Page MenuHome GnuPG
Feed Advanced Search

May 13 2019

dkg updated the task description for T4467: dirmngr keyserver option (and legacy gpg --keyserver) should assume `hkps://` or `hkp://` if no scheme is present.
May 13 2019, 11:32 PM · dirmngr
dkg added a comment to T4493: Default to HKPS, not HKP.

see also T4467

May 13 2019, 11:12 PM · dirmngr, Feature Request
dkg created T4507: show-only-fpr-mbox shows user-ids that are not valid.
May 13 2019, 3:47 PM · Bug Report

May 12 2019

dkg created T4503: include extension for OpenPGP creation timestamp in X.509 output.
May 12 2019, 1:01 AM · Feature Request, S/MIME
dkg created T4502: keys added via gpg-agent's ssh-agent interface are stored in private-keys-v1.d/ with a trailing null byte.
May 12 2019, 12:37 AM · gpgagent, ssh

May 11 2019

dkg added a comment to T4501: gpg --generate-key --batch from existing key (with Key-Grip:) fails on 64-bit big-endian architectures.


here is a copy of another example generated key (not b64-encoded), if you want to just download it.

May 11 2019, 4:24 AM · gnupg (gpg22), Bug Report
dkg added a comment to T4501: gpg --generate-key --batch from existing key (with Key-Grip:) fails on 64-bit big-endian architectures.

I also did a base64 < "$GNUPGHOME/private-keys-v1.d/".key at the end of a different run of that script, and it produced this output, if you'd like to inspect the actual S-expression stored:

May 11 2019, 4:21 AM · gnupg (gpg22), Bug Report
dkg added a comment to T4501: gpg --generate-key --batch from existing key (with Key-Grip:) fails on 64-bit big-endian architectures.

I ran the example script from T4490 on an s390x machine, and got the following output:

May 11 2019, 4:16 AM · gnupg (gpg22), Bug Report
dkg updated the task description for T4501: gpg --generate-key --batch from existing key (with Key-Grip:) fails on 64-bit big-endian architectures.
May 11 2019, 12:37 AM · gnupg (gpg22), Bug Report
dkg set Version to 2.2.13 on T4501: gpg --generate-key --batch from existing key (with Key-Grip:) fails on 64-bit big-endian architectures.
May 11 2019, 12:36 AM · gnupg (gpg22), Bug Report
dkg added a comment to T4501: gpg --generate-key --batch from existing key (with Key-Grip:) fails on 64-bit big-endian architectures.

This might be related to T4490, since it's the same sort of key generation process.

May 11 2019, 12:36 AM · gnupg (gpg22), Bug Report
dkg created T4501: gpg --generate-key --batch from existing key (with Key-Grip:) fails on 64-bit big-endian architectures.
May 11 2019, 12:33 AM · gnupg (gpg22), Bug Report

May 10 2019

dkg created T4497: gpgconf should report clearer errors when it knows that a given daemon's config file is bad.
May 10 2019, 11:24 PM · gnupg (gpg22)
dkg added a comment to T4490: --export-secret-keys fails with unusually-created secret key.

I was trying to use the above technique to be able to generate an OpenPGP transferable secret key in an ephemeral homedir. Ephemeral directories are recommended in the GnuPG info page's "unattended usage" section, but they do not work here.

May 10 2019, 10:45 PM · ssh, gnupg (gpg22)
dkg created T4496: gpgconf --launch ignores --homedir arguments.
May 10 2019, 9:25 PM · Bug Report, gnupg (gpg22)
dkg committed rGbe116f871dbf: doc: correct documentation for gpgconf --kill (authored by dkg).
doc: correct documentation for gpgconf --kill
May 10 2019, 6:43 PM
dkg committed rG9662538be6af: doc: correct documentation for gpgconf --kill (authored by dkg).
doc: correct documentation for gpgconf --kill
May 10 2019, 6:42 PM
dkg created T4490: --export-secret-keys fails with unusually-created secret key.
May 10 2019, 6:28 AM · ssh, gnupg (gpg22)

May 9 2019

dkg added a comment to T4489: gpg --quick-add-key should be able to add an existing key as a subkey, not just generating a new one.

i'm thinking that if the algo parameter to --quick-add-key is a keygrip, then it would find the key directly in the existing keyring(s) and attach it as a new subkey.

