Page MenuHome GnuPG
Feed Advanced Search

Dec 15 2016

justus added a comment to T2700: Clean up the command line interface (avoid abbreviated --long-options, consistency).

Fixed for gpg as of 6b16b02109f4bb5b934e456667ff4c0ba7bc85fd.

Dec 15 2016, 5:27 PM · gnupg, Feature Request, gnupg (gpg22)
justus added a project to T2700: Clean up the command line interface (avoid abbreviated --long-options, consistency): In Progress.
Dec 15 2016, 5:27 PM · gnupg, Feature Request, gnupg (gpg22)

Dec 13 2016

justus set External Link to https://lists.gnupg.org/pipermail/gnupg-devel/2016-December/032298.html on T2701: Do not let users create keys without an expiration date.
Dec 13 2016, 4:53 PM · Feature Request, gnupg (gpg22)
justus closed T2701: Do not let users create keys without an expiration date as Resolved.
Dec 13 2016, 4:53 PM · Feature Request, gnupg (gpg22)
justus added a comment to T2701: Do not let users create keys without an expiration date.

--quick-keygen fixed in dd3dde07a9a46130ac01d849f8edf0566e44f11f.

The default expiration interval has been discussed on the mailing list. There
was a rough consensus on two years, which has been challenged by Neal who thinks
it is too short given the current state of the tools, but the ensuing discussion
did not revolve around the time span, so I'm keeping my two years for now. In
any case, it is easy to adjust.

I decided to not change the --full-key-gen, because a) the user asked for it, b)
changing that requires breaking up a large chunk of translated text, and I do
not want to do that right now (a release is imminent).

Dec 13 2016, 4:53 PM · Feature Request, gnupg (gpg22)

Dec 9 2016

justus added a comment to T2701: Do not let users create keys without an expiration date.

Partially addressed in d568a1561642ed9b7b7b6282b86c56786d10a956.

Dec 9 2016, 2:56 PM · Feature Request, gnupg (gpg22)
dkg added a comment to T2862: support session key extraction and overriding for gpgsm.

This would emit the "content-encryption key", as specified in
https://tools.ietf.org/html/rfc5652#section-6.3

Dec 9 2016, 5:18 AM · gnupg24, Feature Request, gnupg (gpg23)

Dec 8 2016

werner added a project to T2866: gpg-wks-client should support --check: Restricted Project.
Dec 8 2016, 5:59 PM · gnupg, Feature Request
werner added a comment to T2866: gpg-wks-client should support --check.

Okay, I implemented --status-fd for gpg-wks-client.

Dec 8 2016, 5:59 PM · gnupg, Feature Request
aheinecke added a comment to T2866: gpg-wks-client should support --check.

Regarding a return code as text lines: Do you need this due to the double-fork
we use in gpgme?

I think so, at least I did not find a way to return an exit code from
gpgme_op_spawn.

If we provide this we should resort to the GnuPG standard
which is to required --status-fd N to print
[GNUPG:] ERROR ....
okay?

Yes. In that case i could use op_spawn with status-fd 2 and would get the error
I think.

Dec 8 2016, 5:12 PM · gnupg, Feature Request
werner added a comment to T2866: gpg-wks-client should support --check.

Okay, try "gpg-wks-cleint --check ADDR" So see details use -v.

Regarding a return code as text lines: Do you need this due to the double-fork
we use in gpgme? If we provide this we should resort to the GnuPG standard which is
to required --status-fd N to print
[GNUPG:] ERROR ....
okay?

Dec 8 2016, 5:09 PM · gnupg, Feature Request
aheinecke added projects to T2866: gpg-wks-client should support --check: Feature Request, gnupg.
Dec 8 2016, 3:11 PM · gnupg, Feature Request
aheinecke updated subscribers of T2866: gpg-wks-client should support --check.
Dec 8 2016, 3:11 PM · gnupg, Feature Request

Dec 6 2016

werner added a comment to T2701: Do not let users create keys without an expiration date.

Would you mind to write to gnupg-devel and ask for comments on your proposal?
In particular on how long the default expiration time shall be. 12, 18, or 24
months?

Dec 6 2016, 9:55 PM · Feature Request, gnupg (gpg22)

Dec 5 2016

dkg added projects to T2862: support session key extraction and overriding for gpgsm: gnupg (gpg23), Feature Request, gnupg.
Dec 5 2016, 7:38 PM · gnupg24, Feature Request, gnupg (gpg23)
justus added a comment to T2701: Do not let users create keys without an expiration date.

Thanks!

