In T6229#163870, @werner wrote:The other key slots are claimed to be used for expired or archived keys as you rightfully mention. We need to figure out the real world semantic behind this before we can repurpose such keys.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Oct 7 2022
Oct 7 2022
Oct 6 2022
Oct 6 2022
manonfgoo added a comment to T6229: Include ability to use any/all of the keys stored on YubiKey's PIV applet ("retired" keys).
manonfgoo added a comment to T6229: Include ability to use any/all of the keys stored on YubiKey's PIV applet ("retired" keys).
Pleaee have a look at https://dev.gnupg.org/T5790, i added a patch.
Attached you find a patch to this issue. This Patch sets the "keypair" attribute to the keys 0x82 to 0x95 unconditionaly.
• werner triaged T6229: Include ability to use any/all of the keys stored on YubiKey's PIV applet ("retired" keys) as Low priority.
The other key slots are claimed to be used for expired or archived keys as you rightfully mention. We need to figure out the real world semantic behind this before we can repurpose such keys.
Oct 4 2022
Oct 4 2022
• werner closed T6226: Native PKCS#11 support, by attaching any module/library, without having to use workarounds (alternative gpg-agent etc.) as Wontfix.
Most PCKS#11 drivers are proprietary software which do not fit well into a free software system. Thus we avoid them. And of course we provide pcksc#11 support: Install Scute. There are no workarounds like alternative gpg-agent's - those things don't work reliable and are not supported.
margirou updated the task description for T6226: Native PKCS#11 support, by attaching any module/library, without having to use workarounds (alternative gpg-agent etc.).
Sep 29 2022
Sep 29 2022
• werner added a project to T6223: GPGME incorrectly parses the signature class in SIG_CREATED status lines: Feature Request.
Let's don't forget that we need to have a sig_class replacement.
• gniibe added a comment to T6002: scute w/ gpg23: Support multiple cards/tokens, major update with KEYGRIP.
Merged the changes in t6002 branch into master.
Applied and pushed the change from @joeyberkovitz in rG3257385378bb: dirmngr: Interrogate LDAP server when base DN specified..
Sep 26 2022
Sep 26 2022
BTW, I have also in mind to use an AD entry to figure out the used keyserver. It turned out that people don't like to modify the schema of their AD but instead use a separate LDS.
To proceed, I pushed an initial part as rG993820c31521: dirmngr: Factor out interrogate_ldap_dn function., which doesn't change any behavior.
Then, the point of the change will be clearer.
• gniibe added a comment to T6160: pinentry Emacs support assumes socket location at ${TMPDIR}/emacs${UID}, fails to connect (need to respect XDG_RUNTIME_DIR).
pinentry-emacs is obsolete. It's for older Emacs (<= 25, IIUC) which had lisp/pinentry.el.
For Emacs 26 and newer, you can simply use epa-pinentry-mode having the value of loopback.
Sep 22 2022
Sep 22 2022
• werner removed a project from T5934: Kleopatra: Change the default/primary User ID: Restricted Project.
• werner changed the status of T5914: libassuan: Introduce use of gpgrt_get_syscall_clamp, no use of system_hooks for nPTH from Open to Testing.
• werner removed a project from T4013: Certificate requests generated from Ed25519 keys are not compliant with draft-ietf-curdle-pkix: Restricted Project.
• werner changed the status of T5748: Adding poll/ppoll to NPTH, a subtask of T2385: support more than 1024 fds., from Open to Testing.
• werner changed the status of T4873: Enable AES GCM in FIPS mode, a subtask of T5870: libgcrypt: AEAD API for FIPS 140 (in future), from Open to Testing.
• werner changed the status of T5925: libassuan: Add assuan_sock_accept function to the API from Open to Testing.
• werner changed the status of T5975: Allow signature verification using specific RSA keys <2k in FIPS mode from Open to Testing.
• werner changed the status of T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption from Open to Testing.
• werner moved T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Sep 20 2022
Sep 20 2022
Testing gpg-auth : There are two different use cases
- test with xsecurelock for screen lock
- test with pam-autoproto for login / gdm / etc.
Here are pam_authproto.c with Makefile, so that you can compile it with libpam:
pam_authproto-2022-09-20.tar.gz4 KBDownload
Sep 19 2022
Sep 19 2022
What is a partial CRL; I have never seen that and IIRC the specification for that was not complete.
• werner triaged T6212: The ssh keys are no longer returned in the order from control file after T5996 as Normal priority.
We want to get rid of sshcontrol but we could keep it as an optional configuration to sort keys. I won't say it is a bug, though.
For what it is worth, I think that my patch is more standard compliant then yours because it checks if there is a partial CRL.
• aheinecke reassigned T2300: Second crlDP is not used if first is unavailable from • aheinecke to • werner.
