Page MenuHome GnuPG
Feed Advanced Search

Dec 19 2019

aheinecke assigned T4061: gnupg: --with-colons --with-secret returns wrong results if specific keys are queried to werner.
Dec 19 2019, 1:17 PM · gpgme, Bug Report, gnupg
gniibe added a comment to T4784: Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID.

Considering the concrete use case(s), it is more rational to support listing by capability.

NOTE: exposing capability is orthogonal issue
Dec 19 2019, 12:23 AM · scd, Feature Request, gnupg

Dec 18 2019

gniibe renamed T4784: Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID from Remove referring by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID to Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID.
Dec 18 2019, 2:36 AM · scd, Feature Request, gnupg
gniibe lowered the priority of T4784: Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID from Unbreak Now! to Normal.
Dec 18 2019, 2:30 AM · scd, Feature Request, gnupg
gniibe created T4784: Remove referring a key by $AUTHKEYID, $ENCRKEYID, and $SIGNKEYID.
Dec 18 2019, 2:22 AM · scd, Feature Request, gnupg
gniibe added a subtask for T4695: Remove SERIALNO as an identifier to select keys: Restricted Maniphest Task.
Dec 18 2019, 1:36 AM · Restricted Project, Feature Request, gnupg
gniibe added a parent task for T4301: Handling multiple subkeys on two SmartCards: T4695: Remove SERIALNO as an identifier to select keys.
Dec 18 2019, 1:35 AM · Restricted Project, gnupg, scd, Bug Report
gniibe added a subtask for T4695: Remove SERIALNO as an identifier to select keys: T4301: Handling multiple subkeys on two SmartCards.
Dec 18 2019, 1:35 AM · Restricted Project, Feature Request, gnupg

Dec 17 2019

werner added a comment to T4695: Remove SERIALNO as an identifier to select keys.

Many cards have some printed information and I consider them important to avoid testing one by one all the cards from my pocket.
This I am really in favor of beeing asked to insert the respective card. The new text format private key files make it much easier to maintain this info

Dec 17 2019, 4:36 PM · Restricted Project, Feature Request, gnupg

Dec 7 2019

pacien added a comment to T1287: Feature request: --decrypt-only.
In T1287#94619, @werner wrote:

2.1 has the option --unwrap to just this.

Dec 7 2019, 11:10 PM · Duplicate, gnupg, Feature Request

Dec 6 2019

gniibe added a parent task for T4702: Deadline for the GnuPG 2.3.0 release: T4293: Add dedicated X25519 function to Libcgrypt .
Dec 6 2019, 5:20 AM · Restricted Project, gpg4win, gnupg
gniibe added a parent task for T4702: Deadline for the GnuPG 2.3.0 release: T4713: Bug in get_best_pubkey_byname.
Dec 6 2019, 5:09 AM · Restricted Project, gpg4win, gnupg
gniibe removed a subtask for T4702: Deadline for the GnuPG 2.3.0 release: T4713: Bug in get_best_pubkey_byname.
Dec 6 2019, 5:09 AM · Restricted Project, gpg4win, gnupg
gniibe added a subtask for T4702: Deadline for the GnuPG 2.3.0 release: T4713: Bug in get_best_pubkey_byname.
Dec 6 2019, 5:05 AM · Restricted Project, gpg4win, gnupg
gniibe closed T4362: Replace the exec funtions for photoids in gpg by our standard exec functions. as Resolved.
Dec 6 2019, 3:38 AM · gnupg, Feature Request
gniibe added a subtask for T4362: Replace the exec funtions for photoids in gpg by our standard exec functions.: T4702: Deadline for the GnuPG 2.3.0 release.
Dec 6 2019, 3:37 AM · gnupg, Feature Request
gniibe added a parent task for T4702: Deadline for the GnuPG 2.3.0 release: T4362: Replace the exec funtions for photoids in gpg by our standard exec functions..
Dec 6 2019, 3:37 AM · Restricted Project, gpg4win, gnupg
gniibe added a parent task for T4702: Deadline for the GnuPG 2.3.0 release: T4620: no support for multiple (yubikey) smartcards plugged in at the same time.
Dec 6 2019, 3:08 AM · Restricted Project, gpg4win, gnupg
gniibe closed T4280: gnupg doc doesn't build due to ImageMagick default policy as Resolved.
Dec 6 2019, 3:04 AM · gnupg, Documentation, Info Needed, Bug Report

Dec 5 2019

gniibe added a comment to T4256: gpg-agent: Spurious pinentries for an already unlocked key when decryption OpenPGP in 10 threads.

