0001-Test-patch.patch3 KBDownload
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Feb 7 2024
Feb 7 2024
Feb 6 2024
Feb 6 2024
Could you write a quick patch file for that? (I don't have a working source build, I am using the Fedora spec file + patches)
The old debug output is in genral okay but what I would do is to add a couple of log_debug calls like
• ikloecker added a comment to T6977: gpgme_op_verify from libgpgme hang without returning anything when verifying corrupted file signature.
Does the run-verify example (in gpgme/tests) hang when verifying a corrupted file?
@werner I managed to recover the old .p12 that has the error. And this is still replicable. Is there a debug flag that would be useful or can we setup some private live-debugging for this?
Closing this outdated ticket
Karam changed Version from 1.17.1 (tested also on 1.22.0 to libgpgme 1.17.1 (tested also on 1.22.0) on T6977: gpgme_op_verify from libgpgme hang without returning anything when verifying corrupted file signature.
Feb 5 2024
Feb 5 2024
I'm attaching a proposed patch. We should decide whether this is the correct encoding to use for SHAKE128 and SHAKE256, because they are variable-length output functions and there is an alternative encoding that has a field for the length, which is likely better suited, but currently not really well supported by libgcrypt (since this would be dynamic content in the ASN.1 encoding).
I would have expected an error message right after
Feb 4 2024
Feb 4 2024
I agree. Any automatic use of the embedded filename will be potentially problematic security-wise. The only safe use is probably as a value in an interactive dialog, and even then, only if the user doesn't accept a dangerous value.
This was reported again 3 years later as T4704, and finally fixed in gnupg-2.4.4, released last week.
Feb 2 2024
Feb 2 2024
The patch supplied here should apply to STABLE-BRANCH-2-4, but it should also be easy enough to backport to STABLE-BRANCH-2-2 and STABLE-BRANCH-1-4. For GnuPG master, i recommend actually removing the option.
Unfortunately I have deleted the .p12 with the CA chain, and I don't know how I've generated it. It also contained my production certificates so, kinda sensitive to upload here.
Okay, I push the change for the extended salt size. Regarding the import of CA certificates, I have not seen any problems. In fact it is pretty common. Did you test with with 2.4.4. A test file would be helpful.
Ok, I have tried again the series of workarounds that I initially posted on the main description, and I managed to fix it by striping the CA certificates. So the current issues here are:
- Allocated salt is too small. https://dev.gnupg.org/T6757#182217 fixes for now
- Cannot import a .p12 that includes CA certificates as well
Feb 1 2024
Feb 1 2024
Fixed by changing server as noted above.
Thanks for all the help @gniibe.
It should not be removed as I believe it is required to be compliant:
Thank you for the fix. Pushed the change modifying the commit log for the ChangeLog entry.
• gniibe added projects to T6965: WKD fail: gpg/dimngr fails to retrieve public key: dirmngr, Support.
I'm afraid that your particular configuration would cause the problem of the negotiation.
Jan 31 2024
Jan 31 2024
Server is nginx with the following settings
Jan 30 2024
Jan 30 2024
We got a bit further, not sure what debug level you want, guru I've found to be too excessive:
Can you please try this patch:
After applying patch to nPth 1.6 no semaphore leaks detected. Tested with GnuPG-2.3.3.
There has been positive feedback from production environment as well.
@werner I have just tested this, and although it fixed it for one certificate, this one in this issue still fails. Here is the new debug given
lecris reopened T6757: gpgsm 2.4 Fails to import P12 certificate/key, a subtask of T6752: New minip12 does not import from Firefox anymore, as Open.
Fixed in GnuPG 2.4.4.
AFAIK, we don't have any option to control the lower-level detail of GnuTLS for dirmngr of GnuPG.
Jan 29 2024
Jan 29 2024
Setting a date on the command line is in UTC, displayed in Kleopatra is the corresponding local date which might therefore be one day of. This is as intended and the same for dates before or after the Y2038 cut off.
-> Works with Gpg4win-4.3.0
• ebo closed T6806: Fix off by one day in the expiry date calculation, a subtask of T6736: Year 2038 issue for key validity date, as Resolved.
Thanks for taking time to look into this. You have clearly identified the issue.
I can do correct handshake with GnuTLS, if specified.
Please configure your server so that an application with GnuTLS can interoperate. It is not GnuPG specific.
