Page MenuHome GnuPG
Feed Advanced Search

Jan 5 2024

werner moved T3390: Showing complete OpenPGP key flags from Backlog to done on the gnupg24 board.
Jan 5 2024, 12:04 PM · gnupg24, patch, Feature Request
werner moved T3398: fingerprint-based import screener is no defense against malice from Backlog to done on the gnupg24 board.
Jan 5 2024, 12:02 PM · gnupg24, gnupg (gpg23), Feature Request
werner added a comment to T4160: ed488 support.

I sued the done column because we have not assigned it to any milestone.

Jan 5 2024, 12:01 PM · gnupg24, gnupg (gpg23), Feature Request
werner moved T4160: ed488 support from WiP to done on the gnupg24 board.
Jan 5 2024, 12:00 PM · gnupg24, gnupg (gpg23), Feature Request
werner moved T4160: ed488 support from QA to WiP on the gnupg24 board.
Jan 5 2024, 11:59 AM · gnupg24, gnupg (gpg23), Feature Request
werner closed T4160: ed488 support as Resolved.

Fixed a long time ago.

Jan 5 2024, 11:58 AM · gnupg24, gnupg (gpg23), Feature Request
werner changed the status of T6796: gpg does create socketdir after every operation from Open to Testing.

With rG239c1fdc28dcd0dc7aa5341be7c966da2231642a we now have a socketdir keyword for gpgconf.ctl. man gpgconf and look for that file. Will be released with 2.4.4.

Jan 5 2024, 11:39 AM · gnupg24 (gnupg-2.4.4), Feature Request
werner moved T6919: Add support for smartcafe cards from Backlog to QA on the gnupg24 board.
Jan 5 2024, 11:32 AM · gnupg24 (gnupg-2.4.4), Restricted Project, Feature Request, scd

Jan 4 2024

werner triaged T6919: Add support for smartcafe cards as Normal priority.
Jan 4 2024, 4:26 PM · gnupg24 (gnupg-2.4.4), Restricted Project, Feature Request, scd
werner closed T1839: Can't Encrypt with PIV-I Encryption Certificate - Unsupported Certificate as Resolved.

Note that we now have also an option instead of the workaround from 2015

Jan 4 2024, 4:18 PM · dirmngr, gnupg, S/MIME, Feature Request
aheinecke merged T6876: GPGME(++) Add "include-key-block" and "auto-key-import" to context flags into T4856: GPG: Key Exchange Put public OpenPGP key into signature.
Jan 4 2024, 8:50 AM · Feature Request, gpgol, Keyserver, gnupg

Jan 3 2024

ebo added a parent task for T6403: Kleopatra: Warn if a certificate in a group is deleted: T6916: Kleopatra group related improvements.
Jan 3 2024, 12:05 PM · vsd33 (vsd-3.3.0), Restricted Project, Feature Request, kleopatra

Dec 27 2023

gniibe triaged T6909: pinentry: Drop pinentry-emacs support as Normal priority.
Dec 27 2023, 4:01 AM · Feature Request, pinentry, Emacs

Dec 26 2023

gniibe closed T2440: scdaemon grabs card exclusively; it'd be nice if it didn't as Resolved.

GnuPG 2.2 and 2.4 now have --pcsc-shared option for a user who can control his action in detail.
So, closing this bug report.

Dec 26 2023, 7:00 AM · scd, Feature Request, gnupg

Dec 20 2023

andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

@aheinecke as promised, attached some test vectors:

Dec 20 2023, 12:42 PM · Feature Request, gnupg

Dec 19 2023

andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

This has always worked on the client site since we implemented keyserver access.

Dec 19 2023, 3:57 PM · Feature Request, gnupg
werner added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

I see no problem to return only revocation packets. Clients must verify them anyway against their public keys and the fingerprint makes this easy. Verification against a primary key delivered along the revocation is more or less useless because that primary key must anyway been looked up in the client's keyring and th local existance of a primary key is anyway required to ask a keyserver for a revocation.

Dec 19 2023, 1:49 PM · Feature Request, gnupg
andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

The trick here is that during import gpg tracks those invalid signatures and then tries to apply them to other keys.

Dec 19 2023, 1:17 PM · Feature Request, gnupg
werner added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Appended. Yes, it is considered an invalid signature and ignored. Anyone can insert an invalid signature. The trick here is that during import gpg tracks those invalid signatures and then tries to apply them to other keys. The use case here is this:

Dec 19 2023, 12:56 PM · Feature Request, gnupg
andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

If you need the fingerprint, why don't you take it from the revocation certificate - for many years it is in subpacket 33.

