Page MenuHome GnuPG
Feed Advanced Search

Aug 28 2018

werner claimed T4112: GnuPG 2.2.10 release.
Aug 28 2018, 3:48 PM · Release Info, gnupg
werner created T4112: GnuPG 2.2.10 release.
Aug 28 2018, 3:47 PM · Release Info, gnupg

Aug 27 2018

gniibe changed the status of T3119: gpg: Improve public key decryption, a subtask of T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)), from Open to Testing.
Aug 27 2018, 9:32 AM · Restricted Project, gnupg, Feature Request

Aug 24 2018

werner added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

@kallisti5: For you server you can add only_urandom to random.conf when changing to a multiuser runlevel and remove it early at startup and termination.

Aug 24 2018, 5:46 PM · libgcrypt, gnupg
werner added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

/dev/random, RDRAND, etc involves a lot of political arguments and thus it is not easy to decide what to do. What you are calling for is a linux kernel specific code path (note that rndlinux is used by most Unices) and won't be helpful for other OSes. I am of course willing to do add specific for for a few widespread OSes (and in any case for Debian). It is a major change and thus does not belong into 1.8 - I am fine with master which Debian might want to backport.

Aug 24 2018, 5:40 PM · libgcrypt, gnupg

Aug 23 2018

aheinecke added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Well, Werner is just back so he can say more.
An excellent reviewer was Stephan Müller from atsec. He is also involved a bit afaik in the kernel random development.

Aug 23 2018, 8:38 PM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

@aheinecke thanks for the followup!

Aug 23 2018, 5:59 PM · libgcrypt, gnupg

Aug 21 2018

gniibe merged T2439: Optionally always prompt for key confirmation for requests from restricted sockets into T1840: gpg-agent should have prompt-for-use mechanism.
Aug 21 2018, 2:20 AM · gnupg, Feature Request

Aug 20 2018

stm created T4105: Inconsistent output for revocation keys in --list-keys --with-colons.
Aug 20 2018, 8:24 PM · Documentation, gnupg, Bug Report

Aug 9 2018

perske added a comment to T4095: Add non-interactive --quick-revoke-sig.

Well, I have already tried to explain the use case: To make using cryptography easier for our users (for most of them the command line is the hell ...) I have integrated GnuPG in our webmailer. The webmailer has a key management page where you can import and export keys (up- and download, import from mail, attach to mail etc.), where you can edit trust settings, and where you can sign other keys and revoke such signatures. The webmailer certainly does not offer all capabilities of GnuPG but certainly a substantial subset.

Aug 9 2018, 11:06 AM · gnupg (gpg22), Feature Request
aheinecke triaged T4095: Add non-interactive --quick-revoke-sig as Wishlist priority.

This seems very special and I'm not sure if we should not say at some point that we won't add quick commands for everything ;-)

Aug 9 2018, 8:40 AM · gnupg (gpg22), Feature Request

Aug 8 2018

perske created T4095: Add non-interactive --quick-revoke-sig.
Aug 8 2018, 6:33 PM · gnupg (gpg22), Feature Request

Aug 6 2018

aheinecke added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

I think that the ultimate decision here lies with Werner. Additional review.
I think the biggest obstacle is that we don't want to change the random gathering code if it can be avoided and that the random code has been thoroughly reviewed / tested and is currently considered secure.

Aug 6 2018, 10:02 AM · libgcrypt, gnupg

Aug 2 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

This bug report has been around for several months now. it has a simple patch, a clear explanation, a report of running code, and examples of problems it solves.

Aug 2 2018, 7:34 PM · libgcrypt, gnupg

Jul 22 2018

dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

I've now run the proposed patch on a GNU/Linux system where the kernel's RNG is initialized but /proc/sys/kernel/random/entropy_avail shows numbers below 100, and i can confirm that 3072-bit RSA key generation takes roughly 0.8 seconds: 20 sequential default --quick-keygen operations (each creating two secret keys) took ~32s.

Jul 22 2018, 7:54 AM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Here is another example of users doing sketchy things to try to "fix" this process:

Jul 22 2018, 5:28 AM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Here is an example of the kinds of UI/UX mystery that users face while this decision is unresolved:

Jul 22 2018, 5:22 AM · libgcrypt, gnupg

Jul 18 2018

werner removed a project from T169: Add a way to generate keypairs from a passphrase: Stalled.
Jul 18 2018, 10:05 AM · gnupg, Feature Request
werner raised the priority of T169: Add a way to generate keypairs from a passphrase from Low to Normal.

