Page MenuHome GnuPG
Feed Advanced Search

Apr 14 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

@gouttegd : setting only-urandom at the distro level problematic due to two factors:

Apr 14 2018, 6:42 PM · libgcrypt, gnupg

Apr 13 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Werner wrote:

we already use the getrandom system call if it is available

Apr 13 2018, 9:05 PM · libgcrypt, gnupg

Apr 12 2018

dkg committed rG40fcddd3a98b: po: Update Spanish translation (authored by emma peel <emma.peel@aktivix.org>).
po: Update Spanish translation
Apr 12 2018, 9:32 PM

Apr 11 2018

dkg created T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.
Apr 11 2018, 8:01 PM · libgcrypt, gnupg

Apr 10 2018

dkg reopened T3880: gpg-agent's ssh-agent does not handle flags in signing requests properly as "Open".

Thanks for the fix! however, the fix only addresses the two flags we currently know about. I've pushed a branch T3880-fix that tries to implement the If the agent does not support the requested flags […] It must reply with a SSH_AGENT_FAILURE message part of the spec.

Apr 10 2018, 12:14 AM · ssh, gpgagent, Bug Report
dkg committed rG381c46818ffa: agent: unknown flags on ssh signing requests cause an error. (authored by dkg).
agent: unknown flags on ssh signing requests cause an error.
Apr 10 2018, 12:12 AM
dkg committed rG55435cdd4fe4: agent: change documentation reference for ssh-agent protocol. (authored by dkg).
agent: change documentation reference for ssh-agent protocol.
Apr 10 2018, 12:12 AM

Apr 5 2018

dkg created T3880: gpg-agent's ssh-agent does not handle flags in signing requests properly.
Apr 5 2018, 5:43 PM · ssh, gpgagent, Bug Report

Mar 27 2018

dkg added a comment to T2019: Order of magnitude degradation in performance in gpg2 cf gpg.

The severe delay caused by check-trustdb continues to cause problems elsewhere in the ecosystem. It would be great to try to address this so that GnuPG was more responsive for routine tasks like importing a single key.

Mar 27 2018, 10:40 PM · Stalled, Bug Report, gnupg

Feb 27 2018

dkg created T3816: please expose "change-usage" subcommand for --edit-key.
Feb 27 2018, 9:49 PM · gnupg (gpg22), Feature Request

Feb 23 2018

dkg added a comment to T3804: --export-options export-minimal,export-clean includes multiple subkey binding signatures when only one is necessary.

This is similar to T3622, but it's not the same thing.

Feb 23 2018, 12:28 AM · gnupg (gpg22)
dkg created T3804: --export-options export-minimal,export-clean includes multiple subkey binding signatures when only one is necessary in the S1 Public space.
Feb 23 2018, 12:28 AM · gnupg (gpg22)

Feb 21 2018

dkg added a comment to T3803: dirmngr issues malformed DNS queries.

hm, i think this is the file:

Feb 21 2018, 8:34 PM · dns, dirmngr, Bug Report
dkg created T3803: dirmngr issues malformed DNS queries.
Feb 21 2018, 8:32 PM · dns, dirmngr, Bug Report

Feb 6 2018

dkg created T3783: gpg-connect-agent: `HELP` lists `SIGKEY <hexstring_with_keygrip>` but only shows `SETKEY`.
Feb 6 2018, 10:36 PM · gpgagent, Bug Report
dkg created T3782: `gpg --sign-key` has prompt implies attempting to sign revoked User IDs even though it won't..
Feb 6 2018, 7:59 PM · Feature Request, gnupg
dkg committed rP822c66815b50: tqt: use UTF-8 instead of ISO-8859-1 (authored by dkg).
tqt: use UTF-8 instead of ISO-8859-1
Feb 6 2018, 4:42 AM

Feb 4 2018

dkg created T3775: enable mixed hidden/non-hidden recipients during encryption.
Feb 4 2018, 10:08 PM · gpgme, Feature Request

Feb 2 2018

dkg created T3772: gpg-zip fails with recipient names that have whitespace in them.
Feb 2 2018, 11:47 PM · gpgtar, Bug Report

Jan 31 2018

dkg created T3767: simplify sharing dirmngr's across multiple GNUPGHOMEs in the S1 Public space.
Jan 31 2018, 7:56 PM · Documentation, Feature Request, gnupg, dirmngr
dkg added a comment to T3348: gpgsm: should default to --disable-crl-checks.

it is the decision of the user to use such a certificate.

Jan 31 2018, 5:04 PM · gpgme, gnupg, S/MIME

Jan 30 2018

dkg added a comment to T3348: gpgsm: should default to --disable-crl-checks.

