- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Feb 21 2018
Feb 6 2018
Feb 4 2018
Feb 2 2018
Jan 31 2018
it is the decision of the user to use such a certificate.
Jan 30 2018
Additionally, we might want some sort of delayed or batched CRL-checking that doesn't block signature verification with another network interaction, but would protect the user against future problems.
Jan 12 2018
it's too bad that this is not considered something worth fixing upstream -- at the moment, debian's python3-gpg will only work with one specific version of python3 because of this, which makes package transitions more complex than they should be.
Jan 11 2018
Jan 3 2018
Agreed, Signing subkeys can be useful for checking historical signatures. And even encryption subkeys *can* be useful after their expiration, e.g. when doing historical auditing.
Dec 31 2017
When i read the manpage, nroff-formatted against an 80-column terminal, it says, literally:
Dec 29 2017
Any fix for this should be included in the test suite to avoid a regression :)
Dec 21 2017
Nov 30 2017
Nov 21 2017
Nov 19 2017
This decision suggests that the accessibility of the current source tree
for new contributors (who are more likely to find the static, archaic
changelogs distracting) is unimportant.
Nov 17 2017
Nov 15 2017
Nov 13 2017
I'm not sure why a special case should be needed -- failure to create
the .kbx should not be a failure for a decryption operation in general.
Nov 12 2017
So, to protect against this attack, the client needs to do both of the following:
Here are two examples:
@werner suggests using an ephemeral home directory. this is an important point.
@justus asked for examples.
Nov 11 2017
Nov 8 2017
OK, i've pushed 0471ff9d3bf8d6b9a359f3c426d70d0935066907 and 149041b0b917f4298239fe18b5ebd5ead71584a6 to branch T3490-proposal1. It cuts GnuPG's own simple test suite down from about 3 minutes to 1.5 minutes for me. I haven't tested the speedup for the full test suite yet.
To clarify, i'll push them to a separate branch for you to decide whether to merge.
I'll push some patches for proposal 1.
Nov 7 2017
In the autocrypt spec, this is called a "setup code", not a "backup code" :)
Oct 28 2017
agreed, generically changing this check to log_info doesn't make sense. However, in *this circumstance*, gpg actually has no error.
Oct 27 2017
can you try it with --homedir /does/not/exist
Oct 24 2017
Hm, perhaps this non-zero return code is due to not being able to write to the GNUPGHOME directory, actually. It goes away when GNUPGHOME is writable. That doesn't make sense either -- this operation doesn't actually depend on being able to write to GNUPGHOME, so it shouldn't return a different error code if GNUPGHOME is unwritable.
Oct 19 2017
I guess it depends on whether you want gpgme to be an interface to OpenPGP certificates more generally (in which case, exposing the primary flag would be useful), or just a gpg frontend (in which case, the current behavior might be ok)
Oct 17 2017
But there can be several user IDs that are marked primary, right? I know that gpg tries to not let that happen, but there are other OpenPGP toolkits out there, and composite/hybridized keys, etc where this could happen.
Oct 15 2017
Oct 13 2017
Oct 9 2017
I agree with @kristianf that dirmngr should be more clever about this sort of failure. The error message could be clearer at least, but the right response is really to skip all IPv4 addresses if the machine has no IPv4 stack, and to skip all IPv6 addresses if the machine has no IPv6 stack.
Sep 27 2017
Sep 26 2017
Sep 22 2017
I spoke with the author of onionbalance, and they said:
Sep 19 2017
Sep 13 2017
Sep 12 2017
I'm fine with (and i totally understand) wanting nothing but UTC in the machine interface and internal representations.
I've changed the text of this report from "filter" to "screener" to match the preferred terminology. thanks for the clarification.
Sep 9 2017
I think this is now resolved, as of rG926d07c5fa05
Sep 8 2017
I am not proposing changing the order of the *hashed* subpackets in a signature. I'm proposing removing/changing/canonicalizing the *unhashed* subpackets in a signature. Sorry if i didn't make that clear enough in the initial message.
I thoroughly agree that this is not required by the specs.
I think any existing script that assumes UTC should add an explicit Z suffix. (that is, i don't think the breakage is a big deal, and anyone writing scripts that needs this kind of precision will be more likely be thankful that we have a sensible, normalized interface).
Is it possible that this is related to T3278 ?
fwiw, i agree that GnuPG should interpret these as ISO-8601 strings. At the very least:
Nice find, @gniibe ! So this looks like a bug either in GnuPG's test suite, or in parse_expire_string, right? How do you think it should be addressed?
The comment from aa above appears to be misdirected/spam.
Sep 7 2017
Sep 6 2017
Aug 25 2017
Aug 18 2017
this is also https://bugs.debian.org/866555
Aug 16 2017
i think it's strictly worse, even when the certificates are "trusted" in sense (1) -- with OpenPGP keyserver lookups, at least it is the client who decides which keyserver to use, on what protocol, to look up the given issuer fingerprint.
Aug 15 2017
I see at least two different kinds of "trust" here.
Making matters worse, i note that some CRLs, like those issued by MIT's Lincoln Lab are quick and easy to fetch over the Internet directly, but hang or timeout when fetched via Tor.
It wasn't a natural thing to do gpgme_op_import because i already had my gpgme_key_t object, which i was using to display an index of available keys to the user.