After the original fail - one of the things I tried was changing nginx server to allow TLSv1.2:
It looks like a failure of GnuTLS negotiation.
$ wget --server-response --spider https://openpgpkey.sapience.com/.well-known/openpgpkey/sapience.com/hu/me5xnfhbf3w9djpmxa3keq5q8s3rcgf1?l=arch Spider mode enabled. Check if remote file exists. --2024-01-29 11:35:15-- https://openpgpkey.sapience.com/.well-known/openpgpkey/sapience.com/hu/me5xnfhbf3w9djpmxa3keq5q8s3rcgf1?l=arch Resolving openpgpkey.sapience.com (openpgpkey.sapience.com)... 72.84.236.69 Connecting to openpgpkey.sapience.com (openpgpkey.sapience.com)|72.84.236.69|:443... connected. GnuTLS: A TLS fatal alert has been received. GnuTLS: received alert [47]: Illegal parameter Unable to establish SSL connection.
Jan 28 2024
Jan 28 2024
Jan 27 2024
Jan 27 2024
stardiviner added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).
I upgraded to gnupg 1.4.4 now, the problem is gone. Thanks for working.
Jan 26 2024
Jan 26 2024
fgunbin added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).
Thanks @gniibe and everybody!
Apologies! That was from the CentOS Server. Below are the current details
for the recently upgraded Alma Linux servers. Will upgrading to the most
recent version fix the issue?
• werner closed T6961: On Windows the gpgtar --status-fd 2 does not show the gpg status lines as Resolved.
Oh, well it does happen only with --status-fd=2 because of a c+p error by me. For status-fd > 2, as used by GPGME, there is no problem, because this is handled by an exception list.
• gniibe closed T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG) as Resolved.
Fixed in GnuPG 2.4.4.
• gniibe closed T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys as Resolved.
For the particular issue reopened for GnuPG 2.2.41 is fixed in GnuPG 2.2.42.
Please note that we can't fix the cause itself, the hardware problem.
Fixed in 2.4.4.
Jan 25 2024
Jan 25 2024
Are you seriously using version 2.0 which had its EOL of 6 years ago? Libgcrypt 1.5 EOF was even a year earlier. Sorry, I won't look into that.
The behavior is different between the old and the new versions. gpg-agent, the backend exits with the shell closing in the old version. But, if I start it with the new version, it stays running unless explicitly closed. I wonder if this means that we should run gpg-agent on all servers?
• werner triaged T6961: On Windows the gpgtar --status-fd 2 does not show the gpg status lines as Normal priority.
• werner added a comment to T6944: The default card key generation keeps an unprotected backup of the encryption key on disk.
Also fixed in the fortgcoming 2.2.43
• werner shifted T6944: The default card key generation keeps an unprotected backup of the encryption key on disk from the Restricted Space space to the S1 Public space.
Jan 24 2024
Jan 24 2024
No test environment in our QA dept.
• werner moved T6831: May chose a signing key from a not inserted card over an inserted one from QA to gnupg-2.4.4 on the gnupg24 board.
• werner closed T6831: May chose a signing key from a not inserted card over an inserted one as Resolved.
Fixed in 2.4.4. Feel free to re-open if you still see problems.
• werner moved T6741: gpg 2.3+ may display garbled characters for date and time in non-English Windows from QA to gnupg-2.4.4 on the gnupg24 board.
• werner closed T6741: gpg 2.3+ may display garbled characters for date and time in non-English Windows as Resolved.
No regression, assuming things work.
• werner moved T6944: The default card key generation keeps an unprotected backup of the encryption key on disk from WiP to gnupg-2.2.43 on the gnupg22 board.
• werner moved T6944: The default card key generation keeps an unprotected backup of the encryption key on disk from QA to gnupg-2.4.4 on the gnupg24 board.
• werner added a comment to T6944: The default card key generation keeps an unprotected backup of the encryption key on disk.
Fixed in 2.4.4 and 2.2.43 - see above for affected versions.
Closing because we believe things are fixed and our test suite confirms that. Feel free to -reopen in case your own file does not import with 2.4.4.
Jan 24 2024, 11:42 AM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Bug Report, S/MIME, Restricted Project
• werner moved T6536: Extend P12 parser for ShroudedKeyBag inside a CertBag from QA to gnupg-2.4.4 on the gnupg24 board.
