I have enabled login again and added the following login hint:
"Login via your Roundup account on bugs.gnupg.org has been disabled due to the migration to Phabricator. We apologise for any inconvenience caused. If you have previously used your Roundup account in this wiki, you can request a new password using the link above."
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Aug 16 2017
Aug 15 2017
As part of switching debsig-verify from using --list-packets to gpg with --list-keys --with-colons and gpgv, it would be helpful to eventually be able to get the fingerprint instead of the keyid. This is needed because debsig-verify uses the keyid to select which one of its policy files it has to load, to apply for the subsequent actual verification of the .deb package.
Aug 14 2017
Aug 11 2017
This should be fixed by a0cc6e01. Just use the new gpgme_op_delete_ext operation with GPGME_DELETE_FORCE flag.
Aug 10 2017
Aug 9 2017
Werner indicated that the current behaviour is intentional.
Aug 8 2017
GPGME does not use gpgv. What Justus likely meant is that we would need to change the common code used by gpgv and gpg. That may give problems in GPGME.
Can you describe the problems it would cause for gpgme? gpgme already currently expects that gpgv will return a failure for signatures made before the validity window of the key. so gpgme won't break just because gpgv is capable of returning a non-zero response.
Re-opening.
Implemented in c4506f624ed6854aa0ba1629aa2d1d43eb26900d.
We are in feature freeze and changing the status code of gpgv will likely cause problems for gpgme. We need to defer this.
Aug 7 2017
I also have to add that, if this really has been resolved, it only covers up the case if the missing subkey(s) is/are on the smartcard(s), it does not solve the problem when none of the missing signing subkeys are in smartcards (as in, all on different computers). And it's clear that for version 2.1.22, it fails to get the available subkey on the disk for this case.
Done in a7bd2cbd.
@gniibe: I've tested 2.1.22 (from Debian experimental) and, while gpg --sign works, other programs (eg: git tag -s) still prompt to insert the card of the first signing subkey, despite the card with the second signing subkey being present.
Is that expected?
Aug 6 2017
I implemented a possible fix in D442. The GnuPG Agent may call an external program (specified with the new --passphrase-checker option) to evaluate the passphrase's quality. This would allow to implement all kinds of metrics for passphrase strength, and to select one simply by choosing the right passphrase-checker.
Aug 4 2017
Aug 1 2017
Done in a8d0b8d23.
It's there in GnuPG 2.1 for a while, and bugs introduced by change were fixed.
So, I'm closing this bug.
Jul 31 2017
Jul 27 2017
Also a lot of redirects, for example this bounces you from https to http.
Could be done by adding "--yes" to the command line. Requires a new version of the gpgme_op_delete functions with a flag "force".
As others have pointed out, we don't implement the Bell-Lapadula model.
Well, iff we implement that for gpg we also need to implement it for gpgsm.
Jul 26 2017
FWIW, using a Debian specific thing is not portable and Unix sockets won't work on Windows. Thus using the standard localhost connection is simpler than adding extra complexity.
Okay, I implemented the second part and Tor is now used if availabale.
--no-use-tor disables Tor.
--use-tor forces use Tor and can't be reset.
Jul 25 2017
I am not to familiar with the gnome keyring but from looking it up on the arch wiki, it seems to have this single sign on capability.
Sufficient workarounds have been found.
That is the way I get my certificate signed, there is nothing I can do about it ;-)
So this is basically 0what GNOME does with its keyring daemon and pinentry-gnome.
It's not really a good idea to use the same RSA key for encryption and signing. (Although when I wrote scute, I couldn't generate a CSR for the encryption key, because the CSR had to be self-signed, meh).
Btw, this was envoy: https://github.com/vodik/envoy
what I mean by unlocking is the act of using the passphrase to load the gpg and ssh keys and hence not needing to tip the phrase again afterwards.
I don't understand what you mean by unlocking gpg-agent. Can you please explain in detail what you try to achieve.
Jul 24 2017
Jul 21 2017
One problem I see is that S/MIME doesn't standardize sign+encrypt, but requires nesting of those operations, leaving it up to the implementor to pick the order etc. From an interoperability point of view, this seems like a world of hurt if you take this out of the context of MIME.
Do you have a use case?
Jul 20 2017
So it seems that accessing through gpg-agent is the better solution.
Changing the message affects all translations.
Well, we don't maintain a wiki, so I think this should be tracked elsewhere.
With commit 9998b162b47931fb8a8ed961d53418d505358888:
I'd like to hear a little more about the use cases we imagine for Anonymous OpenPGP certificates.
Jul 19 2017
T3252 is about meta data for each key.
Hm. Could you elaborate on that? Why do you think it's dangerous?
I consider allowing empty user ids too dangerous.
Implemented in da91d2106a17c796ddb066a34db92d33b21c81f7.
Jul 18 2017
Implemented in f17862d47.
Jul 17 2017
werner said this won't be fixed.
This has been improved by e467a000f87e87582f5838964b6f1e0a960d4445
In addition to Werner's concerns, making network requests to unverified URLs can be harmful in many ways. For example, it would allow a third-party to detect when the signature was verified, among other even nastier things.
Maybe for 2.2?
Jul 14 2017
Another reoccurring concern is lingering agents spawned in test suites. See, e.g. a discussion from this week: https://github.com/pazz/alot/pull/1081#issuecomment-315131053