Page MenuHome GnuPG
Feed Advanced Search

Mar 17 2016

werner claimed T2275: Corrupted keybox if created by gpgsm.
Mar 17 2016, 2:55 PM · Bug Report, gnupg, gnupg (gpg21)

Mar 16 2016

PRab added a comment to T2167: Unplugging USB Smartcard/Yubikey causes problems with scdaemon.

I believe I have also seen this issue (or something very similar) on my Windows
7 64bit machine. I am running gpg 2.1.11. I hope this isn't redundant, but it
seems that I need to restart scdaemon anytime I unplug/replug my yubikey or
suspend/resume my computer.

Sometimes it doesn't recover even after restarting scdaemon. In those cases, I
am able to fix it by stopping scdaemon, removing the yubikey, starting scdaemon,
and finally reinserting the yubikey.

Mar 16 2016, 9:01 PM · gnupg (gpg22), Restricted Project, patch, Windows 64, scd, Windows, Windows 32, Bug Report
jcross changed External Link from http://security.stackexchange.com/questions/115230/why-do-i-see-secret-key-is-available-in-gpg-when-it-is-not to http://security.stackexchange.com/q/115230/16036 on T2289: UI says “Secret key is available.” in gpg when it is not.
Mar 16 2016, 3:59 PM · Bug Report, gnupg, gnupg (gpg20), gnupg (gpg14)
jcross added a comment to T2289: UI says “Secret key is available.” in gpg when it is not.

Bug system broke the link URL. Here is a shorter one:
http://security.stackexchange.com/q/115230/16036

Mar 16 2016, 3:59 PM · Bug Report, gnupg, gnupg (gpg20), gnupg (gpg14)
jcross added projects to T2289: UI says “Secret key is available.” in gpg when it is not: gnupg (gpg14), gnupg (gpg20), gnupg, Bug Report.
Mar 16 2016, 3:56 PM · Bug Report, gnupg, gnupg (gpg20), gnupg (gpg14)
JochenSaalfeld added a comment to T2288: --quiet option produces logging output.

As Dashamir Hoxha in the mailinglist gnupg-users mentioned, even with the
--quiet flag enabled, there still is logging output after/during the validation
of the trust-db.

When the user enables the --quiet flag, there should be no log_info output to
the stdin. At most points in the code its managed like in ./g10/trustdb.c:970
(Commit b752d2c93778e6a1c1de3eddf8fc725b0ddd354e in master from the public Git).
But after the silenced output there, it goes into the validate function, where
still is a log_info output in ./g10/trustdb.c:2057 (Same commit as mentioned
above).

relevant to T1424

Mar 16 2016, 9:50 AM · Bug Report, gnupg, gnupg (gpg21)
JochenSaalfeld added projects to T2288: --quiet option produces logging output: gnupg (gpg21), gnupg, Bug Report.
Mar 16 2016, 9:44 AM · Bug Report, gnupg, gnupg (gpg21)

Mar 14 2016

clint added a comment to T2284: tsign behavior does not achieve what dkg says it should.

Mar 14 2016, 9:31 PM · Bug Report, gnupg
clint added a comment to T2284: tsign behavior does not achieve what dkg says it should.

I have not tried this on 2.1.

To reproduce

% gpg --recv-keys 0EE5BE979282D80B9F7540F1CCD2ED94D21739E9

74D1153FB159BB3D1BAC641CAC504BE650012B98

    % gpg --edit-key 0EE5BE979282D80B9F7540F1CCD2ED94D21739E9
    tsign with 2 (I trust fully), depth 1, domain "aclu.org"
    Check validity of 74D1153FB159BB3D1BAC641CAC504BE650012B98

If you make the trust signature without a domain specified,
74D1153FB159BB3D1BAC641CAC504BE650012B98 will appear as "full". With the domain
specified, it appears as "unknown".

Mar 14 2016, 9:31 PM · Bug Report, gnupg
ghostbar added a comment to T2282: Invalid flag adding encryption subkey with Curve 25519.

That's excellent! I tried with no luck to find a roadmap on when 1.7 could be released;
do you have any ETA? How could I help to make it happen?

Thanks!

Mar 14 2016, 1:53 PM · Not A Bug, Bug Report, gnupg
werner added a comment to T2282: Invalid flag adding encryption subkey with Curve 25519.

It is fully supported but you need to link agains libgcrypt 1.7 which has not
yet been released.

