Page MenuHome GnuPG
Feed Advanced Search

Feb 10 2017

anarcat set Version to 2.1.18 on T2954: signing a file shows me my short keyid instead of long.
Feb 10 2017, 11:58 PM · gnupg
anarcat added projects to T2954: signing a file shows me my short keyid instead of long: gnupg, Bug Report.
Feb 10 2017, 11:58 PM · gnupg

Feb 9 2017

bslbckr added a comment to T2953: scdaemon fails to decrypt if unusual key-size is chosen.

I'm having trouble decrypting some mails. I use an encryption sub-key with a
unusual length of 3104 bits. I described my problem in the gnupg-users mailing
list and there the following problem was identified:
<quote>
I think that it is deterministic; The cause is that the RSA keysize is
not the one in the set of: 1024, 1536, 2048, 3072, 4096. When data to
be decrypted is padded, scdaemon can't decrypt, I suppose.

I am not sure the exact reason why scdaemon only supports limited set of
keysize for encryption. But we have this handling of padding in the
current code:

https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=blob;f=scd/app-openpgp.c;h=71c9e1b83003af07b0984688ba1ec5e9013b877c;hb=refs/heads/master#l4334

       /* We might encounter a couple of leading zeroes in the
          cryptogram.  Due to internal use of MPIs these leading zeroes
          are stripped.  However the OpenPGP card expects exactly 128
          bytes for the cryptogram (for a 1k key).  Thus we need to fix
          it up.  We do this for up to 16 leading zero bytes; a
          cryptogram with more than this is with a very high
          probability anyway broken.  If a signed conversion was used
          we may also encounter one leading zero followed by the correct
          length.  We fix that as well.  */
       if (indatalen >= (128-16) && indatalen < 128)      /* 1024 bit key.  */
         fixuplen = 128 - indatalen;
       else if (indatalen >= (192-16) && indatalen < 192) /* 1536 bit key.  */
         fixuplen = 192 - indatalen;
       else if (indatalen >= (256-16) && indatalen < 256) /* 2048 bit key.  */
         fixuplen = 256 - indatalen;
       else if (indatalen >= (384-16) && indatalen < 384) /* 3072 bit key.  */
         fixuplen = 384 - indatalen;
       else if (indatalen >= (512-16) && indatalen < 512) /* 4096 bit key.  */
         fixuplen = 512 - indatalen;
       else if (!*(const char *)indata && (indatalen == 129
                                           || indatalen == 193
                                           || indatalen == 257
                                           || indatalen == 385
                                           || indatalen == 513))
         fixuplen = -1;
       else
         fixuplen = 0;

Perhaps, it was due to support all existing OpenPGP card
implementations, I mean, somehow historical, and it was easier to list
up specific keysizes.

This should be fixed.
</quote>

I also attached to log-files of the scdaemon. One for a successful and one for a
failed decryption attempt.

Please let me know if you need any additional information.

Feb 9 2017, 8:46 PM · Bug Report, gnupg, scd
bslbckr added a comment to T2953: scdaemon fails to decrypt if unusual key-size is chosen.

Feb 9 2017, 8:42 PM · Bug Report, gnupg, scd
bslbckr added projects to T2953: scdaemon fails to decrypt if unusual key-size is chosen: scd, gnupg, Bug Report.
Feb 9 2017, 8:42 PM · Bug Report, gnupg, scd

Feb 8 2017

dkg added a comment to T2928: stop fetching PTR records entirely.

The unnecessary PTR lookup is causing problems for other people too, over on
https://bugs.debian.org/854359

Feb 8 2017, 11:33 PM · Debian, Bug Report, gnupg, dirmngr
dkg set External Link to https://bugs.debian.org/854359 on T2928: stop fetching PTR records entirely.
Feb 8 2017, 11:33 PM · Debian, Bug Report, gnupg, dirmngr
dkg added a comment to T2946: gpg-agent should be able to terminate when all its state expires.

I agree about that race condition being an important thing to consider, but i
think it's orthogonal to whether the process is self-terminating.

That is: we need to consider that race condition even in the case of deliberate
shutdown too, right?

