Page MenuHome GnuPG
Feed Advanced Search

Dec 18 2015

gniibe added a comment to T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected.

Fixed in
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=b30c15bf7c5336c4abb1f9dcd974cd77ba6c61a7

Dec 18 2015, 2:52 AM · gnupg24, gnupg26, Bug Report, gpgagent, gnupg (gpg21)
gniibe added a project to T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected: Restricted Project.
Dec 18 2015, 2:52 AM · gnupg24, gnupg26, Bug Report, gpgagent, gnupg (gpg21)

Dec 17 2015

werner added a comment to T1832: gpg --send-keys fails silently if keyserver unavailable.

backported by dkg with commit 0c3d764 for 1.4.19

Dec 17 2015, 3:48 PM · gnupg (gpg14), backport, Bug Report, gnupg
werner removed a project from T1832: gpg --send-keys fails silently if keyserver unavailable: In Progress.
Dec 17 2015, 3:48 PM · gnupg (gpg14), backport, Bug Report, gnupg
werner closed T1832: gpg --send-keys fails silently if keyserver unavailable as Resolved.
Dec 17 2015, 3:48 PM · gnupg (gpg14), backport, Bug Report, gnupg
gniibe added a comment to T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected.

I'm considering fixing this.

Dec 17 2015, 1:13 PM · gnupg24, gnupg26, Bug Report, gpgagent, gnupg (gpg21)
gniibe claimed T2169: Smartcard card-edit generate fails when off-card backup of encryption key is selected.
Dec 17 2015, 1:13 PM · gnupg24, gnupg26, Bug Report, gpgagent, gnupg (gpg21)

Dec 16 2015

aheinecke closed T2191: Only encrypt does not work if S/MIME support is disabled as Resolved.
Dec 16 2015, 5:32 PM · Bug Report, gnupg, gpgol
aheinecke added a comment to T2191: Only encrypt does not work if S/MIME support is disabled.

Fixed with rev. b879f5b

Dec 16 2015, 5:32 PM · Bug Report, gnupg, gpgol
neal added a comment to T2186: --encrypt-to ambiguous with a expired and revoked key.

I've implemented this in fc010b6. If you get a chance to test it, I'd
appreciate any feedback! Thanks!

Dec 16 2015, 2:45 PM · gnupg24, Feature Request
neal added a project to T2186: --encrypt-to ambiguous with a expired and revoked key: Restricted Project.
Dec 16 2015, 2:45 PM · gnupg24, Feature Request
neal added a comment to T2198: --encrypt-to finds bogus ambiguity.

This is a bug and was fixed in 2e4e10c1. As you correctly observe, it only
impacts fingerprints and thus your workaround is good. Sorry about that!

Dec 16 2015, 1:07 PM · Bug Report, gnupg
neal closed T2198: --encrypt-to finds bogus ambiguity as Resolved.
Dec 16 2015, 1:07 PM · Bug Report, gnupg
neal added a comment to T2195: keyring: cache consistency problem.

To do writes, we use a copy-update-move scheme. Thus, all updates are atomic.
A read fopen()s the keyring or keybox, seeks and reads. If an update occurs
between the seek and read, the reader will see the old version: fopen is
associated with the inode, not the filename:

  reader                writer
  -------               -------
  fopen("keyring.pub")
  seek(fp)
                         cp("keyring.pub", "keyring.pub~")
                         update("keyring.pub~")
                         mv("keyring.pub~", "keyring.pub")
  read(fp)

Thus, writers don't interfere with readers.

We need to lock the underlying file for updates to avoid the case in which two
updates occur nearly simultaneously, but only one is saved. (Also, since the
updates occur in keyring.pub~, we need to ensure exclusive access to that file.)

  writer1                           writer2
  -------                           -------
  cp("keyring.pub", "keyring.pub~")
  update("keyring.pub~")
                                    cp("keyring.pub", "keyring.pub~")
                                    update("keyring.pub~")
  mv("keyring.pub~", "keyring.pub")
                                    mv("keyring.pub~", "keyring.pub")

In the above case, writer1's update is lost. (Note: it could be worse: if both
update keyring.pub~ simultaneously, there could be corruption.)

