In T6606#173044, @gniibe wrote:More care is needed to be perfect; There are places in GnuPG where assuan_sock_connect may be used before syscall clamp set up (after the first assuan_sock_bind failure).
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Aug 2 2023
Aug 2 2023
Aug 1 2023
Aug 1 2023
Dear Werner, have you had any toughts about this ?
Jul 27 2023
Jul 27 2023
• werner renamed T6620: Add a way to extract ECC key parameters from a public key from Add a way to extarct ECC key parameters from a public key to Add a way to extract ECC key parameters from a public key.
• werner triaged T6620: Add a way to extract ECC key parameters from a public key as Normal priority.
Jul 26 2023
Jul 26 2023
Currently, Kleopatra cannot do anything about this. get_passphrase in protect-tool.c asks those questions and doesn't support a way to give the user more context (e.g. by providing the file name). Once gpg-agent allows giving context, Kleopatra can add for example the file name to the data to import.
Jul 25 2023
Jul 25 2023
• gniibe changed the status of T6592: GPGSM: Use estream_t instead of FD, a subtask of T6508: Port GnuPG to 64-bit Windows, from Open to Testing.
Applied to master.
Jul 24 2023
Jul 24 2023
yes, one down, two to go...
• ebo moved T5755: Kleopatra: Export secret subkeys from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T5599: Make gpg use the helpers baked into its AppImage from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T5915: Allow Registry configuration of GpgEX from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T5212: Kleopatra: Check if run with elevated privileges and exit in that case from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T5079: Add compliance flag to trustlist.txt from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Jul 24 2023, 2:12 PM · gnupg22 (gnupg-2.2.45), gnupg24 (gnupg-2.4.1), Restricted Project, Feature Request
• ebo moved T6017: Add *.kgrp to Kleo's import file selection dialog. from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T5371: Handle invalid compliance settings from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T5598: AppImage of gpg from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Meanwhile the AppImage (same binaries as the current Gpg4win version) can be found here among the binary releases: https://gnupg.org/download/index.html
• aheinecke raised the priority of T6198: KMail: Port to keyresolver from libkleo from Wishlist to Normal.
I realized again how bad the current implementation is last week when Alexander managed to send a mail to me encrypted with a completely unrelated key.
a) It was not clear to him that he encrypted to a totally different key because it only displays the keyid
b) He somehow managed to store that key for me in the addressbook
c) He again selected something like "always encrypt to this user" in the dialog without realizing the consequences. This created a contact for me in his personal address book (invisible to him because he said he does not use the addressbook and in there all sources were unselcted) which had the wrong keyid (again only the fingerprint there) and the setting "always encrypt to this user"
Applied the changes for libassuan T6487 into gniibe/t6606.
Pushed the change in gniibe/t6606 branch.
Jul 20 2023
Jul 20 2023
Another approach would be:
- Use assuan_sock_accept which has consistent API with gnupg_fd_t
Jul 19 2023
Jul 19 2023
• gniibe changed the status of T6580: Use gnupg_fd_t if it's relevant, a subtask of T6508: Port GnuPG to 64-bit Windows, from Open to Testing.
• gniibe changed the status of T6597: Introduce FD_DBG to handle the cases for displaying the value, a subtask of T6508: Port GnuPG to 64-bit Windows, from Open to Testing.
• gniibe changed the status of T6597: Introduce FD_DBG to handle the cases for displaying the value from Open to Testing.
• gniibe changed the status of T6598: Fix FD2INT for 64-bit Windows, a subtask of T6508: Port GnuPG to 64-bit Windows, from Open to Testing.
On 64-bit Windows, the situation now is:
Jul 18 2023
Jul 18 2023
Use of FD2INT for the first argument of select is semantically not good. It's the number of file descriptor. When we use FD2INT here, the type is converted to 64-bit integer, then implicitly demoted to 32-bit integer. We need new macro, say, FD2NUM to convert FD into 32-bit integer.
<--- done in: rGea1935252e28: commond: Introduce FD2NUM to express conversion to number of fds.
Here is a test program for 64-bit Windows to see how cast works:
#include <stdint.h> #include <stdio.h>
• gniibe triaged T6597: Introduce FD_DBG to handle the cases for displaying the value as Normal priority.
Jul 13 2023
Jul 13 2023
Jul 5 2023
Jul 5 2023
It turned out that my pinentry reported "fully canceled" on Cancel (see T6491: Pinentry-Qt: Password prompt for each subkey if password change is cancelled) which made gpg output nothing.
