Page MenuHome GnuPG
Feed Advanced Search

Jan 31 2017

dkg added projects to T2935: use-tor should have a third possible value, "if available": dirmngr, Feature Request, gnupg.
Jan 31 2017, 9:49 PM · gnupg (gpg22), In Progress, Feature Request, dirmngr
werner added a project to T2926: Design gap in openpgp card process: Stalled.
Jan 31 2017, 1:32 PM · Stalled, Feature Request
werner added a comment to T2926: Design gap in openpgp card process.

Please take such discussions to the mailing lists. As soon as a resolution has
been found please update the status of this bug.

Jan 31 2017, 1:32 PM · Stalled, Feature Request

Jan 24 2017

dkg added projects to T2931: Provide automated way to set "primary" flag on a specific User ID in a cert: Feature Request, gpgme.
Jan 24 2017, 4:48 PM · gpgme, Feature Request
Hadmut added a comment to T2926: Design gap in openpgp card process.

This is because your idea of security is wrong in two different aspects.

First: you assume that you just need to call or declare a system as
„trustworthy”, and then it would stop to ever have any bug, failure, or any sort
of malfunction. "Secure" and "Trustworthy" are not absolute properties of a
device, they are always relative to a given threat or attack vector, and these
security terms do not cover normal bugs oder mistakes made by operators. Having
a „trustworthy” system does not mean that it would not write a secret key on a
storage device if you accidently ask it to do so (e.g. because you still have a
CWD in the device when running any key related software. So you need to avoid
that bad operation or malware could leak the secret keys out of the device, and
it won't help in any way to call the device „trustworthy”.

Second: You erroneously apply the term „trustworthy” to a storage device. Trust
belongs to the area of system security, while mobile storage devices (as stupid
read-write-devices) belong to communication security. In communication security
there is no trust. A regular (perfect) storage device is something where you can
write data, and read it later, no matter whether you trust it or not. You cannot
write a message on a storage device and hope that an attacker would not read it,
unless it is part of a system (which it is not if it is, as you intend, a mobile
device which is to be connected to another, insecure machine.)

Things get worse, since thumb drives are not perfect storage devices, but little
systems just pretending to be one. Putting a trusted and an untrusted system
together (i.e. putting a thumb drive into a computer) breaks the system security
of the first system.

Third: the current design is illogical and inconsistent. you use and create a
device (crypto usb device like yubikey) which is intended to protect the key
while making the key usable to the authorized user for doing cryptographical
operations, e.g. create signatures.

Good. That's what the device and it's API are designed for, and since there's
currently no better option available that's currently the best way to do it.

But then, if there is a well defined way, considered as secure, to use the key
for signatures (which might include some internal logging to track signatures),
why should there be a second, different way to create signatures, outside the
device, just to sign it's own public key record and ID (self certify)?

Why isn't it used the normal way for this special signature as well?

e.g. x509/SMIME/openssl do it correctly. They first create a pub/sec key pair
and then use a regular signature operation to generate a CSR oder self-cert.

If there is a well defined and secured way to create signatures, it's bad design
to use another operation just to selfcert without good reason.

And inventing the need to communicate with the outer world in an unprecise
protocol (which it is if you exchange large storage devices) which could
transmit just anything, stops the device from beeing trustworthy anymore.

It is wrong to think that you can exchange storage devices, because the system
was trustworthy. It's the other way round: It's not trustworthy anymore once you
allowed to communicate after key creation.

Jan 24 2017, 2:14 PM · Stalled, Feature Request
justus added a comment to T2926: Design gap in openpgp card process.

To me, your assumptions seem flawed. You somehow assume that you can get a
trustworthy computer A, but cannot get your hands on a trustworthy device to
transport data from A to B?

(Even if your assumptions hold, you can always take A apart and use its data
storage device (which is trustworthy) and use it to carry the public key.)