The problem with mnemonics based on words is that they are language dependent and only a small part of the world is fluent enough in English to spell/use them correctly. Thus anything based on ICAO spelling (Alfa, Bravo,...) is a better choice than arbitrary words from one language. Even if that meas to write down a longer string. A CRC is of course very useful.

Jul 18 2018, 10:04 AM · gnupg, Feature Request
Judson added a comment to T169: Add a way to generate keypairs from a passphrase.

It would be great if this feature were implemented with a mnemonic code option, with a built in checksum, as described in bip39: https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki Using the same bip39 standard (and perhaps others, as alluded to in T3497) would also improve compatibility with existing crypto key storage devices (i.e. cryptocurrency wallets used as smart cards).

Jul 18 2018, 9:14 AM · gnupg, Feature Request

Jul 17 2018

mirko.luedde added a comment to T4079: gpg 2.2.9 breaks incompatibly and creates options mess.

Dear Andre , all , T4020 does not even well-define the symptom and I
do not agree T4020 is a duplicate of T4079 . I'd close T4020 in favor
of T4079 . Many thanks . Mirko

Jul 17 2018, 7:18 PM · gpg4win, gnupg, Duplicate, Bug Report
aheinecke closed T4079: gpg 2.2.9 breaks incompatibly and creates options mess as Resolved.

Hi Mirko,

Jul 17 2018, 11:27 AM · gpg4win, gnupg, Duplicate, Bug Report

Jul 14 2018

tcurdt added a comment to T4072: fix inconsistent CLI.

@werner That begs the question: why can't quick-add-key re-use the same code that quick-add-uid is using?

Jul 14 2018, 1:01 PM · Feature Request, gnupg
werner added a comment to T4072: fix inconsistent CLI.

Right, but requires extra code. The --quick commands try to reuse existing code and, iirc, that is the reason why a user id is accepted for --quick-add-uid.

Jul 14 2018, 10:05 AM · Feature Request, gnupg
dkg added a comment to T4072: fix inconsistent CLI.

We do have a history of extending the API, no?

Jul 14 2018, 5:11 AM · Feature Request, gnupg

Jul 13 2018

tcurdt added a comment to T4072: fix inconsistent CLI.

I should have :) Thing is - a fix could be made in a backwards compatible way. So I don't really see your point.

Jul 13 2018, 1:19 PM · Feature Request, gnupg
werner added a comment to T4072: fix inconsistent CLI.

The command line is an API and we will never break an API without a very good reason. If you didn't like that API you should have noted that on the devel mailing list years ago ;-)

Jul 13 2018, 12:28 PM · Feature Request, gnupg
tcurdt added a comment to T4072: fix inconsistent CLI.

And FWIW: an inconsistent UI/CLI should be treated as bug - not as a feature request.

Jul 13 2018, 12:09 PM · Feature Request, gnupg
tcurdt added a comment to T4072: fix inconsistent CLI.

You completely ignore the fact that --quick-add-uid and --quick-add-key are not consistent.
It's not clear why one should require a fingerprint and the other allows the kind of "user-id" you just described.
That was the main point of this issue.

Jul 13 2018, 12:04 PM · Feature Request, gnupg
werner closed T4072: fix inconsistent CLI as Wontfix.

The term “user-id” is used throughout gpg to mean some kind of user id beit is a name, a key id, a fingerprint, a keygrip, etc. See the section "How to specify a user id" in the man page. FPR is used if a fingerprint is required.

Jul 13 2018, 11:39 AM · Feature Request, gnupg
tcurdt added a comment to T4072: fix inconsistent CLI.

From the man page:

--quick-add-uid user-id new-user-id
--quick-add-key fpr [algo [usage [expire]]]
Jul 13 2018, 10:38 AM · Feature Request, gnupg
werner edited projects for T4072: fix inconsistent CLI, added: gnupg, Feature Request; removed Bug Report.

I am not sure wheat I understand your request. --quick-add-uid takes a fingerprint as first argument you _may _ use a a user-id instead but that is for consistency with all gpg commands. Using the fingerprint is always highly suggested.

Jul 13 2018, 9:03 AM · Feature Request, gnupg

Jul 12 2018

dkg added a comment to T1800: Allow s2k options for gpg --export-secret-key.