Do we have a test case that involves two concurrent processes, one that tries to
stop the agent, and the other that tries to access it?

Feb 8 2017, 4:01 PM · gnupg, Debian, gpgagent, Feature Request
justus removed a project from T2929: tofu: Missing entry in the bindings table for new key: Restricted Project.
Feb 8 2017, 2:53 PM · Bug Report, gnupg, gnupg (gpg22)
justus added a comment to T2929: tofu: Missing entry in the bindings table for new key.

So I believe that if we have a test that demonstrates this problem, then it is
safe to set the status to resolved.

Feb 8 2017, 2:53 PM · Bug Report, gnupg, gnupg (gpg22)
justus closed T2929: tofu: Missing entry in the bindings table for new key as Resolved.
Feb 8 2017, 2:53 PM · Bug Report, gnupg, gnupg (gpg22)
justus closed T2941: outbound file descriptors (status-fd, attribute-fd, logger-fd) should fail if descriptors is not initially open as Resolved.
Feb 8 2017, 2:47 PM · Bug Report, gnupg
justus added a comment to T2941: outbound file descriptors (status-fd, attribute-fd, logger-fd) should fail if descriptors is not initially open.

Fixed in 6823ed46584e753de3aba48a00ab738ab009a860.

Feb 8 2017, 2:47 PM · Bug Report, gnupg
justus claimed T2941: outbound file descriptors (status-fd, attribute-fd, logger-fd) should fail if descriptors is not initially open.
Feb 8 2017, 12:23 PM · Bug Report, gnupg
justus added a comment to T2856: Can't ssh-add a key w/o a passphrase.

I can reproduce this. Our test indeed feeds a passphrase to the agent.

Feb 8 2017, 10:16 AM · Debian, Bug Report, gnupg, ssh
dkg added projects to T2948: libdns lookups fails when nssswitch has no "dns" section: dirmngr, gnupg, Bug Report.
Feb 8 2017, 12:03 AM · Restricted Project, Bug Report, gnupg, dirmngr

Feb 7 2017

justus added a comment to T2847: ssh.scm fails to import ecdsa key on macOS.

Addressed in 56aa85f88f6b35fb03a2dc1a95882d49a74290e3.

Feb 7 2017, 6:12 PM · MacOS, Bug Report, gnupg
justus added a project to T2847: ssh.scm fails to import ecdsa key on macOS: Restricted Project.
Feb 7 2017, 6:12 PM · MacOS, Bug Report, gnupg
justus added a comment to T2947: ssh-import.scm test fails on Yosemite.

Addressed in 56aa85f88f6b35fb03a2dc1a95882d49a74290e3.

Feb 7 2017, 6:12 PM · Bug Report, gnupg
justus added a project to T2947: ssh-import.scm test fails on Yosemite: Restricted Project.
Feb 7 2017, 6:12 PM · Bug Report, gnupg
ilovezfs added a comment to T2847: ssh.scm fails to import ecdsa key on macOS.

Here's the make check verbose=2 log for 2.1.18 on macOS 10.10.5 Yosemite:
https://gist.github.com/ilovezfs/d9de58955697858a1eb3c6d3a5e48bea

And ssh -V:
OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011

Feb 7 2017, 12:12 PM · MacOS, Bug Report, gnupg
ilovezfs added a comment to T2947: ssh-import.scm test fails on Yosemite.

I feel that this is the very same issue as T2847

I assumed they were different issues since this is ssh-import.scm and that was
ssh.scm.

I asked what version of ssh you were using over there, and sadly you

did not react.

Sorry

Feb 7 2017, 11:48 AM · Bug Report, gnupg
justus added a comment to T2946: gpg-agent should be able to terminate when all its state expires.

One thing to look out for is a race condition between the agent deciding to shut
down, and a client trying to connect at that time, and that might lead to
intermittent failures. It may be doable correctly, but it is something to look
out for.

The other point being raised in the bug report about older daemons hanging
around over package upgrades should be discussed in a different bug. Yes,
shutting down the daemon when idle may work around this issue sometimes, but
clearly this is not a robust solution.

