Page MenuHome GnuPG
Feed Advanced Search

Jan 28 2016

lorenz added a comment to T2230: gpgsm decryption with smartcard fails with "Invalid session key".

Thanks for looking at this!

I am on openSUSE (Tumbleweed), my gnupg version is
lorenz@host:~/gpgsm_problem> gpgsm --version
gpgsm (GnuPG) 2.1.10
libgcrypt 1.6.4
libksba 1.3.3
Copyright (C) 2015 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: ~/.gnupg
Supported algorithms:
Cipher: 3DES, AES128, AES192, AES256, SERPENT128, SERPENT192, SERPENT256, SEED,
CAMELLIA128, CAMELLIA192, CAMELLIA256
Pubkey: RSA, ECC
Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224, WHIRLPOOL

If I run

  gpgsm --debug 4 -d gpgsm_encrypted

the same session key is printed that my script got

Here is a full transcript:

lorenz@host:~/gpgsm_problem> gpgsm --debug 4 -d gpgsm_encrypted
gpgsm: reading options from '/home/lorenz/.gnupg/gpgsm.conf'
gpgsm: enabled debug flags: crypto
gpgsm: failed to open '/home/lorenz/.gnupg/policies.txt': No such file or directory
gpgsm: Note: non-critical certificate policy not allowed
gpgsm: DBG: signature value: 28 37 3A 73 69 67 2D 76 61 6C 28 33 3A 72 73 61 28
31 3A 73 32 35 36 3A 75 46 91 66 A9 B6 A0 46 03 85 68 F1 E8 A5 37 14 30 BA E5 B6
A2 D6 5C E8 26 31 C7 9A AF 27 96 54 CD 6D 73 8C 70 73 CA C9 E9 73 9C E2 B3 5E 50
9B 7D 6A 5E C7 9E C4 34 FE 1B E1 9C DC 14 56 3F F4 29 A2 07 47 9D A5 5D 0E BE C3
F3 6E E6 49 3C 96 BB 43 3A 5B 1C 56 10 E3 3B 0C 3F 67 2F 31 B9 BF B7 38 4F CA C7
55 20 AC 50 76 6A CB FC C9 15 29 D5 10 89 31 88 A9 87 ED DC 2B A3 7C 22 E5 04 4F
16 A8 32 DF 62 56 B1 88 C8 80 0B 4B 93 E7 8A D4 35 D3 14 62 40 FB 87 82 EF E3 4F
DE ED 27 BF 0B 01 B1 49 C5 20 03 1A 04 87 31 55 14 7F B3 91 31 8A A8 E5 0C CF CE
25 77 6C A1 5C 5D EB 74 D5 28 4D DB 90 6A 87 B3 91 48 A0 72 10 2C C7 DD DA 2F E0
2E AA D1 BD D0 16 50 DB 30 12 08 C4 3A 62 DB 4F 77 E1 5E 18 ED 22 C1 70 32 2F C3
6A DE 66 B2 47 52 48 B2 86 B1 32 6C 6E 27 04 12 A8 E1 48 8A 29 29 28 34 3A 68 61
73 68 36 3A 73 68 61 32 35 36 29 29
gpgsm: DBG: encoded hash: 00 01 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 00 30 31
30 0D 06 09 60 86 48 01 65 03 04 02 01 05 00 04 20 82 A4 B2 5B 4E 14 77 27 0B 73
12 97 8F 56 FC 61 42 7E 37 3F 8B 74 3F 4E 40 2D 38 C1 08 47 32 6C
DBG: rsa_verify
data:+01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffff003031300d06096086480165030402010500042082 \
DBG: a4b25b4e1477270b7312978f56fc61427e373f8b743f4e402d38c10847326c
DBG: rsa_verify
sig:+75469166a9b6a046038568f1e8a5371430bae5b6a2d65ce82631c79aaf279654 \
DBG:
cd6d738c7073cac9e9739ce2b35e509b7d6a5ec79ec434fe1be19cdc14563ff4 \
DBG:
29a207479da55d0ebec3f36ee6493c96bb433a5b1c5610e33b0c3f672f31b9bf \
DBG:
b7384fcac75520ac50766acbfcc91529d510893188a987eddc2ba37c22e5044f \
DBG:
16a832df6256b188c8800b4b93e78ad435d3146240fb8782efe34fdeed27bf0b \
DBG:
01b149c520031a04873155147fb391318aa8e50ccfce25776ca15c5deb74d528 \
DBG:
4ddb906a87b39148a072102cc7ddda2fe02eaad1bdd01650db301208c43a62db \
DBG:
4f77e15e18ed22c170322fc36ade66b2475248b286b1326c6e270412a8e1488a
DBG: rsa_verify
n:+d851729ea0d4cb8241b06da9e2e2b96e6b98f39732127c79da8ffe6a4be9a88d \
DBG:
0a80fde61ad1b1ae732955e61c90bb2273edde2045c91d84c0d5f03648c44454 \
DBG:
22c1655c58fa1c61e36998e58481dba384b5d868cb8531f9619dfb3bb307570d \
DBG:
0bfc9861cd423111233565f453ff12ea873da27496234fdf16f4e16fccf813d3 \
DBG:
2add89e33390b533e57fdfa58f0cbb26018319dd741251c3a66d9617429a5e05 \
DBG:
