940_root.asc7 KBDownload
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Jan 9 2017
Jan 9 2017
hanno added projects to T2917: --locate-key should re-fetch key via WKD if it is expired: gnupg, Bug Report.
• werner added a project to T2745: gpg 2.1.15, *no* keyservers found for submit/recv, "DNS query returned an error or no records: No such domain (nxdomain)": Restricted Project.
• werner added a comment to T2745: gpg 2.1.15, *no* keyservers found for submit/recv, "DNS query returned an error or no records: No such domain (nxdomain)".
Please try current master where I hopefully fixed T2451. This may also fix
this issue.
• werner added a comment to T2745: gpg 2.1.15, *no* keyservers found for submit/recv, "DNS query returned an error or no records: No such domain (nxdomain)".
This seems to be closely related to T2451.
The ML discussion started during my fall vacation and thus scrolled out of my
sight :-(. While doing some unrelated SRV experiments yesterday, I figured the
problem myself and K_F pointed me to the discussion.
The actual cause for the bugs might be that I missed to forward-port David's
patch from 2009 for changing the service name to the 2.1 branch. I will further
investigate. The move to libdns introduced other bugs and covered the actual bug.
Jan 6 2017
Jan 6 2017
We should use the wrapper as long as we don't have full control over libldap
(select, timeout, etc.)
• werner renamed T2908: dirmngr can't be build w/o LDAP from dirmngr, ldap, dirmngr_ldap, and the ldap "wrapper" to dirmngr can't be build w/o LDAP.
• werner added a project to T2910: gpgme 1.8 build failure: strdup undeclared on MacOSX Sierra: MacOS.
We don't see that on our Sierra box.
Workaround is to use --passphrase
The tests framework has anyway been reworked and thus I doubt that this is still
a bug.
• aheinecke added projects to T2914: TOFU Conflict Status fd output broken: TOFU, gnupg, Bug Report.
• werner removed a project from T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo: Unreleased.
• werner raised the priority of T2387: GNUPGHOME with newlines breaks standard parsing of gpgconf --list-dirs from Low to Normal.
• werner raised the priority of T2423: configure: error: Sorry, the current implemenation requires mmap. due to empty CFLAGS (missing -fPIC) from Low to Normal.
• werner added a comment to T2736: gnupg 1.4 fixed-list-mode fails to take effect when listing keys.
A major problem with gpg FILE-WITH-KEYS is that its behaviour was never well
defined and it is more a side effect than a a reguarl feature.
It should be fixed, however.
• werner added a project to T2736: gnupg 1.4 fixed-list-mode fails to take effect when listing keys: gnupg (gpg14).
• werner raised the priority of T2741: --quick-gen-key prints duplicate fingerprint from Low to Normal.
• werner added a comment to T2236: Importing a key with badly ordered packets doesn't reorder it, and while --edit-key does reorder it doesn't move the signature packets to the right place.
From the ML:
Hi there,
Some keys are found on the keyserver network with non-self signatures
incorrectly attached to a subkey instead of a UID (cf. Issue2236).
Since 2.1.13 it's possible to reorder fix these keys by running the
‘check’ command of the gpg shell. However the procedure currently has
to be repeated after refreshing the keyring, since each --refresh-keys
command downloads the badly ordered key again.
In T2236 (wk on May 06 2016, 08:18 PM / Roundup) Werner wrote that “We will eventually call that reorder
function during import. But let's wait for bug reports with the
--edit-key triggered code.” This code has been working fine for me
since 2.1.13, so I was wondering if it could be activated for --import
(and --recv-key) in 2.1.18? (So we get this in the next Debian stable
:-)
Moreover, as Neal pointed out to me privately, there is no overhead for
keys that don't have incorrectly placed signature packets.
Thanks!
Cheers,
Guilhem.
neal set External Link to https://lists.gnupg.org/pipermail/gnupg-devel/2016-December/032272.html on T2913: python: default op_keylist_start parameters..
neal set External Link to https://lists.gnupg.org/pipermail/gnupg-devel/2016-November/032235.html on T2911: Key creation problem with 2.1.16 (passphrase param).
neal added projects to T2911: Key creation problem with 2.1.16 (passphrase param): gnupg, Bug Report.
neal added projects to T2910: gpgme 1.8 build failure: strdup undeclared on MacOSX Sierra: Bug Report, gpgme.
neal set Version to 2.1.15 on T2909: GnuPG 2.1.15 - delete-secret-keys seems not to accept loopback pinentry.
neal set External Link to https://lists.gnupg.org/pipermail/gnupg-devel/2016-November/032168.html on T2909: GnuPG 2.1.15 - delete-secret-keys seems not to accept loopback pinentry.
ikarisan added a comment to T2903: "gpg --card-status" does not add any entries to the private key ring.
Hi!
I am using a GPG smartcard and a YubiKeyNEO. And with GnuPG 2.0.xx it was
possible to
add the private keys' reference (on the card) to the keyring by calling:
gpg --card-edit
fetch
gpg --card-status
But now with GnuPG 2.1.17 this seems no longer be possible.
