Page MenuHome GnuPG
Feed Advanced Search

Nov 17 2015

neal added a comment to T2151: Can't get a keyblock for a key if it is followed by a legacy key.

Fixed in ad9befa.

Nov 17 2015, 2:57 PM · Bug Report, gnupg
neal closed T2151: Can't get a keyblock for a key if it is followed by a legacy key as Resolved.
Nov 17 2015, 2:57 PM · Bug Report, gnupg
neal added a comment to T2151: Can't get a keyblock for a key if it is followed by a legacy key.

Note: to reproduce:

gpg2 --no-options --no-default-keyring --keyring pubring.gpg -k
Nov 17 2015, 12:54 PM · Bug Report, gnupg
neal added a comment to T2151: Can't get a keyblock for a key if it is followed by a legacy key.

Nov 17 2015, 12:53 PM · Bug Report, gnupg
neal added projects to T2151: Can't get a keyblock for a key if it is followed by a legacy key: gnupg, Bug Report.
Nov 17 2015, 12:53 PM · Bug Report, gnupg

Nov 16 2015

nervengiftlabs added projects to T2150: Generating keys on OpenPGP card yields wrong public key: gnupg (gpg21), gnupg, Bug Report.
Nov 16 2015, 6:58 PM · Bug Report, gnupg, gnupg (gpg21)
nervengiftlabs set Version to 2.1.9 on T2150: Generating keys on OpenPGP card yields wrong public key.
Nov 16 2015, 6:58 PM · Bug Report, gnupg, gnupg (gpg21)
nervengiftlabs added a comment to T2150: Generating keys on OpenPGP card yields wrong public key.

Nov 16 2015, 6:58 PM · Bug Report, gnupg, gnupg (gpg21)

Nov 13 2015

aheinecke added a comment to T2135: Keyring locking on Windows broken.

I've disabled the automatic keylisting while an import job is running in
Kleopatra as this is a good idea anyway.

Still this should be fixed although we might want to give it a try with 2.1
instead as it is no longer a hard issue for gpg4win with the workarond in kleo
in place.

The import with 2.0.29 is also very slow on Windows. Over two minutes to import
650 keys while the same import with 2.1.9 on GNU/Linux only takes 20seconds.

Nov 13 2015, 12:34 PM · Bug Report, gpg4win, Windows, gnupg, Windows 32
werner added a comment to T1128: gpg should detect ambigious keys specifications.

Oops. I used a plain old keyring and not a keybox. However the effect is the same.

Nov 13 2015, 9:53 AM · Feature Request, Debian, gnupg
werner added a comment to T2149: Use termcolors for gpg2.

This would add a lot of complexity because some users will soon request
configurable colors and attributes as well as different output formatting.

I suggest to write a wrapper to do this or resort to one of the GUI tools.

Nov 13 2015, 9:52 AM · gnupg, Feature Request

Nov 12 2015

neal added a project to T2147: auto-key-retrieve does not work if keyserver is set in dirmngr.conf instead of gpg.conf: gnupg.
Nov 12 2015, 9:33 PM · gnupg, Bug Report
sedrubal added projects to T2149: Use termcolors for gpg2: Feature Request, gnupg.
Nov 12 2015, 9:30 PM · gnupg, Feature Request
werner added a project to T1438: Not enough space on Windows 7: Too Old.
Nov 12 2015, 9:26 AM · Too Old, gnupg
werner closed T1341: --language option as Resolved.
Nov 12 2015, 9:25 AM · gnupg, Won't Fix, Feature Request
werner changed Version from 1.4.10 to master on T1173: gpg has no easy way to view the reason and description of revocation sigs.
Nov 12 2015, 9:20 AM · gnupg, Debian, Feature Request
werner added a comment to T1173: gpg has no easy way to view the reason and description of revocation sigs.

That should go into the keylisting. Here is a listing of a revoked
key:

  pub   dsa1024/269E78D84738350A 1999-08-16 [revoked: 2011-02-15]
        Key fingerprint = 72A2 A242 8623 84A9 5910  C454 269E 78D8 4738 350A
        Keygrip = 2BBB5EF3D036022DD66EF4386680C194352A2EC2
  uid                 [ revoked] Florian Lohoff <flo@[...]>
  uid                 [ revoked] Florian Lohoff <flo@[...]>
  uid                 [ revoked] Florian Lohoff <flor[...]>

Another line after the Keygrip line could show key revocation
information. To show user id revocations a list option is anyway
required:

  $ gpg --list-options show-unusable-uids  \
     --with-fingerprint  --with-keygrip -k 6C7EE1B8621CC013
  pub   dsa1024/6C7EE1B8621CC013 1998-07-07 [expired: 2004-12-31]
        Key fingerprint = ECAF 7590 EB34 43B5 C7CF  3ACB 6C7E E1B8 621C C013
        Keygrip = E3003A38C3CCB63DFB39998A6C8A78EB9498E42A
  uid                 [ expired] Werner Koch <wk@gnupg.org>
  uid                 [ expired] Werner Koch <werner.koch@guug.de>
  uid                 [ expired] Werner Koch <wk@[...].com>
  uid                 [ revoked] Werner Koch <wk@openit.de>

A similar formatted revocation reason could be shown after the revoked
user id. It would be best to indent that to align with the [revoked]
string.