Additionally, we might want some sort of delayed or batched CRL-checking that doesn't block signature verification with another network interaction, but would protect the user against future problems.

Jan 30 2018, 5:46 PM · gpgme, gnupg, S/MIME

Jan 12 2018

dkg added a comment to T3354: gpgme only builds against two versions of python at once.

it's too bad that this is not considered something worth fixing upstream -- at the moment, debian's python3-gpg will only work with one specific version of python3 because of this, which makes package transitions more complex than they should be.

Jan 12 2018, 8:14 PM · Python, gpgme, Bug Report

Jan 11 2018

dkg created T3734: Extract signature key ID with gpgme.
Jan 11 2018, 2:46 PM · gpgme, Feature Request

Jan 3 2018

dkg added a comment to T3622: --export-options export-minimal,export-clean includes unusable subkeys.

Agreed, Signing subkeys can be useful for checking historical signatures. And even encryption subkeys *can* be useful after their expiration, e.g. when doing historical auditing.

Jan 3 2018, 1:08 AM · Feature Request, gnupg (gpg22)

Dec 31 2017

dkg reopened T3655: Suggest possible choices instead to error out on a typo as "Open".

When i read the manpage, nroff-formatted against an 80-column terminal, it says, literally:

Dec 31 2017, 2:02 AM · gnupg, Bug Report

Dec 29 2017

dkg added a comment to T3655: Suggest possible choices instead to error out on a typo.

Any fix for this should be included in the test suite to avoid a regression :)

Dec 29 2017, 9:55 PM · gnupg, Bug Report
dkg created T3655: Suggest possible choices instead to error out on a typo.
Dec 29 2017, 9:54 PM · gnupg, Bug Report

Dec 21 2017

dkg created T3622: --export-options export-minimal,export-clean includes unusable subkeys.
Dec 21 2017, 7:52 PM · Feature Request, gnupg (gpg22)

Nov 30 2017

dkg committed rG8a2917345ba8: doc: clarify that --encrypt refers to public key encryption (authored by dkg).
doc: clarify that --encrypt refers to public key encryption
Nov 30 2017, 4:26 PM

Nov 21 2017

dkg committed rG91eb242d635f: doc: clarify that --encrypt refers to public key encryption (authored by dkg).
doc: clarify that --encrypt refers to public key encryption
Nov 21 2017, 5:15 PM

Nov 19 2017

dkg added a comment to T3172: drop Changelogs from source tree?.

This decision suggests that the accessibility of the current source tree
for new contributors (who are more likely to find the static, archaic
changelogs distracting) is unimportant.

Nov 19 2017, 11:19 AM

Nov 17 2017

dkg committed rE27b2743eaf96: Clean up word replication. (authored by Yuri Chornoivan <yurchor@ukr.net>).
Clean up word replication.
Nov 17 2017, 2:01 PM

Nov 15 2017

dkg created T3504: "gpg --quiet --encrypt" emits "gpg: automatically retrieved 'test@example.org' via Local".
Nov 15 2017, 5:48 AM · Bug Report

Nov 13 2017

dkg added a comment to T3464: successful decryption with session key reports failure if public key is unknown.

I'm not sure why a special case should be needed -- failure to create
the .kbx should not be a failure for a decryption operation in general.

Nov 13 2017, 5:18 AM · gpgme, Bug Report

Nov 12 2017

dkg added a comment to T3277: decrypting data symmetrically doesn't reliably convey confidentiality property.

So, to protect against this attack, the client needs to do both of the following:

Nov 12 2017, 9:14 PM · Feature Request, gnupg (gpg22)
dkg added a comment to T3277: decrypting data symmetrically doesn't reliably convey confidentiality property.

Here are two examples:

Nov 12 2017, 9:13 PM · Feature Request, gnupg (gpg22)
dkg added a comment to T3277: decrypting data symmetrically doesn't reliably convey confidentiality property.

@werner suggests using an ephemeral home directory. this is an important point.

Nov 12 2017, 9:08 PM · Feature Request, gnupg (gpg22)
dkg added a comment to T3277: decrypting data symmetrically doesn't reliably convey confidentiality property.

@justus asked for examples.