f10df9a526fc276a80362c2e255bb75824e02ffc9da37780f2f0e278c319ecef \
DBG:
8bd700270b305b1c08c9e47eb153507b9a5c26bbb577a53a0a3e07169a53b41d \
DBG:
c4e96baf0c70d4c61a263ca4ed3f467d5f5e4a8361ff33d253dd5945b16ccd51
DBG: rsa_verify e:+010001
DBG: rsa_verify
cmp:+01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffff003031300d06096086480165030402010500042082 \
DBG: a4b25b4e1477270b7312978f56fc61427e373f8b743f4e402d38c10847326c
DBG: rsa_verify => Good
gpgsm: certificate is good
gpgsm: failed to open '/home/lorenz/.gnupg/policies.txt': No such file or directory
gpgsm: Note: non-critical certificate policy not allowed
gpgsm: DBG: signature value: 28 37 3A 73 69 67 2D 76 61 6C 28 33 3A 72 73 61 28
31 3A 73 32 35 36 3A 3F DC 77 C2 D3 F0 64 6C AE 20 91 39 59 AF F4 E8 EC B3 F2 B4
BA 19 9A 85 9D 7B 8D 07 59 B8 F8 38 FF 54 7D 5D 80 5D 5B 7C B2 9B 86 48 61 6B DB
ED 8B DD 8E 78 1B 5D 62 0F E6 CF CA AF 78 52 64 7E B7 74 5C F0 57 FF 15 EA 7E DE
E7 A5 CA 73 DE F6 F5 B4 1D B9 39 C0 B3 EF 98 4F 15 14 CB 4E 69 16 76 B8 EC DB FD
04 26 E2 4B 91 13 5D 42 99 3C C2 09 03 4D 57 C0 0E F2 5E 41 4F F9 B4 5D 98 94 6C
16 7F 30 78 A6 E3 9C E1 35 76 6E B8 B5 7E AE A5 F3 F5 37 C8 56 90 67 EC 23 0C 8E
D8 DE 3B 49 31 EB BF 4F D5 3E 51 E1 2B 16 1D 2D 64 34 EE A6 C4 D6 9F C8 BD 05 B2
98 84 90 7B 02 C1 8E 63 BB DA 05 81 E2 87 06 03 67 D3 AC 3E F7 C2 7D BD 5F 86 6C
47 51 E7 D3 9C 62 E8 F2 D0 D3 A1 D0 3B 11 91 AD 2F 5E 10 3D 14 42 81 D8 CD FD 45
D1 AD E8 FB 36 3A 3A 7C 8D 69 C0 A6 77 85 6B 60 67 52 B4 1C 29 29 28 34 3A 68 61
73 68 36 3A 73 68 61 32 35 36 29 29
gpgsm: DBG: encoded hash: 00 01 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 00 30 31
30 0D 06 09 60 86 48 01 65 03 04 02 01 05 00 04 20 AC 84 B9 EC BF F8 15 90 76 00
F8 4A 76 2E 6E 51 C9 40 2B 43 D9 FB 28 C4 C1 E1 94 EC D5 14 4B D0
DBG: rsa_verify
data:+01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffff003031300d060960864801650304020105000420ac \
DBG: 84b9ecbff815907600f84a762e6e51c9402b43d9fb28c4c1e194ecd5144bd0
DBG: rsa_verify
sig:+3fdc77c2d3f0646cae20913959aff4e8ecb3f2b4ba199a859d7b8d0759b8f838 \
DBG:
ff547d5d805d5b7cb29b8648616bdbed8bdd8e781b5d620fe6cfcaaf7852647e \
DBG:
b7745cf057ff15ea7edee7a5ca73def6f5b41db939c0b3ef984f1514cb4e6916 \
DBG:
76b8ecdbfd0426e24b91135d42993cc209034d57c00ef25e414ff9b45d98946c \
DBG:
167f3078a6e39ce135766eb8b57eaea5f3f537c8569067ec230c8ed8de3b4931 \
DBG:
ebbf4fd53e51e12b161d2d6434eea6c4d69fc8bd05b29884907b02c18e63bbda \
DBG:
0581e287060367d3ac3ef7c27dbd5f866c4751e7d39c62e8f2d0d3a1d03b1191 \
DBG:
ad2f5e103d144281d8cdfd45d1ade8fb363a3a7c8d69c0a677856b606752b41c
DBG: rsa_verify
n:+e99bc36785f90daef58d54c39650353d62e96e4ced94d7005b952274d420eb34 \
DBG:
8fd6ecc031040b9981e2a614d252a02823848b7489045e5be0e278c178cb16cb \
DBG:
2835397b2d9045d0eda0007a7cbf4a0e1b00c386e95c2b31117b0cf38224438c \
DBG:
1c388b6a68009aeedc4f78abd2c6139b76adeede26e8ef01af740fc109a2f66b \
DBG:
cebdd3cd14304ff5e5e3a4c8629b821a0327300d0265604dedd109232a963558 \
DBG:
27d376c671b6901dc4edff35867d6f33b3db0fc511c28a83a1945d416bd8d210 \
DBG:
f54cfdca51acd9bdef9283bbdaeb8b16565643cfe1d5133da61f2730cd4954db \
DBG:
c913349a7175c56ceaa70b98f9219d27af3ea33939486a8cadc999fbc312f2bd
DBG: rsa_verify e:+010001
DBG: rsa_verify
cmp:+01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffff003031300d060960864801650304020105000420ac \
DBG: 84b9ecbff815907600f84a762e6e51c9402b43d9fb28c4c1e194ecd5144bd0
DBG: rsa_verify => Good
gpgsm: intermediate certificate is good
