Page MenuHome GnuPG
Feed Advanced Search

Sep 7 2017

dkg created T3392: keyserver default should include pool onionbalance hkp://jirk5u4osbsr34t5.onion.
Sep 7 2017, 4:49 PM · Too Old, Keyserver, Feature Request, dirmngr
dkg created T3389: canonical OpenPGP certificate export.
Sep 7 2017, 1:12 AM · gnupg, Feature Request

Sep 6 2017

dkg committed rGaa26eda8ab67: po: update Dutch translation. (authored by Frans Spiesschaert <Frans.Spiesschaert@yucom.be>).
po: update Dutch translation.
Sep 6 2017, 11:06 PM

Aug 25 2017

dkg created T3370: gpg --list-packets should show symmetric algorithm for PKESK (if decryptable).
Aug 25 2017, 7:17 PM · Feature Request

Aug 18 2017

dkg created T3356: gpgme test suite failure in lang/qt/tests/t-config.cpp on mipsel.
Aug 18 2017, 2:07 PM · Too Old, gpgme, Bug Report
dkg added a comment to T3354: gpgme only builds against two versions of python at once.

this is also https://bugs.debian.org/866555

Aug 18 2017, 6:31 AM · Python, gpgme, Bug Report
dkg created T3354: gpgme only builds against two versions of python at once.
Aug 18 2017, 4:42 AM · Python, gpgme, Bug Report
dkg created T3352: python: Support parallel build in tests.
Aug 18 2017, 2:50 AM · gpgme, Bug Report

Aug 16 2017

dkg added a comment to T3348: gpgsm: should default to --disable-crl-checks.

i think it's strictly worse, even when the certificates are "trusted" in sense (1) -- with OpenPGP keyserver lookups, at least it is the client who decides which keyserver to use, on what protocol, to look up the given issuer fingerprint.

Aug 16 2017, 10:33 PM · gpgme, gnupg, S/MIME

Aug 15 2017

dkg created T3350: gpgv should emit a status line with full issuer fingerprint, if it is present in the key..
Aug 15 2017, 6:30 PM · gpgv, Feature Request
dkg added a comment to T3348: gpgsm: should default to --disable-crl-checks.

I see at least two different kinds of "trust" here.

Aug 15 2017, 5:50 PM · gpgme, gnupg, S/MIME
dkg added a comment to T3348: gpgsm: should default to --disable-crl-checks.

Making matters worse, i note that some CRLs, like those issued by MIT's Lincoln Lab are quick and easy to fetch over the Internet directly, but hang or timeout when fetched via Tor.

Aug 15 2017, 1:38 AM · gpgme, gnupg, S/MIME
dkg added a comment to T3215: gpgme_op_import_keys() -- unclear documentation, problematic behavior.

It wasn't a natural thing to do gpgme_op_import because i already had my gpgme_key_t object, which i was using to display an index of available keys to the user.

Aug 15 2017, 1:03 AM · gpgme, Bug Report

Aug 14 2017

dkg created T3348: gpgsm: should default to --disable-crl-checks in the S1 Public space.
Aug 14 2017, 11:14 PM · gpgme, gnupg, S/MIME
dkg added a comment to T3347: gpg-agent at startup in order that my Yubikey can be used for ssh.

Please use the systemd unit files as shipped upstream. This allows the agent to be launched automatically whenever someone tries to use one of its sockets, but doesn't pre-emptively launch the agent until needed.

Aug 14 2017, 7:36 PM · Documentation, gnupg, Bug Report

Aug 11 2017

dkg added a comment to T3215: gpgme_op_import_keys() -- unclear documentation, problematic behavior.

I'm not sure i understand why i'm "chasing a ghost" -- i'm reporting the experience of a developer (me!) who tried to use gpgme, read all the docs, and was still surprised and dismayed by the metadata leakage.

Aug 11 2017, 9:59 PM · gpgme, Bug Report
dkg committed rGe6f84116abca: gpg: default to --no-auto-key-retrieve. (authored by dkg).
gpg: default to --no-auto-key-retrieve.
Aug 11 2017, 3:45 PM
dkg reopened T3215: gpgme_op_import_keys() -- unclear documentation, problematic behavior as "Open".

