In T2169#196673, @werner wrote:Shall we handle this with additional retry prompts, w/o a timeout? I think this makes sense because creating keys with a backup file and a passphrase is a manual task anyway.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Jan 8 2025
Jan 8 2025
m.eik added a comment to T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected.
• werner edited projects for T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected, added: gnupg26, gnupg24; removed gnupg.
There is a regression due to the regression fix in rGb30c15bf7c5336c4abb1f9dcd974cd77ba6c61a7 (from Dec 24 2015) or some related commits:
Dec 6 2024
Dec 6 2024
Dec 5 2024
Dec 5 2024
Dec 2 2024
Dec 2 2024
• gniibe closed T5931: OpenSSH 8.9, 9.0, and 9.1 can't authenticate with gpg-agent and usb token (Gnuk >= 1.2.16 is required) as Resolved.
Closed, since this was documentation for the workaround, four years ago.
• werner added a comment to T5931: OpenSSH 8.9, 9.0, and 9.1 can't authenticate with gpg-agent and usb token (Gnuk >= 1.2.16 is required).
Just a reminder: with Gnuk 1.2.15 and an ed25519 key PubkeyAuthentication unbound is required for hosts using the new feature.
Nov 29 2024
Nov 29 2024
• gniibe closed T7160: scd: pipe server shutdown, a subtask of T7151: graceful shutdown: DEVINFO should be a gpg-agent command: also watching input close, as Resolved.
Fixed in 2.5.0 and 2.4.6.
• gniibe closed T7151: graceful shutdown: DEVINFO should be a gpg-agent command: also watching input close as Resolved.
Fixed in 2.4.6.
Nov 5 2024
Nov 5 2024
Oct 29 2024
Oct 29 2024
• werner moved T7151: graceful shutdown: DEVINFO should be a gpg-agent command: also watching input close from Backlog to QA on the gnupg24 board.
Oct 1 2024
Oct 1 2024
• gniibe changed the status of T7309: gpg should not proceed with the key import from the smartcard if no valid SCD READKEY information is received from Open to Testing.
Fixed in master: rGe7891225788a: gpg: Robust error handling for SCD READKEY.
Sep 30 2024
Sep 30 2024
• werner triaged T7309: gpg should not proceed with the key import from the smartcard if no valid SCD READKEY information is received as Normal priority.
Some would say it is a bug if keys are not shown - even if the algo is not known ;-)
saper renamed T7309: gpg should not proceed with the key import from the smartcard if no valid SCD READKEY information is received from gpg should notice if scdaemon crashes to gpg should not proceed with the key import from the smartcard if no valid SCD READKEY information is received.
saper added a comment to T7309: gpg should not proceed with the key import from the smartcard if no valid SCD READKEY information is received.
scdaemon in this case was a broken experiment of mine (trying to see if I can get SoftHSM to work as the OpenPGP card). So this was not a normal, released scdaemon code.
Sep 28 2024
Sep 28 2024
• werner added a comment to T7309: gpg should not proceed with the key import from the smartcard if no valid SCD READKEY information is received.
Please send an excerpt from the scdaemon debug output to evaluate why you get somewhat strange looking data. Is this an experimental card? 0xa5 is a common test pattern.
Sep 27 2024
Sep 27 2024
It is reproducible bug even with master branch.
Sep 26 2024
Sep 26 2024
I have a look at the log file of gpg-agent.log. I can see that six PKDECRYPT requests are handled simultaneously. I think that it's out of secure memory to decrypt the private key which results pinentry request.
Sep 20 2024
Sep 20 2024
• gniibe added a comment to T7151: graceful shutdown: DEVINFO should be a gpg-agent command: also watching input close.
Found another thinko; When there is no clients with DEVINFO --watch, the pipe to be notified is not consumed at all (no read). It eventually results blocked by write(2), when the pipe is filled.
Sep 19 2024
Sep 19 2024
• werner added a comment to T7151: graceful shutdown: DEVINFO should be a gpg-agent command: also watching input close.
I see. the systemd race of having two gpg-agent processes. The second gpg-agent should eventually go away but than it is already too late.
• gniibe added a comment to T7151: graceful shutdown: DEVINFO should be a gpg-agent command: also watching input close.
I mean: two gpg-agent requests simultaneously running DEVINFO --watch.
Single scdaemon, two threads handling DEVINFO --watch simultaneously, by pselect + read.
Two threads waken up, but it was only one thread which can read(2), another was blocked (before the fix).
Sep 18 2024
Sep 18 2024
• werner added a comment to T7151: graceful shutdown: DEVINFO should be a gpg-agent command: also watching input close.
You mean it is possible that the initialization function is called by several threads - or that two scdaemon's are running before they realize that one of them is in the way?
• gniibe added a comment to T7151: graceful shutdown: DEVINFO should be a gpg-agent command: also watching input close.
I realized that I put a bug on POSIX; When multiple clients do DEVINFO --watch, it is possible for scdaemon to hang (waiting pselect and read, read by one, read by another is blocked).
Sep 4 2024
Sep 4 2024
• gniibe changed the status of T7283: Odd "gpg: KEYTOCARD failed: Invalid time" error when using `--pinentry-mode=loopback` from Open to Testing.
Sep 3 2024
Sep 3 2024
rubensayshi added a comment to T7283: Odd "gpg: KEYTOCARD failed: Invalid time" error when using `--pinentry-mode=loopback`.
In T7283#190941, @gniibe wrote:I can replicate the problem.
The cause of this is that when it's comes with loopback mode, gpg-agent inquires back to the frontend and the buffer overwritten, which results parsing the line wrong.
I'm going to fix.
rubensayshi added a comment to T7283: Odd "gpg: KEYTOCARD failed: Invalid time" error when using `--pinentry-mode=loopback`.
In T7283#190901, @werner wrote:y38k problems with some frontends are known for some 32 bit platforms.
Please write a proper bug report and don't expect us to read a reddit thread.
• werner edited projects for T7283: Odd "gpg: KEYTOCARD failed: Invalid time" error when using `--pinentry-mode=loopback`, added: gpgagent; removed Info Needed.
Aug 13 2024
Aug 13 2024
• ebo moved T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)) from QA to gnupg-2.2.43 on the gnupg22 board.
Jul 1 2024
Jul 1 2024
• gniibe changed the status of T7151: graceful shutdown: DEVINFO should be a gpg-agent command: also watching input close from Open to Testing.
• gniibe changed the status of T7160: scd: pipe server shutdown, a subtask of T7151: graceful shutdown: DEVINFO should be a gpg-agent command: also watching input close, from Open to Testing.
Jun 27 2024
Jun 27 2024
• gniibe added a comment to T7151: graceful shutdown: DEVINFO should be a gpg-agent command: also watching input close.
Asking a change of gpgme would need more time... So, I decided to change gpg-agent side.
gpg-agent part was done in: rGb3f1f2cd192b: agent: Handle SCD DEVINFO --watch command in a special way.
Jun 25 2024
Jun 25 2024
• gniibe added a comment to T7151: graceful shutdown: DEVINFO should be a gpg-agent command: also watching input close.
scdaemon part was done in: rG36d8cffc6cd2: scd: Finish DEVINFO --watch command on input close.
Jun 24 2024
Jun 24 2024
• werner added a comment to T7151: graceful shutdown: DEVINFO should be a gpg-agent command: also watching input close.
Maybe we can support this directly in gpgme's assuan API.
• gniibe added a comment to T7151: graceful shutdown: DEVINFO should be a gpg-agent command: also watching input close.
Did some experiment and I concluded (for now) that new command for gpg-agent would not be needed.
Instead, it might be better doing following in GPGME.
Jun 17 2024
Jun 17 2024
May 13 2024
May 13 2024
perrin4869 added a comment to T4588: gpg-agent should guess pinentry's full path (using $PATH) if `pinentry-program` does not supply a full path.
I'd also be interested in expanding tilde expressions for dotfiles portability, since I don't use the same username in all my machines
Apr 24 2024
Apr 24 2024
• werner moved T6682: agent: agent_kick_the_loop function to unblock the select(2) from Backlog to QA on the gnupg26 board.
• werner moved T6692: agent: Clean up check_own_socket to monitor socket takeover from Backlog to QA on the gnupg26 board.
• werner moved T6693: agent: Have a thread monitoring parent PID and homedir from Backlog to QA on the gnupg26 board.
• werner moved T7014: agent: Enhancement of PKDECRYPT for KEM interface from Backlog to WIP on the gnupg26 board.
Apr 22 2024
Apr 22 2024
Apr 16 2024
Apr 16 2024
matheusmoreira added a comment to T5783: All s2k hardenings silently ignored when exporting private keys.
What is the current status of this issue?
Apr 15 2024
Apr 15 2024
• gniibe changed the status of T7014: agent: Enhancement of PKDECRYPT for KEM interface from Open to Testing.
Apr 11 2024
Apr 11 2024
I had wrong interpretation about symmetric cipher algorithm identifier in the draft. It specifies symmetric cipher for the following Symmetrically Encrypted Data Packet (I was wrongly interpret as if it were specifying algo for AES keywrap).
Apr 10 2024
Apr 10 2024
I merged the change by Werner to get the value from frontend.
Apr 9 2024
Apr 9 2024
In the current code, just for testing against the test vector in m https://datatracker.ietf.org/doc/html/draft-ietf-openpgp-pqc-02, there are specific value in the key combiner KDF.
Namely, the value 105 for fixedInfo is defined in the draft (and it will be changed).
Apr 5 2024
Apr 5 2024
I created a pubkey (actually a subkey) for your above test keys:
DE1AB-pubkey.asc2 KBDownload
I use this for testing:
encrypted-sexp.txt2 KBDownload
Mar 25 2024
Mar 25 2024
On March 11 and 18, the private key file DE1AB1D22899CEC7DBB1A7863F34E6E92BFB7756.key was wrong.
I updated on March 25. Now, the endian is GnuPG (d is big endian).
Mar 23 2024
Mar 23 2024
thesamesam added a comment to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)).
Thanks, that patch works for me.
Mar 18 2024
Mar 18 2024
• werner moved T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)) from Backlog to QA on the gnupg22 board.
I extracted data from https://datatracker.ietf.org/doc/html/draft-ietf-openpgp-pqc-02 and compose x25519 key and MLKEM768 key. Here they are.
x25519 :
DE1AB1D22899CEC7DBB1A7863F34E6E92BFB7756.key205 BDownload
MLKEM768 :
1C4D98ABD3BD87C0C505A9FE97BB766EAB38B87F.key7 KBDownload
Mar 7 2024
Mar 7 2024
As a first experiment, let us use CIPHERTEXT in the format of (enc-val(ecdh(s%m)(e%m)(k%m))) (s: encrypted-session-key, e: ecc ephemeral key, k: kyber ephemeral key).
Mar 1 2024
Mar 1 2024
• werner added a comment to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)).
In 2.4 we have rG1383aa475 which does
• gniibe changed the status of T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)) from Open to Testing.
• gniibe added a comment to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)).
Pushed the change in: rGf50c543326c2: agent: Allow simple KEYINFO command when restricted.
Feb 29 2024
Feb 29 2024
thesamesam added a comment to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)).
No, thank you both for the speedy responses :)
• gniibe renamed T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)) from gpgme-1.23.2 test failure (t-json) to 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)).
• gniibe triaged T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)) as High priority.
• gniibe added projects to T7003: 2.2 gpg-agent doesn't allow KEYINFO when restricted (was: gpgme-1.23.2 test failure (t-json)): gnupg22, gpgagent.
Thanks a lot for your quick testing.
The commit rGff42ed0d69bb: gpg: Enhance agent_probe_secret_key to return bigger value. of GnuPG 2.2 introduced this bug.
Feb 26 2024
Feb 26 2024
• werner added a parent task for T7014: agent: Enhancement of PKDECRYPT for KEM interface: T6815: PQC encryption for GnuPG.
Jan 26 2024
Jan 26 2024
• gniibe added projects to T6682: agent: agent_kick_the_loop function to unblock the select(2): gnupg26, gpgagent, keyboxd.
• gniibe added projects to T6692: agent: Clean up check_own_socket to monitor socket takeover: gnupg26, keyboxd.
• gniibe added projects to T6693: agent: Have a thread monitoring parent PID and homedir: gnupg26, gpgagent, keyboxd.
Dec 21 2023
Dec 21 2023
I see the reason.
Dec 19 2023
Dec 19 2023
FWIW: These days a thread on Linux is not that costly but nevertheless takes up resources. On other Unices (and WindowsCE) threads have quite some overhead and that was the reason I implemented it the way it was.
Nov 20 2023
Nov 20 2023
• ebo moved T6789: MSI: Update does not seem to be able to kill gpg-agent anymore from QA to vsd-3.2.0 on the vsd32 board.
works, VS-Desktop-3.1.90.287-Beta
• aheinecke moved T6789: MSI: Update does not seem to be able to kill gpg-agent anymore from WiP to QA on the vsd32 board.
Nov 15 2023
Nov 15 2023
• aheinecke changed the status of T6789: MSI: Update does not seem to be able to kill gpg-agent anymore from Open to Testing.
So the actual killing is now done with c5617e9f2426549cba54cb52f9faf9325f8e2929 we are using custom actions instead of CloseApplication to have more fine grained control when the steps are run. CloseApplication would only run in the main install sequence so basically only the Deferred part, but during an interactive upgrade like what one of our Entry users would do it would not avoid the first failure to kill a running gpg-agent this already would break the RestartManager support.
FWIW, the Fileversion is actually the Git revision in decimal
• aheinecke added a comment to T6789: MSI: Update does not seem to be able to kill gpg-agent anymore.
b) Is explained by the following documentation from: https://wixtoolset.org/docs/v3/howtos/updates/major_upgrade/
• aheinecke added a comment to T6789: MSI: Update does not seem to be able to kill gpg-agent anymore.
a) So with my current test upgrading from one beta to another it actually looks in the manifest and if you look there the beta230 of gnupg:
• aheinecke added a comment to T6789: MSI: Update does not seem to be able to kill gpg-agent anymore.
So with verbose logging /l*v inst.log (note the v) I finally saw the issue. My killing code works just fine.
Nov 14 2023
Nov 14 2023
• aheinecke moved T6789: MSI: Update does not seem to be able to kill gpg-agent anymore from Backlog to WiP on the vsd32 board.
Nov 12 2023
Nov 12 2023
• aheinecke added a comment to T6789: MSI: Update does not seem to be able to kill gpg-agent anymore.
Ok closeapplication will not work because:
Nov 10 2023
Nov 10 2023
• aheinecke added a comment to T6789: MSI: Update does not seem to be able to kill gpg-agent anymore.
Note to self.
• aheinecke added a project to T6789: MSI: Update does not seem to be able to kill gpg-agent anymore: vsd32.
So some research led me to believe that using taskkill from MSI is not uncommon. But most stackoverflow solutions did not work for me. I have one solution that works, though but that opens a terminal window for each process we try to kill. I don't want to use wscript to avoid that, since an installer that executes visual basic is IMO even more evil then an installer that executes taskkill. Both are not really the MSI way, but while we could fix our processes without a WindowMessage loop to die nicely this will not work for an upgrade to vsd32.
Nov 3 2023
Nov 3 2023
• aheinecke added a comment to T6789: MSI: Update does not seem to be able to kill gpg-agent anymore.
So I tested upgrading from 3.1.26.0 to the current beta and it also did not work.
• aheinecke moved T6789: MSI: Update does not seem to be able to kill gpg-agent anymore from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• aheinecke triaged T6789: MSI: Update does not seem to be able to kill gpg-agent anymore as High priority.
Oct 25 2023
Oct 25 2023
• werner moved T3056: gpgme-1.8.0: test failures on NetBSD from QA for next release to gpgme 1.23.x on the gpgme board.
Oct 16 2023
Oct 16 2023
Oct 10 2023
Oct 10 2023
Aug 30 2023
Aug 30 2023
• gniibe changed the status of T6682: agent: agent_kick_the_loop function to unblock the select(2), a subtask of T6692: agent: Clean up check_own_socket to monitor socket takeover, from Open to Testing.
• gniibe changed the status of T6692: agent: Clean up check_own_socket to monitor socket takeover from Open to Testing.
Push the code by rG95186ae92f92: agent: Use a thread to monitor socket takeover.