The bug that I'm describing below only has to do with the key present cache,
which becomes inconsistent, because we don't track external writes.

Dec 16 2015, 10:49 AM · Bug Report, gnupg
gniibe added a comment to T2106: Support SHA-256 fingerprints for ssh.

It is base64 trimmed the last '='.

Introducing new specifier, say %f, would be good, while keeping %F as is.
%f includes the hash algorithm string as SSH does.

Dec 16 2015, 2:45 AM · gnupg (gpg22), gnupg, ssh, Feature Request
gniibe added a comment to T2195: keyring: cache consistency problem.

I think that current lock/unlock mechanism is only for mutual exclusion between
multiple writers. I mean, lock/unlock is done to avoid inconsistency caused by
multiple writers.

It seems that we forget to implement mutual exclusion between writers and
readers, as Neal described.

Before 2.1.10, the write access was limited to specific interactive usage
patterns and it didn't cause major problems (it caused rarely if happened).
Now, I think that we should implement mutual exclusion between readers and writers.

Dec 16 2015, 1:45 AM · Bug Report, gnupg
nrickert added projects to T2198: --encrypt-to finds bogus ambiguity: gnupg, Bug Report.
Dec 16 2015, 12:21 AM · Bug Report, gnupg

Dec 15 2015

neal added a project to T2197: --disable-tofu seems to also disable gnutls: gnupg.
Dec 15 2015, 10:30 PM · gnupg, Bug Report
neal added a project to T2164: Use pool.sks-keyservers.net directly as default in dirmngr.conf-skel (instead of the CNAME): gnupg.
Dec 15 2015, 9:54 PM · Won't Fix, gnupg, Feature Request
neal added projects to T2196: keydb locking can result in deadlock: gnupg, Bug Report.
Dec 15 2015, 8:14 PM · Bug Report, gnupg
neal added a comment to T2193: keyring / keybox race.

D342: 738_0001-gpg-Fix-TOCTTOU-when-updating-keyblocks.patch

Dec 15 2015, 8:08 PM · Bug Report, gnupg
neal added a comment to T2193: keyring / keybox race.

I've attached a fix that does a very small and straightforward modification to
keydb_update_keyblock, which fixes this problem for both the keyring and keybox.

Dec 15 2015, 8:08 PM · Bug Report, gnupg
guilhem removed a project from T2176: --default-key and --local-user stopped working with gpg 2.1.10 and offline master keys: Restricted Project.
Dec 15 2015, 4:00 PM · gnupg, Bug Report
guilhem closed T2176: --default-key and --local-user stopped working with gpg 2.1.10 and offline master keys as Resolved.
Dec 15 2015, 4:00 PM · gnupg, Bug Report
guilhem set Version to 2.1.10 on T2176: --default-key and --local-user stopped working with gpg 2.1.10 and offline master keys.
Dec 15 2015, 4:00 PM · gnupg, Bug Report
guilhem added a comment to T2176: --default-key and --local-user stopped working with gpg 2.1.10 and offline master keys.

I confirm that I'm not able to reproduce T2176 (guilhem on Dec 11 2015, 02:21 PM / Roundup) nor T2176 (guilhem on Dec 11 2015, 01:07 PM / Roundup) with 4ffe44c, so
I'm changing the issue to “resolved”. Thanks for the prompt action!

Dec 15 2015, 4:00 PM · gnupg, Bug Report
neal added a comment to T2193: keyring / keybox race.

My proposed solution is to change keydb_update_keyblock. We don't actually need
to touch the keybox or keyring code.

By the new behavior, I guess you mean getting an error when deleting a key, but
it fails because another process already deleted it. If something like this
were to current occur, then we'd end up with silent corruption. So, it's not
clear how this new behavior would introduce new behavior that could raise problems.

