Page MenuHome GnuPG
Feed Advanced Search

Nov 5 2018

werner changed the status of T3464: successful decryption with session key reports failure if public key is unknown from Open to Testing.

Looking at the GPGME code the ERROR stati don't matter because they are only used to return a better error code in case an operation failed. The specific ones are not even recognized.

Nov 5 2018, 10:33 AM · gpgme, Bug Report
werner closed T3766: GnuPG should reject keys that are subkeys of itself as Wontfix.
Nov 5 2018, 10:15 AM · gnupg (gpg22), Feature Request
werner closed T3773: private subkeys are never deleted on non-master instances as Invalid.

No info received.

Nov 5 2018, 10:12 AM · Info Needed, OpenPGP, gnupg (gpg22), Bug Report
werner closed T3033: bug: dirmngr latches SRV port cross-scheme as Resolved.

No more complaints thus time to close.

Nov 5 2018, 9:30 AM · Restricted Project, gnupg (gpg22), Bug Report, dirmngr

Oct 26 2018

werner created T4233: GnuPG 2.2.11 release.
Oct 26 2018, 6:16 PM · gnupg (gpg22), Release Info

Oct 15 2018

gniibe renamed T4177: card: After "forcesig" command makes card "not forced", signing fails by: Bad PIN from card: After "forcesig" command makes "not forced", signing fails by: Bad PIN to card: After "forcesig" command makes card "not forced", signing fails by: Bad PIN.
Oct 15 2018, 10:36 AM · scd, gnupg (gpg22)
gniibe changed the status of T4177: card: After "forcesig" command makes card "not forced", signing fails by: Bad PIN from Open to Testing.
Oct 15 2018, 4:24 AM · scd, gnupg (gpg22)
gniibe updated the task description for T4177: card: After "forcesig" command makes card "not forced", signing fails by: Bad PIN.
Oct 15 2018, 3:59 AM · scd, gnupg (gpg22)
gniibe updated the task description for T4177: card: After "forcesig" command makes card "not forced", signing fails by: Bad PIN.
Oct 15 2018, 3:57 AM · scd, gnupg (gpg22)
gniibe created T4177: card: After "forcesig" command makes card "not forced", signing fails by: Bad PIN.
Oct 15 2018, 3:56 AM · scd, gnupg (gpg22)

Oct 10 2018

werner changed the status of T4146: GPG Agent fails in parallel: "gpg: decryption failed: No secret key" from Open to Testing.
Oct 10 2018, 12:10 PM · gnupg (gpg22), MacOS, Bug Report
werner added a comment to T4146: GPG Agent fails in parallel: "gpg: decryption failed: No secret key".

Please put

Oct 10 2018, 12:09 PM · gnupg (gpg22), MacOS, Bug Report

Sep 26 2018

andy added a comment to T4146: GPG Agent fails in parallel: "gpg: decryption failed: No secret key".

I ran gpgconf --kill gpg-agent and then the suggested command for i in {1..10}; do gpg -v --no-tty --verbose -o - encrypted.gpg 2>mylog.$i > /dev/null & done. (I was already running with --verbose, does -v add something else?)

Sep 26 2018, 11:09 PM · gnupg (gpg22), MacOS, Bug Report
BenM added a comment to T4146: GPG Agent fails in parallel: "gpg: decryption failed: No secret key".

In the interests of completeness I also tried it on a much larger file (1GB) which was both signed and encrypted. I also set the decryption to show the session key just to confirm it was decrypting since the plaintext was being sent to /dev/null.

Sep 26 2018, 10:58 PM · gnupg (gpg22), MacOS, Bug Report
BenM added a comment to T4146: GPG Agent fails in parallel: "gpg: decryption failed: No secret key".

I am unable to replicate this on OS X 10.9 Mavericks.

Sep 26 2018, 10:45 PM · gnupg (gpg22), MacOS, Bug Report

Sep 25 2018

werner added a comment to T4146: GPG Agent fails in parallel: "gpg: decryption failed: No secret key".

Running with -v would really be helpful.

Sep 25 2018, 11:54 AM · gnupg (gpg22), MacOS, Bug Report

Sep 22 2018

andy added a comment to T4146: GPG Agent fails in parallel: "gpg: decryption failed: No secret key".

I made a large file for testing, but it doesn't matter. There's an arbitrary parallel limit where gpg will crash.

