Page MenuHome GnuPG
Feed Advanced Search

Mar 14 2023

werner moved T6378: keytocard: invalid value from Backlog to WiP on the gnupg22 board.
Mar 14 2023, 10:49 AM · gnupg24 (gnupg-2.4.1), gnupg22 (gnupg-2.2.42), Bug Report, Restricted Project
werner changed the status of T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key from Open to Testing.
Mar 14 2023, 10:26 AM · gnupg22 (gnupg-2.2.42), Bug Report
werner moved T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key from Backlog to QA on the gnupg22 board.

Ignoring the error seems to be the best choice. I also think that --force should not overwrite a shadow key file. It seems safer to explicitly delete the key first. A --force option for READKEY does not sound right.

Mar 14 2023, 10:26 AM · gnupg22 (gnupg-2.2.42), Bug Report
werner added a comment to T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key.

I did some reworking and the outcome of the READKEY command is now (agent log):

Mar 14 2023, 10:01 AM · gnupg22 (gnupg-2.2.42), Bug Report
uwi added a comment to T6407: Portable installation shows empty window for Kleopatra.

I checked it: There was an empty bin/gpgconf.ctl, and there still is.
Trying it again today, I still get error messages most notably about failed self-tests, but surprisingly the window is no longer empty.
Instead it seems to take an eternity (minutes, actually still not finished after three minutes) until the certificate cache is loaded.
Maybe the problem is the "Check Point Endpoint Security" being active on the client. It looks as if it prevents use of Kleopatra.
As I don't have administrator rights ("for security reasons"), I cannot analyze what's actually going on.

Mar 14 2023, 9:28 AM · kleopatra, Bug Report, gpg4win

Mar 13 2023

aheinecke closed T6407: Portable installation shows empty window for Kleopatra as Invalid.

It seems that you are missing the step "Create a new file called gpgconf.ctl in the folder Gpg4win_Portable/bin."

Mar 13 2023, 11:35 AM · kleopatra, Bug Report, gpg4win
uwi created T6407: Portable installation shows empty window for Kleopatra.
Mar 13 2023, 10:50 AM · kleopatra, Bug Report, gpg4win
werner added a comment to T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key.

I am pretty sure we have the same problem in 2.4 - due to different access patterns it might not exhibit itself.

Mar 13 2023, 9:34 AM · gnupg22 (gnupg-2.2.42), Bug Report

Mar 11 2023

danisanti created T6406: gpg-agent: Fail on expiring YubiKey PIN.
Mar 11 2023, 4:50 PM · Not A Bug, yubikey, gpgagent

Mar 10 2023

saper added a comment to T5401: Imported ECC/Ed25519 subkey has unusable key file in private-keys-v1.d.

I've run into a variant of this, too. If I generate they key just using (genkey (ecc (curve "Ed25519"))), it is recognized as an encryption key. One needs to use (genkey (ecc (curve "Ed25519")(flags eddsa))).

Mar 10 2023, 4:54 PM · gnupg26, Bug Report
werner closed T6404: dirmngr/sks-keyservers.netCA.pem is expired and should be removed as Resolved.

Its not used, so it can't harm.

Mar 10 2023, 11:22 AM · Bug Report
werner closed T6405: Trojan identified in virustotal as Resolved.

Also recall that Antivirus software needs to search for a competitive advantage over other vendors and in particular over Windows Defender. Thus they need to show some extra positives compared to the Windows Defender. Who care whether this is a false positive - ppl like to get some evidence that their new AV software has a (phoney) advantage.

Mar 10 2023, 11:21 AM · Bug Report
Carlos1957 added a comment to T6405: Trojan identified in virustotal.

Many thanks for the information. I suspected it also, but wanted your assessment.

Mar 10 2023, 10:04 AM · Bug Report
ikloecker added a comment to T6405: Trojan identified in virustotal.

Well, virus checkers aren't perfect. If 1 out of 65 checkers reports a finding, then the probability that this finding is a false positive is very high. You would better report this to the vendor of NANO-Antivirus, so that they can fix the false positive warning.