Jan 24 2017, 11:27 AM · Stalled, Feature Request

Jan 23 2017

werner removed a project from T2139: pinentry option to see the password in cleartext: Restricted Project.
Jan 23 2017, 11:25 PM · pinentry, Feature Request, gpg4win
werner closed T2139: pinentry option to see the password in cleartext as Resolved.
Jan 23 2017, 11:25 PM · pinentry, Feature Request, gpg4win
werner removed a project from T2429: Allow Assuan flags to be set: Restricted Project.
Jan 23 2017, 11:24 PM · gpgme, Feature Request
werner closed T2429: Allow Assuan flags to be set as Resolved.
Jan 23 2017, 11:24 PM · gpgme, Feature Request
werner removed a project from T2379: default to --with-fingerprint, introduce --without-fingerprint: Restricted Project.
Jan 23 2017, 11:22 PM · gnupg, Feature Request
werner closed T2379: default to --with-fingerprint, introduce --without-fingerprint as Resolved.
Jan 23 2017, 11:22 PM · gnupg, Feature Request
werner removed a project from T2081: g10/keydb.c:maybe_create_keyring_or_box doesn't check for EACCESS: Restricted Project.
Jan 23 2017, 11:15 PM · gnupg, Feature Request
werner closed T2081: g10/keydb.c:maybe_create_keyring_or_box doesn't check for EACCESS as Resolved.
Jan 23 2017, 11:15 PM · gnupg, Feature Request
werner added a comment to T2081: g10/keydb.c:maybe_create_keyring_or_box doesn't check for EACCESS.

Fix is in 2.1.18

Jan 23 2017, 11:15 PM · gnupg, Feature Request
werner removed a project from T2267: Fix "Invalid Parameter passed to C runtime function" warnings on Windows: Restricted Project.
Jan 23 2017, 11:14 PM · Windows 32, Windows, gnupg, gpgagent, Feature Request
werner closed T2267: Fix "Invalid Parameter passed to C runtime function" warnings on Windows as Resolved.
Jan 23 2017, 11:14 PM · Windows 32, Windows, gnupg, gpgagent, Feature Request
werner removed a project from T1814: Add option to output the signed text with --verify: Unreleased.
Jan 23 2017, 11:10 PM · gnupg, Feature Request
werner removed a project from T758: Provide an option to choose the name of saved files: Unreleased.
Jan 23 2017, 11:10 PM · gpa, Feature Request
werner added a comment to T2926: Design gap in openpgp card process.

How you convey data between an air-gapped box and a the general desktop is out
of scope for GnuPG. This is OPSEC and you have to setup your rules. Aside from
USB sticks, it is possible to burn stuff to a CDROM, use a floppy, SD card, a
printer and a scanner, a camera and OCR, you name it in your security policy.

Please direct your question to a mailing list. I can't see why this is a
feature requests.

Jan 23 2017, 9:55 AM · Stalled, Feature Request

Jan 19 2017

Hadmut added a comment to T2926: Design gap in openpgp card process.

You can connect your token to the computer, but for some reason

cannot connect a thumb drive to it?

Exactly.

That's the point.

A token is a security device from a (hopefully) known manufacturer with a
(hopefully) well known API, where you can survey what data it carries out. You
need to use it (if you don't want to reveal your key as a file to unsecure
machines), and it is no surprise that it will carry the secret key. That's the
idea.

A thumb drive, on the other hand, is evil. You have a file system and lots of
hidden space on it, and you can't check what malware will hide on it or what
will be left on it simply by making mistakes or bad use of software (e.g. having
the CWD on the thumb drive while doing some crypto operations).

Furthermore, thumb drives are reprogrammable, sometimes quite easy. You can
teach regular thumb drives to behave like CDROMs, keyboards, just as any USB
device, and thumb drives are well known as an attack vector to bring in malware.

However, the major problem is not to connect the thumb drive to the secure
computer. It's not in general a bad idea to use a thumb drive as a backup
storage system for the secure computer.

It's a bad idea to connect it to any other machine after it. Once the thumb
drive has been connected to the secure machine, it should be considered as
contaminated with secrets and never be used outside the secure environment. So
your question somewhat missed the point.

However, the secure enviroment (secure computer and maybe thumb drives) should
be completely isolated (some people call it "air gapped") and the only
connection to the outer world should be what's absolutely needed and well
defined. And that's the token (which, after all, is exactly designed for that
purpose).

Jan 19 2017, 12:14 PM · Stalled, Feature Request
justus added a comment to T2926: Design gap in openpgp card process.

If A is to be kept *really* secure, it must not have any network contact

Agreed.

and not
export any files from the point of time where the keys is generated.

I don't follow. You can connect your token to the computer, but for some reason
cannot connect a thumb drive to it? I don't see why exporting data from that
computer is problematic. If you are worried about compromised USB devices, you
should also be worried about the computer being manipulated in the first place,
or the openpgp token. Furthermore, you could use the computers screen to export
any information.