Dec 15 2015, 1:50 PM · Bug Report, gnupg
werner added a comment to T2193: keyring / keybox race.

atomicly here mean that the update/insert functions locate an possibly existing
key using the fingerprint while holding the lock.

Anyway, to really fix that we need a daemon taking control of all keys - a task
for 2.3,

Dec 15 2015, 12:47 PM · Bug Report, gnupg
werner added a comment to T2193: keyring / keybox race.

I was aware of that problem but always wondered why I never noticed such a case.
Your analysis is correct and explains the problem. The locking of the keyblock
does not help here (it was introduced only a few years ago).

Instead of making use of found.offset and fix that with your suggested trick we
should not use the offset at all but let the update and insert functions handle
it atomicly - this may result in an insert/update error (e.g. if another process
inserted/deleted the key) but that is an expected outcome if two processes
manipulate the same key.

This should not be fixed for the old keyring format but only for the keybox format:

  1. The keyring format is deprecated
  2. This introduces a new behaviour and may raise other problems.

If you want to fix that, please do that in a new branch.

Dec 15 2015, 12:44 PM · Bug Report, gnupg
neal added a comment to T2187: gpg2 --gen-revoke 0x${FINGERPRINT} produces infinite output stream.

This should be fixed in 2e4e10c. Please let me know if it works for you (and
feel free to mark this bug as resolved if it does).

Dec 15 2015, 12:22 PM · Bug Report, gnupg
neal added a project to T2187: gpg2 --gen-revoke 0x${FINGERPRINT} produces infinite output stream: Restricted Project.
Dec 15 2015, 12:22 PM · Bug Report, gnupg
neal added a project to T2176: --default-key and --local-user stopped working with gpg 2.1.10 and offline master keys: gnupg.
Dec 15 2015, 11:17 AM · gnupg, Bug Report
neal added projects to T2195: keyring: cache consistency problem: gnupg, Bug Report.
Dec 15 2015, 11:10 AM · Bug Report, gnupg
neal added projects to T2194: keyring: cache consistency problem: gnupg, Bug Report.
Dec 15 2015, 11:03 AM · Bug Report, gnupg
neal added a comment to T2187: gpg2 --gen-revoke 0x${FINGERPRINT} produces infinite output stream.

I found the bug. I'll try to create a patch soon. Thanks for reporting this.

Dec 15 2015, 10:51 AM · Bug Report, gnupg
neal added a comment to T2186: --encrypt-to ambiguous with a expired and revoked key.

This is a good suggestion. Thanks.

Dec 15 2015, 9:01 AM · gnupg24, Feature Request
neal added a comment to T2187: gpg2 --gen-revoke 0x${FINGERPRINT} produces infinite output stream.

Just to be clear: you tested with, say, a long key id, and the output was fine?
In other words, the problem only occurs when specifying a fingerprint?

Dec 15 2015, 8:19 AM · Bug Report, gnupg
gniibe added a project to T1686: GPG Smartcard daemons not detecting card change Windows 8.1: Restricted Project.
Dec 15 2015, 5:23 AM · gnupg, Windows 32, gnupg (gpg20), Windows, Bug Report
gniibe added a comment to T1686: GPG Smartcard daemons not detecting card change Windows 8.1.

I think that this was fixed in:
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=d1a97585c5e73fbc7d4cf90e38f76ffc5aea305f

It will be in 2.1.11 and 2.0.30.

Dec 15 2015, 5:23 AM · gnupg, Windows 32, gnupg (gpg20), Windows, Bug Report
gniibe closed T1081: scd: "card error" after usb reader plug/unplug cycle, needs hard restart as Resolved.
Dec 15 2015, 5:15 AM · gnupg, gpg4win, scd, Feature Request
gniibe added a comment to T1081: scd: "card error" after usb reader plug/unplug cycle, needs hard restart.