Dec 5 2016, 1:44 PM · Feature Request, gnupg (gpg22)
werner added a comment to T2701: Do not let users create keys without an expiration date.

--quick-set-expire now available.

Dec 5 2016, 12:22 PM · Feature Request, gnupg (gpg22)
werner added a comment to T2701: Do not let users create keys without an expiration date.

I'll take the --quick-set-expire command. -wk

Dec 5 2016, 9:26 AM · Feature Request, gnupg (gpg22)
werner added a comment to T2359: Query which key will be used for a given mailbox.

That is becuase we consider a mail address to be a unique indentifier and thus
and algorithm to figure out the best matching makes sense. Other kinds of user
IDS not not need to be unique and should at best return an ambigious key error.
Well, expired keys and such should be sorted out, though.

Dec 5 2016, 9:03 AM · gnupg (gpg22), gnupg, Feature Request

Dec 1 2016

cpaelzer added a comment to T2858: way to not spawn (or despawn) gpg-agent and dirmngr.

On Thu, Dec 1, 2016 at 10:33 AM, Werner Koch via BTS <gnupg@bugs.g10code.com

wrote:

Dec 1 2016, 11:03 AM · gnupg, Feature Request, dirmngr
werner added a project to T2398: finger support using SRV DNS records: gnupg.
Dec 1 2016, 10:40 AM · gnupg, Feature Request, dirmngr
werner added a project to T2858: way to not spawn (or despawn) gpg-agent and dirmngr: gnupg.
Dec 1 2016, 10:34 AM · gnupg, Feature Request, dirmngr
werner added a comment to T2858: way to not spawn (or despawn) gpg-agent and dirmngr.

Can you please switch to 2.1.16? We fixed the inotify based socket removal
detection (issue2756).

Dec 1 2016, 10:33 AM · gnupg, Feature Request, dirmngr

Nov 30 2016

cpaelzer added a comment to T2858: way to not spawn (or despawn) gpg-agent and dirmngr.

On Wed, Nov 30, 2016 at 10:28 AM, Werner Koch via BTS <
gnupg@bugs.g10code.com> wrote:

Nov 30 2016, 1:07 PM · gnupg, Feature Request, dirmngr
werner added a comment to T2858: way to not spawn (or despawn) gpg-agent and dirmngr.

If you are on Linux you may simply remove the socket files and the daemons will
terminate.

Nov 30 2016, 10:28 AM · gnupg, Feature Request, dirmngr
cpaelzer added a comment to T2858: way to not spawn (or despawn) gpg-agent and dirmngr.

On Tue, Nov 29, 2016 at 7:14 PM, Werner Koch via BTS <gnupg@bugs.g10code.com>
wrote:

[...]
thanks for the clarifications, I was 95% there but that rounds it up to the full
picture.

   GNUPGHOME=$(pwd) gpg-agent --daemon -v MYSCRIPT

This starts the agents and runs MYSCRIPT (/bin/sh is nice for testing). After
MYSCRIPT terminates the agent will be terminated within the next minute.

We more or less do that already, and I can confirm it does "terminate the next
minute".
Unfortunately "the next minute" isn't soon enough for my umount.

So I thought for now I might have to rely on an extra call of "gpgconf --kill
dirmngr" to be sure. But I have found that this doesn't end it for me - maybe
related to our custom GNUPGHOME?
It doesn't seem to stop as intended via gpgconf: (neither with nor without
GNUPGHOME):

$ ps axlf | egrep 'gpg|dirmngr'
1 0 18021 1 20 0 176840 6236 - Ssl ? 0:00 dirmngr --
daemon --homedir /tmp/tmped9zl1ip
$ gpgconf --kill dirmngr
$ ps axlf | egrep 'gpg|dirmngr'
1 0 18021 1 20 0 176840 6236 - Ssl ? 0:00 dirmngr --
daemon --homedir /tmp/tmped9zl1ip
$ GNUPGHOME="/tmp/tmped9zl1ip" gpgconf --kill dirmngr
$ ps axlf | egrep 'gpg|dirmngr'
1 0 18021 1 20 0 176840 6236 -
(Also did the same as root without effect, but avoid filling this report only
with logs)

The more obvious but less graceful "sudo killall dirmngr |:" cleans it up.