Jan 19 2017, 11:37 AM · Stalled, Feature Request

Jan 18 2017

Hadmut added a project to T2926: Design gap in openpgp card process: Feature Request.
Jan 18 2017, 2:08 PM · Stalled, Feature Request

Jan 16 2017

justus added a comment to T2905: EFL-based pinentry.

FTR: EFL == enlightenment foundation libraries. Calling this
"Enlightenment-based" is like calling the GTK pinentry "Metacity-based".

It does work, but contrary to my expectations it is rather unpolished. I'll
talk to Mike.

Jan 16 2017, 10:51 AM · pinentry, Feature Request

Jan 13 2017

aheinecke closed T1095: Sig/enc status should be used when forwarding/answering a crypto message as Resolved.
Jan 13 2017, 3:50 PM · gpgol, Feature Request
aheinecke added a comment to T1095: Sig/enc status should be used when forwarding/answering a crypto message.

Done now

Jan 13 2017, 3:50 PM · gpgol, Feature Request

Jan 11 2017

aheinecke added a comment to T2314: Improve detection of gpgme_data_identify.

I currently know of no more problems so lets resolve this.

Jan 11 2017, 4:02 PM · gpgme, Feature Request, gpg4win
aheinecke removed a project from T2314: Improve detection of gpgme_data_identify: Restricted Project.
Jan 11 2017, 4:02 PM · gpgme, Feature Request, gpg4win
aheinecke closed T2314: Improve detection of gpgme_data_identify as Resolved.
Jan 11 2017, 4:02 PM · gpgme, Feature Request, gpg4win

Jan 6 2017

dmp1ce added projects to T2916: GPGME should have a way to suppress delete key prompts: Feature Request, gpgme.
Jan 6 2017, 11:35 PM · gpgme (gpgme 1.23.x), Feature Request
werner added a project to T2907: make DNS look ups more parallel: gnupg (gpg23).
Jan 6 2017, 7:20 PM · Feature Request, gnupg
werner renamed T2905: EFL-based pinentry from EFL-based pinentry to Enlightment-based pinentry.
Jan 6 2017, 7:19 PM · pinentry, Feature Request
werner added a project to T1426: the way gpg updates the pubring files makes it impossible to symlink it: Won't Fix.
Jan 6 2017, 7:04 PM · Won't Fix, gnupg, Feature Request
werner closed T1424: gpg --quiet doesn't suppress messages "requesting key XXX ..." / noise on STDERR/STDOUT as Resolved.
Jan 6 2017, 7:00 PM · gnupg, Debian, Feature Request
werner added a comment to T1424: gpg --quiet doesn't suppress messages "requesting key XXX ..." / noise on STDERR/STDOUT.

In 2.1 --quit is honored here

Jan 6 2017, 7:00 PM · gnupg, Debian, Feature Request
werner added a project to T1345: gpg should try to connect using HTTP if HKP fails: Won't Fix.
Jan 6 2017, 6:59 PM · Won't Fix, Feature Request, gnupg
werner closed T1345: gpg should try to connect using HTTP if HKP fails as Resolved.
Jan 6 2017, 6:59 PM · Won't Fix, Feature Request, gnupg
werner added a comment to T1345: gpg should try to connect using HTTP if HKP fails.

There are keyservers which listen on port 80 or 443. They can be used in such
cases. See https://sks-keyserver.net.

Jan 6 2017, 6:59 PM · Won't Fix, Feature Request, gnupg
werner closed T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN) as Resolved.
Jan 6 2017, 6:55 PM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
werner added a project to T1148: 1.4.x pinpad support (reader covadis vega-alpha => cannot used secure PIN): Won't Fix.
Jan 6 2017, 6:55 PM · Won't Fix, gnupg (gpg14), Feature Request, gnupg
werner closed T1255: No output on status-fd if user cancels as Resolved.
Jan 6 2017, 6:53 PM · Too Old, Info Needed, gnupg, Feature Request
werner added projects to T1255: No output on status-fd if user cancels: Info Needed, Too Old.
Jan 6 2017, 6:53 PM · Too Old, Info Needed, gnupg, Feature Request
werner added projects to T2267: Fix "Invalid Parameter passed to C runtime function" warnings on Windows: Windows, Restricted Project, Windows 32.
Jan 6 2017, 6:50 PM · Windows 32, Windows, gnupg, gpgagent, Feature Request
werner added a comment to T2267: Fix "Invalid Parameter passed to C runtime function" warnings on Windows.