May 9 2019, 12:15 AM · gnupg, OpenPGP, Feature Request
dkg created T4489: gpg --quick-add-key should be able to add an existing key as a subkey, not just generating a new one.
May 9 2019, 12:14 AM · gnupg, OpenPGP, Feature Request

May 8 2019

dkg created T4488: dirmngr: allow changing `use-tor` in a reload.
May 8 2019, 1:57 PM · gnupg (gpg23), dirmngr
dkg reopened T4487: libksba: please refresh ASN.1 components from more recent RFCs with BSD licensing as "Open".

If the ASN.1 is not from an RFC, then the AUTHORS file should not claim that it is from an RFC.

May 8 2019, 1:42 PM · libksba, Feature Request

May 7 2019

dkg added a comment to T4457: Improve deletion of secret subkeys (don't delete primary key when subkey deletion is requested).

@werner could you review the patches posted here by @matheusmoreira ? This looks concretely useful, and i would like to have this fixed.

May 7 2019, 11:16 PM · patch, Bug Report, gnupg

May 6 2019

dkg created T4487: libksba: please refresh ASN.1 components from more recent RFCs with BSD licensing.
May 6 2019, 11:53 PM · libksba, Feature Request

May 3 2019

dkg added a comment to T4276: Context.decrypt() throws an error if *any* signature is bad.

I agree that this is a minor API shift, but i *don't* think it's a security problem, because i was particularly careful to maintain the invariant that decrypt(verify=True) will only ever return valid signatures.

May 3 2019, 5:23 PM · gpgme, Python, Bug Report
dkg created T4481: gpgme 1.13.0 ships with an emacs backup file: lang/python/doc/src/gpgme-python-howto.tex~.
May 3 2019, 2:07 PM · gpgme
dkg added a comment to T4477: gpgme has noisy warnings in debug.h.

Thanks for the prompt action here. Some build environments (e.g. distro builds) might ask for additional compiler warnings in the user-supplied CFLAGS, but i suppose those build environments that enable the warnings deserve what they get.

May 3 2019, 2:02 PM · Bug Report, gpgme
dkg added a comment to T4276: Context.decrypt() throws an error if *any* signature is bad.

I've just published a branch dkg/fix-T4276 (with commit 4100794e305ba22241ea5a4f7b42bb5189fbd948) which i think resolves this issue.

May 3 2019, 6:49 AM · gpgme, Python, Bug Report
dkg committed rMbd2d282e572b: python/tests: try to decrypt and verify new test data (authored by dkg).
python/tests: try to decrypt and verify new test data
May 3 2019, 6:48 AM
dkg committed rM4100794e305b: python: stop raising BadSignatures from decrypt(verify=True) (authored by dkg).
python: stop raising BadSignatures from decrypt(verify=True)
May 3 2019, 6:48 AM
dkg committed rMc5c3a9d10be4: tests: add two new types of encrypted data (authored by dkg).
tests: add two new types of encrypted data
May 3 2019, 6:48 AM
dkg committed rM30bd1c097544: python: make it easier to run a limited number of tests (authored by dkg).
python: make it easier to run a limited number of tests
May 3 2019, 6:48 AM
dkg created T4478: Please fix DeryptionError typo in gpgme python bindings.
May 3 2019, 4:42 AM · Python, Bug Report, gpgme
dkg added a comment to D444: Fix Typo in Python Exception DecryptionError.

Fixing this is technically an API change, but i can find no evidence that this has ever been used by any consumer of the gpg module. (e.g. i searched in debian and on the public web)

May 3 2019, 4:41 AM
dkg added a comment to D444: Fix Typo in Python Exception DecryptionError.

