Page MenuHome GnuPG
Feed Advanced Search

May 11 2020

werner claimed T4896: ksba: Ed25519 support.
May 11 2020, 7:50 PM · Info Needed, libksba, Feature Request, S/MIME
werner changed the status of T4098: GpgSM: Add ECC support from Open to Testing.

Signing using ECDSA does now also work. Tested with 3 in disk keys: nistp256, nistp384 and RSA and verified using gpgsm and Governikus Signer.

May 11 2020, 6:46 PM · gnupg (gpg23), Feature Request, S/MIME

May 8 2020

werner added a project to T4098: GpgSM: Add ECC support: gnupg (gpg23).
May 8 2020, 6:16 PM · gnupg (gpg23), Feature Request, S/MIME
werner renamed T4098: GpgSM: Add ECC support from GpgSM: Add ECC support (Option to create an X.509/ECDSA key) to GpgSM: Add ECC support.
May 8 2020, 6:15 PM · gnupg (gpg23), Feature Request, S/MIME
werner added a comment to T4098: GpgSM: Add ECC support.

Basic en- and decryption test against Governikus_Signer has now been done. Beware: I had to add a debug option to gpgsm to workaround non-compliance in algorithm support of Governikus; see the rG68b857df13c8a4e6cae5e3a29fd065bf90764547 for details.

May 8 2020, 6:14 PM · gnupg (gpg23), Feature Request, S/MIME
aheinecke claimed T4807: Mime Compatibility with Symantec PGP.

I'm not sure what to do here. The problem is that all users in clients without PGP/MIME Support will see the attachment names. That is why we use the names as they are.

May 8 2020, 3:27 PM · gpgol, Feature Request
aheinecke assigned T4930: Support --multifile --detach-sign to werner.
May 8 2020, 11:47 AM · Feature Request
aheinecke triaged T4930: Support --multifile --detach-sign as Wishlist priority.
May 8 2020, 11:47 AM · Feature Request

May 7 2020

werner created T4938: Support Signature Card V2.0 (NKS15).
May 7 2020, 8:18 AM · eIDAS, scd, Feature Request, S/MIME

May 4 2020

werner changed the status of T4920: Support ECDH in Libksba, a subtask of T4098: GpgSM: Add ECC support, from Open to Testing.
May 4 2020, 3:05 PM · gnupg (gpg23), Feature Request, S/MIME
werner changed the status of T4920: Support ECDH in Libksba from Open to Testing.

It works for me(tm).

May 4 2020, 3:05 PM · libksba, Feature Request, S/MIME

Apr 29 2020

ppalaga added a comment to T4930: Support --multifile --detach-sign.

That would be awesome, thanks!

Apr 29 2020, 6:26 PM · Feature Request
werner added a comment to T4930: Support --multifile --detach-sign.

API-wise this would be possible because right now gpg errors out with

Apr 29 2020, 11:55 AM · Feature Request
ppalaga updated the task description for T4930: Support --multifile --detach-sign.
Apr 29 2020, 10:29 AM · Feature Request
ppalaga set External Link to https://issues.apache.org/jira/browse/MGPG-82 on T4930: Support --multifile --detach-sign.
Apr 29 2020, 10:24 AM · Feature Request
ppalaga created T4930: Support --multifile --detach-sign.
Apr 29 2020, 10:20 AM · Feature Request

Apr 27 2020

werner changed the status of T4921: Support import of PKCS#12 encoded ECC private keys. from Open to Testing.
Apr 27 2020, 8:09 PM · gnupg22 (gnupg-2.2.42), backport, Feature Request, S/MIME
werner changed the status of T4921: Support import of PKCS#12 encoded ECC private keys., a subtask of T4098: GpgSM: Add ECC support, from Open to Testing.
Apr 27 2020, 8:09 PM · gnupg (gpg23), Feature Request, S/MIME
werner added a comment to T4921: Support import of PKCS#12 encoded ECC private keys..