Thanks for the improvements, Marcus!

Aug 11 2017, 7:13 AM · gpgme, Bug Report

Aug 8 2017

dkg added a comment to T1537: gpgv does not handle expired or revoked keys.

Can you describe the problems it would cause for gpgme? gpgme already currently expects that gpgv will return a failure for signatures made before the validity window of the key. so gpgme won't break just because gpgv is capable of returning a non-zero response.

Aug 8 2017, 7:47 PM · Feature Request, gnupg
dkg created T3345: import-export is noisy, even when i ask it to be --quiet.
Aug 8 2017, 7:17 PM · Feature Request, gnupg
dkg created T3343: show-unusable-subkeys claims "expired: never" when primary key is expired.
Aug 8 2017, 4:51 PM · gnupg, Bug Report

Aug 7 2017

dkg committed rG81074c3b0211: systemd-user: Drop redundant After=*.socket. (authored by dkg).
systemd-user: Drop redundant After=*.socket.
Aug 7 2017, 2:01 PM
dkg committed rG407da18254df: systemd-user: Drop RefuseManualStart=true. (authored by dkg).
systemd-user: Drop RefuseManualStart=true.
Aug 7 2017, 2:01 PM
dkg committed rGa611cba14247: Fix spelling. (authored by dkg).
Fix spelling.
Aug 7 2017, 9:36 AM
dkg committed rGf011d8763a00: Simple typo fix. (authored by dkg).
Simple typo fix.
Aug 7 2017, 7:05 AM

Aug 5 2017

dkg added a comment to T3329: only document --faked-system-time for gpg 2.1 and later.

ah, great! sorry i got confused :)

Aug 5 2017, 12:19 AM · gnupg (gpg14), Bug Report

Aug 4 2017

dkg added a comment to T3329: only document --faked-system-time for gpg 2.1 and later.

fwiw, faked-system-time is used in several non-gnupg packages in debian already.

Aug 4 2017, 8:39 PM · gnupg (gpg14), Bug Report
dkg added a comment to rGeb15d5ed8e4a: doc: Remove documentation for future option --faked-system-time..

fwiw, faked-system-time is used in several non-gnupg packages in debian already.

Aug 4 2017, 8:39 PM
dkg created T3329: only document --faked-system-time for gpg 2.1 and later.
Aug 4 2017, 6:23 PM · gnupg (gpg14), Bug Report

Aug 2 2017

dkg committed rG9832a4bacfa5: debian: Remove packaging from upstream repository. (authored by dkg).
debian: Remove packaging from upstream repository.
Aug 2 2017, 2:39 PM
dkg committed rG12afc37a9464: po: Update Danish translation (authored by Joe Hansen <joedalton2@yahoo.dk>).
po: Update Danish translation
Aug 2 2017, 9:13 AM
dkg committed rG6d5c5204d79f: po: Update Dutch translation (authored by Frans Spiesschaert <Frans.Spiesschaert@yucom.be>).
po: Update Dutch translation
Aug 2 2017, 9:08 AM

Aug 1 2017

dkg created T3323: gpgme should be able to programmatically examine (and modify?) preferences on a key.
Aug 1 2017, 8:32 PM · gpgme
dkg committed rG76239356bcb3: po: Update Spanish translation (authored by Manuel Venturi Porras Peralta <venturi@openmailbox.org>).
po: Update Spanish translation
Aug 1 2017, 6:48 PM

Jul 28 2017

dkg reopened T2849: dirmngr fails to terminate on SIGTERM if an existing connection is open as "Open".

why should it wait for the timeout in the pselect call? shouldn't it be able to respond immediately to the final connection closing?

Jul 28 2017, 12:31 AM · Too Old, gnupg, Bug Report, dirmngr
dkg added a comment to T2750: GOOD_PASSPHRASE has disappeared from status.

Yes, that commit was in 2010, but it was on the 2.1 branch, which never saw wide distribution until this year, which means that there are test suites (like the one mentioned in request-tracker) which simply fail hard when used against gpg 2.1. Is there explicit guidance that the GnuPG project wants to give to downstreams like request-tracker?

