Page MenuHome GnuPG
Feed Advanced Search

Nov 12 2019

aheinecke created T4745: GnuPG, Kleopatra: Remove Name length limitation for new keys.
Nov 12 2019, 9:51 AM · kleopatra, gnupg

Nov 11 2019

werner added a comment to T4447: Fix addition of new GPG keys to LDAP.

See also D475.

Nov 11 2019, 6:30 PM · gnupg (gpg23), patch, LDAP, dirmngr, Bug Report

Nov 7 2019

aheinecke added a comment to T4742: GnuPG, Kleopatra: Update --full-gen-key options for GnuPG-2.3.

Without --expert my proposal for full-gen-key would be:

Nov 7 2019, 8:37 AM · gnupg24, gnupg (gpg23), kleopatra
aheinecke created T4742: GnuPG, Kleopatra: Update --full-gen-key options for GnuPG-2.3.
Nov 7 2019, 8:30 AM · gnupg24, gnupg (gpg23), kleopatra

Nov 6 2019

werner added a project to T4740: GnuPG: Invalid digest algorithm for new certifications made by old keys with GnuPG master: CVE.

That is due to the mitigation for CVE-2019-14855. I need to see how to find a more specific mitigation.

Nov 6 2019, 4:25 PM · CVE, gnupg
aheinecke created T4740: GnuPG: Invalid digest algorithm for new certifications made by old keys with GnuPG master.
Nov 6 2019, 2:52 PM · CVE, gnupg

Oct 14 2019

npreining added a comment to T2760: Populate comment field when exporting authentication key for SSH.

Same here, having YubiKeys and on-disk ssh keys from several computers, it is a bit a pain not to know which key is actually used. Any chances to get at least an update via manual editing of the comment?

Oct 14 2019, 7:01 AM · gnupg24, ssh, Feature Request

Oct 11 2019

bjmgeek added a comment to T3020: Lock files not compatible between Windows and Linux (invalid size).

I've also noticed this issue on windows when trying to symlink %APPDATA%\gnupg to $HOME/.gnupg under msys32.

Oct 11 2019, 8:18 PM · Bug Report, gnupg

Oct 9 2019

gniibe added a project to T4158: UIF (User Interaction Flag) DO support: Restricted Project.
Oct 9 2019, 4:17 AM · Restricted Project, Feature Request, scd, gnupg
gniibe added a project to T4695: Remove SERIALNO as an identifier to select keys: Restricted Project.
Oct 9 2019, 4:15 AM · Restricted Project, Feature Request, gnupg

Sep 9 2019

aheinecke created T4702: Deadline for the GnuPG 2.3.0 release.
Sep 9 2019, 11:31 AM · Restricted Project, gpg4win, gnupg

Sep 6 2019

werner added a comment to T4695: Remove SERIALNO as an identifier to select keys.

BTW: I have the problem that I want to know the keys of all cards. "getinfo card_list" along with --demand can be used for this. gpg-card works this way. It does not work if plug in addtional cards becuase card_list shows only the cards for which a SERIALNO command has been used. A new feature to scan the buses for all readers and cards would be quite useful.

Sep 6 2019, 10:40 AM · Restricted Project, Feature Request, gnupg
gniibe added a comment to T4695: Remove SERIALNO as an identifier to select keys.

Still there are two places where we use "SCD serialno --demand <SERIALNO>". One is g10/skclist.c where we list available keys, another is the funciton card_key_available in agent/command-ssh.c .

Sep 6 2019, 1:41 AM · Restricted Project, Feature Request, gnupg
gniibe lowered the priority of T4695: Remove SERIALNO as an identifier to select keys from Unbreak Now! to High.
Sep 6 2019, 1:37 AM · Restricted Project, Feature Request, gnupg
gniibe added a comment to T4695: Remove SERIALNO as an identifier to select keys.

By the change of rG9f39e0167d06: agent: Fix ask_for_card to allow a key on multiple cards., the SERIALNO in the stub is just an auxiliary information, not identifying the card. Now, it is the keygrip for key to identify/select the card.