Feb 7 2017, 11:04 AM · gnupg, Debian, gpgagent, Feature Request
justus set External Link to https://bugs.debian.org/853905 on T2946: gpg-agent should be able to terminate when all its state expires.
Feb 7 2017, 11:04 AM · gnupg, Debian, gpgagent, Feature Request
justus changed Version from 2.18 to 2.1.18 on T2947: ssh-import.scm test fails on Yosemite.
Feb 7 2017, 10:55 AM · Bug Report, gnupg
justus claimed T2947: ssh-import.scm test fails on Yosemite.
Feb 7 2017, 10:55 AM · Bug Report, gnupg
justus added a comment to T2947: ssh-import.scm test fails on Yosemite.

Yes, your version of OpenSSH does not seem support elliptic curve cryptography.
I feel that this is the very same issue as T2847, could you please revisit
that bug? I asked what version of ssh you were using over there, and sadly you
did not react.

I guess we need to figure out what kind of algorithms are supported, and skip
the ones that are not.

Feb 7 2017, 10:55 AM · Bug Report, gnupg
ilovezfs added a comment to T2947: ssh-import.scm test fails on Yosemite.

Additional findings. If I depend on homebrew/dupes/openssh (which is not
actually permissible in homebrew/core, but just for the sake of testing this
here), then the test passes. The homebrew/dupes/openssh formula is 7.4p1, so
this bug appears to be specific to 6.2p2 (possible all of 6.2 or all of 6.x?)

Feb 7 2017, 9:51 AM · Bug Report, gnupg
ilovezfs added a comment to T2947: ssh-import.scm test fails on Yosemite.

Note this is

yosemitevm:brew brew$ ssh -V
OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
Feb 7 2017, 9:36 AM · Bug Report, gnupg
ilovezfs added projects to T2947: ssh-import.scm test fails on Yosemite: gnupg, Bug Report.
Feb 7 2017, 9:34 AM · Bug Report, gnupg
ilovezfs set Version to 2.18 on T2947: ssh-import.scm test fails on Yosemite.
Feb 7 2017, 9:34 AM · Bug Report, gnupg

Feb 6 2017

dkg added projects to T2946: gpg-agent should be able to terminate when all its state expires: Feature Request, gpgagent, Debian, gnupg.
Feb 6 2017, 9:19 PM · gnupg, Debian, gpgagent, Feature Request
dkg added a comment to T2945: gpg should explicitly set output file permissions during decryption.

Sorry: to clarify my previous remark: i don't think gpg should change from its
current behavior during *encryption*. I do think it should be more constrained
in its output during *decryption*.

Feb 6 2017, 7:24 PM · Feature Request, gnupg
dkg added a comment to T2945: gpg should explicitly set output file permissions during decryption.

I don't think it's a problem that the files created during encryption simply
obey the umask.

I do think that when gpg creates sensitive data, though, it should limit the
mode of its output to the mode of its input (filtered by the umask, of course)

if the mode of the input is INMODE, and the umask is UMASK, during decryption,
when gpg creates an output file, it should set the mode to (INMODE & ~UMASK).

(if gpg is decrypting and sending output to stdout, perhaps it wants to try
fchmod (1, INMODE & ~UMASK) as well?)

Feb 6 2017, 7:23 PM · Feature Request, gnupg
anarcat added a comment to T2945: gpg should explicitly set output file permissions during decryption.

well, it looks like i stand corrected: the problem happens both in encryption
and decryption. i *meant* to post about decryption, but i only pasted the setup
part... :p

[1012]anarcat@curie:~130$ rm foo
rm : supprimer fichier 'foo' ? y
[1013]anarcat@curie:~$ gpg foo.gpg
gpg: encrypted with 4096-bit RSA key, ID A51D5B109C5A5581, created 2009-05-29

"Antoine Beaupré <anarcat@orangeseeds.org>"

[1014]anarcat@curie:~$ ls -al foo*
-rw-r--r-- 1 anarcat anarcat 4 fév 6 13:16 foo
-rw-r--r-- 1 anarcat anarcat 594 fév 6 13:04 foo.gpg
[1015]anarcat@curie:~$ chmod 600 foo.gpg
[1016]anarcat@curie:~$ ls -al foo*^C
[1016]anarcat@curie:~130$ rm foo
rm : supprimer fichier 'foo' ? y
[1017]anarcat@curie:~$ gpg foo.gpg
gpg: encrypted with 4096-bit RSA key, ID A51D5B109C5A5581, created 2009-05-29