Jul 28 2017, 12:01 AM · Bug Report, gnupg

Jul 24 2017

marcus awarded T2666: gpg --list-config does not include default-key a The World Burns token.
Jul 24 2017, 5:39 PM · Bug Report, gnupg

Jul 20 2017

dkg added a comment to T3203: gpg chokes on empty UserId.

I'd like to hear a little more about the use cases we imagine for Anonymous OpenPGP certificates.

Jul 20 2017, 4:58 PM · Feature Request, gnupg (gpg22)

Jul 14 2017

dkg reopened T3277: decrypting data symmetrically doesn't reliably convey confidentiality property as "Open".

I'm re-opening this ticket because i think Valodim has clarified what he meant, which is different than what werner closed the ticket for.

Jul 14 2017, 1:30 PM · Feature Request, gnupg (gpg22)
dkg renamed T2923: trust signature domain restrictions don't work from tust signature domain restrictions don't work to trust signature domain restrictions don't work.
Jul 14 2017, 1:01 PM · gnupg (gpg14), Bug Report
dkg added a comment to T3222: gpg --sign fails when LC_ALL=C, the signing key's primary user ID is not US ASCII, and we fall back to curses.

Users expect to be able to make signatures (or to fail to make signatures) reliably and understandably. the fact that some pinentries fail in some obscure combinations of circumstances makes the process of making signatures unreliable and incomprehensible.

Jul 14 2017, 12:46 PM · pinentry
dkg added a comment to T2946: gpg-agent should be able to terminate when all its state expires.

This is a disappointing resolution. There are many other reasons for having a daemon, which include keeping a sensitive piece of data in memory (and not on disk) for a limited period of time, while providing controlled access to it. This is exactly what gpg-agent does.

Jul 14 2017, 12:38 PM · gnupg, Debian, gpgagent, Feature Request
dkg added a comment to T1537: gpgv does not handle expired or revoked keys.

Thinking about it more broadly, i think that gpgv (and gpg, when used in signature verification mode) should have a return code that is as close to the true/false underlying semantics that users will want, rather than relying on status messages to distinguish between these cases.

Jul 14 2017, 12:29 PM · Feature Request, gnupg
dkg added a comment to T1537: gpgv does not handle expired or revoked keys.

for expiration (or for revocations flagged "key was superseded" instead of "compromised"), you can have a signature made *before* the key's expiration/revocation, but you might be verifying it *after* the key was revoked/expired.

Jul 14 2017, 12:26 PM · Feature Request, gnupg
dkg added a comment to T2923: trust signature domain restrictions don't work.

including these tests (or something similar) in the gpg test suite would be a good way to avoid future regressions.

Jul 14 2017, 12:23 PM · gnupg (gpg14), Bug Report
dkg added a comment to T2284: tsign behavior does not achieve what dkg says it should.

Note that T2923 includes a patch that might help.

Jul 14 2017, 12:21 PM · Bug Report, gnupg
dkg added a comment to T2283: tsign domain not documented.

My point is that without clear documentation of what is expected, it's pretty hard to tell whether the code is even working or not. Sounds like it isn't :(

Jul 14 2017, 12:21 PM · Documentation, Bug Report, gnupg
dkg reopened T2283: tsign domain not documented as "Open".

I don't think this issue is actually resolved. there's a feature here (i think) but it's not documented to the point where anyone can figure out how to use it. If there's no way to use it, the feature should be removed (or at least deprecated).

Jul 14 2017, 12:05 PM · Documentation, Bug Report, gnupg

Jul 12 2017

dkg reopened T3258: clean up note on bug reporting form as "Open".

I don't see how this duplicates T3074. If the web form is going to encourage people to ask for the team's encryption keys, it should just provide the encryption keys directly.

Jul 12 2017, 3:32 AM · gpgweb, dev.gnupg.org, Bug Report
dkg added a comment to T3257: dirmngr cannot set port for nameserver.