Done for master

Apr 27 2020, 8:09 PM · gnupg22 (gnupg-2.2.42), backport, Feature Request, S/MIME

Apr 24 2020

werner created T4926: Add API to map a curve name to its canonical OID..
Apr 24 2020, 2:15 PM · Feature Request, libgcrypt

Apr 23 2020

asv added a comment to T4923: Compile Kleopatra with DEP/ASLR support.

Seems like this is applicable to other binaries as well:

Apr 23 2020, 4:15 PM · gpg4win, kleopatra, Feature Request
werner triaged T4923: Compile Kleopatra with DEP/ASLR support as Normal priority.
Apr 23 2020, 2:53 PM · gpg4win, kleopatra, Feature Request

Apr 22 2020

asv created T4923: Compile Kleopatra with DEP/ASLR support.
Apr 22 2020, 8:36 AM · gpg4win, kleopatra, Feature Request

Apr 21 2020

werner created T4921: Support import of PKCS#12 encoded ECC private keys..
Apr 21 2020, 5:01 PM · gnupg22 (gnupg-2.2.42), backport, Feature Request, S/MIME
werner created T4920: Support ECDH in Libksba.
Apr 21 2020, 2:33 PM · libksba, Feature Request, S/MIME

Apr 20 2020

BenM added a comment to T3505: Port GPGME's Python bindings to Windows.

On further thought, it's possible that something closer to what
Bernhard wants (and incidentally more along the lines of what I was
thinking of in some of our discussions just after the initial port)
might be achievable with Cython.

Apr 20 2020, 8:00 PM · Feature Request, gpgme, Python
werner added a comment to T3505: Port GPGME's Python bindings to Windows.

FWIW, GPGME is basically C90 and we only recently started to use C99 variadic macros - they are a cpp feature, though.

Apr 20 2020, 7:29 AM · Feature Request, gpgme, Python

Apr 19 2020

BenM added a comment to T3505: Port GPGME's Python bindings to Windows.

CFFI has no real means of generating the needed bindings on the fly
like SWIG does, except via its ABI methods, but those are inferior to
what SWIG does. It also can't handle all the ifdefs (or really any of
the ifdefs) in gpgme.h.

Apr 19 2020, 7:46 PM · Feature Request, gpgme, Python

Apr 17 2020

werner added a comment to T4098: GpgSM: Add ECC support.

I am working on the Telesec Signature Card v2. I will add encryption support to gpgsm.

Apr 17 2020, 6:03 PM · gnupg (gpg23), Feature Request, S/MIME

Apr 16 2020

werner closed T4917: Add AEAD support to --show-session-key as Invalid.

Nope, I was wrong.

Apr 16 2020, 9:19 AM · Feature Request, gnupg (gpg23)
werner created T4917: Add AEAD support to --show-session-key.
Apr 16 2020, 9:16 AM · Feature Request, gnupg (gpg23)

Apr 8 2020

johnmar added a comment to T4630: libgcrypt: POWER GHASH Vector Acceleration.

Hi @slandden.
Do you have any updates?

Apr 8 2020, 6:02 PM · Feature Request, libgcrypt

Apr 7 2020

werner created T4910: Allow to add a no-mail notation to user-ids.
Apr 7 2020, 8:38 AM · gnupg24, gnupg (gpg23), Feature Request

Apr 6 2020

gniibe changed the status of T4888: GpgSM: Support ECC key generation by gpgsm_genkey, a subtask of T4098: GpgSM: Add ECC support, from Open to Testing.
Apr 6 2020, 6:49 AM · gnupg (gpg23), Feature Request, S/MIME
gniibe changed the status of T4888: GpgSM: Support ECC key generation by gpgsm_genkey from Open to Testing.
Apr 6 2020, 6:49 AM · Restricted Project, Feature Request, S/MIME

Apr 2 2020

gniibe added a comment to T4864: New scdaemon command to watch device removal.

It runs like:

$ gpg-connect-agent "scd devinfo --watch" /bye
S DEVINFO_START
S DEVINFO_END
S DEVINFO_STATUS new
S DEVINFO_START
S DEVICE generic D276000124010200F517000000010000 openpgp
S DEVINFO_END
S DEVINFO_STATUS removal
S DEVINFO_START
S DEVINFO_END
OK
$ 
Apr 2 2020, 8:49 AM · Restricted Project, Feature Request, scd, Bug Report
gniibe changed the status of T4864: New scdaemon command to watch device removal from Open to Testing.