"Antoine Beaupré <anarcat@orangeseeds.org>"

[1018]anarcat@curie:~$ =k^C
[1018]anarcat@curie:~130$ ls -al foo*
-rw-r--r-- 1 anarcat anarcat 4 fév 6 13:16 foo
-rw------- 1 anarcat anarcat 594 fév 6 13:04 foo.gpg

Feb 6 2017, 7:16 PM · Feature Request, gnupg
anarcat added projects to T2945: gpg should explicitly set output file permissions during decryption: gnupg, Bug Report.
Feb 6 2017, 7:07 PM · Feature Request, gnupg
dkg added projects to T2944: gpgconf --change-option should not print a warning when the relevant conf file does not exist: gnupg, Bug Report.
Feb 6 2017, 6:54 PM · Restricted Project, Bug Report, gnupg
dkg added projects to T2943: gpg should issue a warning when it is run without a command: gnupg, Bug Report.
Feb 6 2017, 6:49 PM · Bug Report, gnupg
dkg added projects to T2942: gpg needs to offer a way to list OpenPGP packets without consuming them: gnupg, Bug Report.
Feb 6 2017, 6:38 PM · Bug Report, gnupg
dkg set Version to 2.1.18 on T2942: gpg needs to offer a way to list OpenPGP packets without consuming them.
Feb 6 2017, 6:38 PM · Bug Report, gnupg

Feb 5 2017

dkg added a comment to T1967: GnuPG should select a key for signing without trying to use missing subkeys.

I've tested Simon's patch against 2.1.18, and i think it's the right thing. I
posted it to the mailing list in git-format-patch form here:

https://lists.gnupg.org/pipermail/gnupg-devel/2017-February/032547.html

Feb 5 2017, 10:51 PM · gnupg (gpg22), Feature Request
dkg added projects to T2941: outbound file descriptors (status-fd, attribute-fd, logger-fd) should fail if descriptors is not initially open: gnupg, Bug Report.
Feb 5 2017, 9:17 PM · Bug Report, gnupg
dkg added a comment to T1967: GnuPG should select a key for signing without trying to use missing subkeys.

Any progress on this?

A reproducer, even without smartcards (please ensure that GNUPGHOME is
explicitly set):

ARGS="--pinentry-mode loopback --passphrase abc123"
ARGS="$ARGS --batch --with-colons --with-keygrip --status-fd 3"

gpg $ARGS --quick-gen test@example.org rsa cert 3>genkey.status
FPR=$(awk '/KEY_CREATED/{ print $4 }' < genkey.status)
gpg $ARGS --quick-add-key 0x$FPR rsa sign 3>addkey-1.status
sleep 5
gpg $ARGS --quick-add-key 0x$FPR rsa sign 3>addkey-2.status
GRIP=$(gpg $ARGS --list-keys | grep ^grp: | cut -f10 -d: | tail -n1)
mv $GNUPGHOME/private-keys-v1.d/$GRIP.,bak
gpg-connect-agent killagent /bye
echo test | gpg $ARGS -u "$FPR" --clear-sign

Feb 5 2017, 8:42 PM · gnupg (gpg22), Feature Request
dkg added a comment to T2022: dutch localizations for GnuPG.

This was included in 2.0.30, but somehow was missing from the 2.1.x branch.
I've included it in master as of 8a9d4b55b09d04482b46055f0a60f01b86738df3

