Page MenuHome GnuPG
Feed Advanced Search

Jul 18 2019

gniibe added a comment to T4619: Unable to decrypt symmetric-key encrypted data.

I mean, if all SKESK packets should be tried, we need some larger surgery of current implementation.

Jul 18 2019, 5:07 AM · gnupg24, gnupg (gpg23), Bug Report
gniibe added a comment to T4619: Unable to decrypt symmetric-key encrypted data.

Is it possible for your application (DOTS), to specify the packet number for SKESKP, not trying all SKESK packets?


^-- with this change, we can decrypt the skesks.asc with --passphrase-repeat=169, and skesks2.asc with --passphrase-repeat=30

Jul 18 2019, 5:05 AM · gnupg24, gnupg (gpg23), Bug Report
dkg added a comment to T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned.

i've merged a variant of rGbe99eec2b105eb5f8e3759147ae351dcc40560ad into the GnuPG packaging in debian unstable as of version 2.2.17-3 to avoid the risks of data loss and signature verification failures. I'll revert it if i see the concern addressed upstream.

Jul 18 2019, 12:17 AM · Keyserver, gnupg (gpg22), Bug Report

Jul 17 2019

stm added a comment to T4619: Unable to decrypt symmetric-key encrypted data.

But that's exactly my use case in DOTS: an easily to create 'decryption puzzle' (including the hardness of iterated and salted S2K) for the serving party in order to make DoS harder. I don't see how public-key crypto can help here. Moreover, I would keep the user interaction as cheap as possible, i.e., copy'n'paste an ASCII-armored message and passwort to GnuPG without importing public keys etc.

Jul 17 2019, 8:34 PM · gnupg24, gnupg (gpg23), Bug Report
werner added a comment to T4619: Unable to decrypt symmetric-key encrypted data.

The problem here is that trial decryption may cost a lot of time because of the passphrase KDF function which, on purpose, takes long. There is one exception: A simple S2K (algo 0) takes no time and its use makes sense iff the passphrase has been created directly as a random string. However, I do not see the use cases for of a set of many passphrases compared to just use public key crypto.

Jul 17 2019, 12:19 PM · gnupg24, gnupg (gpg23), Bug Report
stm added a comment to T4619: Unable to decrypt symmetric-key encrypted data.

@gniibe Thanks for explaining the background. Are there any ideas for fixing? (e.g. the decrypted content could be checked for a valid packet structure or at least for starting with a valid packet header)

Jul 17 2019, 7:36 AM · gnupg24, gnupg (gpg23), Bug Report
dkg created T4634: "gpg --quiet --quick-gen-key" is not quiet: emits "key $FPR marked as ultimately trusted" to stderr..
Jul 17 2019, 1:01 AM · gnupg (gpg22), Bug Report
dkg created T4633: gpg argument "--passphrase=" yields 'missing argument for option "--passphrase="'.
Jul 17 2019, 12:53 AM · Restricted Project, gnupg (gpg22), Bug Report

Jul 16 2019

dkg added a comment to T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

Just a note that we're now shipping this patch in debian unstable. It would be great if it was merged upstream.

Jul 16 2019, 8:08 PM · gnupg (gpg22), Bug Report, dirmngr
dkg added a comment to T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned.

that pseudocode is strange to me -- it looks like you have (two) duplicate calls to clean_key (imported_keyblock) (though maybe i just don't know what .... means in this pseudocode).

Jul 16 2019, 6:36 PM · Keyserver, gnupg (gpg22), Bug Report
werner triaged T4627: "gpg --verbose --list-secret-keys" prints a lot of warning messages unrelated to secret keys as Low priority.
Jul 16 2019, 8:29 AM · gnupg (gpg22), Bug Report
werner triaged T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned as Normal priority.
Jul 16 2019, 8:25 AM · Keyserver, gnupg (gpg22), Bug Report
werner added a comment to T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned.

You are partly right. I missed that we also do clean the original keyblock while updating a key. The code is

Jul 16 2019, 8:17 AM · Keyserver, gnupg (gpg22), Bug Report
werner added a comment to T4594: dirmngr appears to unilaterally import system CAs.

I see. I am also mostly testing with ntbtls so I was wondering about the report. Thanks for reporting and fixing.

