Page MenuHome GnuPG
Feed Advanced Search

Sep 30 2015

dkg added projects to T2116: add option to export transferable public key with only latest signatures from some specific key: Feature Request, gnupg.
Sep 30 2015, 10:16 AM · gnupg, Feature Request

Sep 17 2015

dkg added projects to T2104: when dealing with --try-all-secrets, try non-expired keys first: gnupg, Bug Report.
Sep 17 2015, 5:47 AM · Bug Report, gnupg
dkg set Version to 2.1.8 on T2104: when dealing with --try-all-secrets, try non-expired keys first.
Sep 17 2015, 5:47 AM · Bug Report, gnupg

Sep 14 2015

dkg added a comment to T2075: gpg-agent comments in sshcontrol for do not match ssh.

With recent versions of OpenSSH, the default fingerprint shown is uses SHA256.
The fingerprints emitted in sshcontrol are MD5. You can get ssh-keygen -l to
produce comparable MD5 fingerprints with "-E md5".

Perhaps the generated sshcontrol should also include the base64-encoded SHA256
fingerprints as well, though?

That still doesn't explain why ecdsa 384 keys are mis-fingerprinted, though.

Sep 14 2015, 4:27 PM · Bug Report, ssh, gnupg
dkg added a comment to T2075: gpg-agent comments in sshcontrol for do not match ssh.

This is still a problem with 2.1.8

Sep 14 2015, 4:23 PM · Bug Report, ssh, gnupg
dkg changed Version from 2.1.7 to 2.1.8 on T2075: gpg-agent comments in sshcontrol for do not match ssh.
Sep 14 2015, 4:23 PM · Bug Report, gnupg, ssh

Aug 31 2015

dkg added a comment to T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer".

can you explain why the limit is useful? e.g. does it increase efficiency in
some metric? defend against certain classes of attack? something else? sorry
that i don't understand the tradeoff fully.

a runtime configuration would be better than a hard fail, but in either case it
seems like we're asking the user to fiddle with things that they shouldn't have
to think about or understand. is there a way that we can automatically detect
the reason for the failure and make things Just Work for normal users without
opening up the tooling to more problems?

Aug 31 2015, 12:42 AM · gnupg, gnupg (gpg21), Debian, Bug Report

Aug 27 2015

dkg added a comment to T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer".

with 2.1.7, i see no hang, but i do see failure with certain large certificates,
like 0xB27B944E34884E85:

0 dkg@alice:~$ gpg2 --send 0xB27B944E34884E85
gpg: sending key 0xB27B944E34884E85 to hkps server hkps.pool.sks-keyservers.net
gpg: keyserver send failed: Too much data for IPC layer
gpg: keyserver send failed: Too much data for IPC layer
2 dkg@alice:~$

maybe the boundary is 500KiB? I don't have this problem with my own OpenPGP cert:

0 dkg@alice:~$ gpg2 --export 0EE5BE979282D80B9F7540F1CCD2ED94D21739E9 | wc

3126   11384  481051

0 dkg@alice:~$ gpg2 --export 0xB27B944E34884E85 | wc

4310   13779  541937

0 dkg@alice:~$

Aug 27 2015, 3:03 PM · gnupg, gnupg (gpg21), Debian, Bug Report

Aug 16 2015

dkg added projects to T2075: gpg-agent comments in sshcontrol for do not match ssh: gnupg, Bug Report.
Aug 16 2015, 1:09 AM · Bug Report, gnupg, ssh
dkg set Version to 2.1.7 on T2075: gpg-agent comments in sshcontrol for do not match ssh.
Aug 16 2015, 1:09 AM · Bug Report, gnupg, ssh

Aug 12 2015

dkg added a comment to T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8.

hm, common/utf8conv.c says this:

  /* Note that we silently assume that plain ASCII is actually meant
     as Latin-1.  This makes sense because many Unix system don't have
     their locale set up properly and thus would get annoying error
     messages and we have to handle all the "bug" reports. Latin-1 has
     always been the character set used for 8 bit characters on Unix
     systems. */

I wonder if this is still the best choice. In my experience, far more machines
have text in some UTF-8 encoding today than in Latin-1. this is especially true
for systems that deal with OpenPGP User IDs, where UTF-8 is the canonical
representation.

If the user's environment claims that it's plain ASCII and we're seeing 8-bit
characters, gpg does have to make a decision about what to do. i see four options:

a) report an error and fail.

b) pretend that the 8-bit characters are Latin-1 (this is "OK" because any
bytestring is a valid Latin-1 string)

c) pretend that the 8-bit characters are UTF-8

d) do some sort of autodetection on the bytestring (e.g. if it is a valid UTF-8
byte sequence then treat as UTF-8, otherwise treat as Latin-1)

option (a) is annoying and likely a cause of spurious complaints, as the comment
notes. GnuPG is currently going with option (b). Option (c) seems more
reasonable to me because of OpenPGP's relationship with UTF-8, but introduces
some error cases (what do we do where the bytestring is not valid UTF-8?).
Option (d) avoids error cases but might be a bit more delicate to implement.

What do you think?

Aug 12 2015, 7:46 PM · gnupg, Bug Report, Debian
dkg added a comment to T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8.

I think werner means --utf8-strings instead of --utf-strings.

Aug 12 2015, 4:24 PM · gnupg, Bug Report, Debian
dkg set Version to 2.1.7 on T2068: avoid linking libksba into gpg and gpgv.
Aug 12 2015, 4:12 PM · Bug Report, gnupg
dkg added projects to T2068: avoid linking libksba into gpg and gpgv: gnupg, Bug Report.
Aug 12 2015, 4:12 PM · Bug Report, gnupg
dkg added a comment to T1961: pinentry-qt4 needs -std=c++11 to compile with gcc-5.1.

D295: 667_0002-enforce-std-gnu-11-to-avoid-breakage-with-gcc5.patch

Aug 12 2015, 4:10 PM · Bug Report, pinentry
dkg added a comment to T1961: pinentry-qt4 needs -std=c++11 to compile with gcc-5.1.

the attached patch is a minimal patch to make older versions of pinentry-qt4
build cleanly with newer gcc.

Aug 12 2015, 4:10 PM · Bug Report, pinentry
dkg reopened T1211: gpg-agent should disable ptrace as "Open".
Aug 12 2015, 3:53 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
dkg added a comment to T1211: gpg-agent should disable ptrace.

so far, the proposed mechanisms for getting at gpg-agent's memory from a peer
process running as the same user are:

a) ptrace (e.g. via /usr/bin/gcore or /usr/bin/strace)
b) /proc/$PID/mem, which is owned by the user and mode 0600

DarkStarSword's patch effectively closes (a) (by rejecting ptrace connections)
and appears on my GNU/Linux system to close (b) as well: /proc/$PID/mem is
root-owned when the patch is applied instead of being user-owned.

Are there other channels for per-process memory access that we should be
thinking about?

I agree with Werner and Neal that the UNIX model is probably insufficient to
close all the holes easily, but i also don't think that's a good reason to avoid
closing those holes we can close.

If there are other ways that another process by the same user can get at the
RAM, please point them out and i'll look into ways to address them too.

In the meantime, i'll also look into ways to facilitate running the process as a
separate user account entirely.

Aug 12 2015, 3:53 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
dkg set Version to 1.4.19,2.1.7 on T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8.
Aug 12 2015, 3:35 AM · gnupg, Bug Report, Debian
dkg added projects to T2067: gpg2 cannot find keys by non-ASCII User IDs unless the system locale is UTF-8: Debian, Bug Report.
Aug 12 2015, 3:35 AM · gnupg, Bug Report, Debian
dkg added a comment to T1211: gpg-agent should disable ptrace.

D128: 666_0003-Avoid-simple-memory-dumps-via-ptrace.patch

Aug 12 2015, 2:55 AM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
dkg added a comment to T1211: gpg-agent should disable ptrace.

I'm going to introduce the prctl(SET_DUMPABLE, 0) change to main in
agent/gpg-agent.c in the debian 2.1.x series as of 2.1.7-1, using the patch i'm
attaching here.

I make no representations that this solves all possible memory leakages, but it
does address one specific and relatively straightforward attack.

As to Werner's legitimate concerns about making debugging harder, there remain
at least two options: ptrace as the superuser, and launching gpg-agent itself
under gdb directly.

If this experiment proves disastrous somehow (i'm not seeing how), we can always
revert the patch.

Aug 12 2015, 2:55 AM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug

Aug 5 2015

dkg added a comment to T1211: gpg-agent should disable ptrace.

I agree with you that the standard UNIX model is generally insufficient here.

Perhaps the distros could weigh in with mechanisms to facilitate
secondary-account creation for agents and the like. I've opened
https://bugs.debian.org/794667 about this.

However, i don't think the weak UNIX permissions model is a reason to avoid a
small piece of code like that offered by DarkStarSword below. Closing off one
avenue of attack is still worthwhile, even if other avenues remain. As werner
said, gpg-agent won't create a coredump (even though other avenues of attack are
possible).

Is there something about the complexity of prctl(PR_SET_DUMPABLE, 0); that makes
it undesirable?

Aug 5 2015, 4:28 PM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug

Aug 4 2015

dkg added a comment to T1211: gpg-agent should disable ptrace.

fwiw, i'd be fine with enabling protection against ptrace for gpg-agent, even if
that doesn't fix all the other ways a process can be attacked from another process.

if there are multiple holes, we should plug the ones we can plug, to increase
the pressure to make the other ones fixable.

Aug 4 2015, 12:59 AM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
dkg reopened T1211: gpg-agent should disable ptrace as "Open".
Aug 4 2015, 12:59 AM · Won't Fix, Feature Request, gnupg, gpgagent, Not A Bug
dkg set Version to 2.1.6 on T2064: please allow unattended secret key deletion.
Aug 4 2015, 12:36 AM · gnupg, Feature Request
dkg added projects to T2064: please allow unattended secret key deletion: Feature Request, gnupg.
Aug 4 2015, 12:36 AM · gnupg, Feature Request

Jul 8 2015

dkg added a comment to T2034: pinentry emacs features need documentation.

If pinentry-emacs doesn't need to be distributed, why do we even have it as a
separate target (emacs/pinentry-emacs) that is enabled by default?

my concern about abuse of INSIDE_EMACS is as i said "vague" -- sorry, i hope
it's not FUD! here's a rough sketch:

pinentry is a sensitive program. its job is to protect sensitive data (secret
key material, passphrases) from unintended use. each hook that we put into
pinentry to allow an attacker to probe its contents, or to execute commands, or
to control the UI/UX of what is presented to the user, is another hook that can
be used to violate the protection we want gpg-agent to afford its users.

Consider an attacker who has access only to the gpg-agent socket, and to one
other socket on the system. If they can convince gpg-agent to talk to them on
that one other socket by setting INSIDE_EMACS during a communication to
gpg-agent, this seems like a risk. furthermore, it's an unnecessary risk for
users who have no intention of interacting with gpg-agent through emacs in this
way. (e.g. users of emacs under X11 sessions may prefer to use a graphical
agent, or users of emacs from a terminal may prefer pinentry-curses). it's not
clear if there's a way to tell gpg-agent at runtime to avoid this additional
communications vector either.

Jul 8 2015, 4:42 PM · Bug Report, pinentry

Jul 7 2015

dkg set Version to 0.9.5 on T2034: pinentry emacs features need documentation.
Jul 7 2015, 9:01 PM · Bug Report, pinentry
dkg added projects to T2034: pinentry emacs features need documentation: pinentry, Bug Report.
Jul 7 2015, 9:01 PM · Bug Report, pinentry

Jul 2 2015

dkg added projects to T2029: gpgsm --gen-key prompts for usage flags, then discards them when generating a CSR: gnupg, Bug Report.
Jul 2 2015, 8:35 PM · Bug Report, gnupg
dkg set Version to 2.1.5 on T2029: gpgsm --gen-key prompts for usage flags, then discards them when generating a CSR.
Jul 2 2015, 8:35 PM · Bug Report, gnupg

Jul 1 2015

dkg added a comment to T2017: consider using $XDG_RUNTIME_DIR for gpg-agent socket communication.

So the implication here is that users who want to use XDG_RUNTIME_DIR can do:

echo '%Assuan%' > ~/.gnupg/S.gpg-agent
echo '${XDG_RUNTIME_DIR}/S.gpg-agent' >> ~/.gnupg/S.gpg-agent

and it will Just Work for those with an NFS homedir?

Even on non-NFS volumes, this has the nice property that gpg-agent's
"check-own-socket" feature should be able to close down the gpg-agent process
when it's no longer needed by an active session.

What would the failure conditions be if that variable isn't actually set,
though? I guess it would be the same as specifying /S.gpg-agent, which should
result in permission denied, which means a failed gpg-agent. Is that right?

Will 1.4.x or 2.0.x respect such a redirection if they find it in the socket
they're trying to talk to, or is this a 2.1.x-only feature?

Jul 1 2015, 8:35 AM · Won't Fix, gnupg, Feature Request
dkg added projects to T2025: gpgv 2.1.x should be able to use a keybox for --keyring arguments: Feature Request, gnupg.
Jul 1 2015, 7:23 AM · gnupg, Feature Request
dkg set Version to 2.1.5 on T2025: gpgv 2.1.x should be able to use a keybox for --keyring arguments.
Jul 1 2015, 7:23 AM · gnupg, Feature Request

Jun 23 2015

dkg added a comment to T2023: pinentry should not prompt for saving in a password manager when secret service is not available.

Looks to me like it just fails silently.

Jun 23 2015, 8:11 PM · Bug Report, pinentry
dkg set Version to 0.9.4 on T2023: pinentry should not prompt for saving in a password manager when secret service is not available.
Jun 23 2015, 7:34 PM · Bug Report, pinentry
dkg added projects to T2023: pinentry should not prompt for saving in a password manager when secret service is not available: pinentry, Bug Report.
Jun 23 2015, 7:34 PM · Bug Report, pinentry
dkg added a comment to T1951: gpg-agent needs an API to verify a passphrase.

We can already do a dummy signature, but it feels sloppy for several reasons:

  • it's not clear exactly what to sign with a dummy signature -- should you sign

static text or a dynamic (random) block?

  • it's not clear what to do with the signatures after creation. It's

concievable that a dummy signature could be abused/misused if the material being
signed turns out to have some other meaning.

  • gpg-agent can be configured to log to an append-only file as a means of

monitoring what signatures have ever been made by a given key. Dummy signatures
introduce spurious signing events that are indistinguishable from real
signatures in this log

  • the creation of arbitrary signatures takes more time than testing passphrase

and returning feedback.

Jun 23 2015, 3:02 PM · gnupg, gpgagent, Feature Request

Jun 22 2015

dkg set Version to 2.0.28, 1.4.19 on T2022: dutch localizations for GnuPG.
Jun 22 2015, 1:56 AM · gnupg, gnupg (gpg20), gnupg (gpg14), i18n, Feature Request
dkg added a project to T2022: dutch localizations for GnuPG: Feature Request.
Jun 22 2015, 1:56 AM · gnupg, gnupg (gpg20), gnupg (gpg14), i18n, Feature Request

Jun 12 2015

dkg added a comment to T1951: gpg-agent needs an API to verify a passphrase.

Hm, you make a good point about this being undesirable in the general case --
access to a normal gpg-agent shouldn't provide an attacker with a way to guess
passwords silently.

However, consider the mailpile case -- where gpg-agent is running on the
webserver, and the login webpage wants to verify a given user based on the
password for the user's secret key (and wants to avoid keeping some extra
/etc/shadow-equivalent file lying around).

Maybe such an application would start gpg-agent in a different/simpler mode? Or
should we recommend that such an application test the provided passphrase in
some other way, without using gpg-agent at all?

Jun 12 2015, 6:34 PM · gnupg, gpgagent, Feature Request

Jun 5 2015

dkg added a comment to T1999: gpg --check-trustdb returns data on stdout when --verbose --verbose is present?.

D306: 630_0001-gpg-Avoid-cluttering-stdout-with-trustdb-info-in-ver-STABLE-1-4.patch

Jun 5 2015, 7:32 PM · gnupg (gpg14), backport, Bug Report, gnupg
dkg added a comment to T1999: gpg --check-trustdb returns data on stdout when --verbose --verbose is present?.

And here is a backport to STABLE-BRANCH-1-4

Jun 5 2015, 7:32 PM · gnupg (gpg14), backport, Bug Report, gnupg
dkg added a comment to T1999: gpg --check-trustdb returns data on stdout when --verbose --verbose is present?.

I think Werner addressed this on 2.1 with:

b03a2647299a6c8764a2574590cbaccdff9e497d

Attached is a backport of this patch to STABLE-BRANCH-2-0.

Jun 5 2015, 7:31 PM · gnupg (gpg14), backport, Bug Report, gnupg
dkg added a comment to T1999: gpg --check-trustdb returns data on stdout when --verbose --verbose is present?.

D307: 629_0001-gpg-Avoid-cluttering-stdout-with-trustdb-info-in-ver.patch

Jun 5 2015, 7:31 PM · gnupg (gpg14), backport, Bug Report, gnupg
dkg added a comment to T1996: pinentry-gtk-2 returns an empty passphrase string if typed passphrase is longer than 32 chars.

ah, right! the other option is to pass mb->size instead of size in the memset call.

We should really synchronize secmem.c between libgcrypt:src/secmem.c,
pinentry:secmem/secmem.c, and gpg-STABLE-BRANCH-1-4:util/secmem.c :/

Jun 5 2015, 5:46 AM · Bug Report, Debian, pinentry
dkg added a comment to T1996: pinentry-gtk-2 returns an empty passphrase string if typed passphrase is longer than 32 chars.

OK, something is definitely wrong with the secmem allocators.

I applied this patch:

diff --git a/secmem/secmem.c b/secmem/secmem.c
index 9a478cf..bf97a2a 100644

  • a/secmem/secmem.c

+++ b/secmem/secmem.c
@@ -381,11 +381,16 @@ secmem_realloc( void *p, size_t newsize )

mb = (MEMBLOCK*)((char*)p - ((size_t) &((MEMBLOCK*)0)->u.aligned.c));
size = mb->size;

+ printf("A: %d\n", mb->size);

    if( newsize < size )
	return p; /* it is easier not to shrink the memory */

+ printf("B: %d\n", mb->size);

a = secmem_malloc( newsize );

+ printf("C: %d\n", mb->size);

memcpy(a, p, size);

+ printf("D: %d\n", mb->size);

memset((char*)a+size, 0, newsize-size);

+ printf("E: %d\n", mb->size);

secmem_free(p);
return a;

}

and ran pinentry-gtk-2 with "getpin" as an input and typed in 32 characters for
the dialog box. at character 16, it printed:

A: 32
B: 32
C: 32
D: 32
E: 32

and at character 32 it printed:

A: 0
B: 0
C: 0
D: 0
E: 0

I'm beginning to suspect that this allocator never worked quite right, and that
1d3583a2562e83496ac515276e9bd63a7f1abbc7 just exposes a flaw in the addressing.

Jun 5 2015, 4:56 AM · Bug Report, Debian, pinentry
dkg assigned T1996: pinentry-gtk-2 returns an empty passphrase string if typed passphrase is longer than 32 chars to neal.
Jun 5 2015, 4:11 AM · Bug Report, Debian, pinentry
dkg updated subscribers of T1996: pinentry-gtk-2 returns an empty passphrase string if typed passphrase is longer than 32 chars.
Jun 5 2015, 4:11 AM · Bug Report, Debian, pinentry
dkg added a comment to T1996: pinentry-gtk-2 returns an empty passphrase string if typed passphrase is longer than 32 chars.

Tracking this down further, it appears to be caused by
1d3583a2562e83496ac515276e9bd63a7f1abbc7.

If i revert that commit, the problem goes away.

This makes me think something is wrong with secmem_realloc or secmem_malloc.

Jun 5 2015, 3:35 AM · Bug Report, Debian, pinentry
dkg added projects to T1996: pinentry-gtk-2 returns an empty passphrase string if typed passphrase is longer than 32 chars: pinentry, Debian, Bug Report.
Jun 5 2015, 2:05 AM · Bug Report, Debian, pinentry
dkg set Version to 0.9.3 on T1996: pinentry-gtk-2 returns an empty passphrase string if typed passphrase is longer than 32 chars.
Jun 5 2015, 2:05 AM · Bug Report, Debian, pinentry

Jun 1 2015

dkg reopened T1981: pinentry-qt4 shows up behind some windows as "Open".
Jun 1 2015, 1:06 AM · Bug Report, pinentry
dkg added a comment to T1981: pinentry-qt4 shows up behind some windows.

thanks, neal. I see this committed as eab03a469d82018e53380f26390594f47bb4c5c8,
with a committer of "us <us@chu.huenfield.org>" -- since huenfield.org is
registered to you, i assume that's you? I'm used to seeing your commits as
coming from "Neal H. Walfield <neal@gnu.org>"

Jun 1 2015, 1:06 AM · Bug Report, pinentry

May 31 2015

dkg updated subscribers of T1981: pinentry-qt4 shows up behind some windows.
May 31 2015, 5:14 AM · Bug Report, pinentry
dkg assigned T1981: pinentry-qt4 shows up behind some windows to neal.
May 31 2015, 5:14 AM · Bug Report, pinentry
dkg added a comment to T1981: pinentry-qt4 shows up behind some windows.

on the debian bug report, Felix Geyer notes:

This issue is still present.
Tested on current Debian unstable [0.9.2-1] with KDE4 and Ubuntu 15.04 with

KDE Plasma 5.

The patch from the Fedora package fixes the problem.

I note that this isn't yet applied upstream as of
55ea554b2020b1e7b0996bd9f7bb38c8af2b03f3 -- maybe this can be considered before
the next release?

(neal, i'm adding you to the "nosy list" here and assigning this ticket to you,
because of all your work on pinentry lately. I hope that's not overstepping any
boundaries! please let me know if you'd rather i didn't do that directly)

May 31 2015, 5:14 AM · Bug Report, pinentry

May 19 2015

dkg added a comment to T1777: pinentry-gtk-2 refuses input when GTK_IM_MODULE=scim.

So what should we do about this? Do we need to keep gtksecentry.* in sync with
upstream's gtkentry somehow?

May 19 2015, 8:22 PM · Bug Report, pinentry

May 14 2015

dkg set Version to 0.9.2 on T1988: pinentry-gtk-2 timeout misbehaves across multiple GETPINs.
May 14 2015, 9:05 PM · Bug Report, pinentry
dkg added projects to T1988: pinentry-gtk-2 timeout misbehaves across multiple GETPINs: pinentry, Bug Report.
May 14 2015, 9:05 PM · Bug Report, pinentry
dkg added a comment to T1777: pinentry-gtk-2 refuses input when GTK_IM_MODULE=scim.

On a debian system, i did:

   apt install --no-install-recommends scim scim-gtk-immodule

Here is a transcript of pinentry being invoked: there is additional scim-related
output:

0 dkg@alice:~$ GTK_IM_MODULE=scim pinentry-gtk-2
OK Your orders please
GETPIN
Loading simple Config module ...
Creating backend ...
Loading socket FrontEnd module ...
Starting SCIM as daemon ...
Loading socket Config module ...
Creating backend ...
Loading x11 FrontEnd module ...
GTK Panel of SCIM 1.4.15

Starting SCIM as daemon ...

at this point, no keyboard entry works in the module at all.

This is https://bugs.debian.org/750521

May 14 2015, 12:01 AM · Bug Report, pinentry

May 13 2015

dkg changed Version from 0.9.1 to 0.9.2 on T1777: pinentry-gtk-2 refuses input when GTK_IM_MODULE=scim.
May 13 2015, 11:58 PM · Bug Report, pinentry
dkg added a comment to T1777: pinentry-gtk-2 refuses input when GTK_IM_MODULE=scim.

pinentry GTK-2 is still failing to accept any keyboard input when invoked with
GTK_IM_MODULE=scim

May 13 2015, 11:58 PM · Bug Report, pinentry
dkg added projects to T1984: pinentry curses fallback mode pegs CPU to 100% if TTY disappears: pinentry, Bug Report.
May 13 2015, 9:00 PM · Bug Report, pinentry
dkg set Version to 0.7.6, 0.9.1 on T1984: pinentry curses fallback mode pegs CPU to 100% if TTY disappears.
May 13 2015, 9:00 PM · Bug Report, pinentry
dkg added a comment to T1984: pinentry curses fallback mode pegs CPU to 100% if TTY disappears.

D303: 609_559936.patch

May 13 2015, 9:00 PM · Bug Report, pinentry
dkg set Version to 0.9.0 on T1836: gpg-agent --no-detach breaks pinentry-curses, pinentry-tty.
May 13 2015, 8:55 PM · Too Old, Info Needed, Bug Report, pinentry
dkg added a comment to T1836: gpg-agent --no-detach breaks pinentry-curses, pinentry-tty.

the reporter noted the same problem in 0.9.0, not just 0.7.6.

still, a re-test with 0.9.2 would be useful

May 13 2015, 8:55 PM · Too Old, Info Needed, Bug Report, pinentry
dkg added projects to T1982: pinentry-qt should fallback to curses if $DISPLAY is set but unavailable: Feature Request, pinentry.
May 13 2015, 8:25 PM · pinentry, Feature Request
dkg added a comment to T1981: pinentry-qt4 shows up behind some windows.

sorry, that should be https://bugs.debian.org/581617 instead.

May 13 2015, 8:11 PM · Bug Report, pinentry
dkg added projects to T1981: pinentry-qt4 shows up behind some windows: pinentry, Bug Report.
May 13 2015, 8:05 PM · Bug Report, pinentry
dkg added a comment to T1981: pinentry-qt4 shows up behind some windows.

D302: 608_0001-Fix-qt4-pinentry-window-created-in-the-background.patch

May 13 2015, 8:05 PM · Bug Report, pinentry

May 11 2015

dkg renamed T1844: dirmngr-client should auto-detect when input is in PEM form from dirmngr-client google.com claims "oops: issuer missing in certificate" to dirmngr-client should auto-detect when input is in PEM form.
May 11 2015, 8:49 PM · Feature Request, gnupg, dirmngr
dkg added a comment to T1844: dirmngr-client should auto-detect when input is in PEM form.

Yes, auto-detection in dirmngr-client would be great, thanks!

May 11 2015, 8:49 PM · Feature Request, gnupg, dirmngr
dkg added a project to T1844: dirmngr-client should auto-detect when input is in PEM form: Feature Request.
May 11 2015, 8:49 PM · Feature Request, gnupg, dirmngr
dkg removed a project from T1844: dirmngr-client should auto-detect when input is in PEM form: Bug Report.
May 11 2015, 8:49 PM · Feature Request, gnupg, dirmngr

May 2 2015

dkg set Version to 2.1.3 on T1967: GnuPG should select a key for signing without trying to use missing subkeys.
May 2 2015, 4:36 AM · gnupg (gpg22), Feature Request
dkg added projects to T1967: GnuPG should select a key for signing without trying to use missing subkeys: gnupg, Bug Report.
May 2 2015, 4:36 AM · gnupg (gpg22), Feature Request

Apr 29 2015

dkg added projects to T1962: gnupg 1.4.x adds unknown ECC subkeys repeatedly.: gnupg, Bug Report.
Apr 29 2015, 7:16 PM · Bug Report, gnupg
dkg set Version to 1.4.19 on T1962: gnupg 1.4.x adds unknown ECC subkeys repeatedly..
Apr 29 2015, 7:16 PM · Bug Report, gnupg

Apr 18 2015

dkg added a project to T1952: gpg 1.4 interactions between --passphrase-fd=0 and --use-agent are confused/confusing: gpgagent.
Apr 18 2015, 11:30 AM · Bug Report, gnupg, gpgagent
dkg added a project to T1951: gpg-agent needs an API to verify a passphrase: gpgagent.
Apr 18 2015, 11:30 AM · gnupg, Feature Request, gpgagent
dkg set Version to 1.4.19 on T1952: gpg 1.4 interactions between --passphrase-fd=0 and --use-agent are confused/confusing.
Apr 18 2015, 11:04 AM · Bug Report, gnupg, gpgagent
dkg added projects to T1952: gpg 1.4 interactions between --passphrase-fd=0 and --use-agent are confused/confusing: gnupg, Bug Report.
Apr 18 2015, 11:04 AM · Bug Report, gnupg, gpgagent
dkg set Version to 2.1 on T1951: gpg-agent needs an API to verify a passphrase.
Apr 18 2015, 10:41 AM · gnupg, Feature Request, gpgagent
dkg added projects to T1951: gpg-agent needs an API to verify a passphrase: Feature Request, gnupg.
Apr 18 2015, 10:41 AM · gnupg, Feature Request, gpgagent

Apr 15 2015

dkg added a comment to T1786: dirmngr ignores honor-http-proxy and http-proxy options.

The original reporter was on 2.1.0.

It looks like I can confirm this on 2.1.3.

Apr 15 2015, 11:10 PM · gnupg, Bug Report, dirmngr
dkg changed Version from 2.1 to 2.1.3 on T1786: dirmngr ignores honor-http-proxy and http-proxy options.
Apr 15 2015, 11:10 PM · gnupg, Bug Report, dirmngr

Apr 14 2015

dkg set Version to 0.9.1 on T1777: pinentry-gtk-2 refuses input when GTK_IM_MODULE=scim.
Apr 14 2015, 3:36 PM · Bug Report, pinentry
dkg added a comment to T1777: pinentry-gtk-2 refuses input when GTK_IM_MODULE=scim.

This is still an issue with pinentry 0.9.1

Apr 14 2015, 3:36 PM · Bug Report, pinentry
dkg closed T1927: search by e-mail address should find e-mail-only User IDs. as Resolved.
Apr 14 2015, 3:34 PM · Bug Report, gnupg
dkg removed a project from T1927: search by e-mail address should find e-mail-only User IDs.: Restricted Project.
Apr 14 2015, 3:34 PM · Bug Report, gnupg
dkg added a comment to T1927: search by e-mail address should find e-mail-only User IDs..

I can confirm that this is resolved in 2.1.3 with .kbx files. Thanks for the fix!

Apr 14 2015, 3:34 PM · Bug Report, gnupg
dkg closed T1791: "gpgconf --launch dirmngr" fails but does not return non-zero error code as Resolved.
Apr 14 2015, 3:30 PM · Bug Report, dirmngr
dkg removed a project from T1791: "gpgconf --launch dirmngr" fails but does not return non-zero error code: Restricted Project.
Apr 14 2015, 3:30 PM · Bug Report, dirmngr
dkg added a comment to T1791: "gpgconf --launch dirmngr" fails but does not return non-zero error code.

I can confirm that this is resolved in 2.1.3:

0 dkg@alice:~$ gpgconf --launch dirmngr
gpgconf: error running '/usr/bin/gpg-connect-agent': exit status 1
gpgconf: error running '/usr/bin/gpg-connect-agent --dirmngr NOP': General error
1 dkg@alice:~$

the error message isn't particularly helpful at directing the user to the source
of the problem (a bad dirmngr.conf), but at least it does return a non-zero
error code.

Apr 14 2015, 3:30 PM · Bug Report, dirmngr
dkg added projects to T1950: gpg --refresh-keys fails with large keyrings over hkps: dirmngr, Bug Report.
Apr 14 2015, 4:48 AM · gnupg, Bug Report, dirmngr
dkg set Version to 2.1.3 on T1950: gpg --refresh-keys fails with large keyrings over hkps.
Apr 14 2015, 4:48 AM · gnupg, Bug Report, dirmngr
dkg added a comment to T1827: Allow to batch up key refreshs in dirmngr.

I would like to see this happen. It would be great if dirmngr could make
parcimonie obsolete, for example.

(should this be "category: dirmngr" instead of just adding it as a topic?)

Apr 14 2015, 4:31 AM · gnupg, Feature Request, dirmngr