Page MenuHome GnuPG
Feed Advanced Search

Feb 22 2017

werner added a project to T2966: "LC_ALL=pl_PL.UTF-8 gpg --gen-key" fails during confirmation: Restricted Project.
Feb 22 2017, 4:36 PM · Restricted Project, Debian, Bug Report, gnupg
werner added a comment to T2966: "LC_ALL=pl_PL.UTF-8 gpg --gen-key" fails during confirmation.

Should be fixed with commit 6d50eeb for 2.1.19.

My idea on how to do a general fix turned out to be too complicated and thus I
fixed just the Polish translation

Feb 22 2017, 4:36 PM · Restricted Project, Debian, Bug Report, gnupg
aheinecke set Version to master on T2972: GPGSM: Chain too long on cross signed certificate.
Feb 22 2017, 3:06 PM · Bug Report, gnupg, KDE, S/MIME
aheinecke added a comment to T2972: GPGSM: Chain too long on cross signed certificate.

Feb 22 2017, 3:06 PM · Bug Report, gnupg, KDE, S/MIME
aheinecke set External Link to https://bugs.kde.org/show_bug.cgi?id=376563 on T2972: GPGSM: Chain too long on cross signed certificate.
Feb 22 2017, 3:06 PM · Bug Report, gnupg, KDE, S/MIME
aheinecke added projects to T2972: GPGSM: Chain too long on cross signed certificate: S/MIME, KDE, gnupg, Bug Report.
Feb 22 2017, 3:06 PM · Bug Report, gnupg, KDE, S/MIME

Feb 21 2017

dkg added a comment to T2968: gpg --search: Connection closed in DNS.

Are you using tor? if so, is your tor daemon up and running, and actively
connecting to the outside world?

Feb 21 2017, 4:43 PM · Info Needed, gnupg (gpg22), Bug Report, Debian, Keyserver, dirmngr

Feb 20 2017

justus claimed T2381: Add more support for profiles in gpgconf.
Feb 20 2017, 11:07 AM · In Progress, gnupg (gpg22), gnupg, Feature Request

Feb 19 2017

kardan added projects to T2968: gpg --search: Connection closed in DNS: dirmngr, Keyserver, gnupg, gnupg (gpg21), Debian, Bug Report.
Feb 19 2017, 8:51 PM · Info Needed, gnupg (gpg22), Bug Report, Debian, Keyserver, dirmngr
floyd set Version to 2.1.18 on T2967: Allow to keep original timestamp on keysig updates.
Feb 19 2017, 6:28 AM · gnupg, Feature Request
floyd added projects to T2967: Allow to keep original timestamp on keysig updates: Feature Request, gnupg.
Feb 19 2017, 6:28 AM · gnupg, Feature Request
floyd added a comment to T2967: Allow to keep original timestamp on keysig updates.

D409: 954_0001_gnupg-2.1.18_allow-original-timestamp-on-keysig-update.patch

Feb 19 2017, 6:28 AM · gnupg, Feature Request

Feb 17 2017

dkg added a comment to T2942: gpg needs to offer a way to list OpenPGP packets without consuming them.

Thanks, i've pushed this back to python-gnupg folks, and they've accepted it:

https://bitbucket.org/vinay.sajip/python-gnupg/commits/d0375e034da3efa6fbda713cb4bde0fbb6d3b158

so i think we can consider this issue resolved, at least from 2.1.14 and onward,
where import-show was introduced.

Feb 17 2017, 10:13 PM · Bug Report, gnupg
dkg closed T2942: gpg needs to offer a way to list OpenPGP packets without consuming them as Resolved.
Feb 17 2017, 10:13 PM · Bug Report, gnupg
werner raised the priority of T2965: WKD lookup fails due to overly specific Host: header from Low to Normal.
Feb 17 2017, 9:48 PM · Bug Report, rc, gnupg, dirmngr, gnupg (gpg22)
werner added projects to T2965: WKD lookup fails due to overly specific Host: header: dirmngr, rc.
Feb 17 2017, 9:48 PM · Bug Report, rc, gnupg, dirmngr, gnupg (gpg22)
werner added a comment to T2965: WKD lookup fails due to overly specific Host: header.

That is definitely a bug.

Feb 17 2017, 9:48 PM · Bug Report, rc, gnupg, dirmngr, gnupg (gpg22)
werner added a comment to T2966: "LC_ALL=pl_PL.UTF-8 gpg --gen-key" fails during confirmation.