Jul 16 2019, 8:04 AM · Bug Report, dirmngr, gnupg (gpg22)
gniibe triaged T4594: dirmngr appears to unilaterally import system CAs as Normal priority.

While I understand incorrectness, the risk in practice is not that high. So, I put this as "normal" priority.

Jul 16 2019, 5:35 AM · Bug Report, dirmngr, gnupg (gpg22)
gniibe added a comment to T4619: Unable to decrypt symmetric-key encrypted data.

In the current implementation of GnuPG, multiple packets of Symmetric-Key Encrypted Session Key Packet are not handled very well.

Jul 16 2019, 4:03 AM · gnupg24, gnupg (gpg23), Bug Report
gniibe changed the status of T4594: dirmngr appears to unilaterally import system CAs from Open to Testing.

Pushed the change to master as well as 2.2 branch.

Jul 16 2019, 3:15 AM · Bug Report, dirmngr, gnupg (gpg22)

Jul 15 2019

dkg added a comment to T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned.

I think dropping import-clean from the default keyserver options is the right way to go. It is not clear what additional benefit import-clean provides given that we are already using self-sigs-only. And the idea of non-additive behavior to the local keyring when pulling from a keyserver is a deeply surprising change for multiple users i've talked to.

Jul 15 2019, 10:35 PM · Keyserver, gnupg (gpg22), Bug Report
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

The fact that import-clean modifies already-held certifications makes me think it is inappropriate to have as the default for keyserver access (see T4628 for more details).

Jul 15 2019, 7:34 PM · Bug Report, gnupg (gpg22)
dkg created T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned.
Jul 15 2019, 7:09 PM · Keyserver, gnupg (gpg22), Bug Report
dkg created T4627: "gpg --verbose --list-secret-keys" prints a lot of warning messages unrelated to secret keys.
Jul 15 2019, 5:17 PM · gnupg (gpg22), Bug Report

Jul 14 2019

ilf added a comment to T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx`.

Maybe GnuPG could display a prompt if it detects a pubring.gpg and no pubring.kbx. Something like:

Jul 14 2019, 6:11 PM · gnupg24, gnupg (gpg23), Feature Request

Jul 12 2019

stm created T4619: Unable to decrypt symmetric-key encrypted data.
Jul 12 2019, 7:49 PM · gnupg24, gnupg (gpg23), Bug Report
werner added a comment to T4573: Files encrypted on another platform using password based encryption (-c) intermittently fail to decrypt on Kleopatra.

@gniibe: We move this issue over to mail. I'll forward it to you.

Jul 12 2019, 8:28 AM · gnupg (gpg22), Bug Report
gniibe added a comment to T4573: Files encrypted on another platform using password based encryption (-c) intermittently fail to decrypt on Kleopatra.

If I were testing more, I would generate many (say, 1000, or more, for example) encrypted message by the tool (IBM Encryption Facility), to examine by GnuPG and figure out some patterns of failure.

Jul 12 2019, 2:23 AM · gnupg (gpg22), Bug Report

Jul 11 2019

gniibe added a comment to T4573: Files encrypted on another platform using password based encryption (-c) intermittently fail to decrypt on Kleopatra.

While I only observed the output of --list-packet, what I see are:

Jul 11 2019, 9:59 AM · gnupg (gpg22), Bug Report
gniibe claimed T4594: dirmngr appears to unilaterally import system CAs.

With NTBTLS, it seems it works correctly.

Jul 11 2019, 9:36 AM · Bug Report, dirmngr, gnupg (gpg22)

Jul 10 2019

gniibe added a comment to T4606: Release GnuPG 2.2.17.

Err... my repo for 2.2 was a week old. Now, I updated, and confirmed it's there.
Thanks having the support!

Jul 10 2019, 1:25 AM · Release Info, gnupg (gpg22)

Jul 9 2019

werner closed T4606: Release GnuPG 2.2.17 as Resolved.

Release done.

Jul 9 2019, 5:21 PM · Release Info, gnupg (gpg22)
werner set External Link to https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html on T4606: Release GnuPG 2.2.17.
Jul 9 2019, 3:21 PM · Release Info, gnupg (gpg22)
werner added a comment to T4606: Release GnuPG 2.2.17.