Sep 22 2018, 11:43 PM · gnupg (gpg22), MacOS, Bug Report

Sep 18 2018

werner added projects to T4146: GPG Agent fails in parallel: "gpg: decryption failed: No secret key": MacOS, gnupg (gpg22).

We need a way to replicate your problem, a few questions first:

Sep 18 2018, 9:10 AM · gnupg (gpg22), MacOS, Bug Report

Sep 12 2018

dkg added a comment to T3464: successful decryption with session key reports failure if public key is unknown.

sorry, i haven't had time to test gpgme with those changes myself. i hope someone can do so.

Sep 12 2018, 4:53 PM · gpgme, Bug Report
werner added a comment to T3464: successful decryption with session key reports failure if public key is unknown.

The background of my earlier comment was that I didn't tested GPGME in this regard.

Sep 12 2018, 4:19 PM · gpgme, Bug Report
dkg added a comment to T3464: successful decryption with session key reports failure if public key is unknown.

if gpgme doesn't rely on the return value, but instead on parsing the --status-fd for errors, then there will still be an ERROR printed:

Sep 12 2018, 4:12 PM · gpgme, Bug Report
werner added a comment to T3464: successful decryption with session key reports failure if public key is unknown.

Okay. So for GPGME should we add --no-keyring if --override-session-key is also enabled? I think this would be better than relying on the fact that gpgme ignores the returned error code.

Sep 12 2018, 12:35 PM · gpgme, Bug Report
dkg removed a project from T3464: successful decryption with session key reports failure if public key is unknown: Info Needed.

yes, it looks like using --no-keyring does change the return code from 2 to 0 for me.

Sep 12 2018, 6:13 AM · gpgme, Bug Report

Sep 11 2018

werner added a project to T3464: successful decryption with session key reports failure if public key is unknown: Info Needed.

@dkg does --no-keyring solves the problem for you?

Sep 11 2018, 10:36 AM · gpgme, Bug Report
werner closed T2968: gpg --search: Connection closed in DNS as Resolved.

We assume that this has meanwhile been fixed.

Sep 11 2018, 10:34 AM · Info Needed, gnupg (gpg22), Bug Report, Debian, Keyserver, dirmngr

Sep 5 2018

justus added a comment to T4119: gpg --symmetric emits a SEIP packet, but no MDC.

Thanks for the clarification.

Sep 5 2018, 1:51 PM · gnupg (gpg22), Bug Report
werner closed T4119: gpg --symmetric emits a SEIP packet, but no MDC as Invalid.

Which is the correct way to handle this. We merely gave the MDC packet a standard packet structure so to help with debugging. Decryption needs to defer the 22 bytes to be able to detect the MDC packet.

Sep 5 2018, 12:40 PM · gnupg (gpg22), Bug Report
gniibe added a comment to T4119: gpg --symmetric emits a SEIP packet, but no MDC.

Perhaps, the missing length information in compressed data packet is confusing. The length can be determined by the assumption of existence of 22-byte MDC packet.

Sep 5 2018, 3:58 AM · gnupg (gpg22), Bug Report
gniibe added a comment to T4119: gpg --symmetric emits a SEIP packet, but no MDC.

Here is my understanding.

Sep 5 2018, 3:55 AM · gnupg (gpg22), Bug Report

Sep 4 2018

gniibe claimed T4119: gpg --symmetric emits a SEIP packet, but no MDC.

I can see MDC packet of 22-byte (which starts by 0xd3 0x14, and then 20-byte SHA-1 hash), when SEIP data packet is decrypted.
I don't see your situation.
How about with no compression (-z 0)? I mean, compression is not applied to MDC packet.

Sep 4 2018, 7:35 AM · gnupg (gpg22), Bug Report

Aug 31 2018

justus created T4119: gpg --symmetric emits a SEIP packet, but no MDC.
Aug 31 2018, 11:45 AM · gnupg (gpg22), Bug Report

Aug 29 2018

werner closed T3194: Export of keys fails (gets mangled) if stdout is redirected to a file on Windows as Invalid.

There is no way for us to fix. It is a shell issue.

Aug 29 2018, 3:31 PM · gnupg (gpg22), Windows 32, Bug Report
werner closed T3912: generate_keypair() in g10/keygen.c seems unclear as Resolved.

The “this” is used so that we don't have too many strings to translate.
I added a call to print_further_info which will in --verbose mode explain it.