Feb 5 2017, 6:54 PM · gnupg, gnupg (gpg20), gnupg (gpg14), i18n, Feature Request
dkg changed Version from 2.0.28, 1.4.19 to 2.0.28, 1.4.19, 2.1.18 on T2022: dutch localizations for GnuPG.
Feb 5 2017, 6:54 PM · gnupg, gnupg (gpg20), gnupg (gpg14), i18n, Feature Request
dkg closed T2022: dutch localizations for GnuPG as Resolved.
Feb 5 2017, 6:54 PM · gnupg, gnupg (gpg20), gnupg (gpg14), i18n, Feature Request
dkg added projects to T2940: dirmngr fails for hkps when http-proxy is in use: dirmngr, gnupg, Bug Report, Debian.
Feb 5 2017, 9:35 AM · Feature Request, gnupg (gpg22), Debian, gnupg, dirmngr
dkg changed External Link from 846175@bugs.debian.org to https://bugs.debian.org/846175 on T2856: Can't ssh-add a key w/o a passphrase.
Feb 5 2017, 9:18 AM · Debian, Bug Report, gnupg, ssh
dkg added a comment to T2856: Can't ssh-add a key w/o a passphrase.

Any thoughts or progress on this?

Feb 5 2017, 9:18 AM · Debian, Bug Report, gnupg, ssh
shuffle2 added a comment to T2939: Should not be required to manually `killagent` on card removal.

By the way, I've noticed that communication with the card will only be broken
upon reinsertion if some software has attempted to access the card while it is
detached.
In other words:
access card -> remove -> insert -> access card
is fine.
access card -> remove -> access card -> insert -> access card
will cause all accesses to fail after insertion until gpg-agent is killed (and
restarted obviously).

Feb 5 2017, 12:34 AM · gnupg (gpg20), Bug Report, gnupg
shuffle2 added projects to T2939: Should not be required to manually `killagent` on card removal: gnupg, Bug Report.
Feb 5 2017, 12:31 AM · gnupg (gpg20), Bug Report, gnupg
shuffle2 added projects to T2938: scd-event is annoying to use on Windows: gnupg, Bug Report.
Feb 5 2017, 12:25 AM · Windows 32, scd, Windows, Bug Report, gnupg

Feb 4 2017

richie765 set Version to 2.0 on T2937: Please update tools/gpg-zip.in for 2.0 branch.
Feb 4 2017, 3:25 PM · Bug Report, gnupg
richie765 added projects to T2937: Please update tools/gpg-zip.in for 2.0 branch: gnupg, Bug Report.
Feb 4 2017, 3:25 PM · Bug Report, gnupg
dkg added a comment to T2932: gpgv error messages are confusing.

the reason "no public key" is confusing is because gpgv already knows that there
can be no public key. So the message that the naive user needs to see in this
case is "no keyring available".

If there is at least one keyring available, then saying something like "no
public key found in keyrings X and Y and Z" is reasonable. but if there are no
keyrings at all, the message should just be something like "no keyring found to
validate signature against".

Feb 4 2017, 8:01 AM · Bug Report, gnupg, gpgv
dkg added a comment to T2935: use-tor should have a third possible value, "if available".

Thanks for this work (and sorry to have just blindly/wrongly assumed that
--no-use-tor already existed without checking it).

On modern debian systems, the default tor daemon will always be listening on
unix domain socket /run/tor/socks. So a simple attempt to connect to that
socket should be sufficient -- it should fail immediately if the socket isn't
present or if no one is listening on it.

This seems cheap and fast enough to be able to do it on every query to me,
rather than introducing additional runtime state to dirmngr. just try to
connect, and if it doesn't work, fall back to a normal connection (you'd want to
do that anyway in case the tor daemon goes away after dirmngr had been launched).

Feb 4 2017, 2:56 AM · gnupg (gpg22), In Progress, Feature Request, dirmngr

Feb 3 2017

werner added a project to T2874: sefgfault with gpgsm --sign: gnupg.
Feb 3 2017, 12:31 PM · gnupg, Bug Report, Debian
amonk added a comment to T2936: pubring.kbx to pubring.kbx~.

That doesn't seem all that large in the modern era, but okay. In any
case, after moving it to the backup file, don't the same number of bytes
need to be written into the new file anyway? And, regardless, how can
something be done to facilitate pubring.kbx sometimes being a symlink then?
Perhaps an option so the choice of move vs. copy can be left to the user?

--Kyle

Feb 3 2017, 6:22 AM · Bug Report, gnupg

Feb 2 2017

grempe added a comment to T2853: Signature Verification returning 'gpg: DBG: tofu.c:2772: strtoul failed for DB returned string (tail=): Invalid argument'.