I guess that is because the prompt has not been translated but the answer string
is translated.

msgid "NnCcEeOoQq"
msgstr "IiKkEeDdWw"

Thus using 'i' should give you the prompt for name.

A fix for this would be to use a different answer string for --gen-key - the one
we use if from --full-gen-key (i.e. with "(C)omment". This would the also work
for other incomplete translations, which will have the same problem.

Feb 17 2017, 9:47 PM · Restricted Project, Debian, Bug Report, gnupg
dkg set External Link to https://bugs.debian.org/855419 on T2966: "LC_ALL=pl_PL.UTF-8 gpg --gen-key" fails during confirmation.
Feb 17 2017, 9:01 PM · Restricted Project, Debian, Bug Report, gnupg
dkg set Version to 2.1.18 on T2966: "LC_ALL=pl_PL.UTF-8 gpg --gen-key" fails during confirmation.
Feb 17 2017, 9:01 PM · Restricted Project, Debian, Bug Report, gnupg
dkg added projects to T2966: "LC_ALL=pl_PL.UTF-8 gpg --gen-key" fails during confirmation: gnupg, Bug Report, Debian.
Feb 17 2017, 9:01 PM · Restricted Project, Debian, Bug Report, gnupg
ilovezfs added a comment to T2933: gnupg-2.1.18 fails to read a Yubikey Neo that gnupg-2.1.17 reads fine.

dkg thank you. One of the user reporting the issue has confirmed that fixes it:
https://github.com/Homebrew/homebrew-versions/pull/1527#issuecomment-280667350

Feb 17 2017, 4:18 PM · Bug Report, gnupg
justus added projects to T2965: WKD lookup fails due to overly specific Host: header: gnupg (gpg22), gnupg, Bug Report.
Feb 17 2017, 1:57 PM · Bug Report, rc, gnupg, dirmngr, gnupg (gpg22)
shuffle2 added a comment to T2939: Should not be required to manually `killagent` on card removal.

gpg --version

gpg (GnuPG) 2.0.30 (Gpg4win 2.3.3)
libgcrypt 1.6.6
Copyright (C) 2015 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: C:/Users/<username>/AppData/Roaming/gnupg
Supported algorithms:
Pubkey: RSA, RSA, RSA, ELG, DSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,

CAMELLIA128, CAMELLIA192, CAMELLIA256

Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2

Yes...seems old! But this is what latest gpg4win packages. :(
It is also the latest stable gpg release...so normal, I guess.

I've installed gpg on various recent Windows 10 builds (~10 machines/builds)
and noticed the behavior on all of them. For example builds 14939, 14986, and some
others.

Feb 17 2017, 3:54 AM · gnupg (gpg20), Bug Report, gnupg
dkg added a comment to T2928: stop fetching PTR records entirely.

Thanks for these fixes! I'm not sure i understand why ptr lookups are needed
for keyserver --hosttable. Can we drop those too?

Feb 17 2017, 3:48 AM · Debian, Bug Report, gnupg, dirmngr
dkg added projects to T2964: dirmngr and gpg-agent should work automatically even when GNUPGHOME is larger than sun_path: dirmngr, gnupg, Bug Report.
Feb 17 2017, 1:52 AM · Stalled, scd, gpgagent, Bug Report, gnupg, dirmngr

Feb 16 2017

dkg added a comment to T2933: gnupg-2.1.18 fails to read a Yubikey Neo that gnupg-2.1.17 reads fine.

This sounds like issues we were seeing in debian, which i believe have been
fixed in git already.

we're shipping the following two patches in debian against 2.1.18:

https://sources.debian.net/src/gnupg2/2.1.18-6/debian/patches/0028-scd-Backport-two-fixes-from-master.patch/
https://sources.debian.net/src/gnupg2/2.1.18-6/debian/patches/0029-scd-Fix-use-case-of-PC-SC.patch/

Feb 16 2017, 11:00 PM · Bug Report, gnupg
justus set Version to master on T2962: --quick-revoke-uid fails silently trying to revoke a non-existent uid.
Feb 16 2017, 5:46 PM · Bug Report, gnupg, gnupg (gpg22)
justus added projects to T2962: --quick-revoke-uid fails silently trying to revoke a non-existent uid: gnupg (gpg22), gnupg, Bug Report.
Feb 16 2017, 5:46 PM · Bug Report, gnupg, gnupg (gpg22)
justus added projects to T2960: --quick-revoke-uid can be used to revoke last uid, contrary to docs: gnupg (gpg22), gnupg, Bug Report.
Feb 16 2017, 5:26 PM · Bug Report, gnupg, gnupg (gpg22)
ilovezfs added a comment to T2933: gnupg-2.1.18 fails to read a Yubikey Neo that gnupg-2.1.17 reads fine.