Agreed, i think the OP is asking for X when he wants Y, so that makes this request a little bit strange.

Jul 12 2017, 12:22 AM · Feature Request, dirmngr
dkg added a comment to T1537: gpgv does not handle expired or revoked keys.

I don't think that's what we want. An OpenPGP certificate has a claimed temporal validity window: from the creation date of the certificate to its expiration or revocation date.

Jul 12 2017, 12:00 AM · Feature Request, gnupg

Jul 6 2017

dkg created T3258: clean up note on bug reporting form.
Jul 6 2017, 2:06 AM · gpgweb, dev.gnupg.org, Bug Report
dkg created T3257: dirmngr cannot set port for nameserver.
Jul 6 2017, 2:02 AM · Feature Request, dirmngr

Jul 5 2017

dkg committed rG4538f3cf8d7a: doc: minor clarification (authored by Daniel Shahaf <danielsh@apache.org>).
doc: minor clarification
Jul 5 2017, 10:59 PM

Jun 26 2017

dkg added a project to T3222: gpg --sign fails when LC_ALL=C, the signing key's primary user ID is not US ASCII, and we fall back to curses: pinentry.
Jun 26 2017, 10:04 PM · pinentry
dkg added a comment to T3222: gpg --sign fails when LC_ALL=C, the signing key's primary user ID is not US ASCII, and we fall back to curses.

fwiw, i've also opened a bug for sbuild asking it to not force the locale into non-UTF-8: https://bugs.debian.org/866023

Jun 26 2017, 10:04 PM · pinentry
dkg created T3222: gpg --sign fails when LC_ALL=C, the signing key's primary user ID is not US ASCII, and we fall back to curses in the S1 Public space.
Jun 26 2017, 7:35 PM · pinentry
dkg added a comment to T2103: Improve the pinentry password quality indication.

fwiw, i also find this password quality indicator rather dubious.

Jun 26 2017, 7:07 PM · gnupg (gpg23), Feature Request
dkg added a comment to T2905: EFL-based pinentry.

T2103 is the right place to discuss the password quality algorithm, not here.

Jun 26 2017, 6:52 PM · pinentry, Feature Request

Jun 21 2017

dkg added a comment to T3217: pinentry-curses and emacs don't play well together.

In many cases, it's possible to make two connections (e.g. via ssh) to such a server, and in one of those connections explicitly do:

Jun 21 2017, 10:42 PM · pinentry, Bug Report
dkg created T3217: pinentry-curses and emacs don't play well together.
Jun 21 2017, 10:36 PM · pinentry, Bug Report
dkg created T3215: gpgme_op_import_keys() -- unclear documentation, problematic behavior.
Jun 21 2017, 12:41 AM · gpgme, Bug Report
dkg added a comment to D435: systemd-user: Add service file to create the socketdir.

aiui, the point here is to have the user "service" get triggered somehow (through pam's pam_systemd.so's session module?) before ssh goes ahead and forms the socket. is that right? If the pre-launch mechanism is pam, is there a reason to do it as a systemd user service? That won't work for systems that have pam but don't have systemd, whereas a pam module that creates these will work.

Jun 21 2017, 12:13 AM

Jun 20 2017

dkg created T3214: gpgme fails to build with gcc 7 (std::bind, etc).
Jun 20 2017, 8:13 PM · gpgme, Bug Report

Jun 8 2017

dkg closed T3124: Debian 8 BPO with TB 45 and enigmail still hijacking gpg as Wontfix.

I don't think this is a problem for GnuPG to fix. The user is running an OS that launches a version of gnome-keyring by default which doesn't fully-implement gpg-agent's functionality, and yet presents the gpg-agent interface. The user needs to either disable gnome-keyring, or upgrade to a version of the OS (or of gnome-keyring) that doesn't present the gpg-agent interface.

Jun 8 2017, 8:56 PM · Debian

May 23 2017

dkg added a comment to T3172: drop Changelogs from source tree?.

If you're putting a note at the top of ChangeLog-2011, it should probably mention where the *other* changelogs are, not just an explanation of what this file is doing here. And while this does explain to a user who has bothered to read it what's going on, it's still not particularly friendly.