The reason why your bind mount fails are likely the socket files created there.

via lsof I only found the following to be related (the /dev bind umount is what
fails).
dirmngr 6771 root 1r CHR LG,0x80000 1,9 0t0
11 /tmp/tmptmucmfm0/target/dev/urandom
dirmngr 6771 root 2w CHR W,LG 1,3 0t0
6 /tmp/tmptmucmfm0/target/dev/null
gpg-agent 6776 root 0r CHR LG 1,3 0t0
6 /tmp/tmptmucmfm0/target/dev/null
gpg-agent 6776 root 1w CHR W,LG 1,3 0t0
6 /tmp/tmptmucmfm0/target/dev/null
gpg-agent 6776 root 2w CHR W,LG 1,3 0t0
6 /tmp/tmptmucmfm0/target/dev/null

Not sure, but I'd not expect these are the sockets.
My assumption would be the open /dev/urandom - especially as I found that I only
need to get rid of dirmngr to proceed.

The solution to this are //run/user based sockets. If you create a directory
/run/user/UID gnupg will create a gnupg sub-directory and place the socket
files there.

gpg-conf --list-dirs

can be used to check that.

I created a log based on that check and lsof (the view from inside the chroot):
gpgconf --list-dirs
lsof +fg /dev
gpgconf --kill dirmngr
lsof +fg /dev
pkill gpg-agent
pkill dirmngr
lsof +fg /dev

I'll attach the full log with this post.
You can find there that the agent and dirmngr do not go away on the gpgconf --
kill.
The socket path OTOH looks ok with "agent-socket:/root/.gnupg/S.gpg-agent"

I added this as first command in chroot to give it a try at least:
$ mkdir -p /run/user/$(id -u)
It "worked" in the sense that the dirs changed e.g. from:
dirmngr-socket:/root/.gnupg/S.dirmngr
to
dirmngr-socket:/run/user/0/gnupg/S.dirmngr
But as I expected that did not change the behavior of blocking to umount the /dev

I really think it is not the sockets but e.g. the /dev/urandom it keeps open.

Is there any way to get the agent&dirmngr from "away next minute" to be "away
before exiting the calling command"?

BTW - I wondered if it would be enough if gpg-agent can stay and to only kill
dirmngr - but it seems I need both gone to let me umount.

Nov 30 2016, 9:38 AM · gnupg, Feature Request, dirmngr
cpaelzer added a comment to T2858: way to not spawn (or despawn) gpg-agent and dirmngr.

Nov 30 2016, 9:38 AM · gnupg, Feature Request, dirmngr

Nov 29 2016

werner added a comment to T2858: way to not spawn (or despawn) gpg-agent and dirmngr.

The agent is not directly involved in keyserver lookups. Instead the dirmngr is
spawned and does this for you. In fact, all network access goes through dirmngr.
However the agent is a mandatory part of gnupg-2 - all private keys are
processed solely by the agent. Thus removing the agent is not an option.
In your case the agent is launched to check whether a private key is available
for an imported public key.

You can stop the agent or the dirmngr using "gpgconf --kill dirmngr"
("gpg-agent"). For your use case a better solution will be to run your script
under the control of the agent (ie. explicily starting the agent):

  GNUPGHOME=$(pwd) gpg-agent --daemon -v MYSCRIPT

This starts the agents and runs MYSCRIPT (/bin/sh is nice for testing). After
MYSCRIPT terminates the agent will be terminated within the next minute.

The reason why your bind mount fails are likely the socket files created there.
I had the same problem with my g13 based disk encryption. The solution to this
are //run/user based sockets. If you create a directory /run/user/UID gnupg
will create a gnupg sub-directory and place the socket files there.

gpg-conf --list-dirs

can be used to check that.

Nov 29 2016, 7:14 PM · gnupg, Feature Request, dirmngr
werner added a project to T2858: way to not spawn (or despawn) gpg-agent and dirmngr: Feature Request.
Nov 29 2016, 7:01 PM · gnupg, Feature Request, dirmngr
werner lowered the priority of T2858: way to not spawn (or despawn) gpg-agent and dirmngr from Normal to Wishlist.
Nov 29 2016, 7:01 PM · gnupg, Feature Request, dirmngr
lorenz added a comment to T1854: Problems with same encryption and signing key on smartcard.

Anything I can do to help?

Nov 29 2016, 4:57 PM · gnupg, Feature Request, scd

Nov 28 2016

werner added a project to T2850: auto-key-locate is annoying: gnupg (gpg23).
Nov 28 2016, 10:26 AM · gnupg (gpg23), gnupg, Feature Request
werner added a comment to T2850: auto-key-locate is annoying.

The major trouble we have here is that dirmngr is not abale to detect network
failures. This is due to ADNS which keeps on trying to send UDP packets for 30
sesonds desipte a ENETUNREACH. I tried with a patched ADNS versions and did
not anymore suffer from these problems.