Nov 12 2017, 9:05 PM · Feature Request, gnupg (gpg22)

Nov 11 2017

dkg committed rG2cdc37834261: po/da: Fix Danish confusion between "compressed" and "compromised" (authored by dkg).
po/da: Fix Danish confusion between "compressed" and "compromised"
Nov 11 2017, 11:54 AM
dkg committed rGd048157e87d8: po/da: Fix Danish confusion between "compressed" and "compromised" (authored by dkg).
po/da: Fix Danish confusion between "compressed" and "compromised"
Nov 11 2017, 11:46 AM
dkg committed rG115a04f939de: po/da: Fix Danish confusion between "compressed" and "compromised" (authored by dkg).
po/da: Fix Danish confusion between "compressed" and "compromised"
Nov 11 2017, 11:46 AM

Nov 8 2017

dkg committed rG0471ff9d3bf8: assuan: Reorganize waiting for socket. (authored by dkg).
assuan: Reorganize waiting for socket.
Nov 8 2017, 5:56 PM
dkg committed rG149041b0b917: assuan: Use exponential decay for first 1s of spinlock. (authored by dkg).
assuan: Use exponential decay for first 1s of spinlock.
Nov 8 2017, 5:56 PM
dkg added a comment to T3490: "gpgconf --launch gpg-agent" should not take a full second if the agent isn't already started.

OK, i've pushed 0471ff9d3bf8d6b9a359f3c426d70d0935066907 and 149041b0b917f4298239fe18b5ebd5ead71584a6 to branch T3490-proposal1. It cuts GnuPG's own simple test suite down from about 3 minutes to 1.5 minutes for me. I haven't tested the speedup for the full test suite yet.

Nov 8 2017, 5:48 PM · gnupg (gpg22)
dkg committed rGceac6e9e6c08: assuan: Use exponential decay for first 1s of spinlock. (authored by dkg).
assuan: Use exponential decay for first 1s of spinlock.
Nov 8 2017, 5:46 PM
dkg committed rG1fe8fc56f246: assuan: Reorganize waiting for socket. (authored by dkg).
assuan: Reorganize waiting for socket.
Nov 8 2017, 5:46 PM
dkg added a comment to T3490: "gpgconf --launch gpg-agent" should not take a full second if the agent isn't already started.

To clarify, i'll push them to a separate branch for you to decide whether to merge.

Nov 8 2017, 5:27 PM · gnupg (gpg22)
dkg added a comment to T3490: "gpgconf --launch gpg-agent" should not take a full second if the agent isn't already started.

I'll push some patches for proposal 1.

Nov 8 2017, 5:26 PM · gnupg (gpg22)
dkg created T3490: "gpgconf --launch gpg-agent" should not take a full second if the agent isn't already started.
Nov 8 2017, 3:51 PM · gnupg (gpg22)

Nov 7 2017

dkg added a comment to T3488: support specialized numeric9x4 format for symmetric passphrase.

In the autocrypt spec, this is called a "setup code", not a "backup code" :)

Nov 7 2017, 12:55 PM · Feature Request

Oct 28 2017

dkg added a comment to T3464: successful decryption with session key reports failure if public key is unknown.

agreed, generically changing this check to log_info doesn't make sense. However, in *this circumstance*, gpg actually has no error.

Oct 28 2017, 2:12 PM · gpgme, Bug Report

Oct 27 2017

dkg added a comment to T3464: successful decryption with session key reports failure if public key is unknown.

can you try it with --homedir /does/not/exist

Oct 27 2017, 8:28 AM · gpgme, Bug Report

Oct 24 2017

dkg added a comment to T3464: successful decryption with session key reports failure if public key is unknown.

Hm, perhaps this non-zero return code is due to not being able to write to the GNUPGHOME directory, actually. It goes away when GNUPGHOME is writable. That doesn't make sense either -- this operation doesn't actually depend on being able to write to GNUPGHOME, so it shouldn't return a different error code if GNUPGHOME is unwritable.

Oct 24 2017, 8:43 AM · gpgme, Bug Report
dkg created T3464: successful decryption with session key reports failure if public key is unknown.
Oct 24 2017, 8:38 AM · gpgme, Bug Report

Oct 19 2017

dkg added a comment to T3451: gpgme should report whether a given User ID is marked as "primary" or not..

I guess it depends on whether you want gpgme to be an interface to OpenPGP certificates more generally (in which case, exposing the primary flag would be useful), or just a gpg frontend (in which case, the current behavior might be ok)

Oct 19 2017, 9:48 PM · gpgme, Feature Request
dkg committed rP6aafa61b199a: core: Expect (and verify) a uid on "owner" option. (authored by dkg).
core: Expect (and verify) a uid on "owner" option.
Oct 19 2017, 10:17 AM
dkg committed rG28aa6890588c: agent: Send pinentry the uid of connecting process where possible. (authored by dkg).
agent: Send pinentry the uid of connecting process where possible.
Oct 19 2017, 9:38 AM

Oct 17 2017

dkg added a comment to T3451: gpgme should report whether a given User ID is marked as "primary" or not..