Mar 14 2016, 1:35 PM · Not A Bug, Bug Report, gnupg

Mar 13 2016

neal added a comment to T2284: tsign behavior does not achieve what dkg says it should.

Hi Clint,

Out of curiosity, have you tried this on 2.1?

I realize this is probably very easy to reproduce, but could you nevertheless
list the commands that you used to show the bug?

Thanks!

Mar 13 2016, 10:29 PM · Bug Report, gnupg
sa added a comment to T1967: GnuPG should select a key for signing without trying to use missing subkeys.

Updated patch to check that the requested key usage is SIG before checking for a
secret key.

Mar 13 2016, 3:09 PM · gnupg (gpg22), Feature Request
sa added a comment to T1967: GnuPG should select a key for signing without trying to use missing subkeys.

D296: 793_sign-fix.patch

Mar 13 2016, 3:09 PM · gnupg (gpg22), Feature Request

Mar 12 2016

jlp set Version to 2.0.26 on T2285: decryption fails with "Missing item in object" even though private key is available.
Mar 12 2016, 3:29 PM · Info Needed, Bug Report, gnupg, scd
jlp added projects to T2285: decryption fails with "Missing item in object" even though private key is available: scd, OpenPGP, gnupg, Bug Report.
Mar 12 2016, 3:29 PM · Info Needed, Bug Report, gnupg, scd
clint added projects to T2284: tsign behavior does not achieve what dkg says it should: gnupg, Bug Report.
Mar 12 2016, 12:35 AM · Bug Report, gnupg
clint set Version to 1.4.20 on T2284: tsign behavior does not achieve what dkg says it should.
Mar 12 2016, 12:35 AM · Bug Report, gnupg
clint added projects to T2283: tsign domain not documented: gnupg, Bug Report.
Mar 12 2016, 12:32 AM · Documentation, Bug Report, gnupg

Mar 11 2016

ghostbar added projects to T2282: Invalid flag adding encryption subkey with Curve 25519: gnupg, Bug Report.
Mar 11 2016, 10:36 PM · Not A Bug, Bug Report, gnupg
lockywolf added a comment to T2281: Wrong encoding (and internationalization) in gpg..

Mar 11 2016, 10:46 AM · Bug Report, gnupg
lockywolf added a comment to T2281: Wrong encoding (and internationalization) in gpg..

Mar 11 2016, 10:45 AM · Bug Report, gnupg
lockywolf added projects to T2281: Wrong encoding (and internationalization) in gpg.: gnupg, Bug Report.
Mar 11 2016, 10:45 AM · Bug Report, gnupg

Mar 10 2016

aheinecke added projects to T2280: Wish for a new keygen API: Feature Request, gnupg (gpg21), gnupg.
Mar 10 2016, 8:13 PM · gnupg, gnupg (gpg21), Feature Request

Mar 8 2016

neal added a comment to T2274: Data decrypted via a pk-esk packet should be better checked.

Werner pointed out that the quick integrity check is not used due to an attack
by Mister and Zuccherato. However, this attack does not make use of any
information from the PK-ESK packet. It just uses the session key. As such, the
quick integrity check should not be done in the dek->symmetric case either.

I think it is possible to fix this issue so that we can use the quick integrity
check in the future. My post about this to the openpgp group is here:
http://mailarchive.ietf.org/arch/msg/openpgp/A_r93YIukOqzvrmd44F-Jl3dHbc .

My suggestion is a not-backwards compatible change. For messages that currently
exist, it is acceptable to do the quick integrity check if we can rate limit the
oracle (to recover the first two bytes from N blocks costs (N+1) * 2^15
decryption attempts). This is definitely safe, as Mister and Zuccerato point
out, in the interactive case. Do we have a way to reliably detect this?

Mar 8 2016, 2:05 PM · Bug Report, gnupg
neal added a comment to T2276: keyring_search failed and failed to rebuild keyring cache: Legacy key.

Sorry, I was using --check-trustdb as a shorthand for the actual function.

Mar 8 2016, 1:23 PM · Bug Report, gnupg, gnupg (gpg21)
gniibe claimed T2234: Core dump while calling bkuptocard.
Mar 8 2016, 1:01 PM · Bug Report, gnupg
gniibe added a project to T2234: Core dump while calling bkuptocard: Restricted Project.
Mar 8 2016, 1:01 PM · Bug Report, gnupg
gniibe added a comment to T2234: Core dump while calling bkuptocard.

bkuptocard had been not implemented, but it was finally implemented in 2.1.11.
If any problem, please let us know.