Mar 10 2023, 8:58 AM · Bug Report
Carlos1957 created T6405: Trojan identified in virustotal.
Mar 10 2023, 7:57 AM · Bug Report

Mar 8 2023

erialor created T6404: dirmngr/sks-keyservers.netCA.pem is expired and should be removed.
Mar 8 2023, 6:09 PM · Bug Report
gniibe changed the status of T6397: PCT failures inconsistency in regards to the FIPS error state from Open to Testing.
Mar 8 2023, 1:49 AM · libgcrypt, FIPS, Bug Report
gniibe changed the status of T6396: the gcry_pk_hash_sign/verify operates in FIPS non-operational mode from Open to Testing.
Mar 8 2023, 1:48 AM · libgcrypt, FIPS, Bug Report
gniibe changed the status of T6394: FIPS requires running PCT tests unconditionally from Open to Testing.
Mar 8 2023, 1:48 AM · FIPS, libgcrypt, Bug Report
gniibe changed the status of T6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway) from Open to Testing.
Mar 8 2023, 1:48 AM · FIPS, libgcrypt, Bug Report
gniibe moved T6397: PCT failures inconsistency in regards to the FIPS error state from Next to Ready for release on the FIPS board.
Mar 8 2023, 1:47 AM · libgcrypt, FIPS, Bug Report
gniibe moved T6396: the gcry_pk_hash_sign/verify operates in FIPS non-operational mode from Next to Ready for release on the FIPS board.
Mar 8 2023, 1:47 AM · libgcrypt, FIPS, Bug Report
gniibe moved T6394: FIPS requires running PCT tests unconditionally from Next to Ready for release on the FIPS board.
Mar 8 2023, 1:47 AM · FIPS, libgcrypt, Bug Report
gniibe moved T6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway) from Next to Ready for release on the FIPS board.
Mar 8 2023, 1:47 AM · FIPS, libgcrypt, Bug Report

Mar 7 2023

gniibe moved T6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway) from Backlog to Next on the FIPS board.
Mar 7 2023, 7:34 AM · FIPS, libgcrypt, Bug Report
gniibe claimed T6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway).

Applied your patch (from gitlab) to both (master and 1.10).

Mar 7 2023, 7:34 AM · FIPS, libgcrypt, Bug Report
gniibe moved T6396: the gcry_pk_hash_sign/verify operates in FIPS non-operational mode from Backlog to Next on the FIPS board.
Mar 7 2023, 7:12 AM · libgcrypt, FIPS, Bug Report
gniibe claimed T6396: the gcry_pk_hash_sign/verify operates in FIPS non-operational mode.

Applied to both (1.10 and master).

Mar 7 2023, 7:11 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway).

You are right, there is no way to use DRBG with SHA384 by libgcrypt.

Mar 7 2023, 3:53 AM · FIPS, libgcrypt, Bug Report
gniibe moved T6397: PCT failures inconsistency in regards to the FIPS error state from Backlog to Next on the FIPS board.
Mar 7 2023, 3:43 AM · libgcrypt, FIPS, Bug Report
gniibe moved T6394: FIPS requires running PCT tests unconditionally from Backlog to Next on the FIPS board.
Mar 7 2023, 3:43 AM · FIPS, libgcrypt, Bug Report
gniibe claimed T6397: PCT failures inconsistency in regards to the FIPS error state.

Applied to both (1.10 and master).

Mar 7 2023, 3:42 AM · libgcrypt, FIPS, Bug Report
gniibe claimed T6394: FIPS requires running PCT tests unconditionally.

Applied to both (of 1.10 and master).

Mar 7 2023, 3:42 AM · FIPS, libgcrypt, Bug Report

Mar 6 2023

saper added a comment to T6400: Improve Pinentry error message for a bad $TERM.

Thank you!

Mar 6 2023, 5:23 PM · FreeBSD, Documentation, pinentry, Bug Report
capitol added a comment to T6400: Improve Pinentry error message for a bad $TERM.

Looks like the TERM alacritty was the culprit, I'm ssh'ing into the freebsd machine from my archlinux laptop.

Mar 6 2023, 5:00 PM · FreeBSD, Documentation, pinentry, Bug Report
Jakuje added a comment to T6394: FIPS requires running PCT tests unconditionally.