However, when a keyserver is not answering in time, there is indeed a problem.
A problem we may be able so solve with queuing the requests after a short
timeout. gpg already tells dirmngr that it is prepared for such a "soft
failure" but we need to implement this in dirmngr.

The whole thing is not new (except for ADNS) and has been with us since the
introduction of --auto-key-locate and --auto-key-retrive. WHich is a LONG time ago.

Nov 28 2016, 10:25 AM · gnupg (gpg23), gnupg, Feature Request
werner removed a project from T2825: WKS: Encrypt submission / confirmation also with the users key: Unreleased.
Nov 28 2016, 10:20 AM · gnupg, Feature Request

Nov 23 2016

neal updated subscribers of T2850: auto-key-locate is annoying.
Nov 23 2016, 3:25 PM · gnupg (gpg23), gnupg, Feature Request
neal added projects to T2850: auto-key-locate is annoying: Feature Request, gnupg.
Nov 23 2016, 3:25 PM · gnupg (gpg23), gnupg, Feature Request

Nov 20 2016

werner added a project to T2811: please compare the timestamps of secring.gpg and .gpg-v21-migrated and consider re-migration: Won't Fix.
Nov 20 2016, 5:23 PM · Won't Fix, Feature Request, gnupg
werner added a comment to T1805: gpg-agent: Wakes up periodically.

Note that gpg-agent has been changed years ago to make up at the full second so
that all daemons with a need to wakeup are running at the same time.

Nov 20 2016, 5:22 PM · Feature Request, gnupg
werner removed a project from T2754: provide mechanism to retrieve (and send?) session key in gpgme: Restricted Project.
Nov 20 2016, 5:20 PM · gpgme, Feature Request
werner closed T2754: provide mechanism to retrieve (and send?) session key in gpgme as Resolved.
Nov 20 2016, 5:20 PM · gpgme, Feature Request
werner added a comment to T2754: provide mechanism to retrieve (and send?) session key in gpgme.

Released with 1.8.0

Nov 20 2016, 5:20 PM · gpgme, Feature Request

Nov 15 2016

werner added a comment to T2754: provide mechanism to retrieve (and send?) session key in gpgme.

Thanks for your patch. Due to the planned gpgme releases I also added the
override feature and hacked tests/run-decrypt to test these two features.

Nov 15 2016, 10:31 AM · gpgme, Feature Request
werner added a project to T2754: provide mechanism to retrieve (and send?) session key in gpgme: Restricted Project.
Nov 15 2016, 10:31 AM · gpgme, Feature Request
werner removed a project from T2825: WKS: Encrypt submission / confirmation also with the users key: In Progress.
Nov 15 2016, 10:29 AM · gnupg, Feature Request
werner added a project to T2825: WKS: Encrypt submission / confirmation also with the users key: Unreleased.
Nov 15 2016, 10:29 AM · gnupg, Feature Request
werner closed T2825: WKS: Encrypt submission / confirmation also with the users key as Resolved.
Nov 15 2016, 10:29 AM · gnupg, Feature Request
dkg added a comment to T1805: gpg-agent: Wakes up periodically.

I submitted these patches on the gnupg-devel mailing list in November 2016:

https://lists.gnupg.org/pipermail/gnupg-devel/2016-November/032011.html

These are working for me to keep gpg-agent idle on platforms that support
inotify when the user doesn't use scdaemon, and we're now shipping with them
applied in debian unstable.

Nov 15 2016, 1:00 AM · Feature Request, gnupg
dkg added a comment to T1805: gpg-agent: Wakes up periodically.

D276: 907_0140-agent-Avoid-scheduled-checks-on-socket-when-inotify-.patch

Nov 15 2016, 12:59 AM · Feature Request, gnupg
dkg added a comment to T1805: gpg-agent: Wakes up periodically.

D277: 906_0139-agent-Avoid-tight-timer-tick-when-possible.patch

Nov 15 2016, 12:58 AM · Feature Request, gnupg
dkg added a comment to T1805: gpg-agent: Wakes up periodically.

D278: 905_0138-agent-Allow-threads-to-interrupt-main-select-loop-wi.patch

Nov 15 2016, 12:58 AM · Feature Request, gnupg
dkg added a comment to T1805: gpg-agent: Wakes up periodically.

D279: 904_0137-agent-Create-framework-of-scheduled-timers.patch

Nov 15 2016, 12:58 AM · Feature Request, gnupg

Nov 14 2016

thomas added a comment to T2820: GPGME: Allow to set the keyring for a context.