gpgsm: failed to open '/home/lorenz/.gnupg/policies.txt': No such file or directory
gpgsm: Note: non-critical certificate policy not allowed
gpgsm: DBG: signature value: 28 37 3A 73 69 67 2D 76 61 6C 28 33 3A 72 73 61 28
31 3A 73 32 35 36 3A 63 20 28 FD 9C 21 86 72 BE 39 46 59 39 32 25 BC A9 01 9B 0D
CC CA 7D 41 9C 86 6D 0A 6E 2C B3 13 59 75 B1 33 92 1B 61 27 16 FF C3 B2 D5 35 82
FB 84 2A 01 49 BD 66 BB 66 2F B2 C2 06 5D 6E 3F 6E E3 01 5A 5B CA 43 63 5C 95 B6
E1 31 A7 1F D5 07 5F 4D E6 65 82 4E 32 F9 C3 7C 7A 4B CD 4D 5C 74 EE 21 F2 75 02
EC 52 3E D2 C9 6A D3 90 23 6E 49 67 35 BE 7F 4D 56 A4 EC CC 2F CF B7 A1 97 A8 72
3E C9 BC 40 D6 5A A4 08 3D D6 BC 82 C3 B7 B7 32 8E B1 2C 8E 6A 6D B7 35 02 19 CF
F5 39 44 58 63 A7 24 00 10 B0 BB FC 4E AF 6E 2F 38 BB A5 57 49 3F D8 6E 50 6F 2C
97 96 DC 1D 46 9A 65 89 CF AE CC F2 E5 D9 9F 53 B3 3E A1 2F 92 A9 D8 0B C6 84 1F
04 C6 EB 1E E8 9F 7D B5 7B A5 02 F1 24 C5 24 63 11 34 CC 5A 93 20 2A 79 88 3A 25
42 90 A9 65 3B 7C 86 D3 12 15 23 29 FC 2C DA CC 39 5B 54 17 29 29 28 34 3A 68 61
73 68 36 3A 73 68 61 32 35 36 29 29
gpgsm: DBG: encoded hash: 00 01 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 00 30 31
30 0D 06 09 60 86 48 01 65 03 04 02 01 05 00 04 20 DF 7B C9 01 35 70 5A 34 2B 30
ED 96 C6 35 7F 80 51 5A 56 9C B6 89 F2 9D 69 DE E4 02 3F 5E 7C 9A
DBG: rsa_verify
data:+01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffff003031300d060960864801650304020105000420df \
DBG: 7bc90135705a342b30ed96c6357f80515a569cb689f29d69dee4023f5e7c9a
DBG: rsa_verify
sig:+632028fd9c218672be394659393225bca9019b0dccca7d419c866d0a6e2cb313 \
DBG:
5975b133921b612716ffc3b2d53582fb842a0149bd66bb662fb2c2065d6e3f6e \
DBG:
e3015a5bca43635c95b6e131a71fd5075f4de665824e32f9c37c7a4bcd4d5c74 \
DBG:
ee21f27502ec523ed2c96ad390236e496735be7f4d56a4eccc2fcfb7a197a872 \
DBG:
3ec9bc40d65aa4083dd6bc82c3b7b7328eb12c8e6a6db7350219cff539445863 \
DBG:
a7240010b0bbfc4eaf6e2f38bba557493fd86e506f2c9796dc1d469a6589cfae \
DBG:
ccf2e5d99f53b33ea12f92a9d80bc6841f04c6eb1ee89f7db57ba502f124c524 \
DBG:
631134cc5a93202a79883a254290a9653b7c86d312152329fc2cdacc395b5417
DBG: rsa_verify
n:+ab0ba335e08b2914b11485af3c10e4396f355d4aaeddea618d9549f46f64a31a \
DBG:
6066a4a9402284d9d4a5e578930e6801adb94d5c3aced3b8a84240dfcfa3ba82 \
DBG:
596a921bac1c9ada082b2527f9692347f1e0eb2c7a9bf51302d07e347cc29e3c \
DBG:
0059abf5da0cf5323c2bac50dad6c3de8394caa80c99320e0848565b6afbdae1 \
DBG:
585801495f72413c1506018e5dadaab893b4cd9eeba7e86a2d5234db3aef5c75 \
DBG:
51dadbf331f9ee719832c45415440cf99b55edaddf1808a0a3868a49ee53058f \
DBG:
194cd5de58799bd26a1c42abc5d5a7cf680f96e4e161987661c8917cd63e00e2 \
DBG:
915087e19d0ae6ad97d21dc63a7dcbbcda0334d58e5b01f56a07b716b66e4a7f
DBG: rsa_verify e:+010001
DBG: rsa_verify
cmp:+01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
DBG:
ffffffffffffffffffffff003031300d060960864801650304020105000420df \
DBG: 7bc90135705a342b30ed96c6357f80515a569cb689f29d69dee4023f5e7c9a
DBG: rsa_verify => Good
gpgsm: root certificate is good
gpgsm: CRLs not checked due to --disable-crl-checks option
gpgsm: validation model used: shell
gpgsm: DBG: recp 0 - issuer: 'CN=mail@example.com'
gpgsm: DBG: recp 0 - serial: 52DF665BB71FAF4F
gpgsm: DBG: pkcs1 encoded session key: 11 E8 C4 40 93 A8 24 35 16 57 93 8D 03 00
63 5F
gpgsm: decrypting session key failed: Invalid session key
gpgsm: message decryption failed: No secret key <GpgSM>
secmem usage: 0/16384 bytes in 0 blocks