We discussed this further with the lab and there are more problematic flags that we need to "cut" and we can not do that always in the code as for example the RFC6979 (deterministic ECDSA signatures) are not allowed in the current version of the FIPS documents, but it is used in the selftests (which is weirdly enough allowed) so we just need to mark it unapproved. Lets discuss this further tomorrow.

Mar 6 2023, 4:49 PM · FIPS, libgcrypt, Bug Report
saper added a comment to T6400: Improve Pinentry error message for a bad $TERM.

I don't know what is going here really. I have installed alacritty and I can reproduce T4924 easily if I provide an empty passphrase on an narrow window. At least I get pinentry-curses popping up.

Mar 6 2023, 1:11 PM · FreeBSD, Documentation, pinentry, Bug Report
saper added a comment to T6400: Improve Pinentry error message for a bad $TERM.

@ikloecker not sure we are there yet. I was able to set a weak password on a terminal that was 42 characters wide. I think the problem here is unrelated to FreeBSD but to the fact that @capitol uses alacritty https://github.com/alacritty/alacritty

Mar 6 2023, 12:06 PM · FreeBSD, Documentation, pinentry, Bug Report
Tuyen renamed T6402: [gnupg] configure: --with-libksba-prefix overrided by --with-ksba-prefix from [gnupg] configure: --with-libksba-prefix override by --with-ksba-prefix to [gnupg] configure: --with-libksba-prefix overrided by --with-ksba-prefix.
Mar 6 2023, 9:57 AM · Not A Bug, Bug Report
Tuyen created T6402: [gnupg] configure: --with-libksba-prefix overrided by --with-ksba-prefix.
Mar 6 2023, 9:42 AM · Not A Bug, Bug Report
ikloecker added a comment to T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key.

If agent_write_shadow_key does now also check for an existing private key file, then I'd replace following code in cmd_readkey:

if (agent_key_available (grip))
  {
    /* Shadow-key is not available in our key storage.  */
    rc = agent_write_shadow_key (0, grip, serialno, keyid, pkbuf, 0,
                                 dispserialno);
  }
else
  {
    /* Shadow-key is available in our key storage but ne check
     * whether we need to update it with a new display-s/n or
     * whatever.  */
    rc = agent_write_shadow_key (1, grip, serialno, keyid, pkbuf, 0,
                                 dispserialno);
  }

with a simple call of agent_write_shadow_key (removing the maybe_update flag) and let agent_write_shadow_key do all checking for an already existing private key file and whether it's a stub file that needs updating.

Mar 6 2023, 9:17 AM · gnupg22 (gnupg-2.2.42), Bug Report
ikloecker added a comment to T6400: Improve Pinentry error message for a bad $TERM.

Could this be a duplicate of T4924: pinentry: pinentry-curses doesn't allow to set no password or weak passwords on 80 char width and smaller terminals?

Mar 6 2023, 8:57 AM · FreeBSD, Documentation, pinentry, Bug Report
werner added a comment to T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key.

I think we should make it explicit - this will be safer. As of now agent_write_shadow_key will do a check only in its special update mode which should be okay for now.

Mar 6 2023, 8:28 AM · gnupg22 (gnupg-2.2.42), Bug Report
werner added a comment to T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key.

I can't see any explicit thing there.

Mar 6 2023, 8:20 AM · gnupg22 (gnupg-2.2.42), Bug Report
capitol added a comment to T6400: Improve Pinentry error message for a bad $TERM.

$term is 'alacritty', stty -a is:

speed 38400 baud; 54 rows; 180 columns;
lflags: icanon isig iexten echo echoe echok echoke -echonl echoctl
	-echoprt -altwerase -noflsh -tostop -flusho -pendin -nokerninfo
	-extproc
iflags: -istrip icrnl -inlcr -igncr ixon -ixoff -ixany -imaxbel -ignbrk
	brkint -inpck -ignpar -parmrk
oflags: opost onlcr -ocrnl tab0 -onocr -onlret
cflags: cread cs8 -parenb -parodd hupcl -clocal -cstopb -crtscts -dsrflow
	-dtrflow -mdmbuf rtsdtr
cchars: discard = ^O; dsusp = ^Y; eof = ^D; eol = <undef>;
	eol2 = <undef>; erase = ^?; erase2 = ^H; intr = ^C; kill = ^U;
	lnext = ^V; min = 1; quit = ^\; reprint = ^R; start = ^Q;
	status = ^T; stop = ^S; susp = ^Z; time = 0; werase = ^W;
Mar 6 2023, 7:09 AM · FreeBSD, Documentation, pinentry, Bug Report

Mar 5 2023

saper added a comment to T6400: Improve Pinentry error message for a bad $TERM.