I'm curious. So what was it about this particular key and signed text that caused this
to expose this error while others did not?

Feb 2 2017, 10:56 PM · Bug Report, gnupg
grempe added a comment to T2853: Signature Verification returning 'gpg: DBG: tofu.c:2772: strtoul failed for DB returned string (tail=): Invalid argument'.

Here is the output from the program you attached running on OS X Sierra and compiled
with gcc. Is it what you expected?

$ ./a.out
0 => 0; tail = ''; errno = Undefined error: 0 (0)
1 => 1; tail = ''; errno = Undefined error: 0 (0)
=> 0; tail = ''; errno = Invalid argument (22)

Feb 2 2017, 10:52 PM · Bug Report, gnupg
ikelos added a comment to T2933: gnupg-2.1.18 fails to read a Yubikey Neo that gnupg-2.1.17 reads fine.

Sorry, forgot the reference for [1] previously:

https://bbs.archlinux.org/viewtopic.php?id=222401

Feb 2 2017, 7:19 PM · Bug Report, gnupg
ikelos added a comment to T2933: gnupg-2.1.18 fails to read a Yubikey Neo that gnupg-2.1.17 reads fine.

I can also confirm that adding the line "disable-ccid" to scdaemon.conf appears
to revert to the previous system, which then works fine (but doesn't really fix
the issue).

Feb 2 2017, 7:08 PM · Bug Report, gnupg
ikelos added a comment to T2933: gnupg-2.1.18 fails to read a Yubikey Neo that gnupg-2.1.17 reads fine.

Having read [1], I double checked my scdaemon.conf (which apparently already
featured debug-all) and made sure it to read as follows:

log-file /home/mike/.gnupg/scdaemon.log
debug-all

I got the following from attempting to run gpg --card-status:

2017-02-02 18:00:58 scdaemon[32091] DBG: chan_5 <- GETINFO version
2017-02-02 18:00:58 scdaemon[32091] DBG: chan_5 -> D 2.1.18
2017-02-02 18:00:58 scdaemon[32091] DBG: chan_5 -> OK
2017-02-02 18:00:58 scdaemon[32091] DBG: chan_5 <- SERIALNO openpgp
2017-02-02 18:00:58 scdaemon[32091] DBG: apdu_open_reader: BAI=10a02
2017-02-02 18:00:58 scdaemon[32091] DBG: apdu_open_reader: new device=10a02
2017-02-02 18:00:58 scdaemon[32091] ccid open error: skip
2017-02-02 18:00:58 scdaemon[32091] DBG: chan_5 -> ERR 100696144 No such device
<SCD>
2017-02-02 18:00:58 scdaemon[32091] DBG: chan_5 <- RESTART
2017-02-02 18:00:58 scdaemon[32091] DBG: chan_5 -> OK

Please let me know what further information I can provide to help debug this?

Feb 2 2017, 7:05 PM · Bug Report, gnupg
neal added a comment to T2853: Signature Verification returning 'gpg: DBG: tofu.c:2772: strtoul failed for DB returned string (tail=): Invalid argument'.

This should be fixed by 407f5f9baea5591f148974240a87dfb43e5efef3 .

Thanks for reporting this!

Feb 2 2017, 4:03 PM · Bug Report, gnupg
neal added a project to T2853: Signature Verification returning 'gpg: DBG: tofu.c:2772: strtoul failed for DB returned string (tail=): Invalid argument': Restricted Project.
Feb 2 2017, 4:03 PM · Bug Report, gnupg
neal added a comment to T2853: Signature Verification returning 'gpg: DBG: tofu.c:2772: strtoul failed for DB returned string (tail=): Invalid argument'.

Feb 2 2017, 3:36 PM · Bug Report, gnupg
neal added a comment to T2853: Signature Verification returning 'gpg: DBG: tofu.c:2772: strtoul failed for DB returned string (tail=): Invalid argument'.