Dec 19 2023, 12:51 PM · Feature Request, gnupg
aheinecke added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Hi, Andre.
...

Thanks for the explanation. To me this sounds very reasonable and I think that I am starting to better understand your use case in Hockeypuck.
Having a test example key + the intended revocation update would help at least me to dig into it a bit and see how this might conflict with RFC4880.

Dec 19 2023, 12:48 PM · Feature Request, gnupg
andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

I'm curious about the parsing implications of this bit:

Dec 19 2023, 12:46 PM · Feature Request, gnupg
werner added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Well, the quoted paragraph ended with a

Dec 19 2023, 12:46 PM · Feature Request, gnupg
andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Individual UID revocation sigs are not particularly useful, because they cannot be validated without the original UID. Such things are out of scope.

Dec 19 2023, 12:04 PM · Feature Request, gnupg
aheinecke added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Hi,
so I talked to werner about this, and of course GnuPG accepts minimal revocations.
A revocation certificate. So that was my point. As he understood you, you wanted to revoke not the whole key but only a single user id but without the user id packet? Sorry I am not really the protocol expert. But for me a revoked key without any user ids sounds to me just like a "standard" revocation certificate revoking the whole key. And as said, that is well within the the Standard and accepted, and even used by GnuPG. E.g. in case of a keyrollover we attach such a minimal revocation certificate to WKD keys when we deliver key updates.

Dec 19 2023, 11:40 AM · Feature Request, gnupg
aheinecke added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

From a technical standpoint I think the most minimal revocations which are technically possible should be accepted and thus I endorse the feature request.

Dec 19 2023, 9:34 AM · Feature Request, gnupg
bernhard added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

In any case this is technically required

Dec 19 2023, 9:30 AM · Feature Request, gnupg
werner closed T6900: GnuPG: Accept revocation certificates without UserID as Wontfix.

Actually the public key is personalized data as much as a mail address. In any case this is technically required and users take an informed decisions when they distribute their public key to a site not controlled by them.

Dec 19 2023, 9:24 AM · Feature Request, gnupg

Dec 18 2023

aheinecke added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Just to clarify, above ticket does not reflect my Opinion. It is a direct quote from a different ticket. It is my expert opinion that a combination of "Name <email> + Cryptographic Data" is not a personalised dataset since anyone can create it. But let us please not argue about that.

Dec 18 2023, 8:17 PM · Feature Request, gnupg
aheinecke added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Perhaps we need to open a new issue for this, to keep the discussion more focused?

Dec 18 2023, 8:07 PM · gnupg (gpg23), Feature Request
aheinecke raised the priority of T6900: GnuPG: Accept revocation certificates without UserID from Normal to Needs Triage.
Dec 18 2023, 8:05 PM · Feature Request, gnupg
aheinecke triaged T6900: GnuPG: Accept revocation certificates without UserID as Normal priority.
Dec 18 2023, 8:05 PM · Feature Request, gnupg
andrewgdotcom added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

@bernhard Following up on discussion elsewhere:

Dec 18 2023, 7:37 PM · gnupg (gpg23), Feature Request

Dec 14 2023

ikloecker added a comment to T6889: gpgme: QGpgMEQuickJob creates keys with wrong expiry.

Werner and Tobias are both correct. If a new subkey is generated from scratch then gpg uses the current time as key creation time and sets the expiration date (in the internal in-memory representation of a public key) to the key creation time plus the expiration value.

Dec 14 2023, 2:01 PM · Feature Request, gpgme
TobiasFella added a comment to T6889: gpgme: QGpgMEQuickJob creates keys with wrong expiry.

Sorry, I should have been more precise in my description of the problem. Specifically with --quick-addkey, gpg's behavior seems to be that the expiration, when given using seconds=... is treated as seconds from now.

Dec 14 2023, 9:25 AM · Feature Request, gpgme

Dec 13 2023

werner added a comment to T6889: gpgme: QGpgMEQuickJob creates keys with wrong expiry.

FWIW, when updating the expiration time gpg does this:

Dec 13 2023, 7:19 PM · Feature Request, gpgme
TobiasFella added a comment to T6889: gpgme: QGpgMEQuickJob creates keys with wrong expiry.

My explanation of gpgme's behavior was not quite correct: Specifically in the QGpgMEQuickJobs for creating (sub)keys, the API uses QDateTimes, which are then converted to seconds since epoch.