May 23 2017, 11:30 PM

May 22 2017

dkg added a comment to T3172: drop Changelogs from source tree?.

thanks for considering this for > 2.2.

May 22 2017, 10:18 PM
dkg added a comment to T3172: drop Changelogs from source tree?.

I'm not sure i understand. Current changelogs don't go into the source tree, and yet that's not a violation of the GPL, so clearly keeping changelogs in the source tree isn't a requirement in general.

May 22 2017, 7:38 PM

May 19 2017

dkg added a comment to T3168: dirmngr: gpg: keyserver receive failed: No keyserver available.

I'm using 2.1.21-2 from the debian experimental build, and i'm not seeing this misbehavior.

May 19 2017, 1:51 AM · dns, dirmngr
dkg added a comment to T3172: drop Changelogs from source tree?.

I've pushed rGdee244b48060 in the branch T3172 as a proposed fix for this.

May 19 2017, 1:44 AM
dkg committed rGdee244b48060: doc: Remove old ChangeLog files. (authored by dkg).
doc: Remove old ChangeLog files.
May 19 2017, 1:43 AM

May 18 2017

dkg committed rG3713f6702646: doc: Fix spellings. (authored by dkg).
doc: Fix spellings.
May 18 2017, 10:35 PM
dkg created T3172: drop Changelogs from source tree? in the S1 Public space.
May 18 2017, 10:33 PM
dkg committed rG705da1eb23ae: docs: Point to https://dev.gnupg.org/ . (authored by dkg).
docs: Point to https://dev.gnupg.org/ .
May 18 2017, 9:11 PM

May 9 2017

dkg added a comment to T3108: gpgconf lists the wrong extra socket path when a path is explicitly configured in gpg-agent.conf.

I didn't mean to remove the capability of having a restricted "extra-socket". I meant that we could remove (or deprecate) the capability of placing the restricted "extra-socket" at an arbitrary location. I agree with you that having the restricted "extra-socket" is an important capability that gpg shouldn't remove.

May 9 2017, 12:09 AM · gnupg (gpg23), gpgagent
dkg added a comment to T2943: gpg should issue a warning when it is run without a command.

Those scripts are likely already broken if their input happens to be different than what they expect, so i don't much care about "breaking" them. That said, it sounds like you're suggesting that the default mode will just be "--decrypt" and we'll let people continue using it that way.

May 9 2017, 12:05 AM · Bug Report, gnupg

May 5 2017

dkg created T3139: gpg --search shows raw IP address in "gpg: data source: https://193.164.133.100:443" in the S1 Public space.
May 5 2017, 5:53 PM

Apr 26 2017

dkg raised the priority of T2236: Importing a key with badly ordered packets doesn't reorder it, and while --edit-key does reorder it doesn't move the signature packets to the right place from Normal to High.

Can we activate this for --import and --recv-key as guilhem requested?

Apr 26 2017, 4:03 AM · gnupg (gpg22), Bug Report
dkg added a comment to T1967: GnuPG should select a key for signing without trying to use missing subkeys.

I've raised the priority here because this bug gets reported regularly and it seems a shame that we haven't fixed it yet, despite having a patch available for quite some time.

Apr 26 2017, 3:30 AM · gnupg (gpg22), Feature Request
dkg raised the priority of T1967: GnuPG should select a key for signing without trying to use missing subkeys from Normal to High.
Apr 26 2017, 3:30 AM · gnupg (gpg22), Feature Request
dkg added a comment to T1967: GnuPG should select a key for signing without trying to use missing subkeys.

The branch dkg/T1967 contains a fix for this. Please review!

Apr 26 2017, 3:24 AM · gnupg (gpg22), Feature Request
dkg committed rGd9fd52afaceb: g10: Skip signing keys where no secret key is available. (authored by sa).
g10: Skip signing keys where no secret key is available.
Apr 26 2017, 3:23 AM
dkg added a comment to T1371: Out of secure memory while generating several keys in batchmode.