Sep 6 2019, 1:37 AM · Restricted Project, Feature Request, gnupg

Sep 5 2019

gniibe added a comment to T4695: Remove SERIALNO as an identifier to select keys.

I did too many things at once.
I'm going to divide up into pieces.

Sep 5 2019, 10:12 AM · Restricted Project, Feature Request, gnupg
gniibe added a comment to T4695: Remove SERIALNO as an identifier to select keys.

Sep 5 2019, 8:04 AM · Restricted Project, Feature Request, gnupg
gniibe created T4695: Remove SERIALNO as an identifier to select keys.
Sep 5 2019, 8:04 AM · Restricted Project, Feature Request, gnupg

Aug 30 2019

werner closed T4691: Grammar error/typo in gnupg/doc/gpg.texi:L201 "can decrypted" -> "can be decrypted" as Resolved.

Thanks. Fixed in stanble and master.

Aug 30 2019, 8:33 AM · gnupg, Documentation, Bug Report

Aug 29 2019

hyiltiz created T4691: Grammar error/typo in gnupg/doc/gpg.texi:L201 "can decrypted" -> "can be decrypted".
Aug 29 2019, 11:33 PM · gnupg, Documentation, Bug Report

Aug 23 2019

vsrinu26f added a comment to T2893: gnupg should used ccid card key material fingerprints and not serial number.

And also this is excellent point.

Aug 23 2019, 8:57 PM · yubikey, Feature Request, gnupg
werner added a comment to T2669: gpg --import auto-launches gpg-agent even when no secret keys are imported.

The agent is an important part of gnupg and it does not make sense to single out cases when it might not be needed. I can't see any harm from having an agent running. In fact, one of th netxt versions will add yet another daemon which will then be needed in all cases.

Aug 23 2019, 10:26 AM · Bug Report, gnupg

Aug 22 2019

dkg added a comment to T2669: gpg --import auto-launches gpg-agent even when no secret keys are imported.

Thanks, @gniibe. From reading this patch (i haven't tested it), it looks like it would avoid most unnecessary agent launches (and agent communication) in the (b) case, which is a win over the status quo.

Aug 22 2019, 8:47 PM · Bug Report, gnupg
gniibe closed T4228: Leaked FILE from tmpfile() in dns.c dns_trace_open as Resolved.

Fixed in master.

Aug 22 2019, 5:55 AM · dns, gnupg
gniibe added a comment to T4228: Leaked FILE from tmpfile() in dns.c dns_trace_open.

This part of code is questionable. It always comes fp!=NULL, so the part should be removed.
If fp==NULL, use of tmpfile is quite questionable because a user can't know where the trace output goes.
I'm going to remove that part.

Aug 22 2019, 5:54 AM · dns, gnupg
gniibe added a comment to T2669: gpg --import auto-launches gpg-agent even when no secret keys are imported.

If it makes sense to warn a user for someone's preference when keys are imported,
here is a patch:

Aug 22 2019, 4:49 AM · Bug Report, gnupg

Aug 21 2019

werner added a project to T4680: dirmngr documentation titles claim X.509 only, but should describe full scope of the daemon: gnupg.
Aug 21 2019, 12:28 PM · gnupg, Documentation, Bug Report

Aug 16 2019

gniibe claimed T2893: gnupg should used ccid card key material fingerprints and not serial number.
Aug 16 2019, 6:15 AM · yubikey, Feature Request, gnupg

Aug 13 2019

werner added a project to T2893: gnupg should used ccid card key material fingerprints and not serial number: yubikey.
Aug 13 2019, 6:40 PM · yubikey, Feature Request, gnupg

Aug 5 2019

werner triaged T4669: Key expiration time sometimes improperly interpreted as a signed 32-bit value as Normal priority.
Aug 5 2019, 7:50 PM · Not A Bug, OpenPGP, gnupg

Jul 31 2019

dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

Please see my explanation on gnupg-devel about why the trailing NUL is a source of pain and difficulty for would-be adopters.