Regarding the original issue discussed here:
What about an option in gpg/gpgme to limit all operations to keys contained in a
"whitelist" file?

(accept --recipient keys only if they are contained in the file, --list-keys
shows only keys listed in this file, --refresh-keys only refreshes keys listed
here, etc.)

Nov 14 2016, 4:17 PM · Won't Fix, gpgme, Feature Request
thomas added a comment to T2820: GPGME: Allow to set the keyring for a context.

Reported the problem mentioned here in T2835
("keyid-format none" ignored for --verify and other commands)

Nov 14 2016, 4:14 PM · Won't Fix, gpgme, Feature Request
thomas added a comment to T2820: GPGME: Allow to set the keyring for a context.

(repost, I just noticed that neal is not in the nosy list. I'll unlink the old
entry afterwards)

neal: Interesting idea, this (or for a non-gui version: a signed list of
fingerprints available from a central source and retrieving those keys) would
solve 2 (iterating over all keys) and 3 (regularly update).

For the non-gui variant I wondered about how to use --verify and check that the
file was signed by the authority key (--verify only prints the keyid,
"--keyid-format none" does not allow --verify to print fingerprints in 2.1.15,
I'll file a separate issue). I was a bit disappointed when I saw that gpg sync
just calls the command line with --keyid-format 0xlong and does screen scraping
to verify the verification.

But still, how to solve 1 with gpg itself? Of course I could "manually" verify
in the application that only the intended keys have been used, but as shown with
gpg sync's code above: This is not always easily possible.

Nov 14 2016, 4:01 PM · Won't Fix, gpgme, Feature Request
neal added a comment to T2811: please compare the timestamps of secring.gpg and .gpg-v21-migrated and consider re-migration.

I fully support dkg on this. If our downstream is complaining that there is a
problem, then we need to take it seriously. I respect Werner's opinion, but
disagree specifically with the idea that this is only a problem for special
users. I think it will happen to many normal users too.

Nov 14 2016, 11:07 AM · Won't Fix, Feature Request, gnupg
neal added a comment to T2820: GPGME: Allow to set the keyring for a context.

@thomas: You may want to look at gpg sync, which I think makes at least some of
what you want to do easier.
https://firstlook.org/code/2016/10/12/introducing-gpg-sync-an-open-source-tool-for-organizations-that-encrypt-email/

Nov 14 2016, 10:53 AM · Won't Fix, gpgme, Feature Request
thomas added a comment to T2820: GPGME: Allow to set the keyring for a context.

Sign the keys and set the signing key to fully trusted.

does not solve 1.:

Encrypt a file to any of those key (but no others!),

(because people may trust other keys)

and it does not solve 2. without keeping a separate list of keys/fingerprints:

Iterate over all keys

additionally _all_ users have to regularly update _all_ these keys, otherwise
things like expired subkeys will lead to failing encryption. (This is no theory:
We've been there and don't want to have this again)

Nov 14 2016, 9:53 AM · Won't Fix, gpgme, Feature Request

Nov 11 2016

aheinecke added a comment to T2163: Make it possible to restore MIME crypto mails to original.

gpgol 2.0 won't change the messages on the server anymore there might be code
paths leading to that under error conditions but i'm not aware of any. And the
fallback is first to try to revert them.

Nov 11 2016, 6:07 PM · Unreleased, gpgol, Feature Request
aheinecke added a project to T2163: Make it possible to restore MIME crypto mails to original: Unreleased.
Nov 11 2016, 6:07 PM · Unreleased, gpgol, Feature Request
aheinecke closed T2163: Make it possible to restore MIME crypto mails to original as Resolved.
Nov 11 2016, 6:07 PM · Unreleased, gpgol, Feature Request
werner added a comment to T2820: GPGME: Allow to set the keyring for a context.

Sign the keys and set the signing key to fully trusted.

Nov 11 2016, 5:23 PM · Won't Fix, gpgme, Feature Request

Nov 10 2016

thomas added a comment to T2820: GPGME: Allow to set the keyring for a context.

Please tell me how I should model my workflows in this case:

  • There is a a centrally managed set of public keys (currently in a keyring

file, but I'm open to suggestions)

  • Different users should be able to use this set of keys (and no others) for

certain tasks:

  1. Encrypt a file to any of those key (but no others!), but also decrypt the

file with their secret key (which is not centrally managed)

  1. Iterate over all keys and do something with them (here: publish them in the

WKD after having made changes to the set of keys)

Nov 10 2016, 1:06 PM · Won't Fix, gpgme, Feature Request
werner added a comment to T2359: Query which key will be used for a given mailbox.