Push the change to master.

Apr 2 2020, 8:46 AM · Restricted Project, Feature Request, scd, Bug Report

Mar 31 2020

gniibe added a comment to T4888: GpgSM: Support ECC key generation by gpgsm_genkey.

genkey for Ed25519 works now with libksba in master.

Mar 31 2020, 8:59 AM · Restricted Project, Feature Request, S/MIME
gniibe added a comment to T4896: ksba: Ed25519 support.

For public key, it's done.

Mar 31 2020, 8:59 AM · Info Needed, libksba, Feature Request, S/MIME

Mar 30 2020

gniibe added a project to T4896: ksba: Ed25519 support: libksba.
Mar 30 2020, 7:55 AM · Info Needed, libksba, Feature Request, S/MIME
gniibe created T4896: ksba: Ed25519 support.
Mar 30 2020, 7:55 AM · Info Needed, libksba, Feature Request, S/MIME

Mar 29 2020

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Thanks for following up!

Mar 29 2020, 6:46 PM · gnupg (gpg23), Feature Request
werner added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

No, we always stated that the user id is a mandatory part of OpenPGP keyblocks and that non-compliant keyblocks are rejected. The only exception we made are for revocation signatures where we allow a standalone packet. That exception is done to allow typing in a printed out revocation signature.

Mar 29 2020, 6:30 PM · gnupg (gpg23), Feature Request
dkg updated subscribers of T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

To be clear: marking this ticket wontfix means (among other things) that it is the GnuPG project's upstream position that:

Mar 29 2020, 5:38 PM · gnupg (gpg23), Feature Request
werner closed T4393: GnuPG should always accept key updates even if the update does not contain UIDs as Wontfix.

With OpenPGP we made user ids mandatory to avoid problems we had with PGP2. I see no reason to revert this.

Mar 29 2020, 11:25 AM · gnupg (gpg23), Feature Request

Mar 28 2020

ilf added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Nine months have passed since the patches for this problem have been available.

Mar 28 2020, 5:43 PM · gnupg (gpg23), Feature Request

Mar 27 2020

werner triaged T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation as Normal priority.

I recall that I talked with Stephan about it but things got lost.

Mar 27 2020, 7:12 PM · FIPS, libgcrypt, Feature Request
pmgdeb created T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.
Mar 27 2020, 6:04 PM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4888: GpgSM: Support ECC key generation by gpgsm_genkey.

NIST P-256 key generation looks good.

Mar 27 2020, 11:53 AM · Restricted Project, Feature Request, S/MIME

Mar 25 2020

werner created T4891: Support CBOR content in gpgsm.
Mar 25 2020, 12:54 PM · Feature Request, gnupg, S/MIME

Mar 24 2020

gniibe added a comment to T4098: GpgSM: Add ECC support.

There are two code paths to generate key: gpgsm_genkey and gpgsm_gencertreq_tty. Latter is partially supported with card key.
Firstly, I'm going to work for T4888.

Mar 24 2020, 6:32 AM · gnupg (gpg23), Feature Request, S/MIME
gniibe created T4888: GpgSM: Support ECC key generation by gpgsm_genkey.
Mar 24 2020, 6:30 AM · Restricted Project, Feature Request, S/MIME
gniibe changed the status of T4013: Certificate requests generated from Ed25519 keys are not compliant with draft-ietf-curdle-pkix from Open to Testing.

This should work well with libksba master and gnupg/sm master.

Mar 24 2020, 3:35 AM · S/MIME, Feature Request, libksba
gniibe changed the status of T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed from Open to Testing.

The commits in 2019 (for libksba and gnupg/sm) handles the problem (of key generation using card).

Mar 24 2020, 3:32 AM · Restricted Project, Feature Request, S/MIME

Mar 19 2020

gniibe added a comment to T4864: New scdaemon command to watch device removal.

