In T6161#162306, @ikloecker wrote:I'm not sure I understand. If you don't want pinentries depending on libX11, then simply disable those pinentries with --disable-pinentry-qt5, etc. For Wayland it may make sense to allow disabling it.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Aug 25 2022
Aug 25 2022
thesamesam added a comment to T6161: pinentry doesn't allow disabling various library linkages (libX11, KF5WaylandClient, Qt5X11Extras).
• ikloecker added a comment to T6161: pinentry doesn't allow disabling various library linkages (libX11, KF5WaylandClient, Qt5X11Extras).
I'm not sure I understand. If you don't want pinentries depending on libX11, then simply disable those pinentries with --disable-pinentry-qt5, etc. For Wayland it may make sense to allow disabling it.
• werner triaged T6161: pinentry doesn't allow disabling various library linkages (libX11, KF5WaylandClient, Qt5X11Extras) as Normal priority.
• werner triaged T6160: pinentry Emacs support assumes socket location at ${TMPDIR}/emacs${UID}, fails to connect (need to respect XDG_RUNTIME_DIR) as Normal priority.
Let's turn this into a feature request.
I pushed the change with documentation.
Aug 24 2022
Aug 24 2022
The PKCS#12 import was a late add-on because I consider P#12 to be a nasty and insecure format. Unfortunately it survived and is now the mainly used interchange format. Eventually we need to improve things here. However, ppl should use smartcards for S/MIME.
• werner closed T5936: gpg: Support specifiying user ID to revoke as UID hash for --quick-revoke-uid, a subtask of T4087: Kleopatra: Revoke User-ID, as Resolved.
Aug 23 2022
Aug 23 2022
Thank you for your work on the proposal. I have two comments:
- Do we have some test vector, which can be used in the testsute to test the new API?
- We need to mention the new API in the documentation.
Aug 22 2022
Aug 22 2022
• gniibe added a comment to T6002: scute w/ gpg23: Support multiple cards/tokens, major update with KEYGRIP.
I tested with a self-signed one.
• werner added a comment to T6002: scute w/ gpg23: Support multiple cards/tokens, major update with KEYGRIP.
Did you test with a self-signed cert? I ran into the problem that the selection only showed the root certificate, the signing works using the leaf cert, but the root cert was put into the signature. Changing Scute to only return the leaf certificate made it work but verification failed.
• gniibe added a comment to T6002: scute w/ gpg23: Support multiple cards/tokens, major update with KEYGRIP.
I can successfully sign with LibreOffice Writer (using Brainpool with Yubikey). I need to do:
- Tools
- Optoins
- LibreOffice - Security - Certificate Path
- Select the profile of "firefox:default-esr" for NSS certificate directory
- LibreOffice - Security - Certificate Path
- Optoins
Aug 19 2022
Aug 19 2022
Probably, PIPE_REJECT_REMOTE_CLIENTS mode and lpSecurityAttributes=NULL is OK.
Aug 18 2022
Aug 18 2022
Aug 15 2022
Aug 15 2022
Any progress on this?
Aug 11 2022
Aug 11 2022
While playing with your scripts I figured that it would be useful to enhance the KEYINFO command. With
rG989eae648c8f3d2196517e8fc9cce247b21f9629 we could now
Aug 9 2022
Aug 9 2022
• ikloecker changed the status of T5934: Kleopatra: Change the default/primary User ID from Open to Testing.
The option to flag a user ID as the primary user ID is now available in the Certificate Details dialog as button below the user ID table and as context menu entry of the user ID table.
• ikloecker closed T5938: gpgme++: Add support for setting the primary user ID, a subtask of T5934: Kleopatra: Change the default/primary User ID, as Resolved.
• ikloecker moved T6126: gpg: Support specifiying user ID to set as primary as UID hash for --quick-set-primary-uid from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Aug 8 2022
Aug 8 2022
• ikloecker triaged T6126: gpg: Support specifiying user ID to set as primary as UID hash for --quick-set-primary-uid as Normal priority.
Aug 5 2022
Aug 5 2022
• werner added a comment to T6002: scute w/ gpg23: Support multiple cards/tokens, major update with KEYGRIP.
Firefox nicely shows the 3 NIST certificates from my Telesec card but not the important Brainpool certificate for eIDAS. It turns out that Firefox does not support Brainpool, despite that a patch has been provided 8 years ago. See https://bugzilla.mozilla.org/show_bug.cgi?id=943639 . Thus there is currently no way to use LibreOffice or Okular to signe PDFs because they rely on NSS.