I think 289fbc550d18a7f9b26c794a2409ba820811f6b3 implemented this wish from 2016 :) @werner please read the full report and then close it as fixed if you agree. I find it a bit funny that we both came independently to the same conclusion, that it should be handled differently even if the standard says otherwise. Because the behavior from the standard does not make sense and is in contradiction to other parts where it says that each CRL must contain all revocations.
joeyberkovitz added a comment to T6047: Dirmngr - LDAP Schema V2 not used when Base DN is specified.
just checking in about getting this patch reviewed
• alexk triaged T6211: KMail should process "Confirm your key publication" messages from WKS-Server as Normal priority.
I hacked configure.ac of gnupg to force it build with libgpg-error 1.45, and OpenSSH works with the created pipe. Maybe the libgpg-error fix is only necessary in some certain circumstances?
Sep 16 2022
Sep 16 2022
• ikloecker renamed T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption from Kleopatra: Message "not VS-NfD compliant" is shown incorrectly to GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption.
• werner triaged T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption as Normal priority.
Sep 9 2022
Sep 9 2022
Here is a PAM module, which interact a spawned process using authproto protocol of xsecurelock.
pam_authproto.c13 KBDownload
Sep 7 2022
Sep 7 2022
• gniibe added a parent task for T5930: Use the FIPS-compatible digest&sign API: T6191: FIPS: Supporting running FIPS enabled machine.
It's not yet pushed, because it requires new release of libgpg-error (for T6112: libgpg-error,w32: bidirectional Pipe support for estream).
Sep 6 2022
Sep 6 2022
I was looking for this when writing the update NEWS for the latest release and noticed that this has not been pushed yet. I really think that it would be nice to have that. Especially for Smartcard use cases.
Sep 2 2022
Sep 2 2022
We could use single letters or icons (with proper tool tip and accessible name). I'm not sure mentioning the cert usage is that useful.
Another point where this is very problematic are S/MIME certificates for signing and encryption. While the certificate line edit and the certificate combo box filter the usage, Groups are problematic. If you want to create an encryption group and include one "signing only" certificate the whole group is no longer visible for example in Outlook when encrypting. Both me and Eva thought that S/MIME Groups did not work at all in Outlook because of this.
Sep 1 2022
Sep 1 2022
eliz added a comment to T5897: Fix MinGW compilation error with 'struct _stat32' in common/sysutils.c from gnupg-2.3.4.
Should be OK for mingw.org's MinGW. I cannot test the MinGW64 bits, but I trust that you did.
• gniibe added a comment to T5897: Fix MinGW compilation error with 'struct _stat32' in common/sysutils.c from gnupg-2.3.4.
I encountered this issue of struct stat when compiling for x86_64 of Windows.
I'm considering this patch:
diff --git a/common/sysutils.c b/common/sysutils.c index c30f9a0ce..bbed309a8 100644 --- a/common/sysutils.c +++ b/common/sysutils.c @@ -1237,10 +1237,20 @@ int gnupg_stat (const char *name, struct stat *statbuf) { # ifdef HAVE_W32_SYSTEM +# if __MINGW32_MAJOR_VERSION > 3 + /* mingw.org's MinGW */ +# define STRUCT_STAT _stat +# elif defined(_USE_32BIT_TIME_T) + /* MinGW64 for i686 */ +# define STRUCT_STAT _stat32 +# else + /* MinGW64 for x86_64 */ +# define STRUCT_STAT _stat64i32 +# endif if (any8bitchar (name)) { wchar_t *wname; - struct _stat32 st32; + struct STRUCT_STAT st32; int ret;
Aug 30 2022
Aug 30 2022
TLS 1.3 requires much changes for NTBTLS.
• gniibe added a parent task for T4873: Enable AES GCM in FIPS mode: T5870: libgcrypt: AEAD API for FIPS 140 (in future).
• gniibe added a subtask for T5870: libgcrypt: AEAD API for FIPS 140 (in future): T4873: Enable AES GCM in FIPS mode.
Aug 29 2022
Aug 29 2022
Could this be reconsidered, as a way to support "allow-external-cache" in pinentry-qt? I am trying to use pinentry-kwallet, which saves the passphrase in kwallet, but there is no checkbox if the underlying pinentry is pinentry-qt.
Aug 26 2022
Aug 26 2022
• gniibe closed T6003: card: READCERT with KEYGRIP, a subtask of T6002: scute w/ gpg23: Support multiple cards/tokens, major update with KEYGRIP, as Resolved.
I realized that some AEAD cipher (including GCM) allows arbitrary length for IV.
But it's not good for the API of setup_geniv and geniv.
Aug 25 2022
Aug 25 2022
thesamesam added a comment to T6160: pinentry Emacs support assumes socket location at ${TMPDIR}/emacs${UID}, fails to connect (need to respect XDG_RUNTIME_DIR).
That's a fair point, cheers!
thesamesam added a comment to T6161: pinentry doesn't allow disabling various library linkages (libX11, KF5WaylandClient, Qt5X11Extras).