Aug 29 2018, 3:25 PM · Documentation, gnupg (gpg22)
werner closed T3906: A way to list the supported ECC curves as Resolved.
Aug 29 2018, 3:15 PM · Documentation, gnupg (gpg22)
werner lowered the priority of T3753: Bad self-signatures and missing subkey usage flags when creating ECDSA/Ed25519 keys in batch mode from Normal to Low.
Aug 29 2018, 2:57 PM · gnupg24, Bug Report
werner added a project to T2968: gpg --search: Connection closed in DNS: Info Needed.

@elonsatoshi: Were you able to check this with 2.2.9 which has a fix for the resolver?

Aug 29 2018, 2:53 PM · Info Needed, gnupg (gpg22), Bug Report, Debian, Keyserver, dirmngr
werner closed T1055: Special characters encoding issue with LDAP keyserver. as Wontfix.

We won't do that. Those with badly encoded user ids should create new keys or meanwhile have done so. The whole charset back and forth encoding adds a lot of complexity for some legacy applications. Frankly I would like to get rid of all code conversions and stick to utf-8.

Aug 29 2018, 2:50 PM · gnupg (gpg22), Feature Request
werner lowered the priority of T2908: dirmngr can't be build w/o LDAP from Normal to Low.
Aug 29 2018, 2:44 PM · dirmngr, gnupg (gpg22), Bug Report, gnupg
werner added a comment to T3277: decrypting data symmetrically doesn't reliably convey confidentiality property.

In T3464 is is described how you can do it. Sure, in your case you want to have a home directory so that the agent and pinentry can work. --no-keyring makes sure that a decryption with a private key can't happen. How we have the cache for symmetric encrypted data which you can disable with --no-symkey-cache.

Aug 29 2018, 2:43 PM · Feature Request, gnupg (gpg22)
Valodim added a comment to T3277: decrypting data symmetrically doesn't reliably convey confidentiality property.

I'm sorry but the explanation you give does not address the original issue I described, and which dkg then clarified. The discussion about AE is tangentially related, but the issue I described relates to the gpg interface:

Aug 29 2018, 2:01 PM · Feature Request, gnupg (gpg22)
werner closed T3277: decrypting data symmetrically doesn't reliably convey confidentiality property as Invalid.

To use encryption and for both purposes: encryption and authentication.

Aug 29 2018, 1:01 PM · Feature Request, gnupg (gpg22)
werner added a comment to T3464: successful decryption with session key reports failure if public key is unknown.

I was already implementing a --no-homedir when I figured that we have --no-keyring. Using that with any homedir fulfills the requested purpose.

Aug 29 2018, 12:49 PM · gpgme, Bug Report
werner closed T3353: Session env vars and environment variables for gpg as Resolved.

Will be in 2.2.10

Aug 29 2018, 10:03 AM · gnupg (gpg22), Documentation, Bug Report
wiktor-k added a comment to T4060: Add ability to mark critical notations as "recognized" during signature verification.

Thank you!

Aug 29 2018, 9:50 AM · gnupg, gpgme, Feature Request
werner closed T4060: Add ability to mark critical notations as "recognized" during signature verification as Resolved.

Will be in 2.2.10

Aug 29 2018, 9:47 AM · gnupg, gpgme, Feature Request

Aug 28 2018

werner closed T3490: "gpgconf --launch gpg-agent" should not take a full second if the agent isn't already started as Resolved.

Backport done for 2.2.10

Aug 28 2018, 5:03 PM · gnupg (gpg22)
werner moved T3490: "gpgconf --launch gpg-agent" should not take a full second if the agent isn't already started from Backlog to For next release on the gnupg (gpg22) board.
Aug 28 2018, 4:57 PM · gnupg (gpg22)
werner moved T4088: gpg outputs info to the tty despite that it used the Pinentry from Backlog to For next release on the gnupg (gpg22) board.
Aug 28 2018, 4:19 PM · gnupg (gpg20), Bug Report
werner closed T3252: Track the origin of a key as Resolved.

AFAICS this is now implemented. We have the option --with-key-origin and even support in GPGME.

Aug 28 2018, 4:16 PM · gnupg (gpg22)
aheinecke added a comment to T2917: --locate-key should re-fetch key via WKD if it is expired.

Without KEYLIST_MODE_WKD I also can't implement the desired behavior in a MUA using GnuPG.

Aug 28 2018, 4:05 PM · gnupg (gpg22), Bug Report
aheinecke added a comment to T2917: --locate-key should re-fetch key via WKD if it is expired.