I confirmed that this is fixed in 2.0 and 2.1.

Dec 15 2015, 5:15 AM · gnupg, gpg4win, scd, Feature Request
gniibe added a project to T2154: encrypt_dek ignores gcry_pk_encrypt return value: In Progress.
Dec 15 2015, 4:43 AM · In Progress, Bug Report, gnupg
gniibe claimed T2154: encrypt_dek ignores gcry_pk_encrypt return value.
Dec 15 2015, 4:43 AM · In Progress, Bug Report, gnupg
gniibe added a comment to T2154: encrypt_dek ignores gcry_pk_encrypt return value.

Thank you. There is no reason. It is fixed in:

http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=4ee881bff4c8fdfa4b3b7a4b7afab611471e97f1

Dec 15 2015, 4:43 AM · In Progress, Bug Report, gnupg
gniibe claimed T2153: agent_pksign_do ignores do_encode_raw_pkcs1 do_encode_md return values.
Dec 15 2015, 4:36 AM · Bug Report, gnupg
gniibe added a comment to T2153: agent_pksign_do ignores do_encode_raw_pkcs1 do_encode_md return values.

Thank you for your audit.

It ignores the calculated value if it detects failure of gcry_pk_verify.
This is now a kind of standard practice to avoid possible attacks.

Here is a reference:
https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/

Dec 15 2015, 4:36 AM · Bug Report, gnupg
gniibe added a comment to T2150: Generating keys on OpenPGP card yields wrong public key.

For my case with OpenPGPcard, the patch fixed the problem of wrong fingerprint
computation. Please test with the patch.

Dec 15 2015, 1:11 AM · Bug Report, gnupg, gnupg (gpg21)
gniibe added a comment to T2150: Generating keys on OpenPGP card yields wrong public key.

Sorry for my mistake for reading your post. I considered it would be the case
for m, but I also fixed the case for e, the exponent.
Here, I reproduce the problem with OpenPGPcard (while it only occurs 1/256 with
Gnuk Token).
I confirmed that original OpenPGPcard returns e as four bytes 00 01 00 01 with
0x00 in front. This causes 100% failure for fingerprint computation.
I'm going to test the patch with OpenPGPcard. (I'm now installing newer
libgpg-error, to build master of GnuPG.)

Dec 15 2015, 12:47 AM · Bug Report, gnupg, gnupg (gpg21)

Dec 14 2015

neal added a comment to T2193: keyring / keybox race.

Note the corruption that occurs is rather subtle. It occurs silently, because
copy_some_packets doesn't throw an error if the next packet to process doesn't
start on STOPOFF, but continues until the offset of the next packet to process
is at *or exceeds* STOPOFF.

Imagine that we have a keyblock A at offset 0 and a second keyblock B at offset
100 with 2 packets:

  • A
  • B
  • The first gpg process does a search for the key at offset 100
  • A second process looks up and updates the key block (A') at offset 0 such

that it now has a length of 150 and 4 packets after offset 100.

  1. The initial process "updates" B to B'. hd->found.offset now point into the

middle of A'. In keyring.c:do_copy, the first 100 bytes plus any bytes required
to complete the last packet are copied (by copy_some_packets). The next 2
packets are deleted (skip_some_packets) and the new keyblock is inserted. We
now have the following:

  • 100+ bytes of A'
  • B'
  • Last two packets of A'
  • B

And B appears to be duplicated.

Dec 14 2015, 9:30 PM · Bug Report, gnupg
neal added a comment to T2193: keyring / keybox race.

Note: there is also a TOCTTOU bug for keydb_search / keydb_get_keyblock.

Dec 14 2015, 9:13 PM · Bug Report, gnupg
neal updated subscribers of T2193: keyring / keybox race.
Dec 14 2015, 9:07 PM · Bug Report, gnupg
neal added projects to T2193: keyring / keybox race: gnupg, Bug Report.
Dec 14 2015, 9:07 PM · Bug Report, gnupg
gp_ast added a comment to T1973: Wrong line endings when decrypting to console.