But there can be several user IDs that are marked primary, right? I know that gpg tries to not let that happen, but there are other OpenPGP toolkits out there, and composite/hybridized keys, etc where this could happen.

Oct 17 2017, 3:13 PM · gpgme, Feature Request

Oct 15 2017

dkg created T3451: gpgme should report whether a given User ID is marked as "primary" or not..
Oct 15 2017, 9:59 PM · gpgme, Feature Request

Oct 13 2017

dkg committed rP242b65828948: core: Clean up command line extraction. (authored by dkg).
core: Clean up command line extraction.
Oct 13 2017, 3:23 AM
dkg committed rP1f5b35153120: core: Only scan for the command line if probably on the same host. (authored by dkg).
core: Only scan for the command line if probably on the same host.
Oct 13 2017, 3:23 AM
dkg committed rPd7c54372512f: tty: correct comments (authored by dkg).
tty: correct comments
Oct 13 2017, 3:23 AM

Oct 9 2017

dkg added a comment to T3331: gpg: Address family not supported by protocol if kernel doesn't support ipv6.

I agree with @kristianf that dirmngr should be more clever about this sort of failure. The error message could be clearer at least, but the right response is really to skip all IPv4 addresses if the machine has no IPv4 stack, and to skip all IPv6 addresses if the machine has no IPv6 stack.

Oct 9 2017, 4:15 PM · gnupg (gpg22), dirmngr, Bug Report

Sep 27 2017

dkg created T3430: Documentation should clearly recommend use of `--check-sigs` over `--list-sigs`.
Sep 27 2017, 8:24 PM · Documentation, Bug Report

Sep 26 2017

dkg created T3429: defer use of new signing subkeys.
Sep 26 2017, 10:15 PM · gnupg24, gnupg (gpg23), Feature Request
dkg created T3428: pinentry-curses should be able to avoid showing *s when user enters passphrase.
Sep 26 2017, 8:59 PM · pinentry, Feature Request

Sep 22 2017

dkg added a comment to T3392: keyserver default should include pool onionbalance hkp://jirk5u4osbsr34t5.onion.

I spoke with the author of onionbalance, and they said:

Sep 22 2017, 7:35 PM · Too Old, Keyserver, Feature Request, dirmngr

Sep 19 2017

dkg updated the task description for T3415: GnuPG should refuse to encrypt using 64-bit block ciphers by default.
Sep 19 2017, 10:53 PM · gnupg (gpg23), Bug Report
dkg created T3415: GnuPG should refuse to encrypt using 64-bit block ciphers by default.
Sep 19 2017, 10:52 PM · gnupg (gpg23), Bug Report
dkg created T3414: lists.gnupg.org certificate expired.
Sep 19 2017, 10:50 PM · Bug Report
dkg created T3412: gpg-agent manual page says to always add GPG_TTY to `.bashrc`.
Sep 19 2017, 12:57 AM · Not A Bug, gnupg

Sep 13 2017

dkg renamed T3406: GnuPG should adopt and maintain the bash completion for gpg from GnuPG should adopt and maintain the bash completion to GnuPG should adopt and maintain the bash completion for gpg.
Sep 13 2017, 10:14 PM · Feature Request
dkg created T3406: GnuPG should adopt and maintain the bash completion for gpg.
Sep 13 2017, 9:42 PM · Feature Request

Sep 12 2017

dkg added a comment to T3278: explicit key expiration date/time is interpreted as UTC, is echoed back using local time, confusion ensues.

I'm fine with (and i totally understand) wanting nothing but UTC in the machine interface and internal representations.

Sep 12 2017, 5:36 PM · gnupg24, gnupg (gpg23), Documentation, Bug Report
dkg added a comment to T3398: fingerprint-based import screener is no defense against malice.

I've changed the text of this report from "filter" to "screener" to match the preferred terminology. thanks for the clarification.

Sep 12 2017, 2:16 PM · gnupg24, gnupg (gpg23), Feature Request
dkg renamed T3398: fingerprint-based import screener is no defense against malice from fingerprint-based import filters are no defense against malice to fingerprint-based import screener is no defense against malice.
Sep 12 2017, 2:13 PM · gnupg24, gnupg (gpg23), Feature Request

Sep 9 2017

dkg created T3404: gpgv warns about "--compliance=gnupg mode" but does not support --compliance=gnupg as an argument.
Sep 9 2017, 7:20 PM · gnupg (gpg22), gpgv, Bug Report
dkg closed T3399: gpg-agent: add a configure option for default calibration time for s2k as Resolved.
Sep 9 2017, 12:46 AM · gpgagent, Feature Request
dkg claimed T3399: gpg-agent: add a configure option for default calibration time for s2k.
Sep 9 2017, 12:46 AM · gpgagent, Feature Request
dkg added a comment to T3399: gpg-agent: add a configure option for default calibration time for s2k.