This is obviously correct. Why has it not been merged?

May 3 2019, 4:39 AM
dkg created T4477: gpgme has noisy warnings in debug.h.
May 3 2019, 4:29 AM · Bug Report, gpgme

May 1 2019

dkg created T4476: gpgol should make it easy to attach the user's key.
May 1 2019, 9:59 PM · gpgol, Feature Request

Apr 27 2019

dkg updated subscribers of T4457: Improve deletion of secret subkeys (don't delete primary key when subkey deletion is requested).

Thanks for this work, @matheusmoreira ! I personally think a reusable function in common/ would be preferable, but it's probably up to @werner to decide what's best here.

Apr 27 2019, 3:15 AM · patch, Bug Report, gnupg

Apr 26 2019

dkg added a comment to T4457: Improve deletion of secret subkeys (don't delete primary key when subkey deletion is requested).

nice, i'm glad to hear you've got something working, @matheusmoreira ! if you can point to your branch, or send patches here so that other folks can review, that would be great.

Apr 26 2019, 6:58 AM · patch, Bug Report, gnupg

Apr 19 2019

dkg added a comment to T4464: dane refers to draft-ietf-dane-openpgpkey-05, should be RFC 7929 .

Paul Wouters writes to me:

Apr 19 2019, 10:39 PM · gnupg, Documentation, Bug Report
dkg created T4468: twitter login broken.
Apr 19 2019, 10:33 PM · dev.gnupg.org
dkg created T4467: dirmngr keyserver option (and legacy gpg --keyserver) should assume `hkps://` or `hkp://` if no scheme is present.
Apr 19 2019, 5:26 PM · dirmngr
dkg created T4466: Clean up --keyserver documentation in gpg(1).
Apr 19 2019, 5:17 PM · Keyserver, gnupg (gpg22), dirmngr, Documentation
dkg added a comment to T4465: dirmngr's default tor autodetection mode should autodetect on each connection (falling back to non-tor when tor is unavailable).

I just noticed that dirmngr(8)'s documentation for its --keyserver option says:

Apr 19 2019, 5:11 PM · Tor, dirmngr, Bug Report
dkg committed rGea7d85ff658c: gpgconf: correct capitalization of "Tor" (authored by dkg).
gpgconf: correct capitalization of "Tor"
Apr 19 2019, 5:09 PM
dkg added a comment to T4465: dirmngr's default tor autodetection mode should autodetect on each connection (falling back to non-tor when tor is unavailable).

Note that even sending a HUP to dirmngr, when it is in this autodetection mode that observed tor at the start, is insufficient to have it re-run the autodetection. You have to explicitly terminate dirmngr to get it to unlearn the autodetected presence of Tor. This is subtly hinted at in dirmngr(8), but no justification is given for it.

Apr 19 2019, 4:47 PM · Tor, dirmngr, Bug Report
dkg created T4465: dirmngr's default tor autodetection mode should autodetect on each connection (falling back to non-tor when tor is unavailable).
Apr 19 2019, 4:36 PM · Tor, dirmngr, Bug Report
dkg created T4464: dane refers to draft-ietf-dane-openpgpkey-05, should be RFC 7929 .
Apr 19 2019, 1:30 AM · gnupg, Documentation, Bug Report

Apr 17 2019

dkg committed rPf74c4673e6b6: gnome3: correctly detect when no GNOME screenlock exists (authored by dkg).
gnome3: correctly detect when no GNOME screenlock exists
Apr 17 2019, 10:48 PM
dkg committed rP65d2c6d5911a: gnome3: Use the default dbus timeout when checking for screenlock (authored by Zephaniah E. Loss-Cutler-Hull <zephaniah@gmail.com>).
gnome3: Use the default dbus timeout when checking for screenlock
Apr 17 2019, 10:48 PM

Apr 11 2019

dkg created T4457: Improve deletion of secret subkeys (don't delete primary key when subkey deletion is requested).
Apr 11 2019, 5:27 PM · patch, Bug Report, gnupg

Apr 10 2019

dkg added a comment to T3767: simplify sharing dirmngr's across multiple GNUPGHOMEs.

