Page MenuHome GnuPG
Feed Advanced Search

Nov 23 2019

werner closed T4547: improve error message ("Not enabled") when using Tor network and standard resolver as Resolved.

The manual states that --standard-resolver is mostly for debugging. The reason you get an "not enabled" is that we can't allow direct DNS queries in Tor mode which would happen with the system (standard) DNS resolver.

Nov 23 2019, 8:32 PM · dirmngr, gnupg (gpg22), Bug Report
werner moved T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets) from Backlog to For next release on the gnupg (gpg22) board.
Nov 23 2019, 8:24 PM · gnupg (gpg22), wkd, Bug Report
ringelkrat added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).

Given that the the angle brackets are elsewhere used to indicate a search by mail address, it would be okay to allow for them in this case too (that is dkg's second example).
[...]
To answer your question: With the exception of case two this is desired behaviour also in the future,

Nov 23 2019, 6:53 PM · gnupg (gpg22), wkd, Bug Report
werner closed T4753: gpg-wks-client should install a default policy file as Resolved.

Done for 2.2 and master.

Nov 23 2019, 1:52 PM · gnupg (gpg22)

Nov 22 2019

werner created T4753: gpg-wks-client should install a default policy file .
Nov 22 2019, 3:19 PM · gnupg (gpg22)

Nov 20 2019

werner raised the priority of T4684: Release GnuPG 2.2.18 from Normal to High.
Nov 20 2019, 9:00 AM · Release Info, gnupg (gpg22)
werner lowered the priority of T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned from Normal to Wishlist.
Nov 20 2019, 8:58 AM · Keyserver, gnupg (gpg22), Bug Report

Nov 16 2019

werner triaged T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets) as Normal priority.
Nov 16 2019, 10:18 AM · gnupg (gpg22), wkd, Bug Report
werner added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).

Given that the the angle brackets are elsewhere used to indicate a search by mail address, it would be okay to allow for them in this case too (that is dkg's second example). The risk of a regression in that case is pretty low.

Nov 16 2019, 10:18 AM · gnupg (gpg22), wkd, Bug Report

Nov 7 2019

ringelkrat added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
-r  STRING

does a remote key lookup only if STRING is a valid addr-spec. No extraction of the addr-spec from STRING is done and thus angle brackets inhibit the use of a remote lookup.

Nov 7 2019, 4:51 PM · gnupg (gpg22), wkd, Bug Report
werner added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).

does a remote key lookup only if STRING is a valid addr-spec. No extraction of the addr-spec from STRING is done and thus angle brackets inhibit the use of a remote lookup. This was implemented in this way to be as much as possible backward compatible.

Nov 7 2019, 4:02 PM · gnupg (gpg22), wkd, Bug Report
werner added a project to T4670: Key expiration time ignored for zero creation date keys: patch.
Nov 7 2019, 3:51 PM · patch, gnupg (gpg22), Bug Report
werner closed T4741: PLAINTEXT_LENGTH is sometimes incorrect as Resolved.
Nov 7 2019, 3:46 PM · gnupg (gpg22), Bug Report
werner added a project to T4677: Failure using pinentry-tty or pinentry-curses when GnuPG's standard input is a file: unreproducible.
Nov 7 2019, 3:38 PM · unreproducible, gnupg (gpg22), Bug Report
dkg reopened T4741: PLAINTEXT_LENGTH is sometimes incorrect as "Open".

DETAILS says:

*** PLAINTEXT_LENGTH <length>
    This indicates the length of the plaintext that is about to be
    written.  Note that if the plaintext packet has partial length
    encoding it is not possible to know the length ahead of time.  In
    that case, this status tag does not appear.
Nov 7 2019, 3:36 PM · gnupg (gpg22), Bug Report
werner closed T4677: Failure using pinentry-tty or pinentry-curses when GnuPG's standard input is a file as Resolved.

Sorry, we can't replicate this with the current pinentry version.