My analysis is that it's not a race condition but... it's about secure memory.
It is true that we have a race condition between putting an entry to cache after pinentry interaction _and_ next examining cache to invoke pinentry. But for this test case, the gpg process of unlock the key (and cache the passphrase) is finished before running the run-threaded command.

Dec 5 2019, 6:33 AM · gnupg, gpgagent

Dec 2 2019

werner closed T4761: Verify signatures failed as Invalid.
Dec 2 2019, 5:27 PM · Support, gnupg

Nov 29 2019

apo added a comment to T4755: WoT forgeries using SHA-1.

I am currently investigating the issue known as CVE-2019-14855 for Debian's LTS version Debian 8 "Jessie" and even Debian 7 "Wheezy".

Nov 29 2019, 11:31 PM · CVE, gnupg
werner closed T4762: GPG decryption results in error "double free detected in tcache 2" as Resolved.

Regression due to a faulty backport. Fixed in repo; patch is F1052802
Thanks for reporting.

Nov 29 2019, 5:50 PM · gnupg, Bug Report
werner added a comment to T4762: GPG decryption results in error "double free detected in tcache 2".

Okay, I can replicate that on gnupg 2.2; it works correct on master.

Nov 29 2019, 4:43 PM · gnupg, Bug Report
werner triaged T4762: GPG decryption results in error "double free detected in tcache 2" as High priority.
Nov 29 2019, 4:33 PM · gnupg, Bug Report
nijssels created T4762: GPG decryption results in error "double free detected in tcache 2".
Nov 29 2019, 9:03 AM · gnupg, Bug Report

Nov 28 2019

werner removed a project from T4761: Verify signatures failed: Bug Report.

I am not sure what you want you are going. I see is a verify command using an unknown file or number of files without knowing its content (using globbing (*-SOMETHING) is not a good idea). Some signature is verified okay but it is not known whether the key is trustworthy. You export a ke and then you do a verify on the key - this can't work because a key-file is not a signature.

Nov 28 2019, 6:38 PM · Support, gnupg
Rycky_Tigg created T4761: Verify signatures failed.
Nov 28 2019, 1:58 PM · Support, gnupg

Nov 26 2019

werner closed T4759: gnupg-2.2.18/kbx/keybox-search.c:1159:36: warning: Function 'keybox_get_keyblock' argument order different as Invalid.

No bug.

Nov 26 2019, 11:20 AM · gnupg, Bug Report
werner triaged T4759: gnupg-2.2.18/kbx/keybox-search.c:1159:36: warning: Function 'keybox_get_keyblock' argument order different as Normal priority.

See T4760.

Nov 26 2019, 11:15 AM · gnupg, Bug Report

Nov 25 2019

werner closed T4165: Dirmngr: Ipv6 causes network failure if Ipv6 can't be reached, a subtask of T4163: hkps://hkps.pool.sks-keyservers.net has to many bad servers to be a good default, as Resolved.
Nov 25 2019, 10:17 PM · gnupg, Keyserver
werner closed T4652: avoid unnecessary trailing NUL byte in S-expressions as Resolved.
Nov 25 2019, 10:15 PM · gnupg, Bug Report
werner closed T4755: WoT forgeries using SHA-1 as Resolved.
Nov 25 2019, 10:11 PM · CVE, gnupg

Nov 24 2019

werner created T4755: WoT forgeries using SHA-1.
Nov 24 2019, 8:26 PM · CVE, gnupg

Nov 23 2019

geier created T4754: Please add a signature import filter "key in local keyring" in the S1 Public space.
Nov 23 2019, 12:15 PM · gnupg

Nov 21 2019

werner triaged T4751: gpgsm unable to import a PKCS12 file with a NULL password as Normal priority.
Nov 21 2019, 8:13 AM · gnupg, Feature Request, S/MIME

Nov 14 2019

werner closed T4749: --passphrase-fd 0 not working from command line as Invalid.

This is a bug tracker and not a general help line. You are better off asking on the gnupg-uisers mailing list.

