Page MenuHome GnuPG
Feed Advanced Search

Feb 17 2022

Klausi1239 added a comment to T5839: GNUPGEX Explorer File Encryption Tar Archive long Filename Bug.

I tested encrypt two txt files with filename 1 and 2.txt and insert text: test 1 and test 2. Tararchive has been created successfull. Than i tested this Two txt files with a long name. See attached txt files, i send it already to you. Now by the first test Archive.tar.gpg.yqoirl with 0 Bytes was created.
Second test, the other archive.tar.gpg with 0 Bytes was created and gpgex hang.

Feb 17 2022, 1:28 PM · kleopatra, gpgtar, Bug Report, gpg4win
werner added projects to T5838: gpg card not getting detected: RHEL, gnupg, scd.
Feb 17 2022, 1:21 PM · Not A Bug, scd, gnupg, RHEL
werner added a comment to T5838: gpg card not getting detected.

It seems you have replaced the scdaemon module from GnuPG by a 3rd party module (which exhibits a version number 0.10.0) - this is not supported and you will of course run into errors.

Feb 17 2022, 1:17 PM · Not A Bug, scd, gnupg, RHEL
werner triaged T5839: GNUPGEX Explorer File Encryption Tar Archive long Filename Bug as Normal priority.

What you uploaded are files with a length of zero bytes. That is not valid data. The hang should not happen of course.

Feb 17 2022, 1:12 PM · kleopatra, gpgtar, Bug Report, gpg4win
Klausi1239 created T5839: GNUPGEX Explorer File Encryption Tar Archive long Filename Bug.
Feb 17 2022, 12:21 PM · kleopatra, gpgtar, Bug Report, gpg4win
mohann created T5838: gpg card not getting detected.
Feb 17 2022, 11:33 AM · Not A Bug, scd, gnupg, RHEL
aheinecke added a comment to T5836: Kleopatra: Optionally, delete private key locally after moving a key to a smartcard.

It should not really hurt to query the scdaemon again after an import. We can do this in the background and users wont have to notice it in the general case where imports from others happen.

Feb 17 2022, 10:24 AM · Bug Report, kleopatra, Restricted Project
bernhard added a comment to T5760: Kleopatra hangs loading certificate cache on Windows 11.

In https://wald.intevation.org/forum/forum.php?thread_id=2395&forum_id=21&group_id=11 "Kim Nilsson on 2022-02-15 16:48" reports that

Feb 17 2022, 8:59 AM · Bug Report, gpg4win
werner triaged T5809: Expire subkey violates assertion "! sig->hashed" as High priority.
Feb 17 2022, 8:43 AM · Restricted Project, gnupg (gpg22), Bug Report
gniibe added a project to T5831: Backport (f808012a) scd: Use lock_slot for apdu_send_direct. to GnuPG 2.2: Restricted Project.

Thank you for your suggestion.

Feb 17 2022, 6:08 AM · gnupg (gpg22), Bug Report, scd
gniibe claimed T5831: Backport (f808012a) scd: Use lock_slot for apdu_send_direct. to GnuPG 2.2.
Feb 17 2022, 6:01 AM · gnupg (gpg22), Bug Report, scd
gniibe closed T5393: gnupg coverity static analysis reports as Resolved.
Feb 17 2022, 5:50 AM · gnupg (gpg23), Bug Report
gniibe closed T5730: During make, compile error under Ubuntu 21.10 as Resolved.
Feb 17 2022, 5:49 AM · gpgme, Bug Report
gniibe closed T5742: Apparent regressions between 2.2.32 and 2.2.33 of GnuPG as Resolved.
Feb 17 2022, 5:46 AM · Restricted Project, Bug Report, gnupg (gpg23)
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

I simplified the script not to use cmp: rC3c8b6c4a9cad: fips: Fix gen-note-integrity.sh script not to use cmp utility.
And I clarified the semantics of the integrity check.

Feb 17 2022, 3:48 AM · Bug Report, libgcrypt, FIPS
neverpanic added a comment to T5835: libgcrypt: More robust/portable integrity check.

Ah, right, I can get that added to the containers tomorrow.

Feb 17 2022, 1:39 AM · Bug Report, libgcrypt, FIPS
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

I located the cause:

../../src/gen-note-integrity.sh: line 78: cmp: command not found
Feb 17 2022, 1:36 AM · Bug Report, libgcrypt, FIPS
thesamesam added a comment to T5834: C++ ABI breakage in gpgme-1.17.0?.