About how the keys are actually stored on disk:

Jul 12 2018, 6:31 PM · Feature Request, gnupg
werner closed T4036: gnupg 2.2.9 release as Resolved.

Release done: https://lists.gnupg.org/pipermail/gnupg-announce/2018q3/000427.html

Jul 12 2018, 4:54 PM · Release Info, gnupg
werner closed T4036: gnupg 2.2.9 release, a subtask of T2348: Improve detection of IPv6 and IPv4 availibility, as Resolved.
Jul 12 2018, 4:54 PM · gnupg, dirmngr, Feature Request
werner closed T4036: gnupg 2.2.9 release, a subtask of T4014: when verifying signatures, gpg and gpgv should ensure signing capabilities, as Resolved.
Jul 12 2018, 4:54 PM · gpgv, gnupg, Bug Report
werner closed T4036: gnupg 2.2.9 release, a subtask of T4022: too-large User ID packets result in dropping an entire certificate, as Resolved.
Jul 12 2018, 4:54 PM · gnupg, Bug Report
werner closed T4036: gnupg 2.2.9 release, a subtask of T4053: gpg.exe 2.2.8.52634 crashes in msvcrt.dll, as Resolved.
Jul 12 2018, 4:54 PM · i18n, gnupg, gpg4win, Bug Report
werner closed T4036: gnupg 2.2.9 release, a subtask of T4018: gpg --with-colons --show-keys does not show revocation certificates, as Resolved.
Jul 12 2018, 4:54 PM · gnupg, Bug Report
werner closed T4053: gpg.exe 2.2.8.52634 crashes in msvcrt.dll as Resolved.
Jul 12 2018, 3:28 PM · i18n, gnupg, gpg4win, Bug Report
werner closed T2348: Improve detection of IPv6 and IPv4 availibility as Resolved.
Jul 12 2018, 3:27 PM · gnupg, dirmngr, Feature Request

Jul 10 2018

werner added a project to T4053: gpg.exe 2.2.8.52634 crashes in msvcrt.dll: i18n.
Jul 10 2018, 6:47 PM · i18n, gnupg, gpg4win, Bug Report

Jul 9 2018

aheinecke created T4061: gnupg: --with-colons --with-secret returns wrong results if specific keys are queried.
Jul 9 2018, 11:49 AM · gpgme, Bug Report, gnupg

Jul 8 2018

werner added a comment to T4059: Errors while building from source on Cygwin (gnupg repo).

Some times I a curious and it seems that GnuPG can be used on 32 bit Cygwin. Thus I wonder what is going on on 64 bit Cygwin (which I don't know). It might be a HANDLE/socket issue where Windows is still using values which fit into a 32 bit integer but Cygwin might have changed that. Eventually we need to remove that assumption in GnuPG's code and this is why I won't have a problem to keep this bug open.

Jul 8 2018, 10:17 PM · Cygwin, gnupg, Bug Report
jd added a comment to T4059: Errors while building from source on Cygwin (gnupg repo).

Given that Cygwin is not supported I would understand if the bug is
closed or should I open a feature request to have Cygwin officialy
supported.
I would never the less appriciate any help/hint on how to be successfull
installing "gnupg" on Cygwin.

Jul 8 2018, 12:27 PM · Cygwin, gnupg, Bug Report
werner triaged T4058: Connect a TOR server not running on localhost. as Normal priority.
Jul 8 2018, 8:01 AM · Tor, gnupg, Feature Request
werner triaged T4059: Errors while building from source on Cygwin (gnupg repo) as Low priority.

Note that Cygwin is not a supported platform. Seems that the exec functions don't work on this 64 bit variant.

Jul 8 2018, 7:54 AM · Cygwin, gnupg, Bug Report

Jul 6 2018

werner renamed T2917: --locate-key should re-fetch key via WKD if it is expired from wkd discovery should re-fetch key if it is expired to --locate-key should re-fetch key via WKD if it is expired.
Jul 6 2018, 9:09 AM · gnupg (gpg22), Bug Report
werner added a comment to T2917: --locate-key should re-fetch key via WKD if it is expired.