Hi Neal, I am not able to reproduce the issue with GnuPG 2.1.10 anymore.

Dec 14 2015, 6:30 PM · Windows 32, Windows, Bug Report, gnupg
boehmtho added a comment to T1624: Gpgtar fails when files have non ASCII characters.

Hello Andre,

Dec 14 2015, 2:11 PM · gnupg, Windows 32, Windows, Bug Report
aheinecke added projects to T2191: Only encrypt does not work if S/MIME support is disabled: gpgol, gnupg, Bug Report.
Dec 14 2015, 12:53 PM · Bug Report, gnupg, gpgol
aheinecke changed Version from 2.0.29 to 2.1.10 on T2135: Keyring locking on Windows broken.
Dec 14 2015, 12:27 PM · Bug Report, gpg4win, Windows, gnupg, Windows 32
aheinecke reassigned T2135: Keyring locking on Windows broken from aheinecke to werner.
Dec 14 2015, 12:27 PM · Bug Report, gpg4win, Windows, gnupg, Windows 32
aheinecke added a comment to T2135: Keyring locking on Windows broken.

I've checked that 2.1.10 still has the problem. So back to you.

You can ping me directly if you need any debug logs or so.

Dec 14 2015, 12:27 PM · Bug Report, gpg4win, Windows, gnupg, Windows 32
nervengiftlabs added a comment to T2150: Generating keys on OpenPGP card yields wrong public key.

gniibe: its not one failure in 248. It was 248 failures in 248 tries...

werner: I had to downgrade to have a working system. I hope I'll find time to
reproduce this this week

Dec 14 2015, 12:00 PM · Bug Report, gnupg, gnupg (gpg21)
justus added a comment to T2106: Support SHA-256 fingerprints for ssh.

It seems to be base64:

% ssh -V
OpenSSH_7.1p1 Debian-3, OpenSSL 1.0.2e 3 Dec 2015
% ssh-keygen -l -f .ssh/known_hosts -F playfair.gnupg.org -E md5 -q
playfair.gnupg.org RSA MD5:cc:dd:46:8e:ef:3d:d9:34:97:f8:b8:5a:59:51:80:4a
% ssh-keygen -l -f .ssh/known_hosts -F playfair.gnupg.org -E sha256 -q
playfair.gnupg.org RSA SHA256:KCh034SD0rMKqCkJbdH2wx354s1278tqt9F+xb5cidg

Dec 14 2015, 11:56 AM · gnupg (gpg22), gnupg, ssh, Feature Request
gniibe added a comment to T2150: Generating keys on OpenPGP card yields wrong public key.

Thank you for the bug report. The ratio of 1 failure among 248 made me a great
hint to locate the bug.

I think that it is fingerprint computation bug, which is fixed here:
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=d40975cbe8ff86fcc4a1b4963fdffc66ddee85ce

Dec 14 2015, 6:45 AM · Bug Report, gnupg, gnupg (gpg21)
gniibe added a project to T2150: Generating keys on OpenPGP card yields wrong public key: Restricted Project.
Dec 14 2015, 6:45 AM · Bug Report, gnupg, gnupg (gpg21)
gniibe claimed T2150: Generating keys on OpenPGP card yields wrong public key.
Dec 14 2015, 6:45 AM · Bug Report, gnupg, gnupg (gpg21)

Dec 12 2015

dkg added projects to T2187: gpg2 --gen-revoke 0x${FINGERPRINT} produces infinite output stream: gnupg, Bug Report.
Dec 12 2015, 10:47 PM · Bug Report, gnupg
dkg set Version to 2.1.10 on T2187: gpg2 --gen-revoke 0x${FINGERPRINT} produces infinite output stream.
Dec 12 2015, 10:47 PM · Bug Report, gnupg
ostcar set Version to 2.1.10 on T2186: --encrypt-to ambiguous with a expired and revoked key.
Dec 12 2015, 1:16 PM · gnupg24, Feature Request
ostcar added projects to T2186: --encrypt-to ambiguous with a expired and revoked key: gnupg, Bug Report.
Dec 12 2015, 1:16 PM · gnupg24, Feature Request

Dec 11 2015

aheinecke added a comment to T1691: Charset / codepage problems in GnuPG 2.0.26 on MS Windows.