Nov 7 2019, 3:23 PM · unreproducible, gnupg (gpg22), Bug Report
werner lowered the priority of T4696: Fresh certificate get's pulled into certificate chain with expired root certificate from High to Normal.
Nov 7 2019, 3:18 PM · gnupg (gpg22), S/MIME, Bug Report
werner moved T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned from Backlog to For next release on the gnupg (gpg22) board.
Nov 7 2019, 3:15 PM · Keyserver, gnupg (gpg22), Bug Report
werner changed the status of T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned from Open to Testing.
Nov 7 2019, 3:14 PM · Keyserver, gnupg (gpg22), Bug Report
werner closed T4741: PLAINTEXT_LENGTH is sometimes incorrect as Invalid.
Nov 7 2019, 2:32 PM · gnupg (gpg22), Bug Report
werner added a comment to T4741: PLAINTEXT_LENGTH is sometimes incorrect.

"PLAINTEXT 75 ..." means UTF-8 encoding (u) which is not not binary (b) or MIME ('m') and thus on Unix the line endings are converted from CR,LF to LF. On Windows you should see a different length. See plaintext.c#handle_plaintext()

Nov 7 2019, 8:43 AM · gnupg (gpg22), Bug Report
dkg created T4741: PLAINTEXT_LENGTH is sometimes incorrect.
Nov 7 2019, 6:02 AM · gnupg (gpg22), Bug Report

Oct 24 2019

dkg added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).

@werner, you seem to be saying that -r does not imply "key lookups on remote services". Is that correct?

Oct 24 2019, 8:42 PM · gnupg (gpg22), wkd, Bug Report

Oct 23 2019

ringelkrat added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).

This is a misunderstanding. The extraction of mail addresses is only doe for key lookups on remote services. Thus the -r case is as intended.

Oct 23 2019, 1:26 PM · gnupg (gpg22), wkd, Bug Report
werner added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).

This is a misunderstanding. The extraction of mail addresses is only doe for key lookups on remote services. Thus the -r case is as intended.

Oct 23 2019, 11:35 AM · gnupg (gpg22), wkd, Bug Report
ringelkrat added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).

Is this task maybe related to T1927?

Oct 23 2019, 8:07 AM · gnupg (gpg22), wkd, Bug Report
ringelkrat updated subscribers of T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).

Thank you @dkg for creating the bug report! I would like to glean the following information from the above mentioned discussion.

Oct 23 2019, 8:00 AM · gnupg (gpg22), wkd, Bug Report
dkg created T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
Oct 23 2019, 3:24 AM · gnupg (gpg22), wkd, Bug Report

Oct 17 2019

Valodim added a comment to T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

GnuPG ships a non-PKI certificate, specifically to authenticate hkps.pool.sks-keyservers.net. Now due to an implementation detail, this has been shown to potentially lead to authentication of other domains by this certificate, if a maintainer changes the default keyserver via the DIRMNGR_DEFAULT_KEYSERVER variable in configure.ac. Now arguably, this variable isn't exposed via ./configure, so it's not "officially" configurable - but evidently maintainers do want to change it. A trivial one-line patch was supplied to change the unintended and potentially security-problematic behavior into the (I believe) obviously intended one.

Oct 17 2019, 12:23 PM · gnupg (gpg22), Bug Report, dirmngr

Oct 15 2019

werner closed T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net` as Wontfix.
Oct 15 2019, 2:43 PM · gnupg (gpg22), Bug Report, dirmngr
werner changed the status of T4665: gpg --delete-key of subkey leaves dangling subkey binding signature from Open to Testing.
Oct 15 2019, 2:41 PM · gnupg (gpg22), Bug Report
werner lowered the priority of T4665: gpg --delete-key of subkey leaves dangling subkey binding signature from Normal to Wishlist.
Oct 15 2019, 2:39 PM · gnupg (gpg22), Bug Report
werner closed T4681: Allow non-OpenPGP cards with gpg 2.2 as Resolved.
Oct 15 2019, 1:05 PM · gnupg (gpg22), scd, OpenPGP

Oct 9 2019

gniibe added a project to T4633: gpg argument "--passphrase=" yields 'missing argument for option "--passphrase="': Restricted Project.
Oct 9 2019, 4:16 AM · Restricted Project, gnupg (gpg22), Bug Report

Sep 10 2019

dkg added a comment to T4704: Wrong error message when key is expired.

yep, the implementation thinks that the default signing key is expired due to metadata contained in the public keyring. The secret key is available to the implementation. So the error mesage No secret key can cause confusion and/or panic if the user thinks they've actually lost their secret key.