Why the restriction to keyorg wkd ?

Aug 28 2018, 4:03 PM · gnupg (gpg22), Bug Report
werner closed T2917: --locate-key should re-fetch key via WKD if it is expired as Resolved.

Done. To be released with 2.2.10.

Aug 28 2018, 3:42 PM · gnupg (gpg22), Bug Report

Aug 21 2018

wheelerlaw added a comment to T3065: dirmngr: proxy issues with dnslookup causing failure.

A workaround for this until the HTTP client is fixed is to just use curl instead:

Aug 21 2018, 5:59 PM · gnupg (gpg22), dns, dirmngr
wheelerlaw added a comment to T3065: dirmngr: proxy issues with dnslookup causing failure.

I am running into the same exact issue. It seems that dirmng is incorrectly attempting to resolve the addresses for the keyservers despite having been given an HTTP proxy to connect through.

Aug 21 2018, 5:31 PM · gnupg (gpg22), dns, dirmngr

Jul 25 2018

werner created T4088: gpg outputs info to the tty despite that it used the Pinentry .
Jul 25 2018, 10:15 AM · gnupg (gpg20), Bug Report

Jul 12 2018

werner closed T4036: gnupg 2.2.9 release, a subtask of T4050: GnuPG fails to decrypt file encrypted with more than one password with any password but the first, as Resolved.
Jul 12 2018, 4:54 PM · gnupg (gpg22)

Jul 9 2018

werner closed T3804: --export-options export-minimal,export-clean includes multiple subkey binding signatures when only one is necessary as Resolved.

Fixed for 2.2.9.

Jul 9 2018, 12:17 PM · gnupg (gpg22)
werner closed T3622: --export-options export-minimal,export-clean includes unusable subkeys as Resolved.

To be released with 2.2.9

Jul 9 2018, 10:46 AM · Feature Request, gnupg (gpg22)

Jul 8 2018

wiktor-k added a comment to T4060: Add ability to mark critical notations as "recognized" during signature verification.

Agreed, after the verification succeeds the caller can (and probably will) check the signature notations.

Jul 8 2018, 9:49 PM · gnupg, gpgme, Feature Request
werner triaged T4060: Add ability to mark critical notations as "recognized" during signature verification as Normal priority.

re: last question: Marking a notation as recognized does not mean gpg does do anything with it or that it demands this notation. The latter can be handled by the caller. For example, gpg knows about "preferred-email-encoding@pgp.com" but does not apply any semantic to it.

Jul 8 2018, 7:49 AM · gnupg, gpgme, Feature Request

Jul 6 2018

werner edited projects for T2917: --locate-key should re-fetch key via WKD if it is expired, added: gnupg (gpg22); removed gnupg.
Jul 6 2018, 9:10 AM · gnupg (gpg22), Bug Report
werner added a comment to T2917: --locate-key should re-fetch key via WKD if it is expired.

Actually the --locate-key command differs from the implicit use of locate key code when encrypting to a mail address.
After importing the expired key and running for example

Jul 6 2018, 9:08 AM · gnupg (gpg22), Bug Report
werner closed T4050: GnuPG fails to decrypt file encrypted with more than one password with any password but the first as Wontfix.

Won't fix for 2.2 or CFB encryption.

Jul 6 2018, 8:37 AM · gnupg (gpg22)
werner added a comment to T4050: GnuPG fails to decrypt file encrypted with more than one password with any password but the first.

My bad. I looked at the wrong working copy. Will pick that commit.

Jul 6 2018, 7:55 AM · gnupg (gpg22)
gniibe added a subtask for T4050: GnuPG fails to decrypt file encrypted with more than one password with any password but the first: T4036: gnupg 2.2.9 release.
Jul 6 2018, 6:59 AM · gnupg (gpg22)
gniibe added a comment to T4050: GnuPG fails to decrypt file encrypted with more than one password with any password but the first.

No, it is your fix: rG278d87465685: gpg: Clear the symmetric passphrase cache for encrypted session keys..
Please cherry pick it to 2.2 branch.

Jul 6 2018, 6:58 AM · gnupg (gpg22)

Jul 5 2018

werner closed T4046: GnuPG fails to verify signatures that have a issuer fingerprint but no issuer subpacket as Resolved.

Thanks. The entire getkey.c code better needs a complete overhaul for before we add v5 keys.