For backward compatibily reasons.

Nov 10 2016, 12:29 PM · gnupg (gpg22), gnupg, Feature Request
werner added a comment to T2820: GPGME: Allow to set the keyring for a context.

We try to deprecate the use of the --keyring option because that is too
troublesome for many reasons. We can't remove that option from gpg proper for
compatibilty reasons. But not adding a new feature to GPGME won't raise any
compatibility problem and thus we can fortunately reject this request.

Nov 10 2016, 12:28 PM · Won't Fix, gpgme, Feature Request

Nov 9 2016

thomas added a comment to T2820: GPGME: Allow to set the keyring for a context.

Ah, I understand. I currently have two keyrings (the default keyrings and
debian-keyring.gpg) in my user account. So I will export the keys from
debian-keyring.gpg and import them into my regular keyring.

But this is a different topic from the one described here:
This issue is about allowing gpgme to use exactly one different keyring (not an
additional keyring) that is different from the default keyring or other keyrings
configured in the user's gpg.conf.

So it is just about allowing in gpgme what is already possible via the command
line. Or maybe you would prefer to allow passing command line options to gpg via
gpgme to avoid the wrapper script mentioned below?

Nov 9 2016, 9:14 AM · Won't Fix, gpgme, Feature Request
werner added a comment to T2820: GPGME: Allow to set the keyring for a context.

I have explained this several times over the last decade. The primary reason is
that it is not possible to keep a consistent vewi on the localally availabale
keys when a user is allowed to remove and add storage at will without gpg having
any control over it. You may end up with duplicated keys and gpg will only
update one of them. The next time the keyrings are "mounted" in a different
order and key is used for update. This leads to all kinds of problems. This is
not a distributed database with a 3 -phase commit system.

I have proposed a solution gor 2.3 based a on central key managing daemon, which
then has the chance to track changes. Interesting fact is that aheinecke has
strongly opposed that idea.

Nov 9 2016, 8:51 AM · Won't Fix, gpgme, Feature Request

Nov 8 2016

thomas assigned T2820: GPGME: Allow to set the keyring for a context to werner.
Nov 8 2016, 5:29 PM · Won't Fix, gpgme, Feature Request
thomas added a comment to T2820: GPGME: Allow to set the keyring for a context.

Besides the WKD scenario Andre describes, there are already many existing uses
of a separate keyring where having other keyrings configured via
~/.gnupg/gpg.conf already conflicts with the intended use, except when using
--no-options:

  1. /etc/apt/trusted.gpg
  2. /usr/share/keyrings/debian-keyring.gpg
  3. our company's keyring with acceptable keys for encryption of certain

sensitive information

Basically everywhere where multiple users use a single keyring, often with
"--trust-model always", where you do not want additionally configured keyrings
to disturb the result and give a false sense of security.

Please explain why this a Bad Thing[tm] and what the correct workflow would be.

Nov 8 2016, 5:29 PM · Won't Fix, gpgme, Feature Request
werner added a project to T2820: GPGME: Allow to set the keyring for a context: Won't Fix.
Nov 8 2016, 5:20 PM · Won't Fix, gpgme, Feature Request
werner added a comment to T2820: GPGME: Allow to set the keyring for a context.

The keyring is a property of GnuPG and you should not mess around with it. Use
--export and --import to add keys. Extending the bad behaviour of using
multiple keyrings would be Bad Thing.

Nov 8 2016, 5:20 PM · Won't Fix, gpgme, Feature Request

Nov 4 2016

dkg added a comment to T2811: please compare the timestamps of secring.gpg and .gpg-v21-migrated and consider re-migration.

How many people has this happened to? how many people haven't known to find you
on freenode and ask about it? how many people have just given up on gpg
instead, or just decided "2.1 is broken"?

Shouldn't we fix this for them?

Nov 4 2016, 8:33 PM · Won't Fix, Feature Request, gnupg
neal added a comment to T2811: please compare the timestamps of secring.gpg and .gpg-v21-migrated and consider re-migration.

FWIW, I idle on gnupg on freenode and I've helped a bunch of people over the
past two years with exactly this problem. It is not that they want to use gpg
and gpg2, but that at some point they (or some tool) ran gpg2 while they
continued to use gpg1. They then became very surprised when they used gpg2 and
it only had a subset of their keys. My advice for these users is always the
same: remove the migration file and just rerun gpg2. As far as I can tell, this
has fixed the problem in all cases.