Thanks for helping keep track of all these issues.

Yes this only fixes the problem that has already been fixed in the last Gpg4win
Versions. So that this will be fixed in future gnupg-2.1 versions.

Still to help us better seperate the problems I would like to close this as for
me this bug was about "Wrong encoding in a localized version".

  • the more critical "passphrase with non ASCII characters" problem (as reported

only here, see T1691 (andreaerdna on Aug 19 2014, 02:36 AM / Roundup)); does this bug need a
dedicated new Issue to be addressed and solved?

I actually overlooked this in this issue. Can you please open another issue for
that. And add me to the Nosy.

  • the "utf-8 encoding of encrypted filenames" / "strange behaviour of --utf8-

strings, --no-utf8-strings and --charset options" (as reported in Issue 1409 ad
probably similar to Gpgtar Issue 1624 / Gpa Issue 2185)

If this problem was still existing with gpg4win this is still a problem.

  • the "charset weirdness searching keyserver for some non-ASCII user IDs under

non-UTF-8 locales" (as reported in Issue 1514).

This appears not to be windows specific. Also I think this works except for
cases where the Key in question is problematic. If I search on windows for
emanuel@intevation.de I get the correct Umlauts shown. Might be a Problem though
for characters that are unrepresentable in the 8 Bit codepage.

Dec 11 2015, 4:21 PM · gnupg (gpg14), gnupg (gpg20), Windows 32, gpg4win, Windows, Bug Report, gnupg
aheinecke claimed T1409: GnuPG ignores --use-utf8-strings for encrypted filenames (Windows).
Dec 11 2015, 4:14 PM · Bug Report, gnupg
aheinecke added a comment to T1409: GnuPG ignores --use-utf8-strings for encrypted filenames (Windows).

I'll try to look into that.

Dec 11 2015, 4:14 PM · Bug Report, gnupg
andreaerdna reopened T1691: Charset / codepage problems in GnuPG 2.0.26 on MS Windows as "Open".
Dec 11 2015, 3:43 PM · gnupg (gpg14), gnupg (gpg20), Windows 32, gpg4win, Windows, Bug Report, gnupg
andreaerdna added a comment to T1691: Charset / codepage problems in GnuPG 2.0.26 on MS Windows.

It sounds great!

So this patch, as the previous one, solves the "incorrect display of GPG 2
output translated into another language" (as reported here and previously also
in Issue 1373 and Issue 1674).

Does this patch solve also the "incorrect display of filenames with non ASCII
characters" (as reported here and previously also in Issue 1409)?

By the way, as I understand, this patch doesn't fix:

  • the more critical "passphrase with non ASCII characters" problem (as reported

only here, see T1691 (andreaerdna on Aug 19 2014, 02:36 AM / Roundup)); does this bug need a
dedicated new Issue to be addressed and solved?

  • the "utf-8 encoding of encrypted filenames" / "strange behaviour of --utf8-

strings, --no-utf8-strings and --charset options" (as reported in Issue 1409 ad
probably similar to Gpgtar Issue 1624 / Gpa Issue 2185)

  • the "charset weirdness searching keyserver for some non-ASCII user IDs under

non-UTF-8 locales" (as reported in Issue 1514).

Dec 11 2015, 3:43 PM · gnupg (gpg14), gnupg (gpg20), Windows 32, gpg4win, Windows, Bug Report, gnupg
werner added a project to T2182: Why does GPG ciphertext length differ with fixed plaintext length?: Duplicate.
Dec 11 2015, 1:11 PM · Support, Duplicate, gnupg
werner added a comment to T2182: Why does GPG ciphertext length differ with fixed plaintext length?.