Mar 8 2016, 1:01 PM · Bug Report, gnupg
justus claimed T2216: Generating keys on Yubikey and requesting off-card backup always fails.
Mar 8 2016, 12:11 PM · Bug Report, gnupg
justus added a comment to T2216: Generating keys on Yubikey and requesting off-card backup always fails.

I cannot reproduce this with current master and a Yubikey4. Can you please
retry with the current master?

Also, are you sure that you are not mixing GnuPG components you compiled with
the ones provided by your operating system? Also, what made you try to compile
GnuPG in the first place?

Please open a separate bug for the other issue. No 'by the way's in bug reports
please.

Mar 8 2016, 12:11 PM · Bug Report, gnupg

Mar 7 2016

justus closed T1970: Implement --pinentry-mode loopback --passphrase-fd 9 also for gpgsm as Resolved.
Mar 7 2016, 6:21 PM · Bug Report, gnupg
justus added a comment to T1970: Implement --pinentry-mode loopback --passphrase-fd 9 also for gpgsm.

Fixed in eea139c.

Mar 7 2016, 6:21 PM · Bug Report, gnupg
bernhard added a comment to T2276: keyring_search failed and failed to rebuild keyring cache: Legacy key.

On Sunday 06 March 2016 at 15:18:54, Neal Walfield via BTS wrote:

is for --check-trustdb

Mar 7 2016, 9:41 AM · Bug Report, gnupg, gnupg (gpg21)

Mar 6 2016

neal added a comment to T2276: keyring_search failed and failed to rebuild keyring cache: Legacy key.

Thanks for reporting this. The right solution is for --check-trustdb to ignore
legacy keys.

Mar 6 2016, 3:18 PM · Bug Report, gnupg, gnupg (gpg21)

Mar 4 2016

aheinecke added a comment to T2275: Corrupted keybox if created by gpgsm.

If i remove the com-certs I get the exact same behavior as I'm seeing on windows.

aheinecke@esus ~/a/e/src> export GNUPGHOME=$(mktemp -d)
aheinecke@esus ~/a/e/src> gpgsm -k
gpgsm: keybox '/tmp/tmp.hyElMR6oUi/pubring.kbx' created
aheinecke@esus ~/a/e/src> gpg2 --import
~/arbeit/gpg4win/zertifikate/testuserA-pub.asc
gpg: /tmp/tmp.hyElMR6oUi/trustdb.gpg: trustdb created
gpg: key 6CFBC912: public key "Test UserA <testusera@example.com>" imported
gpg: Total number processed: 1
gpg: imported: 1
aheinecke@esus ~/a/e/src> gpgsm -k
gpgsm: keydb_search failed: Invalid argument

Mar 4 2016, 5:34 PM · Bug Report, gnupg, gnupg (gpg21)
aheinecke updated subscribers of T2275: Corrupted keybox if created by gpgsm.
Mar 4 2016, 5:31 PM · Bug Report, gnupg, gnupg (gpg21)
aheinecke renamed T2275: Corrupted keybox if created by gpgsm from Corrupted keybox after key import with Kleopatra on Windows to Corrupted keybox if created by gpgsm.
Mar 4 2016, 5:31 PM · Bug Report, gnupg, gnupg (gpg21)
aheinecke added a comment to T2275: Corrupted keybox if created by gpgsm.

From the debug output it looks to me that gnupg is using keyring functions to
work with the keybox.

I can reproduce this now without Kleopatra and on GNU/Linux:

export GNUPGHOME=$(mktemp -d)
gpgsm -k

< imports /opt/gnupg/share/gnupg/com-certs.pem >
(this is not done on windows so maybe the errors differ because of that)

gpg2 --import ~/arbeit/gpg4win/zertifikate/testuserA-pub.asc

Result:

gpg: [don't know]: invalid packet (ctb=00)
gpg: keydb_get_keyblock failed: Value not found
gpg: [don't know]: invalid packet (ctb=00)
gpg: /tmp/tmp.f5ub2ZRYC0/pubring.kbx: copy to
'/tmp/tmp.f5ub2ZRYC0/pubring.kbx.tmp' failed: Invalid packet
gpg: error writing keyring '/tmp/tmp.f5ub2ZRYC0/pubring.kbx': Invalid packet
gpg: [don't know]: invalid packet (ctb=00)
gpg: keydb_search failed: Invalid packet
gpg: key 6CFBC912: public key "[User ID not found]" imported
gpg: [don't know]: invalid packet (ctb=00)
gpg: error reading
'/home/aheinecke/arbeit/gpg4win/zertifikate/testuserA-pub.asc': Invalid packet
gpg: import from '/home/aheinecke/arbeit/gpg4win/zertifikate/testuserA-pub.asc'
failed: Invalid packet
gpg: Total number processed: 0
gpg: imported: 1

gpg2 --version
gpg (GnuPG) 2.1.11
libgcrypt 1.7.0-beta307

I'll try now with git master.