I did this already on July 3 with commit 458973f502b9a43ecf29e804a2c0c86e78f5927a

Jul 9 2019, 1:27 PM · Release Info, gnupg (gpg22)
gniibe added a comment to T4606: Release GnuPG 2.2.17.

Please consider to backport rG914fa3be22bf: dirmngr: Support the new WKD draft with the openpgpkey subdomain. from master. Cherry-pick mostly works, only dirmngr/server.c needs manual edit (because of resolve_dns_name change).
Allowing WKD service by subdomain (openpgpkey) is good, because it is easier to deploy by separate admin, in some situations.

Jul 9 2019, 4:46 AM · Release Info, gnupg (gpg22)

Jul 5 2019

werner added a comment to T4601: gpg --quiet --quick-sign-key is not quiet.

Quiet tricky to get right; needs some rework.

Jul 5 2019, 11:08 AM · gnupg24, gnupg (gpg23), Bug Report
werner closed T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver as Resolved.

Done for master and 2.2.

Jul 5 2019, 10:49 AM · gnupg (gpg22), wkd
werner closed T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver, a subtask of T4606: Release GnuPG 2.2.17, as Resolved.
Jul 5 2019, 10:49 AM · Release Info, gnupg (gpg22)

Jul 4 2019

dkg added a comment to T4612: Add spare space to the keybox to always allow the import of revocations..

Once a revocation is added (to any part of the certificate), perhaps all the certification packets that are clearly made obsolete by the revocation could be dropped from the certificate? That would certainly free up space to be able to import additional revocations if needed.

Jul 4 2019, 10:21 PM · gnupg24, gnupg (gpg23), Bug Report
werner added a comment to T4566: dirmngr fails with HTTP 302 redirection to hkps.

And of course, thanks for your fix.

Jul 4 2019, 5:05 PM · gnupg (gpg22), dirmngr, Bug Report
werner closed T4566: dirmngr fails with HTTP 302 redirection to hkps as Resolved.

Applied to both branches. I have run no tests myself, though.

Jul 4 2019, 5:04 PM · gnupg (gpg22), dirmngr, Bug Report
werner closed T4603: dirmngr WKD redirection changes paths as Resolved.

Fix will be in 2.2.17

Jul 4 2019, 4:26 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
werner closed T4603: dirmngr WKD redirection changes paths, a subtask of T4606: Release GnuPG 2.2.17, as Resolved.
Jul 4 2019, 4:26 PM · Release Info, gnupg (gpg22)
werner closed T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx` as Resolved.

Fix will be in 2.2.17.
See T4612 for the revocation case.

Jul 4 2019, 4:25 PM · Bug Report, gnupg (gpg22)
werner closed T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`, a subtask of T4606: Release GnuPG 2.2.17, as Resolved.
Jul 4 2019, 4:25 PM · Release Info, gnupg (gpg22)
werner created T4612: Add spare space to the keybox to always allow the import of revocations..
Jul 4 2019, 4:23 PM · gnupg24, gnupg (gpg23), Bug Report
werner triaged T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx` as Normal priority.
Jul 4 2019, 4:01 PM · gnupg24, gnupg (gpg23), Feature Request
werner closed T4607: enable `import-clean` by default, a subtask of T4606: Release GnuPG 2.2.17, as Resolved.
Jul 4 2019, 4:00 PM · Release Info, gnupg (gpg22)
werner added a subtask for T4606: Release GnuPG 2.2.17: T4607: enable `import-clean` by default.
Jul 4 2019, 3:47 PM · Release Info, gnupg (gpg22)
werner removed a subtask for T4606: Release GnuPG 2.2.17: T4599: remap `--search` to `--locate-keys` (with warning).
Jul 4 2019, 11:33 AM · Release Info, gnupg (gpg22)

Jul 3 2019

wiktor-k added a comment to T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver.

@dkg I believe @aheinecke gave the GpgOL description just as an example of why WKD-first retrieval would be beneficial (for details of that see https://wiki.gnupg.org/AutomatedEncryption#Trust_Levels) and I believe this ticket is a follow-up to my question on gnupg-devel ML: https://lists.gnupg.org/pipermail/gnupg-devel/2019-June/034372.html

Jul 3 2019, 7:26 PM · gnupg (gpg22), wkd
dkg added a comment to T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver.

auto-key-retrieve happens in the context of signature verification when the certificate is missing. If no signer User ID subpacket is present in the signature, then WKD simply won't work.