Tested and works now for me as expected. Thanks.
The original reporter mentioned that this only occurs when called from kleo. But let me recheck.
• werner removed a project from T2701: Do not let users create keys without an expiration date: gnupg.
Also done for 2.2.
This has long been implemented due to the backport of the P12 parser and the recent rewrite of it.
• werner closed T4921: Support import of PKCS#12 encoded ECC private keys., a subtask of T4098: GpgSM: Add ECC support, as Resolved.
gpg --export-secret-subkeys --armor 704769B8D5C15319A27C74BBB47052506607DA6E confirms that gpg 2.4.1-beta21 outputs nothing if the password entry is canceled.
Of course, it's about right clicking the encryption subkey. That's what I tested. Anyway, cancel wasn't handled properly. Now it is.
Jul 5 2023, 11:56 AM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.3), Feature Request, Restricted Project, Windows
In T5755#172514, @ikloecker wrote:I cannot reproduce the problem with Cancel. When I try this, I get the error "The result of the export is empty." and nothing is written to disk. I'm using GnuPG 2.4.
Anyway, handling of cancel was indeed missing.
• werner moved T6534: gpg's progress_filter needs to use uint64_t from Backlog to WiP on the gnupg22 board.
Jul 5 2023, 11:16 AM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.3), Feature Request, Restricted Project, Windows
The expiry checker checks for expiry. It doesn't and shouldn't do anything else.
I cannot reproduce the problem with Cancel. When I try this, I get the error "The result of the export is empty." and nothing is written to disk. I'm using GnuPG 2.4.
Jul 4 2023
Jul 4 2023
• werner moved T6534: gpg's progress_filter needs to use uint64_t from QA to gnupg-2.4.3 on the gnupg24 board.
Jul 4 2023, 2:44 PM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.3), Feature Request, Restricted Project, Windows
Another request for this would be that the for expired keys a --locate-key might be triggered. GpgOL currently does this in internal logic and this causes GnuPG to refetch the key e.g. from WKD if the key came originally from WKD. https://bugs.kde.org/show_bug.cgi?id=471911 I am not sure if the expiry checker already does this, but someone pointed me to the KDE bug and I will point back here because it makes little sense to fix this in the kmail resolver when we want to replace it.
• aheinecke moved T5755: Kleopatra: Export secret subkeys from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• aheinecke shifted T5755: Kleopatra: Export secret subkeys from the Restricted Space space to the S1 Public space.
This has a serious usability issue. If you cancel the password entry when exporting it reports success and creates an apparently valid secret key file but without the subkey you intended to export. So worst case the user thinks he has a backup but instead has no backup :/
Jul 3 2023
Jul 3 2023
Jul 3 2023, 2:48 PM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.3), Feature Request, Restricted Project, Windows
• aheinecke triaged T6574: GnuPG / Gpg4win: Replace sha1sum.c with a tool in GnuPG as Wishlist priority.
• gniibe updated the task description for T6562: gpgtar: --status-fd requires HANDLE (not POSIX fd) when spawning a process.
• gniibe updated the task description for T6562: gpgtar: --status-fd requires HANDLE (not POSIX fd) when spawning a process.
• gniibe changed the status of T6551: translate_sys2libc_fd_int on Windows 64-bit, a subtask of T6508: Port GnuPG to 64-bit Windows, from Testing to Open.
• gniibe changed the status of T6551: translate_sys2libc_fd_int on Windows 64-bit from Testing to Open.
The case in check_special_filename is fixed. So, there is no cases in GnuPG where the value of out of range is silently converted to wrong value.
Remaining places are:
Jun 29 2023
Jun 29 2023
• ebo closed T5717: Kleopatra: Case insensitive algo compare in Kleopatras new key dialog as Resolved.
works
Except a case, all use cases of translate_sys2libc_fd_int is with a result of integer from command line argument.
Jun 28 2023
Jun 28 2023
• gniibe changed the status of T6562: gpgtar: --status-fd requires HANDLE (not POSIX fd) when spawning a process, a subtask of T6551: translate_sys2libc_fd_int on Windows 64-bit, from Open to Testing.
• gniibe changed the status of T6562: gpgtar: --status-fd requires HANDLE (not POSIX fd) when spawning a process from Open to Testing.
Changes are pushed.
Jun 27 2023
Jun 27 2023
• gniibe added a comment to T6562: gpgtar: --status-fd requires HANDLE (not POSIX fd) when spawning a process.