We have Homebrew users reporting this problem to us.

https://github.com/Homebrew/homebrew-versions/commit/bece3fdbb732bcf646589c051f2f882e2bbf0875#commitcomment-20846337
https://github.com/Homebrew/homebrew-versions/commit/bece3fdbb732bcf646589c051f2f882e2bbf0875#commitcomment-20910048

"I had to revert to 2.1.17, gnupg was unable to access my yubikey with 2.1.18.
The error was "gpg: selecting openpgp failed: Operation not supported by
device". Not sure if I'm the only one with the problem, if not I'd recommend
reverting the version."

Feb 16 2017, 2:41 PM · Bug Report, gnupg

Feb 15 2017

werner added a project to T2958: Extend --unwrap to also remove a compression layer.: gnupg (gpg23).
Feb 15 2017, 9:04 PM · gnupg24, Feature Request, gnupg (gpg23)
werner added a comment to T2928: stop fetching PTR records entirely.

I have fixed some things. In general PTR lookups are onow only used when you
run the 'keyserver --hosttable' command.

Feb 15 2017, 7:24 PM · Debian, Bug Report, gnupg, dirmngr

Feb 14 2017

werner assigned T2959: with --tofu-default-policy=ask, Assertion "conflict_set" in get_trust failed (../../g10/tofu.c:2787) to neal.
Feb 14 2017, 9:28 PM · Restricted Project, Debian, Bug Report, gnupg
werner updated subscribers of T2959: with --tofu-default-policy=ask, Assertion "conflict_set" in get_trust failed (../../g10/tofu.c:2787).
Feb 14 2017, 9:28 PM · Restricted Project, Debian, Bug Report, gnupg
dkg added a comment to T2959: with --tofu-default-policy=ask, Assertion "conflict_set" in get_trust failed (../../g10/tofu.c:2787).

I note that even if i drop the "--trust-model tofu+pgp" and subsequently invoke
just "gpg --tofu-default-policy ask --fingerprint" i get the same crash.

however, if i just execute that in a fresh homedir without ever having set
"--trust-model tofu+pgp" i don't get a crash. so there is some sort of state
being set up that is then tickling the assertion later.

Feb 14 2017, 4:40 PM · Restricted Project, Debian, Bug Report, gnupg
dkg set External Link to https://bugs.debian.org/854829 on T2959: with --tofu-default-policy=ask, Assertion "conflict_set" in get_trust failed (../../g10/tofu.c:2787).
Feb 14 2017, 4:21 PM · Restricted Project, Debian, Bug Report, gnupg
dkg set Version to 2.1.18 on T2959: with --tofu-default-policy=ask, Assertion "conflict_set" in get_trust failed (../../g10/tofu.c:2787).
Feb 14 2017, 4:21 PM · Restricted Project, Debian, Bug Report, gnupg
dkg added projects to T2959: with --tofu-default-policy=ask, Assertion "conflict_set" in get_trust failed (../../g10/tofu.c:2787): gnupg, Bug Report, Debian.
Feb 14 2017, 4:21 PM · Restricted Project, Debian, Bug Report, gnupg
dkg set Version to 2.1.18 on T2958: Extend --unwrap to also remove a compression layer..
Feb 14 2017, 3:57 PM · gnupg24, Feature Request, gnupg (gpg23)
dkg added projects to T2958: Extend --unwrap to also remove a compression layer.: Feature Request, gnupg.
Feb 14 2017, 3:57 PM · gnupg24, Feature Request, gnupg (gpg23)
werner added a project to T2903: "gpg --card-status" does not add any entries to the private key ring: yubikey.
Feb 14 2017, 3:25 PM · Info Needed, Bug Report, gnupg
werner added a comment to T2903: "gpg --card-status" does not add any entries to the private key ring.

Yet another Yubikey think, I'll better a a keyword for this.