Yeah, please do issue a new release as soon as possible if you can, as otherwise downstream we're in an awkward position where we have to rebuild everything without a SONAME bump, then do it again once the release is out.

Feb 17 2022, 12:33 AM · Bug Report

Feb 16 2022

ikloecker triaged T5834: C++ ABI breakage in gpgme-1.17.0? as High priority.
Feb 16 2022, 7:26 PM · Bug Report
ikloecker added a comment to T5834: C++ ABI breakage in gpgme-1.17.0?.

@werner Please release a gpgme-1.17.1 with

diff --git a/configure.ac b/configure.ac
index f6d4b50e..57e6ea2e 100644
--- a/configure.ac
+++ b/configure.ac
@@ -64,8 +64,8 @@ LIBGPGMEPP_LT_CURRENT=20
 LIBGPGMEPP_LT_AGE=14
 LIBGPGMEPP_LT_REVISION=0
Feb 16 2022, 7:25 PM · Bug Report
neverpanic added a comment to T5835: libgcrypt: More robust/portable integrity check.

That only seems to work in some configurations: https://gitlab.com/redhat-crypto/libgcrypt/libgcrypt-mirror/-/pipelines/472626834

Feb 16 2022, 7:24 PM · Bug Report, libgcrypt, FIPS
ikloecker added a comment to T5834: C++ ABI breakage in gpgme-1.17.0?.

The actual problem isn't the removed internal symbols, but

'method virtual QGpgME::KeyForMailboxJob* QGpgME::Protocol::keyForMailboxJob() const' has some sub-type changes:
  the vtable offset of method virtual QGpgME::KeyForMailboxJob* QGpgME::Protocol::keyForMailboxJob() const changed from 28 to 31
    note that this is an ABI incompatible change to the vtable of class QGpgME::Protocol

KMail calls keyForMailboxJob(), but because of the changed index in the vtable it called addUserIDJob() which ultimately caused the crash.

Feb 16 2022, 7:05 PM · Bug Report
werner triaged T5836: Kleopatra: Optionally, delete private key locally after moving a key to a smartcard as Normal priority.
Feb 16 2022, 5:29 PM · Bug Report, kleopatra, Restricted Project
werner added a comment to T5834: C++ ABI breakage in gpgme-1.17.0?.

Why can't we hide internal symbols in c++ as we are doing in other libs for ages? Were the internal symbols only accidentally exposed?

Feb 16 2022, 5:20 PM · Bug Report
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

I pushed the change: rCa340e9803882: fips: More portable integrity check.
It uses .note.fdo.integrity section, not loaded onto memory.
It simplifies the logic, and switches to dladdr (from dladdr1).

Feb 16 2022, 12:36 PM · Bug Report, libgcrypt, FIPS
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

Pushed the change which fixes the build with ld.gold.
rC9dcf9305962b: fips: Integrity check improvement, with only loadable segments.

Feb 16 2022, 6:29 AM · Bug Report, libgcrypt, FIPS
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

Thank you for your suggestions, @werner.
I agree that we should not put much effort to develop our own methodology here; Too much effort may introduce possibility of unmaintainable code, which should be avoided for the particular purpose of "integrity".

Feb 16 2022, 3:07 AM · Bug Report, libgcrypt, FIPS

Feb 15 2022

ikloecker reopened T5834: C++ ABI breakage in gpgme-1.17.0? as "Open".

Sure. We'll bump the SONAME.

Feb 15 2022, 5:08 PM · Bug Report
thesamesam added a comment to T5834: C++ ABI breakage in gpgme-1.17.0?.

I assumed that changes to internal classes wouldn't break the ABI, but apparently the symbols were still exported. I'll keep this in mind for the next release.

FWIW, the internal class in question was completely rewritten. Since the damage has been done already, I'll close this report. We won't readd symbols to dead code. Sorry, for the inconvenience.

Feb 15 2022, 5:02 PM · Bug Report
werner added a comment to T5835: libgcrypt: More robust/portable integrity check.

Folks, you are opening a can of worms. The only secure why to sign a file is to have a detached signature. That is often non-practical and thus putting the signature/MAC at one certain position and exempt just this one position from hashing is the next best alternative. Any more complicated rules will inevitably introduce security flaws. If a binary is stripped, it is a different binary than a non-stripped one, if it is linked with another linker, it is a different one. And that binary will even be able to figure this out and change behavior. Please keep it simple.