Jul 31 2019, 4:45 PM · gnupg, Bug Report
werner triaged T4652: avoid unnecessary trailing NUL byte in S-expressions as Low priority.
Jul 31 2019, 12:34 PM · gnupg, Bug Report
werner added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

Appending a nul byte is fail-safe programming and helps in debugging. It is on purpose and shall not be removed.

Jul 31 2019, 8:49 AM · gnupg, Bug Report

Jul 25 2019

gniibe changed the status of T4362: Replace the exec funtions for photoids in gpg by our standard exec functions. from Open to Testing.

Except w32_system function, it's done.

Jul 25 2019, 4:48 AM · gnupg, Feature Request
dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

I've just broken out my changes into two commits, one that makes gpg and gpgsm more robust. That should be applicable without any risk.

Jul 25 2019, 1:59 AM · gnupg, Bug Report

Jul 24 2019

aheinecke merged T4653: Kleopatra - Change Expiry Date into T4395: Kleopatra: Missing error handling when changing expiry.
Jul 24 2019, 9:46 AM · gpa, gnupg, gpgme, gpg4win, kleopatra
dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

I've just posted rGb84feb0c82eb to the dkg-fix-T4652 branch, which solves the failure problems by making agent_pkdecrypt and gpgsm_agent_pkdecrypt more robust.

Jul 24 2019, 6:24 AM · gnupg, Bug Report

Jul 23 2019

dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

fwiw, this patch appears to cause gpgsm to fail its test suite:

Jul 23 2019, 6:46 PM · gnupg, Bug Report
dkg updated the task description for T4652: avoid unnecessary trailing NUL byte in S-expressions.
Jul 23 2019, 5:46 PM · gnupg, Bug Report
dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

I've just pushed rG1ae16838660a to the dkg-fix-T4652 branch (i just adjusted it the commit message to include the GnuPG-bug-id)

Jul 23 2019, 5:40 PM · gnupg, Bug Report
dkg created T4652: avoid unnecessary trailing NUL byte in S-expressions.
Jul 23 2019, 5:37 PM · gnupg, Bug Report

Jul 22 2019

summitto added a comment to T169: Add a way to generate keypairs from a passphrase.

Hi everyone,

Jul 22 2019, 8:47 AM · gnupg, Feature Request

Jul 19 2019

gniibe added a comment to T4614: GPG: Cancel on pinpad hangs decryption process for 20 seconds.

It responds somehow, but the content has invalid data of (bChainParameter=0x04):

2019-07-05 09:36:41 scdaemon[71407] DBG: chan_17 -> S LOGIN-DATA aheinecke
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: PC_to_RDR_XfrBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 9
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 21
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bBWI ..............: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   wLevelParameter ...: 0x0000
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 40 05 00 CA 00
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0016]  6E 00 E1
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: RDR_to_PC_DataBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 4
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 21
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bStatus ...........: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bChainParameter ...: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 82 00 82
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: PC_to_RDR_XfrBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 9
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 22
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bBWI ..............: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   wLevelParameter ...: 0x0000
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 40 05 00 CA 00
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0016]  6E 00 E1
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: RDR_to_PC_DataBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 4
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 22
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bStatus ...........: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bChainParameter ...: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 82 00 82
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: PC_to_RDR_XfrBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 9
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 23
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bBWI ..............: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   wLevelParameter ...: 0x0000
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 40 05 00 CA 00
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0016]  6E 00 E1
2019-07-05 09:36:46 scdaemon[71407] DBG: ccid-driver: usb_bulk_read error: LIBUSB_ERROR_TIMEOUT
2019-07-05 09:36:46 scdaemon[71407] ccid_transceive failed: (0x1000a)
2019-07-05 09:36:46 scdaemon[71407] apdu_send_simple(1) failed: card I/O error
Jul 19 2019, 8:05 AM · backport, Restricted Project, scd, gnupg
gniibe added a comment to T4614: GPG: Cancel on pinpad hangs decryption process for 20 seconds.