Feb 14 2017, 3:25 PM · Info Needed, Bug Report, gnupg
werner added projects to T2938: scd-event is annoying to use on Windows: Windows, scd, Windows 32.
Feb 14 2017, 3:21 PM · Windows 32, scd, Windows, Bug Report, gnupg
werner added a comment to T2938: scd-event is annoying to use on Windows.

Never use system() anywhere!

You need to call cmd with the script. However, there are some security issues
with than too and thus I consider it better use a dedicated executabe for this.

If you can tell us what the script shall do, we may distribute a simple
executable for that purpose.

Feb 14 2017, 3:21 PM · Windows 32, scd, Windows, Bug Report, gnupg
werner added a comment to T2942: gpg needs to offer a way to list OpenPGP packets without consuming them.

For a key listing I would suggest this

  gpg --dry-run --import-options import-show --import  FILE

This uses the regular key listing code.

Feb 14 2017, 3:13 PM · Bug Report, gnupg
werner updated subscribers of T2939: Should not be required to manually `killagent` on card removal.
Feb 14 2017, 3:06 PM · gnupg (gpg20), Bug Report, gnupg
werner assigned T2939: Should not be required to manually `killagent` on card removal to gniibe.
Feb 14 2017, 3:06 PM · gnupg (gpg20), Bug Report, gnupg
werner added a comment to T2939: Should not be required to manually `killagent` on card removal.

Please tell us which version of GnUPG ayou are using and on what OS.

Feb 14 2017, 3:06 PM · gnupg (gpg20), Bug Report, gnupg
aheinecke closed T2324: gpg --batch --export-secret-key fails (requires user interaction) if key has no passphrase as Resolved.
Feb 14 2017, 1:43 PM · gnupg, OpenPGP, Bug Report
aheinecke added a comment to T2324: gpg --batch --export-secret-key fails (requires user interaction) if key has no passphrase.

Tested this again with 2.1.18 and it works now as expected. Export secret key
just exports a key if it has no passphrase. So I think this issue can be marked
as resolved.

Feb 14 2017, 1:43 PM · gnupg, OpenPGP, Bug Report
werner added a project to T2957: gpg --export-ssh-key does not work for primary keys marked as authentication-capable: Restricted Project.
Feb 14 2017, 10:59 AM · Bug Report, gnupg, Restricted Project
werner added a comment to T2957: gpg --export-ssh-key does not work for primary keys marked as authentication-capable.

Done with commit b456e5be

gpg: Make --export-ssh-key work for the primary key.

* g10/export.c (export_ssh_key): Also check the primary key.
--

If no suitable subkey was found for export, we now check whether the
primary key is suitable for export and export this one.  Without this
change it was only possible to export the primary key by using the '!'
suffix in the key specification.

Also added a sample key for testing this.
Feb 14 2017, 10:59 AM · Bug Report, gnupg, Restricted Project
werner claimed T2957: gpg --export-ssh-key does not work for primary keys marked as authentication-capable.
Feb 14 2017, 10:37 AM · Bug Report, gnupg, Restricted Project
dkg added projects to T2957: gpg --export-ssh-key does not work for primary keys marked as authentication-capable: gnupg, Bug Report.
Feb 14 2017, 2:48 AM · Bug Report, gnupg, Restricted Project
dkg set Version to 2.1.18 on T2957: gpg --export-ssh-key does not work for primary keys marked as authentication-capable.
Feb 14 2017, 2:48 AM · Bug Report, gnupg, Restricted Project

Feb 13 2017

werner added a project to T2944: gpgconf --change-option should not print a warning when the relevant conf file does not exist: Restricted Project.
Feb 13 2017, 8:22 PM · Restricted Project, Bug Report, gnupg
werner added a comment to T2944: gpgconf --change-option should not print a warning when the relevant conf file does not exist.

Fixed with commit 30dac04 but not properly tested.

Feb 13 2017, 8:22 PM · Restricted Project, Bug Report, gnupg
werner added a comment to T2943: gpg should issue a warning when it is run without a command.

Frankly I am used to leave out the -d to use the default. I have seen the -d in
action only in CitizenFour ;-)

Need to think again about this.

(The last line in T2943 (wk on Feb 13 2017, 07:22 PM / Roundup) was garbage)

Feb 13 2017, 8:21 PM · Bug Report, gnupg
werner added a project to T2948: libdns lookups fails when nssswitch has no "dns" section: Restricted Project.
Feb 13 2017, 8:18 PM · Restricted Project, Bug Report, gnupg, dirmngr
werner added a comment to T2948: libdns lookups fails when nssswitch has no "dns" section.

