Was easier to fix than expected. Thanks for the report. Fix goes into 2.2.22.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Aug 25 2020
Aug 24 2020
Aug 22 2020
Excellent! thanks for having considered this.
Aug 21 2020
Read through it, thanks for the updated description!
Aug 20 2020
The options now work as documented. More tests on Window are required and eventually we need to handle non-ascii characters in file names.
Fixed for 2.2.22
Thanks. Fixed for 2.2.22
Thanks for reporting. Fixed for 2.2.22. repeat==0 works like before and repeat>1 also (that is several passphrase pinentries will pop up).
Aug 19 2020
Aug 18 2020
Just reading this issue in detail.
Aug 13 2020
Awesome. Thank you for the explanation and for solving the issue.
Mitigations are in place for quite some time now; see T4755.
Fix will be in 2.2.22. Thanks for the report.
It was actually moved to noninstall in 2006. The reason or this is a conflict between the version of gpgsplit in GnuPG 1.4 and 2.0. Back then it seemed easier to keep on using the gpgpslit from 1.4 because that version was installed anyway. At that time gpg was called gpg2 we changed this much later and probably forgot to switch also to the gpgsplit from GnuPG 2.
Aug 12 2020
You used --personal-digest-preferences to force the use of SHA-512, right?
Aug 5 2020
Aug 4 2020
Jul 17 2020
Here is another thing worth reporting. I found that passphrase-repeat is entirely ignored, regardless of the value set.
Do you configured gpg so that you did not get a passphrase confirmation?
Right 2.2.21 fixes a long standing bug in symmetric encryption in that the configured passphrase constraints were not checked. Eventually we will add a second sec of constraints here but for now the same constrains as for private key protection are used.
Jul 16 2020
Well, it changes the behaviour on error and thus it should not be backported to 2.2 so that existsing error reports about corrupted data don't change. Fine for master.
Jul 14 2020
Dear Werner!
Dear Werner!
It turns out that a test case in GPGME fails with that version. This is due to a regression I introduced in the passphrase repetition code for symmetric encryption. This will be fixed with the next GnuPG version; in the meantime you may use the patch F1646254.
Jul 13 2020
To change the expiration date, I would suggest to use
Pushed fix to master and STABLE-BRANCH-2-2.
Thanks for your log.
Jul 11 2020
$ cat /run/user/1000/dirmngr.log
2020-07-11 19:33:44 dirmngr[2305.0] permanently loaded certificates: 140 2020-07-11 19:33:44 dirmngr[2305.0] runtime cached certificates: 0 2020-07-11 19:33:44 dirmngr[2305.0] trusted certificates: 140 (139,0,0,1) 2020-07-11 19:39:24 dirmngr[2305.6] force-crl-refresh active for issuer id CE04B58CBA5B8069AA0D503634B861593BE86F20; update required 2020-07-11 19:39:24 dirmngr[2305.6] number of system provided CAs: 148 2020-07-11 19:39:24 dirmngr[2305.6] error creating socket: Address family not supported by protocol 2020-07-11 19:39:24 dirmngr[2305.6] error connecting to 'http://cdp1.pca.dfn.de/global-root-g2-ca/pub/crl/cacrl.crl': Address family not supported by protocol 2020-07-11 19:39:24 dirmngr[2305.6] error retrieving 'http://cdp1.pca.dfn.de/global-root-g2-ca/pub/crl/cacrl.crl': Address family not supported by protocol 2020-07-11 19:39:24 dirmngr[2305.6] crl_fetch via DP failed: Address family not supported by protocol 2020-07-11 19:39:24 dirmngr[2305.6] command 'ISVALID' failed: Address family not supported by protocol 2020-07-11 19:39:24 dirmngr[2305.6] force-crl-refresh active for issuer id 3476EB7C1E02B3BAF954EEE2EFD321F7B8E49D18; update required 2020-07-11 19:39:24 dirmngr[2305.6] error creating socket: Address family not supported by protocol 2020-07-11 19:39:24 dirmngr[2305.6] error connecting to 'http://pki0336.telesec.de/rl/TeleSec_GlobalRoot_Class_2.crl': Address family not supported by protocol 2020-07-11 19:39:24 dirmngr[2305.6] error retrieving 'http://pki0336.telesec.de/rl/TeleSec_GlobalRoot_Class_2.crl': Address family not supported by protocol 2020-07-11 19:39:24 dirmngr[2305.6] crl_fetch via DP failed: Address family not supported by protocol 2020-07-11 19:39:24 dirmngr[2305.6] command 'ISVALID' failed: Address family not supported by protocol 2020-07-11 19:39:24 dirmngr[2305.6] force-crl-refresh active for issuer id 70F42DB9235EC84DC35D445B3407CABF4324291C; update required 2020-07-11 19:39:24 dirmngr[2305.6] error creating socket: Address family not supported by protocol
Jul 10 2020
While I see that it's not the matter of actual use case (but how gpg can be immune to fuzzing), code clean up would be good here.