Dec 13 2023, 7:14 PM · Feature Request, gpgme
werner added a comment to T6889: gpgme: QGpgMEQuickJob creates keys with wrong expiry.

That's both not correct. gpg takes the expiration time in seconds since creation time. For a new key this is close to the corrent time but not really. For an prolonging an expiration, this is of course different - the creation time of the key needs to be taken in account. I recall that we once had a discussion and agreed to keep it at time after the creation of the key. This avoids problems with the expiration going negative.

Dec 13 2023, 7:06 PM · Feature Request, gpgme
werner added projects to T6889: gpgme: QGpgMEQuickJob creates keys with wrong expiry: gpgme, Feature Request.
Dec 13 2023, 6:52 PM · Feature Request, gpgme

Dec 12 2023

aheinecke edited projects for T4446: please add --quick-revoke-subkey, added: Restricted Project; removed OpenPGP.

We could also use this for T6874: Kleopatra subkey management improvements

Dec 12 2023, 8:20 AM · Restricted Project, gnupg24, Feature Request

Dec 11 2023

aheinecke closed T6350: Kleopatra: disable trust change on not certified keys as Resolved.

I think this works as intended now with the new certify interface. Also if you grant a key full ownertrust as now is the only option the self certification automatically becomes valid so this then shows as certified.

Dec 11 2023, 12:14 PM · Feature Request, kleopatra, Restricted Project

Nov 23 2023

werner added a parent task for T6620: Add a way to extract ECC key parameters from a public key: T6465: Store the ECDH parameters in the key file.
Nov 23 2023, 12:04 PM · Restricted Project, kleopatra, Feature Request, gpgme

Nov 19 2023

dvratil added a comment to T6198: KMail: Port to keyresolver from libkleo.

Just my five cents:

Nov 19 2023, 8:42 PM · Restricted Project, Feature Request, KDE, kleopatra

Nov 17 2023

werner lowered the priority of T4195: Fix time API in gpgme from High to Normal.
Nov 17 2023, 11:01 AM · gnupg, kleopatra, Restricted Project, gpgme, Feature Request
werner edited projects for T4195: Fix time API in gpgme, added: gnupg; removed gnupg22.

This is a generic parent task and does not require workboards for specific branches.

Nov 17 2023, 10:59 AM · gnupg, kleopatra, Restricted Project, gpgme, Feature Request

Nov 16 2023

ikloecker changed the status of T6566: GpgOL: newly generated key not loaded in the security confirmation dialog, a subtask of T6198: KMail: Port to keyresolver from libkleo, from Open to Testing.
Nov 16 2023, 1:23 PM · Restricted Project, Feature Request, KDE, kleopatra

Nov 14 2023

werner closed T4873: Enable AES GCM in FIPS mode as Resolved.
Nov 14 2023, 1:17 PM · FIPS, libgcrypt, Feature Request
werner closed T4873: Enable AES GCM in FIPS mode, a subtask of T5870: libgcrypt: AEAD API for FIPS 140 (in future), as Resolved.
Nov 14 2023, 1:17 PM · Feature Request, FIPS, libgcrypt

Nov 13 2023

werner triaged T6796: gpg does create socketdir after every operation as Normal priority.
Nov 13 2023, 4:18 PM · gnupg24 (gnupg-2.4.4), Feature Request

Nov 10 2023

werner moved T6719: Support Proxy-Authorization: Negotiate on Windows from Backlog to WiP on the gnupg22 board.
Nov 10 2023, 9:11 AM · gnupg24, gnupg22, Feature Request, Restricted Project
werner moved T6545: Support CRL extension issuingDistributionPoint from WiP to Backlog on the gnupg22 board.
Nov 10 2023, 9:08 AM · workaround, gnupg26, Restricted Project, libksba, gnupg22, Feature Request

Nov 9 2023

aheinecke added a comment to T6574: GnuPG / Gpg4win: Replace sha1sum.c with a tool in GnuPG.

So as a replacement for what we have in Kleopatra this would work.

Nov 9 2023, 6:22 PM · Restricted Project, Feature Request, gnupg, gpg4win
werner changed the status of T6736: Year 2038 issue for key validity date, a subtask of T4195: Fix time API in gpgme, from Open to Testing.
Nov 9 2023, 2:17 PM · gnupg, kleopatra, Restricted Project, gpgme, Feature Request

Nov 3 2023

aheinecke updated subscribers of T6574: GnuPG / Gpg4win: Replace sha1sum.c with a tool in GnuPG.