Fixed with commit dee026d7.

If no DNS method is found in nsswitch.conf we now append one. Using dirmngr w/o
DNS does not work anyway thus this seems to be the best solution.

Feb 13 2017, 8:18 PM · Restricted Project, Bug Report, gnupg, dirmngr
werner added a comment to T2948: libdns lookups fails when nssswitch has no "dns" section.

Right, the proposed chnage will not fallback to the standard resolver.

I need to modify the patch because it was too simple: Need to explicitly look
for an dns entry and append it to the list iff it is missing.

Feb 13 2017, 7:51 PM · Restricted Project, Bug Report, gnupg, dirmngr
dkg added a comment to T2943: gpg should issue a warning when it is run without a command.

I'll just note that the only programmatic unattended uses i've seen have been
*not* decryption. they're attempts to list a keyring. So switching to
decrypted mode there will provide the same amount of breakage as requiring an
explicit command, but without the benefit of requiring explicit intent.

Any variation in behavior between automated and "attended" use is a debugging
pain point that actually seems to create work in the rest of the ecosystem. The
more GnuPG can keep its rules and behavior simple to understand, the better.

Feb 13 2017, 7:48 PM · Bug Report, gnupg
dkg added a comment to T2948: libdns lookups fails when nssswitch has no "dns" section.

right, the configuration is not an error, but a different way of handling the
DNS lookups.

just to clarify: this change means that dirmngr will continue to use libdns in
the event of finding no understood directives in nsswitch.conf. it is *not* the
equivalent of falling back to standard-resolver. right? If that's correct,
then i agree that an extra warning is probably too much noise.

Feb 13 2017, 7:39 PM · Restricted Project, Bug Report, gnupg, dirmngr
werner removed a project from T2945: gpg should explicitly set output file permissions during decryption: Bug Report.
Feb 13 2017, 7:29 PM · Feature Request, gnupg
werner added a project to T2945: gpg should explicitly set output file permissions during decryption: Feature Request.
Feb 13 2017, 7:29 PM · Feature Request, gnupg
werner renamed T2945: gpg should explicitly set output file permissions during decryption from gpg creates publicly readable files during decryption to gpg should explicitly set output file permissions during decryption.
Feb 13 2017, 7:29 PM · Feature Request, gnupg
werner added a comment to T2945: gpg should explicitly set output file permissions during decryption.

Would be surprising for a Unix tool but given that we do that for certain files
anyway, I can imagine to implement this. (but no stdout fiddling - if that even
works.)

I'll change the title and set the priority to feature.

Feb 13 2017, 7:29 PM · Feature Request, gnupg
werner added a comment to T2948: libdns lookups fails when nssswitch has no "dns" section.

You would see that error message then with every first DNS call. My
understanding is that on systemd the unknown keywords are not an error but a
featyre of systemd-resolver(?).

Feb 13 2017, 7:24 PM · Restricted Project, Bug Report, gnupg, dirmngr
werner added a comment to T2943: gpg should issue a warning when it is run without a command.

I meant decryption. My idea is:

  1. In attended mode: Just print a warning message.
  2. In unattended mode (--batch or --with-colons): Make --decrypt the default

and do not print a warning message. That would be a hardfailure for everything
but encrypted data

The idea is that attended command line use keeps on working but using it in
scripts (--batch, etc) will hard failure.

make the default operation --decrypt

Feb 13 2017, 7:22 PM · Bug Report, gnupg
dkg added a comment to T2943: gpg should issue a warning when it is run without a command.

Right, agreed -- there is no way to get to the "improved --list-packets" without
using the dubious approach of not specifying a command at all.

I agree that a hard failure when --batch is given without an explicit command
would be reasonable (though that means we will be effectively breaking
python-gnupg and others like it, which do try to use it). I'm not sure i
understand the reasoning behind a hard failure for --with-colons without an
explicit command.

Feb 13 2017, 5:52 PM · Bug Report, gnupg
dkg added a comment to T2948: libdns lookups fails when nssswitch has no "dns" section.

looks reasonable to me, though i haven't tried it myself (my nsswitch.conf
doesn't have the initial property reported).

Perhaps there should be an additional explicit log message for the
!ld.resolv_conf->lookup[0] case since dirmngr is falling back?