Feb 15 2022, 1:51 PM · Bug Report, libgcrypt, FIPS
neverpanic added a comment to T5835: libgcrypt: More robust/portable integrity check.

Thanks! Maybe it would be simpler to use dl_iterate_phdr(3) for this. I wasn't aware of the function, but a colleague just implemented a proof-of-concept of what you're proposing in https://gitlab.com/dueno/integrity-notes.

Feb 15 2022, 11:58 AM · Bug Report, libgcrypt, FIPS
ikloecker closed T5834: C++ ABI breakage in gpgme-1.17.0? as Wontfix.

I assumed that changes to internal classes wouldn't break the ABI, but apparently the symbols were still exported. I'll keep this in mind for the next release.

Feb 15 2022, 9:12 AM · Bug Report
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

I am going to apply https://gitlab.com/redhat-crypto/libgcrypt/libgcrypt-mirror/-/commit/64ccc25c4b4a2c8c4e13e7e37ff1c8c60a3d8401
And consider adding the code to limit hashing content (from start of the file to end of data section).

Feb 15 2022, 7:40 AM · Bug Report, libgcrypt, FIPS
werner added a comment to T5823: DNS srv problem with Tor transparent proxy.

Guess why GnuPG has its own Tor aware resolver ;-) To debug this kind of stuff you need to debug dirmngr, by adding for example

Feb 15 2022, 7:32 AM · Not A Bug
gniibe updated the task description for T5835: libgcrypt: More robust/portable integrity check.
Feb 15 2022, 3:39 AM · Bug Report, libgcrypt, FIPS
gniibe triaged T5835: libgcrypt: More robust/portable integrity check as High priority.
Feb 15 2022, 3:38 AM · Bug Report, libgcrypt, FIPS

Feb 14 2022

thesamesam set External Link to https://bugs.kde.org/show_bug.cgi?id=449891 on T5834: C++ ABI breakage in gpgme-1.17.0?.
Feb 14 2022, 10:14 PM · Bug Report
thesamesam created T5834: C++ ABI breakage in gpgme-1.17.0?.
Feb 14 2022, 10:13 PM · Bug Report
ikloecker closed T5830: SIGBUS with gpgme_op_interact as Resolved.
Feb 14 2022, 4:26 PM · gpgme, Bug Report
ikloecker closed T5833: Kleopatra: Shows lower case "kleopatra" in system tray menu and Really Quit? confirmation dialog as Resolved.
Feb 14 2022, 4:22 PM · kleopatra, Restricted Project, Bug Report
ikloecker moved T5833: Kleopatra: Shows lower case "kleopatra" in system tray menu and Really Quit? confirmation dialog from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Feb 14 2022, 4:05 PM · kleopatra, Restricted Project, Bug Report
ikloecker claimed T5833: Kleopatra: Shows lower case "kleopatra" in system tray menu and Really Quit? confirmation dialog.
Feb 14 2022, 4:05 PM · kleopatra, Restricted Project, Bug Report
ikloecker created T5833: Kleopatra: Shows lower case "kleopatra" in system tray menu and Really Quit? confirmation dialog.
Feb 14 2022, 4:05 PM · kleopatra, Restricted Project, Bug Report
ilka added a comment to T5830: SIGBUS with gpgme_op_interact.

Found it: I did not initialize gpgme_op_interact's last parameter out with gpgme_data_new. The error is now gone.

Feb 14 2022, 3:55 PM · gpgme, Bug Report
ZenithalHourlyRate created T5831: Backport (f808012a) scd: Use lock_slot for apdu_send_direct. to GnuPG 2.2.
Feb 14 2022, 1:10 PM · gnupg (gpg22), Bug Report, scd
werner triaged T5825: [gpgme] [python] possible dangling reference to passphrase as High priority.
Feb 14 2022, 12:51 PM · patch, gpgme, Bug Report
gniibe closed T5814: gpg-agent can't find existing 'pinentry', searches 'Pinentry' (uppercase'P') instead as Resolved.
Feb 14 2022, 10:46 AM · Not A Bug, Bug Report
gniibe added a comment to T5814: gpg-agent can't find existing 'pinentry', searches 'Pinentry' (uppercase'P') instead.

Good to hear the cause.

Feb 14 2022, 10:46 AM · Not A Bug, Bug Report
ikloecker added a comment to T5830: SIGBUS with gpgme_op_interact.

Since you are using C++, I suggest that you have a look at GpgSetOwnerTrustEditInteractor in the C++ bindings of gpgme. Have a look at QGpgMEChangeOwnerTrustJob in the Qt bindings of gpgme to see how it's used even if you do not want to use Qt.