Nov 4 2016, 4:53 PM · Won't Fix, Feature Request, gnupg
werner added a project to T2825: WKS: Encrypt submission / confirmation also with the users key: In Progress.
Nov 4 2016, 4:50 PM · gnupg, Feature Request
werner added a comment to T2825: WKS: Encrypt submission / confirmation also with the users key.

I am working on that...

Nov 4 2016, 4:50 PM · gnupg, Feature Request

Nov 3 2016

justus added a comment to T2359: Query which key will be used for a given mailbox.

Fixed in ab89164be02012f1bf159c971853b8610e966301.

I also don't quite understand why we restrict this to user ids resembling mail
addresses, so I'll keep issue this open for discussion.

Nov 3 2016, 3:12 PM · gnupg (gpg22), gnupg, Feature Request

Nov 1 2016

aheinecke updated subscribers of T2825: WKS: Encrypt submission / confirmation also with the users key.
Nov 1 2016, 2:51 PM · gnupg, Feature Request
aheinecke added projects to T2825: WKS: Encrypt submission / confirmation also with the users key: Feature Request, gnupg.
Nov 1 2016, 2:51 PM · gnupg, Feature Request

Oct 31 2016

dkg added a comment to T2359: Query which key will be used for a given mailbox.

I like this work, thanks for it! I wonder whether it would also be useful for
full-match userID, not only for a raw e-mail address?

For example, if i query for '=Peter Palfrader' or '=ssh://host.example', it
ought to give me the key with the highest-validity binding for the requested
user ID.

Oct 31 2016, 4:02 PM · gnupg (gpg22), gnupg, Feature Request
sdl_nexiom.net added a comment to T2366: No DEP/ASLR or other security mitigations for GpgEX/GpgOL.

That's awesome aheinecke! Honestly wasn't sure if this issue would ever get much
attention. Thanks for the effort in making Gpg4win a more secure product!

Oct 31 2016, 2:18 AM · Feature Request, Windows 64, gpgol, gpg4win, Windows, Windows 32

Oct 28 2016

aheinecke claimed T2366: No DEP/ASLR or other security mitigations for GpgEX/GpgOL.
Oct 28 2016, 10:57 AM · Feature Request, Windows 64, gpgol, gpg4win, Windows, Windows 32
aheinecke added a comment to T2366: No DEP/ASLR or other security mitigations for GpgEX/GpgOL.

GpgOL is built with DEP and and ASLR now. Need to enable this for GpgEX and some
other parts of Gpg4win, too. So not yet fully resolved but I keep it in mind.

Oct 28 2016, 10:57 AM · Feature Request, Windows 64, gpgol, gpg4win, Windows, Windows 32

Oct 27 2016

ElBarto raised the priority of T2821: gpg note/info messages (terminal/bash) from Wishlist to Low.
Oct 27 2016, 12:07 PM · Trash
ElBarto added projects to T2821: gpg note/info messages (terminal/bash): Feature Request, gnupg.
Oct 27 2016, 11:18 AM · Trash
ElBarto set Version to 2.1.15 on T2821: gpg note/info messages (terminal/bash).
Oct 27 2016, 11:18 AM · Trash

Oct 26 2016

aheinecke added projects to T2820: GPGME: Allow to set the keyring for a context: Feature Request, gpgme.
Oct 26 2016, 6:02 PM · Won't Fix, gpgme, Feature Request
aheinecke added projects to T2819: GPGME: Keylist from file: Feature Request, gpgme.
Oct 26 2016, 5:56 PM · gpgme, Feature Request

Oct 25 2016

ftiede added a comment to T2809: Agent required for symmetric operation causes encrypted partitions to fail to mount.

Figuring out required iteration counts is not necessary as the only operation
performed while GNUPGHOME is still unwritable is decryption.

--passphrase-fd 0 with --pinentry-mode loopback does indeed work without the
agent but requires a potentially unsafe password entry to be programmed around
the call which is also probably not the best option. --pinentry-mode ask
requires the agent again.

Oct 25 2016, 7:52 PM · gnupg, Feature Request
werner added a comment to T2809: Agent required for symmetric operation causes encrypted partitions to fail to mount.

Try this:

echo hello | \
gpg -ac --pinentry-mode loopback --passphrase abc --s2k-count 17659904

By giving the S1K count (iterations) there is no need to ask gpg-agent. I have
used --passphrase for easier testing; --passphrase-fd should work as well.