Nov 14 2019, 10:49 AM · FAQ, gnupg
gniibe closed T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate, a subtask of T2019: Order of magnitude degradation in performance in gpg2 cf gpg, as Resolved.
Nov 14 2019, 12:00 AM · Stalled, Bug Report, gnupg

Nov 12 2019

aheinecke renamed T4745: GnuPG, Kleopatra: Remove Name length limitation for new keys from GnuPG, Kleopatra: Remove Name lenght limitation for new keys to GnuPG, Kleopatra: Remove Name length limitation for new keys.
Nov 12 2019, 9:56 AM · kleopatra, gnupg
aheinecke created T4745: GnuPG, Kleopatra: Remove Name length limitation for new keys.
Nov 12 2019, 9:51 AM · kleopatra, gnupg

Nov 11 2019

werner added a comment to T4447: Fix addition of new GPG keys to LDAP.

See also D475.

Nov 11 2019, 6:30 PM · gnupg (gpg23), patch, LDAP, dirmngr, Bug Report

Nov 7 2019

aheinecke added a comment to T4742: GnuPG, Kleopatra: Update --full-gen-key options for GnuPG-2.3.

Without --expert my proposal for full-gen-key would be:

Nov 7 2019, 8:37 AM · gnupg24, gnupg (gpg23), kleopatra
aheinecke created T4742: GnuPG, Kleopatra: Update --full-gen-key options for GnuPG-2.3.
Nov 7 2019, 8:30 AM · gnupg24, gnupg (gpg23), kleopatra

Nov 6 2019

werner added a project to T4740: GnuPG: Invalid digest algorithm for new certifications made by old keys with GnuPG master: CVE.

That is due to the mitigation for CVE-2019-14855. I need to see how to find a more specific mitigation.

Nov 6 2019, 4:25 PM · CVE, gnupg
aheinecke created T4740: GnuPG: Invalid digest algorithm for new certifications made by old keys with GnuPG master.
Nov 6 2019, 2:52 PM · CVE, gnupg

Oct 14 2019

npreining added a comment to T2760: Populate comment field when exporting authentication key for SSH.

Same here, having YubiKeys and on-disk ssh keys from several computers, it is a bit a pain not to know which key is actually used. Any chances to get at least an update via manual editing of the comment?

Oct 14 2019, 7:01 AM · gnupg24, ssh, Feature Request

Oct 11 2019

bjmgeek added a comment to T3020: Lock files not compatible between Windows and Linux (invalid size).

I've also noticed this issue on windows when trying to symlink %APPDATA%\gnupg to $HOME/.gnupg under msys32.

Oct 11 2019, 8:18 PM · Bug Report, gnupg

Oct 9 2019

gniibe added a project to T4158: UIF (User Interaction Flag) DO support: Restricted Project.
Oct 9 2019, 4:17 AM · Restricted Project, Feature Request, scd, gnupg
gniibe added a project to T4695: Remove SERIALNO as an identifier to select keys: Restricted Project.
Oct 9 2019, 4:15 AM · Restricted Project, Feature Request, gnupg

Sep 9 2019

aheinecke created T4702: Deadline for the GnuPG 2.3.0 release.
Sep 9 2019, 11:31 AM · Restricted Project, gpg4win, gnupg

Sep 6 2019

werner added a comment to T4695: Remove SERIALNO as an identifier to select keys.

BTW: I have the problem that I want to know the keys of all cards. "getinfo card_list" along with --demand can be used for this. gpg-card works this way. It does not work if plug in addtional cards becuase card_list shows only the cards for which a SERIALNO command has been used. A new feature to scan the buses for all readers and cards would be quite useful.

Sep 6 2019, 10:40 AM · Restricted Project, Feature Request, gnupg
gniibe added a comment to T4695: Remove SERIALNO as an identifier to select keys.

Still there are two places where we use "SCD serialno --demand <SERIALNO>". One is g10/skclist.c where we list available keys, another is the funciton card_key_available in agent/command-ssh.c .

Sep 6 2019, 1:41 AM · Restricted Project, Feature Request, gnupg
gniibe lowered the priority of T4695: Remove SERIALNO as an identifier to select keys from Unbreak Now! to High.
Sep 6 2019, 1:37 AM · Restricted Project, Feature Request, gnupg
gniibe added a comment to T4695: Remove SERIALNO as an identifier to select keys.

By the change of rG9f39e0167d06: agent: Fix ask_for_card to allow a key on multiple cards., the SERIALNO in the stub is just an auxiliary information, not identifying the card. Now, it is the keygrip for key to identify/select the card.

Sep 6 2019, 1:37 AM · Restricted Project, Feature Request, gnupg

Sep 5 2019

gniibe added a comment to T4695: Remove SERIALNO as an identifier to select keys.

I did too many things at once.
I'm going to divide up into pieces.