Feb 14 2022, 9:13 AM · gpgme, Bug Report
aheinecke changed the status of T5829: "read error: ec=8", missing .dll's and gnupg folder after mkportable.exe from Open to Testing.

Hi,
(Exec format error), read 0 bytes

Feb 14 2022, 9:11 AM · Bug Report, gpg4win

Feb 13 2022

ilka created T5830: SIGBUS with gpgme_op_interact.
Feb 13 2022, 10:47 PM · gpgme, Bug Report

Feb 12 2022

NfuRipHA updated the task description for T5829: "read error: ec=8", missing .dll's and gnupg folder after mkportable.exe.
Feb 12 2022, 12:07 PM · Bug Report, gpg4win
NfuRipHA updated the task description for T5829: "read error: ec=8", missing .dll's and gnupg folder after mkportable.exe.
Feb 12 2022, 12:06 PM · Bug Report, gpg4win

Feb 11 2022

NfuRipHA created T5829: "read error: ec=8", missing .dll's and gnupg folder after mkportable.exe.
Feb 11 2022, 10:37 PM · Bug Report, gpg4win

Feb 10 2022

JaminCollins added a comment to T2818: expected behavior unclear when using gpg from ssh on a machine with a running X11 session.

While searching for a solution to this, I found multiple reports of people that appear to be impacted by this 5 year old issue.

Feb 10 2022, 10:25 PM · pinentry, Bug Report
jukivili created T5826: Improve detached signing and verification speed.
Feb 10 2022, 7:15 PM · gnupg
ikloecker added a comment to T5813: Locating Keys via WKD with gpg4win fails with unknown error..

Did you make another request for locating keys via WKD after adding the debug flags? I'm asking because when I do this I get the following log:

2022-02-10 17:49:59 dirmngr[6780] listening on socket '/run/user/1000/gnupg/d.f3hdqcrmjwf98p87yqjmuctx/S.dirmngr'
2022-02-10 17:49:59 dirmngr[6781.0] permanently loaded certificates: 130
2022-02-10 17:49:59 dirmngr[6781.0]     runtime cached certificates: 0
2022-02-10 17:49:59 dirmngr[6781.0]            trusted certificates: 130 (130,0,0,0)
2022-02-10 17:49:59 dirmngr[6781.0] failed to open cache dir file '/tmp/tmp.8P2EakNghu/crls.d/DIR.txt': No such file or directory
2022-02-10 17:49:59 dirmngr[6781.0] creating directory '/tmp/tmp.8P2EakNghu/crls.d'
2022-02-10 17:49:59 dirmngr[6781.0] new cache dir file '/tmp/tmp.8P2EakNghu/crls.d/DIR.txt' created
2022-02-10 17:49:59 dirmngr[6781.6] handler for fd 6 started
2022-02-10 17:49:59 dirmngr[6781.6] DBG: chan_6 -> # Home: /tmp/tmp.8P2EakNghu
2022-02-10 17:49:59 dirmngr[6781.6] DBG: chan_6 -> # Config: /tmp/tmp.8P2EakNghu/dirmngr.conf
2022-02-10 17:49:59 dirmngr[6781.6] DBG: chan_6 -> OK Dirmngr 2.3.5-beta17 at your service
2022-02-10 17:49:59 dirmngr[6781.6] connection from process 6779 (1000:100)
2022-02-10 17:49:59 dirmngr[6781.6] DBG: chan_6 <- GETINFO version
2022-02-10 17:49:59 dirmngr[6781.6] DBG: chan_6 -> D 2.3.5-beta17
2022-02-10 17:49:59 dirmngr[6781.6] DBG: chan_6 -> OK
2022-02-10 17:49:59 dirmngr[6781.6] DBG: chan_6 <- WKD_GET -- werner.koch@gnupg.com
2022-02-10 17:49:59 dirmngr[6781.6] DBG: dns: libdns initialized
2022-02-10 17:49:59 dirmngr[6781.6] DBG: dns: resolve_dns_name(openpgpkey.gnupg.com): No name
2022-02-10 17:49:59 dirmngr[6781.6] DBG: dns: getsrv(_openpgpkey._tcp.gnupg.com) -> 0 records
2022-02-10 17:49:59 dirmngr[6781.6] DBG: chan_6 -> S SOURCE https://gnupg.com
2022-02-10 17:49:59 dirmngr[6781.6] number of system provided CAs: 390
2022-02-10 17:49:59 dirmngr[6781.6] DBG: Using TLS library: GNUTLS 3.7.3
2022-02-10 17:49:59 dirmngr[6781.6] DBG: http.c:connect_server: trying name='gnupg.com' port=443
2022-02-10 17:49:59 dirmngr[6781.6] DBG: dns: resolve_dns_name(gnupg.com): Success
2022-02-10 17:49:59 dirmngr[6781.6] DBG: http.c:1917:socket_new: object 0x00007f524c290e20 for fd 7 created
2022-02-10 17:50:00 dirmngr[6781.6] DBG: http.c:request:
2022-02-10 17:50:00 dirmngr[6781.6] DBG: >> GET /.well-known/openpgpkey/hu/waoubdep9643akkesx4xm3ynstfffiok?l=werner.koch HTTP/1.0\r\n
2022-02-10 17:50:00 dirmngr[6781.6] DBG: >> Host: gnupg.com\r\n
2022-02-10 17:50:00 dirmngr[6781.6] DBG: http.c:request-header:
2022-02-10 17:50:00 dirmngr[6781.6] DBG: >> \r\n
2022-02-10 17:50:00 dirmngr[6781.6] DBG: http.c:response:
2022-02-10 17:50:00 dirmngr[6781.6] DBG: >> HTTP/1.0 200 OK\r\n
2022-02-10 17:50:00 dirmngr[6781.6] http.c:RESP: 'Date: Thu, 10 Feb 2022 16:49:59 GMT'
2022-02-10 17:50:00 dirmngr[6781.6] http.c:RESP: 'Server: Boa/0.94.14rc21'
2022-02-10 17:50:00 dirmngr[6781.6] http.c:RESP: 'Accept-Ranges: bytes'
2022-02-10 17:50:00 dirmngr[6781.6] http.c:RESP: 'Connection: close'
2022-02-10 17:50:00 dirmngr[6781.6] http.c:RESP: 'Content-Length: 957'
2022-02-10 17:50:00 dirmngr[6781.6] http.c:RESP: 'Last-Modified: Mon, 28 Jun 2021 17:47:11 GMT'
2022-02-10 17:50:00 dirmngr[6781.6] http.c:RESP: 'Content-Type: text/plain'
2022-02-10 17:50:00 dirmngr[6781.6] http.c:RESP: ''
2022-02-10 17:50:00 dirmngr[6781.6] DBG: (957 bytes sent via D lines not shown)
2022-02-10 17:50:00 dirmngr[6781.6] DBG: chan_6 -> OK
2022-02-10 17:50:00 dirmngr[6781.6] DBG: chan_6 <- BYE
2022-02-10 17:50:00 dirmngr[6781.6] DBG: chan_6 -> OK closing connection
2022-02-10 17:50:00 dirmngr[6781.6] handler for fd 6 terminated
Feb 10 2022, 5:53 PM · wkd, gpg4win, Bug Report
mieth added a comment to T5813: Locating Keys via WKD with gpg4win fails with unknown error..
2022-02-10 17:07:35 [12256]    dauerhaft geladene Zertifikate: 74
2022-02-10 17:07:35 [12256]  zwischengespeicherte Zertifikate: 0
2022-02-10 17:07:35 [12256]     vertrauenswürdige Zertifikate: 74 (74,0,0,0)
2022-02-10 17:07:35 [12256] DBG: chan_0x0000026c -> # Home: C:\Users\User\AppData\Roaming\gnupg
2022-02-10 17:07:35 [12256] DBG: chan_0x0000026c -> # Config: .\dirmngr.conf
2022-02-10 17:07:35 [12256] DBG: chan_0x0000026c -> OK Dirmngr 2.3.4 at your service
Feb 10 2022, 5:10 PM · wkd, gpg4win, Bug Report
neverpanic added a comment to T5816: mailing list address confusion (lists.gnupg.org shown, but does not work).

This still seems to be a problem:

Feb 10 2022, 3:12 PM · gpgweb, Bug Report
netchild added a comment to T5814: gpg-agent can't find existing 'pinentry', searches 'Pinentry' (uppercase'P') instead.

You can close this ticket. It's a jail-specific behavior when the jail is entered from the host via command line (https://lists.freebsd.org/archives/freebsd-hackers/2022-February/000832.html for the curious people) and something is used which closes all FDs. When the jail is accessed via ssh, it works.