Actually we do not need that function on Windows. It is on Unix called at
startup to get a list of files not to close. On Windows we do not need to close
the files before a CreateProcess and thus close_all_fds is a dummy anyway.

I removed calling this function under Windows. To go into 2.1.18.

Jan 6 2017, 6:50 PM · Windows 32, Windows, gnupg, gpgagent, Feature Request
werner added a project to T2398: finger support using SRV DNS records: gnupg (gpg22).
Jan 6 2017, 6:29 PM · gnupg, Feature Request, dirmngr
werner added a project to T1173: gpg has no easy way to view the reason and description of revocation sigs: gnupg (gpg22).
Jan 6 2017, 6:27 PM · gnupg, Debian, Feature Request
werner renamed T1173: gpg has no easy way to view the reason and description of revocation sigs from gnupg: has no easy way to view the reason and description of revocation sigs to gpg has no easy way to view the reason and description of revocation sigs.
Jan 6 2017, 6:27 PM · gnupg, Debian, Feature Request
werner added a comment to T1537: gpgv does not handle expired or revoked keys.

I do not think that an expired key should be ignored. The reason is that it
won't be possible to verify an old package because it is common that keys expire
at some time. This does not say anything on whether the key has been compromised.

However, if a key has been revoked, that might be be an indication that the key
has been comprimised and that old signature may have been replaced by faked
ones. I would agree to return failure in this case.

Jan 6 2017, 6:25 PM · Feature Request, gnupg
werner added a project to T1537: gpgv does not handle expired or revoked keys: gnupg (gpg22).
Jan 6 2017, 6:25 PM · Feature Request, gnupg
werner closed T1986: gpg-1 should fallback to ~/.gnupg/S.gpg-agent as Resolved.
Jan 6 2017, 6:16 PM · gnupg, Fedora, Feature Request
werner added a comment to T1986: gpg-1 should fallback to ~/.gnupg/S.gpg-agent.

I would suggest to add

gpgconf --launch gpg-agent
GPG_AGENT_INFO="$(gpgconf --list-dirs agent-socket):-1:1"
export GPG_AGENT_INFO

to your startup script. This starts gpg-agent and sets the correct socket name
into the envar.

Jan 6 2017, 6:16 PM · gnupg, Fedora, Feature Request
werner added a project to T2081: g10/keydb.c:maybe_create_keyring_or_box doesn't check for EACCESS: Restricted Project.
Jan 6 2017, 5:51 PM · gnupg, Feature Request
werner added a comment to T2081: g10/keydb.c:maybe_create_keyring_or_box doesn't check for EACCESS.

I recently di this change:

  • return 0;

+ return !access (filename, R_OK)? 0 : gpg_error (GPG_ERR_EACCES);

(commit 5d13581f4737c18430f6572dd4ef486d1ad80dd1)

Does that solve your problem?

Jan 6 2017, 5:51 PM · gnupg, Feature Request
werner added a project to T2106: Support SHA-256 fingerprints for ssh: gnupg (gpg22).
Jan 6 2017, 5:47 PM · gnupg (gpg22), gnupg, ssh, Feature Request
werner added a comment to T2106: Support SHA-256 fingerprints for ssh.

Adding %f does not help much because it is only used internally. I would be in
favor of adding an ssh-key-mode option so that the user can select the hash algo
and the output format.

Jan 6 2017, 5:47 PM · gnupg (gpg22), gnupg, ssh, Feature Request
werner lowered the priority of T2233: Missing feedback when sending key to key server from Normal to Wishlist.
Jan 6 2017, 5:41 PM · gnupg, Feature Request
werner added a project to T2381: Add more support for profiles in gpgconf: gnupg (gpg22).
Jan 6 2017, 5:39 PM · In Progress, gnupg (gpg22), gnupg, Feature Request
werner removed a project from T2381: Add more support for profiles in gpgconf: gnupg (gpg21).
Jan 6 2017, 5:39 PM · In Progress, gnupg (gpg22), gnupg, Feature Request
werner added a project to T2912: command line keytocard: gnupg (gpg22).
Jan 6 2017, 5:37 PM · gnupg (gpg23), Feature Request
neal added a comment to T2912: command line keytocard.