After fetching the public key for the card and calling "gpg --card-status"
the keys
are listed as public keys only but not as private keys. So I cannot set
their trust
level to ultimate or use them to encrypt my mails. :(
gpg --card-status
Reader ...........: SCM Microsystems Inc. SCR33x USB Smart Card Reader 0
Application ID ...: D2760001240102000000000000020000
Version ..........: 2.0
Manufacturer .....: test card
Serial number ....: 00000002
Name of cardholder: Thorsten Reichelt
Language prefs ...: de
Sex ..............: männlich
URL of public key : http://pgp.kleiner-androide.de/0xCCF6EF60.asc
Login data .......: shinji
Signature PIN ....: nicht zwingend
Key attributes ...: rsa2048 rsa2048 rsa2048
Max. PIN lengths .: 127 127 127
PIN retry
counter : 3 3 3
Signature counter : 26
Signature key ....: 2545 D3E3 0C41 32EE 3A25 B663 5892 4EF3 CCF6 EF60
created ....: 2016-10-15 21:20:40
Encryption key....: BAE5 99FF 4F3D AB19 60C0 B0B8 0984 52C3 1AFA A499
created ....: 2016-10-15 21:20:40
Authentication key: 9293 BD4E 9BD9 CCC9 6221 8AB0 0E98 95D4 E7AD 8B07
created ....: 2016-10-15 21:23:09
General key info..: pub rsa2048/58924EF3CCF6EF60 2016-10-15 Thorsten
Reichelt
<XXXXXX@thorsten-reichelt.de>
sec# rsa2048/58924EF3CCF6EF60 erzeugt: 2016-10-15 verfällt: niemals
ssb# rsa2048/098452C31AFAA499 erzeugt: 2016-10-15 verfällt: niemals
ssb# rsa2048/0E9895D4E7AD8B07 erzeugt: 2016-10-15 verfällt: niemals
gpg -K
gpg -k
C:/Users/shinji/AppData/Roaming/gnupg/pubring.kbx
pub rsa2048 2016-10-15 [SC]
2545D3E30C4132EE3A25B66358924EF3CCF6EF60
uid [ unbekannt ] Thorsten Reichelt <XXXXXXX@thorsten-reichelt.de>
sub rsa2048 2016-10-15 [E]
sub rsa2048 2016-10-15 [A]
ikarisan set Version to 2.1.17 on T2903: "gpg --card-status" does not add any entries to the private key ring.
Jan 5 2017
Jan 5 2017
dkg added a comment to T2902: dimrngr over tor fails obscurely on IPv6 records when NoIPv6Traffic flag is set.
I was wrong about Tor and IPv6 -- Tor has had IPv6 support for years, so
something else is wrong...
dkg set External Link to https://bugs.debian.org/849845 on T2902: dimrngr over tor fails obscurely on IPv6 records when NoIPv6Traffic flag is set.
dkg set Version to 2.1.17 on T2902: dimrngr over tor fails obscurely on IPv6 records when NoIPv6Traffic flag is set.
Attached: repeated using 2.0.3 and keys imported from armored backup.
More details:
The issue arose recently, after the subkey had been used for many months
(but IIRC before the subkey expired). The issue affects both the headless
keychain and the master keychain. The restored "backup" was an armored
export, not a whole keychain.
If werner hasn't heard of something like this, I'm doubling my bet on user
error. Maybe my key storage process is the culprit? These keys were
accessible on different TC encrypted partitions, but there is an unencrypted
backup drive elsewhere. I'll try restoring from that.
938_gpg_K-vs-edit(2).txt1 KBDownload
2.0.12 is a 7 year old version you should not use it at all.
The secring and the pubring in versions < 2.1 can go out of sync for various
reasons. I can't tell from the lising why this is the case, if you can repeat
that with the 2.0.30 version, we can be sure that it is not one of the hugs
fixes in the last 7 years.
Jan 4 2017
Jan 4 2017
hoelzlw added projects to T2901: --with-fingerprint does not show fingerprints anymore: gnupg, Bug Report.
Jan 3 2017
Jan 3 2017
Issue: I get a different list of secret keys when using gpg -K than gpg -
edit, and the missing keys can no longer be used to decrypt. I'm using
Gpg4win on Win10 with the latest stable build, but downgrading to previous
versions doesn't help. Adding new keys and removing newer keys doesn't help.
(There was once a [Debian?] bug which only listed the latest key, but this
appears to be different.)
User error is a possibility.
The attached file (gpg_K-vs-edit.txt) shows the results from gpg -K and gpg
--edit with the keys substituted for easier reading. You'll notice that
44444444 and 55555555 are missing from gpg -K.
A title or an URL does not make up a a proper bug report. Please describe your
bug here. tia.
opendna set External Link to http://superuser.com/questions/1162348/why-is-gpg-k-not-showing-all-keys-listed-by-gpg-edit on T2900: GPG -K not showing all keys listed by GPG --edit.
opendna added projects to T2900: GPG -K not showing all keys listed by GPG --edit: gpg4win, Bug Report.