Sep 10 2019, 3:15 PM · gnupg24 (gnupg-2.4.4), UI, Bug Report

Sep 9 2019

werner added a comment to T4704: Wrong error message when key is expired.

You mean the default key is expired?

Sep 9 2019, 5:09 PM · gnupg24 (gnupg-2.4.4), UI, Bug Report
dkg added projects to T4704: Wrong error message when key is expired: gnupg (gpg22), UI.

fwiw, i can reproduce this on debian unstable with gpg version 2.2.17, without a redirected agent -- so the agent redirection isn't relevant here.

Sep 9 2019, 5:06 PM · gnupg24 (gnupg-2.4.4), UI, Bug Report

Sep 5 2019

werner triaged T4696: Fresh certificate get's pulled into certificate chain with expired root certificate as High priority.

Thanks for the sample certs. I noticed the posts but had not the time to look into them.

Sep 5 2019, 3:56 PM · gnupg (gpg22), S/MIME, Bug Report

Aug 29 2019

werner closed T4683: Release Libgcrypt 1.8.5, a subtask of T4684: Release GnuPG 2.2.18, as Resolved.
Aug 29 2019, 3:24 PM · Release Info, gnupg (gpg22)

Aug 28 2019

gouttegd added a comment to T4677: Failure using pinentry-tty or pinentry-curses when GnuPG's standard input is a file.

For information, I can’t reproduce here, either with GnuPG 2.2.17 / Pinentry 1.1.0 or with a fresh build from the tip of the master branches. Both pinentry-tty and pinentry-curses prompt for the password as expected, independently of whether the file to decrypt is specified as an argument or sent through standard input.

Aug 28 2019, 11:54 PM · unreproducible, gnupg (gpg22), Bug Report

Aug 23 2019

werner raised the priority of T4644: gpg: implement keybox compression run from Wishlist to Normal.

oops: That was an accidential priority change

Aug 23 2019, 4:26 PM · gnupg (gpg22), Bug Report
werner lowered the priority of T4644: gpg: implement keybox compression run from Normal to Wishlist.
Aug 23 2019, 4:24 PM · gnupg (gpg22), Bug Report
werner changed the status of T4644: gpg: implement keybox compression run from Open to Testing.

Implemented master and 2.2. Note that the comment in the master commit about possible reason for stucked keylisting in gpgsm is only related to master.

Aug 23 2019, 4:23 PM · gnupg (gpg22), Bug Report
werner lowered the priority of T4662: --locate-external-keys does not interact well with --no-auto-key-locate from Normal to Wishlist.
Aug 23 2019, 1:26 PM · gnupg (gpg22), Bug Report
werner changed the status of T4662: --locate-external-keys does not interact well with --no-auto-key-locate from Open to Testing.

I implemented it nearly as suggested. However, the default AKL is used, which is "local,wkd" (local is not used with that command though).

Aug 23 2019, 1:26 PM · gnupg (gpg22), Bug Report
werner lowered the priority of T4627: "gpg --verbose --list-secret-keys" prints a lot of warning messages unrelated to secret keys from Low to Wishlist.
Aug 23 2019, 12:56 PM · gnupg (gpg22), Bug Report
werner changed the status of T4627: "gpg --verbose --list-secret-keys" prints a lot of warning messages unrelated to secret keys from Open to Testing.

Fixed for 2.2.18. To allow seeing these warnings this change will only have an effect if a listing of all keys is requested.

Aug 23 2019, 12:55 PM · gnupg (gpg22), Bug Report
werner moved T4634: "gpg --quiet --quick-gen-key" is not quiet: emits "key $FPR marked as ultimately trusted" to stderr. from For next release to Ready for release on the gnupg (gpg22) board.
Aug 23 2019, 11:48 AM · gnupg (gpg22), Bug Report
werner changed the status of T4634: "gpg --quiet --quick-gen-key" is not quiet: emits "key $FPR marked as ultimately trusted" to stderr. from Open to Testing.

Done for 2.2.18

Aug 23 2019, 11:48 AM · gnupg (gpg22), Bug Report
werner closed T4589: gpg man page gives incomplete instructions for 3 passphrase-related options as Invalid.

This was already fixed with version 2.2.5.