Created https://dev.gnupg.org/source/gnupg/history/gniibe%252Fscd-watch/

Mar 19 2020, 6:28 AM · Restricted Project, Feature Request, scd, Bug Report
gniibe added a subtask for T1303: Please support GCRYSEXP_FMT_BASE64: T4294: Release Libgcrypt 1.9.0.
Mar 19 2020, 5:19 AM · Feature Request, libgcrypt
gniibe removed a parent task for T1303: Please support GCRYSEXP_FMT_BASE64: T4294: Release Libgcrypt 1.9.0.
Mar 19 2020, 5:19 AM · Feature Request, libgcrypt

Mar 18 2020

werner edited projects for T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx`, added: gnupg (gpg23); removed gnupg (gpg22).

Given that we may move to yet another format in 2.3 I now doubt that we should add such a feature to 2.2.

Mar 18 2020, 2:22 PM · gnupg24, gnupg (gpg23), Feature Request
werner closed T4855: The trusted-key option requires a long key ID and won't take a fingerprint as Resolved.

Thanks. I applied your patch to 2.2 and master. I had to do a minor fix because the function does not return anything. Also extended on master with another patch for v5 keys.

Mar 18 2020, 2:04 PM · gnupg (gpg22), Feature Request

Mar 17 2020

gniibe closed T4880: npth: Add functions to wake up condition variable, a subtask of T4864: New scdaemon command to watch device removal, as Invalid.
Mar 17 2020, 2:59 AM · Restricted Project, Feature Request, scd, Bug Report
gniibe closed T4880: npth: Add functions to wake up condition variable as Invalid.

It is my confusion. The API is available. I only looked for symbols in the library.
It is #define-d macro to pthread_cond_*.

Mar 17 2020, 2:59 AM · Feature Request, npth
gniibe added a comment to T4880: npth: Add functions to wake up condition variable.

For Windows, it is available. I don't know the reason why it has not been available for POSIX.

Mar 17 2020, 1:51 AM · Feature Request, npth

Mar 16 2020

gniibe added a subtask for T4864: New scdaemon command to watch device removal: T4880: npth: Add functions to wake up condition variable.
Mar 16 2020, 6:03 AM · Restricted Project, Feature Request, scd, Bug Report
gniibe added a parent task for T4880: npth: Add functions to wake up condition variable: T4864: New scdaemon command to watch device removal.
Mar 16 2020, 6:03 AM · Feature Request, npth
gniibe created T4880: npth: Add functions to wake up condition variable.
Mar 16 2020, 6:02 AM · Feature Request, npth

Mar 14 2020

werner added a comment to T4856: GPG: Key Exchange Put public OpenPGP key into signature.

I think that this chnage is useful enough to be backported to 2.2. Done that.

Mar 14 2020, 8:14 PM · Feature Request, gpgol, Keyserver, gnupg

Mar 13 2020

werner changed the status of T4856: GPG: Key Exchange Put public OpenPGP key into signature from Open to Testing.
Mar 13 2020, 5:29 PM · Feature Request, gpgol, Keyserver, gnupg
werner added a comment to T4856: GPG: Key Exchange Put public OpenPGP key into signature.

You can test it now out using GnuPG master: Just add --include-key-block and you can then verify using an empty keyring. Currently --auto-key-retrieve is not needed but we need to think on how we can enable or disable this during verification.

Mar 13 2020, 5:28 PM · Feature Request, gpgol, Keyserver, gnupg
werner added a comment to T4872: Support opaque MPI with gcry_mpi_print.

I am not sure whether this is related but when using Libgcrypt master and verifying a signature created with an ed25519 key, I get the error below with valgrind. Both with 2.2. current and 2.3. It does not happen with the current Libgcrypt 1.8.

Mar 13 2020, 5:25 PM · Restricted Project, Feature Request, libgcrypt
werner added a project to T4856: GPG: Key Exchange Put public OpenPGP key into signature: Feature Request.
Mar 13 2020, 1:17 PM · Feature Request, gpgol, Keyserver, gnupg

Mar 12 2020

dkg added a comment to T4878: gpgsm's default for include-certs should include the signing cert if it is self-signed.