And of course we also need to come up with a --with-colon format for
both cases.

Iff we do this it should only go into 2.1 thus I changed the Version field.

Nov 12 2015, 9:20 AM · gnupg, Debian, Feature Request
werner changed Version from 1.4.10 to master on T1128: gpg should detect ambigious keys specifications.
Nov 12 2015, 8:59 AM · Feature Request, Debian, gnupg
werner added a comment to T1128: gpg should detect ambigious keys specifications.

My problem was a different one. Here is what I wrote to gnupg-devel:

$ ../g10/gpg2 -vsbau 0xE3FDFF218E45B72B </etc/motd >/dev/null

[...]

gpg: Error: the key specification '0xE3FDFF218E45B72B' is ambiguous.

gpg: (check argument of option '--local-user')

gpg: error reading key block for '0xE3FDFF218E45B72B': Unknown system error.

gpg: Error: the key specification '1E42B367' is ambiguous.

gpg: (check argument of option '--encrypt-to')

gpg: error reading key block for '1E42B367': Unknown system error.

gpg: Warning: value '1E42B367' for --default-key should be a long keyid or a

fingerprint.

gpg: Error: the key specification '1E42B367' is ambiguous.
gpg: (check argument of option '--default-key')
gpg: error reading key block for '1E42B367': Unknown system error.
gpg: writing to stdout
gpg: EDDSA/SHA256 signature from: "E3FDFF218E45B72B Werner Koch (wheatstone

commit signing)"

  wk@wheatstone:~/b/gnupg/tmp$ echo $?
  2

Note that I have only specified a short key id because this is pretty
common and gpg prints only a warning. Okay.

The real problem is that there are several error messages - one is
sufficient to let gpg exit with a failure and git won't continue. There
are 2 different kinds of errors:

  gpg: Error: the key specification '0xE3FDFF218E45B72B' is ambiguous.

This is the keyid I specified on the command line. Let's check it:

$ ../g10/gpg2 -k 0xE3FDFF218E45B72B

[...]

gpg: Error: the key specification '1E42B367' is ambiguous.

gpg: (check argument of option '--encrypt-to')

gpg: error reading key block for '1E42B367': Unknown system error.

gpg: Warning: value '1E42B367' for --default-key should be a long keyid or a

fingerprint.

  gpg: Error: the key specification '1E42B367' is ambiguous.
  gpg: (check argument of option '--default-key')
  gpg: error reading key block for '1E42B367': Unknown system error.
  gpg: please do a --check-trustdb
  pub   ed25519/E3FDFF218E45B72B 2015-02-18 [expires: 2025-02-15]
  uid                 [ultimate] Werner Koch (wheatstone commit signing)

(and -k shows the same result).
What is the ambiguity here?

The other two error messages are identical one for --encrypt-to and one
for --default-key:

  gpg: Error: the key specification '1E42B367' is ambiguous.

Let's check it:

$ ../g10/gpg2 -k 1E42B367

[...]

gpg: Error: the key specification '1E42B367' is ambiguous.

gpg: (check argument of option '--encrypt-to')

gpg: error reading key block for '1E42B367': Unknown system error.

gpg: Warning: value '1E42B367' for --default-key should be a long keyid or a

fingerprint.

  gpg: Error: the key specification '1E42B367' is ambiguous.
  gpg: (check argument of option '--default-key')
  gpg: error reading key block for '1E42B367': Unknown system error.
  gpg: please do a --check-trustdb
  pub   dsa2048/F2AD85AC1E42B367 2007-12-31 [expires: 2018-12-31]
  uid                 [ unknown] Werner Koch <wk@gnupg.org>
  uid                 [ unknown] Werner Koch <wk@g10code.com>
  uid                 [ unknown] Werner Koch <werner@eifzilla.de>
  sub   dsa1024/4F0540D577F95F95 2011-11-02
  sub   rsa2048/1E0FE11D664D7444 2014-01-02 [expires: 2016-12-31]

Also not ambiguous.

So this new feature break existing installations. This is a complaint
as mentioned in T1128 (wk on Nov 06 2015, 10:57 AM / Roundup). Not due to performance but due to severe
breakage. This needs a lot more testing before we can release it.