One of the things that dirmngr has going for it is that it tracks the current network state, and it would be nice to be able to reuse that state across sessions. If an ephemeral keyring can't use a shared dirmngr, there are fewer arguments for having dirmngr in the first place, and people might be more justified in replacing it with things like https://gitlab.com/anarcat/scripts/blob/master/openpgp-key-get

Apr 10 2019, 2:52 AM · Documentation, Feature Request, gnupg, dirmngr

Apr 5 2019

dkg added a comment to T4448: Add "Autocrypt" key-origin.

does the proposed mail value indicate that the key was received over e-mail, or is it intended to have some more nuanced semantics?

Apr 5 2019, 4:47 PM · Feature Request

Apr 4 2019

dkg added a comment to T4448: Add "Autocrypt" key-origin.

@werner: what if the autocrypt header is in a dkim-signed message, and the dkim signature covers the autocrypt header, and the dkim signature is verifiable using dnssec? is it still the same as from a keyserver?

Apr 4 2019, 6:32 PM · Feature Request

Apr 2 2019

dkg created T4446: please add --quick-revoke-subkey.
Apr 2 2019, 5:41 PM · Restricted Project, gnupg24, Feature Request

Apr 1 2019

dkg committed rG5b1b5be65f34: NEWS: correct typo in header (authored by dkg).
NEWS: correct typo in header
Apr 1 2019, 4:36 PM

Mar 23 2019

dkg added a comment to T4418: --with-wkd-hash does not have an effect on --with-colons.

i don't think we need another column without the domain, i agree that it's easy enough to strip.

Mar 23 2019, 10:40 PM · Bug Report
dkg added a comment to T4418: --with-wkd-hash does not have an effect on --with-colons.

That seems plausible to me. I'm not sure why you'd include the @domain part in the output, since it's all strictly about the localpart. what happens if you provide some upper-case inputs?

Mar 23 2019, 3:48 AM · Bug Report
dkg created T4424: documentation for --no-keyring seems garbled.
Mar 23 2019, 3:07 AM · gnupg, Documentation, Bug Report
dkg added a comment to T3389: canonical OpenPGP certificate export.

fwiw, a comment over on T4422 contains a bash script that tries to force GnuPG to do its certificate/signature re-ordering. this doesn't produce anything canonical yet, but it's the closest i've come so far to getting GnuPG to do something repeatable with a certificate after merging (but even that is not quite stable).

Mar 23 2019, 2:34 AM · gnupg, Feature Request
dkg added a comment to T4422: `repair-keys` does not reorder signatures on non-merge imports.

(fwiw, all of this testing is done with GnuPG 2.2.14-1, using the package that is in debian/experimental right now; i'd welcome any corroboration with other versions)

Mar 23 2019, 1:56 AM · gnupg24, Bug Report
dkg added a comment to T4422: `repair-keys` does not reorder signatures on non-merge imports.

as i experiment with this, i find an even weirder result with certificate re-ordering: the function above is not idempotent.

Mar 23 2019, 1:55 AM · gnupg24, Bug Report
dkg added a comment to T4422: `repair-keys` does not reorder signatures on non-merge imports.