Aug 23 2019, 11:38 AM · gnupg (gpg22), Documentation, Bug Report
werner moved T4684: Release GnuPG 2.2.18 from Backlog to For next release on the gnupg (gpg22) board.
Aug 23 2019, 11:32 AM · Release Info, gnupg (gpg22)
werner added a subtask for T4684: Release GnuPG 2.2.18: T4683: Release Libgcrypt 1.8.5.
Aug 23 2019, 11:31 AM · Release Info, gnupg (gpg22)
werner created T4684: Release GnuPG 2.2.18.
Aug 23 2019, 11:30 AM · Release Info, gnupg (gpg22)
werner moved T4633: gpg argument "--passphrase=" yields 'missing argument for option "--passphrase="' from For next release to Ready for release on the gnupg (gpg22) board.
Aug 23 2019, 11:01 AM · Restricted Project, gnupg (gpg22), Bug Report
werner moved T4594: dirmngr appears to unilaterally import system CAs from For next release to Ready for release on the gnupg (gpg22) board.
Aug 23 2019, 11:00 AM · Bug Report, dirmngr, gnupg (gpg22)
werner moved T4594: dirmngr appears to unilaterally import system CAs from Backlog to For next release on the gnupg (gpg22) board.
Aug 23 2019, 10:54 AM · Bug Report, dirmngr, gnupg (gpg22)
werner added a comment to T4594: dirmngr appears to unilaterally import system CAs.

Will be in 2.2.18

Aug 23 2019, 10:54 AM · Bug Report, dirmngr, gnupg (gpg22)
werner moved T4589: gpg man page gives incomplete instructions for 3 passphrase-related options from Backlog to For next release on the gnupg (gpg22) board.
Aug 23 2019, 10:51 AM · gnupg (gpg22), Documentation, Bug Report
werner moved T4612: Add spare space to the keybox to always allow the import of revocations. from Backlog to Wishlist on the gnupg (gpg22) board.
Aug 23 2019, 10:51 AM · gnupg24, gnupg (gpg23), Bug Report
werner moved T4627: "gpg --verbose --list-secret-keys" prints a lot of warning messages unrelated to secret keys from Backlog to For next release on the gnupg (gpg22) board.
Aug 23 2019, 10:50 AM · gnupg (gpg22), Bug Report
werner moved T4633: gpg argument "--passphrase=" yields 'missing argument for option "--passphrase="' from Backlog to For next release on the gnupg (gpg22) board.
Aug 23 2019, 10:49 AM · Restricted Project, gnupg (gpg22), Bug Report
werner moved T4634: "gpg --quiet --quick-gen-key" is not quiet: emits "key $FPR marked as ultimately trusted" to stderr. from Backlog to For next release on the gnupg (gpg22) board.
Aug 23 2019, 10:49 AM · gnupg (gpg22), Bug Report
werner moved T4644: gpg: implement keybox compression run from Backlog to For next release on the gnupg (gpg22) board.
Aug 23 2019, 10:48 AM · gnupg (gpg22), Bug Report
werner renamed T4644: gpg: implement keybox compression run from gpg: implent keybox compression run to gpg: implement keybox compression run.
Aug 23 2019, 10:48 AM · gnupg (gpg22), Bug Report
werner moved T4662: --locate-external-keys does not interact well with --no-auto-key-locate from Backlog to For next release on the gnupg (gpg22) board.
Aug 23 2019, 10:47 AM · gnupg (gpg22), Bug Report
werner moved T4665: gpg --delete-key of subkey leaves dangling subkey binding signature from Backlog to For next release on the gnupg (gpg22) board.
Aug 23 2019, 10:47 AM · gnupg (gpg22), Bug Report
werner closed T4668: `gpgconf --launch gpg-agent` tells me to run `gpgconf --check-options gpg-agent`, but the latter command gives me no information as Resolved.

I changed the suggestion to read:

Aug 23 2019, 10:46 AM · gnupg (gpg22), Bug Report
werner moved T4681: Allow non-OpenPGP cards with gpg 2.2 from Backlog to For next release on the gnupg (gpg22) board.
Aug 23 2019, 10:33 AM · gnupg (gpg22), scd, OpenPGP

Aug 22 2019

werner added a comment to T4681: Allow non-OpenPGP cards with gpg 2.2.