I think this is now resolved, as of rG926d07c5fa05

Sep 9 2017, 12:45 AM · gpgagent, Feature Request
dkg committed rG926d07c5fa05: agent: compile-time configuration of s2k calibration. (authored by dkg).
agent: compile-time configuration of s2k calibration.
Sep 9 2017, 12:45 AM

Sep 8 2017

dkg created T3400: gpg-agent runtime option for s2k calibration time in the S1 Public space.
Sep 8 2017, 9:19 PM · gpgagent, Feature Request
dkg created T3399: gpg-agent: add a configure option for default calibration time for s2k.
Sep 8 2017, 9:17 PM · gpgagent, Feature Request
dkg committed rG73ff075204df: gpg: default to AES-256. (authored by dkg).
gpg: default to AES-256.
Sep 8 2017, 8:33 PM
dkg committed rG909fbca19678: gpg: default to 3072-bit RSA keys. (authored by dkg).
gpg: default to 3072-bit RSA keys.
Sep 8 2017, 5:38 PM
dkg committed rG7955262151a5: gpgsm: default to 3072-bit keys. (authored by dkg).
gpgsm: default to 3072-bit keys.
Sep 8 2017, 5:38 PM
dkg created T3398: fingerprint-based import screener is no defense against malice.
Sep 8 2017, 5:34 PM · gnupg24, gnupg (gpg23), Feature Request
dkg added a comment to T3389: canonical OpenPGP certificate export.

I am not proposing changing the order of the *hashed* subpackets in a signature. I'm proposing removing/changing/canonicalizing the *unhashed* subpackets in a signature. Sorry if i didn't make that clear enough in the initial message.

Sep 8 2017, 4:22 PM · gnupg, Feature Request
dkg added a comment to T3389: canonical OpenPGP certificate export.

I thoroughly agree that this is not required by the specs.

Sep 8 2017, 8:30 AM · gnupg, Feature Request
dkg added a comment to T3278: explicit key expiration date/time is interpreted as UTC, is echoed back using local time, confusion ensues.

I think any existing script that assumes UTC should add an explicit Z suffix. (that is, i don't think the breakage is a big deal, and anyone writing scripts that needs this kind of precision will be more likely be thankful that we have a sensible, normalized interface).

Sep 8 2017, 7:30 AM · gnupg24, gnupg (gpg23), Documentation, Bug Report
dkg created T3397: gpg: --refresh-keys became extremely verbose and complaining in the S1 Public space.
Sep 8 2017, 6:14 AM · gnupg (gpg22)
dkg added a comment to T3393: quick-key-manipulation.scm tests fail on reproducible-builds infrastructure..

Is it possible that this is related to T3278 ?

Sep 8 2017, 6:11 AM · Bug Report, gnupg (gpg22)
dkg added a comment to T3278: explicit key expiration date/time is interpreted as UTC, is echoed back using local time, confusion ensues.

fwiw, i agree that GnuPG should interpret these as ISO-8601 strings. At the very least:

Sep 8 2017, 6:09 AM · gnupg24, gnupg (gpg23), Documentation, Bug Report
dkg created T3396: use swig to generate Ruby bindings for gpgme in the S1 Public space.
Sep 8 2017, 6:02 AM · Feature Request, gpgme
dkg created T3395: use swig to generate Perl bindings for gpgme in the S1 Public space.
Sep 8 2017, 6:01 AM · Feature Request, gpgme
dkg added a comment to T3393: quick-key-manipulation.scm tests fail on reproducible-builds infrastructure..

Nice find, @gniibe ! So this looks like a bug either in GnuPG's test suite, or in parse_expire_string, right? How do you think it should be addressed?

Sep 8 2017, 5:46 AM · Bug Report, gnupg (gpg22)
dkg created T3394: "gpgconf --list-options gpg-agent" fails if bad option is present in ~/.gnupg/gpg-agent.conf in the S1 Public space.
Sep 8 2017, 2:45 AM · Documentation, Bug Report, gpgagent
dkg added a comment to T3370: gpg --list-packets should show symmetric algorithm for PKESK (if decryptable).

The comment from aa above appears to be misdirected/spam.

Sep 8 2017, 2:18 AM · Feature Request
dkg created T3393: quick-key-manipulation.scm tests fail on reproducible-builds infrastructure. in the S1 Public space.
Sep 8 2017, 2:15 AM · Bug Report, gnupg (gpg22)