Feb 10 2022, 3:05 PM · Not A Bug, Bug Report
jap added projects to T5825: [gpgme] [python] possible dangling reference to passphrase: gpgme, patch.
Feb 10 2022, 2:43 PM · patch, gpgme, Bug Report
jap added a comment to T5825: [gpgme] [python] possible dangling reference to passphrase.

Feb 10 2022, 2:42 PM · patch, gpgme, Bug Report
jap created T5825: [gpgme] [python] possible dangling reference to passphrase.
Feb 10 2022, 2:42 PM · patch, gpgme, Bug Report
ascii-nickname added a comment to T5823: DNS srv problem with Tor transparent proxy.

user@debian:~$ gpg --debug-all --keyserver hkp://keyserver.ubuntu.com --recv-key
s DF9B9C49EAA9298432589D76DA87E80D6294BE9B
gpg: reading options from '/home/user/.gnupg/gpg.conf'
gpg: reading options from '[cmdline]'
gpg: enabled debug flags: packet mpi crypto filter iobuf memory cache memstat trust hashing ipc clock lookup extprog
gpg: DBG: [not enabled in the source] start
gpg: DBG: chan_3 <- # Home: /home/user/.gnupg
gpg: DBG: chan_3 <- # Config: /home/user/.gnupg/dirmngr.conf
gpg: DBG: chan_3 <- OK Dirmngr 2.2.27 at your service
gpg: DBG: connection to the dirmngr established
gpg: DBG: chan_3 -> GETINFO version
gpg: DBG: chan_3 <- D 2.2.27
gpg: DBG: chan_3 <- OK
gpg: DBG: chan_3 -> KEYSERVER --clear hkp://keyserver.ubuntu.com
gpg: DBG: chan_3 <- OK
gpg: DBG: chan_3 -> KS_GET -- 0xDF9B9C49EAA9298432589D76DA87E80D6294BE9B
gpg: DBG: chan_3 <- ERR 219 Server indicated a failure <Unspecified source>
gpg: keyserver receive failed: Server indicated a failure
gpg: DBG: chan_3 -> BYE
gpg: DBG: [not enabled in the source] stop
gpg: keydb: handles=0 locks=0 parse=0 get=0
gpg: build=0 update=0 insert=0 delete=0
gpg: reset=0 found=0 not=0 cache=0 not=0
gpg: kid_not_found_cache: count=0 peak=0 flushes=0
gpg: sig_cache: total=0 cached=0 good=0 bad=0
gpg: random usage: poolsize=600 mixed=0 polls=0/0 added=0/0

outmix=0 getlvl1=0/0 getlvl2=0/0

gpg: rndjent stat: collector=0x0000000000000000 calls=0 bytes=0
gpg: secmem usage: 0/65536 bytes in 0 blocks

Feb 10 2022, 1:45 PM · Not A Bug
ascii-nickname created T5823: DNS srv problem with Tor transparent proxy.
Feb 10 2022, 1:20 PM · Not A Bug
werner added a project to T5816: mailing list address confusion (lists.gnupg.org shown, but does not work): gpgweb.
Feb 10 2022, 9:16 AM · gpgweb, Bug Report
werner added a comment to T5816: mailing list address confusion (lists.gnupg.org shown, but does not work).

Actually is was/is a chain of bugs due to changing some URLs in confirmation mails from http to https.

Feb 10 2022, 9:15 AM · gpgweb, Bug Report
gniibe added a comment to T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1).

It was addressed in rC04f325d8917d: released 1.1.4 as "(obsolete)" feature, in Aug 2001.

Feb 10 2022, 1:32 AM · Bug Report, libgcrypt
gniibe renamed T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1) from libgcrypt: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1 to libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1).
Feb 10 2022, 1:19 AM · Bug Report, libgcrypt

Feb 9 2022

ametzler1 updated subscribers of T5816: mailing list address confusion (lists.gnupg.org shown, but does not work).

Try gcrypt-devel@gnupg.org, i.e. without the lists subdomain.

Recently, the gnupg.org mailing list manager started to prepend the lists. subdomain to the List-Id (which caused my email filters to fail) and to everything else. Probably due to an accidentally changed configuration.

Feb 9 2022, 6:34 PM · gpgweb, Bug Report
gniibe added a comment to T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1).

Instead, let us remove the feature.

Feb 9 2022, 12:33 PM · Bug Report, libgcrypt
gniibe added a comment to T5815: GPG-Agent randomly throwing "IPC connect call failed" .