Nov 12 2015, 8:59 AM · Feature Request, Debian, gnupg

Nov 11 2015

neal added a comment to T1128: gpg should detect ambigious keys specifications.

I've fixed the problem that Niibe reported in 7546e81.

Nov 11 2015, 11:20 PM · Feature Request, Debian, gnupg
aheinecke closed T2048: KGpg Fails to Autostart on Fedora 22 with KDE Despite 'Start KGpg automatically at login' Being Selected as Resolved.
Nov 11 2015, 3:28 PM · Not A Bug, Fedora, Bug Report, gnupg
aheinecke added a comment to T2048: KGpg Fails to Autostart on Fedora 22 with KDE Despite 'Start KGpg automatically at login' Being Selected.

For the record Rolf Eike Beer still maintains KGpg (I was not aware of this when
i wrote T2048 (aheinecke on Aug 28 2015, 10:54 PM / Roundup))
And he is planning to port it to Qt5.
See: https://mail.kde.org/pipermail/kde-community/2015q3/001651.html

Please leave this issue closed here. This bug either belongs in the Fedora
Bugtracker or in KDE's bugtracker.

Nov 11 2015, 3:28 PM · Not A Bug, Fedora, Bug Report, gnupg
werner reopened T1128: gpg should detect ambigious keys specifications as "Open".
Nov 11 2015, 8:38 AM · Feature Request, Debian, gnupg
werner added a comment to T1128: gpg should detect ambigious keys specifications.

(commit e8c53fc was for master)

This introduces a regression. I had to revert this commit to be able to keep on
using gpg in my configuration. A description of the problem can be found at:
https://lists.gnupg.org/pipermail/gnupg-devel/2015-November/030549.html

Nov 11 2015, 8:38 AM · Feature Request, Debian, gnupg
hloeung closed T2142: Regression in --enable-ssh-support with GnuPG 2.1.8 and 2.1.9? as Resolved.
Nov 11 2015, 7:27 AM · Bug Report, gnupg
hloeung added a comment to T2142: Regression in --enable-ssh-support with GnuPG 2.1.8 and 2.1.9?.

Yep, that was it.

Thanks Niibe.

Nov 11 2015, 7:27 AM · Bug Report, gnupg
hloeung reopened T2142: Regression in --enable-ssh-support with GnuPG 2.1.8 and 2.1.9? as "Open".
Nov 11 2015, 7:27 AM · Bug Report, gnupg

Nov 10 2015

gniibe closed T2142: Regression in --enable-ssh-support with GnuPG 2.1.8 and 2.1.9? as Resolved.
Nov 10 2015, 7:20 AM · Bug Report, gnupg
gniibe added a comment to T2142: Regression in --enable-ssh-support with GnuPG 2.1.8 and 2.1.9?.

Sorry for your trouble. I believe that your key includes ed25519.

Once, we introduced a bug and it was fixed in 2.1.9. For a key registered by
old GnuPG by ssh-add, it should be removed and to be add again.

Nov 10 2015, 7:20 AM · Bug Report, gnupg

Nov 8 2015

SlipperyCow reopened T2048: KGpg Fails to Autostart on Fedora 22 with KDE Despite 'Start KGpg automatically at login' Being Selected as "Open".
Nov 8 2015, 5:09 AM · Not A Bug, Fedora, Bug Report, gnupg
SlipperyCow added a comment to T2048: KGpg Fails to Autostart on Fedora 22 with KDE Despite 'Start KGpg automatically at login' Being Selected.

On 6 November, there was finally some movement on the 22 July Bug I filed at:

https://bugzilla.redhat.com/show_bug.cgi?id=1245732

Rex Dieter provided the underlying explanation of the KGpg autostart failure on
Fedora 22 (or newer) systems:

He stated:

"Simple reason is that plasma5 doesn't support kde4 apps' use of
X-KDE-Autostart-condition"

Note: Rex is also developing/testing a patch to address this plasma5
shortcoming for Fed 22 systems.

Importantly, and as I had suspected and alluded to, this plasma5 lack of support
explains why the KGpp failure to autostart occured *only* on my Fed 22 systems,
and did not impact any of the other KDE operating systems I use.

I have upgraded all my Fed 22 systems to Fed 23, where the KGpg autostart
currently continues to persist. I have documented the workaround in the Bug
report linked above for anyone impacted. This workaround also works in Fed 23.

Hopefully, this issue will be fully resolved in the next Fedora-approved release
of KGpg.