After the cancellation, the card reader seems being screwed up:

Jul 19 2019, 8:02 AM · backport, Restricted Project, scd, gnupg
gniibe added a comment to T4614: GPG: Cancel on pinpad hangs decryption process for 20 seconds.

It is canceled:

2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: RDR_to_PC_DataBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 19
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bStatus ...........: 64
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bError ............: 239
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: CCID command failed: PIN cancelled
2019-07-05 09:36:41 scdaemon[71407] DBG: dismiss pinpad entry prompt
2019-07-05 09:36:41 scdaemon[71407] DBG: chan_7 -> INQUIRE DISMISSPINPADPROMPT
2019-07-05 09:36:41 scdaemon[71407] DBG: chan_7 <- END
2019-07-05 09:36:41 scdaemon[71407] verify CHV2 failed: Invalid response
2019-07-05 09:36:41 scdaemon[71407] operation decipher result: Invalid response
2019-07-05 09:36:41 scdaemon[71407] app_decipher failed: Invalid response
2019-07-05 09:36:41 scdaemon[71407] DBG: chan_7 -> ERR 100663372 Invalid response <SCD>
Jul 19 2019, 8:01 AM · backport, Restricted Project, scd, gnupg

Jul 16 2019

gniibe added a comment to T4042: RFC 4880 compliance.

It was rG07250279e7ec: * keyedit.c (keyedit_menu): Invisible alias "passwd" as "password". in 2004, which set default to rfc2440-text behavior.
And in 2007, the commit rGb550330067b6: * gpg.c (main): Disable --rfc2440-text and --force-v3-sigs by default. changed the default to no-rfc2440-text.

Jul 16 2019, 10:20 AM · OpenPGP, gnupg
gniibe closed T4105: Inconsistent output for revocation keys in --list-keys --with-colons as Resolved.

Thanks, fixed in master.

Jul 16 2019, 9:55 AM · Documentation, gnupg, Bug Report

Jul 12 2019

gniibe changed the status of T4280: gnupg doc doesn't build due to ImageMagick default policy from Open to Testing.

I disabled the dependency rules for the figures (it's only enabled for maintainers).

Jul 12 2019, 1:34 PM · gnupg, Documentation, Info Needed, Bug Report

Jul 10 2019

Valodim added a comment to T4163: hkps://hkps.pool.sks-keyservers.net has to many bad servers to be a good default.

We should put it of the agenda od the Brussesl summit in 3 weeks. I have a few ideas what we can do in gpg.

Jul 10 2019, 4:36 PM · gnupg, Keyserver

Jul 9 2019

werner closed T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32 as Resolved.
Jul 9 2019, 3:22 PM · gpgagent, gnupg, Bug Report
gniibe added a comment to T4616: Smartcard: Card reset required - It should be automatic.

I pushed my change of rGc51a5685554a: scd: ccid-driver: Initial getting ATR more robustly..
With TTXS, scdaemon correctly recovers from the error.

Jul 9 2019, 4:02 AM · gnupg, scd
gniibe added a comment to T4616: Smartcard: Card reset required - It should be automatic.

When the computer is going to suspend, the scdaemon receives a message from USB layer as the interrupt transfer is shutting down, then scdaemon considers it's removal of device/card.
But in case of suspend (and the device does not support USB suspend), USB port is kept with the power.
So, it keeps running actually.

Jul 9 2019, 3:07 AM · gnupg, scd
gniibe added a comment to T4616: Smartcard: Card reset required - It should be automatic.

Here are results of my experiment with Intel NUC computer (which supports S4 (and S3)).

Jul 9 2019, 2:53 AM · gnupg, scd

Jul 8 2019

aheinecke created T4616: Smartcard: Card reset required - It should be automatic.
Jul 8 2019, 2:30 PM · gnupg, scd
gniibe added a comment to T4158: UIF (User Interaction Flag) DO support.

No. I intentionally select: Not-backporting this feature.
The feature is added for Yubikey, in the specification.
Use of the feature by Data-Object is not that so useful.

