Yes, I am ready to accept write access to the Scute repository.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Jun 23 2017
FWIW, I ran a make check today and got several failed tests when using the extended key format. Checking out master to see whether this was caused by another patch I am working on, showed that it worked on master. Checking out my local branch again, then passed the test.
Justus, please apply the patches.
I have tested this and it appears to fix the leak of gpg-agent processes in virt-builder, thanks.
I commited a change which should fix this on Linux
Well, this is a regression due to us creating creating /run/user/gnupg/ socket directories now on the fly. Thus there is no more need to create non-default home directories via gpgconf. Now, gpg-agent watches the socket file and terminates itself as soon as the socket file vanishes. Before that change the socket for a non-default home directory was created in the homedir itself and thus removing the homedir also removed the socket file and in turn gpg-agent terminated itself.
This is such a large change that I feel uneasy to close the bug before we know that there are no regressions. This Means we need to wait whether the next release will break.
Jun 22 2017
I think the best method to make sure Scute can always find the socket is to use gpg-connect-agent to ask for the socket: we call gpg-connect-agent 'GETINFO socket_name' /bye and read the reply.
Jun 21 2017
Jun 20 2017
Fixed in 48aae8167dcae80d43b08167a88d9eb170781a04.
Fixed in badc1cdae52bd434e5fac2e4275575afeccc2837.
Agreed, that is odd.
Jun 19 2017
I'm not sure I understand the problem. Importing that key seems to work just fine. Listing as well.
Jun 17 2017
here's a public key version of the same key. it was available easier and should reproduce the bug just as well
Jun 14 2017
Fixed as of 9b12b45aa5e67d4d422bf75a3879df1d52dbe67f.
It doesn't seem to impact performance significantly:
Jun 13 2017
In T3203#98567, @Valodim wrote:The key was created programmatically by my standard approach, which is bastardizing openkeychain unit tests. good question about the passphrase - I don't remember exactly, but I'm guessing it's either empty or "x". doesn't really matter in the context of this particular bug I guess :)
user ids with length 0 do conform with rfc4880, though
I'd suggest to skip such user id. Actually I had in mind that we did that in the past - but I may be wrong.
Justus: When you have implemented that, can you please do a test with my key before and after? As you may know, I have hundreds of vanity signatures so that I need to have
The key was created programmatically by my standard approach, which is bastardizing openkeychain unit tests. good question about the passphrase - I don't remember exactly, but I'm guessing it's either empty or "x". doesn't really matter in the context of this particular bug I guess :)
Out of curiosity, how did you create the key? What is the use case?
This is fixed now. The fix 15d2a009931f44a60b9df6325f837add208459d6 should be easy to backport.
Still, looks totally fine to me:
Jun 12 2017
In T3187#98531, @werner wrote:I will try to reproduce it. It might be that --passwd also trigerred the conversion to the new format.
I will try to reproduce it. It might be that --passwd also trigerred the conversion to the new format.
Odd, I cannot reproduce this:
Jun 8 2017
Regarding CFB: This needs to be decided by the evaluators. They know about the CFB problematic in their own documents. Thanks for pointing out discrepancies in the specs. I'll open a new task for it.
Implemented. The policy should be easy to adjust later on.
4.4.1 does not allow the use of AES-128 CFB as a cipher to encrypt the body of messages, but 4.4.2 even lists AES-128 CFB as conforming to VS-NfD. Furthermore, 4.1.1 allows,the use of AES-128 CFB as a cipher to encrypt the body of messages. I'm going to assume that this is a bug in the specification and also allow it for symmetric encryption.
Jun 7 2017
4.2.2 lists session keys for ciphers that are not allowed.
thanks for help - could have been my mistake as well, so better look twice.