Nov 8 2015, 5:09 AM · Not A Bug, Fedora, Bug Report, gnupg

Nov 6 2015

neal added a project to T1341: --language option: gnupg.
Nov 6 2015, 8:57 PM · gnupg, Won't Fix, Feature Request
neal added a project to T1371: Out of secure memory while generating several keys in batchmode: gnupg.
Nov 6 2015, 8:57 PM · In Progress, Bug Report, gnupg (gpg14)
neal added a project to T1438: Not enough space on Windows 7: gnupg.
Nov 6 2015, 8:57 PM · Too Old, gnupg
neal added a project to T1444: Check keyid after downloading key from keyserver and before importing it: gnupg.
Nov 6 2015, 8:56 PM · gnupg, Feature Request
neal set Version to 1.4 on T1714: parse_key doesn't check for EOF when listing packets.
Nov 6 2015, 8:55 PM · gnupg, Bug Report
neal added a project to T1714: parse_key doesn't check for EOF when listing packets: gnupg.
Nov 6 2015, 8:55 PM · gnupg, Bug Report
neal added a project to T2143: Interactive passwd command doesn't work if passphrase-file is set: gnupg.
Nov 6 2015, 8:48 PM · Info Needed, gnupg, Bug Report
neal added a comment to T1394: man page documents some unsupported parameters.

In 2.1, these options are supported. They are not support in 1.4, but they are
in 1.4's manual.

Nov 6 2015, 3:01 PM · gnupg, Debian, Feature Request
neal added a comment to T1221: gpg misinterprets under-implemented keyservers as empty, misreports search results to users.

This seems to still be a problem:

$ gpg2 --keyserver hkp://keyring.debian.org --search-keys dkg
gpg: error searching keyserver: No data
gpg: keyserver search failed: No data

Nov 6 2015, 2:25 PM · Feature Request, gnupg
neal closed T1327: gnupg-2.0.17 test failures on GNU/Linux IA-64 (Red Hat 5.6) as Resolved.
Nov 6 2015, 2:19 PM · gnupg, Feature Request
neal removed a project from T1327: gnupg-2.0.17 test failures on GNU/Linux IA-64 (Red Hat 5.6): Info Needed.
Nov 6 2015, 2:19 PM · gnupg, Feature Request
neal added a comment to T1327: gnupg-2.0.17 test failures on GNU/Linux IA-64 (Red Hat 5.6).

This bug report is very old and 2.0.17 is no longer supported. The right way
forward is to rerun the test suite with the latest version on a modern OS.
However, I expect that if these failures were still a problem, we'd have heard
about them. As such, I'm closing this bug.

Nov 6 2015, 2:19 PM · gnupg, Feature Request
neal closed T1279: gpg-agent[11104]: can't connect to the PIN entry module: as Resolved.
Nov 6 2015, 1:54 PM · Bug Report, gnupg
neal added a comment to T1279: gpg-agent[11104]: can't connect to the PIN entry module:.

This sounds like a user configuration problem. Given Werner's reply, the lack
of response from the reporter and the amount of time that has gone by, I'm
closing this.

Nov 6 2015, 1:54 PM · Bug Report, gnupg
neal closed T1241: gnupg: need an option to automatically refuse signing photo-ids as Resolved.
Nov 6 2015, 1:17 PM · gnupg, Debian, Feature Request
neal added a comment to T1241: gnupg: need an option to automatically refuse signing photo-ids.

Added the option --only-sign-text-ids in 28e1982

Nov 6 2015, 1:17 PM · gnupg, Debian, Feature Request
neal closed T1245: Error-Message: gpg: DBG: rndw32: get performance data problem as Resolved.
Nov 6 2015, 12:50 PM · Feature Request, gnupg
neal added a comment to T1245: Error-Message: gpg: DBG: rndw32: get performance data problem.

According to Werner's comment, this is not a bug so closing.

Nov 6 2015, 12:50 PM · Feature Request, gnupg
neal added a comment to T1232: expired user-id selection preference.

Duplicate of T1143

Nov 6 2015, 12:39 PM · Duplicate, Bug Report, gnupg
neal added a project to T1232: expired user-id selection preference: Duplicate.
Nov 6 2015, 12:39 PM · Duplicate, Bug Report, gnupg
neal added a comment to T1143: better heuristic for choosing an encryption key based on a User ID.

Note: T1232 is related.

Nov 6 2015, 12:39 PM · Duplicate, gnupg, Feature Request
neal added a comment to T1212: Test fdpassing fails in libassuan 2.0.0 on Solaris 9.

Given how hold this is, it would be nice if someone could confirm this is till
an issue.

Nov 6 2015, 12:34 PM · gnupg, Bug Report
neal added a comment to T1206: no check for non spaces behind a keyid.

Fix in f99830b.

Nov 6 2015, 12:31 PM · Debian, Bug Report, gnupg
neal closed T1206: no check for non spaces behind a keyid as Resolved.
Nov 6 2015, 12:31 PM · Debian, Bug Report, gnupg
neal added a comment to T1173: gpg has no easy way to view the reason and description of revocation sigs.