Sep 5 2019, 10:12 AM · Restricted Project, Feature Request, gnupg
gniibe added a comment to T4695: Remove SERIALNO as an identifier to select keys.

Sep 5 2019, 8:04 AM · Restricted Project, Feature Request, gnupg
gniibe created T4695: Remove SERIALNO as an identifier to select keys.
Sep 5 2019, 8:04 AM · Restricted Project, Feature Request, gnupg

Aug 30 2019

werner closed T4691: Grammar error/typo in gnupg/doc/gpg.texi:L201 "can decrypted" -> "can be decrypted" as Resolved.

Thanks. Fixed in stanble and master.

Aug 30 2019, 8:33 AM · gnupg, Documentation, Bug Report

Aug 29 2019

hyiltiz created T4691: Grammar error/typo in gnupg/doc/gpg.texi:L201 "can decrypted" -> "can be decrypted".
Aug 29 2019, 11:33 PM · gnupg, Documentation, Bug Report

Aug 23 2019

vsrinu26f added a comment to T2893: gnupg should used ccid card key material fingerprints and not serial number.

And also this is excellent point.

Aug 23 2019, 8:57 PM · yubikey, Feature Request, gnupg
werner added a comment to T2669: gpg --import auto-launches gpg-agent even when no secret keys are imported.

The agent is an important part of gnupg and it does not make sense to single out cases when it might not be needed. I can't see any harm from having an agent running. In fact, one of th netxt versions will add yet another daemon which will then be needed in all cases.

Aug 23 2019, 10:26 AM · Bug Report, gnupg

Aug 22 2019

dkg added a comment to T2669: gpg --import auto-launches gpg-agent even when no secret keys are imported.

Thanks, @gniibe. From reading this patch (i haven't tested it), it looks like it would avoid most unnecessary agent launches (and agent communication) in the (b) case, which is a win over the status quo.

Aug 22 2019, 8:47 PM · Bug Report, gnupg
gniibe closed T4228: Leaked FILE from tmpfile() in dns.c dns_trace_open as Resolved.

Fixed in master.

Aug 22 2019, 5:55 AM · dns, gnupg
gniibe added a comment to T4228: Leaked FILE from tmpfile() in dns.c dns_trace_open.

This part of code is questionable. It always comes fp!=NULL, so the part should be removed.
If fp==NULL, use of tmpfile is quite questionable because a user can't know where the trace output goes.
I'm going to remove that part.

Aug 22 2019, 5:54 AM · dns, gnupg
gniibe added a comment to T2669: gpg --import auto-launches gpg-agent even when no secret keys are imported.

If it makes sense to warn a user for someone's preference when keys are imported,
here is a patch:

Aug 22 2019, 4:49 AM · Bug Report, gnupg

Aug 21 2019

werner added a project to T4680: dirmngr documentation titles claim X.509 only, but should describe full scope of the daemon: gnupg.
Aug 21 2019, 12:28 PM · gnupg, Documentation, Bug Report

Aug 16 2019

gniibe claimed T2893: gnupg should used ccid card key material fingerprints and not serial number.
Aug 16 2019, 6:15 AM · yubikey, Feature Request, gnupg

Aug 13 2019

werner added a project to T2893: gnupg should used ccid card key material fingerprints and not serial number: yubikey.
Aug 13 2019, 6:40 PM · yubikey, Feature Request, gnupg

Aug 5 2019

werner triaged T4669: Key expiration time sometimes improperly interpreted as a signed 32-bit value as Normal priority.
Aug 5 2019, 7:50 PM · Not A Bug, OpenPGP, gnupg

Jul 31 2019

dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

Please see my explanation on gnupg-devel about why the trailing NUL is a source of pain and difficulty for would-be adopters.

Jul 31 2019, 4:45 PM · gnupg, Bug Report
werner triaged T4652: avoid unnecessary trailing NUL byte in S-expressions as Low priority.
Jul 31 2019, 12:34 PM · gnupg, Bug Report
werner added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

Appending a nul byte is fail-safe programming and helps in debugging. It is on purpose and shall not be removed.

Jul 31 2019, 8:49 AM · gnupg, Bug Report

Jul 25 2019

gniibe changed the status of T4362: Replace the exec funtions for photoids in gpg by our standard exec functions. from Open to Testing.

Except w32_system function, it's done.

Jul 25 2019, 4:48 AM · gnupg, Feature Request
dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

I've just broken out my changes into two commits, one that makes gpg and gpgsm more robust. That should be applicable without any risk.