"werner (Werner Koch)" <noreply@dev.gnupg.org> writes:
Sorry. I looked at path_add and not at path_remove, see my garbled line numbers I started at 1062 and not 1162.
void __declspec(dllexport) path_remove (HWND hwndParent, int string_size, char *variables, stack_t **stacktop, extra_parameters_t *extra) { char dir[PATH_LENGTH_LIMIT]; char is_user_install[2]; char *path; char *path_new; int path_new_size; char *comp; const char delims[] = ";"; HKEY key_handle = 0; int changed = 0; int count = 0; HKEY root_key; const char *env_reg;
Hmm, why do you think this is important? The use cases I can see are
I don't see the bug. Please elaborate. path_new is is freed in line 1065 but if this condition does not match it's freed in line 1079.
Jun 6 2017
Jun 1 2017
FWIW, I think that document describes some nonsensical policies, but I will implement it to the letter for now, it is easy to change later on.
I found a bug in ST-Gpg4VSNfD-v0.6.pdf, page 21 incorrectly refers to RFC6337 instead of RFC6637.
May 31 2017
May 29 2017
May 24 2017
Fixed as of 525f2c482abb6bc2002eb878b03558fb43e6b004.
@werner, can you please quickly outline how you imagine this to be fixed? Our jabber discussion is gone from my memory, and my client does not keep logs for MUCs for some reason.
May 15 2017
Automatic creation of socket directories creates cleanup trouble for projects previously relying on the agent-shutdown if $GNUPGHOME is removed: https://notmuchmail.org/pipermail/notmuch/2017/024550.html
Apr 28 2017
Apr 26 2017
Can we activate this for --import and --recv-key as guilhem requested?
Apr 4 2017
Mar 30 2017
Mar 24 2017
We also have a discussion of the mailing list. It does currently not make sense
to continue here.
The problem of NFS mounted home directories is _real_ and we have a solution for
this which is better than the old redirection hack.
The problem with too long socket names is not severe and has been around for
decades (for other software and 14 years for GnuPG). There are workaround and
/run/user also solves this.
I proposed a change which does not even require --create-socketdir. There was
no comment on this and thus I will push that now so that we can do a real life test.
Justus: I told you several times that we are not going to change working code
for no good reason.
Except that it is not working. If it was working, then
06f1f163e96f1039304fd3cf565cf9de1ca45849
would not be necessary.
Even if your hack (I call it a hack because it does not
work with getsockname)
1/ Yes it does. It returns precisely the path that was used in bind.
2/ We only use getsockname on sockets that were given us by a service manager
like systemd, and thus those sockets would be unaffected by "the hack".
would make it, it does not solve the major problem: The
inability of creating sockets on certain file systems. THAT is the major reason
why we moved to /var/run.
Please stop conflating these things. This bug is about "dirmngr and gpg-agent
should work automatically even when GNUPGHOME is larger than sun_path". It is
not about NFS or FAT or something.
Mar 21 2017
Justus: I told you several times that we are not going to change working code
for no good reason. Even if your hack (I call it a hack because it does not
work with getsockname) would make it, it does not solve the major problem: The
inability of creating sockets on certain file systems. THAT is the major reason
why we moved to /var/run.
The whole IPC thing is pretty complex and adding a non-standard hack as proposed
by Justus will for sure cause breakage on some platforms.
I'm not sure why you call it a hack. I've been looking at POSIX, [0] introduces
pathname resolution, and the terms 'relative path' and 'absolute path'.
0: http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/V1_chap04.html#tag_04_13
Neither the page for connect [1], nor the one for bind [2] state that the path
used to connect/bind unix sockets must be an absolute path.
1: http: / / pubs.opengroup.org/onlinepubs/9699919799/functions/connect.html#
2: http: / / pubs.opengroup.org/onlinepubs/9699919799/functions/bind.html#
Furthermore, my test across a wide range of UNIX implementations did not show
any issues with using relative paths.
Mar 14 2017
I agreed in T2964 (wk on Mar 01 2017, 07:31 AM / Roundup) to auto create socket directories. I would like to do that
only for a tmpfs but we can also try to do this always. Adding a inotify watch
to remove the directory is more complex and I am not sure whether this is really
needed. The other thing is simple and we could do that for 2.1.20.
The whole IPC thing is pretty complex and adding a non-standard hack as proposed
by Justus will for sure cause breakage on some platforms.
Yes, we should document /var/run recommendations in the README. I will do that
for the next release.