According to SUSv3:

If the subject sequence is empty or does not have the expected form, no

conversion is performed

...
If no conversion could be performed, 0 is returned  and errno may be set to

[EINVAL].

  http://pubs.opengroup.org/onlinepubs/007908799/xsh/strtol.html

It appears that MacOS X sets errno to EINVAL, but glibc doesn't.
(The attached program should expose the behavior; I haven't run it yet on Max OS
X, but I'd be interested in the result.)

Feb 2 2017, 3:36 PM · Bug Report, gnupg
neal added a project to T2929: tofu: Missing entry in the bindings table for new key: Restricted Project.
Feb 2 2017, 2:25 PM · Bug Report, gnupg, gnupg (gpg22)
neal added a comment to T2929: tofu: Missing entry in the bindings table for new key.

The underlying problem is that bindings for ultimately trusted keys were not
registered with the TOFU data.

Fixed in 769272ba87f282a69e8d5f9bb27c86e6bec4496b

Feb 2 2017, 2:25 PM · Bug Report, gnupg, gnupg (gpg22)
neal added a comment to T2914: TOFU Conflict Status fd output broken.

This should be fixed in 027b81b35fe36692005b8dba22d9eb2db05e8c80.

Feb 2 2017, 1:31 PM · rc, Bug Report, gnupg, TOFU
neal added a project to T2914: TOFU Conflict Status fd output broken: Restricted Project.
Feb 2 2017, 1:31 PM · rc, Bug Report, gnupg, TOFU
werner added a comment to T2936: pubring.kbx to pubring.kbx~.

Copying pubring.kbx to the backup file is not an option because keyrings tend to
get very large. Several dozen megabytes are quite common.

Feb 2 2017, 10:22 AM · Bug Report, gnupg
amonk added projects to T2936: pubring.kbx to pubring.kbx~: gnupg, Bug Report.
Feb 2 2017, 6:07 AM · Bug Report, gnupg
amonk set Version to 2.1.16 on T2936: pubring.kbx to pubring.kbx~.
Feb 2 2017, 6:07 AM · Bug Report, gnupg

Feb 1 2017

werner added a project to T2935: use-tor should have a third possible value, "if available": In Progress.
Feb 1 2017, 6:02 PM · gnupg (gpg22), In Progress, Feature Request, dirmngr
werner added a comment to T2935: use-tor should have a third possible value, "if available".

Okay, that first part has been pushed. Now need to figure out how to test for
Tor in a clean way.

Feb 1 2017, 6:02 PM · gnupg (gpg22), In Progress, Feature Request, dirmngr
werner added a comment to T2935: use-tor should have a third possible value, "if available".

I will do some rework to make testing for tor easier ....

Feb 1 2017, 5:15 PM · gnupg (gpg22), In Progress, Feature Request, dirmngr
werner added a comment to T2935: use-tor should have a third possible value, "if available".

I think this is a good idea. If Tor is already running we can expect that the
user wants to use Tor as much as possible and thus tehre should be no need for
any configuration.

I do not think that we need a new option (except for making --no-use-tor). To
avoid checking for tor with every new connection to Dirmngr, I would do a test
at startup and after each reload.

Feb 1 2017, 5:14 PM · gnupg (gpg22), In Progress, Feature Request, dirmngr
werner added projects to T2934: Serpent-256 unavailable in 2.0.30: In Progress, gnupg (gpg20).
Feb 1 2017, 5:08 PM · gnupg (gpg20), Bug Report, In Progress, gnupg

Jan 31 2017

dkg added projects to T2935: use-tor should have a third possible value, "if available": dirmngr, Feature Request, gnupg.
Jan 31 2017, 9:49 PM · gnupg (gpg22), In Progress, Feature Request, dirmngr
werner closed T2852: scdaemon + forwarded ssh agent: 100% reproducible crash as Resolved.
Jan 31 2017, 1:33 PM · Unreleased, gnupg (gpg20), Bug Report, gnupg
werner added a project to T2852: scdaemon + forwarded ssh agent: 100% reproducible crash: Unreleased.
Jan 31 2017, 1:33 PM · Unreleased, gnupg (gpg20), Bug Report, gnupg
werner removed a project from T2852: scdaemon + forwarded ssh agent: 100% reproducible crash: Restricted Project.
Jan 31 2017, 1:33 PM · Unreleased, gnupg (gpg20), Bug Report, gnupg
werner removed a project from T2745: gpg 2.1.15, *no* keyservers found for submit/recv, "DNS query returned an error or no records: No such domain (nxdomain)": Restricted Project.
Jan 31 2017, 1:28 PM · gnupg, Bug Report, dirmngr
werner closed T2745: gpg 2.1.15, *no* keyservers found for submit/recv, "DNS query returned an error or no records: No such domain (nxdomain)" as Resolved.
Jan 31 2017, 1:28 PM · gnupg, Bug Report, dirmngr