The agent.log says that the error comes from pinentry-curses:

Mar 5 2023, 9:15 PM · FreeBSD, Documentation, pinentry, Bug Report
capitol added a comment to T6400: Improve Pinentry error message for a bad $TERM.

Hi, thanks for the quick turnaround

Mar 5 2023, 12:40 PM · FreeBSD, Documentation, pinentry, Bug Report
saper added a comment to T6400: Improve Pinentry error message for a bad $TERM.

I tried to reproduce on my FreeBSD 14 machine and didn't get an error....

Mar 5 2023, 12:14 AM · FreeBSD, Documentation, pinentry, Bug Report

Mar 4 2023

capitol created T6400: Improve Pinentry error message for a bad $TERM.
Mar 4 2023, 3:42 PM · FreeBSD, Documentation, pinentry, Bug Report

Mar 3 2023

ikloecker added a comment to T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key.

Make sure that the fix doesn't break "gpg --edit-key; keytocard; save" which explicitly does replace the private key with a stub file.

Mar 3 2023, 4:17 PM · gnupg22 (gnupg-2.2.42), Bug Report
werner added a comment to T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key.

I doubt that the bug is only in 2.2. The code in 2.4 is different but it may happen there anyway. It depends on the usage pattern.

Mar 3 2023, 3:57 PM · gnupg22 (gnupg-2.2.42), Bug Report

Mar 2 2023

werner triaged T6394: FIPS requires running PCT tests unconditionally as Normal priority.

Agreed

Mar 2 2023, 11:46 AM · FIPS, libgcrypt, Bug Report
werner triaged T6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway) as Normal priority.
Mar 2 2023, 11:44 AM · FIPS, libgcrypt, Bug Report
werner added a comment to T6397: PCT failures inconsistency in regards to the FIPS error state.

I think the patch is okay.

Mar 2 2023, 11:41 AM · libgcrypt, FIPS, Bug Report
Jakuje created T6397: PCT failures inconsistency in regards to the FIPS error state.
Mar 2 2023, 9:46 AM · libgcrypt, FIPS, Bug Report

Mar 1 2023

Jakuje created T6396: the gcry_pk_hash_sign/verify operates in FIPS non-operational mode.
Mar 1 2023, 9:07 PM · libgcrypt, FIPS, Bug Report
Jakuje created T6394: FIPS requires running PCT tests unconditionally.
Mar 1 2023, 3:57 PM · FIPS, libgcrypt, Bug Report
Jakuje created T6393: DRBG with SHA384 is no longer allowed in FIPS mode (and looks like impossible to enable anyway).
Mar 1 2023, 3:36 PM · FIPS, libgcrypt, Bug Report

Feb 28 2023

aheinecke triaged T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key as High priority.

Since I have closed T6377 which had high priority I am assigning this issue the same prio. Which I also think is appropriate.

Feb 28 2023, 9:45 AM · gnupg22 (gnupg-2.2.42), Bug Report
aheinecke merged T6377: Kleopatra: gpgsk file contains shadowed private key into T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key.
Feb 28 2023, 9:41 AM · gnupg22 (gnupg-2.2.42), Bug Report
werner closed T6391: gpgme's python module has invalid version number for setuptools >=66.0.0 as Invalid.
Feb 28 2023, 9:08 AM · Bug Report
ChenQi created T6391: gpgme's python module has invalid version number for setuptools >=66.0.0.
Feb 28 2023, 8:14 AM · Bug Report

Feb 27 2023

werner closed T3806: error accessing ldaps key server (TLS vs. STARTTLS) as Resolved.

The code has meanwhile been reworked and the mentioned test server is not anymore available

Feb 27 2023, 5:30 PM · Too Old, LDAP, dirmngr, Bug Report
werner claimed T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key.

Thanks for the report; the regression happened due to fixing T6135.