Jan 28 2016, 12:23 PM · Restricted Project, gnupg, S/MIME, scd, Bug Report
werner added a comment to T2230: gpgsm decryption with smartcard fails with "Invalid session key".

Which OS and which gnupg version are you using?

Use

gpgsm --debug 4 -d gpgsm_encrypted

to see the session key before gpgsm detects thaty it is invalid.

Jan 28 2016, 12:11 PM · Restricted Project, gnupg, S/MIME, scd, Bug Report
werner added projects to T2230: gpgsm decryption with smartcard fails with "Invalid session key": scd, gnupg.
Jan 28 2016, 12:07 PM · Restricted Project, gnupg, S/MIME, scd, Bug Report

Jan 27 2016

fulanoperez set Version to 2.1.11 on T2229: make check 14 0f 35 tests failed.
Jan 27 2016, 3:09 PM · Bug Report, gnupg
fulanoperez added projects to T2229: make check 14 0f 35 tests failed: gnupg, Bug Report.
Jan 27 2016, 3:09 PM · Bug Report, gnupg

Jan 26 2016

werner renamed T1943: gpg2 --gen-key: X years computation ignores leap years from gpg2 --gen-key: X years computation is confusing to gpg2 --gen-key: X years computation ignores leap years.
Jan 26 2016, 10:18 AM · Documentation, Bug Report, gnupg
werner added a comment to T1975: toggle command seems broken.

Meanwhile the toggle command is a dummy and the extra infos for secret keys are
always displayed.

Jan 26 2016, 10:16 AM · Bug Report, gnupg, gnupg (gpg21)
werner closed T1975: toggle command seems broken as Resolved.
Jan 26 2016, 10:16 AM · Bug Report, gnupg, gnupg (gpg21)
werner closed T1302: pinentry does not accept passwords containing the §-character as Resolved.
Jan 26 2016, 10:13 AM · Info Needed, Bug Report, gnupg
werner added a project to T1302: pinentry does not accept passwords containing the §-character: Info Needed.
Jan 26 2016, 10:13 AM · Info Needed, Bug Report, gnupg
werner closed T1613: openpgp v2 card bricks after invalid reset apdu as Resolved.
Jan 26 2016, 10:12 AM · Too Old, gnupg, scd, Not A Bug, Bug Report
werner added a project to T1613: openpgp v2 card bricks after invalid reset apdu: Too Old.
Jan 26 2016, 10:12 AM · Too Old, gnupg, scd, Not A Bug, Bug Report
werner added a project to T1779: AIX & GCC 4.7.4: 27 of 30 tests failed Please report to http://bugs.gnupg.org: Info Needed.
Jan 26 2016, 10:10 AM · gnupg, Bug Report
werner placed T2228: Explain export-attributes from --export-options better up for grabs.
Jan 26 2016, 10:03 AM · Bug Report, gnupg, Documentation
werner added a project to T1624: Gpgtar fails when files have non ASCII characters: Restricted Project.
Jan 26 2016, 10:02 AM · gnupg, Windows 32, Windows, Bug Report
werner added a comment to T1624: Gpgtar fails when files have non ASCII characters.

I commited an adjusted patch for GnuPG 2.1 (3e50236).