So with my ryzen 9 on tumbleweed:

Nov 3 2023, 4:09 PM · Restricted Project, Feature Request, gnupg, gpg4win

Oct 31 2023

aheinecke added a comment to T6574: GnuPG / Gpg4win: Replace sha1sum.c with a tool in GnuPG.

For a very long time i would have agreed with you. But i now understand the usecase. You misunderstand that feature just like i had. It is not about checksum verification or checking. It is for detecting changes in folder trees so that you know when to reencrypt and update your encrypted archive of that tree. Yes this could be done somewhere else but the usecase is valid for kleopatra.

Oct 31 2023, 11:14 PM · Restricted Project, Feature Request, gnupg, gpg4win
ikloecker added a comment to T6574: GnuPG / Gpg4win: Replace sha1sum.c with a tool in GnuPG.

I would rather like to see the checksum stuff be ripped out of Kleopatra into a simple standalone app. It's complete overkill to start the Kleopatra battleship if the user just wants to calculate or verify a checksum of a downloaded file. The UI of the checksum tool in Kleopatra is anyway still not accessible (T6099: Kleopatra: Make checksum verification accessible). How about we redesign the UI from scratch with accessibility in mind from the start?

Oct 31 2023, 10:17 PM · Restricted Project, Feature Request, gnupg, gpg4win
TobiasFella added a comment to T6574: GnuPG / Gpg4win: Replace sha1sum.c with a tool in GnuPG.

The tobias/gpgsum branch in gnupg now contains my implementation of this. Together with the attached patches to kleopatra and libkleo, it can properly handle unicode filenames on windows. I'll put those patches up for review at KDE in the next days.

Oct 31 2023, 5:02 PM · Restricted Project, Feature Request, gnupg, gpg4win
ebo added a parent task for T6420: Kleopatra: improve layout of and text in smartcard management view: T6785: Kleopatra: Improvements related to smart cards.
Oct 31 2023, 2:25 PM · vsd33 (vsd-3.3.0), Feature Request, Restricted Project, kleopatra

Oct 30 2023

ebo changed the status of T6736: Year 2038 issue for key validity date, a subtask of T4195: Fix time API in gpgme, from Testing to Open.
Oct 30 2023, 4:02 PM · gnupg, kleopatra, Restricted Project, gpgme, Feature Request
ebo moved T6253: GpgSM: Backport ECC support to 2.2 from QA to gnupg-2.2.42 on the gnupg22 board.
Oct 30 2023, 3:25 PM · gnupg22 (gnupg-2.2.42), Restricted Project, Feature Request, S/MIME
ebo closed T6253: GpgSM: Backport ECC support to 2.2, a subtask of T4098: GpgSM: Add ECC support, as Resolved.
Oct 30 2023, 3:24 PM · gnupg (gpg23), Feature Request, S/MIME
ebo closed T6253: GpgSM: Backport ECC support to 2.2 as Resolved.

works: my brainpool X509 testcertificate is shown as compliant

Oct 30 2023, 3:24 PM · gnupg22 (gnupg-2.2.42), Restricted Project, Feature Request, S/MIME

Oct 28 2023

aheinecke added a project to T6234: Implement access to smartcards via a generic pkcs#11 interface: Restricted Project.

Please excuse my question but this issue has been WIP for 8 months. I think it was forgotten a bit. Especially since we are not shipping Okular for general signing of PDF documents this issue might help as a stopgap for Smartcards which we do not yet support natively and reduce the pressure a bit to add more PKCS#15 smartcards which can currently be used with Adobe and Mozilla NSS through their proprietary PKCS#11 modules. So I would like to raise the priority for this a bit. But I don't think high is appropriate. That would be for werner to decide.

Oct 28 2023, 9:57 AM · gnupg, Feature Request, scd

Oct 27 2023

werner added a comment to T4195: Fix time API in gpgme.

A quick test shows that the latest patches allow to set and show an expiration date beyond 2038. A new VSD beta will soon be available to customers. And we should also think about getting a gpg4win bug fix release out.

Oct 27 2023, 8:31 AM · gnupg, kleopatra, Restricted Project, gpgme, Feature Request
werner added a subtask for T4195: Fix time API in gpgme: T6736: Year 2038 issue for key validity date.
Oct 27 2023, 8:29 AM · gnupg, kleopatra, Restricted Project, gpgme, Feature Request

Oct 26 2023

werner closed T6705: Provide strong v5 fingerprints also for v4 keys as Resolved.