Mar 4 2016, 5:31 PM · Bug Report, gnupg, gnupg (gpg21)
aheinecke assigned T2275: Corrupted keybox if created by gpgsm to neal.
Mar 4 2016, 5:31 PM · Bug Report, gnupg, gnupg (gpg21)
aheinecke added a comment to T2275: Corrupted keybox if created by gpgsm.

Mar 4 2016, 5:00 PM · Bug Report, gnupg, gnupg (gpg21)
aheinecke added a comment to T2275: Corrupted keybox if created by gpgsm.

The debug output from gnupg for an import that caused a corruped keybox.

It's not for the attached pubring.kbx but I have the file that was generated If
you need it.

What I did in the log was to start kleopatra (The output of process is 2428 is
likely the debug output of the initial keylisting kleopatra did)

Then imported a test key and afterwards closed kleopatra.

Mar 4 2016, 5:00 PM · Bug Report, gnupg, gnupg (gpg21)
bernhard set Version to 2.1.11 on T2276: keyring_search failed and failed to rebuild keyring cache: Legacy key.
Mar 4 2016, 3:04 PM · Bug Report, gnupg, gnupg (gpg21)
bernhard added projects to T2276: keyring_search failed and failed to rebuild keyring cache: Legacy key: gnupg (gpg21), gnupg, Bug Report.
Mar 4 2016, 3:04 PM · Bug Report, gnupg, gnupg (gpg21)

Mar 3 2016

aheinecke added projects to T2275: Corrupted keybox if created by gpgsm: gnupg (gpg21), gnupg, Bug Report.
Mar 3 2016, 6:20 PM · Bug Report, gnupg, gnupg (gpg21)
aheinecke set Version to 2.1.11 on T2275: Corrupted keybox if created by gpgsm.
Mar 3 2016, 6:20 PM · Bug Report, gnupg, gnupg (gpg21)
justus added a comment to T2235: gnupg-2.1.11, compile error for: make -f build-aux/speedo.mk native.

D344: 787_fix-2235.patch

Mar 3 2016, 1:58 PM · dirmngr, gnupg, Bug Report
justus closed T2235: gnupg-2.1.11, compile error for: make -f build-aux/speedo.mk native as Resolved.
Mar 3 2016, 1:58 PM · dirmngr, gnupg, Bug Report
justus added a comment to T2235: gnupg-2.1.11, compile error for: make -f build-aux/speedo.mk native.

I believe your problem is fixed in 9f0ba508. With that change I was able to
build gnupg-2.1.11 using speedo in a very minimal Debian jessie chroot.

To test this change, please apply the attached patch (generated using 'git diff
gnupg-2.1.11 dirmngr/Makefile.am' from gnupg master).

If the problem persists, feel free to reopen this bug.

Mar 3 2016, 1:58 PM · dirmngr, gnupg, Bug Report
justus claimed T2235: gnupg-2.1.11, compile error for: make -f build-aux/speedo.mk native.
Mar 3 2016, 12:33 PM · dirmngr, gnupg, Bug Report
justus added a comment to T2235: gnupg-2.1.11, compile error for: make -f build-aux/speedo.mk native.

That particular problem is fixed in 9a1778ab. Can you be more specific on the
other problem(s)?

Mar 3 2016, 12:33 PM · dirmngr, gnupg, Bug Report
justus closed T2261: Disable gpgtar tests when configured with --disable-gpgtar as Resolved.
Mar 3 2016, 12:27 PM · Bug Report, gnupg
justus added a comment to T2261: Disable gpgtar tests when configured with --disable-gpgtar.

Thanks for the patch, but I decided to fix it by skipping the test instead.

Fixed in a883d4c0.

Mar 3 2016, 12:27 PM · Bug Report, gnupg
neal added a comment to T2269: Session key encrypted with AES, but SED packet encrypted with AES256.