Here is a horrible bash function for doing the kind of stripping and re-importing that *does* cause signature re-ordering:

Mar 23 2019, 1:51 AM · gnupg24, Bug Report
dkg created T4422: `repair-keys` does not reorder signatures on non-merge imports.
Mar 23 2019, 1:28 AM · gnupg24, Bug Report
dkg created T4421: import-export does not remove duplicated subkeys.
Mar 23 2019, 12:07 AM · Feature Request, OpenPGP, gnupg (gpg23)

Mar 22 2019

dkg committed rGb30528f48780: doc: fix formatting error (authored by dkg).
doc: fix formatting error
Mar 22 2019, 11:50 PM
dkg committed rG93782de23fe4: doc: fix formatting error (authored by dkg).
doc: fix formatting error
Mar 22 2019, 11:49 PM

Mar 21 2019

dkg created T4418: --with-wkd-hash does not have an effect on --with-colons.
Mar 21 2019, 8:02 PM · Bug Report

Mar 20 2019

dkg added a comment to T714: Meaningful RETURN values.

werner wrote:

Mar 20 2019, 11:10 PM · gnupg, Feature Request
dkg committed rC0e2073edf92e: ecc: adjust debugging output (authored by dkg).
ecc: adjust debugging output
Mar 20 2019, 3:51 AM
dkg added a comment to T4414: please make ecc debugging info from libgcrypt more legible..

for whatever reason, i don't seem to be able to push to the branch on playfair, so i've also pushed the same commit over at https://gitlab.com/dkg/libgcrypt

Mar 20 2019, 3:10 AM · libgcrypt, Bug Report
dkg created T4414: please make ecc debugging info from libgcrypt more legible..
Mar 20 2019, 3:08 AM · libgcrypt, Bug Report

Mar 6 2019

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.
  • TPK: transferable public key (an "OpenPGP certificate")
  • TPS: Third-party signature (any certification within a TPK that is not made by the primary key, and is not a cross-sig made by a subkey over the primary)
Mar 6 2019, 7:53 PM · gnupg (gpg23), Feature Request
dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

i don't understand why "import-drop-uids" is useful -- it sounds to me like the functionality you're looking for is something more accurately named "accept-certs-without-uids". is that right?

Mar 6 2019, 4:37 PM · gnupg (gpg23), Feature Request

Mar 3 2019

dkg created T4386: Improve documentation about gpgv keyring selection.
Mar 3 2019, 4:28 PM · gpgv
dkg committed rG145987238e7e: gpgv: Improve documentation for keyring choices (authored by dkg).
gpgv: Improve documentation for keyring choices
Mar 3 2019, 4:27 PM

Feb 14 2019

dkg committed rGb89f1790e0b9: po: Correct a simple typo in the Norwegian translation (authored by ingvarha).
po: Correct a simple typo in the Norwegian translation
Feb 14 2019, 3:48 PM
dkg committed rGa09bba976d2f: po: Correct a simple typo in the Norwegian translation (authored by ingvarha).
po: Correct a simple typo in the Norwegian translation
Feb 14 2019, 3:48 PM

Feb 11 2019

dkg added a comment to T4346: Remove gpg-agent passphrase nags for empty / none passphrase.

I can't tell whether this bug report is about all the ways that we wish that GnuPG's default password process was better, or whether it's about one specific change.

Feb 11 2019, 7:48 AM · gnupg24, gpg4win, pinentry

Jan 28 2019

dkg added a comment to T4351: gpg --edit-key should improve selection of subkeys or user IDs.

for user ID selection, you could also potentially match on substring, so uid dkg could select/deselect all user IDs that contain "dkg".

Jan 28 2019, 10:12 PM · gnupg, Feature Request
dkg created T4351: gpg --edit-key should improve selection of subkeys or user IDs.
Jan 28 2019, 10:10 PM · gnupg, Feature Request

Dec 5 2018

dkg added a comment to T4276: Context.decrypt() throws an error if *any* signature is bad.

One more semantic question about how folks think Context.decrypt(verify=True) should work: if the decrypted thing has no signature at all, should the function succeed without throwing an exception? it currently does, but the returned verify_result has its signatures member set to the empty list.

Dec 5 2018, 6:30 PM · gpgme, Python, Bug Report
dkg added a comment to T4271: python gpg.Context.decrypt(verify=False) no longer works.

since @aheinecke merged my changes, i think this bug is now resolved. I'll let @BenM close it though :)

Dec 5 2018, 2:06 PM · Python, gpgme, Bug Report
dkg added a comment to T4276: Context.decrypt() throws an error if *any* signature is bad.