Feb 13 2017, 5:26 PM · Restricted Project, Bug Report, gnupg, dirmngr
werner added a comment to T2932: gpgv error messages are confusing.

I understand, So this is another special case like the one when a keyring has
permissions which don't allow it to be read.

Feb 13 2017, 4:33 PM · Bug Report, gnupg, gpgv
werner added a comment to T2936: pubring.kbx to pubring.kbx~.

Right, but it would double the write time and we won't have an atomic update -
which we need.

Feb 13 2017, 4:30 PM · Bug Report, gnupg
werner added a comment to T2935: use-tor should have a third possible value, "if available".

Using a socket conenction would require new code. We use the standard ports
instead. Sometimes the socks5 code (and I assume also the Unix domain socket
code) takes some time to figure out whether Tor is actually running, Thus this
is not done at every request.

Doing a check for every request would also require a lot of new code because we
need to restart a connection attempt at a higher layer. Similar to HTTP 301
handling.

Feb 13 2017, 4:19 PM · gnupg (gpg22), In Progress, Feature Request, dirmngr
werner added a comment to T2946: gpg-agent should be able to terminate when all its state expires.

The whole point of a daemon is that is idling in the background to wait for work.

A more useful feature would be to flush the passphrase cache when the user is
not anymore logged in. But for Debian this has already been done by --supervised.

Feb 13 2017, 4:14 PM · gnupg, Debian, gpgagent, Feature Request
neal added a comment to T2950: Unable to set expiry when using --faked-system-time.

Unfortunately, it is also used in the test suite to deal with expiration times.

Feb 13 2017, 3:50 PM · gnupg, Bug Report
werner added a project to T2950: Unable to set expiry when using --faked-system-time: gnupg.
Feb 13 2017, 3:47 PM · gnupg, Bug Report
werner removed a project from T2940: dirmngr fails for hkps when http-proxy is in use: Bug Report.
Feb 13 2017, 3:46 PM · Feature Request, gnupg (gpg22), Debian, gnupg, dirmngr
werner added a comment to T2940: dirmngr fails for hkps when http-proxy is in use.

Oh well, using a curl based key server helper this might have worked in the
past. We better implement that for 2.2

Feb 13 2017, 3:46 PM · Feature Request, gnupg (gpg22), Debian, gnupg, dirmngr
werner added projects to T2940: dirmngr fails for hkps when http-proxy is in use: gnupg (gpg22), Feature Request.
Feb 13 2017, 3:46 PM · Feature Request, gnupg (gpg22), Debian, gnupg, dirmngr
werner added a comment to T2940: dirmngr fails for hkps when http-proxy is in use.

There has never been support in GnuPG for https via an http proxy.
So can we change this to a feature request?

Feb 13 2017, 3:43 PM · Feature Request, gnupg (gpg22), Debian, gnupg, dirmngr
werner added a comment to T2943: gpg should issue a warning when it is run without a command.

Also note that the key listing is different from a real key listing and in
effect more like an improved --list-packets. Maybe we should make a hard break
and only do encryption without an command - at least when --batch or
--with-colons is given.

Feb 13 2017, 3:10 PM · Bug Report, gnupg
werner removed a project from T2943: gpg should issue a warning when it is run without a command: In Progress.
Feb 13 2017, 3:04 PM · Bug Report, gnupg
werner added a comment to T2943: gpg should issue a warning when it is run without a command.

I implemented that but then I found this in the man page:

  This command differs from the default operation, as it never writes
  to the filename which is included in the file and it rejects files
  that don't begin with an encrypted message.

Thus decryption is the default operation. The problem is that the
code also tries to do other things if it does not find encrypted data.
Note that the "never writes to the filename which is included in the
file" is wrong because gpg does not do that by default.

Feb 13 2017, 3:04 PM · Bug Report, gnupg
justus added a comment to T2954: signing a file shows me my short keyid instead of long.

however i still think the actual key fingerprint used should be shown here.

There are two problems with this proposal:

1/ Usability. Showing a keyid or fingerprint is less user-friendly than to show
the identifier that the user actually used in the configuration file to refer to
her key. I'd guess that most users use a UID here.

2/ Consistency. The code around the message in question also deals with error
handling in case looking up the key fails. In this case, we cannot show
anything besides what the user used in her configuration.

shouldn't we avoid short keyids everywhere?

We should avoid short keyids everywhere we use keyids, but this is not the case
here.