The reason that we encrypted the SED packet with AES256 is that is the preferred
cipher in my public key. I think that the cipher for the s2k function should be
chosen similarly.

Mar 3 2016, 10:37 AM · Bug Report, gnupg

Mar 2 2016

neal added projects to T2274: Data decrypted via a pk-esk packet should be better checked: gnupg, Bug Report.
Mar 2 2016, 8:47 PM · Bug Report, gnupg
neal updated subscribers of T2274: Data decrypted via a pk-esk packet should be better checked.
Mar 2 2016, 8:47 PM · Bug Report, gnupg
justus closed T2262: Use protable unix commands and arguments in tests as Resolved.
Mar 2 2016, 6:02 PM · Bug Report, gnupg
justus added a comment to T2262: Use protable unix commands and arguments in tests.

Merged, thanks!

Mar 2 2016, 6:02 PM · Bug Report, gnupg
justus added a comment to T2258: successive runs of `gpg-agent --enable-ssh-support` kills the $SSH_AUTH_SOCK file.

Fixed in 3e1b451c.

Mar 2 2016, 5:05 PM · gnupg, Bug Report
justus closed T2258: successive runs of `gpg-agent --enable-ssh-support` kills the $SSH_AUTH_SOCK file as Resolved.
Mar 2 2016, 5:05 PM · gnupg, Bug Report
justus claimed T2258: successive runs of `gpg-agent --enable-ssh-support` kills the $SSH_AUTH_SOCK file.
Mar 2 2016, 3:56 PM · gnupg, Bug Report
justus added a project to T2258: successive runs of `gpg-agent --enable-ssh-support` kills the $SSH_AUTH_SOCK file: gnupg.
Mar 2 2016, 3:56 PM · gnupg, Bug Report

Mar 1 2016

neal added projects to T2270: gpg caches bad symmetric passwords: gnupg, Bug Report.
Mar 1 2016, 9:49 PM · Bug Report, gnupg
neal added projects to T2269: Session key encrypted with AES, but SED packet encrypted with AES256: gnupg, Bug Report.
Mar 1 2016, 8:20 PM · Bug Report, gnupg
neal closed T2252: Provide --alternate-keyserver to avoid "No valid OpenPGP data found" response as Resolved.
Mar 1 2016, 11:53 AM · gnupg, OpenPGP, Feature Request
neal added a comment to T2252: Provide --alternate-keyserver to avoid "No valid OpenPGP data found" response.

Marking as resolved since this is available in 2.1 and we are not going to
backport this to 1.4 or 2.0. Thanks.

Mar 1 2016, 11:53 AM · gnupg, OpenPGP, Feature Request
aheinecke added projects to T2267: Fix "Invalid Parameter passed to C runtime function" warnings on Windows: Feature Request, gpgagent, gnupg.
Mar 1 2016, 9:49 AM · Windows 32, Windows, gnupg, gpgagent, Feature Request

Feb 25 2016

neal removed a project from T2187: gpg2 --gen-revoke 0x${FINGERPRINT} produces infinite output stream: Restricted Project.
Feb 25 2016, 11:19 AM · Bug Report, gnupg
neal closed T2187: gpg2 --gen-revoke 0x${FINGERPRINT} produces infinite output stream as Resolved.
Feb 25 2016, 11:19 AM · Bug Report, gnupg
neal added a comment to T2187: gpg2 --gen-revoke 0x${FINGERPRINT} produces infinite output stream.

I assume that this patch solved the problem. Thanks for reporting!

Feb 25 2016, 11:19 AM · Bug Report, gnupg

Feb 24 2016

sa added a comment to T1967: GnuPG should select a key for signing without trying to use missing subkeys.

Attached a patch to call agent_probe_secret_key() during finish_lookup().

This partially solves the problem by not trying to use subkeys that have no
secret key present. This does not unexpectedly change the existing behaviour
because GnuPG will currently return an error if the automatically selected
secret key is not present.

It does not solve the issue of having multiple potential signing subkeys on
different smartcards, because these are always considered to be present (if the
subkey has been associated with a smartcard).

Feb 24 2016, 9:39 PM · gnupg (gpg22), Feature Request
sa added a comment to T1967: GnuPG should select a key for signing without trying to use missing subkeys.

D297: 785_sign-fix.patch

Feb 24 2016, 9:39 PM · gnupg (gpg22), Feature Request
guilhem added a comment to T2236: Importing a key with badly ordered packets doesn't reorder it, and while --edit-key does reorder it doesn't move the signature packets to the right place.