@aheinecke thanks for the merge of my other branch! sadly, that branch does *not* address this issue yet. It doesn't even test for it. :( I can work on trying to fix it (and test it) if there's a consensus that we want this particular change in behavior.

Dec 5 2018, 2:04 PM · gpgme, Python, Bug Report
dkg added a comment to T4271: python gpg.Context.decrypt(verify=False) no longer works.

note that the branch also updates the test suite to make sure the verify=False case is tested.

Dec 5 2018, 6:34 AM · Python, gpgme, Bug Report
dkg created T4276: Context.decrypt() throws an error if *any* signature is bad.
Dec 5 2018, 6:18 AM · gpgme, Python, Bug Report
dkg added a comment to T4271: python gpg.Context.decrypt(verify=False) no longer works.

I've just pushed a branch dkg/fix-T4271 , currently at ac8d7238dbf165950c9844e5cb41da8eb4d37bc0 that resolves this problem.

Dec 5 2018, 12:51 AM · Python, gpgme, Bug Report
dkg committed rMac8d7238dbf1: python: overhaul logic of Context.decrypt() (authored by dkg).
python: overhaul logic of Context.decrypt()
Dec 5 2018, 12:50 AM
dkg committed rM5e21e61cfef8: python: ctx.decrypt() has problematic error handling (authored by dkg).
python: ctx.decrypt() has problematic error handling
Dec 5 2018, 12:50 AM
dkg committed rM30ddb2cabcd6: python: gpg.Context.decrypt verify_sigs and sink_result are bools (authored by dkg).
python: gpg.Context.decrypt verify_sigs and sink_result are bools
Dec 5 2018, 12:50 AM
dkg committed rMfefa46173e50: python: Clarify the meaning of ctx.decrypt(verify=[]) (authored by dkg).
python: Clarify the meaning of ctx.decrypt(verify=[])
Dec 5 2018, 12:50 AM
dkg committed rM827a2f3ad562: python: simplify Context.decrypt() (authored by dkg).
python: simplify Context.decrypt()
Dec 5 2018, 12:50 AM
dkg committed rM9a1903cc4292: python: clarify documentation for verify argument for Context.decrypt() (authored by dkg).
python: clarify documentation for verify argument for Context.decrypt()
Dec 5 2018, 12:50 AM

Dec 1 2018

dkg created T4275: python gpg binding VCS contains generated files (documentation).
Dec 1 2018, 12:53 AM · gpgme, Bug Report

Nov 27 2018

dkg added a comment to T4271: python gpg.Context.decrypt(verify=False) no longer works.

please add a unit to the test suite to make sure something like this doesn't happen in the future!

Nov 27 2018, 10:14 PM · Python, gpgme, Bug Report
dkg created T4271: python gpg.Context.decrypt(verify=False) no longer works.
Nov 27 2018, 10:10 PM · Python, gpgme, Bug Report
dkg created T4270: pinentry-curses should ring the terminal bell.
Nov 27 2018, 3:51 PM · gpgagent, Feature Request, pinentry

Nov 22 2018

dkg added a comment to T4191: gpgme python bindings test t-callbacks.py fails on 32-bit platforms.

i'd be happy to help you set up your own x86 32-bit guest VM for testing
if you like, even if you're running on x86_64 hardware. they're cheap
and easy to run, and have a delightfully small memory footprint :P just
let me know!

Nov 22 2018, 1:44 PM · Python, gpgme, Bug Report

Nov 18 2018

dkg added a comment to T4251: gpg-zip embeds the build-time path for tar instead of finding it at runtime..

hm, adding: --with-tar=tar to my invocation of ./configure appears to leave gpg-zip with:

Nov 18 2018, 7:52 PM · gnupg (gpg22), Bug Report

Nov 14 2018

dkg created T4254: broken link to gpgrelay in website.
Nov 14 2018, 7:02 PM · Bug Report