Jul 3 2019, 7:11 PM · gnupg (gpg22), wkd
werner changed the edit policy for T3065: dirmngr: proxy issues with dnslookup causing failure.
Jul 3 2019, 6:19 PM · gnupg (gpg22), dns, dirmngr
werner closed T3065: dirmngr: proxy issues with dnslookup causing failure as Invalid.

I asked you to carry this to a mailing list and not re-open this task.

Jul 3 2019, 6:19 PM · gnupg (gpg22), dns, dirmngr
dkg added a comment to T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx`.

if you want to add a separate subcommand for that, i would be happy to abandon migrate-pubring-from-classic-gpg.

Jul 3 2019, 6:16 PM · gnupg24, gnupg (gpg23), Feature Request
werner moved T4573: Files encrypted on another platform using password based encryption (-c) intermittently fail to decrypt on Kleopatra from Backlog to Deferred on the gnupg (gpg22) board.
Jul 3 2019, 6:14 PM · gnupg (gpg22), Bug Report
werner moved T3972: 100% CPU usage endles loop of gpg --list-keys from Backlog to Deferred on the gnupg (gpg22) board.
Jul 3 2019, 6:14 PM · gnupg (gpg22)
werner moved T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver from Backlog to For next release on the gnupg (gpg22) board.
Jul 3 2019, 6:14 PM · gnupg (gpg22), wkd
werner edited projects for T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver, added: gnupg (gpg22); removed gnupg.
Jul 3 2019, 6:12 PM · gnupg (gpg22), wkd
werner added subtasks for T4606: Release GnuPG 2.2.17: T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`, T4599: remap `--search` to `--locate-keys` (with warning), T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver, T4600: dirmngr enters a loop when the keyserver returns 503 error, T4603: dirmngr WKD redirection changes paths.
Jul 3 2019, 6:11 PM · Release Info, gnupg (gpg22)
werner added a parent task for T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`: T4606: Release GnuPG 2.2.17.
Jul 3 2019, 6:11 PM · Bug Report, gnupg (gpg22)
werner added a parent task for T4599: remap `--search` to `--locate-keys` (with warning): T4606: Release GnuPG 2.2.17.
Jul 3 2019, 6:11 PM · gnupg (gpg23), dirmngr
werner added a parent task for T4603: dirmngr WKD redirection changes paths: T4606: Release GnuPG 2.2.17.
Jul 3 2019, 6:11 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
werner added a parent task for T4600: dirmngr enters a loop when the keyserver returns 503 error: T4606: Release GnuPG 2.2.17.
Jul 3 2019, 6:11 PM · gnupg (gpg22), dirmngr, Bug Report
werner moved T4566: dirmngr fails with HTTP 302 redirection to hkps from Backlog to For next release on the gnupg (gpg22) board.
Jul 3 2019, 6:04 PM · gnupg (gpg22), dirmngr, Bug Report
werner moved T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx` from Backlog to For next release on the gnupg (gpg22) board.
Jul 3 2019, 6:02 PM · Bug Report, gnupg (gpg22)
werner moved T4599: remap `--search` to `--locate-keys` (with warning) from Backlog to For next release on the gnupg (gpg22) board.
Jul 3 2019, 6:02 PM · gnupg (gpg23), dirmngr
werner moved T4603: dirmngr WKD redirection changes paths from Backlog to For next release on the gnupg (gpg22) board.
Jul 3 2019, 6:01 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
werner moved T4606: Release GnuPG 2.2.17 from Backlog to For next release on the gnupg (gpg22) board.
Jul 3 2019, 6:01 PM · Release Info, gnupg (gpg22)
werner created T4606: Release GnuPG 2.2.17.
Jul 3 2019, 6:01 PM · Release Info, gnupg (gpg22)
werner edited projects for T4599: remap `--search` to `--locate-keys` (with warning), added: gnupg (gpg22); removed gnupg.

