It works in 2.4.4 if you add
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Feb 14 2024
Feb 13 2024
So I cherry-picked this onto 2.4.4 and I ended up with a failing build due to failed tests (it built fine without the patch)
Feb 10 2024
We check the actual used signature and the corresponding (sub)key. Whether you trust this key is a different thing and we are not able to check that. Note that the same subkey may be used with different primary keys. The whole point of gpgv is to that you pass a list of trusted keys - actually this makes this new option superfluous but in gpg it makes sense. It was easy to add it to gpgv, though.
Feb 8 2024
Checking if the file already exists doesn't help. In fact, typically the file (containing the shadow key for the card key) will already exist. But one could check if there is already a private key with this keygrip. Then restoring could be refused, so that the worst that can happen is that the shadow key (which can be recovered from the smart card) is overwritten with a corrupt file.
I think the attack ingo talks about would mostly be covered by checking if the file already exists before moving it into the private directory.
Feb 5 2024
Do note there could be subkeys as well.
Feb 4 2024
I recently stumbled upon this as well.
Jan 29 2024
Setting a date on the command line is in UTC, displayed in Kleopatra is the corresponding local date which might therefore be one day of. This is as intended and the same for dates before or after the Y2038 cut off.
-> Works with Gpg4win-4.3.0
Jan 26 2024
Oh, well it does happen only with --status-fd=2 because of a c+p error by me. For status-fd > 2, as used by GPGME, there is no problem, because this is handled by an exception list.
Fixed in 2.4.4.
Jan 25 2024
Jan 24 2024
Hidden for Gpg4win-4.3.0-beta571, too
The state of the brain is:
These gpgsk files are standard private-keys-v1 files with an additional Backup-info line showing for example the keygrip.
There are no certificates in the file, thus we can either use gpg or gpgsm as driver.
No test environment in our QA dept.
Fixed in 2.4.4. Feel free to re-open if you still see problems.
No regression, assuming things work.
Hard to test without instrumenting the code.
Tested during development.
Tested for 2.4
@alexk and me tested this. The core functionality works.
Fixed in 2.4.4 and 2.2.43 - see above for affected versions.
Works for the two sample RSA cards. Ticket may eventually be re-opened if we run into problems with ECC cards.
The test file is now part of our test suite and passes.
We meanwhile have a lot of test cases in our test suite and we see no issue. Closing this bug; feel free to re-open if it is not fixed for your case in 2.4.4.
We need to fix 2.2.42 too. This because we backported the responsible patch.
Jan 23 2024
In Gpg4win-4.3.0-beta571 with GnuPG 2.4.4-beta132
>echo test | gpg --sign --default-key F8D51DE0EE16E9B57009B8DE458612006D8E6F0D gpg: Warning: not using 'F8D51DE0EE16E9B57009B8DE458612006D8E6F0D' as default key: Key expired gpg: all values passed to '--default-key' ignored gpg: no default secret key: Unusable secret key gpg: signing failed: Unusable secret key
It is already implemented and will soon show up in 2.4.4 -)
Jan 22 2024
Jan 19 2024
- To configure a keyserver none I have now T6950: Kleopatra: Usability improvements for directory services configuration
- For tarball naming I created T6952: Gpg4win build system: Include commit hash in tarballs from gen-tarball.sh
- For the about dialog I have T6953: Kleopatra: show commit id in about dialog
In T6946#181608, @werner wrote:The min-rsa option was introduced due because the de-vs compliance allowed 2048 bit until the end of 2023 and we used a trick in our configuration file to switch that relaxed handling off with this year. I don't think that the --ciompliance option is really useful becuase it would also disallow ed25519.
A better option would be an --assert-algo option similar to the --assert-signer which we already have in gpg.
I noticed the Debian bug and was about to answer but a feature request is also a good thing.
In T6708#181592, @werner wrote:I would also suggest that we show the git last git commit in Kleo's About dialog. That makes it far easier to see what we are testing. The Kleo version numbers are a bit arbitrary.
I would also suggest that we show the git last git commit in Kleo's About dialog. That makes it far easier to see what we are testing. The Kleo version numbers are a bit arbitrary.
Sorry, it was my fault building the test installer.
To be clear: This ticket is only about GnuPG (more precisely dirmngr) and the changes are included in VSD and Gpg4win.
Jan 18 2024
Hi, ebo I would still think this is resolved. Because it was never meant that the user manually enters the value of "none" because there is no hint for the user that "none" is a reserved word. It should either be administratively configured which does not make much sense for Gpg4win or provided by the distribution. If left empty the default of GnuPG should be used. If we really want users to deactivate keyserver access by using "none" in the dirmngr.conf a much better solution would be a checkbox for this. In that case I would open a new issue.
The fix was not included in the Testbuid...
Does not work in Gpg4win-4.2.1-beta178
works in Gpg4win-4.2.1-beta178
Note to self: need to check with "to the second" expiry time, in case this only occurs with summertime
works in Gpg4win-4.2.1-beta178
We tested with Kleopatra:
- Only gpg4win 4.2 is affected (the current version) but 4.1 is not affected.
- No vsd version is affected.
FWIW, I am already working on this.
Currently, there is no support for gpg-agent to keep private key not on disk, but only on memory of gpg-agent. Given the situation,
I think that it is good to:
Jan 17 2024
Example output:
Jan 16 2024
Tested with 2.4.4 beta and the problem shows only up with the parameter file but not when using --expert-full-gen-key or --quick-gen-key. The problem seems to be that the v5 flag is not enforced when using the parameter file. Thus the key is created as v4 key despite that we want to use v5 for the new x448 keys. It is not a severe bug becuase the key will work anyway using software supporting X448. Will of course be fixed for 2.4.4.
Interesting. I need to look closer at it. I scheduled it for 2.4 but it won't be in the forthcoming 2.4.4. There are still other interesting things on the short list (e.g. timestamping support) but we may do that only in 2.6.
Thanks for the report. It comes right in time for the next release. It might already be fixed due to a lot of changes in the pkcs#12 parser.
Thanks for the report. This is the fun with different code pathes. Obviously the v5 fingerprint needs to be used for the pre-made revocation.
Jan 15 2024
Jan 12 2024
Now you can untar and run
Jan 11 2024
The extra option --debug-allow-pin-logging was implemented with commit rGe43bd2a7a78.
Better don't remove your entire ~/.gnupg - removing the *.lock files after gpgconf -K all is sufficient.
Jan 9 2024
This is due to the changed format of the VERSION file.
Jan 5 2024
thats great news! I will test the keyword with Archlinux's Builds System (and Fakeroot) as soon as possible!