And thanks gniibe! I have tested 2.4.1 several times in this month (including existing and new keys), the warning was never shown again.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Jun 9 2023
Jun 2 2023
May 30 2023
May 29 2023
Hi zhangguangzhi, I think that it's version-specific problem.
I traced the chain and this warning message was added in release 2.3.3 T5565.
The problem should be able to reproduce between 2.3.3 and 2.4.0.
Hi,i try to reproduce the problem, my platform is linux and gnupg2-2.2.32-3, but i can't find “gpg: warning: lower 3 bits of the secret key are not cleared". Excuse me, is this a platform-specific or version-specific problem, or is it my operation wrong.
May 26 2023
May 25 2023
FWIW: I have not done any tests but the comment below is about the case I suspected to be the cuase for your problem:
See rG0988e49c45 which implements time and group but not yet the split thing because we are not shure that is good idea to have this w/o any implementation support.
There is an easy workaround: Append an exclamation mark to the adsk key. This way gpg will only search for this subkey.
An example with my test keys:
May 24 2023
For the record, we've removed the SRV record for keys.gentoo.org for now, to work around the problem. Without the SRV record, everything works as expected.
May 23 2023
Kleopatra test case (similar to gpg):
May 22 2023
Seems it gets a record but is not able to parse it (gnupg/dirmngr/dns-stuff.c:getsrv-standard) in your setup. Not sure why it loops - need to debug it.
May 19 2023
Fixed in 2.4
May 3 2023
I will review the issue. A likely outcome will be to follow your suggestion but to add an option for the old behaviour to avoid further security discussions.
Apr 29 2023
The fix is in 2.4.1.
It's not perfect fix, but it catches the problem when it's not encrypted secret key.
Apr 28 2023
Closing. A small change in Kleopatra (T6472) should help to avoid using this hack in common cases.
Apr 27 2023
The workaround works.
Apr 21 2023
Apr 20 2023
Okay, that was easy to check.
Not easy to fix because gpg --card-edit/-status has some support form other cards. Eventually these commands will be replaced by gpg-card. In the meantime we can use this hack:
Apr 19 2023
Apr 18 2023
@gniibe, will you be so kind an check the provided patches
To replicate the problem it is best to use Windows. Should be solved with my commit. Note that the bug is specific to 2.4 dues to irts multi-card and app support. There was no problem on 2.2.
Apr 13 2023
gpg_encrypt (engine-gpg.c) passes --output - to gpg, i.e. it reads the result of gpg --encrypt from stdout unless I misread this. Not sure, why this seems to work on Windows. The real problem is probably something completely different.
my Yubikey works, too, if I disable PIV. With enabled PIV:
On Windows we always use --status-fd=1 but with gpg it is not a problem because we use a differenrt fd for output.
Apr 12 2023
Unfortunately I can't replicate that with my Yubikey on 2.4.1. Tried several variant and with and without keyboxd. My Yubikey has PIV disabled but I doubt that this is the problem.
Test with GnuPG 2.4.1-beta76 failed with "error getting current key info: invalid name":
Apr 6 2023
I'll add new error codes to gpgrt
Sorry, it took time (for me) to understand the issue, as this is not 100%-reproducible bug. And it was not clear (for me) that how passphrase were offered in the interaction, so, I was not possible to see if it's encrypted or not.
Apr 4 2023
Apr 3 2023
closed, as the remaining subtask is found at T6436
Mar 29 2023
works in 3.1.27.0-beta44
Mar 28 2023
Mar 27 2023
Mar 22 2023
works in gnupg24.
I'd say yes.
Mar 21 2023
We need to extend dirmngr_ldap.c to take a list of attributes to return. We already have the --multi option which returns all attributes for latter filtering by the caller but the specified attr is also used and thus dirmngr's start_cacert_fetch_ldap() retruns only the requested caCertificate.
Things for 2.4 are all done.
For 2.2 we will for now only implement the encryption.
README and INSTALL now suggest to to use a build directory.
Error checking of the parameter file is usually enhanced when adding new features. Keeping this task open for this specific request does not make sense,
Mar 17 2023
Mar 16 2023
Mar 15 2023
FYI: Quite some more days than a few passed by. I still did not found the time for this, sorry.
Mar 14 2023
Fixed in 2.2 need to check 2.4
There is actually a regression wit Yubikeys. The fix for 2.2 is in T5100: rG08cc34911470 - for 2.4 I need to check
Mar 6 2023
Mar 2 2023
Mar 1 2023
Feb 26 2023
Feb 21 2023
The application probably doesn't support this curve, the changelog only mentions Curve25519 and NIST P-256. Also Kleopatra lists only these two curves when generating a key from the card. Upon further inspection, the 0xFA DO listing the supported algorithms only has RSA 2048, RSA 4096, nistp256, ed255519 and cv25519
This is a Nitrokey 3A with the firmware 1.2.2-alpha.20221130. I'll check with the vendor.