Feb 27 2023, 9:25 AM · gnupg22 (gnupg-2.2.42), Bug Report

Feb 26 2023

werner lowered the priority of T6382: keytocard fails to import a nistp384 ECDSA key from High to Normal.
Feb 26 2023, 7:27 PM · yubikey, scd, Bug Report
werner closed T6389: gpgtar --encrypt doesn't accept absolute path to a directory (gpgtar: skipping invalid name) as Wontfix.

Please use

gpgtar -C /home/matt/data ....

instead of using an absolute name. This makes things much easier to implement in a secure way: You don't want to have absolute file names in the tarball and mapping them to relative names is not easy or even impossible in case of, say "/home/foo/x.data /home/bar/x.data". Keep in mind that gpgtar does also not handle symlinks and other special files.

Feb 26 2023, 7:25 PM · gnupg, Bug Report
MadDud created T6389: gpgtar --encrypt doesn't accept absolute path to a directory (gpgtar: skipping invalid name).
Feb 26 2023, 12:57 PM · gnupg, Bug Report

Feb 24 2023

acollier created T6388: libgcrypt: gpgrt-config not found in $PREFIX if there are no less-preferred options found via $CC .
Feb 24 2023, 12:21 PM · gpgrt, patch, libgcrypt, Bug Report
ikloecker added a comment to T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key.

I should probably add that Kleopatra calls this command when reading a smart card to create the key stubs if necessary. Kleopatra does this since gpg4win-3.1.24 (according to the tags) and the KDE Gear 22.04 release (see T5782: Kleopatra: Smartcard unusable secret key until used via command line).

Feb 24 2023, 11:58 AM · gnupg22 (gnupg-2.2.42), Bug Report
ikloecker added a comment to T6385: Regarding "gpg: can't connect to the agent - trying fall back ".

Your report lacks any useful information starting with the version of gpg you are using. Did this ever work? What did you change? Did you probably upgrade the system and have previously been using gpg1, but are now using gpg2?

Feb 24 2023, 11:42 AM · No Response, Bug Report
ikloecker created T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key.
Feb 24 2023, 11:34 AM · gnupg22 (gnupg-2.2.42), Bug Report
11672353 created T6385: Regarding "gpg: can't connect to the agent - trying fall back ".
Feb 24 2023, 11:08 AM · No Response, Bug Report
werner triaged T6384: libgcrypt link error if cipher chacha20 is not included as Normal priority.

Thanks

Feb 24 2023, 9:05 AM · patch, libgcrypt, Bug Report

Feb 23 2023

acollier added a comment to T6384: libgcrypt link error if cipher chacha20 is not included.

Feb 23 2023, 7:07 PM · patch, libgcrypt, Bug Report
acollier created T6384: libgcrypt link error if cipher chacha20 is not included.
Feb 23 2023, 6:59 PM · patch, libgcrypt, Bug Report

Feb 21 2023

gbschenkel created T6383: GnuPG 2.4.0 not working with Yubikey NEO.
Feb 21 2023, 11:51 PM · Support
ebourg added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

The application probably doesn't support this curve, the changelog only mentions Curve25519 and NIST P-256. Also Kleopatra lists only these two curves when generating a key from the card. Upon further inspection, the 0xFA DO listing the supported algorithms only has RSA 2048, RSA 4096, nistp256, ed255519 and cv25519

Feb 21 2023, 5:33 PM · yubikey, scd, Bug Report
ebourg added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

This is a Nitrokey 3A with the firmware 1.2.2-alpha.20221130. I'll check with the vendor.

Feb 21 2023, 5:12 PM · yubikey, scd, Bug Report
werner added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

Sure that you specific card/implementation of Nitrokey supports this curve? The card application uses a vendor from the test card range - this it is likely that it is some Javacard implementaion or it is an old gnuk firmware on the nitrokey basic.

Feb 21 2023, 4:32 PM · yubikey, scd, Bug Report
ebourg added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

Changing the key attributes didn't help unfortunately:

Feb 21 2023, 3:32 PM · yubikey, scd, Bug Report
werner added a subtask for T6378: keytocard: invalid value: T6382: keytocard fails to import a nistp384 ECDSA key.
Feb 21 2023, 3:09 PM · gnupg24 (gnupg-2.4.1), gnupg22 (gnupg-2.2.42), Bug Report, Restricted Project
werner added a parent task for T6382: keytocard fails to import a nistp384 ECDSA key: T6378: keytocard: invalid value.
Feb 21 2023, 3:09 PM · yubikey, scd, Bug Report
werner added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

There must be some regression in the code which changes the key attributes. Please try
"gpg --card-edit" admin, key-attr
and switch to nistp384.