Jul 25 2019, 1:59 AM · gnupg, Bug Report

Jul 24 2019

aheinecke merged T4653: Kleopatra - Change Expiry Date into T4395: Kleopatra: Missing error handling when changing expiry.
Jul 24 2019, 9:46 AM · gpa, gnupg, gpgme, gpg4win, kleopatra
dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

I've just posted rGb84feb0c82eb to the dkg-fix-T4652 branch, which solves the failure problems by making agent_pkdecrypt and gpgsm_agent_pkdecrypt more robust.

Jul 24 2019, 6:24 AM · gnupg, Bug Report

Jul 23 2019

dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

fwiw, this patch appears to cause gpgsm to fail its test suite:

Jul 23 2019, 6:46 PM · gnupg, Bug Report
dkg updated the task description for T4652: avoid unnecessary trailing NUL byte in S-expressions.
Jul 23 2019, 5:46 PM · gnupg, Bug Report
dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

I've just pushed rG1ae16838660a to the dkg-fix-T4652 branch (i just adjusted it the commit message to include the GnuPG-bug-id)

Jul 23 2019, 5:40 PM · gnupg, Bug Report
dkg created T4652: avoid unnecessary trailing NUL byte in S-expressions.
Jul 23 2019, 5:37 PM · gnupg, Bug Report

Jul 22 2019

summitto added a comment to T169: Add a way to generate keypairs from a passphrase.

Hi everyone,

Jul 22 2019, 8:47 AM · gnupg, Feature Request

Jul 19 2019

gniibe added a comment to T4614: GPG: Cancel on pinpad hangs decryption process for 20 seconds.

It responds somehow, but the content has invalid data of (bChainParameter=0x04):

2019-07-05 09:36:41 scdaemon[71407] DBG: chan_17 -> S LOGIN-DATA aheinecke
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: PC_to_RDR_XfrBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 9
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 21
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bBWI ..............: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   wLevelParameter ...: 0x0000
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 40 05 00 CA 00
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0016]  6E 00 E1
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: RDR_to_PC_DataBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 4
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 21
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bStatus ...........: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bChainParameter ...: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 82 00 82
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: PC_to_RDR_XfrBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 9
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 22
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bBWI ..............: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   wLevelParameter ...: 0x0000
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 40 05 00 CA 00
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0016]  6E 00 E1
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: RDR_to_PC_DataBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 4
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 22
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bStatus ...........: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bChainParameter ...: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 82 00 82
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: PC_to_RDR_XfrBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 9
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 23
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bBWI ..............: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   wLevelParameter ...: 0x0000
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 40 05 00 CA 00
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0016]  6E 00 E1
2019-07-05 09:36:46 scdaemon[71407] DBG: ccid-driver: usb_bulk_read error: LIBUSB_ERROR_TIMEOUT
2019-07-05 09:36:46 scdaemon[71407] ccid_transceive failed: (0x1000a)
2019-07-05 09:36:46 scdaemon[71407] apdu_send_simple(1) failed: card I/O error
Jul 19 2019, 8:05 AM · backport, Restricted Project, scd, gnupg
gniibe added a comment to T4614: GPG: Cancel on pinpad hangs decryption process for 20 seconds.

After the cancellation, the card reader seems being screwed up:

Jul 19 2019, 8:02 AM · backport, Restricted Project, scd, gnupg
gniibe added a comment to T4614: GPG: Cancel on pinpad hangs decryption process for 20 seconds.

It is canceled:

2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: RDR_to_PC_DataBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 19
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bStatus ...........: 64
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bError ............: 239
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: CCID command failed: PIN cancelled
2019-07-05 09:36:41 scdaemon[71407] DBG: dismiss pinpad entry prompt
2019-07-05 09:36:41 scdaemon[71407] DBG: chan_7 -> INQUIRE DISMISSPINPADPROMPT
2019-07-05 09:36:41 scdaemon[71407] DBG: chan_7 <- END
2019-07-05 09:36:41 scdaemon[71407] verify CHV2 failed: Invalid response
2019-07-05 09:36:41 scdaemon[71407] operation decipher result: Invalid response
2019-07-05 09:36:41 scdaemon[71407] app_decipher failed: Invalid response
2019-07-05 09:36:41 scdaemon[71407] DBG: chan_7 -> ERR 100663372 Invalid response <SCD>
Jul 19 2019, 8:01 AM · backport, Restricted Project, scd, gnupg

Jul 16 2019

gniibe added a comment to T4042: RFC 4880 compliance.