Where should this output be displayed? When doing gpg2 -K, revoked user ids are
not shown. Perhaps in --edit-key? Nevertheless, it would be nice to have a
command line option to get this information directly.

Nov 6 2015, 12:12 PM · gnupg, Debian, Feature Request
neal closed T1128: gpg should detect ambigious keys specifications as Resolved.
Nov 6 2015, 12:05 PM · Feature Request, Debian, gnupg
neal added a comment to T1128: gpg should detect ambigious keys specifications.

Checked in (e8c53fc).

Nov 6 2015, 12:05 PM · Feature Request, Debian, gnupg
werner added a comment to T1128: gpg should detect ambigious keys specifications.

With 'wait' I mean: Push, release, wait for complaints.

log_error (_("no such key corresponding to: %s\n"),t->d)
if (!opt.quiet)

  log_info ("(check argument of option '%s')\n", option);

However, we need to check all error messages to make sure they use a common
scheme. For example at some places we use

key 123445567: This is is not usable
Nov 6 2015, 10:57 AM · Feature Request, Debian, gnupg
neal added a comment to T1128: gpg should detect ambigious keys specifications.
  • When you say let's wait, what do you mean? In particular, how are we going to

get a user response without checking the code in?

  • Ok. I will return an error code.
  • I already do this, e.g.:

log_error (_("no such key corresponding to %s (passed to %s)\n"),

t->d, option);
Nov 6 2015, 7:55 AM · Feature Request, Debian, gnupg

Nov 5 2015

werner added a comment to T1128: gpg should detect ambigious keys specifications.

Some comments:

  • Always checking this _might_ slow down things. Let's wait for user response.
  • Please do not die in that function. We may want to use it a other places too (server mode). Better return an error (NULL) and let the caller decide what to do.
  • The strings should be changed to ease translation: For example put the second part into its own message: log_info ("(check argument of option '%s')\n", "--local-user");
Nov 5 2015, 6:23 PM · Feature Request, Debian, gnupg
neal added a comment to T1128: gpg should detect ambigious keys specifications.

D106: 719_0001-gpg-Check-for-ambiguous-or-non-matching-key-specs.patch

Nov 5 2015, 5:38 PM · Feature Request, Debian, gnupg
neal added a comment to T1128: gpg should detect ambigious keys specifications.

The following patch adds checks for --default-key, --local-user and --remote-user.

Check that any user id specifications passed to --local-user
and --remote-user correspond to exactly 1 user. Check that any user
id specifications passed to --default-key correspond to at most 1
user. Warn if any user id specifications passed to --local-user or
--default-user are possible ambiguous (are not specified by long keyid
or fingerprint).

$ gpg2 -s -a -r testing
gpg: WARNING: recipients (-r) given without using public key encryption
gpg: Error: the key specification 'testing' is ambiguous (passed to --encrypt-to).
gpg: 'testing' matches at least: 362D3527F53AAD1971AAFDE658859975EE37CF96 and
439D954F18F79CC4F71BED91CACED996BC15C85A.
$ gpg2 -s -a --local-user testing
gpg: Warning: value 'testing' for --local-user should be a long keyid or a
fingerprint.
gpg: Error: the key specification 'testing' is ambiguous (passed to --local-user).
gpg: 'testing' matches at least: 362D3527F53AAD1971AAFDE658859975EE37CF96 and
439D954F18F79CC4F71BED91CACED996BC15C85A.
$ gpg2 -s -a --default-key testing
gpg: Warning: value 'testing' for --default-key should be a long keyid or a
fingerprint.
gpg: Error: the key specification 'testing' is ambiguous (passed to --default-key).
gpg: 'testing' matches at least: 362D3527F53AAD1971AAFDE658859975EE37CF96 and
439D954F18F79CC4F71BED91CACED996BC15C85A.

Nov 5 2015, 5:38 PM · Feature Request, Debian, gnupg
werner added a comment to T1109: Pinentry and cache update race.

I am pretty sure that there is a race. The two sessions are not mutally locked
and thus the second client may ask for the passprase again.

  Pinentry-1 returns to Client-1
  task switch
  Client-2 now checks the cache again, does not see an update, starts Pinentry-2
  task switch
  Client-1 updates the cache

How ever it will be a rare problem and it would at best be annoying.

Nov 5 2015, 4:24 PM · Info Needed, Bug Report, gnupg, gpgagent
neal removed a project from T1073: [PATCH] fix confusing "Invalid character in name" message: Stalled.
Nov 5 2015, 2:34 PM · Feature Request, gnupg
neal closed T1073: [PATCH] fix confusing "Invalid character in name" message as Resolved.
Nov 5 2015, 2:34 PM · Feature Request, gnupg
neal reopened T1143: better heuristic for choosing an encryption key based on a User ID as "Open".
Nov 5 2015, 2:34 PM · Duplicate, gnupg, Feature Request
neal added a comment to T1143: better heuristic for choosing an encryption key based on a User ID.