For reference, here's an error message from openssl smime when it is trying to verify an e-mail message with no embedded certificate at all (despite it knowing about the relevant certificate):

Mar 12 2020, 2:01 PM · gnupg24, gnupg (gpg23), S/MIME, Feature Request
werner changed the status of T4788: System wide configuration of the GnuPG system from Open to Testing.

There are likely some bugs in the new code and I also want to do some improvements; see rGb4f1159a5bd7. But things should basically work as before and thus I set this again to testing

Mar 12 2020, 10:36 AM · gnupg (gpg23), Feature Request, gpg4win, g10code
werner triaged T4873: Enable AES GCM in FIPS mode as Low priority.
Mar 12 2020, 9:59 AM · FIPS, libgcrypt, Feature Request
werner triaged T4878: gpgsm's default for include-certs should include the signing cert if it is self-signed as Low priority.
Mar 12 2020, 9:59 AM · gnupg24, gnupg (gpg23), S/MIME, Feature Request
dkg created T4878: gpgsm's default for include-certs should include the signing cert if it is self-signed.
Mar 12 2020, 7:51 AM · gnupg24, gnupg (gpg23), S/MIME, Feature Request
gniibe changed the status of T4597: Support GCM modes for ntbtls. from Open to Testing.
Mar 12 2020, 6:33 AM · Restricted Project, Feature Request, ntbtls
gniibe changed the status of T4641: Libassuan: enable the environment to set compiler and linker flags for helper tools from Open to Testing.
Mar 12 2020, 6:32 AM · Restricted Project, libassuan, Feature Request
gniibe changed the status of T4673: 2.3-only: Don't fallback to PC/SC on failure by the internal CCID driver, only use PC/SC when --disable-ccid is specified from Open to Testing.
Mar 12 2020, 6:31 AM · gnupg (gpg23), Restricted Project, scd, Feature Request

Mar 11 2020

gniibe changed the status of T4872: Support opaque MPI with gcry_mpi_print from Open to Testing.

Fixed in master.

Mar 11 2020, 8:13 AM · Restricted Project, Feature Request, libgcrypt
gniibe added a comment to T4872: Support opaque MPI with gcry_mpi_print.

A program like tests/t-mpi-point assumes gcry_mpi_print can do that.
We have a sort of regression with --debug option with t-mpi-point, the point q is not printed out correctly.

Mar 11 2020, 8:12 AM · Restricted Project, Feature Request, libgcrypt
gniibe added a project to T4872: Support opaque MPI with gcry_mpi_print: Feature Request.
Mar 11 2020, 8:10 AM · Restricted Project, Feature Request, libgcrypt

Mar 10 2020

werner added a comment to T4873: Enable AES GCM in FIPS mode.

This requires re-evaluation of Libgcrypt to match the current FIPS specs.

Mar 10 2020, 4:13 PM · FIPS, libgcrypt, Feature Request
pmgdeb created T4873: Enable AES GCM in FIPS mode.
Mar 10 2020, 11:31 AM · FIPS, libgcrypt, Feature Request

Mar 5 2020

werner added a comment to T4863: Yubikey 5Ci for iPhone.

Okay, I recall that I have seen these Yubikeys. Can you tell me which GPG app you intended to use? I am not aware of any GnuPG ports to the iPhone.

Mar 5 2020, 10:10 AM · yubikey, Feature Request

Mar 4 2020

JW-D added a comment to T4863: Yubikey 5Ci for iPhone.

The new Yubikey 5Ci does NOT work with NFC, this is wrong. This Yubikey is delivered with two connectors: A lightning and an USB-C, see: https://www.mtrix.de/shop/yubikey-5ci/. The key can be connected to a laptop and an iPhone by plug-in. So the new Yubikey 5Ci does not require NFC at all. You refer to the Yubikey 5 NFC. This technology is not supported by developers because they do not have experiences there. With the plug and play functionality of a lightning connector it is easier and few application already exist (e.g. Yubico authenticator and several password manager in the professional edition). Hope this information will be useful for you.