Jul 5 2018, 9:57 PM · gnupg (gpg22)
werner claimed T4046: GnuPG fails to verify signatures that have a issuer fingerprint but no issuer subpacket.
Jul 5 2018, 5:24 PM · gnupg (gpg22)
werner lowered the priority of T3101: GnuPG 2.2 cannot import secret keys from 1.4/2.0's secring.gpg directly (if it is expired by original expiration date) from High to Normal.

We have a workaround thus lowering the priority.

Jul 5 2018, 5:07 PM · workaround, gnupg, Bug Report
werner updated subscribers of T4050: GnuPG fails to decrypt file encrypted with more than one password with any password but the first.

It seems @gniibe fixed that en-passant in master. At least I can only replicate this with 2.2.

Jul 5 2018, 4:57 PM · gnupg (gpg22)

Jul 3 2018

aheinecke added a revision to T2917: --locate-key should re-fetch key via WKD if it is expired: D463: Add ctx flag for auto-key-locate.
Jul 3 2018, 6:03 PM · gnupg (gpg22), Bug Report
werner triaged T4050: GnuPG fails to decrypt file encrypted with more than one password with any password but the first as High priority.
Jul 3 2018, 11:38 AM · gnupg (gpg22)
gniibe closed T3900: Memory leak in check_sig_and_print as Resolved.
Jul 3 2018, 2:14 AM · gnupg (gpg22), Bug Report

Jul 2 2018

justus created T4050: GnuPG fails to decrypt file encrypted with more than one password with any password but the first in the S1 Public space.
Jul 2 2018, 1:47 PM · gnupg (gpg22)
aheinecke added a comment to T2917: --locate-key should re-fetch key via WKD if it is expired.

Maybe a first step would be a "KEYLIST_MODE_WKD" which sets "auto-key-locate clear,nodefault,wkd" (Would be nice for T3910 ) or just a ctx_flag "auto-key-locate" so that the caller can decide?

Jul 2 2018, 11:13 AM · gnupg (gpg22), Bug Report
werner raised the priority of T2917: --locate-key should re-fetch key via WKD if it is expired from Normal to High.
Jul 2 2018, 10:39 AM · gnupg (gpg22), Bug Report

Jun 28 2018

werner triaged T4046: GnuPG fails to verify signatures that have a issuer fingerprint but no issuer subpacket as Normal priority.
Jun 28 2018, 9:11 PM · gnupg (gpg22)
justus added a comment to T4046: GnuPG fails to verify signatures that have a issuer fingerprint but no issuer subpacket.

Attaching files is gone, but here they are inline:

Jun 28 2018, 4:57 PM · gnupg (gpg22)
justus created T4046: GnuPG fails to verify signatures that have a issuer fingerprint but no issuer subpacket in the S1 Public space.
Jun 28 2018, 4:52 PM · gnupg (gpg22)

Jun 22 2018

psusi added a comment to T3101: GnuPG 2.2 cannot import secret keys from 1.4/2.0's secring.gpg directly (if it is expired by original expiration date).

Ahh there we go... I just did a --recv-keys to update from the keyserver and that picked up the extended expiration date.

Jun 22 2018, 2:38 PM · workaround, gnupg, Bug Report
werner added a comment to T3101: GnuPG 2.2 cannot import secret keys from 1.4/2.0's secring.gpg directly (if it is expired by original expiration date).

The problem here is that we we did not sync the pubring with the secring in old version (2.1 removed the secring concept also due to that syncing problem). Now if we migrate (or plainly import a secring.gpg), gpg does not see any updated self-signatures and this is the reason why outdated self-signatures are used.

Jun 22 2018, 9:16 AM · workaround, gnupg, Bug Report
werner raised the priority of T3101: GnuPG 2.2 cannot import secret keys from 1.4/2.0's secring.gpg directly (if it is expired by original expiration date) from Normal to High.
Jun 22 2018, 9:06 AM · workaround, gnupg, Bug Report
werner merged T4039: gnupg 2.1+ does not recognize subkeys with extended expiration dates into T3101: GnuPG 2.2 cannot import secret keys from 1.4/2.0's secring.gpg directly (if it is expired by original expiration date).
Jun 22 2018, 9:04 AM · workaround, gnupg, Bug Report
gniibe added a comment to T3101: GnuPG 2.2 cannot import secret keys from 1.4/2.0's secring.gpg directly (if it is expired by original expiration date).