Please do not open another bug but comment on the very same bug you posted a few
days ago (issue2166).

In any case, this is a question and not appropriate for a bug tracker. Use one
of the mailing lists for such questions or see https://gnupg.org/service.html
for commercial support offers.

Dec 11 2015, 1:11 PM · Support, Duplicate, gnupg
werner added a comment to T2182: Why does GPG ciphertext length differ with fixed plaintext length?.

Duplicate of T2166

Dec 11 2015, 1:11 PM · Support, Duplicate, gnupg
aheinecke closed T1691: Charset / codepage problems in GnuPG 2.0.26 on MS Windows as Resolved.
Dec 11 2015, 1:10 PM · gnupg (gpg14), gnupg (gpg20), Windows 32, gpg4win, Windows, Bug Report, gnupg
aheinecke added a comment to T1691: Charset / codepage problems in GnuPG 2.0.26 on MS Windows.

After some more discussion and testing in the development jabber channel werner
agreed to include this patch. Pushed to libgpg-error with 823e858. So this will
hopefully be part of the first gnupg modern release that will include localization.

Dec 11 2015, 1:10 PM · gnupg (gpg14), gnupg (gpg20), Windows 32, gpg4win, Windows, Bug Report, gnupg
werner removed a project from T2182: Why does GPG ciphertext length differ with fixed plaintext length?: Bug Report.
Dec 11 2015, 1:07 PM · Support, Duplicate, gnupg
werner closed T2182: Why does GPG ciphertext length differ with fixed plaintext length? as Invalid.
Dec 11 2015, 1:07 PM · Support, Duplicate, gnupg
werner added a project to T2182: Why does GPG ciphertext length differ with fixed plaintext length?: Support.
Dec 11 2015, 1:07 PM · Support, Duplicate, gnupg
werner lowered the priority of T2182: Why does GPG ciphertext length differ with fixed plaintext length? from High to Normal.
Dec 11 2015, 1:07 PM · Support, Duplicate, gnupg
aheinecke added a project to T1624: Gpgtar fails when files have non ASCII characters: gnupg.
Dec 11 2015, 11:54 AM · gnupg, Windows 32, Windows, Bug Report
aheinecke added a comment to T1691: Charset / codepage problems in GnuPG 2.0.26 on MS Windows.

D210: 737_0001-Fix-windows-8bit-encoding-conversion.patch

Dec 11 2015, 11:32 AM · gnupg (gpg14), gnupg (gpg20), Windows 32, gpg4win, Windows, Bug Report, gnupg
aheinecke changed Version from 2.0.26 to 2.1 on T1691: Charset / codepage problems in GnuPG 2.0.26 on MS Windows.
Dec 11 2015, 11:32 AM · gnupg (gpg14), gnupg (gpg20), Windows 32, gpg4win, Windows, Bug Report, gnupg
aheinecke added a comment to T1691: Charset / codepage problems in GnuPG 2.0.26 on MS Windows.

Updated Patch against libgpg-error where this code now lives.

Please apply this patch or something similiar.

The problem I can see is that with this code in libgpg-error now GUI
applications may use it which want to get "GUI Native".

Probably better to introduce a new function "wchar_to_console" ? And use it from
GnuPG. Does GPA use that conversion function?

Might be a good time for this now where gnupg master already depends on new
symbols in libgpg-error.

Dec 11 2015, 11:32 AM · gnupg (gpg14), gnupg (gpg20), Windows 32, gpg4win, Windows, Bug Report, gnupg
inharinath added projects to T2182: Why does GPG ciphertext length differ with fixed plaintext length?: gnupg, Bug Report.
Dec 11 2015, 8:37 AM · Support, Duplicate, gnupg
gniibe added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

Thank you for your testing.