Mar 4 2020, 7:04 PM · yubikey, Feature Request
werner triaged T4863: Yubikey 5Ci for iPhone as Normal priority.
Mar 4 2020, 9:17 AM · yubikey, Feature Request
werner added a comment to T4863: Yubikey 5Ci for iPhone.

Supporting NFC tokens requires implementing secure messaging for cards. This is on our todo list anyway but has had no priority. I have a couple of Yubikeys but not done any work on NFC.

Mar 4 2020, 9:17 AM · yubikey, Feature Request

Mar 3 2020

gniibe triaged T4864: New scdaemon command to watch device removal as Normal priority.
Mar 3 2020, 8:26 AM · Restricted Project, Feature Request, scd, Bug Report
gniibe claimed T4864: New scdaemon command to watch device removal.
Mar 3 2020, 8:26 AM · Restricted Project, Feature Request, scd, Bug Report

Mar 1 2020

JW-D created T4863: Yubikey 5Ci for iPhone.
Mar 1 2020, 5:17 PM · yubikey, Feature Request

Feb 28 2020

dkg added a comment to T4788: System wide configuration of the GnuPG system.

i'd be unlikely to ship anything as /etc/gnupg/gpg.conf or /etc/gnupg/dirmngr.conf just because of the mess that admins have to deal with when shipped config files change.

Feb 28 2020, 11:20 PM · gnupg (gpg23), Feature Request, gpg4win, g10code
werner changed the status of T4788: System wide configuration of the GnuPG system from Testing to Open.

Arggh, gpgconf uses its own option parser so adding the global config file there will require some extra work.

Feb 28 2020, 2:40 PM · gnupg (gpg23), Feature Request, gpg4win, g10code
aheinecke updated subscribers of T4788: System wide configuration of the GnuPG system.

@dkg You might find this interesting. Debian could do stuff in /etc/gnupg/gpg.conf or /etc/gnupg/dirmngr.conf without patching GnuPG to change some defaults.

Feb 28 2020, 11:31 AM · gnupg (gpg23), Feature Request, gpg4win, g10code

Feb 27 2020

werner changed the status of T4788: System wide configuration of the GnuPG system from Open to Testing.

All done in master with the latest libgpg-error (see T4859). There is always a global configure file in /etc/gnupg (or whatever "gpgconf --list-dirs sysconfdir" prints). The name of the configure file is the same as the user config file (gpg.conf, gpgsm.conf, gpg-agent.conf, ...) but for gpg.conf no versioned config names are used.

Feb 27 2020, 2:58 PM · gnupg (gpg23), Feature Request, gpg4win, g10code
werner triaged T4855: The trusted-key option requires a long key ID and won't take a fingerprint as Normal priority.

Internally only the long key id is is used thus the fingerprint might give a wrong impression. OTOH, to allow easy migration to future versions, extracting the keyid from the fingerprint is a good idea.

Feb 27 2020, 10:14 AM · gnupg (gpg22), Feature Request

Feb 26 2020

aheinecke added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

But searching on Keyservers is also in my opinion not a common use case for Kleopatra users.

Thanks for engaging constructively.

Feb 26 2020, 12:03 PM · Feature Request, Keyserver, dirmngr

Feb 21 2020

werner added a comment to T4788: System wide configuration of the GnuPG system.

Okay, we now have global conf files in master. The extra flags to ignore or force certain options will be added to libgpg-error.

Feb 21 2020, 9:50 PM · gnupg (gpg23), Feature Request, gpg4win, g10code
dkg added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

In T4513#132770, @aheinecke wrote:

Werner could you maybe at least check for an internet connection, I don't know how to do it on Linux but on Windows it's easy because windows has API for that.

Feb 21 2020, 6:33 PM · Feature Request, Keyserver, dirmngr

Feb 19 2020

Valodim added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

But searching on Keyservers is also in my opinion not a common use case for Kleopatra users.

Feb 19 2020, 6:43 PM · Feature Request, Keyserver, dirmngr
werner added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

and by that bypassing all key source tracking as done by gpg. In any case searching by name or mail address on a keyserver should not be done - at least not by a GUI tool as used by non experienced users.

Feb 19 2020, 4:34 PM · Feature Request, Keyserver, dirmngr