Jan 30 2017

neal added a comment to T2914: TOFU Conflict Status fd output broken.

To be clear the initial output is not wrong. At the time the information is
initially requested, the message has not yet been processed.

Anyway, I think I'm working on a fix so this is a non-issue.

Jan 30 2017, 2:27 PM · rc, Bug Report, gnupg, TOFU

Jan 27 2017

leonardjo set Version to 2.0.30 on T2934: Serpent-256 unavailable in 2.0.30.
Jan 27 2017, 1:14 AM · gnupg (gpg20), Bug Report, In Progress, gnupg
leonardjo added a comment to T2934: Serpent-256 unavailable in 2.0.30.

D407: 947_gpgsm.c.diff

Jan 27 2017, 1:14 AM · gnupg (gpg20), Bug Report, In Progress, gnupg
leonardjo added projects to T2934: Serpent-256 unavailable in 2.0.30: gnupg, Bug Report.
Jan 27 2017, 1:14 AM · gnupg (gpg20), Bug Report, In Progress, gnupg

Jan 26 2017

justus claimed T2856: Can't ssh-add a key w/o a passphrase.
Jan 26 2017, 5:24 PM · Debian, Bug Report, gnupg, ssh
justus closed T2930: search for keys by e-mail address behaves differently when key is in pubring.gpg vs. pubring.kbx as Resolved.
Jan 26 2017, 12:57 PM · Bug Report, gnupg
justus assigned T2933: gnupg-2.1.18 fails to read a Yubikey Neo that gnupg-2.1.17 reads fine to gniibe.
Jan 26 2017, 11:19 AM · Bug Report, gnupg
justus added a project to T2933: gnupg-2.1.18 fails to read a Yubikey Neo that gnupg-2.1.17 reads fine: gnupg.
Jan 26 2017, 11:19 AM · Bug Report, gnupg

Jan 25 2017

dkg added a comment to T2930: search for keys by e-mail address behaves differently when key is in pubring.gpg vs. pubring.kbx.

thanks for the quick fix, Justus. I can confirm that this fixes the problem for me.

Jan 25 2017, 9:01 PM · Bug Report, gnupg
dkg reopened T2930: search for keys by e-mail address behaves differently when key is in pubring.gpg vs. pubring.kbx as "Open".
Jan 25 2017, 9:01 PM · Bug Report, gnupg
justus closed T2930: search for keys by e-mail address behaves differently when key is in pubring.gpg vs. pubring.kbx as Resolved.
Jan 25 2017, 5:00 PM · Bug Report, gnupg
justus added a comment to T2930: search for keys by e-mail address behaves differently when key is in pubring.gpg vs. pubring.kbx.

Fixed in 3f4f20ee6eff052c88647b820d9ecfdbd8df0f40.

Jan 25 2017, 5:00 PM · Bug Report, gnupg
justus added a comment to T2930: search for keys by e-mail address behaves differently when key is in pubring.gpg vs. pubring.kbx.

That is no regression, that never worked well. It only works if one uses a uid
like 'test <test@example.org>'. I'll fix this.

Jan 25 2017, 4:16 PM · Bug Report, gnupg
werner added a comment to T2930: search for keys by e-mail address behaves differently when key is in pubring.gpg vs. pubring.kbx.

That is a regression - it used to work since every early gpg versions.

Jan 25 2017, 9:16 AM · Bug Report, gnupg
werner updated subscribers of T2930: search for keys by e-mail address behaves differently when key is in pubring.gpg vs. pubring.kbx.
Jan 25 2017, 9:16 AM · Bug Report, gnupg