My plan is to let --search-key be the same as locate-key but without local lookups, thus it will be the same as

Jul 3 2019, 5:58 PM · gnupg (gpg23), dirmngr
werner added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

Okay, if an attacker exactly hist that limit your case is valid. I see no easy fix here, though. What we can do is what is done on Unix file systems to give average users a disk full erroreven if there a few percent of the disk is free; root can use that extra space then. Revocation certificates would be what root is on Unix file systems.

Jul 3 2019, 5:51 PM · Bug Report, gnupg (gpg22)
werner closed T4600: dirmngr enters a loop when the keyserver returns 503 error as Resolved.

That was pretty easy to reproduce thanks to your still not working server.

Jul 3 2019, 5:42 PM · gnupg (gpg22), dirmngr, Bug Report
werner claimed T4600: dirmngr enters a loop when the keyserver returns 503 error.
Jul 3 2019, 5:08 PM · gnupg (gpg22), dirmngr, Bug Report
werner triaged T4589: gpg man page gives incomplete instructions for 3 passphrase-related options as Normal priority.
Jul 3 2019, 4:32 PM · gnupg (gpg22), Documentation, Bug Report
werner added a comment to T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx`.

I somehow expected such a feature request ;-). However, I do not think that an automatic migration is is appropriate for the stable branch.

Jul 3 2019, 4:30 PM · gnupg24, gnupg (gpg23), Feature Request
werner triaged T4603: dirmngr WKD redirection changes paths as Normal priority.
Jul 3 2019, 4:25 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
dkg created T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx`.
Jul 3 2019, 4:25 PM · gnupg24, gnupg (gpg23), Feature Request
werner closed T4590: dirmngr does not perform WKD advanced lookup as Resolved.

Will be in 2.2.17

Jul 3 2019, 3:46 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
werner added a comment to T4590: dirmngr does not perform WKD advanced lookup.

Oh dear, that happens if one is always on master. I simply forgot to cherry pick the change from master back in November.
Two commits, though.

Jul 3 2019, 3:45 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

my initial scenario is where an adversarial keystore floods a certificate right up to (but within) the 5MiB boundary, so that the user has stored it in the keyring already. Then, the user encounters the certificate again, with revocation attached.

Jul 3 2019, 2:53 PM · Bug Report, gnupg (gpg22)
werner changed the status of T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx` from Testing to Open.

I don't think so. The fallback mechnanism will still work and remove everything but valid self-signatures. This gives enough space to write the keyblock with the new revocation certificates. I am not sure about designated revokers in this case.

Jul 3 2019, 9:59 AM · Bug Report, gnupg (gpg22)
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

as a separate variant: if the attacker floods the certificate with bogus self-signatures -- that is, certifications that have an issuer fingerprint or issuer key id subpacket, whether hashed or unhashed -- will that make it impossible to import any of them?

Jul 3 2019, 6:48 AM · Bug Report, gnupg (gpg22)
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

Thanks for working on this fallback, Werner.

Jul 3 2019, 12:09 AM · Bug Report, gnupg (gpg22)

Jul 2 2019

werner changed the status of T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx` from Open to Testing.

Also pushed to 2.2. Right now I can't see what else can be done, so I change the status to testing.

Jul 2 2019, 9:35 AM · Bug Report, gnupg (gpg22)

Jul 1 2019

werner triaged T4601: gpg --quiet --quick-sign-key is not quiet as Normal priority.
Jul 1 2019, 9:58 PM · gnupg24, gnupg (gpg23), Bug Report
dkg updated the task description for T4601: gpg --quiet --quick-sign-key is not quiet.
Jul 1 2019, 9:50 PM · gnupg24, gnupg (gpg23), Bug Report
dkg created T4601: gpg --quiet --quick-sign-key is not quiet.
Jul 1 2019, 9:50 PM · gnupg24, gnupg (gpg23), Bug Report
werner triaged T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx` as High priority.
Jul 1 2019, 9:44 PM · Bug Report, gnupg (gpg22)
werner added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

I implemented that in master. The first output is from an update of your key and the second from an insert of a new key.

Jul 1 2019, 9:44 PM · Bug Report, gnupg (gpg22)
werner removed a project from T4573: Files encrypted on another platform using password based encryption (-c) intermittently fail to decrypt on Kleopatra: kleopatra.