Also see: https://github.com/mabels/gnupg/tree/quick-keytocard

Jan 6 2017, 5:15 PM · gnupg (gpg23), Feature Request
werner added a project to T2907: make DNS look ups more parallel: Feature Request.
Jan 6 2017, 5:13 PM · Feature Request, gnupg
werner lowered the priority of T2907: make DNS look ups more parallel from Low to Wishlist.
Jan 6 2017, 5:13 PM · Feature Request, gnupg
neal added projects to T2912: command line keytocard: Feature Request, gnupg.
Jan 6 2017, 3:33 PM · gnupg (gpg23), Feature Request
aheinecke added a comment to T2906: read/parse pubkeys in gpgme without importing.

I think this is a dup of T2819

That issue also contains a possible implementation. I'm not sure anymore why we
didn't push it I think it was because we were under release pressure and wanted
do look into this later.

Jan 6 2017, 2:07 PM · Duplicate, gpgme, Feature Request
neal updated subscribers of T2906: read/parse pubkeys in gpgme without importing.
Jan 6 2017, 12:45 PM · Duplicate, gpgme, Feature Request
neal added projects to T2906: read/parse pubkeys in gpgme without importing: Feature Request, gpgme.
Jan 6 2017, 12:45 PM · Duplicate, gpgme, Feature Request
neal set External Link to https://lists.gnupg.org/pipermail/gnupg-devel/2016-October/031918.html on T2906: read/parse pubkeys in gpgme without importing.
Jan 6 2017, 12:45 PM · Duplicate, gpgme, Feature Request
neal set External Link to https://lists.gnupg.org/pipermail/gnupg-devel/2016-October/031807.html on T2905: EFL-based pinentry.
Jan 6 2017, 12:26 PM · pinentry, Feature Request
neal added projects to T2905: EFL-based pinentry: Feature Request, pinentry.
Jan 6 2017, 12:26 PM · pinentry, Feature Request
neal updated subscribers of T2905: EFL-based pinentry.
Jan 6 2017, 12:26 PM · pinentry, Feature Request

Jan 2 2017

RJVB added a comment to T2884: Qgpgme thoughts and issues.

Hi,

The patch works. There's 1 more issue that's been standing for a bit longer already,
and that you might want to tackle at the same time: there's no argp.h header on Mac.

On Linux it is only a problem with the headers (e.g. the -dev) Package as the

That's actually an orthogonal issue, and one that's probably easier to rectify as any
changes only become apparent when dependent software is being built.

libraries have different soversions

This is also the case on Mac, but the link library doesn't have a soversion. It's
called libqgpgme.so or libqgpgme.dylib .
There is of course the option to rename just that symlink. A bit of a hack, but one
that's relevant only during the link step, when dependent software is being rebuilt.

How does MacPorts handle this in general? IMO this is not a (q)gpgme(++)
specific problem as you will have this problem with each ABI break.

MacPorts does many things like they're done on more traditional *n*x desktops, i.e.
install libraries in a central, shared location (--prefix=/opt/local by default).
There is nothing specific it does to handle ABI breaks; they can hold up an upgrade,
or a patch is applied at some level, or a conflict is registered. Sadly there is no
central way to create -dev packages, which doesn't help here.

E.g. when we
break the ABI in QGpgME libqt5qgpgme.dylib may be incompatible and we would need
a new name.

That I don't see. The problem here isn't so much the ABI break compared to the
version shipped by kdepimlibs4, but the fact that an incompatible Qt version is used.
So no, a SOVERSION=8 upgrade doesn't impose a library name change. Cf. Poppler and
its Qt backends; they're called libpoppler-qt4 and libpoppler-qt5 .
An alternative would be to do like QCA: install the library wherever Qt's own
libraries are installed. That automatically resolves the conflict with the old
version included with kdepimlibs4, and might be less disruptive for existing
distribution packages.