Note that rGd3f5d8544fdb needs to be backported to 2.2 but we will wait until we have better tested it.

Aug 22 2019, 4:44 PM · gnupg (gpg22), scd, OpenPGP

Aug 21 2019

werner created T4681: Allow non-OpenPGP cards with gpg 2.2.
Aug 21 2019, 1:56 PM · gnupg (gpg22), scd, OpenPGP
skeeto added a comment to T4677: Failure using pinentry-tty or pinentry-curses when GnuPG's standard input is a file.

@dkg, I changed the title and adjusted the description to more accurately describe the situation.

Aug 21 2019, 2:24 AM · unreproducible, gnupg (gpg22), Bug Report
skeeto renamed T4677: Failure using pinentry-tty or pinentry-curses when GnuPG's standard input is a file from GnuPG unable to use imported protected subkeys to Failure using pinentry-tty or pinentry-curses when GnuPG's standard input is a file.
Aug 21 2019, 2:22 AM · unreproducible, gnupg (gpg22), Bug Report

Aug 20 2019

dkg added a comment to T4677: Failure using pinentry-tty or pinentry-curses when GnuPG's standard input is a file.

@skeeto can you edit the summary/title of this ticket to better reflect what you think the underlying issue is?

Aug 20 2019, 2:45 AM · unreproducible, gnupg (gpg22), Bug Report

Aug 13 2019

gniibe added a comment to T4670: Key expiration time ignored for zero creation date keys.

I think that I located the cause of this bug:

Aug 13 2019, 6:27 AM · patch, gnupg (gpg22), Bug Report
skeeto added a comment to T4677: Failure using pinentry-tty or pinentry-curses when GnuPG's standard input is a file.

Those changes make the script work for me, specifically passing the input as an argument and not through standard input. Digging more, it looks like the underlying issue is related to using pinentry-tty (my case) or pinentry-curses when passing the OpenPGP input via standard input. This causes pinentry to give up before prompting. For pinentry-tty it fails with "ERR 83886340 Invalid IPC response" and pinentty-curses fails with "ERR 83918950 Inappropriate ioctl for device".

Aug 13 2019, 5:18 AM · unreproducible, gnupg (gpg22), Bug Report
gniibe added projects to T4677: Failure using pinentry-tty or pinentry-curses when GnuPG's standard input is a file: Info Needed, gnupg (gpg22).
Aug 13 2019, 4:15 AM · unreproducible, gnupg (gpg22), Bug Report

Aug 5 2019

werner triaged T4665: gpg --delete-key of subkey leaves dangling subkey binding signature as Normal priority.
Aug 5 2019, 7:51 PM · gnupg (gpg22), Bug Report
werner triaged T4667: "gpg: deleting secret key failed: No pinentry" when in --batch mode with --pinentry=loopback as Normal priority.
Aug 5 2019, 7:51 PM · gnupg24, gnupg (gpg23), Bug Report
werner triaged T4668: `gpgconf --launch gpg-agent` tells me to run `gpgconf --check-options gpg-agent`, but the latter command gives me no information as Low priority.
Aug 5 2019, 10:04 AM · gnupg (gpg22), Bug Report
werner triaged T4670: Key expiration time ignored for zero creation date keys as Normal priority.
Aug 5 2019, 10:00 AM · patch, gnupg (gpg22), Bug Report

Aug 3 2019

dkg created T4668: `gpgconf --launch gpg-agent` tells me to run `gpgconf --check-options gpg-agent`, but the latter command gives me no information.
Aug 3 2019, 7:30 PM · gnupg (gpg22), Bug Report
dkg created T4667: "gpg: deleting secret key failed: No pinentry" when in --batch mode with --pinentry=loopback.
Aug 3 2019, 7:15 PM · gnupg24, gnupg (gpg23), Bug Report
dkg added a comment to T4666: gpg --delete-secret-keys: excessive and unclear prompting, surprising outcomes.

I also observe that the text in the GUI prompts is remarkably unclear on its own. setting aside the grammar, punctuation, and wording, the prompts don't expose the usage flags set for the secret keys, which is possibly the only detail that a user with a single OpenPGP certificate would care about: "am i deleting my signing-capable subkey or my decryption-capable subkey?"

