is the c+p of the fingerrpint is
not easy, because you need to mark the entire fingerprint and then use
quotes to use it. What about changing the default format (i.e. w/o
any fingerprint options to

pub dsa2048/F2AD85AC1E42B367 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>

or

pub dsa2048/1E42B367 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>

or

pub dsa2048 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>

or aligned in some other way?

Personally I would like to keep the long keyid at least for subkeys
because it makes the key listing easier to read and forced selection
of a signing subkey easier. However, removing information which is
in most cases useless and partly dangerous has a higher priority.
Thus a listing of my key may look like this:

pub dsa2048 2007-12-31 [SC] [expires: 2018-12-31]

80615870F5BAD690333686D0F2AD85AC1E42B367

uid [ full ] Werner Koch <wk@gnupg.org>
uid [ full ] Werner Koch <wk@[...]>
uid [ full ] Werner Koch <werner@[...]>
sub dsa1024 2011-11-02 [S]
sub rsa2048 2014-01-02 [E] [expires: 2016-12-31]

To implement that I would indeed suggest a keyid format "none" which
will be the default and select the above new listing format.

Jun 4 2016, 11:26 AM · gnupg, Feature Request
werner claimed T2379: default to --with-fingerprint, introduce --without-fingerprint.
Jun 4 2016, 11:26 AM · gnupg, Feature Request
werner added a project to T1445: keyid-format fingerprint: gnupg.
Jun 4 2016, 11:03 AM · gnupg, Duplicate, Feature Request
werner added a project to T1445: keyid-format fingerprint: Duplicate.
Jun 4 2016, 11:03 AM · gnupg, Duplicate, Feature Request