Jul 8 2019, 9:21 AM · Restricted Project, Feature Request, scd, gnupg

Jul 5 2019

werner added a comment to T4158: UIF (User Interaction Flag) DO support.

I think we should not backport this to 2.2 - okay?

Jul 5 2019, 11:14 AM · Restricted Project, Feature Request, scd, gnupg
aheinecke created T4614: GPG: Cancel on pinpad hangs decryption process for 20 seconds.
Jul 5 2019, 9:50 AM · backport, Restricted Project, scd, gnupg
aheinecke closed T4561: GPG / GPGSM: Pinentry cancels lead to wrong error codes as Resolved.

Works for me! :-)

Jul 5 2019, 9:44 AM · S/MIME, gnupg
aheinecke merged T3928: canceling password dialog for decrypting is not recognized correctling. into T4561: GPG / GPGSM: Pinentry cancels lead to wrong error codes.
Jul 5 2019, 9:33 AM · S/MIME, gnupg
werner added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Not sending the user id packet, is just a bad idea because that user id exists and from my understanding they are sending the self-signatures anyway. They should not try to argue with the GDPR here, that is privacy theater. The key itself is a personal data and due to technical reasons this data is required. What they can do is to accept only user ids which carry just only mail address and no comments or name. posteo.de for example requires this for years and the WKD drafts has a feature to support this.

Jul 5 2019, 7:58 AM · gnupg (gpg23), Feature Request

Jul 4 2019

jaymzh added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Just want to weigh in here to say this would be incredibly useful given the shift to the new keyserver model. See T4604 for more context.

Jul 4 2019, 10:33 PM · gnupg (gpg23), Feature Request

Jul 3 2019

werner added a parent task for T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver: T4606: Release GnuPG 2.2.17.
Jul 3 2019, 6:11 PM · gnupg (gpg22), wkd

Jul 2 2019

kloczek added a comment to T4602: 2.2.16: test suite fails.

I cannot do that because all listed above packages are my own products.
Fedora is not execution test suites in more than 90% of all packages so they are not aware of most of the issues exposed by test suites.
Please focus on possible causes of above tests.
I'm opened on any suggestions to make additional diagnostics.

Jul 2 2019, 4:02 PM · Fedora, gnupg, Bug Report
werner triaged T4602: 2.2.16: test suite fails as Low priority.

Thanks. You may want to ask on the mailing list gnupg-users to see whether someone else has had problems building on rawhide. Right now we do not have the time for individual support and thus I unfortunately need to prioritize this bug report down.

Jul 2 2019, 3:43 PM · Fedora, gnupg, Bug Report
kloczek added a comment to T4602: 2.2.16: test suite fails.
[tkloczko@barrel SPECS]$ uname -a
Linux barrel 5.1.5-300.fc30.x86_64 #1 SMP Sat May 25 18:00:11 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
[tkloczko@barrel SPECS]$ rpm -q libassuan-devel libcurl-devel libgcrypt-devel libgpg-error-devel libksba-devel libusb-devel npth-devel openldap-devel pcsc-lite-libs gnutls-devel sqlite-devel
libassuan-devel-2.5.3-2.1.fc31.x86_64
libcurl-devel-7.65.1-2.fc31.x86_64
libgcrypt-devel-1.8.4-4.1.fc31.x86_64
libgpg-error-devel-1.36-2.fc31.x86_64
libksba-devel-1.3.5-10.1.fc31.x86_64
libusb-devel-0.1.5-14.fc30.x86_64
npth-devel-1.6-3.fc31.x86_64
openldap-devel-2.4.47-2.2.fc31.x86_64
pcsc-lite-libs-1.8.25-2.1.fc31.x86_64
gnutls-devel-3.6.8-2.fc31.x86_64
sqlite-devel-3.28.0-2.fc31.x86_64

Still about half of the packages are from Fedora rawhide but rest are mine.
Just checked and the test suite fails exactly the same way even started without palatalisation.

Jul 2 2019, 3:11 PM · Fedora, gnupg, Bug Report
werner added a comment to T4602: 2.2.16: test suite fails.