Jan 26 2016, 10:02 AM · gnupg, Windows 32, Windows, Bug Report

Jan 25 2016

bernhard updated subscribers of T2228: Explain export-attributes from --export-options better.
Jan 25 2016, 11:51 AM · Bug Report, gnupg, Documentation
bernhard added projects to T2228: Explain export-attributes from --export-options better: Documentation, gnupg, Bug Report.
Jan 25 2016, 11:51 AM · Bug Report, gnupg, Documentation
werner added a project to T2226: Add sha-256 checksums to swdb.lst: In Progress.
Jan 25 2016, 8:41 AM · gnupg, Feature Request

Jan 24 2016

werner renamed T2226: Add sha-256 checksums to swdb.lst from Add sha-256 checksuns to swdb.lst to Add sha-256 checksums to swdb.lst.
Jan 24 2016, 7:56 PM · gnupg, Feature Request
werner added projects to T2226: Add sha-256 checksums to swdb.lst: Feature Request, gnupg.
Jan 24 2016, 7:56 PM · gnupg, Feature Request

Jan 22 2016

werner closed T1724: documentation fixes for 2.1.0 as Resolved.
Jan 22 2016, 1:19 PM · Feature Request, gnupg
werner added a project to T2039: CRL issuingDistributionPoint support: gnupg.
Jan 22 2016, 1:17 PM · gnupg, Feature Request, dirmngr
werner added a project to T2148: dirmngr fails when started from gpg2 --homedir <something>: gnupg.
Jan 22 2016, 1:17 PM · gnupg, Bug Report, dirmngr
werner added a project to T2107: dirmngr crash when searching keyservers on OpenBSD: gnupg.
Jan 22 2016, 1:16 PM · Duplicate, gnupg, Bug Report, dirmngr
werner added a project to T1141: dirmngr does not try all CRL DPs if first fetchable CRL is too old: gnupg.
Jan 22 2016, 1:15 PM · gnupg, Bug Report, dirmngr
werner added a project to T1804: HKPS scheme support for Windows Installer: gnupg.
Jan 22 2016, 1:09 PM · Bug Report, gnupg, dirmngr
werner added a comment to T2181: ship sks-keyservers.netCA.pem in distributed tarball.

Thanks. I did some modifications and also fixed an unrelated bug in the
detection of the poolname. Will go into 2.1.11.

Jan 22 2016, 12:41 PM · gnupg, Bug Report, dirmngr
werner added a project to T2181: ship sks-keyservers.netCA.pem in distributed tarball: Restricted Project.
Jan 22 2016, 12:41 PM · gnupg, Bug Report, dirmngr
werner added a project to T2181: ship sks-keyservers.netCA.pem in distributed tarball: gnupg.
Jan 22 2016, 11:23 AM · gnupg, Bug Report, dirmngr
werner added a project to T2225: gpg2 send keys failed ,because 'invalid argument'.And why?: Info Needed.
Jan 22 2016, 11:11 AM · Bug Report, Info Needed, gnupg
werner added a comment to T2225: gpg2 send keys failed ,because 'invalid argument'.And why?.

Please describe your problem and do not just post a picture, schreenshort or
whatever. See https://bugs.gnupg.org on how to send a bug report.

From the title of your report it seems to be more a question than a bug - please
ask on one of the mailing lists for help.

Jan 22 2016, 11:11 AM · Bug Report, Info Needed, gnupg
xiaolongzuo added projects to T2225: gpg2 send keys failed ,because 'invalid argument'.And why?: gnupg, Bug Report.
Jan 22 2016, 8:41 AM · Bug Report, Info Needed, gnupg

Jan 21 2016

werner added a comment to T1724: documentation fixes for 2.1.0.

The text now reads:

This is a revocation certificate for the OpenPGP key:

pub rsa2048/71201A64 2016-01-21

Key fingerprint = F6B8 598F 5E71 5104 D13C  1415 58D4 85FF 7120 1A64

uid baz@example.org

A revocation certificate is a kind of "kill switch" to publicly
declare that a key shall not anymore be used. It is not possible
to retract such a revocation certificate once it has been published.

Use it to revoke this key in case of a compromise or loss of
the secret key. However, if the secret key is still accessible,
it is better to generate a new revocation certificate and give
a reason for the revocation. For details see the description of
of the gpg command "--gen-revoke" in the GnuPG manual.

To avoid an accidental use of this file, a colon has been inserted
before the 5 dashes below. Remove this colon with a text editor

before importing and publishing this revocation certificate.

Jan 21 2016, 6:36 PM · Feature Request, gnupg
werner closed T1501: Public part of a R4096(S)-Subkey lost when imported from an armored backup file. as Resolved.
Jan 21 2016, 4:56 PM · Won't Fix, Bug Report, gnupg, gnupg (gpg20), gnupg (gpg14)
werner added a project to T1501: Public part of a R4096(S)-Subkey lost when imported from an armored backup file.: Won't Fix.
Jan 21 2016, 4:56 PM · Won't Fix, Bug Report, gnupg, gnupg (gpg20), gnupg (gpg14)
werner added a comment to T1501: Public part of a R4096(S)-Subkey lost when imported from an armored backup file..

This is caused by gpg inability of merging the secret keys. We can't fix that
in 1.4 or 2.0. 2.1 does not have this problem anymore.

