I've got an example mail. The problem is that the mail itself is "Content-Type: multipart/mixed; boundary="_003_DB4PR08MB01092D175DE8C1861B5D0BC197BF0DB4PR08MB0109eurp_"
"
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Apr 10 2018
dunno how to attach a patch here... trying to copy it verbatim
reproducer
--debug-wait 3
@werner here's the only output I get:
Please kill all existing dirmngr instances and don't run any programs which will trigger it to be started (e.g. Kleopatra). Then run in a _standard_ shell (cmd.exe):
I, too, have this problem. I have Windows 10 Pro 64-bit with BitDefender Total Security. My first reaction when this wasn't working was to disable all functions on BitDefender. That didn't help, so I ran dirmngr as admin in cmd (I despise PowerShell) without any luck. I created a non-admin user and ran it in there, again without luck. I've come up dry. No logs, no output, and no answers. Is there anything shy of downgrading dirmngr that will make this work? Has there been any progress as to figuring this out?
I'll go for a warning / error for now and see if I can fix the renumbering.
Rhat's for the client, right. I never used it. We used to run a Windows 8 instance in a VM to run tests via ssh on it. That worked most not really stable. For obvious reasons I am more interested in the server part ;-)
Thanks. I took these patches and simplified them. Not test tested, though,.
Note:
When we change the allocation, hmac256.c will not be standalone any more (as commented in the head of the file), and we will need to change the compile-command line to include libgpg-error.
I check this report again.
The test is single thread, IIUC.
I would argue that the Windows port of OpenSSH is not unstable at this point, especially given that Microsoft is even providing it as an installable feature in the next regular Windows 10 release. The fact that the port is now using actual OpenSSH version numbers instead of their own 0.x versions lends credence to this as well.
Thanks for the fix! however, the fix only addresses the two flags we currently know about. I've pushed a branch T3880-fix that tries to implement the If the agent does not support the requested flags […] It must reply with a SSH_AGENT_FAILURE message part of the spec.
Apr 9 2018
It is in 2.2.6
That slipped my attention due to the missing gpg22 tag I should have added. Sorry.
Yes. However, I have tested a fix for the empty value.
Is there any ETA for when this might get fixed? We are having the same issue with our keyserver since it's behind a cname.
In fact, renumbering of attachments happens also by just viewing them repeatedly. This likely causes multiple copies somewhere, reducing disk space.
Have you tried it multiple times? If it's unintialized memory access maybe you got lucky?
I still can't reproduce the crash (on Vista).
Thanks for the report and the spelling fixes :-)
Will be in 2.2.6.
Thanks for the pointer. But as long as the Windows ssh server is that instable I see no urgent need to add this to GnuPG.
Oh, you used a single dash and not a double dash in --armor. That is obviously the problem. As per Unix history all option characters may be combined unless they take an option arg; in that case the arg for the option may go directly after the option letter. We can't change that because lots of people and scripts use -rRECIPIENT.
Thanks for the report.
Fixed for forthcoming 2.2.6. Because of T3781: ECC encryption key on-card generation broken.
rG820380335a20: g10: Add "key-attr" command for --card-edit.
I see. Got it.
Apr 7 2018
Apr 6 2018
To be released with 2.26 next week
Right with (2) (1) will not occur if the key has been created with GnuPG. However, we have caches in the code path and further rogue software may create creates, interesting keys (tm). Thus I consider it better to explicitly request keys with cert flag set.
The patch has two parts; (1) detecting signature by incapable key and (2) limiting key with relevant capability.
I think that (1) is enough. I wonder with (2), (1) would not occur.
Forget my former comment. We only need to check subkeys becuase the primary key can always certify.
Here is a new revision of the patch:
I have another patch proposal to check the key usage. However, there is a catch-22. We get the usage flags from the key signatures and thus we can only check them after we checked the key signature.
The gpg20 tag was a typo.
Sorry, the patch above is completely wrong, since pk->pubkey_usage is not the right key to check.
If someone claims this is a kind of vulnerability, I think that what we need to fix is signature checking side:
Speaking about this, similar patch would be required to gpg1.4.
Installed pinentry version is:
The bug is specific to 2.2, which may select available key on card. When such a selection, checking the PK->REQ_USAGE was missed.
Apr 5 2018
Shouldn't this also be applied to STABLE-BRANCH-1-4?