We can later decide whether to backport this to 2.2
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Oct 20 2017
Sep 28 2017
For workaround (master branch with rG0a7661129499), moving the private key file to *.key.bak can do that.
Sep 27 2017
Sep 26 2017
Sep 21 2017
Sep 19 2017
But not for 2.2
Sep 18 2017
Sep 12 2017
I've changed the text of this report from "filter" to "screener" to match the preferred terminology. thanks for the clarification.
I still consider the import screener (the term filter is used in a different way now) a big mess. Using the import feature to maintain the idea of a curated keyring is a bad idea because gpg has not been designed with this in mind. We spent so much time on this screener already and problems pop up again and again.
Sep 8 2017
I am not proposing changing the order of the *hashed* subpackets in a signature. I'm proposing removing/changing/canonicalizing the *unhashed* subpackets in a signature. Sorry if i didn't make that clear enough in the initial message.
But wait. Does my idea really help with comparing? I doubt it because a signature also includes a date and other variable stuff and thus they are already binary identical or it is a different signature.
Right we can't change the order of signature subpackets after they have been created. Given that we create subpackets by directly appending them to a memory buffer instead of keeping a list of subpackets to create, the least invasive method would be a function to shuffle that memory buffer right before the signature is computed.
I thoroughly agree that this is not required by the specs.
That is not required by the specs. Another way is to provide a tool to compare keys. That seems to be easier to me. Also consider the cases that there are new new packets or signature subpackets with unknown properties to the current implementations. What about different encodings in signed key material?
Sep 7 2017
Aug 7 2017
Jul 31 2017
Jul 13 2017
May 3 2017
Mar 30 2017
Mar 6 2017
Feb 15 2017
Jan 6 2017
Dec 9 2016
This would emit the "content-encryption key", as specified in
https://tools.ietf.org/html/rfc5652#section-6.3