Hi Neal,

Thanks for the patch, works great on the couple of keys I tried it on.
Unfortunately I'm unsure how to build OpenPGP keys with deliberately wrongly
ordered packets, so my tests are probably not exhaustive :-( But looking at
your code (from an outsider's perspective), I can't see how revocation
certificates etc would be handled differently from certificate signatures.

I found two issues though:

+ ndataa = pubkey_get_nsig (a->pubkey_algo);
+ ndatab = pubkey_get_nsig (a->pubkey_algo);

I guess it should be "b->pubkey_algo" on the second line.

Also, since the "check" command of the GnuPG prompt can modify the keyblock, it
should set "modify" accordingly:

-8<----------------------------------------------------------------------------------->8-
diff --git a/g10/keyedit.c b/g10/keyedit.c
index d7c2a4b..ede350a 100644

  • a/g10/keyedit.c

+++ b/g10/keyedit.c
@@ -2190,8 +2190,9 @@ keyedit_menu (ctrl_t ctrl, const char *username, strlist_t
locusr,

         break;

       case cmdCHECK:
  • check_all_keysigs (keyblock, count_selected_uids (keyblock),
  • !strcmp (arg_string, "selfsig"));

+ if (check_all_keysigs (keyblock, count_selected_uids (keyblock),
+ !strcmp (arg_string, "selfsig")))
+ modified = 1;

         break;

       case

cmdSIGN:-8<----------------------------------------------------------------------------------->8-

I understand that by default only selfsigs are reordered for performance
reasons. May I suggest to also consider the key to sign with (for instance
specified with "--local-user")? This can be useful, otherwise in order to avoid
potential duplicates signers might have to type "check" before signing a key.

Also (repeating what we discussed about on IRC so it gets indexed on the web :-)
Due to the append-only nature of keyservers, an uploaded badly ordered key
can't be fixed on the keyserver. As a consequence, with the current algorithm
each refresh would undo fixing the packets' order and removing the duplicates.
Ideally keys would be reordered upon import, and the merge algorithm would avoid
duplicate (for instance it could assume the local copy to be properly ordered,
and not add a packet to the local copy if said packet was found elsewhere on the
keyblock).

Feb 24 2016, 6:25 PM · gnupg (gpg22), Bug Report
lorenz added a comment to T2230: gpgsm decryption with smartcard fails with "Invalid session key".

For what it's worth, with the following trivial patch the decryption works:

diff --git a/sm/decrypt.c b/sm/decrypt.c
index a560272..aa6e874 100644

  • a/sm/decrypt.c

+++ b/sm/decrypt.c
@@ -74,9 +74,9 @@ prepare_decryption (ctrl_t ctrl, const char *hexkeygrip, const
char *desc,

    log_printhex ("pkcs1 encoded session key:", seskey, seskeylen);

  n=0;
  • if (seskeylen == 24)

+ if (seskeylen == 24 || seskeylen == 16)

{
  • /* Smells like a 3-des key. This might happen because a SC has

+ /* Smells like a 3-des or AES key. This might happen because a SC has

          already done the unpacking. */
     }
   else

I am not sure this is a good solution, though, it is probably better to somehow
pass along the information whether the padding is already stripped or not.

Kind regards,

Lorenz
Feb 24 2016, 4:05 PM · Restricted Project, gnupg, scd, Bug Report, S/MIME
aheinecke set Version to 2.1.11 on T2266: Gpg4win: Migrate Keyring to Keybox.
Feb 24 2016, 3:57 PM · Feature Request, gnupg, gpg4win
aheinecke added projects to T2266: Gpg4win: Migrate Keyring to Keybox: gpg4win, gnupg, Bug Report.
Feb 24 2016, 3:57 PM · Feature Request, gnupg, gpg4win
aheinecke added a comment to T2135: Keyring locking on Windows broken.

I've tested it with pubring now too and it works.
Justus mentioned in jabber that he noticed some more errors after this patch in
the scheme tests. I've not tried them.

Feb 24 2016, 3:39 PM · Bug Report, gpg4win, Windows, gnupg, Windows 32
werner lowered the priority of T2135: Keyring locking on Windows broken from High to Normal.
Feb 24 2016, 2:24 PM · Bug Report, gpg4win, Windows, gnupg, Windows 32
werner added a comment to T2135: Keyring locking on Windows broken.