Aug 3 2019, 7:10 PM · gnupg24, gnupg (gpg23), Bug Report
dkg created T4666: gpg --delete-secret-keys: excessive and unclear prompting, surprising outcomes.
Aug 3 2019, 7:05 PM · gnupg24, gnupg (gpg23), Bug Report
dkg created T4665: gpg --delete-key of subkey leaves dangling subkey binding signature.
Aug 3 2019, 5:12 PM · gnupg (gpg22), Bug Report

Jul 31 2019

werner triaged T4662: --locate-external-keys does not interact well with --no-auto-key-locate as Normal priority.
Jul 31 2019, 9:38 PM · gnupg (gpg22), Bug Report
dkg created T4662: --locate-external-keys does not interact well with --no-auto-key-locate.
Jul 31 2019, 7:31 PM · gnupg (gpg22), Bug Report
werner triaged T4619: Unable to decrypt symmetric-key encrypted data as Normal priority.
Jul 31 2019, 12:37 PM · gnupg24, gnupg (gpg23), Bug Report
werner triaged T4644: gpg: implement keybox compression run as Normal priority.
Jul 31 2019, 8:53 AM · gnupg (gpg22), Bug Report

Jul 22 2019

gniibe changed the status of T4633: gpg argument "--passphrase=" yields 'missing argument for option "--passphrase="' from Open to Testing.

Backported.

Jul 22 2019, 7:23 AM · Restricted Project, gnupg (gpg22), Bug Report

Jul 20 2019

gniibe added a comment to T4619: Unable to decrypt symmetric-key encrypted data.

Yes: at least 255 times.

Jul 20 2019, 12:28 AM · gnupg24, gnupg (gpg23), Bug Report

Jul 19 2019

stm added a comment to T4619: Unable to decrypt symmetric-key encrypted data.

IIUC, there is only a single recipient, but it has 256 SKESK packets, while only a single SKESK is valid and others are all dummy, right?

Jul 19 2019, 6:35 PM · gnupg24, gnupg (gpg23), Bug Report
gniibe claimed T4633: gpg argument "--passphrase=" yields 'missing argument for option "--passphrase="'.

Patch is pushed to master. Will be backported to 2.2.

Jul 19 2019, 10:20 AM · Restricted Project, gnupg (gpg22), Bug Report
gniibe added a comment to T4619: Unable to decrypt symmetric-key encrypted data.

Sorry, perhaps, I misunderstood how SKESK packets are generated in your application.
I was considering there were 256 recipients.

Jul 19 2019, 2:12 AM · gnupg24, gnupg (gpg23), Bug Report

Jul 18 2019

gniibe added a comment to T4619: Unable to decrypt symmetric-key encrypted data.

If the use of GnuPG (current implementation) is a condition, I think that you could improve the generation of SKESK packets, so that no other passphrase can let gpg misunderstand as it may decrypt encrypted packet.

Jul 18 2019, 11:48 PM · gnupg24, gnupg (gpg23), Bug Report
stm added a comment to T4619: Unable to decrypt symmetric-key encrypted data.

Unfortunately, for my use case the corresponding SKESK packet number is not known when calling GnuPG.

Jul 18 2019, 11:02 PM · gnupg24, gnupg (gpg23), Bug Report
dkg added a comment to T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned.

I'm aware of you releasing an RC for comments, and i apologize for not catching this particular case earlier. As you know from T4607, i was even advocating for it. i didn't understand the full implications of the "import-then-clean" approach at the time, and was thinking it would only apply to the incoming material, not the stored material.

Jul 18 2019, 4:26 PM · Keyserver, gnupg (gpg22), Bug Report
werner triaged T4633: gpg argument "--passphrase=" yields 'missing argument for option "--passphrase="' as High priority.
Jul 18 2019, 11:13 AM · Restricted Project, gnupg (gpg22), Bug Report
werner triaged T4634: "gpg --quiet --quick-gen-key" is not quiet: emits "key $FPR marked as ultimately trusted" to stderr. as Wishlist priority.
Jul 18 2019, 11:11 AM · gnupg (gpg22), Bug Report
werner added a comment to T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned.

The code has comments why we do a first clean_key on the imported keyblock.

Jul 18 2019, 11:07 AM · Keyserver, gnupg (gpg22), Bug Report