Your change is pushed with my comment:
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=d1a97585c5e73fbc7d4cf90e38f76ffc5aea305f

I'll backport this to GnuPG 2.0.

Dec 11 2015, 1:07 AM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report

Dec 10 2015

dhoffend added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

Dec 10 2015, 3:33 PM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
dhoffend added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

Here's the logfile with all the errors (guru debug level) vanilla 2.1.10

Dec 10 2015, 3:33 PM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
dhoffend added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

Dec 10 2015, 3:32 PM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
dhoffend added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

After some time spending fighting with the build tools of gnupg (cross compile
for windows under debian) I managed to build the installer with my patched
file.

Most important: The most common error thrown is the 0x8010001e
(E_SERVICE_STOPPED) This is the important one. The other error 0x8010001d
(E_NO_SERVICE) is only thrown in the transition from ok to stopped. So only
sometimes.

This was my process:

git clone git://git.gnupg.org/gnupg.git
cd gnupg
git checkout tags/gnupg-2.1.10
./autogen.sh
cat ../0001-scd-Fix-removal-of-unplugged-usb-readers.patch | patch -p1
sed -i -e 's/^SELFCHECK=1/SELFCHECK=0/' build-aux/speedo.mk
make -f build-aux/speedo.mk w32-installer

I've created new logfiles (vanilla 2.1.10 und patched 2.1.10) to show the
difference and confirm that it'S actually working now :-)

Dec 10 2015, 3:32 PM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
dhoffend added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

I'm okay with signing off the commit. I can test this for Windows 8.1 or 10,
my only problem is that I'm not able to compile gpg for windows right now. Or
are there instructions somewhere on how to achieve this?

Dec 10 2015, 9:11 AM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
gniibe added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

Thank you again.

I think that Windows 8 (and later) changed the PC/SC service. The service is
only available when smartcard is there, and after the removal, it returns
PCSC_E_NO_SERVICE error. This is not expected for current code.

I'm applying your patch with my comment like above. Do you agree to put the
line in the commit log?:

   Signed-off-by: Daniel Hoffend <dh@dotlan.net>

I don't have Windows 8 machine. So, I leave this issue as testing.

Dec 10 2015, 3:15 AM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
gniibe added a project to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon: Restricted Project.
Dec 10 2015, 3:15 AM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
gniibe closed T2052: Segfault in gpg-agent running with --enable-ssh-support on OS X 10.10 Yosemite as Resolved.
Dec 10 2015, 1:21 AM · MacOS, Bug Report, gnupg
gniibe added a comment to T2052: Segfault in gpg-agent running with --enable-ssh-support on OS X 10.10 Yosemite.

Closing, I assume it's the same bug of 2112, which was fixed.

Dec 10 2015, 1:21 AM · MacOS, Bug Report, gnupg
dhoffend changed Version from 2.1.9 to 2.1.10 on T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.
Dec 10 2015, 12:54 AM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
dhoffend added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

No, I just installed version 2.1.10 (which included your mentioned fix). But the
error still applies.

In my case the smartcard reader never gets closed, cause the error thrown by the
pcsc/scd gets only mapped to a general_error which does not result in
removing/closing the reader interface.

I've the feeling that we've to take a closer look at the errors thrown (at least
those 2 in my patch). Maybe there're even more possible events.

If you like I can upload the debug log of scdaemon 2.1.10 ... (if that helps).

Somehow I don't have any issues when running linux, this bug applies to windows
only atm. Maybe it's just that windows is throwing different errors or events
compared to linux.

Dec 10 2015, 12:54 AM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
gniibe claimed T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.
Dec 10 2015, 12:39 AM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
gniibe added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

Thank you for the bug report with log.

It could be related to the bug which was just fixed:
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff;h=f42c50dbf00c2e6298ca6830cbe6d36805fa54a3

I'm backporting this to 2.0.x.

Dec 10 2015, 12:39 AM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report