Okay, so I can backport this to 2.0 ?

Feb 24 2016, 2:24 PM · Bug Report, gpg4win, Windows, gnupg, Windows 32

Feb 22 2016

aheinecke added a comment to T2135: Keyring locking on Windows broken.

Tested this with keybox and it appears to be working. When running a keylist
while importing the import holds for a bit and continues after the keylist.
Not tested this with keyring yet.

Feb 22 2016, 11:14 AM · Bug Report, gpg4win, Windows, gnupg, Windows 32

Feb 19 2016

neal added a comment to T2229: make check 14 0f 35 tests failed.

Thanks! I'm mark this as resolved.

Feb 19 2016, 6:59 PM · Bug Report, gnupg
neal removed a project from T2229: make check 14 0f 35 tests failed: Restricted Project.
Feb 19 2016, 6:59 PM · Bug Report, gnupg
neal closed T2229: make check 14 0f 35 tests failed as Resolved.
Feb 19 2016, 6:59 PM · Bug Report, gnupg
neal added a project to T2236: Importing a key with badly ordered packets doesn't reorder it, and while --edit-key does reorder it doesn't move the signature packets to the right place: Restricted Project.
Feb 19 2016, 6:57 PM · gnupg (gpg22), Bug Report
neal added a comment to T2236: Importing a key with badly ordered packets doesn't reorder it, and while --edit-key does reorder it doesn't move the signature packets to the right place.

I've pushed a slightly different version of this patch (2d1d795). Please test
not only that --edit-key detects duplicates and reorders out of place
signatures, but also that revocation certifications, self-sigs, etc. are
correctly checked. Thanks!

Feb 19 2016, 4:42 PM · gnupg (gpg22), Bug Report
uldis added projects to T2262: Use protable unix commands and arguments in tests: gnupg, Bug Report.
Feb 19 2016, 8:04 AM · Bug Report, gnupg
uldis added a comment to T2262: Use protable unix commands and arguments in tests.

D363: 781_gnupg_test_with_portable_shell_commands.patch

Feb 19 2016, 8:04 AM · Bug Report, gnupg
uldis added a comment to T2261: Disable gpgtar tests when configured with --disable-gpgtar.

D362: 780_gnupg_do_not_run_gpgtar_test_when_not_built.patch

Feb 19 2016, 8:00 AM · Bug Report, gnupg
uldis added projects to T2261: Disable gpgtar tests when configured with --disable-gpgtar: gnupg, Bug Report.
Feb 19 2016, 8:00 AM · Bug Report, gnupg

Feb 18 2016

t8m added a comment to T2229: make check 14 0f 35 tests failed.

Yes, that patch fixed the problem for me.

Feb 18 2016, 5:24 PM · Bug Report, gnupg

Feb 16 2016

neal added a comment to T2250: OpenPGP ASCII armor should be more robust.

I've pushed this.

Feb 16 2016, 4:45 PM · gnupg, Feature Request
neal closed T2250: OpenPGP ASCII armor should be more robust as Resolved.
Feb 16 2016, 4:45 PM · gnupg, Feature Request
neal added a comment to T2236: Importing a key with badly ordered packets doesn't reorder it, and while --edit-key does reorder it doesn't move the signature packets to the right place.

The branch neal/issue2236 contains an initial fix. It does two things:

  • It identifies duplicate signatures (based on their message digest) and removes

duplicates.

  • Instead of blindly moving signatures around, this systematically tests each

signature against its alleged component (= primary key / subkey / user id) and
if it is bad, it tries the other components in the key block and moves it if
appropriate. (If it doesn't belong to any components, then the sig is just left
where it is and GnuPG will ignore it).

I've tested this with a few keys and it seems to work well. Lucas' key just has
a lot of duplicate signatures.