937_gpg_K-vs-edit.txt1 KBDownload
Jan 2 2017
Jan 2 2017
• werner added a project to T2889: gnupg/dirmngr 2.1.17 fails on all keyserver operations: In Progress.
1.25 or 1.26 does not matter. In 1.25 we improved the nPth support and made the
mutex used by Libgcrypt's RNG actual work as expected.
However, this seems to reveal another problem and thus I upgraded this to a real
bug.
Sorry, this is not a help line. Please ask on the gnupg-users mailing list for help
• werner added a project to T2891: gpg --card-status works while gpg2 --card-status does not work: Not A Bug.
• werner added a comment to T2894: setpref does not update preferences secret key, needed for export-secret-keys.
Note that ff you have the secret key you can set the preferences.
Can't be fixed in 1.4 or 2.0. Has been fixed in 2.1.
• werner lowered the priority of T2893: gnupg should used ccid card key material fingerprints and not serial number from Normal to Wishlist.
• werner lowered the priority of T2898: Option to ignore card serial number (to be able to use backup tokens containing same subkeys) from High to Normal.
rdlrn renamed T2899: Typo in Compendium English version Chapter 7 - "siehe next page" instead of "see next page" from Type in Compendium English version Chapter 7 - "siehe next page" instead of "see next page" to Typo in Compendium English version Chapter 7 - "siehe next page" instead of "see next page".
Jan 1 2017
Jan 1 2017
vsrinu26f added a comment to T2893: gnupg should used ccid card key material fingerprints and not serial number.
Steps to reproduce:
- raspberry pi: create one master keypair(Certify) and three subkeys (Sign,
Encrypt, Authenticate). (I will still refer to these three subkeys as just subkeys)
- raspberry pi: backup ~/.gnupg
- insert hardware token yubikey1 and keytocard subkeys and eject the yubikey1
- raspberry pi: delete ~/.gnupg and restore ~/.gnupg from backup
- insert hardware token yubikey2 and keytocard subkeys and eject the yubikey2
- repeat steps 4, 5 for remaining gnuk, nitrokey or yubikeys.
- Now keep yubikey1 with you, give yubikey2 to your spouse, yubikey3 to your child.
- encrypt backup with gnupg using symmetric cipher.
- export public key.
- wipe ~/.gnupg
- Insert new formatted usb drive and copy public key.
- shared family laptop: import the public key from usb. insert yubikey1 and
fetch the subkeys to let gnupg know that the private keys are on hardware token.
- shared family laptop: encrypt and decrypt a file successfully with yubkey1.
- shared family laptop: insert spouses yubikey2 try decrypt the file encrypted
before. gnupg will not just ask but insist to insert card with a yubikey1 serial
number while you have yubikey2 which in this case also has the same subkeys that
can be used to decrypt the file.
Bug: gnupg does not let shared key usage while using hardware tokens on a shared
laptop.
expected: gnupg should be able to decrypt using any of the yubikeys having
required subkeys.
vsrinu26f added a comment to T2893: gnupg should used ccid card key material fingerprints and not serial number.
Please consider: not all hardware tokens have serial numbers printed on them,
consider gnuk or nitro key. It is smart to put a stiker or use permanent marker
to mark keyid on the token incase of having multiple tokens. Another plus about
gnuk is that choose/change my serial number at will.
So, Please ask for a card with a keyid than serial number.
vsrinu26f added a comment to T2893: gnupg should used ccid card key material fingerprints and not serial number.
Thank you for thinking on this.
Can user be asked "Please insert hardware token containing 0xXXXXXXXX key". I
guess users are smart enough (considering they are using gnupg) and would write
the keyid on their tokens if needed. If they only own one token which is most of
the time they just insert that. If they own multiple they will recognize by
color or a persoanlized sticker on the key or a permanent marker markings on
their card.
Sorry, I used the word ccid just to mean a hardware token.
I believe many want to have backup hardware tokens. Again this allows a family
share a laptop and still own the shared key in their own hardware tokens.
Here is the version information:
gpg (GnuPG) 2.1.11
libgcrypt 1.6.5
Copyright (C) 2016 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Home: ~/.gnupg
Supported algorithms:
Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
CAMELLIA128, CAMELLIA192, CAMELLIA256
Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2
Dec 29 2016
Dec 29 2016
I'm using libgpg-error 1.26, though I'm sure it also happened with 1.25 (I get
libgpg-error from Debian unstable, which went to 1.25 on Nov 16th, and then 1.26
on Dec 24th, and I saw the symptoms at both of those times). I'm happy to
experiment with another version if you have suggestions.
• werner updated subscribers of T1828: card-edit/fetch assumes signing key is master key and fails if not.
• werner added a comment to T1828: card-edit/fetch assumes signing key is master key and fails if not.
Duplicate of T1828