I tried to clarify the comment in the following merge request. Feel free to pull it from there or adjust if it is too verbose or missing some points:
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Oct 5 2022
Oct 4 2022
Hello,
I'm having the same issue here, and as I've an image in the signature of my emails the signature is not visible at all when I sign the messages.
The image attached seems to be well included in the attachments and the image is readable.
Thanks,
isundil
A minor clarification in the code comment would be enough. Something like: Some non-standard kernel return only 32 bytes of strong entropy to satisfy current FIPS requirements.
Yes, that's probably right. I talked to the vendor and they were nice enough to send us specs and samples. However, without a strong business case support for these cards we can't prioritize this work.
Most PCKS#11 drivers are proprietary software which do not fit well into a free software system. Thus we avoid them. And of course we provide pcksc#11 support: Install Scute. There are no workarounds like alternative gpg-agent's - those things don't work reliable and are not supported.
This is a duplicate of T6070. Please wait for gnupg 2.3.8
I am attaching one last log I have while trying to use the SC-HSM and using the debug options mentioned. From what I understand, the keys and certificates are recognised by scdaemon, but, for some reason, they don't show up in gpg --card-edit --expert or in Kleopatra. Having AES symmetric keys also causes the PrKDF to show up as invalid.
Also applied to 1.10 branch.
Why is that not stated in my man page which knows about kernel 3.19? Is that a regression or a RedHat specific patch?
Why is that not stated in my man page which knows about kernel 3.19? Is that a regression or a RedHat specific patch?
Oct 3 2022
Oct 2 2022
Patch applied to master, thanks.
Oct 1 2022
In T6218#163787, @gouttegd wrote:Does the latest Scute require an instance of gpg-agent and/or scdaemon running to work?
Yes. Scute relies on those to interact with the token.
Sep 30 2022
Does the latest Scute require an instance of gpg-agent and/or scdaemon running to work?
One nit that I overlooked initially is the memory leak, which is fixed with the following patch:
Sep 29 2022
Indeed, the status line should not be emitted in this case. Thanks.
% gpgconf --list-options gpg | grep compliance compliance:16:2::1:1::"gnupg:: compliance_de_vs:144:3::2:2::0:: % dpkg --list libgcrypt20 | cat Desired=Unknown/Install/Remove/Purge/Hold | Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend |/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad) ||/ Name Version Architecture Description +++-=================-============-============-===================================== ii libgcrypt20:amd64 1.10.1-2 amd64 LGPL Crypto library - runtime library % gpg --version gpg (GnuPG) 2.2.39 libgcrypt 1.10.1 Copyright (C) 2022 g10 Code GmbH License GNU GPL-3.0-or-later <https://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law.
Let's don't forget that we need to have a sig_class replacement.
With a gcrypt not claiming compliance you should not get the status compliant or not but GnuPG should error out with forbidden.
This is not easy to fix because it would break the GPGME API. Here
are the values we can expect:
I assume this is gpgme master. Please write proper bug reports.
Justus, you should know how to write a proper bug report. Please do that and don't just paste some more or less random output here with just hint that Libgcrypt is not compliant. tia.
This is a debug option; I see no use case for this.
Merged the changes in t6002 branch into master.
Applied and pushed the change from @joeyberkovitz in rG3257385378bb: dirmngr: Interrogate LDAP server when base DN specified..
Sep 28 2022
That sounds quite cool.
Add --expert and use a decent version of GnuPG. 2.2 is our long term support branch and is not the current stable production version (which is 2.3.7)
Actually we developed PIV support to allow the use of PIV X.509 certificates and OpenPGP keys with Yubikeys. In fact, GnuPG is able to switch between the Yubikey PIV and OpenPGP applications on-the-fly while keeping their PIN verification states.
I was indeed using version 1.5.0 for testing, but I wish to clarify the purpose of Scute in my setup before proceeding.
Perhaps --full-generate-key should provide more algorithm choices, then, e.g. ed25519?
Sorry, this as been discussed ad nausea. We try our best to help people not to use useless and harmful (e.g. performance of the WoT) algorithm choices.
Sep 27 2022
Which version of Scute are you using?