Aug 2 2022
Aug 2 2022
Agreed
Aug 1 2022
Aug 1 2022
I think this was mostly covered with T5362: Kleopatra: Add warning in compliance mode if gnupg version is not compliant and T5653: de-vs and GnuPG 2.3.3 error.
• werner added projects to T5371: Handle invalid compliance settings: Restricted Project, Feature Request.
Has this been implemented?
Jul 29 2022
Jul 29 2022
• ikloecker renamed T5934: Kleopatra: Change the default/primary User ID from Kleopatra: Change the default User-ID to Kleopatra: Change the default/primary User ID.
Jul 28 2022
Jul 28 2022
Probably, PIPE_REJECT_REMOTE_CLIENTS mode and lpSecurityAttributes=NULL is OK.
Here is the parser output:
$ python3 sd.py --type=pipe "D:P(A;;GA;;;SY)(A;;GA;;;BA)(A;;0x12019b;;;AU)" D:P(A;;GA;;;SY)(A;;GA;;;BA)(A;;0x12019b;;;AU) Discretionary ACL: P(A;;GA;;;SY)(A;;GA;;;BA)(A;;0x12019b;;;AU) Flags: P: SE_DACL_PROTECTED (Blocks inheritance of parent's ACEs)
I think that the last argument of CreateNamedPipeA can limit the access to the named pipe.
Here is a patch to implement the functionality with --enable-win32-openssh-support.
t3883.patch8 KBDownload
Jul 27 2022
Jul 27 2022
• ikloecker renamed T6109: Kleopatra: Better way to show expired subkeys from Better way to show expired subkeys in Kleopatra to Kleopatra: Better way to show expired subkeys.
This is related to T5950: Allow viewing expired certificates more easily where a user was wondering why some key wasn't offered as encryption key. It turned out that the encryption subkey was expired.
• werner changed the status of T5936: gpg: Support specifiying user ID to revoke as UID hash for --quick-revoke-uid from Open to Testing.
Backported for for 2.2.37
• werner changed the status of T5936: gpg: Support specifiying user ID to revoke as UID hash for --quick-revoke-uid, a subtask of T4087: Kleopatra: Revoke User-ID, from Open to Testing.
Jul 26 2022
Jul 26 2022
Jul 25 2022
Jul 25 2022
For documentation purposes: Werner suggested to use a TCP socket on Windows for logging (on the mailing list).
Jul 18 2022
Jul 18 2022
@ikloecker KWatchGnuPG does not work on Windows. And this also does not work with Kleopatra logging and GPGME logging, Kleopatra logging needs Dbgview on Windows, which can be spammed by other software and GPGME logging requires an enviornment variable. So having this in a logging view would be good for support.
Jul 16 2022
Jul 16 2022
Jul 14 2022
Jul 14 2022
In T4449#124252, @aheinecke wrote:Or you can write it directly to the config in %APPDATA%/gpg-agent.conf
Jul 13 2022
Jul 13 2022
Reading through the report, the spec., and current implementation, I concluded that this is not a bug, thus, I'm closing this.
Jul 12 2022
Jul 12 2022
• gniibe added a project to T5975: Allow signature verification using specific RSA keys <2k in FIPS mode: backport.
• gniibe closed T5702: Display prompt to user when YubiKey is waiting for touch confirmation as Resolved.
Please use the feature in 2.3.7 of T5099, instead.
It's in 2.3.7.
It's in 2.3.7.
It's in 2.3.7.
It's in 2.3.7.
• gniibe closed T6010: gpg-connect-agent: /definqprog semantics enhancement, a subtask of T5862: authentication with USB token, as Resolved.
It's in 2.3.7.
• gniibe closed T6012: gpg-agent: Add --format=ssh option for READKEY, a subtask of T5862: authentication with USB token, as Resolved.
It's in 2.3.7.
Jul 11 2022
Jul 11 2022
We have KWatchGnuPG for watching the log files.
Jul 10 2022
Jul 10 2022
Due to vacation the review may take some time.
Jul 8 2022
Jul 8 2022
joeyberkovitz added a comment to T6047: Dirmngr - LDAP Schema V2 not used when Base DN is specified.
Any chance someone is able to review the posted patch?