I've just pushed rGde441cb9cc87, taken from the gnupg-devel mailing list, message-id: 20160414161817.GA9527@gnu.org

Apr 26 2017, 3:16 AM · In Progress, Bug Report, gnupg (gpg14)
dkg committed rGde441cb9cc87: g10: Fix secmem leak. (authored by Ineiev <ineiev@gnu.org>).
g10: Fix secmem leak.
Apr 26 2017, 3:15 AM

Apr 25 2017

dkg added a comment to T3108: gpgconf lists the wrong extra socket path when a path is explicitly configured in gpg-agent.conf.

I think it only lists the wrong "extra socket path" when one is specified in gpg-agent.conf, right?

Apr 25 2017, 11:05 PM · gnupg (gpg23), gpgagent
dkg renamed T3108: gpgconf lists the wrong extra socket path when a path is explicitly configured in gpg-agent.conf from gpgconf lists the wrong extra socket path to gpgconf lists the wrong extra socket path when a path is explicitly configured in gpg-agent.conf.
Apr 25 2017, 11:04 PM · gnupg (gpg23), gpgagent
dkg created T3117: improve warnings when daemons are older than gpg in the S1 Public space.
Apr 25 2017, 10:30 PM · gnupg (gpg22)

Apr 19 2017

dkg created T3097: Fix keyring handle caching for windows in the S1 Public space.
Apr 19 2017, 6:20 PM · gnupg
dkg raised the priority of T1983: gpg2 prefers missing secret key to available key on card from Normal to High.
Apr 19 2017, 5:46 PM · Bug Report, gnupg

Apr 17 2017

dkg created T3088: document --no-use-tor and its interaction with --use-tor in the S1 Public space.
Apr 17 2017, 5:44 PM · gnupg (gpg22)
dkg created T3087: dirmngr, when configured to use an .onion address, should not permit HTTP redirects to a non-onion address in the S1 Public space.
Apr 17 2017, 5:10 PM · dirmngr, gnupg (gpg22)
dkg added a comment to T3086: stop shipping *.skel files.

I've just pushed a branch dkg/no-skel-files which implements this change.

Apr 17 2017, 5:03 PM · In Progress, gnupg (gpg21)
dkg committed rG55b00bcc305e: g10: remove skeleton options files (authored by dkg).
g10: remove skeleton options files
Apr 17 2017, 5:02 PM
dkg created T3086: stop shipping *.skel files in the S1 Public space.
Apr 17 2017, 4:43 PM · In Progress, gnupg (gpg21)
dkg added a comment to T3085: dirmngr is useless on IPv6-only systems.

Can you try with --standard-resolver ?

Apr 17 2017, 4:11 PM

Apr 6 2017

dkg added a comment to T3014: Intermittent crashes in gpgscm on s390x.

I just merged the current git head over on zelenka, which includes b83903f59ec5d49ac579f263da70ebc8dc3645b5, and managed to still get the same segfaults.

Apr 6 2017, 9:32 PM · Debian, Bug Report, gnupg
dkg changed Version from 2.1.19 to 2.1.19, 2.1.20 on T3014: Intermittent crashes in gpgscm on s390x.
Apr 6 2017, 6:14 AM · Debian, Bug Report, gnupg
dkg added a comment to T3014: Intermittent crashes in gpgscm on s390x.

fwiw, this remains a problem on 2.1.20: https://buildd.debian.org/status/fetch.php?pkg=gnupg2&arch=s390x&ver=2.1.20-1&stamp=1491409561&raw=0

Apr 6 2017, 6:13 AM · Debian, Bug Report, gnupg

Apr 4 2017

dkg added a comment to T2948: libdns lookups fails when nssswitch has no "dns" section.

I don't have one of these systems handy to test with, but if the fix in dee026d7 does what it says it does, this sounds like it's probably OK to close in my book. if there are more problems, i'm sure we can re-open it.

Apr 4 2017, 12:29 AM · Restricted Project, Bug Report, gnupg, dirmngr

Apr 3 2017

dkg added a comment to T3014: Intermittent crashes in gpgscm on s390x.

Sure:

Apr 3 2017, 11:39 PM · Debian, Bug Report, gnupg