It's not only the build system but the code using QGpgME / GpgME++ will be more
complex as they would need to have feature checks for both the QGpgME version

What I had in mind was a build system that refuses to do a mismatching build of QpgME
X.Y.Z against GpgME++ that's not X.Y.Z . If you don't do runtime checks there's no
guarantee anyway beyond what the dynamic linker can give, I think. Distributions can
build QpgME and only bundle the QpgME bits, and then install that against any GpgME
install. I've done that for a bit with QpgME 1.7.x against QpgME++ 1.8.0, and didn't
run into any issues.
You could probably even argue that people would be less likely to try this kind of
things if the build system gave off a big hint that they really shouldn't be doing
that. It's not like it's particularly difficult to install only QpgME, after all.

Jan 2 2017, 5:21 PM · gpgme, Feature Request, qt
aheinecke added a comment to T2884: Qgpgme thoughts and issues.

Hi,

thanks for your feedback.

Regarding library suffix in the cmake config files, sorry about that I forgot
MacOS ;-) can you please test the attached patch (macos-cmake-config-fix.diff)
that reintroduces libsuffix to distinguish between macos and linux?

QGpgME builds libqgpme, preserving the same name as the library that used to
be built by kdepimlibs4.

There was a discussion after the 1.7.0 release about this. In summary: I agree
that we should have changed the name to avoid this conflicts, but we think that
it's now too late to do that as we want to avoid additional hassle for packages.
On Linux it is only a problem with the headers (e.g. the -dev) Package as the
libraries have different soversions. On Windows it's not a problem at all as the
Application ships the library it requires.

Is this something that might be considered upstream, e.g. for 1.8.1, possibly as
a build option? I realise this may not be something that has already come up on
Linux desktops but it's likely to do so in other distribution systems; it is
blocking us in MacPorts at this moment, for instance.

How does MacPorts handle this in general? IMO this is not a (q)gpgme(++)
specific problem as you will have this problem with each ABI break. E.g. when we
break the ABI in QGpgME libqt5qgpgme.dylib may be incompatible and we would need
a new name.

On Linux we have soversion and on Windows and MacOS imo usally the libraries are
shipped with the Application. But on MacPorts how does this work?

It will probably a bit more complex to maintain the buildsystem because you'd
want to exclude builds against mismatching qgpgme versions, but when done that
should be all, no?

It's not only the build system but the code using QGpgME / GpgME++ will be more
complex as they would need to have feature checks for both the QGpgME version
and the GPGME version to determine which features are available. This was a huge
hassle in the old days and one of the reasons we wanted to move them closer
together so that you can rely on the API once you have a minimum required version.

See e.g.:
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commitdiff;h=433bb8e84b2d1e50b5c5b9f7f2006b60cd7d7785
That removed lots of these feature checks.

Jan 2 2017, 2:57 PM · gpgme, Feature Request, qt
aheinecke added a comment to T2884: Qgpgme thoughts and issues.

D403: 936_macos-cmake-config-fix.diff

Jan 2 2017, 2:57 PM · gpgme, Feature Request, qt
werner removed a project from T2893: gnupg should used ccid card key material fingerprints and not serial number: Bug Report.
Jan 2 2017, 1:54 PM · yubikey, Feature Request, gnupg
werner added a project to T2893: gnupg should used ccid card key material fingerprints and not serial number: Feature Request.
Jan 2 2017, 1:54 PM · yubikey, Feature Request, gnupg
werner added projects to T2898: Option to ignore card serial number (to be able to use backup tokens containing same subkeys): Feature Request, gnupg.
Jan 2 2017, 1:51 PM · gnupg, Feature Request

Dec 21 2016

werner added a comment to T2884: Qgpgme thoughts and issues.

Aside from the required build system changes we wil run into problems evaluating
bug reports.

Dec 21 2016, 6:56 PM · gpgme, Feature Request, qt
RJVB added a comment to T2884: Qgpgme thoughts and issues.

It will probably a bit more complex to maintain the buildsystem because you'd
want to exclude builds against mismatching qgpgme versions, but when done that
should be all, no?

It's just a bit a pity that you have to build all of the cpp bindings again if
you just want to build the Qt bindings.