FYI, if you can use backports, GnuPG 2.2 series is available
See : https://backports.debian.org/news/stretch-backports/

Feb 9 2022, 3:12 AM · Bug Report
gniibe claimed T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1).
Feb 9 2022, 2:58 AM · Bug Report, libgcrypt

Feb 8 2022

aneet_gpg added a comment to T5815: GPG-Agent randomly throwing "IPC connect call failed" .

@ikloecker,
Your response makes total sense but our restriction is the OS at the moment. This is the highest version of GPG available on Debian 9 so we cannot upgrade at the moment.

Feb 8 2022, 8:33 PM · Bug Report
ikloecker added a comment to T5816: mailing list address confusion (lists.gnupg.org shown, but does not work).

Try gcrypt-devel@gnupg.org, i.e. without the lists subdomain.

Feb 8 2022, 7:07 PM · gpgweb, Bug Report
ikloecker added a comment to T5813: Locating Keys via WKD with gpg4win fails with unknown error..

Add the following to dirmngr.conf:

debug ipc,dns,network,lookup

There are more debug flags but the above flags should cover anything related to the lookup.

Feb 8 2022, 6:55 PM · wkd, gpg4win, Bug Report
ametzler1 reopened T5816: mailing list address confusion (lists.gnupg.org shown, but does not work) as "Open".
Feb 8 2022, 6:49 PM · gpgweb, Bug Report
bernhard added a comment to T5813: Locating Keys via WKD with gpg4win fails with unknown error..

You may have to restart the dirmngr to see the log-file option be honored. The gpg request to dirmngr should be visible in the log.

Feb 8 2022, 4:37 PM · wkd, gpg4win, Bug Report
mieth added a comment to T5813: Locating Keys via WKD with gpg4win fails with unknown error..

@mieth can you enable the dirmngr log and give it more message, you'll be able to diagnose the problem further. There have been problems in the past with the contents of the certificate store of Windows. It does not look like this is the problem you are facing, but the diagnostic messages should be helpful.

Feb 8 2022, 1:37 PM · wkd, gpg4win, Bug Report
bernhard added a comment to T5813: Locating Keys via WKD with gpg4win fails with unknown error..

@mieth can you enable the dirmngr log and give it more message, you'll be able to diagnose the problem further. There have been problems in the past with the contents of the certificate store of Windows. It does not look like this is the problem you are facing, but the diagnostic messages should be helpful.

Feb 8 2022, 11:41 AM · wkd, gpg4win, Bug Report
netchild added a comment to T5814: gpg-agent can't find existing 'pinentry', searches 'Pinentry' (uppercase'P') instead.

Yes, this is in a jail. But the output above was from the same shell session inside the jail. So gpg-agent was forked from gpg which I executed in the same shell (same process) as the ls. As you can see from the output of ls, /dev/pts is mounted there. The link you provided tells to mount the devfs inside the jail. This is the case here (that's basics, it needs to be there for a lot of things to work inside a jail).

Feb 8 2022, 9:07 AM · Not A Bug, Bug Report
werner triaged T5820: Slow symmetric decryption speed as High priority.

Let's try this for 2.3

Feb 8 2022, 8:20 AM · gnupg (gpg23), Bug Report
gniibe added a comment to T5814: gpg-agent can't find existing 'pinentry', searches 'Pinentry' (uppercase'P') instead.

FYI: When you have a problem with pinentry, possible workaround is using gpg with --pinentry-mode=loopback, which redirects pinentry queries to the caller (instead of invoking pinentry session).

Feb 8 2022, 1:37 AM · Not A Bug, Bug Report
gniibe added a comment to T5814: gpg-agent can't find existing 'pinentry', searches 'Pinentry' (uppercase'P') instead.

Thank you for the debug information.

Feb 8 2022, 1:21 AM · Not A Bug, Bug Report
tmz created T5821: gpgsm "certificate not found" error handling should use gpg_err_code() instead of -1.
Feb 8 2022, 12:05 AM · Restricted Project, gnupg (gpg23), Bug Report

Feb 7 2022

jukivili added a comment to T5820: Slow symmetric decryption speed.

Benchmarking blog post that I linked tested GnuPG in symmetric mode, gpg --symmetric. I think symmetric case is important too from performance point of view, there is tools that use gpg --symmetric as bulk encryption/decryption backend (for example duplicity backup tool). Such encrypted files have tag3 (symmetric-key ESK) packet followed tag18 (encrypted and MDC) packet. Could existence of Tag18 packet in input be used as marker for input being rfc4880 and allow disabling those extra hash contexts? As I understand those hashes should not be needed with rfc4880 input (but I don't know all the historical details).