Please share with us the OS used, the versions of the libtaries used and other configuration information.
Also please run again using "make check" without any extra options.

Jul 2 2019, 9:32 AM · Fedora, gnupg, Bug Report
kloczek created T4602: 2.2.16: test suite fails.
Jul 2 2019, 9:00 AM · Fedora, gnupg, Bug Report

Jul 1 2019

werner claimed T4599: remap `--search` to `--locate-keys` (with warning).
Jul 1 2019, 7:31 PM · gnupg (gpg23), dirmngr
dkg created T4599: remap `--search` to `--locate-keys` (with warning).
Jul 1 2019, 6:16 PM · gnupg (gpg23), dirmngr
t8m added a comment to T1333: GPGSM rejects OCSP responder cert without keyUsage.

Ping?

Jul 1 2019, 5:40 PM · Bug Report, gnupg
aheinecke created T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver.
Jul 1 2019, 9:13 AM · gnupg (gpg22), wkd
aheinecke reassigned T4395: Kleopatra: Missing error handling when changing expiry from aheinecke to werner.

Werner: I'm assigning this to you. Because the underlying reason is a missing status from gpg. I think we should add that for 2.3 as any new status line tends to break things.

Jul 1 2019, 8:45 AM · gpa, gnupg, gpgme, gpg4win, kleopatra
gniibe changed the status of T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32 from Open to Testing.
Jul 1 2019, 6:14 AM · gpgagent, gnupg, Bug Report

Jun 28 2019

werner added a subtask for T2019: Order of magnitude degradation in performance in gpg2 cf gpg: T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.
Jun 28 2019, 12:01 PM · Stalled, Bug Report, gnupg
dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

sorry to keep pinging this, but given the ongoing flooding attacks (e.g. T4591) and how SKS and similar keyservers are unable to safely transmit flooded certificates, i think this kind of fix is urgent if we expect gpg to be able to retrieve revocations safely. What's the status here?

Jun 28 2019, 10:05 AM · gnupg (gpg23), Feature Request

Jun 26 2019

wiktor-k added a comment to T4584: --quick-sign-key offers no way to override a current certification.

For the record in my original message I asked about adding self-signatures.

Jun 26 2019, 11:12 AM · Restricted Project, gnupg (gpg22), Feature Request
werner triaged T4584: --quick-sign-key offers no way to override a current certification as Normal priority.
Jun 26 2019, 7:53 AM · Restricted Project, gnupg (gpg22), Feature Request

Jun 25 2019

dkg added a comment to T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

I'm unlikely to put a windows-specific patch into the debian source, as
i have no good way of testing it, and it wouldn't affect any binary that
we ship.

Jun 25 2019, 2:57 AM · gpgagent, gnupg, Bug Report

Jun 24 2019

Valodim added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

It's been a while, any word on this? I sent the DCO as requested. Are there any technical concerns left to address?

Jun 24 2019, 12:48 PM · gnupg (gpg23), Feature Request
gniibe added a comment to T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

@dkg, for your patch, it can be improved for Windows by using its event mechanism. You can see gnupg/scd/scdaemon.c.

Jun 24 2019, 4:00 AM · gpgagent, gnupg, Bug Report
dkg updated subscribers of T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

Hm, T4521 suggests that the two different cases should not be treated differently. If you think that they *should* cause distinct behavior, please do mention it over there!

Jun 24 2019, 2:24 AM · gpgagent, gnupg, Bug Report
gniibe added a comment to T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

There are two different cases: (1) By SIGTERM and (2) By KILLAGENT. It's true that the agent stops accepting on the listening socket for (1), but it's not the case for (2).
This particular problem is for the case (2).

Jun 24 2019, 1:59 AM · gpgagent, gnupg, Bug Report

Jun 21 2019

dkg added a comment to T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

@gniibe, thanks for the diagnosis! I agree that restarting or shutting down the backends should be done in the reverse order as a simple workaround.