Jan 21 2016, 4:56 PM · Won't Fix, Bug Report, gnupg, gnupg (gpg20), gnupg (gpg14)
werner added a project to T2147: auto-key-retrieve does not work if keyserver is set in dirmngr.conf instead of gpg.conf: Restricted Project.
Jan 21 2016, 11:55 AM · gnupg, Bug Report
werner removed Due Date on T2147: auto-key-retrieve does not work if keyserver is set in dirmngr.conf instead of gpg.conf.
Jan 21 2016, 11:55 AM · gnupg, Bug Report
werner added a comment to T2147: auto-key-retrieve does not work if keyserver is set in dirmngr.conf instead of gpg.conf.

Fixed with commit 09117e7 to be released with 2.1.11

Jan 21 2016, 11:55 AM · gnupg, Bug Report
werner closed T2212: Wish for a gpgkey2ssh replacement as Resolved.
Jan 21 2016, 8:43 AM · ssh, gnupg, gnupg (gpg21), Feature Request
werner removed a project from T2212: Wish for a gpgkey2ssh replacement: Restricted Project.
Jan 21 2016, 8:43 AM · ssh, gnupg, gnupg (gpg21), Feature Request
werner closed T1778: t-exechelp-posix get_max_fds returns MAX_INT32 rather than something sensible as Resolved.
Jan 21 2016, 8:38 AM · gnupg, Bug Report

Jan 20 2016

aheinecke added a comment to T2212: Wish for a gpgkey2ssh replacement.

Thanks, now this works as expected for me :-)

Jan 20 2016, 4:10 PM · ssh, gnupg, gnupg (gpg21), Feature Request
gduzan added a comment to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent.

Please see T1778 (gduzan on Jan 20 2016, 03:41 PM / Roundup) on T1778 for a workaround.

Jan 20 2016, 3:45 PM · Restricted Project, gnupg, Bug Report
gduzan reopened T1778: t-exechelp-posix get_max_fds returns MAX_INT32 rather than something sensible as "Open".
Jan 20 2016, 3:41 PM · gnupg, Bug Report
gduzan added a comment to T1778: t-exechelp-posix get_max_fds returns MAX_INT32 rather than something sensible.

AIX defaults to "unlimited" descriptors. However, the value may be overridden by
setting the hard limit. In tcsh, for example, one can work around the issue with:
limit descriptors 4096
limit -h descriptors 4096

Jan 20 2016, 3:41 PM · gnupg, Bug Report
werner closed T2222: no possibility to configure gpg-agent to set a pinentry timeout as Resolved.
Jan 20 2016, 11:29 AM · gnupg, Feature Request
werner added a comment to T2222: no possibility to configure gpg-agent to set a pinentry timeout.

[11:26:04] <gitbot> [git] GnuPG - branch master updated by Werner Koch:
4997433 agent: New option --pinentry-timeout

Jan 20 2016, 11:29 AM · gnupg, Feature Request
werner added a comment to T2222: no possibility to configure gpg-agent to set a pinentry timeout.

Good idea.

Jan 20 2016, 11:00 AM · gnupg, Feature Request
werner added a comment to T2220: gpg2 man pages for s2k-* options are invalid.

Fixed. Thanks.

The --s2k- options are expert options and should in general not be chnaged at
all. We can't make a list of all such minor chnages related to moving secret
keys to gpg-agent. People who care about this will know anyway.

Jan 20 2016, 10:56 AM · Bug Report, gnupg
werner closed T2220: gpg2 man pages for s2k-* options are invalid as Resolved.
Jan 20 2016, 10:56 AM · Bug Report, gnupg
tim added projects to T2222: no possibility to configure gpg-agent to set a pinentry timeout: Feature Request, gnupg.
Jan 20 2016, 10:45 AM · gnupg, Feature Request

Jan 18 2016

grempe added a comment to T2220: gpg2 man pages for s2k-* options are invalid.

Werner, there is a typo in your new commit 56275e4392a7b38abe5fdd84fe9d67599cf5e6d1

'defaulte' should be 'default'

+Use @code{name} as the digest algorithm used to mangle the passphrases
+for symmetric encryption. The defaulte is SHA-1.

Also, might it be beneficial to add this change of behavior to either the man page or
to the 'What's changed in 2.1' docs?

Thanks

Jan 18 2016, 8:04 PM · Bug Report, gnupg
dexolabs added a comment to T1848: gpg 2.1.2 with pinentry-curses prompts for passphrase when adding subkeys.

I have tested 2.1.10, same behaviour asking for a password for the subkey.
------Original Message------
From: Werner Koch via BTS
To: Mr Pratish Surendra Neerputh
To: wk@gnupg.org
ReplyTo: GnuPG's BTS
ReplyTo: GnuPG's BTS
Subject: [issue1848] gpg 2.1.2 with pinentry-curses prompts for passphrase when adding subkeys
Sent: Jan 18, 2016 09:46

Jan 18 2016, 9:24 AM · Bug Report, gnupg
dexolabs added a comment to T1848: gpg 2.1.2 with pinentry-curses prompts for passphrase when adding subkeys.