It was rG07250279e7ec: * keyedit.c (keyedit_menu): Invisible alias "passwd" as "password". in 2004, which set default to rfc2440-text behavior.
And in 2007, the commit rGb550330067b6: * gpg.c (main): Disable --rfc2440-text and --force-v3-sigs by default. changed the default to no-rfc2440-text.

Jul 16 2019, 10:20 AM · OpenPGP, gnupg
gniibe closed T4105: Inconsistent output for revocation keys in --list-keys --with-colons as Resolved.

Thanks, fixed in master.

Jul 16 2019, 9:55 AM · Documentation, gnupg, Bug Report

Jul 12 2019

gniibe changed the status of T4280: gnupg doc doesn't build due to ImageMagick default policy from Open to Testing.

I disabled the dependency rules for the figures (it's only enabled for maintainers).

Jul 12 2019, 1:34 PM · gnupg, Documentation, Info Needed, Bug Report

Jul 10 2019

Valodim added a comment to T4163: hkps://hkps.pool.sks-keyservers.net has to many bad servers to be a good default.

We should put it of the agenda od the Brussesl summit in 3 weeks. I have a few ideas what we can do in gpg.

Jul 10 2019, 4:36 PM · gnupg, Keyserver

Jul 9 2019

werner closed T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32 as Resolved.
Jul 9 2019, 3:22 PM · gpgagent, gnupg, Bug Report
gniibe added a comment to T4616: Smartcard: Card reset required - It should be automatic.

I pushed my change of rGc51a5685554a: scd: ccid-driver: Initial getting ATR more robustly..
With TTXS, scdaemon correctly recovers from the error.

Jul 9 2019, 4:02 AM · gnupg, scd
gniibe added a comment to T4616: Smartcard: Card reset required - It should be automatic.

When the computer is going to suspend, the scdaemon receives a message from USB layer as the interrupt transfer is shutting down, then scdaemon considers it's removal of device/card.
But in case of suspend (and the device does not support USB suspend), USB port is kept with the power.
So, it keeps running actually.

Jul 9 2019, 3:07 AM · gnupg, scd
gniibe added a comment to T4616: Smartcard: Card reset required - It should be automatic.

Here are results of my experiment with Intel NUC computer (which supports S4 (and S3)).

Jul 9 2019, 2:53 AM · gnupg, scd

Jul 8 2019

aheinecke created T4616: Smartcard: Card reset required - It should be automatic.
Jul 8 2019, 2:30 PM · gnupg, scd
gniibe added a comment to T4158: UIF (User Interaction Flag) DO support.

No. I intentionally select: Not-backporting this feature.
The feature is added for Yubikey, in the specification.
Use of the feature by Data-Object is not that so useful.

Jul 8 2019, 9:21 AM · Restricted Project, Feature Request, scd, gnupg

Jul 5 2019

werner added a comment to T4158: UIF (User Interaction Flag) DO support.

I think we should not backport this to 2.2 - okay?

Jul 5 2019, 11:14 AM · Restricted Project, Feature Request, scd, gnupg
aheinecke created T4614: GPG: Cancel on pinpad hangs decryption process for 20 seconds.
Jul 5 2019, 9:50 AM · backport, Restricted Project, scd, gnupg
aheinecke closed T4561: GPG / GPGSM: Pinentry cancels lead to wrong error codes as Resolved.

Works for me! :-)

Jul 5 2019, 9:44 AM · S/MIME, gnupg
aheinecke merged T3928: canceling password dialog for decrypting is not recognized correctling. into T4561: GPG / GPGSM: Pinentry cancels lead to wrong error codes.
Jul 5 2019, 9:33 AM · S/MIME, gnupg
werner added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Not sending the user id packet, is just a bad idea because that user id exists and from my understanding they are sending the self-signatures anyway. They should not try to argue with the GDPR here, that is privacy theater. The key itself is a personal data and due to technical reasons this data is required. What they can do is to accept only user ids which carry just only mail address and no comments or name. posteo.de for example requires this for years and the WKD drafts has a feature to support this.

Jul 5 2019, 7:58 AM · gnupg (gpg23), Feature Request

Jul 4 2019

jaymzh added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Just want to weigh in here to say this would be incredibly useful given the shift to the new keyserver model. See T4604 for more context.

Jul 4 2019, 10:33 PM · gnupg (gpg23), Feature Request