Jul 5 2022
Jul 5 2022
Let me know how best to submit it
joeyberkovitz added a comment to T6047: Dirmngr - LDAP Schema V2 not used when Base DN is specified.
I tried to submit the below patch to gnupg-devel@lists.gnupg.org, but get an Unrouteable address error. Let me know how best to submit it
Jun 30 2022
Jun 30 2022
• ikloecker triaged T6049: Kleopatra: Possible values for options in GnuPG System settings not obvious as Wishlist priority.
I'll prioritize this as Wishlist because the options in the "GnuPG System" tab come directly from gpgconf and they are meant to be used by experts (who read man gpg, etc.) and maybe for users who are instructed by an IT administrator to enter some value for some option (so that those users do not need to edit some configuration file).
• ikloecker renamed T6049: Kleopatra: Possible values for options in GnuPG System settings not obvious from [Usability improvement] Options not obvious to Kleopatra: Possible values for options in GnuPG System settings not obvious.
• ikloecker added a comment to T6002: scute w/ gpg23: Support multiple cards/tokens, major update with KEYGRIP.
Kleopatra uses SCD READCERT for reading certificates from the PIV app. This is used to import the certificates stored by the PIV app. I'm not sure whether this is really needed. Maybe we could/should use "learn card" for this instead.
cklassen added a comment to T6049: Kleopatra: Possible values for options in GnuPG System settings not obvious.
Yes, only settings from the "GnuPG System" tab are involved
• gniibe added a comment to T6002: scute w/ gpg23: Support multiple cards/tokens, major update with KEYGRIP.
We could change how device keys are listed. Currently, Scute does KEYINFO --list, then asking gpgsm for each certificate.
• gniibe added a comment to T6002: scute w/ gpg23: Support multiple cards/tokens, major update with KEYGRIP.
The change requires "KEYINFO --list" command. This is not available through remote access of gpg-agent (extra socket).
Jun 29 2022
Jun 29 2022
• werner triaged T6047: Dirmngr - LDAP Schema V2 not used when Base DN is specified as Normal priority.
The first ideas sounds best to me. Patches please to the mailing list.
• ikloecker added a comment to T6049: Kleopatra: Possible values for options in GnuPG System settings not obvious.
Is this only about options shown on the "GnuPG System" tab?
Jun 28 2022
Jun 28 2022
FIPS 140-3 (https://csrc.nist.gov/Projects/cryptographic-module-validation-program/fips-140-3-standards) points to SP 800-140Dr1 (https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Dr1.pdf) to list acceptable "Security Parameter Generation and Establishment Methods". From this document, RFC 5869 (i.e., HKDF with the counter at the end) can be reached via two paths:
We removed assuming "OPENPGP.3" means for ssh.
Jun 24 2022
Jun 24 2022
Saklad5 updated the task description for T6040: Allow embedding preferred keyserver URL in signatures.
Saklad5 updated the task description for T6020: Make %-expandos available for --default-keyserver-url.
In T6040#159431, @Valodim wrote:I suppose you're right, we might have crossed that bridge a while ago. Simple availability of certificate- or even signature-specific keyserver URIs just make the risks of honor-keyserver-url more obvious than before.
I suppose you're right, we might have crossed that bridge a while ago. Simple availability of certificate- or even signature-specific keyserver URIs just make the risks of honor-keyserver-url more obvious than before.
In T6040#159428, @Valodim wrote:This is a reasonable feature, however it should be noted that this implies a fairly large metadata leak: You are essentially adding a URI to signatures that will be pinged on signature verification.
This is a reasonable feature, however it should be noted that this implies a fairly large metadata leak: You are essentially adding a URI to signatures that will be pinged on signature verification.
Saklad5 updated the task description for T6040: Allow embedding preferred keyserver URL in signatures.
I don't see why this is a child task of T6020: the features are similar, but they don't actually impact each other in any way.
Saklad5 renamed T6040: Allow embedding preferred keyserver URL in signatures from Allow embedding default keyserver URL in signatures to Allow embedding preferred keyserver URL in signatures.
Jun 23 2022
Jun 23 2022
What about rejected changes to "Key:"?
Jun 22 2022
Jun 22 2022
What about rejected changes to "Key:"? Other this command would make it too easy to mess up the actual private key.
• gniibe added a project to T5988: agent: Add new command to update private key fields: Restricted Project.
Jun 20 2022
Jun 20 2022
Jun 17 2022
Jun 17 2022
Jun 16 2022
Jun 16 2022