Whoops, I closed the wrong bug report, sorry. Reopening.

Nov 5 2015, 2:34 PM · Duplicate, gnupg, Feature Request
neal added a comment to T1073: [PATCH] fix confusing "Invalid character in name" message.

Comitted in a958ffd.

Nov 5 2015, 2:33 PM · Feature Request, gnupg
neal closed T1143: better heuristic for choosing an encryption key based on a User ID as Resolved.
Nov 5 2015, 2:32 PM · Duplicate, gnupg, Feature Request
neal added a comment to T1143: better heuristic for choosing an encryption key based on a User ID.

Comitted in a958ffd.

Nov 5 2015, 2:32 PM · Duplicate, gnupg, Feature Request
neal added a comment to T1060: extract signature from encrypted and signed file/message.

Committed (ec409e6).

Nov 5 2015, 2:21 PM · gnupg (gpg21), gnupg, Debian, Feature Request
neal closed T1067: Please document gpgkey2ssh as Resolved.
Nov 5 2015, 2:16 PM · gnupg, Debian, Feature Request
neal added a comment to T1067: Please document gpgkey2ssh.

Fix in cd2d685.

Nov 5 2015, 2:16 PM · gnupg, Debian, Feature Request
neal added a comment to T1060: extract signature from encrypted and signed file/message.

Verifying the unwrapped data also works:

$ gpg2 --decrypt --unwrap /tmp/a > /tmp/b
Please enter the passphrase to unlock the OpenPGP secret key:
"Testing (insecure!)"
1024-bit RSA key, ID 6EA74366,
created 2015-09-18 (main key ID EE37CF96).

Passphrase:
gpg: encrypted with 1024-bit RSA key, ID 6EA74366, created 2015-09-18

"Testing (insecure!)"

$ gpg2 --verify /tmp/b
gpg: Signature made Wed 04 Nov 2015 01:53:31 PM CET using RSA key ID EE37CF96
gpg: Good signature from "Testing (insecure!)" [full]
gpg: Verified 7 messages signed by "Testing (insecure!)" (key: 362D 3527 F53A
AD19 71AA FDE6 5885 9975 EE37 CF96, policy: good) in the past 1 day, 20 hours.
The most recent message was verified 22 hours, 40 minutes ago.

Nov 5 2015, 12:35 PM · gnupg (gpg21), gnupg, Debian, Feature Request
neal added a comment to T1060: extract signature from encrypted and signed file/message.

D89: 708_0002-gpg-Add-support-for-unwrapping-the-outer-level-of-en.patch

Nov 5 2015, 12:32 PM · gnupg (gpg21), gnupg, Debian, Feature Request
neal added a project to T1060: extract signature from encrypted and signed file/message: In Progress.
Nov 5 2015, 12:32 PM · gnupg (gpg21), gnupg, Debian, Feature Request
neal added a comment to T1060: extract signature from encrypted and signed file/message.

D90: 707_0001-common-Add-a-function-for-copying-data-from-one-iobu.patch

Nov 5 2015, 12:31 PM · gnupg (gpg21), gnupg, Debian, Feature Request
neal added a comment to T1060: extract signature from encrypted and signed file/message.

This implements the requested --unwrap feature. It strips the first level of
encryption and then dumps the data.

$ gpg2 --decrypt --unwrap /tmp/a | gpg2 --list-packets
Please enter the passphrase to unlock the OpenPGP secret key:
"Testing (insecure!)"
1024-bit RSA key, ID 6EA74366,
created 2015-09-18 (main key ID EE37CF96).

Passphrase:
gpg: encrypted with 1024-bit RSA key, ID 6EA74366, created 2015-09-18

"Testing (insecure!)"

off=0 ctb=a3 tag=8 hlen=1 plen=0 indeterminate

:compressed packet: algo=2

off=2 ctb=90 tag=4 hlen=2 plen=13

:onepass_sig packet: keyid 58859975EE37CF96
version 3, sigclass 0x00, digest 8, pubkey 1, last=1

off=17 ctb=cb tag=11 hlen=2 plen=13 new-ctb

:literal data packet:
mode b (62), created 1446641593, name="",
raw data: 7 bytes

off=32 ctb=88 tag=2 hlen=2 plen=156

:signature packet: algo 1, keyid 58859975EE37CF96
version 4, created 1446641611, md5len 0, sigclass 0x00
digest algo 8, begin of digest b7 8a
hashed subpkt 2 len 4 (sig created 2015-11-04)
subpkt 16 len 8 (issuer key ID 58859975EE37CF96)
data: [1023 bits]

Nov 5 2015, 12:31 PM · gnupg (gpg21), gnupg, Debian, Feature Request

Nov 4 2015

neal closed T807: encrypt-to-self option as Resolved.
Nov 4 2015, 1:21 PM · gnupg, Feature Request
neal added a comment to T807: encrypt-to-self option.

