@gouttegd : setting only-urandom at the distro level problematic due to two factors:
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Apr 14 2018
Apr 13 2018
Werner wrote:
we already use the getrandom system call if it is available
Apr 12 2018
Apr 11 2018
Apr 10 2018
Thanks for the fix! however, the fix only addresses the two flags we currently know about. I've pushed a branch T3880-fix that tries to implement the If the agent does not support the requested flags […] It must reply with a SSH_AGENT_FAILURE message part of the spec.
Apr 5 2018
Mar 27 2018
The severe delay caused by check-trustdb continues to cause problems elsewhere in the ecosystem. It would be great to try to address this so that GnuPG was more responsive for routine tasks like importing a single key.
Feb 27 2018
Feb 23 2018
This is similar to T3622, but it's not the same thing.
Feb 21 2018
hm, i think this is the file:
Feb 6 2018
Feb 4 2018
Feb 2 2018
Jan 31 2018
it is the decision of the user to use such a certificate.
Jan 30 2018
Additionally, we might want some sort of delayed or batched CRL-checking that doesn't block signature verification with another network interaction, but would protect the user against future problems.
Jan 12 2018
it's too bad that this is not considered something worth fixing upstream -- at the moment, debian's python3-gpg will only work with one specific version of python3 because of this, which makes package transitions more complex than they should be.
Jan 11 2018
Jan 3 2018
Agreed, Signing subkeys can be useful for checking historical signatures. And even encryption subkeys *can* be useful after their expiration, e.g. when doing historical auditing.
Dec 31 2017
When i read the manpage, nroff-formatted against an 80-column terminal, it says, literally:
Dec 29 2017
Any fix for this should be included in the test suite to avoid a regression :)
Dec 21 2017
Nov 30 2017
Nov 21 2017
Nov 19 2017
This decision suggests that the accessibility of the current source tree
for new contributors (who are more likely to find the static, archaic
changelogs distracting) is unimportant.
Nov 17 2017
Nov 15 2017
Nov 13 2017
I'm not sure why a special case should be needed -- failure to create
the .kbx should not be a failure for a decryption operation in general.
Nov 12 2017
So, to protect against this attack, the client needs to do both of the following:
Here are two examples:
@werner suggests using an ephemeral home directory. this is an important point.
@justus asked for examples.
Nov 11 2017
Nov 8 2017
OK, i've pushed 0471ff9d3bf8d6b9a359f3c426d70d0935066907 and 149041b0b917f4298239fe18b5ebd5ead71584a6 to branch T3490-proposal1. It cuts GnuPG's own simple test suite down from about 3 minutes to 1.5 minutes for me. I haven't tested the speedup for the full test suite yet.
To clarify, i'll push them to a separate branch for you to decide whether to merge.
I'll push some patches for proposal 1.
Nov 7 2017
In the autocrypt spec, this is called a "setup code", not a "backup code" :)
Oct 28 2017
agreed, generically changing this check to log_info doesn't make sense. However, in *this circumstance*, gpg actually has no error.
Oct 27 2017
can you try it with --homedir /does/not/exist
Oct 24 2017
Hm, perhaps this non-zero return code is due to not being able to write to the GNUPGHOME directory, actually. It goes away when GNUPGHOME is writable. That doesn't make sense either -- this operation doesn't actually depend on being able to write to GNUPGHOME, so it shouldn't return a different error code if GNUPGHOME is unwritable.
Oct 19 2017
I guess it depends on whether you want gpgme to be an interface to OpenPGP certificates more generally (in which case, exposing the primary flag would be useful), or just a gpg frontend (in which case, the current behavior might be ok)
Oct 17 2017
But there can be several user IDs that are marked primary, right? I know that gpg tries to not let that happen, but there are other OpenPGP toolkits out there, and composite/hybridized keys, etc where this could happen.
Oct 15 2017
Oct 13 2017
Oct 9 2017
I agree with @kristianf that dirmngr should be more clever about this sort of failure. The error message could be clearer at least, but the right response is really to skip all IPv4 addresses if the machine has no IPv4 stack, and to skip all IPv6 addresses if the machine has no IPv6 stack.
Sep 27 2017
Sep 26 2017
Sep 22 2017
I spoke with the author of onionbalance, and they said:
Sep 19 2017
Sep 13 2017
Sep 12 2017
I'm fine with (and i totally understand) wanting nothing but UTC in the machine interface and internal representations.
I've changed the text of this report from "filter" to "screener" to match the preferred terminology. thanks for the clarification.
Sep 9 2017
I think this is now resolved, as of rG926d07c5fa05
Sep 8 2017
I am not proposing changing the order of the *hashed* subpackets in a signature. I'm proposing removing/changing/canonicalizing the *unhashed* subpackets in a signature. Sorry if i didn't make that clear enough in the initial message.
I thoroughly agree that this is not required by the specs.
I think any existing script that assumes UTC should add an explicit Z suffix. (that is, i don't think the breakage is a big deal, and anyone writing scripts that needs this kind of precision will be more likely be thankful that we have a sensible, normalized interface).
Is it possible that this is related to T3278 ?
fwiw, i agree that GnuPG should interpret these as ISO-8601 strings. At the very least:
Nice find, @gniibe ! So this looks like a bug either in GnuPG's test suite, or in parse_expire_string, right? How do you think it should be addressed?
The comment from aa above appears to be misdirected/spam.