Will be in 2.4.4. GPGME 1.23.0 with support has been released.

Oct 26 2023, 9:07 AM · gpgme (gpgme 1.23.x), OpenPGP, Feature Request
werner moved T6705: Provide strong v5 fingerprints also for v4 keys from Backlog to gpgme 1.23.x on the gpgme board.
Oct 26 2023, 9:05 AM · gpgme (gpgme 1.23.x), OpenPGP, Feature Request

Oct 25 2023

werner moved T4310: GPGME: Add ssh export mode from QA for next release to gpgme 1.23.x on the gpgme board.
Oct 25 2023, 10:42 AM · gpgme (gpgme 1.23.x), Feature Request
werner moved T2916: GPGME should have a way to suppress delete key prompts from QA for next release to gpgme 1.23.x on the gpgme board.
Oct 25 2023, 10:42 AM · gpgme (gpgme 1.23.x), Feature Request
werner moved T6559: GPGSM: "always trust like override" or "force" option from QA for next release to gpgme 1.23.x on the gpgme board.
Oct 25 2023, 10:40 AM · gnupg24 (gnupg-2.4.4), gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), Feature Request, gpgol, S/MIME, kleopatra, Restricted Project
werner moved T6534: gpg's progress_filter needs to use uint64_t from done to gpgme 1.23.x on the gpgme board.
Oct 25 2023, 10:39 AM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.3), Feature Request, Restricted Project, Windows
werner moved T6748: Let gpgme tell that a encryption subkey exists even if expired from done to gpgme 1.23.x on the gpgme board.
Oct 25 2023, 10:16 AM · gpgme (gpgme 1.23.x), Feature Request
werner moved T6363: Add progress status output to gpgtar from done to gpgme 1.23.x on the gpgme board.
Oct 25 2023, 10:16 AM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.1), Feature Request

Oct 24 2023

werner placed T6253: GpgSM: Backport ECC support to 2.2 up for grabs.
Oct 24 2023, 2:55 PM · gnupg22 (gnupg-2.2.42), Restricted Project, Feature Request, S/MIME
werner added a comment to T6253: GpgSM: Backport ECC support to 2.2.

T6536 has been fixed. With today's commits the Brainpool curves are now also flagged as compliant in gpgsm.

Oct 24 2023, 2:55 PM · gnupg22 (gnupg-2.2.42), Restricted Project, Feature Request, S/MIME

Oct 23 2023

werner added a comment to T3362: Prevent Smartcard from caching PIN when cache-ttl is set accordingly.

Well, see my very first comment.

Oct 23 2023, 9:46 AM · Feature Request

Oct 19 2023

ebo closed T6363: Add progress status output to gpgtar as Resolved.

yes, fixed

Oct 19 2023, 2:21 PM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.1), Feature Request
aheinecke changed the status of T6363: Add progress status output to gpgtar from Open to Testing.

I think this was fixed with the fix for https://dev.gnupg.org/T6534

Oct 19 2023, 1:39 PM · gpgme (gpgme 1.23.x), gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.1), Feature Request

Oct 18 2023

aheinecke assigned T6545: Support CRL extension issuingDistributionPoint to werner.
Oct 18 2023, 2:44 PM · workaround, gnupg26, Restricted Project, libksba, gnupg22, Feature Request
ebo moved T6708: Allow to inhibit the use of a default PGP keyserver from QA to gnupg-2.2.42 on the gnupg22 board.
Oct 18 2023, 9:14 AM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request
ebo closed T6708: Allow to inhibit the use of a default PGP keyserver as Resolved.
Oct 18 2023, 8:56 AM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request

Oct 16 2023

ikloecker removed a project from T6708: Allow to inhibit the use of a default PGP keyserver: kleopatra.

Needed changes in Kleopatra are tracked in T6761.

Oct 16 2023, 2:15 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request
werner added a comment to T6708: Allow to inhibit the use of a default PGP keyserver.

I am pretty sure that we have done everything in gnupg. Now if we only had a workboard for kleopatra.

Oct 16 2023, 1:47 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request

Oct 13 2023

ebo added a comment to T6708: Allow to inhibit the use of a default PGP keyserver.

Well I have looked at this ticket and posted a comment. We should talk about if there is anything left to do or not. I suspect that the gpg side is done and I should open one (or probably better several) ticket(s) for the kleopatra side.