Jul 9 2020
Because a few minutes don't matter. If you have the time to figure the reason out, please go ahead. It might be that we take the timestamp in the addkey case earlier and only set the expiration date after the key has been created.
gpg has code to make sure that a new key is at least one second newer than the previous generated.
I won't fix it. In fact it can't anyway be completely fixed because gpg has code to make sure that a new key is at least one second newer than the previous generated.
It has now been implemented for all types of symmetric encryption (not just -cs). To go into 2.2.21
Jun 29 2020
@dkg while I agree with your aim of
Jun 26 2020
When I test it on Debian, disabling by,
Please get log of dirmngr, by putting
log-file /run/user/<YOURNUMBER-LIKE-1000>/dirmngr.log
Jun 25 2020
Can you characterize the failure when ipv6.disable=1 ? The straightforward failure (connect() fails with EHOSTUNREACH after a few seconds) should presumably be treated the same as if some other host happened to be offline. That should result in dirmngr failing over to the next available address for the configured keyserver, right?
I agree with you that a certificate with a lengthy expiration is not cryptographically sensible or wise, @bernhard -- i'd never want to produce such a certificate myself.
This issue, as well as T4766 has the challenge that there is a disagreement about the usefulness of the use case, as far as I can see.
Jun 22 2020
The problem is that I have not yet found a _portable_ way to detect proper working v6 or v4 networking without doing a test connection. For privacy reasons we don't want to do that.
Jun 14 2020
Any news on this?
Jun 13 2020
Thanks for explaining; this may indeed lead to a followup processing error of correct data. However, I don't expect to ever see a fixed length header of 2GiB or more because the sender would have had to buffer all that data in the first place.
Jun 9 2020
It is actually used but for whatever reason only for signed and symmetric encrypted messages.
Jun 5 2020
May 29 2020
Although this is a standard behaviour for Unix tools, you are right that it makes sense to tell the user about the problems. And well, the version info should not appear either.
May 28 2020
May 20 2020
Robin H. Johnson created a patch for this:
May 5 2020
2022-01-01 00:00:00 aka 2021-12-31 24:00:00
May 4 2020
Moscow time is 3 hours ahead of UTC, so we are talking about midnight 2022-01-01 00:00:00 aka 2021-12-31 24:00:00 . This is way we say we are 1 minute off. But I now see the problem, AWK's strftime needs another arg to to print in UTC. I am not so used strftime because I always use a my tool epoch2iso to convert Epoch times.
gpg -k --with-colons <anotherkeyid> | awk -F: '$1=="pub" { print strftime("%F %T", $7, 1) }'
So we are a minute off.
So we are a minute off. The expiration timestamp is not stored in the key, instead the difference to the creation timestamp is give. This makes it a bit challenging to get it always right. Did you tried
Apr 9 2020
There are no betas; either you apply the patch mentioned above ( rG2f08a4f25df7) to a stock 2.2.20 or you build from the Git repo (STABLE-BRANCH-2-2, see https://gnupg.org/download/git.html).
thanks a lot dkg and werner :)
Could you guide me to where I find the beta or snapshot, so I could test it and give you feedback? I seem to be unable to find it on my own.
Apr 8 2020
That's odd. :-)
FWIW, the code was written by the author of the specs and he note in his original patch (rGe0972d3d96) :
Thanks for your report. The problem of GnuPG was that it mandated padding length < 16 bytes, which is wrong.
Apr 4 2020
@werner what size of each additionally allocated secure memory area would you recommend? Is this something, that is better to set or leave up to the gpg-agent to decide? Will this additional memory be freed when not needed anymore or will it stay allocated until the process dies? I guess, the documentation could be expanded to answer this.
Mar 30 2020
thanks!
Done; will go into 2.2.21 (T4897).
Thanks.
Mar 26 2020
Of course it is important, that's why it it printed by default.
This is an important information to know because it can help to avoid bug reports.
Mar 25 2020
If you run into build problems on OpenBSD for gpg-wks-server, see T4886 for a required minor fix.