That won't be easy to debug unless we have intermediate debug values from the generating implementation. That IBM Encryption Facility looks partly similar in the command line options to gpg so I wonder whether it will be possible to get some debug output. @mrdave19: we can continue by private mail in case that is helpful for you (wk at g10code com)

Jul 1 2019, 9:29 PM · gnupg (gpg22), Bug Report
werner triaged T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net` as Low priority.
Jul 1 2019, 9:18 PM · gnupg (gpg22), Bug Report, dirmngr
dkg updated subscribers of T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

I should add that i don't really care whose fault it is if the software is broken by some downstream. if it harms any users, and we can fix it, we should fix it, especially if the fix is easy.

Jul 1 2019, 9:13 PM · gnupg (gpg22), Bug Report, dirmngr
dkg added a comment to T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

We're writing free software, which we know that people use and modify downstream. if we know that the software has a particular sharp edge that people who are modifying it are likely to cut themselves on, we have two options:

Jul 1 2019, 9:03 PM · gnupg (gpg22), Bug Report, dirmngr
werner added a comment to T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

Come on, if someone changes the software and breaks it, it is their's fault ant not ours. The whole thing on which keyserver and certificate to use as been discussed ad nausea in the past. Given all the problems with the keyservers I do not see a reason to change it right away to a state we had before. Keyserver code is pretty hard to test and has thus always been prone to regressions.

Jul 1 2019, 8:05 PM · gnupg (gpg22), Bug Report, dirmngr
werner triaged T4600: dirmngr enters a loop when the keyserver returns 503 error as High priority.

(See T4175 why this changed in 2.2.12.)

Jul 1 2019, 8:00 PM · gnupg (gpg22), dirmngr, Bug Report
werner added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

Even if you can't use it the option is still useful to avoid other kinds of DoS. As written in the comments it is not a full solution but it helps to side-step issues with key-signature. In particular for sites which do not have a need for them.
BTW, revocation certificates are still merged with the new option.

Jul 1 2019, 7:54 PM · Bug Report, gnupg (gpg22)
dkg reopened T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net` as "Open".

If the default keyserver is not hkps.pool.sks-keyservers.net, then @kristianf's CA certificate has no business certifying it.

Jul 1 2019, 6:31 PM · gnupg (gpg22), Bug Report, dirmngr
mrdave19 added a comment to T4573: Files encrypted on another platform using password based encryption (-c) intermittently fail to decrypt on Kleopatra.

Welcome back from vacation!
@aheinecke Yes I am 1000% sure the passphrase is "dave" without the quotes.
These are the commands I use for the encrypt using the IBM Encryption Facility:

-o '/home/suimgwy/_july1.pbe' \
-s2k-cipher-name AES_256 -s2k-digest-name SHA256 -s2k-mode 3 \
-s2k-passphrase dave \
-t ISO-8859-1 \
-use-mdc \
-c '/home/suimgwy/_input.txt'
<<<

Jul 1 2019, 6:31 PM · gnupg (gpg22), Bug Report
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

thanks for working on this @werner. rG2e349bb61737 is definitely not useful for me. If i am going to tell anyone "hey, do this weird thing differently in order to fetch my key", i will tell them "pull it from https://dkg.fifthhorseman.net/dkg-openpgp.key". I will never tell anyone to use import-self-sigs-only.

Jul 1 2019, 6:20 PM · Bug Report, gnupg (gpg22)
werner added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

That is probably not what you want but at least it allows to import your key

Jul 1 2019, 3:30 PM · Bug Report, gnupg (gpg22)
aheinecke triaged T4573: Files encrypted on another platform using password based encryption (-c) intermittently fail to decrypt on Kleopatra as Normal priority.

back from vacation so apologies for the delay. @werner This is reproducible on the command line without Kleopatra. So maybe something for you our Gniibe to look into?

Jul 1 2019, 2:29 PM · gnupg (gpg22), Bug Report
werner added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

I have mentioned it several times in the past that I would like to see the search by user id feature be removed from keyservers so that there is less incentive to use them as a perpetual and searchable database for maybe illegitimate data.

Jul 1 2019, 9:56 AM · Bug Report, gnupg (gpg22)