In T6161#162306, @ikloecker wrote:I'm not sure I understand. If you don't want pinentries depending on libX11, then simply disable those pinentries with --disable-pinentry-qt5, etc. For Wayland it may make sense to allow disabling it.
• ikloecker added a comment to T6161: pinentry doesn't allow disabling various library linkages (libX11, KF5WaylandClient, Qt5X11Extras).
I'm not sure I understand. If you don't want pinentries depending on libX11, then simply disable those pinentries with --disable-pinentry-qt5, etc. For Wayland it may make sense to allow disabling it.
• werner triaged T6161: pinentry doesn't allow disabling various library linkages (libX11, KF5WaylandClient, Qt5X11Extras) as Normal priority.
• werner triaged T6160: pinentry Emacs support assumes socket location at ${TMPDIR}/emacs${UID}, fails to connect (need to respect XDG_RUNTIME_DIR) as Normal priority.
Let's turn this into a feature request.
I pushed the change with documentation.
Aug 24 2022
Aug 24 2022
The PKCS#12 import was a late add-on because I consider P#12 to be a nasty and insecure format. Unfortunately it survived and is now the mainly used interchange format. Eventually we need to improve things here. However, ppl should use smartcards for S/MIME.
• werner closed T5936: gpg: Support specifiying user ID to revoke as UID hash for --quick-revoke-uid, a subtask of T4087: Kleopatra: Revoke User-ID, as Resolved.
Aug 23 2022
Aug 23 2022
Thank you for your work on the proposal. I have two comments:
- Do we have some test vector, which can be used in the testsute to test the new API?
- We need to mention the new API in the documentation.
Aug 22 2022
Aug 22 2022
• gniibe added a comment to T6002: scute w/ gpg23: Support multiple cards/tokens, major update with KEYGRIP.
I tested with a self-signed one.
• werner added a comment to T6002: scute w/ gpg23: Support multiple cards/tokens, major update with KEYGRIP.
Did you test with a self-signed cert? I ran into the problem that the selection only showed the root certificate, the signing works using the leaf cert, but the root cert was put into the signature. Changing Scute to only return the leaf certificate made it work but verification failed.
• gniibe added a comment to T6002: scute w/ gpg23: Support multiple cards/tokens, major update with KEYGRIP.
I can successfully sign with LibreOffice Writer (using Brainpool with Yubikey). I need to do:
- Tools
- Optoins
- LibreOffice - Security - Certificate Path
- Select the profile of "firefox:default-esr" for NSS certificate directory
- LibreOffice - Security - Certificate Path
- Optoins
Aug 19 2022
Aug 19 2022
Probably, PIPE_REJECT_REMOTE_CLIENTS mode and lpSecurityAttributes=NULL is OK.
Aug 18 2022
Aug 18 2022
Aug 15 2022
Aug 15 2022
Any progress on this?
Aug 11 2022
Aug 11 2022
While playing with your scripts I figured that it would be useful to enhance the KEYINFO command. With
rG989eae648c8f3d2196517e8fc9cce247b21f9629 we could now
Aug 9 2022
Aug 9 2022
• ikloecker changed the status of T5934: Kleopatra: Change the default/primary User ID from Open to Testing.
The option to flag a user ID as the primary user ID is now available in the Certificate Details dialog as button below the user ID table and as context menu entry of the user ID table.
• ikloecker closed T5938: gpgme++: Add support for setting the primary user ID, a subtask of T5934: Kleopatra: Change the default/primary User ID, as Resolved.
• ikloecker moved T6126: gpg: Support specifiying user ID to set as primary as UID hash for --quick-set-primary-uid from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Aug 8 2022
Aug 8 2022
• ikloecker triaged T6126: gpg: Support specifiying user ID to set as primary as UID hash for --quick-set-primary-uid as Normal priority.
Aug 5 2022
Aug 5 2022
• werner added a comment to T6002: scute w/ gpg23: Support multiple cards/tokens, major update with KEYGRIP.
Firefox nicely shows the 3 NIST certificates from my Telesec card but not the important Brainpool certificate for eIDAS. It turns out that Firefox does not support Brainpool, despite that a patch has been provided 8 years ago. See https://bugzilla.mozilla.org/show_bug.cgi?id=943639 . Thus there is currently no way to use LibreOffice or Okular to signe PDFs because they rely on NSS.
Aug 2 2022
Aug 2 2022
Agreed
Aug 1 2022
Aug 1 2022
I think this was mostly covered with T5362: Kleopatra: Add warning in compliance mode if gnupg version is not compliant and T5653: de-vs and GnuPG 2.3.3 error.
• werner added projects to T5371: Handle invalid compliance settings: Restricted Project, Feature Request.
Has this been implemented?
Jul 29 2022
Jul 29 2022
• ikloecker renamed T5934: Kleopatra: Change the default/primary User ID from Kleopatra: Change the default User-ID to Kleopatra: Change the default/primary User ID.