Feb 21 2023, 3:08 PM · yubikey, scd, Bug Report
ebourg added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

I also tried to import the key with the gpg-card writekey command and I got the same error.

Feb 21 2023, 2:59 PM · yubikey, scd, Bug Report
ebourg added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

Same error message but probably a different cause, in this case the card was factory reset before importing.

Feb 21 2023, 2:55 PM · yubikey, scd, Bug Report
werner triaged T6382: keytocard fails to import a nistp384 ECDSA key as High priority.
Feb 21 2023, 2:46 PM · yubikey, scd, Bug Report
werner added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

Looks similar to T6378. Can you provide the output of

Feb 21 2023, 2:45 PM · yubikey, scd, Bug Report
ebourg created T6382: keytocard fails to import a nistp384 ECDSA key.
Feb 21 2023, 11:26 AM · yubikey, scd, Bug Report

Feb 17 2023

ebo added a comment to T5836: Kleopatra: Optionally, delete private key locally after moving a key to a smartcard.

well, this user made a backup and it went wrong anyway ;-) See T6377

Feb 17 2023, 3:49 PM · Bug Report, kleopatra, Restricted Project
werner triaged T6378: keytocard: invalid value as Normal priority.
Feb 17 2023, 7:54 AM · gnupg24 (gnupg-2.4.1), gnupg22 (gnupg-2.2.42), Bug Report, Restricted Project
werner added projects to T6378: keytocard: invalid value: gnupg22, Bug Report.
Feb 17 2023, 7:53 AM · gnupg24 (gnupg-2.4.1), gnupg22 (gnupg-2.2.42), Bug Report, Restricted Project

Feb 16 2023

werner claimed T6375: gpg-agent race-condition with parallel clients.

Thanks. please give a few days.

Feb 16 2023, 6:11 PM · gnupg24, gpgagent, Bug Report
dmlary added a comment to T6375: gpg-agent race-condition with parallel clients.

created ~/.gnupg/gpg-agent.conf containing:

debug ipc,cache
debug-pinentry
log-file socket://
Feb 16 2023, 5:06 PM · gnupg24, gpgagent, Bug Report
werner added a comment to T6375: gpg-agent race-condition with parallel clients.

Okay, I see. The commands above are a real reproducer and not standalone examples. Then yes, you should get a pinentry only for the first gpg -d (as long as the keys are still in the cache). I am lacking macOS/homebrew stuff to replicate this. What you can do is to put

Feb 16 2023, 11:54 AM · gnupg24, gpgagent, Bug Report
tobhe created T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.
Feb 16 2023, 3:41 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Feb 15 2023

dmlary added a comment to T6375: gpg-agent race-condition with parallel clients.

I may be reading your comment wrong, but the problem here is not multiple pinentry prompts, or multiple gpg-agents present.

Feb 15 2023, 7:15 PM · gnupg24, gpgagent, Bug Report
werner added a comment to T6375: gpg-agent race-condition with parallel clients.

Although gpg-agent launching is protected by a file system lock, there is indeed a small race related to the pinentry. The invocation of the pinentries is serialized but if a second pinentry is requested while the first pinentry has not yet returned and put the passphrase into the cache, the second pinentry will be called anyway. Fixing this not easy and should rarely be a problem. The mitigation is to do a dummy decryption to seed the cache or use a custom pinentry.

Feb 15 2023, 6:54 PM · gnupg24, gpgagent, Bug Report
dmlary created T6375: gpg-agent race-condition with parallel clients.
Feb 15 2023, 3:13 PM · gnupg24, gpgagent, Bug Report
cklassen added a comment to T6374: EML files: Body is empty.

Hier is a log file from GpgOL (+Code verfolgung)

Feb 15 2023, 11:51 AM · gpgol, Bug Report
cklassen created T6374: EML files: Body is empty.
Feb 15 2023, 11:22 AM · gpgol, Bug Report