Oct 13 2023, 3:59 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request
aheinecke added a comment to T6545: Support CRL extension issuingDistributionPoint.

And yes in gpgsm.conf both the extensions are also marked with ignore-cert-extension.

Oct 13 2023, 10:59 AM · workaround, gnupg26, Restricted Project, libksba, gnupg22, Feature Request
aheinecke added a comment to T6545: Support CRL extension issuingDistributionPoint.

While remembering this I added to our standard.conf (and for testing first to my local conf):

Oct 13 2023, 10:48 AM · workaround, gnupg26, Restricted Project, libksba, gnupg22, Feature Request

Oct 6 2023

werner triaged T6749: Kleopatra: show only one error/information window for a certificate import as Normal priority.
Oct 6 2023, 11:29 AM · vsd33 (vsd-3.3.0), Feature Request, kleopatra, Restricted Project
werner triaged T6745: Possible Okular improvements as Normal priority.
Oct 6 2023, 11:25 AM · Feature Request, okular

Oct 5 2023

ikloecker closed T6748: Let gpgme tell that a encryption subkey exists even if expired as Resolved.

C++ bindings also done.

Oct 5 2023, 3:31 PM · gpgme (gpgme 1.23.x), Feature Request
werner assigned T6748: Let gpgme tell that a encryption subkey exists even if expired to ikloecker.

Core part done.

Oct 5 2023, 2:19 PM · gpgme (gpgme 1.23.x), Feature Request
werner triaged T6748: Let gpgme tell that a encryption subkey exists even if expired as Normal priority.
Oct 5 2023, 12:49 PM · gpgme (gpgme 1.23.x), Feature Request
werner moved T6708: Allow to inhibit the use of a default PGP keyserver from WiP to QA on the gnupg22 board.

Form the Gnupg-2.2 commit rG936954a18a2df made sure that the hkps:// prefixing from kleopatra is ignored.

Oct 5 2023, 11:35 AM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Restricted Project, vsd, Feature Request
werner moved T6253: GpgSM: Backport ECC support to 2.2 from WiP to QA on the gnupg22 board.

That has been done modulo the bug which existed for both versions, I fixed today (T6536)

Oct 5 2023, 11:30 AM · gnupg22 (gnupg-2.2.42), Restricted Project, Feature Request, S/MIME

Oct 2 2023

werner changed the status of T3380: Use exponential backoff when spawning agent and dirmngr from Open to Testing.
Oct 2 2023, 2:41 PM · gnupg24 (gnupg-2.4.4), Feature Request
werner added a comment to T3380: Use exponential backoff when spawning agent and dirmngr.

This was actually implemented in a similar way for T3490.

Oct 2 2023, 1:28 PM · gnupg24 (gnupg-2.4.4), Feature Request

Sep 28 2023

aheinecke added a comment to T6739: Allow "refresh key/signatures" from key's context menu (from key list).

Aha, so you know how to provoke us into action, good man ;-) Alright I give it high priority. No seriously, makes sense to have we'll see when we can fit it in. Needs an extension in our internal api so probably not in the next release but sooner rather then later.

Sep 28 2023, 5:49 PM · vsd33 (vsd-3.3.0), Restricted Project, kleopatra, Feature Request
uwi added a comment to T6739: Allow "refresh key/signatures" from key's context menu (from key list).

I guess I asked for it, because much older "PGP Desktop" had it already (via menu entry):

Sep 28 2023, 5:03 PM · vsd33 (vsd-3.3.0), Restricted Project, kleopatra, Feature Request
aheinecke added a comment to T6739: Allow "refresh key/signatures" from key's context menu (from key list).

Mmh or even select all expired keys and then refresh them.

Sep 28 2023, 3:54 PM · vsd33 (vsd-3.3.0), Restricted Project, kleopatra, Feature Request
aheinecke triaged T6739: Allow "refresh key/signatures" from key's context menu (from key list) as Wishlist priority.

Multi select makes this nontrivial. But I think only with multi select this would really be useful. But yes it is a nice item for the backlog. E.g. if you know that a company switched their mail domain you might want to refresh all the keys from that company and you could do that with filter + multi select and refresh.

Sep 28 2023, 3:53 PM · vsd33 (vsd-3.3.0), Restricted Project, kleopatra, Feature Request
ebo moved T6253: GpgSM: Backport ECC support to 2.2 from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Sep 28 2023, 1:20 PM · gnupg22 (gnupg-2.2.42), Restricted Project, Feature Request, S/MIME