Dec 21 2016, 6:50 PM · gpgme, Feature Request, qt
werner closed T2880: Make jenkins.gnupg.org reachable via https as Resolved.
Dec 21 2016, 6:44 PM · gpgweb, Feature Request
werner removed a project from T2880: Make jenkins.gnupg.org reachable via https: Restricted Project.
Dec 21 2016, 6:44 PM · gpgweb, Feature Request
werner added a project to T2884: Qgpgme thoughts and issues: qt.
Dec 21 2016, 6:43 PM · gpgme, Feature Request, qt
werner assigned T2884: Qgpgme thoughts and issues to aheinecke.
Dec 21 2016, 6:42 PM · gpgme, Feature Request, qt
werner added projects to T2884: Qgpgme thoughts and issues: Feature Request, gpgme.
Dec 21 2016, 6:42 PM · gpgme, Feature Request, qt
werner updated subscribers of T2884: Qgpgme thoughts and issues.
Dec 21 2016, 6:42 PM · gpgme, Feature Request, qt
werner lowered the priority of T2884: Qgpgme thoughts and issues from Normal to Wishlist.
Dec 21 2016, 6:42 PM · gpgme, Feature Request, qt

Dec 20 2016

werner closed T1648: Missing step in instructions for verifying integrity as Resolved.
Dec 20 2016, 11:49 PM · gpgweb, Feature Request
werner removed a project from T1648: Missing step in instructions for verifying integrity: Restricted Project.
Dec 20 2016, 11:49 PM · gpgweb, Feature Request
werner closed T1597: IDEA page should mention incompatibility of idea.c with gpg2 as Resolved.
Dec 20 2016, 11:48 PM · gpgweb, Feature Request
werner added a comment to T1597: IDEA page should mention incompatibility of idea.c with gpg2.

The web page has been updated.

Dec 20 2016, 11:48 PM · gpgweb, Feature Request
werner added a project to T2880: Make jenkins.gnupg.org reachable via https: Restricted Project.
Dec 20 2016, 5:02 PM · gpgweb, Feature Request
werner added a comment to T2880: Make jenkins.gnupg.org reachable via https.

Done. Note that the https is only to the frontend the backend is reached
unencrypted. We can't easily change this.

Dec 20 2016, 5:02 PM · gpgweb, Feature Request
werner removed a project from T2866: gpg-wks-client should support --check: Restricted Project.
Dec 20 2016, 12:51 PM · gnupg, Feature Request
werner closed T2866: gpg-wks-client should support --check as Resolved.
Dec 20 2016, 12:51 PM · gnupg, Feature Request
justus added projects to T2880: Make jenkins.gnupg.org reachable via https: Feature Request, gpgweb.
Dec 20 2016, 11:13 AM · gpgweb, Feature Request
justus added projects to T2879: There is no way to selectively delete secret subkeys: Feature Request, gnupg.
Dec 20 2016, 11:06 AM · gnupg, Feature Request

Dec 19 2016

aheinecke added a comment to T2381: Add more support for profiles in gpgconf.

Ok profiles are now there and look workable, but it looks like they are only
supporting configuration values that are currently accessible through gpgconf:

[gpg]
trust-model tofu+pgp
keyserver-options auto-key-retrieve
auto-key-locate local,wkd,pka,cert,dane

Leads to:

gpgconf: /opt/gnupg/etc/gnupg/automated.profile:7:0: error: unknown option
'trust-model' in section 'gpg'
gpgconf: /opt/gnupg/etc/gnupg/automated.profile:8:0: error: unknown option
'keyserver-options' in section 'gpg'

So we need more options promoted to gpgconf. Which I think is ok, we can just
mark them as Expert / Invisible and GUI's should respect that.

Dec 19 2016, 6:41 PM · In Progress, gnupg (gpg22), gnupg, Feature Request

Dec 16 2016

justus removed a project from T2700: Clean up the command line interface (avoid abbreviated --long-options, consistency): In Progress.
Dec 16 2016, 2:46 PM · gnupg, Feature Request, gnupg (gpg22)
justus closed T2700: Clean up the command line interface (avoid abbreviated --long-options, consistency) as Resolved.
Dec 16 2016, 2:46 PM · gnupg, Feature Request, gnupg (gpg22)
justus added a comment to T2700: Clean up the command line interface (avoid abbreviated --long-options, consistency).

I went over the other programs, and did not see any glaring problems. I have
decided to ignore the socket configuration for now. I'm quite happy with the
changes, but feel free to reopen this bug.

Dec 16 2016, 2:46 PM · gnupg, Feature Request, gnupg (gpg22)

Dec 15 2016

justus closed T2359: Query which key will be used for a given mailbox as Resolved.
Dec 15 2016, 5:29 PM · gnupg (gpg22), gnupg, Feature Request