I have tried version 2.1.9 as I couldn't get the latest version. It still prompts for a password when adding a subkey, I have also seen this behaviour with a windows binary. It does not seem to affect signing or encryption as signing still just requires the passphrase for the master key.
------Original Message------
From: Werner Koch via BTS
To: Mr Pratish Surendra Neerputh
To: wk@gnupg.org
ReplyTo: GnuPG's BTS
ReplyTo: GnuPG's BTS
Subject: [issue1848] gpg 2.1.2 with pinentry-curses prompts for passphrase when adding subkeys
Sent: Jan 18, 2016 09:46

Jan 18 2016, 9:15 AM · Bug Report, gnupg
werner added a comment to T1848: gpg 2.1.2 with pinentry-curses prompts for passphrase when adding subkeys.

It is a bug and not a feature.

Jan 18 2016, 8:46 AM · Bug Report, gnupg
werner added a comment to T2220: gpg2 man pages for s2k-* options are invalid.

Thanks for reporting. I'll change this for 2.1.11.

Jan 18 2016, 8:36 AM · Bug Report, gnupg
grempe set Version to 2.1.10 on T2220: gpg2 man pages for s2k-* options are invalid.
Jan 18 2016, 2:18 AM · Bug Report, gnupg
grempe added projects to T2220: gpg2 man pages for s2k-* options are invalid: gnupg, Bug Report.
Jan 18 2016, 2:18 AM · Bug Report, gnupg

Jan 17 2016

andrey.utkin set Version to 2.1.10 on T2219: Key creation locks the keyring.
Jan 17 2016, 9:17 PM · Bug Report, gnupg
andrey.utkin added projects to T2219: Key creation locks the keyring: gnupg, Bug Report.
Jan 17 2016, 9:17 PM · Bug Report, gnupg

Jan 15 2016

dexolabs added a comment to T1848: gpg 2.1.2 with pinentry-curses prompts for passphrase when adding subkeys.

My original problem was that when generating one signing key with gnupg stable aka 2.0.29 and adding a seperate encryption subkey it only asked for my passphase to unlock the master secret key.

Jan 15 2016, 6:25 PM · Bug Report, gnupg
werner added a comment to T1382: Cannot build gnupg-2.0.18 on AIX 6.1.

Feel free to -re-opne if you experience the same problem with a current gnupg
version.

Jan 15 2016, 4:52 PM · Too Old, Bug Report, gnupg
werner closed T1382: Cannot build gnupg-2.0.18 on AIX 6.1 as Resolved.
Jan 15 2016, 4:52 PM · Too Old, Bug Report, gnupg
werner added a project to T1382: Cannot build gnupg-2.0.18 on AIX 6.1: Too Old.
Jan 15 2016, 4:52 PM · Too Old, Bug Report, gnupg
werner added a comment to T1799: GnuPG does not provide Host: header for proxy requests.

Ping.
Please tell us the OS version and the GnuPG version.

Jan 15 2016, 4:50 PM · Bug Report, gnupg
werner closed T1847: Cannot read old keyring (issue 1793 related) as Resolved.
Jan 15 2016, 4:48 PM · Bug Report, gnupg
werner removed a project from T1847: Cannot read old keyring (issue 1793 related): In Progress.
Jan 15 2016, 4:48 PM · Bug Report, gnupg
werner added a comment to T1847: Cannot read old keyring (issue 1793 related).

Several such bugs have been fixed since 2.1.2. Thus I assume this has been
resolved.

Jan 15 2016, 4:48 PM · Bug Report, gnupg
werner added a comment to T1848: gpg 2.1.2 with pinentry-curses prompts for passphrase when adding subkeys.

Some time passed. Did you tried with a newer version (2.1.10 is current)?

Jan 15 2016, 4:47 PM · Bug Report, gnupg
werner closed T1954: Password too long as Resolved.
Jan 15 2016, 4:46 PM · Info Needed, gnupg (gpg20), Bug Report, gnupg
werner lowered the priority of T1998: Can't use extended characters in passphrase from Normal to Low.
Jan 15 2016, 4:44 PM · pinentry, Not A Bug, Bug Report, gnupg
werner lowered the priority of T2014: pinentry offers to save symmetric passwords in libsecret from Normal to Wishlist.
Jan 15 2016, 4:41 PM · Feature Request, gnupg
werner added a project to T2014: pinentry offers to save symmetric passwords in libsecret: Feature Request.
Jan 15 2016, 4:41 PM · Feature Request, gnupg
werner removed a project from T2014: pinentry offers to save symmetric passwords in libsecret: Bug Report.
Jan 15 2016, 4:41 PM · Feature Request, gnupg
werner added a comment to T2014: pinentry offers to save symmetric passwords in libsecret.

I changed this to a wish because it it questionable whether this is a bug or a
feature of libsecret.