Committed in de9b234.

Nov 4 2015, 1:21 PM · gnupg, Feature Request
neal closed T806: default-key could take a list of keys to try as Resolved.
Nov 4 2015, 1:21 PM · gnupg, Feature Request
neal added a comment to T806: default-key could take a list of keys to try.

Committed in e16d716.

Nov 4 2015, 1:21 PM · gnupg, Feature Request
neal added a comment to T1109: Pinentry and cache update race.

I tried running:

  echo | gpg -s -a

in two terminal. In the first terminal, I got a pinentry prompt (I'm using
pinentry-tty) and in the second, gpg2 appeared to freeze. Once I entered my
passphrase correctly in the first terminal, the first gpg2 process split out the
signed message and less than a second later, the second did as well.

The code also suggests that this is fixed (agent/findkey.c)

      /* If the pinentry is currently in use, we wait up to 60 seconds
         for it to close and check the cache again.  This solves a common
         situation where several requests for unprotecting a key have
         been made but the user is still entering the passphrase for
         the first request.  Because all requests to agent_askpin are
         serialized they would then pop up one after the other to
         request the passphrase - despite that the user has already
         entered it and is then available in the cache.  This
         implementation is not race free but in the worst case the
         user has to enter the passphrase only once more. */

Interestingly, this comment is from 2006 (commit: df52700f), which predates this
bug report.

As such, I'm changing this bug's status to needs-eg. Perhaps Werner can shed
some more light on this issue.

Nov 4 2015, 12:17 PM · Info Needed, Bug Report, gnupg, gpgagent
neal added a project to T1109: Pinentry and cache update race: Info Needed.
Nov 4 2015, 12:17 PM · Info Needed, Bug Report, gnupg, gpgagent
aheinecke added a comment to T2134: iconv.dll is still a problem.

I would prefer if for Windows GnuPG would not use iconv at all as the Windows
API already provides encoding conversion calls. Win-iconv is a small wrapper
around Windows API calls to provide iconv API so that no code changes would be
necessary.

https://github.com/win-iconv/win-iconv

It could be treated as just another POSIX helper / wrapper and included directly
in GnuPG (licensed as public domain).

Nov 4 2015, 11:39 AM · Feature Request, gnupg
werner added a comment to T807: encrypt-to-self option.

Frankly, I do not like the hidden key feature in particular if used to
encrypt-to-self. The problem is that if someone encrypts to a group and forgets
to add your key, gpg will do a trial decrypt which is pretty annoying. Maybe we
can add a second kind of wildcard keyid to rfc4880bis which states that this has
been encrypted to the key of the sender

Nov 4 2015, 10:49 AM · gnupg, Feature Request
hloeung added a comment to T2142: Regression in --enable-ssh-support with GnuPG 2.1.8 and 2.1.9?.

I managed to fix this by removing these SSH keys from ~/.gnupg/private-keys-v1.d
and re-adding them with 'ssh-add'.

Nov 4 2015, 1:29 AM · Bug Report, gnupg

Nov 3 2015

neal added a comment to T807: encrypt-to-self option.

The attached patch builds on the patch in #806. It provides a
--encrypt-to-default-key. One could imagine adding an
--hidden-encrypt-to-default-key as well. Werner: is this acceptable?

Nov 3 2015, 11:41 PM · gnupg, Feature Request
neal added a comment to T807: encrypt-to-self option.

D44: 706_0001-gpg-Add-encrypt-to-default-key.patch

Nov 3 2015, 11:41 PM · gnupg, Feature Request
neal added a comment to T806: default-key could take a list of keys to try.

I implemented this as follows: it is possible to specify --default-key multiple
times. The last specified key for which a secret key is available is taken. If
multiple such keys are available, the others are simply ignored. The patch is a
bit noisy, because we need to pass the ctrl structure around. But, I've tested
it as follows:

  gpg2 -a -s --default-key 58859975EE37CF96 --default-key 58859975EE37CF95

and it correctly takes the 96 key, which is available (95 is not).

Werner: thoughts?

Nov 3 2015, 11:20 PM · gnupg, Feature Request
neal added a comment to T806: default-key could take a list of keys to try.

D43: 705_0001-gpg-Allow-multiple-default-key-options.-Take-the-las.patch

Nov 3 2015, 11:20 PM · gnupg, Feature Request
hloeung added a comment to T2142: Regression in --enable-ssh-support with GnuPG 2.1.8 and 2.1.9?.