Feb 13 2017, 2:27 PM · gnupg
anarcat added a comment to T2954: signing a file shows me my short keyid instead of long.

that is true. however i still think the actual key fingerprint used should be
shown here. shouldn't we avoid short keyids everywhere?

Feb 13 2017, 2:17 PM · gnupg
werner added a comment to T2943: gpg should issue a warning when it is run without a command.

Good idea.
The "This looks like foo" might be a bit complicated but the warning is easy to
implement. I will add that one immediately.

Feb 13 2017, 1:05 PM · Bug Report, gnupg
werner added a project to T2943: gpg should issue a warning when it is run without a command: In Progress.
Feb 13 2017, 1:05 PM · Bug Report, gnupg
werner claimed T2943: gpg should issue a warning when it is run without a command.
Feb 13 2017, 1:05 PM · Bug Report, gnupg
werner added a comment to T2948: libdns lookups fails when nssswitch has no "dns" section.

I guess the best solution is to handle this the same way as a missing
nsswitch file. Here is a non-tested patch; for a quick test the
change of the condition is sufficient.

diff --git a/dirmngr/dns-stuff.c b/dirmngr/dns-stuff.c
index f0de357..956fe72 100644

  • a/dirmngr/dns-stuff.c

+++ b/dirmngr/dns-stuff.c
@@ -496,14 +496,15 @@ libdns_init (void)

fname = "/etc/nsswitch.conf";
err = libdns_error_to_gpg_error
  (dns_nssconf_loadpath (ld.resolv_conf, fname));
  • if (err)

+ if (err || !ld.resolv_conf->lookup[0])

{
  • log_error ("failed to load '%s': %s\n", fname, gpg_strerror (err));
  • /* not fatal, nsswitch.conf is not used on all systems; assume
  • * classic behavior instead. Our dns library states "bf" which tries
  • * DNS then Files, which is not classic; FreeBSD
  • * /usr/src/lib/libc/net/gethostnamadr.c defines default_src[] which
  • * is Files then DNS, which is. */

+ if (err)
+ log_error ("failed to load '%s': %s\n", fname, gpg_strerror (err));
+ /* Not fatal, nsswitch.conf is not used on all systems;
+ * assume classic behavior instead. Note that some systemd
+ * based systems allow for custom keywords which are not
+ * known to us and thus lead to an empty result set; we then
+ * also fallback to classic behavior. */

if (opt_debug)
  log_debug ("dns: fallback resolution order, files then DNS\n");
ld.resolv_conf->lookup[0] = 'f';
Feb 13 2017, 1:03 PM · Restricted Project, Bug Report, gnupg, dirmngr
werner claimed T2948: libdns lookups fails when nssswitch has no "dns" section.
Feb 13 2017, 1:03 PM · Restricted Project, Bug Report, gnupg, dirmngr
werner added a comment to T2928: stop fetching PTR records entirely.

I have seen that discussion and will takle care of this bug soon.

Feb 13 2017, 12:39 PM · Debian, Bug Report, gnupg, dirmngr
werner claimed T2928: stop fetching PTR records entirely.
Feb 13 2017, 12:39 PM · Debian, Bug Report, gnupg, dirmngr
werner lowered the priority of T2953: scdaemon fails to decrypt if unusual key-size is chosen from High to Normal.
Feb 13 2017, 12:34 PM · Bug Report, gnupg, scd
justus removed a project from T2954: signing a file shows me my short keyid instead of long: Bug Report.
Feb 13 2017, 9:52 AM · gnupg
justus raised the priority of T2954: signing a file shows me my short keyid instead of long from Low to Normal.
Feb 13 2017, 9:52 AM · gnupg
justus claimed T2954: signing a file shows me my short keyid instead of long.
Feb 13 2017, 9:52 AM · gnupg
justus closed T2954: signing a file shows me my short keyid instead of long as Invalid.
Feb 13 2017, 9:52 AM · gnupg
justus added a comment to T2954: signing a file shows me my short keyid instead of long.

This is because you use a short key id in your gpg.conf. gpg is merely echoing
back whatever you specify there:

% touch tmp ; gpg2 --detach-sign tmp
gpg: NOTE: THIS IS A DEVELOPMENT VERSION!
gpg: It is only intended for test purposes and should NOT be
gpg: used in a production environment or with production keys!
gpg: using "baz" as default secret key for signing
% grep default-key gpg.conf
default-key baz

Feb 13 2017, 9:52 AM · gnupg