Jan 15 2016, 4:41 PM · Feature Request, gnupg
werner added a project to T2015: GET_PASSPHRASE with --no-ask always return error in gnupg 2.1.5: gpgagent.
Jan 15 2016, 4:40 PM · gpgagent, Bug Report, gnupg
werner closed T2029: gpgsm --gen-key prompts for usage flags, then discards them when generating a CSR as Resolved.
Jan 15 2016, 4:38 PM · Bug Report, gnupg
werner removed a project from T2029: gpgsm --gen-key prompts for usage flags, then discards them when generating a CSR: Restricted Project.
Jan 15 2016, 4:38 PM · Bug Report, gnupg
werner added a project to T2033: gpgsm can't decrypt smime encrypted mails from 1 contact: Info Needed.
Jan 15 2016, 4:32 PM · Info Needed, Bug Report, gnupg
werner added a comment to T2033: gpgsm can't decrypt smime encrypted mails from 1 contact.

To replicate this bug we need more information: What is yopur OS, which version
of libgcrypt and libksba are you using? "gpgsm --version" tells you these
version numbers.

If you send us the smime.p7m we might be able to find the problem without the
need for the key. Sending that file encrypted to wk@gnupg.org, keyid 1442b367
would be okay.

Jan 15 2016, 4:32 PM · Info Needed, Bug Report, gnupg
werner closed T2055: AIX 7.1 Key Generation Failed with Segmentaiton fault signal 11 as Resolved.
Jan 15 2016, 4:26 PM · Bug Report, Duplicate, gnupg
werner added a comment to T2055: AIX 7.1 Key Generation Failed with Segmentaiton fault signal 11.

Let's assume this is the case and the bug has been resolved.

Jan 15 2016, 4:26 PM · Bug Report, Duplicate, gnupg
werner added a project to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent: Restricted Project.
Jan 15 2016, 4:24 PM · Restricted Project, gnupg, Bug Report
werner added a comment to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent.

D321: 754_0001-Fix-possible-_SC_OPEN_MAX-max-problem-on-AIX.patch

Jan 15 2016, 4:23 PM · Restricted Project, gnupg, Bug Report
werner added a comment to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent.

Given that you are using gpgme, the problem might already be there. if my
assumption is right the "...SC_OPEN_MAX-max-prob..." patch should fix this for
gpgme.

Jan 15 2016, 4:23 PM · Restricted Project, gnupg, Bug Report
werner removed a project from T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent: In Progress.
Jan 15 2016, 4:23 PM · Restricted Project, gnupg, Bug Report
werner added a comment to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent.

D322: 753_0001-Fix-possible-AIX-problem-with-sysconf-in-rndunix.patch

Jan 15 2016, 4:11 PM · Restricted Project, gnupg, Bug Report
werner added a comment to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent.

Just in case you are not using /dev/random, the "Fix-posssible..." patch may
help for 1.4.

Jan 15 2016, 4:11 PM · Restricted Project, gnupg, Bug Report
werner added a comment to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent.

D323: 752_0001-common-Cope-with-AIX-problem-on-number-of-open-files.patch

Jan 15 2016, 3:41 PM · Restricted Project, gnupg, Bug Report
werner added a comment to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent.

Indeed the sysconf patch had not been backported to gnupg 2.0. Please
try the attached patch for 2.0.x (sorry for the trailing white space changes).

Jan 15 2016, 3:41 PM · Restricted Project, gnupg, Bug Report
werner removed a project from T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent: Info Needed.
Jan 15 2016, 3:29 PM · Restricted Project, gnupg, Bug Report
werner added a project to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent: In Progress.
Jan 15 2016, 3:29 PM · Restricted Project, gnupg, Bug Report
werner added a comment to T2071: Processes invoking gpgme_op_decrypt() should not incur a delay due to the invocation of gpg-agent.

(newer?) AIX versions have the bug that sysconf returns INT_MAX32 for the number
of max. open file descriptors. That leads to a long delay due to closing all
possible open file descriptors. See T1778.

That bug has been fixed in GnuPG 2.1 but not in libassuan. I have fixed it with
commit 7101fcb for libassuan which wilk go into libassaun 2.4.3. This might
also help with GnuPG 2.0.26 but I need to check that.

Jan 15 2016, 3:29 PM · Restricted Project, gnupg, Bug Report
werner closed T2097: gpg doesn't output anything to Mintty when using Cygwin as Resolved.
Jan 15 2016, 2:53 PM · Not A Bug, Bug Report, gnupg
werner added a project to T2097: gpg doesn't output anything to Mintty when using Cygwin: Not A Bug.
Jan 15 2016, 2:52 PM · Not A Bug, Bug Report, gnupg
werner added a comment to T2097: gpg doesn't output anything to Mintty when using Cygwin.

I suggest to report this to the mintty developers.

Jan 15 2016, 2:52 PM · Not A Bug, Bug Report, gnupg
werner closed T2079: gpg2 --card-status won't create proper stubs for (sub)keys which are known but non-usable as Resolved.
Jan 15 2016, 1:29 PM · Bug Report, scd, gnupg
werner removed a project from T2079: gpg2 --card-status won't create proper stubs for (sub)keys which are known but non-usable: Restricted Project.
Jan 15 2016, 1:29 PM · Bug Report, scd, gnupg