Feb 7 2022, 9:24 PM · gnupg (gpg23), Bug Report
werner added a comment to T5820: Slow symmetric decryption speed.

Breaking the flawless decryption of existing old data is unfortunately a highly controversy topic. Recall the no-more-v3 packet support or the required MDC. It was technically okay and 99.99% of the users didn't even notice it. But some were very vocational.

Feb 7 2022, 7:23 PM · gnupg (gpg23), Bug Report
jukivili created T5820: Slow symmetric decryption speed.
Feb 7 2022, 5:05 PM · gnupg (gpg23), Bug Report
enno added a comment to T3020: Lock files not compatible between Windows and Linux (invalid size).

Yes, it would be convenient to use the same $GNUPGHOME in Git Bash (using /usr/bin/gpg) as in PowerShell / Cmd (using gpg.exe in %PATH%)

Feb 7 2022, 3:44 PM · Bug Report, gnupg
netchild added a comment to T5814: gpg-agent can't find existing 'pinentry', searches 'Pinentry' (uppercase'P') instead.

% export GPG_TTY=$(tty)

Feb 7 2022, 12:03 PM · Not A Bug, Bug Report
mieth added a comment to T5813: Locating Keys via WKD with gpg4win fails with unknown error..

Might be an issue with matching ciphersuites? There was a problem with this before when GnuPG didn't support AES-GCM yet (https://dev.gnupg.org/T4597). That was added in 2020, maybe it's not rolled out far enough yet?

Either way, I hadn't considered this for the WKD relay. I'll look into enabling AES-CBC there, at least for backwards compatibility.

Feb 7 2022, 11:41 AM · wkd, gpg4win, Bug Report
gniibe added a comment to T5814: gpg-agent can't find existing 'pinentry', searches 'Pinentry' (uppercase'P') instead.

The change of pinentry-tty rP7f7fd8bcfd74: tty: Fix error return paths and its resource leaks. fixes SEGV, but the problem of your case is that access to the device file (/dev/pts/2 in the case of your log with pinentry-tty) failed.

Feb 7 2022, 10:57 AM · Not A Bug, Bug Report
ikloecker added a comment to T5815: GPG-Agent randomly throwing "IPC connect call failed" .

GnuPG 2.1 is seriously out of date and long out of support. It's probably full of bugs that have been fixed in the last 5 years since its release. Please do yourself a big favor and update to a supported version of GnuPG 2.2.

Feb 7 2022, 9:38 AM · Bug Report
netchild added a comment to T5814: gpg-agent can't find existing 'pinentry', searches 'Pinentry' (uppercase'P') instead.

As the above commit only references pinentry-tty.c, what's the problem with pinentry-curses? Shall I provide the same log with pinentry-curses?

Feb 7 2022, 8:11 AM · Not A Bug, Bug Report
netchild added a comment to T5814: gpg-agent can't find existing 'pinentry', searches 'Pinentry' (uppercase'P') instead.

Yes, this was the correct tty at the time of the generation of this log.

Feb 7 2022, 8:09 AM · Not A Bug, Bug Report
gniibe added a comment to T5814: gpg-agent can't find existing 'pinentry', searches 'Pinentry' (uppercase'P') instead.

Thank you for your debugging.

Feb 7 2022, 3:06 AM · Not A Bug, Bug Report

Feb 6 2022

werner closed T5816: mailing list address confusion (lists.gnupg.org shown, but does not work) as Resolved.

disk full. Fixed. Thanks.

Feb 6 2022, 7:11 PM · gpgweb, Bug Report

Feb 5 2022

ametzler1 created T5816: mailing list address confusion (lists.gnupg.org shown, but does not work).
Feb 5 2022, 6:24 PM · gpgweb, Bug Report

Feb 4 2022

aneet_gpg created T5815: GPG-Agent randomly throwing "IPC connect call failed" .
Feb 4 2022, 7:03 PM · Bug Report
netchild added a comment to T5814: gpg-agent can't find existing 'pinentry', searches 'Pinentry' (uppercase'P') instead.

I killed gpg-agent after the config change / before running gpg again. That should be enough to pick-up the config change, correct? In the mean time the system in question was rebooted. Here the full log /with key related stuff redacted).

Feb 4 2022, 7:56 AM · Not A Bug, Bug Report