We need to keep the gpgtar part of commit in rG2756147e392c: gpg,sm,tools: Use string for option --*-fd..
• gniibe triaged T6562: gpgtar: --status-fd requires HANDLE (not POSIX fd) when spawning a process as Normal priority.
The changes are intrusive to other implementations (POSIX and Windows 32-bit).
So, I revert the changes of replacing translate_sys2libc_fd_int.
Jun 26 2023
Jun 26 2023
I don't argue about the technical necessity for the change. I agree the fact it works (without such changes).
Jun 23 2023
Jun 23 2023
Just to clarify this change for readers not accustomed to Windows internals: This function was used to translate the file descriptor as passed to gpg (which is a HANDLE) to the libc file descriptor as used by stdio. Obviously we won't anymore work with stdio file descriptors in the future but use the Windows32 API (ReadFile et al). libc fds 0,1,2 are handled in a special way on Windows.
• gniibe changed the status of T6551: translate_sys2libc_fd_int on Windows 64-bit, a subtask of T6508: Port GnuPG to 64-bit Windows, from Open to Testing.
• gniibe changed the status of T6551: translate_sys2libc_fd_int on Windows 64-bit from Open to Testing.
Fixed in master.
Jun 22 2023
Jun 22 2023
See for T6545 for a new request to support IDP.
• werner renamed T6545: Support CRL extension issuingDistributionPoint from Support CRL exension issuingDistributionPoint to Support CRL extension issuingDistributionPoint.
We had one request to support this back in 2017 but it was closed because the respective CA stopped using this extension. See T2039.
The use cases are:
- oPassphraseFD for gpgsm, gpg
- oStatusFD for gpg-auth, gpg-wks-client, gpg-card, gpg-pair-tool, gpgtar, gpgconf, gpgsm, gpg, gpgv
- oLoggerFD for gpgsm, gpg, gpgv
- oAttributeFD for gpg
- oCommandFD for gpg
- oOverrideSessionKeyFD for gpg
Jun 20 2023
Jun 20 2023
• werner triaged T6527: Kleopatra: remove "Today" from the choice of expiry dates for key generation as Normal priority.
Jun 19 2023
Jun 19 2023
rGb1ecc8353ae3 is just what I meant, so that we can recommend such an option in the future as a workaround until a new update becomes available which supports such an extension.
Nah, the description for that extension is pretty strict and I won't feel comfortable to just ignore it. BTW there is also T6398 (nameConstraints) which needs support. But for debugging a ignore extension makes sense.
For support reasons I would say that it might make sense to also ignore the extensions from "ignore-cert-extension" when checking CRLs?
Jun 16 2023
Jun 16 2023
I tested this with OpenPGP and 2.4.3-beta19 on Windows. Worked nicely.
Jun 16 2023, 2:39 PM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.3), Feature Request, Restricted Project, Windows
Jun 15 2023
Jun 15 2023
• werner moved T6534: gpg's progress_filter needs to use uint64_t from WiP to QA on the gnupg24 board.
Jun 15 2023, 11:21 AM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.3), Feature Request, Restricted Project, Windows
And of course we also need to adjust GPGME
Jun 15 2023, 10:58 AM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.3), Feature Request, Restricted Project, Windows
We also need PROGRESS lines in gpgsm.
Jun 15 2023, 10:36 AM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.3), Feature Request, Restricted Project, Windows
Jun 13 2023
Jun 13 2023
Jun 13 2023, 10:07 AM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.3), Feature Request, Restricted Project, Windows
Jun 12 2023
Jun 12 2023
Jun 12 2023, 4:23 PM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.3), Feature Request, Restricted Project, Windows
I'm reopening this. Its probably not a regression but I was sure that we had progress for large files fixed in the past.
Yeah no progress for files larger then 32 bit o.O... But this used to work 😭
On 64 bit linux this works btw. so I think it comes down to the difference between 32 bit off_t and 64 bit off_t
Yeah, its the ugly off_t again. I am just testing how this works with single files above that threshold we worked quite a bit on this back in the days https://dev.gnupg.org/T2368
Yeah, probably a Windows/MinGW 32-bit problem. GpgME::Data does
off_t size = seek(0, SEEK_END); seek(0, SEEK_SET); std::string sizestr = std::to_string(size); // Ignore errors as this is optional gpgme_data_set_flag(d->data, "size-hint", sizestr.c_str());
Probably some issue with large files / integer overflow. I am testing on Windows with 32 bit.