With 'ssh -vv':

debug1: pubkey_prepare: ssh_fetch_identitylist: invalid format

gpg-agent[26765]: ssh handler 0x7f5429bfd700 for fd 5 started
gpg-agent[26765]: ssh request handler for request_identities (11) started
gpg-agent[26765]: ssh request handler for request_identities (11) ready
gpg-agent[26765]: ssh handler 0x7f5429bfd700 for fd 5 terminated

Nov 3 2015, 2:37 AM · Bug Report, gnupg
hloeung added projects to T2142: Regression in --enable-ssh-support with GnuPG 2.1.8 and 2.1.9?: gnupg, Bug Report.
Nov 3 2015, 2:30 AM · Bug Report, gnupg

Nov 2 2015

gniibe set External Link to https://bugs.debian.org/771263 on T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.
Nov 2 2015, 9:21 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian
gniibe claimed T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.
Nov 2 2015, 9:21 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian

Oct 29 2015

bernhard updated subscribers of T2019: Order of magnitude degradation in performance in gpg2 cf gpg.

@werner
Running with --no-sig-cache took 30 Minutes.
gpg2 --delete-key 52D717F3
time LANG=C gpg2 -v --no-sig-cache --recv-keys 52D717F3
real 29m38.897s

While time LANG=C gpg2 -v --recv-keys 52D717F3 took 2 minutes.
Debian gnupg2 Version: 2.0.26-6 i386.

@neal:
Thanks for working on this, if you think it may may sense to test this
with real data, can you point to the steps required to do this?
(I guess building gpg-2.1-from your git branch, ...)

@All,
any idea what the change between 2.0.25-99intevation2 on Wheezy
and 2.0.26-6 on Jessie could be that would cause this problem?
(Or is it just a few small certs or trust settings more that will cause
this one magnitude higher load)

Oct 29 2015, 3:40 PM · Stalled, Bug Report, gnupg
neal added a comment to T2019: Order of magnitude degradation in performance in gpg2 cf gpg.

I've implemented a new db format. It's still incomplete and experimental, but
it's available from the neal/next branch. Importing
/usr/share/keyrings/debian-keyring.gpg, which contains 751 keys is much faster
using this format:

$ rm pubring.kdb; time gpg2 --no-default-keyring --primary-keyring
gnupg-kdb:pubring.kdb --import debian-keyring.gpg >/dev/null
gpg: Total number processed: 751
gpg: imported: 751

real 0m7.729s
user 0m5.404s
sys 0m0.332s
$ rm pubring.kdx; time gpg2 --no-default-keyring --primary-keyring
gnupg-kbx:pubring.kdx --import debian-keyring.gpg >/dev/null
gpg: Total number processed: 751
gpg: imported: 751
gpg: public key of ultimately trusted key 2183839A not found
gpg: public key of ultimately trusted key BC15C85A not found
gpg: public key of ultimately trusted key EE37CF96 not found

real 1m52.560s
user 0m6.268s
sys 0m31.604s

Running --check-trustdb is almost an order of magnitude faster:

$ time gpg2 --no-default-keyring --primary-keyring gnupg-kdb:pubring.kdb
--check-trustdb
real 0m0.158s
user 0m0.004s
sys 0m0.004s
$ time gpg2 --no-default-keyring --primary-keyring gnupg-kbx:pubring.kbx
--check-trustdb
real 0m0.975s
user 0m0.012s
sys 0m0.032s

Doing a sequential read is a bit slower:

$ time gpg2 --no-default-keyring --primary-keyring gnupg-kdb:pubring.kdb -k |
grep ^pub | wc -l
751

real 0m2.515s
user 0m2.432s
sys 0m0.088s
$ time gpg2 --no-default-keyring --primary-keyring gnupg-kbx:pubring.kdx -k |
grep ^pub | wc -l
gpg: NOTE: THIS IS A DEVELOPMENT VERSION!
gpg: It is only intended for test purposes and should NOT be
gpg: used in a production environment or with production keys!
751

real 0m1.245s
user 0m1.168s
sys 0m0.076s

This is because the interface for doing a full scan of the DB is unsuitable. If
we decide to use the new format, it shouldn't be hard to improve this.

I'd be interested in any feedback and perhaps some more measurements in real
conditions.

Thanks,

Neal

Oct 29 2015, 11:31 AM · Stalled, Bug Report, gnupg
gniibe added a comment to T2095: Stop installing gpg-zip(1).

Thank you for pointing out. It was long standing mistake.
Fixed in the repo.

Oct 29 2015, 2:34 AM · Documentation, Bug Report, gnupg
gniibe added a project to T2095: Stop installing gpg-zip(1): In Progress.
Oct 29 2015, 2:34 AM · Documentation, Bug Report, gnupg