Starting program: /home/us/neal/work/gpg/build/gnupg/g10/gpg2 --check-key
0x06EAA066E397832F
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
gpg: WARNING: unsafe permissions on homedir '/tmp/luca'
gpg: NOTE: THIS IS A DEVELOPMENT VERSION!
gpg: It is only intended for test purposes and should NOT be
gpg: used in a production environment or with production keys!
gpg: Ignored 852 duplicate signatures (total: 2079).
gpg: public key E397832F: timestamp: 2009-07-01 14:44:59 (1246459499)
gpg: user id: Luca Capello <luca@pca.it>
gpg: sig: class: 0x10, issuer: 109E6244, timestamp: 2013-02-05 02:24:16
(1360031056), digest: eb c3
gpg: Good signature over last major component!
gpg: sig: class: 0x13, issuer: E397832F, timestamp: 2009-07-01 14:44:59
(1246459499), digest: 93 7a
gpg: Good signature over last major component!
gpg: sig: class: 0x13, issuer: E397832F, timestamp: 2009-07-01 14:58:17
(1246460297), digest: 53 4f
gpg: Good signature over last major component!
gpg: sig: class: 0x13, issuer: E397832F, timestamp: 2010-10-10 21:44:51
(1286747091), digest: be d5
gpg: Good signature over last major component!
gpg: user id: Luca Capello <gismo@debian.org>
gpg: sig: class: 0x10, issuer: 109E6244, timestamp: 2013-02-05 02:24:16
(1360031056), digest: 4e 92
gpg: Good signature over last major component!
gpg: sig: class: 0x13, issuer: E397832F, timestamp: 2009-07-01 14:57:12
(1246460232), digest: 9c 3d
gpg: Good signature over last major component!
gpg: sig: class: 0x13, issuer: E397832F, timestamp: 2010-10-10 21:52:18
(1286747538), digest: 54 c1
gpg: Good signature over last major component!
gpg: user id: Luca Capello <luca.capello@infomaniak.ch>
gpg: sig: class: 0x13, issuer: E397832F, timestamp: 2016-01-24 14:44:42
(1453646682), digest: 79 a4
gpg: Good signature over last major component!
gpg: user id: Luca Capello <luca.capello@infomaniak.com>
gpg: sig: class: 0x13, issuer: E397832F, timestamp: 2016-01-29 22:49:59
(1454107799), digest: 43 19
gpg: Good signature over last major component!
gpg: subkey 2BB95F4B: timestamp: 2009-07-01 14:55:55 (1246460155)
gpg: sig: class: 0x18, issuer: E397832F, timestamp: 2009-07-01 14:55:55
(1246460155), digest: 4b d9
gpg: Good signature over last major component!
gpg: subkey 3BE9F36D: timestamp: 2009-07-01 15:09:03 (1246460943)
gpg: sig: class: 0x18, issuer: E397832F, timestamp: 2009-07-01 15:09:03
(1246460943), digest: c2 f9
gpg: Good signature over last major component!
gpg: Couldn't check 1216 signatures due to missing issuer keys.

Interestingly, your key contains a bad signature (the hash has been corrupted).

The reason that I haven't pushed this to master is that I need to work our how
the output should look. Also, this functionality will probably only be
available via the --edit-key menu. This patch includes an argument --check-key,
which will probably be removed.

If you have an opportunity to test this, I'd appreciate it.

Feb 16 2016, 3:56 PM · gnupg (gpg22), Bug Report
dkg added a comment to T2134: iconv.dll is still a problem.

fwiw, i've now got most of GnuPG cross-building for win32 from a debian platform
using win-iconv. win-iconv doesn't seem to be a terrible choice to me.

Feb 16 2016, 8:10 AM · Feature Request, gnupg

Feb 15 2016

werner added a comment to T2250: OpenPGP ASCII armor should be more robust.

Great

Feb 15 2016, 8:50 PM · gnupg, Feature Request
werner added a comment to T2252: Provide --alternate-keyserver to avoid "No valid OpenPGP data found" response.

I guess you are reporting for GnuPG 2.0 or 1.4.
We already implemented your suggestion in 2.1.

Feb 15 2016, 8:44 PM · gnupg, OpenPGP, Feature Request
justus added a comment to T2250: OpenPGP ASCII armor should be more robust.

Yes, that patch works for me.

Feb 15 2016, 11:33 AM · gnupg, Feature Request

Feb 14 2016

neal closed T2240: calc_header_length as Resolved.
Feb 14 2016, 4:25 PM · Bug Report, gnupg
neal added a comment to T2240: calc_header_length.

Given how trivial the fix is, I applied that.

Feb 14 2016, 4:25 PM · Bug Report, gnupg
neal added a comment to T2250: OpenPGP ASCII armor should be more robust.

The following simple patch works for me and make check still passes. I think it
makes sense to apply this patch given that this workaround is no more
complicated than an existing workaround for something similar (immediately
preceding my change). Can you please test to make sure it works for you?

Feb 14 2016, 4:02 PM · gnupg, Feature Request