Jan 24 2024, 11:41 AM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Bug Report, S/MIME, Restricted Project
• werner moved T6752: New minip12 does not import from Firefox anymore from QA to gnupg-2.4.4 on the gnupg24 board.
The test file is now part of our test suite and passes.
• werner moved T6757: gpgsm 2.4 Fails to import P12 certificate/key from QA to gnupg-2.4.4 on the gnupg24 board.
We meanwhile have a lot of test cases in our test suite and we see no issue. Closing this bug; feel free to re-open if it is not fixed for your case in 2.4.4.
• werner closed T6757: gpgsm 2.4 Fails to import P12 certificate/key, a subtask of T6752: New minip12 does not import from Firefox anymore, as Resolved.
I did a couple of test on the command line which should be sufficient.
• werner moved T6942: Differing fingerprint length with curve 448 from QA to gnupg-2.4.4 on the gnupg24 board.
• werner moved T6942: Differing fingerprint length with curve 448 from WiP to QA on the gnupg24 board.
• werner moved T6944: The default card key generation keeps an unprotected backup of the encryption key on disk from Backlog to WiP on the gnupg22 board.
• werner added a project to T6944: The default card key generation keeps an unprotected backup of the encryption key on disk: gnupg22.
We need to fix 2.2.42 too. This because we backported the responsible patch.
Jan 23 2024
Jan 23 2024
• ebo moved T4704: Wrong error message when key is expired from QA to gnupg-2.4.4 on the gnupg24 board.
In Gpg4win-4.3.0-beta571 with GnuPG 2.4.4-beta132
>echo test | gpg --sign --default-key F8D51DE0EE16E9B57009B8DE458612006D8E6F0D gpg: Warning: not using 'F8D51DE0EE16E9B57009B8DE458612006D8E6F0D' as default key: Key expired gpg: all values passed to '--default-key' ignored gpg: no default secret key: Unusable secret key gpg: signing failed: Unusable secret key
juergenhoetzel added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).
In T6481#181779, @gniibe wrote:Arch Linux: https://gitlab.archlinux.org/archlinux/packaging/packages/gnupg
FreeBSD: https://cgit.freebsd.org/ports/tree/security/gnupgI don't see the patch is applied. Please wait for GnuPG release 2.4.4.
• TobiasFella moved T6930: pinentry-qt window is not parented to Kleopatra on Wayland from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ikloecker added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).
Indeed, openSUSE has applied the patch: https://build.opensuse.org/package/show/openSUSE%3AFactory/gpg2
• gniibe added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).
Jan 22 2024
Jan 22 2024
• ikloecker added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).
Works as expected on openSUSE Tumbleweed with gpg2-2.4.3-4.2.x86_64:
$ gpg2 --version gpg (GnuPG) 2.4.3 libgcrypt 1.10.3 [...]
juergenhoetzel added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).
In T6481#181724, @gniibe wrote:i still observe the same behavior:
What do you mean? I can't replicate the behavior described by you, using the GnuPG from the repo, or the one of Debian 2.4.3-2.
• werner changed the status of T6944: The default card key generation keeps an unprotected backup of the encryption key on disk from Open to Testing.
• gniibe added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).
i still observe the same behavior:
Thank you for the report.
Jan 21 2024
Jan 21 2024
juergenhoetzel added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).
In T6481#171399, @gniibe wrote:
- It is also possible for GnuPG to keep the behavior of 2.4.0, so that it doesn't confuse EasyPG.
- This is a possible solution #2: change in master: rG2f872fa68c65: gpg: Report BEGIN_* status before examining the input.
- But... it is difficult for implementation of GnuPG to guarantee this kind of behavior.
For a while, distributions can apply rG2f872fa68c65 for 2.4 series.
Jan 20 2024
Jan 20 2024
Jan 19 2024
Jan 19 2024
andreisrr added a comment to T6950: Kleopatra: Usability improvements for directory services configuration.
Why the limitation to a single OpenPGP keyserver?Because otherwise the UI will get confusing if you get the same key
e.g. from multiple keyservers And it is AFAIK a limitation of GnuPG.
We could use a keyserver with a DNS entry again which randomly selects
a keyserver? To avoid always using the same one.
Actually, when having multiple keyservers, the following would work: