Page MenuHome GnuPG
Feed Advanced Search

Sep 1 2016

dkg set Version to 2.1.15 on T2666: gpg --list-config does not include default-key.
Sep 1 2016, 9:27 PM · Bug Report, gnupg

Aug 30 2016

dkg set Version to 0.9.7 on T2452: pinentry-curses fails with ERR 83886343 Line passed to IPC too long <Pinentry> when --ttytype is unusable.
Aug 30 2016, 12:38 AM · Bug Report, pinentry
dkg added projects to T2452: pinentry-curses fails with ERR 83886343 Line passed to IPC too long <Pinentry> when --ttytype is unusable: pinentry, Bug Report.
Aug 30 2016, 12:38 AM · Bug Report, pinentry

Aug 8 2016

dkg added a comment to T2438: dirmngr fails repeatedly with "invalid argument", without kicking the host from its list.

I note that if i restart dirmngr it will just choose a new member of the pool
and that member will work.

Aug 8 2016, 8:25 AM · gnupg, Bug Report, dirmngr
dkg added projects to T2438: dirmngr fails repeatedly with "invalid argument", without kicking the host from its list: dirmngr, Bug Report.
Aug 8 2016, 8:23 AM · gnupg, Bug Report, dirmngr
dkg set Version to 2.1.14 on T2438: dirmngr fails repeatedly with "invalid argument", without kicking the host from its list.
Aug 8 2016, 8:23 AM · gnupg, Bug Report, dirmngr

Aug 6 2016

dkg added projects to T2437: please document forward-compatible expectations for machine-readable formats: Feature Request, gnupg.
Aug 6 2016, 6:20 PM · gnupg, Feature Request
dkg set Version to 2.1.14 on T2437: please document forward-compatible expectations for machine-readable formats.
Aug 6 2016, 6:20 PM · gnupg, Feature Request

Aug 5 2016

dkg added projects to T2436: --yes sometimes doesn't work without --batch, but this is not well-documented: gnupg, Bug Report.
Aug 5 2016, 6:30 AM · Bug Report, gnupg
dkg set Version to 2.1.14 on T2436: --yes sometimes doesn't work without --batch, but this is not well-documented.
Aug 5 2016, 6:30 AM · Bug Report, gnupg

Aug 1 2016

dkg set Version to 2.1.14 on T2433: dirmngr: hkps connections should default to system trust if --hkp-cacert is not given.
Aug 1 2016, 10:31 PM · gnupg, Bug Report, dirmngr
dkg added projects to T2433: dirmngr: hkps connections should default to system trust if --hkp-cacert is not given: dirmngr, Bug Report.
Aug 1 2016, 10:31 PM · gnupg, Bug Report, dirmngr

Jul 30 2016

dkg set Version to 2.1.14 on T2431: tests/openpgp/run-test.scm not shipped in tarball.
Jul 30 2016, 7:24 PM · Bug Report, gnupg
dkg added projects to T2431: tests/openpgp/run-test.scm not shipped in tarball: gnupg, Bug Report.
Jul 30 2016, 7:24 PM · Bug Report, gnupg
dkg added projects to T2430: pinentry gtk2 should grab pointer as well as keyboard: pinentry, Bug Report.
Jul 30 2016, 6:56 PM · Bug Report, pinentry
dkg set Version to 0.9.7 on T2430: pinentry gtk2 should grab pointer as well as keyboard.
Jul 30 2016, 6:56 PM · Bug Report, pinentry

Jul 5 2016

dkg added a comment to T2404: gpg-connect-agent should have an --scdaemon option in parallel to the --dirmngr option.

hm, if there's a guarantee that scdaemon will only ever be launched as a
subprocess from gpg-agent, then maybe we don't need it.

If there's ever any expectation that some other program will launch scdaemon,
then it would be nice to use the unified launch mechanism provided by gpgconf.

Jul 5 2016, 11:31 PM · gnupg, Feature Request
dkg added projects to T2408: implicit declaration of function ‘gpg_err_set_errno’ in common/w32-afunix.c:65: gnupg, Bug Report.
Jul 5 2016, 8:34 PM · Bug Report, gnupg
dkg set Version to 2.1.13 on T2408: implicit declaration of function ‘gpg_err_set_errno’ in common/w32-afunix.c:65.
Jul 5 2016, 8:34 PM · Bug Report, gnupg

Jun 30 2016

dkg added projects to T2404: gpg-connect-agent should have an --scdaemon option in parallel to the --dirmngr option: Feature Request, gnupg.
Jun 30 2016, 6:36 PM · gnupg, Feature Request
dkg added a comment to T1985: Option --try-all-secrets doesn't work.

fwiw, the documentation says:

       --try-all-secrets
              Don't look at the key ID as stored in the message  but  try  all
              secret  keys  in  turn  to  find  the right decryption key. This
              option forces the behaviour  as  used  by  anonymous  recipients
              (created  by  using  --throw-keyids  or  --hidden-recipient) and
              might come handy in case where an encrypted message  contains  a
              bogus key ID.

but that behavior is in fact not the default when used with anonymous
recipients, either:

2 dkg@alice:/tmp/cdtemp.hphmpn$ gpg --decrypt test.asc
gpg: encrypted with RSA key, ID 00000000
gpg: decryption failed: No secret key
2 dkg@alice:/tmp/cdtemp.hphmpn$ gpg --no-skip-hidden-recipients --decrypt test.asc
gpg: encrypted with RSA key, ID 00000000
gpg: decryption failed: No secret key
2 dkg@alice:/tmp/cdtemp.hphmpn$

Jun 30 2016, 6:12 PM · gnupg (gpg21), Bug Report, gnupg
dkg added a comment to T1985: Option --try-all-secrets doesn't work.

I can confirm that this is still a problem on 2.1.13: --try-all-secrets does not
work as documented:

2 dkg@alice:/tmp/cdtemp.hphmpn$ gpg --try-all-secrets --decrypt test.asc
gpg: encrypted with RSA key, ID 00000000
gpg: decryption failed: No secret key
2 dkg@alice:/tmp/cdtemp.hphmpn$ gpg --try-secret-key test --decrypt test.asc
gpg: anonymous recipient; trying secret key 82A22A9306735B0C ...
gpg: okay, we are the anonymous recipient.
gpg: encrypted with RSA key, ID 00000000
test test
0 dkg@alice:/tmp/cdtemp.hphmpn$

Jun 30 2016, 6:07 PM · gnupg (gpg21), Bug Report, gnupg

Jun 27 2016

dkg added a comment to T2401: import-clean and export-clean do not have the documented effect.

Jun 27 2016, 6:42 PM · Bug Report, gnupg
dkg set Version to 2.1.13 on T2401: import-clean and export-clean do not have the documented effect.
Jun 27 2016, 6:42 PM · Bug Report, gnupg
dkg added projects to T2401: import-clean and export-clean do not have the documented effect: gnupg, Bug Report.
Jun 27 2016, 6:42 PM · Bug Report, gnupg

Jun 22 2016

dkg added a comment to T2392: Assertion "! db->batch_update" in tofu_closedbs failed (../../g10/tofu.c:1083).

Sorry, this is a duplicate of T2391. apparently i accidentally
double-clicked and roundup doesn't protect against that sort of thing. :/

Jun 22 2016, 6:12 PM · Bug Report, gnupg
dkg closed T2392: Assertion "! db->batch_update" in tofu_closedbs failed (../../g10/tofu.c:1083) as Resolved.
Jun 22 2016, 6:12 PM · Bug Report, gnupg
dkg updated subscribers of T2393: tofu.test fails in a few months.
Jun 22 2016, 9:26 AM · Bug Report, gnupg
dkg added projects to T2393: tofu.test fails in a few months: gnupg, Bug Report.
Jun 22 2016, 9:26 AM · Bug Report, gnupg
dkg set Version to 2.1.13 on T2392: Assertion "! db->batch_update" in tofu_closedbs failed (../../g10/tofu.c:1083).
Jun 22 2016, 9:19 AM · Bug Report, gnupg
dkg updated subscribers of T2392: Assertion "! db->batch_update" in tofu_closedbs failed (../../g10/tofu.c:1083).
Jun 22 2016, 9:19 AM · Bug Report, gnupg
dkg added projects to T2392: Assertion "! db->batch_update" in tofu_closedbs failed (../../g10/tofu.c:1083): gnupg, Bug Report.
Jun 22 2016, 9:19 AM · Bug Report, gnupg
dkg set Version to 2.1.13 on T2391: Assertion "! db->batch_update" in tofu_closedbs failed (../../g10/tofu.c:1083).
Jun 22 2016, 9:18 AM · gnupg (gpg22), Bug Report, gnupg
dkg added projects to T2391: Assertion "! db->batch_update" in tofu_closedbs failed (../../g10/tofu.c:1083): gnupg, Bug Report.
Jun 22 2016, 9:18 AM · gnupg (gpg22), Bug Report, gnupg
dkg updated subscribers of T2391: Assertion "! db->batch_update" in tofu_closedbs failed (../../g10/tofu.c:1083).
Jun 22 2016, 9:18 AM · gnupg (gpg22), Bug Report, gnupg

Jun 18 2016

dkg added a comment to T2348: Improve detection of IPv6 and IPv4 availibility.

(that last comment was with 2.1.13)

Jun 18 2016, 1:35 AM · gnupg, dirmngr, Feature Request
dkg set Version to 2.1.13 on T2348: Improve detection of IPv6 and IPv4 availibility.
Jun 18 2016, 1:35 AM · gnupg, dirmngr, Feature Request
dkg added a comment to T2348: Improve detection of IPv6 and IPv4 availibility.

fwiw, when i'm on a network that doesn't support IPv6, i get this:

0 dkg@alice:~$ gpg --send $KEYID
gpg: sending key REDACTED to hkps://hkps.pool.sks-keyservers.net
gpg: keyserver send failed: Invalid argument
gpg: keyserver send failed: Invalid argument
2 dkg@alice:~$

in dirmngr's logs:

2016-06-17 19:30:17 dirmngr[27999.2] DBG: gnutls:L3: ASSERT: mpi.c:246
2016-06-17 19:30:17 dirmngr[27999.2] DBG: gnutls:L5: REC[0x7f61f400fc10]:
Allocating epoch #0
2016-06-17 19:30:17 dirmngr[27999.2] can't connect to '2001:ba8:1f1:f2d4::2':
Invalid argument
2016-06-17 19:30:17 dirmngr[27999.2] error connecting to
'https://[2001:ba8:1f1:f2d4::2]:443': Invalid argument
2016-06-17 19:30:17 dirmngr[27999.2] DBG: gnutls:L5: REC[0x7f61f400fc10]: Start
of epoch cleanup
2016-06-17 19:30:17 dirmngr[27999.2] DBG: gnutls:L5: REC[0x7f61f400fc10]: End of
epoch cleanup

I think this instance of dirmngr was started on a network that has both IPv4 and
IPv6.

if i do:

     gpg-connect-agent --dirmngr killdirmngr /bye

and then try the --send again, it goes through fine.

Jun 18 2016, 1:35 AM · gnupg, dirmngr, Feature Request
dkg added a comment to T2387: GNUPGHOME with newlines breaks standard parsing of gpgconf --list-dirs.

We could bail early if we see something like this.

But since percent-unescaping is supposed to be able to handle arbitrary
characters (and consumers of this data have to percent-unescape anyway), why not
escape the record separator instead of bailing?

Jun 18 2016, 12:08 AM · gnupg (gpg22), Bug Report, gnupg

Jun 17 2016

dkg added projects to T2387: GNUPGHOME with newlines breaks standard parsing of gpgconf --list-dirs: gnupg, Bug Report.
Jun 17 2016, 3:06 AM · gnupg (gpg22), Bug Report, gnupg

Jun 4 2016

dkg added a comment to T2379: default to --with-fingerprint, introduce --without-fingerprint.

This looks great to me. I've always been frustrated by the c+p difficulty.

Does it make sense to put an "fpr" at the beginning of the fingerprint line, to
match with "pub" and "uid" ?

For example:

pub dsa2048 2007-12-31 [SC] [expires: 2018-12-31]
fpr 80615870F5BAD690333686D0F2AD85AC1E42B367
uid [ full ] Werner Koch <wk@gnupg.org>

Have you started work on this change or would you like patches?

Jun 4 2016, 5:55 PM · gnupg, Feature Request

Jun 3 2016

dkg added projects to T2379: default to --with-fingerprint, introduce --without-fingerprint: Feature Request, gnupg.
Jun 3 2016, 11:08 PM · gnupg, Feature Request
dkg added a comment to T1445: keyid-format fingerprint.

(btw, "fingerprint" should be 40 hex chars, not 32 as if suggested)

Jun 3 2016, 11:02 PM · gnupg, Duplicate, Feature Request
dkg reopened T1445: keyid-format fingerprint as "Open".
Jun 3 2016, 11:02 PM · gnupg, Duplicate, Feature Request
dkg removed a project from T1445: keyid-format fingerprint: Won't Fix.
Jun 3 2016, 11:02 PM · gnupg, Duplicate, Feature Request
dkg added a comment to T1445: keyid-format fingerprint.

For modern gnupg, we no longer support v3 keys, and we're considering making
--with-fingerprint the default (see
https://lists.gnupg.org/pipermail/gnupg-devel/2016-January/030748.html), so i
think this suggestion should actually be reconsidered.

Jun 3 2016, 11:02 PM · gnupg, Duplicate, Feature Request

Jun 1 2016

dkg added a comment to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".

fwiw, i first encountered this by doing a full-keyring refresh from the
keyservers. Dying rather than adjusting or accomodating the malformed header
meant that all keys after this one failed to refresh.

In general, dying outright seems likely to make an observed problem worse than
it needs to be.

Jun 1 2016, 3:27 PM · Bug Report, Duplicate, gnupg

May 31 2016

dkg added projects to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!": gnupg, Bug Report.
May 31 2016, 10:42 PM · Bug Report, Duplicate, gnupg
dkg set Version to 2.1.12 on T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".
May 31 2016, 10:42 PM · Bug Report, Duplicate, gnupg
dkg added a comment to T2374: exporting public key fails with "Ohhhh jeeee: Can't encode length=294 in a 2 byte header!".

May 31 2016, 10:42 PM · Bug Report, Duplicate, gnupg

May 23 2016

dkg added a comment to T2324: gpg --batch --export-secret-key fails (requires user interaction) if key has no passphrase.

I'm not convinced that this policy is effectively implemented in gpg-agent.

The patch series that starts here:

https://lists.gnupg.org/pipermail/gnupg-devel/2016-May/031121.html

resolves the export of secret key material stored as cleartext, and it does so
without modifying gpg-agent at all.

fwiw, I do not agree with T2324 (justus on Apr 18 2016, 05:22 PM / Roundup) that gpg --batch should not use pinentry at
all -- i think it's quite useful to be able to combine --batch with pinentry,
where the key is stored protected, or is otherwise marked by gpg-agent for
limited use.

May 23 2016, 6:21 PM · gnupg, OpenPGP, Bug Report
dkg reopened T1537: gpgv does not handle expired or revoked keys as "Open".
May 23 2016, 4:40 PM · Feature Request, gnupg
dkg changed Version from 2.0.19 to 2.1.12 on T1537: gpgv does not handle expired or revoked keys.
May 23 2016, 4:40 PM · Feature Request, gnupg
dkg added a comment to T1537: gpgv does not handle expired or revoked keys.

May 23 2016, 4:40 PM · Feature Request, gnupg
dkg added a comment to T1537: gpgv does not handle expired or revoked keys.

I don't think this is actually resolved.

As noted in https://lists.gnupg.org/pipermail/gnupg-devel/2016-April/031032.html
, gpgv accepts signatures made from revoked or expired keys.

It should reject signatures made from keys it believes to be revoked or expired.

The attached tarball contains:

     pubkey.gpg -- a binary-format 2048-bit RSA OpenPGP certificate

     C47D9EDFF117EE2AA11B162D017D715B3D0C4AF2.key -- the corresponding
                                                     secret key (for
                                                     reference/experimentation
                                                     only)

     before.txt.asc -- clearsigned message made by the key before
                       certificate creation time

     during.txt.asc -- clearsigned message made by the key between
                       certificate creation and certificate expiration

     after.txt.asc -- clearsigned message made by the key after certificate
                      expiration

of these, gpg approves of during.txt.asc and after.txt.asc, but not before.txt.asc.

May 23 2016, 4:40 PM · Feature Request, gnupg

Apr 22 2016

dkg added a comment to T2331: gpg-preset-passphrase fails to work with gpg1.

Thanks for the explanation, Werner.

This note might also be worth adding to the gpg-preset-passphrase manpage.

Apr 22 2016, 3:51 PM · Bug Report, gnupg
dkg added a comment to T2331: gpg-preset-passphrase fails to work with gpg1.

Apr 22 2016, 7:34 AM · Bug Report, gnupg
dkg set Version to 1.4.20 on T2331: gpg-preset-passphrase fails to work with gpg1.
Apr 22 2016, 7:34 AM · Bug Report, gnupg
dkg added projects to T2331: gpg-preset-passphrase fails to work with gpg1: gnupg, Bug Report.
Apr 22 2016, 7:34 AM · Bug Report, gnupg

Apr 20 2016

dkg added a comment to T2070: Can not leave passphrase empty when exporting secret key.

Thanks for looking into this, Justus.

While you're working on this, it might make sense to consider restoration of the
--export-options export-reset-subkey-passwd flag, which was dropped in 2.1.

This flag was used by at least one GnuPG downstream (monkeysphere); its absence
causes "monkeysphere subkey-to-ssh-agent" to fail.

In GnuPG 1.4.x and 2.0.x, the option was defined this way:

export-reset-subkey-passwd
       When  using  the  --export-secret-subkeys  command,  this
       option resets the passphrases for all exported subkeys to
       empty. This is useful when the exported subkey is  to  be
       used  on an unattended machine where a passphrase doesn't
       necessarily make sense. Defaults to no.
Apr 20 2016, 2:58 PM · Duplicate, Bug Report, gnupg

Apr 19 2016

dkg added projects to T2327: internal server errors under https://www.gnupg.org/related_software: gpgweb, Bug Report.
Apr 19 2016, 11:55 PM · Bug Report, gpgweb

Apr 17 2016

dkg added a comment to T2324: gpg --batch --export-secret-key fails (requires user interaction) if key has no passphrase.

furthermore, if the user enters an empty password, gpg-agent says "please
confirm that you do not want to have any protection on your key".

If the user chooses "yes, protection is not needed" in this followup prompt, gpg
*still* refuses to export the secret key, producing this error message:

---------------

gpg: key 0CA2C754F8DF3194EC1F1C7EF88AEA8D20BAFB0F: error receiving key from
agent: No passphrase given - skipped

gpg: WARNING: nothing exported

Apr 17 2016, 10:31 PM · gnupg, OpenPGP, Bug Report
dkg set Version to 2.1.11 on T2324: gpg --batch --export-secret-key fails (requires user interaction) if key has no passphrase.
Apr 17 2016, 9:56 PM · gnupg, OpenPGP, Bug Report
dkg added a project to T2324: gpg --batch --export-secret-key fails (requires user interaction) if key has no passphrase: Bug Report.
Apr 17 2016, 9:56 PM · gnupg, OpenPGP, Bug Report

Apr 15 2016

dkg added a comment to T2313: gpg --import of secret keys prompts for passwords in 2.1.

I understand the reason for re-encrypting -- i'm quite happy that the agent is
sensible about improving the security of the key when it adopts it.

my concern is that users don't know what to expect, and that different workflows
result in different sets of keys stored in the agent.

So i'd recommend that when importing without --batch, if the password fails for
any reason, gpg should fall back to the fast migration "kludge" rather than just
skipping that keyblock. That way the imported secret key material will still be
available and can be cleaned up/hardened on first successful use.

Apr 15 2016, 2:20 PM · S/MIME, Feature Request, Stalled, gnupg, OpenPGP

Apr 12 2016

dkg added a comment to T2283: tsign domain not documented.

I'm not convinced that the +-prefixed lines address clint's concern.

In particular, the parenthetical remark "(domain means the domain part of the
mail address)" is the important bit -- will this be documented somewhere?

Apr 12 2016, 2:03 AM · Documentation, Bug Report, gnupg
dkg added a project to T2313: gpg --import of secret keys prompts for passwords in 2.1: Bug Report.
Apr 12 2016, 1:23 AM · S/MIME, Feature Request, Stalled, gnupg, OpenPGP
dkg added a project to T2312: GnuPG 2.1 migration fails due to permissions but appears to succeed: Bug Report.
Apr 12 2016, 1:04 AM · gnupg, Bug Report

Mar 30 2016

dkg added a comment to T1983: gpg2 prefers missing secret key to available key on card.

I'm changing this from "nobug" to "bug", because it is clearly causing problems
for people with separate per-device signing keys, or with multiple smartcards
(e.g. work and home)

Mar 30 2016, 9:19 PM · Bug Report, gnupg
dkg added a project to T1983: gpg2 prefers missing secret key to available key on card: Bug Report.
Mar 30 2016, 9:19 PM · Bug Report, gnupg
dkg reopened T1983: gpg2 prefers missing secret key to available key on card as "Open".
Mar 30 2016, 9:19 PM · Bug Report, gnupg

Mar 22 2016

dkg added a comment to T1983: gpg2 prefers missing secret key to available key on card.

I don't think this is a doc or FAQ issue, i think it's an actual bug that has a
significant effect on usability.

If gpg has an available key that would work, it should use it, rather than
preferring the unavailable key.

If the user explicitly specifies an unavailable subkey then sure, gpg should
fail. But if they've only specified their primary (or their UID) then gpg
should be willing to use any available active (non-revoked, non-expired) subkey
with the right usage flags instead of failing if an unavailable one has a newer
date.

Mar 22 2016, 5:44 PM · Bug Report, gnupg

Feb 16 2016

dkg added a comment to T2134: iconv.dll is still a problem.

fwiw, i've now got most of GnuPG cross-building for win32 from a debian platform
using win-iconv. win-iconv doesn't seem to be a terrible choice to me.

Feb 16 2016, 8:10 AM · Feature Request, gnupg

Feb 5 2016

dkg updated subscribers of T2243: pinentry sends libsecret error messages to stdout, which causes IPC error.
Feb 5 2016, 10:21 PM · Bug Report, pinentry
dkg added projects to T2243: pinentry sends libsecret error messages to stdout, which causes IPC error: pinentry, Bug Report.
Feb 5 2016, 10:20 PM · Bug Report, pinentry
dkg set Version to 0.9.7 on T2243: pinentry sends libsecret error messages to stdout, which causes IPC error.
Feb 5 2016, 10:20 PM · Bug Report, pinentry
dkg added a comment to T2134: iconv.dll is still a problem.

I'm also interested in this, since i want to make it possible to easily build a
win32 version of gpgv.exe on debian systems. This is possible without iconv at
all in 1.4.x, but i would rather we ship a gpgv from 2.1.x in the future.

Feb 5 2016, 4:38 PM · Feature Request, gnupg

Feb 2 2016

dkg added a comment to T767: gpg2 ignores gpgme_set_passphrase_cb.

I'm happy to see GnuPG moving to an all-agent model, where the passphrase and
the asymmetric secret key material aren't available to the gpg process.

That sai, if gpgme is going to remove the passphrase_cb prompt, or to deprecate
it in all cases other than symmetric data encryption/decryption, then should the
API change?

gpgme_set_passphrase_cb is used in about 40 packages in debian:

  https://codesearch.debian.net/results/gpgme_set_passphrase_cb/page_0

this includes bindings for python, ruby, php, and c++ -- and it's possible that
those bindings themselves have some other usage elsewhere.

Do we have guidance for users of this function, whether it's with gpgme
directly, or with any of the bindings?

Feb 2 2016, 1:18 AM · gnupg

Jan 28 2016

dkg added projects to T2231: gpgsm has --prefer-system-dirmngr, but system-wide dirmngr is deprecated: gnupg, Bug Report.
Jan 28 2016, 2:49 PM · Documentation, Bug Report, gnupg
dkg set Version to 2.1.11 on T2231: gpgsm has --prefer-system-dirmngr, but system-wide dirmngr is deprecated.
Jan 28 2016, 2:49 PM · Documentation, Bug Report, gnupg

Jan 5 2016

dkg reopened T1982: pinentry-qt should fallback to curses if $DISPLAY is set but unavailable as "Open".
Jan 5 2016, 6:15 AM · pinentry, Feature Request
dkg added a comment to T1982: pinentry-qt should fallback to curses if $DISPLAY is set but unavailable.

Hm, this is indeed fixed for pinentry-gtk2 and pinentry-gnome3, but pinentry-qt
is still broken:

0 $ DISPLAY=:3 pinentry-qt
QXcbConnection: Could not connect to display :3
Aborted
134 $

Jan 5 2016, 6:15 AM · pinentry, Feature Request

Dec 12 2015

dkg added projects to T2187: gpg2 --gen-revoke 0x${FINGERPRINT} produces infinite output stream: gnupg, Bug Report.
Dec 12 2015, 10:47 PM · Bug Report, gnupg
dkg set Version to 2.1.10 on T2187: gpg2 --gen-revoke 0x${FINGERPRINT} produces infinite output stream.
Dec 12 2015, 10:47 PM · Bug Report, gnupg

Dec 11 2015

dkg added a comment to T2181: ship sks-keyservers.netCA.pem in distributed tarball.

I'm attaching an updated patch that doesn't just ship sks-keyservers.netCA.pem
in the distributed tarball, but installs it during "make install" in pkgdatadir,
and then checks during query time to see if it should be used.

In particular, if the user asks for "hkps://hkps.pool.sks-keyservers.net" and
they haven't specified any hkp-cacert argument in dirmngr, it automatically
tries to load the bundled cert.

Dec 11 2015, 4:04 AM · gnupg, Bug Report, dirmngr
dkg added a comment to T2181: ship sks-keyservers.netCA.pem in distributed tarball.

D340: 736_0001-Use-sks-keyservers-CA-by-default-for-the-hkps-pool.patch

Dec 11 2015, 4:04 AM · gnupg, Bug Report, dirmngr

Dec 10 2015

dkg added projects to T2181: ship sks-keyservers.netCA.pem in distributed tarball: dirmngr, Bug Report.
Dec 10 2015, 11:25 PM · gnupg, Bug Report, dirmngr
dkg added a comment to T2181: ship sks-keyservers.netCA.pem in distributed tarball.

D341: 735_0001-ship-sks-keyservers.netCA.pem-in-distributed-tarball.patch

Dec 10 2015, 11:25 PM · gnupg, Bug Report, dirmngr
dkg set Version to 2.1.10 on T2181: ship sks-keyservers.netCA.pem in distributed tarball.
Dec 10 2015, 11:25 PM · gnupg, Bug Report, dirmngr

Nov 27 2015

dkg added a comment to T2139: pinentry option to see the password in cleartext.

pinentry-gtk-2 does currently support the tab-tab-enter use case. Using 0.9.6-4
from debian, i can use tab to cycle between the textentry dialog and cancel and OK.

I see the same behavior from pinentry-gnome3 (0.9.6-4), tab workflow is:

  • textentry
  • Cancel
  • OK

for pinentry-qt (same version as tested above) the tab ordering is:

  • textentry
  • OK
  • Cancel

That said, i agree that i'm the only person who has raised this, and i'm
perfectly willing to be retrained to use more efficient keyboard flows if
they're presented to me. So if you want to go ahead with the current plan,
that's fine with me.

I agree that consistency with common UI patterns on the platform of choice are
worth emulating -- we don't need to invent or maintain our own UI patterns that
are idiosyncratic to GnuPG.

Nov 27 2015, 8:11 PM · pinentry, Feature Request, gpg4win

Nov 18 2015

dkg reopened T1777: pinentry-gtk-2 refuses input when GTK_IM_MODULE=scim as "Open".
Nov 18 2015, 3:47 PM · Bug Report, pinentry
dkg added a comment to T1777: pinentry-gtk-2 refuses input when GTK_IM_MODULE=scim.

I've just tested 0.9.6 using the same procedure as T1777 (dkg on May 14 2015, 12:01 AM / Roundup), and i have no
problem entering text either. I think this is resolved. sorry for the delay in
feedback.

Nov 18 2015, 3:47 PM · Bug Report, pinentry

Oct 29 2015

dkg added a comment to T2139: pinentry option to see the password in cleartext.

On Thu 2015-10-29 04:34:03 -0400, Bernhard Reiter via BTS wrote:

Oct 29 2015, 6:51 PM · pinentry, Feature Request, gpg4win

Oct 28 2015

dkg added a comment to T2139: pinentry option to see the password in cleartext.

Some people are used to pinentry and have a common keyboard-based type, tab, hit
enter workflow.

Please make sure that this workflow doesn't accidentally switch their password
to visible when this change is implemented.

Oct 28 2015, 6:57 PM · pinentry, Feature Request, gpg4win

Oct 19 2015

dkg removed a project from T2127: enable deprecation of specific digest algorithms: Restricted Project.
Oct 19 2015, 11:52 PM · gnupg, Feature Request
dkg added a comment to T2127: enable deprecation of specific digest algorithms.

Yes, thanks for the quick review and merge! I assume this will be released in
whatever release comes after 2.1.9.

I'm setting the status here to "resolved".

Oct 19 2015, 11:52 PM · gnupg, Feature Request
dkg closed T2127: enable deprecation of specific digest algorithms as Resolved.
Oct 19 2015, 11:52 PM · gnupg, Feature Request
dkg added projects to T2127: enable deprecation of specific digest algorithms: Feature Request, gnupg.
Oct 19 2015, 12:15 AM · gnupg, Feature Request
dkg set Version to 2.1.9 on T2127: enable deprecation of specific digest algorithms.
Oct 19 2015, 12:15 AM · gnupg, Feature Request
dkg added a comment to T2127: enable deprecation of specific digest algorithms.

D334: 694_0001-Enable-deprecation-of-specific-digest-algorithms-for.patch

Oct 19 2015, 12:15 AM · gnupg, Feature Request