Jun 21 2019, 6:24 PM · gpgagent, gnupg, Bug Report
gniibe added a comment to T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

Correct solution is to implement KILLAGENT synchronously, but it's somehow harder to implement.
Easier workaround is modifying gpgconf like:

Jun 21 2019, 3:47 AM · gpgagent, gnupg, Bug Report
gniibe edited projects for T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32, added: gnupg, gpgagent; removed gnupg (gpg22).

I found a race condition between KILLAGENT command and accepting another request.
Here is a patch to replicate the race condition :

Jun 21 2019, 2:33 AM · gpgagent, gnupg, Bug Report

Jun 20 2019

huowen added a comment to T4395: Kleopatra: Missing error handling when changing expiry.

Hello,
when can we fix it?

Jun 20 2019, 2:12 AM · gpa, gnupg, gpgme, gpg4win, kleopatra

Jun 18 2019

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

we now have a DCO from @Valodim

Jun 18 2019, 2:05 PM · gnupg (gpg23), Feature Request

Jun 16 2019

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

@werner, My usual approach for private branches is to prefix with dkg/, but (a) playfair rejects branch names with a /, and (b) i'm not the author of these patches, and i didn't want to claim credit that doesn't belong to me.

Jun 16 2019, 5:40 PM · gnupg (gpg23), Feature Request

Jun 14 2019

werner added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Please use a private branch as usual. There has been no agreement or a discussion over this change nor do we have a DCO from him.

Jun 14 2019, 6:10 PM · gnupg (gpg23), Feature Request
dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

I've pushed @Valodim's proposed patches to the fix-4393 branch in our git repo. they look good to me, and i think they should be merged to master.

Jun 14 2019, 6:08 PM · gnupg (gpg23), Feature Request

Jun 10 2019

kaspro added a comment to T4301: Handling multiple subkeys on two SmartCards.

Thanks a lot @gniibe for this change.
I do understand and share your concerns, nevertheless are there, in my opinion valid reasons to be able to have a backup or duplicate, especially on the same or similar media type.
Consider for example giving multiple devices a chance of common interaction, using the keys for backup encryption etc. - I think there are several possible use-cases which can benefit from this.

Jun 10 2019, 7:40 PM · Restricted Project, gnupg, scd, Bug Report

Jun 8 2019

werner triaged T4564: gpgconf --change-options prints warning about dirmngr_ldapservers.conf when GNUPGHOME is set as Wishlist priority.
Jun 8 2019, 10:41 AM · gnupg, Bug Report

Jun 7 2019

dkg created T4564: gpgconf --change-options prints warning about dirmngr_ldapservers.conf when GNUPGHOME is set.
Jun 7 2019, 10:28 PM · gnupg, Bug Report
aheinecke created T4561: GPG / GPGSM: Pinentry cancels lead to wrong error codes.
Jun 7 2019, 9:56 AM · S/MIME, gnupg

Jun 6 2019

werner added a comment to T4544: More prompts before key deletion.

Nope

Jun 6 2019, 7:39 AM · gnupg, Feature Request, patch
matheusmoreira renamed T4544: More prompts before key deletion from Key deletion: more prompts, new commands to More prompts before key deletion.
Jun 6 2019, 5:39 AM · gnupg, Feature Request, patch
matheusmoreira reopened T4544: More prompts before key deletion as "Open".

Here are the patches without any new commands:

Jun 6 2019, 3:58 AM · gnupg, Feature Request, patch
matheusmoreira added a comment to T4544: More prompts before key deletion.

@werner Only patches 2 and 3 introduce new commands. What do you think about the other changes?

Jun 6 2019, 3:20 AM · gnupg, Feature Request, patch

Jun 5 2019

werner closed T4544: More prompts before key deletion as Wontfix.

In case I not already mentioned it: There won't be any new commands to delete a key. Of course you are free to change GnuPG as you like but I won't apply them here.

Jun 5 2019, 6:18 PM · gnupg, Feature Request, patch
matheusmoreira changed Version from 2.2.15 to 2.2.16 on T4544: More prompts before key deletion.
Jun 5 2019, 11:53 AM · gnupg, Feature Request, patch