GnuPG itself does that in in gnupg/g10/migrate.c. We need to fixed this.

Jun 22 2018, 4:40 AM · workaround, gnupg, Bug Report

Jun 19 2018

ditty added a comment to T3101: GnuPG 2.2 cannot import secret keys from 1.4/2.0's secring.gpg directly (if it is expired by original expiration date).

Do we have an update on this? I seem to be having similar issue. Cannot import a key from my old gpg 1.x version to gpg 2.x version

Jun 19 2018, 8:57 PM · workaround, gnupg, Bug Report
werner closed T3755: TLS hostname verification using hostname from DNS instead of supplied hostname as Resolved.
Jun 19 2018, 1:34 PM · gnupg (gpg22), dns, dirmngr

Jun 11 2018

gniibe closed T3844: Able to certify public keys without a certify key present when using smartcard. as Resolved.

Yes, closing.

Jun 11 2018, 8:41 AM · gnupg (gpg22), Bug Report

Jun 9 2018

werner added a comment to T3844: Able to certify public keys without a certify key present when using smartcard..

So we had two releases with the fist. Can we set this bug to resolved?

Jun 9 2018, 11:35 AM · gnupg (gpg22), Bug Report

Jun 8 2018

dkg added a comment to T3844: Able to certify public keys without a certify key present when using smartcard..

fwiw, i agree that if there's any security vulnerability here, it is in the verification side, not the creation side.

Jun 8 2018, 11:58 PM · gnupg (gpg22), Bug Report
marcus added a comment to T4000: GnuPG does not check encrypted messages for well-formed composition.

Yep. ?

Jun 8 2018, 1:48 PM · gnupg (gpg22), Bug Report
werner closed T4000: GnuPG does not check encrypted messages for well-formed composition as Resolved.
Jun 8 2018, 11:16 AM · gnupg (gpg22), Bug Report
werner changed the status of T4012: Diagnostic is shown with the original filename not being sanitized. from Open to Testing.

Fixed in 1.4, 2.2 and master. New releases will be done soon. Note that there is no need for a new gpg4win release because GPGME is not affected.

Jun 8 2018, 11:09 AM · gnupg, CVE, Bug Report
werner created T4012: Diagnostic is shown with the original filename not being sanitized..
Jun 8 2018, 10:52 AM · gnupg, CVE, Bug Report
werner closed T3942: Can't unregister a non-existent private key as Resolved.

Okay. Thanks for looking into this.

Jun 8 2018, 10:19 AM · gnupg (gpg22), Bug Report
DamienCassou added a comment to T3942: Can't unregister a non-existent private key.

In the meantime, I upgraded my Fedora installation so I won't be able to reproduce in the same circumstances. I suggest we close the issue for now. I will reopen if I manage to reproduce.

Jun 8 2018, 9:51 AM · gnupg (gpg22), Bug Report
werner lowered the priority of T3942: Can't unregister a non-existent private key from High to Normal.

I tried this with the current 2.2 branch and master and was not able to replicate it. The stubs are all deleted as expected. I also checked the commit log since 2.2.6 and didn't found anything which indicated that such a bug was fixed.

Jun 8 2018, 8:59 AM · gnupg (gpg22), Bug Report

Jun 7 2018

werner closed T3994: import-clean drops a seemingly valid subkey as Resolved.

See rG26bce2f01d2029ea2b8a8dbbe36118e3c83c5cba for a description of the problem and its fix.
Thanks for reporting.

Jun 7 2018, 6:53 PM · gnupg (gpg22), Bug Report

Jun 6 2018

werner changed the status of T4000: GnuPG does not check encrypted messages for well-formed composition from Open to Testing.

Better?

Jun 6 2018, 3:59 PM · gnupg (gpg22), Bug Report
ktalik added a comment to T3972: 100% CPU usage endles loop of gpg --list-keys.
$ gpg -k --verbose --debug ipc,trust
gpg: reading options from '/home/konrad/.gnupg/gpg.conf'
gpg: enabled debug flags: trust ipc
gpg: using pgp trust model
gpg: checking the trustdb
gpg: removing stale lockfile (created by 14064)
[FREEZE]
Jun 6 2018, 2:48 PM · gnupg (gpg22)
werner triaged T3972: 100% CPU usage endles loop of gpg --list-keys as Normal priority.
Jun 6 2018, 2:33 PM · gnupg (gpg22)