To get the suggested iteration count for your box, use
gpg-connect-agent 'getinfo s2k_count' /bye

Oct 25 2016, 6:41 PM · gnupg, Feature Request
werner added a comment to T2809: Agent required for symmetric operation causes encrypted partitions to fail to mount.

You simply can't run gpg on a read-only home directory. That is not just a
matter of socket files but of lock files and tracking a lot of other things.

For symmetric-only encryption the agent is used to calibrate the KDF
interations, it might be possible to a chnage gpg to take the iteration count
from the command line.

Oct 25 2016, 6:28 PM · gnupg, Feature Request
ftiede added a comment to T2809: Agent required for symmetric operation causes encrypted partitions to fail to mount.

gpgconf --create-socketdir made no difference, the agent still has to be started
manually, and honestly, even the gpgconf step is one step more than I think
absolutely necessary to make it work.

Oct 25 2016, 5:37 PM · gnupg, Feature Request
justus added a comment to T2809: Agent required for symmetric operation causes encrypted partitions to fail to mount.

Try running "gpgconf --create-socketdir" after step 3.

If gpg does not create this directory when it is trying to start an agent, but
gpg-agent does, then I guess that is a bug. But to be honest, this is easily
one of my least favorite features of GnuPG, and I have no opinion whatsoever
regarding its design.

Oct 25 2016, 3:33 PM · gnupg, Feature Request
ftiede added a comment to T2809: Agent required for symmetric operation causes encrypted partitions to fail to mount.

To be absolutely precise:

  1. Log in as a test user with an existing ~/.gnupg and some (empty) keyrings
  2. Lock write access to ~/.gnupg with 'chmod 0500 ~/.gnupg'
  3. Create /run/user/<id> as root, chown and chmod it to be owned by that user

with write permission.

  1. Run 'gpg -q -d <symmetrically encrypted file>' as that user (which is

precisely what needs to work at this point. - It does _not_ work

  1. Run 'gpg-agent --daemon' as that user.
  2. Retry step 4. - Now it _does_ work.

So: gpg-agent can figure out to put its socket into /run/user/$(id -u) and
subsequent calls to gpg will find the agent socket there. But calling gpg
without starting the agent manually does not perform this magic.

Oct 25 2016, 3:06 PM · gnupg, Feature Request
justus added a comment to T2809: Agent required for symmetric operation causes encrypted partitions to fail to mount.

I've tried

What did you try?

  • unfortunately the gpg-binary doesn't try that on its own

What is it that which of the gpg binaries does not try?

Oct 25 2016, 3:02 PM · gnupg, Feature Request
ftiede added a comment to T2809: Agent required for symmetric operation causes encrypted partitions to fail to mount.

I've tried - unfortunately the gpg-binary doesn't try that on its own, so i
still have to extend the pre-fs-mount-magic happening during boot, but at least
it spares me thinking about how to tell the agent where to create its socket.
Modifying configs wouldn't be a good idea here, IMHO, as usually user-created
configs are there for a reason.

Oct 25 2016, 2:57 PM · gnupg, Feature Request
aheinecke added a comment to T2360: Add support for TOFU in GpgME.

This is resolved. we have WITH_TOFU_INFO now.

Oct 25 2016, 2:48 PM · gnupg (gpg22), gpgme, Feature Request
aheinecke removed a project from T2360: Add support for TOFU in GpgME: In Progress.
Oct 25 2016, 2:48 PM · gnupg (gpg22), gpgme, Feature Request
aheinecke closed T2360: Add support for TOFU in GpgME as Resolved.
Oct 25 2016, 2:48 PM · gnupg (gpg22), gpgme, Feature Request
justus added a comment to T2809: Agent required for symmetric operation causes encrypted partitions to fail to mount.

That doesn't work then of course, unless the configuration is copied over to the
new GNUPGHOME.

Another option would be to create directories or links to directories
/run/user/0 or /var/run/user/0. If those exist, gnupg will create the sockets
there.

Oct 25 2016, 12:53 PM · gnupg, Feature Request
ftiede added a comment to T2809: Agent required for symmetric operation causes encrypted partitions to fail to mount.

What about cases where a local (/root/.gnupg) config is required to decrypt the
files?
I honestly don't know about SmartCards and stuff, but doesn't setting GNUPGHOME
also hide other GnuPG configuration?

Oct 25 2016, 11:25 AM · gnupg, Feature Request
justus claimed T2809: Agent required for symmetric operation causes encrypted partitions to fail to mount.
Oct 25 2016, 11:23 AM · gnupg, Feature Request