Actually the --locate-key command differs from the implicit use of locate key code when encrypting to a mail address.
After importing the expired key and running for example

Jul 6 2018, 9:08 AM · gnupg (gpg22), Bug Report
gniibe added a parent task for T4036: gnupg 2.2.9 release: T4050: GnuPG fails to decrypt file encrypted with more than one password with any password but the first.
Jul 6 2018, 6:59 AM · Release Info, gnupg

Jul 5 2018

aheinecke added a comment to T4036: gnupg 2.2.9 release.

Ok yeah. I can aim for a Gpg4win for next week, too.

Jul 5 2018, 4:49 PM · Release Info, gnupg
werner added a comment to T4036: gnupg 2.2.9 release.

next week?

Jul 5 2018, 4:48 PM · Release Info, gnupg
aheinecke added a comment to T4036: gnupg 2.2.9 release.

What is the ETA for 2.2.9?

Jul 5 2018, 4:48 PM · Release Info, gnupg
aheinecke added a subtask for T4036: gnupg 2.2.9 release: T4029: Gpg4win 3.1.3.
Jul 5 2018, 4:42 PM · Release Info, gnupg
werner added a comment to T4022: too-large User ID packets result in dropping an entire certificate.

It won't import that keyblock. We can fixup some trivial cases but there will always be ways to create a garbled keyblock and that is nothing we can fix. Better restore the keyblock from a backup or write a dedicated tool fsck-like tool.

Jul 5 2018, 9:04 AM · gnupg, Bug Report

Jul 4 2018

stm added a comment to T4022: too-large User ID packets result in dropping an entire certificate.

What happens, if other bad packets beside PKT_USER_ID, PKT_ATTRIBUTE, PKT_OLD_COMMENT, and PKT_COMMENT are found?

Jul 4 2018, 9:56 PM · gnupg, Bug Report
fritzle added a comment to T4053: gpg.exe 2.2.8.52634 crashes in msvcrt.dll.

Thank you for your prompt response and your suggestion for a workaround.

Jul 4 2018, 6:04 PM · i18n, gnupg, gpg4win, Bug Report
aheinecke added a parent task for T4036: gnupg 2.2.9 release: T4053: gpg.exe 2.2.8.52634 crashes in msvcrt.dll.
Jul 4 2018, 5:58 PM · Release Info, gnupg
aheinecke added a subtask for T4053: gpg.exe 2.2.8.52634 crashes in msvcrt.dll: T4036: gnupg 2.2.9 release.
Jul 4 2018, 5:58 PM · i18n, gnupg, gpg4win, Bug Report
aheinecke changed the status of T4053: gpg.exe 2.2.8.52634 crashes in msvcrt.dll from Open to Testing.

Got it. The reason was a broken translation. I've opened T4054 to fix in general that broken translations can cause crashes.

Jul 4 2018, 5:57 PM · i18n, gnupg, gpg4win, Bug Report
aheinecke added a comment to T4053: gpg.exe 2.2.8.52634 crashes in msvcrt.dll.

I can reproduce it with a german windows

Jul 4 2018, 5:34 PM · i18n, gnupg, gpg4win, Bug Report
aheinecke triaged T4053: gpg.exe 2.2.8.52634 crashes in msvcrt.dll as High priority.

Thank you for your detailed report!

Jul 4 2018, 5:28 PM · i18n, gnupg, gpg4win, Bug Report
werner closed T4022: too-large User ID packets result in dropping an entire certificate as Resolved.

Fixed for master and 2.2.9.

Jul 4 2018, 10:19 AM · gnupg, Bug Report
werner added a parent task for T4036: gnupg 2.2.9 release: T4022: too-large User ID packets result in dropping an entire certificate.
Jul 4 2018, 10:17 AM · Release Info, gnupg
werner added a subtask for T4022: too-large User ID packets result in dropping an entire certificate: T4036: gnupg 2.2.9 release.
Jul 4 2018, 10:17 AM · gnupg, Bug Report
werner claimed T4022: too-large User ID packets result in dropping an entire certificate.
Jul 4 2018, 9:20 AM · gnupg, Bug Report
werner closed T3810: UI workshop as Wontfix.

We didn't found the time to organize it. There will be a OpenPGP summit this fall organized by Patrick, though

Jul 4 2018, 9:19 AM · Documentation, gnupg, UI, Verein
werner added a subtask for T4014: when verifying signatures, gpg and gpgv should ensure signing capabilities: T4036: gnupg 2.2.9 release.
Jul 4 2018, 9:16 AM · gpgv, gnupg, Bug Report
werner added a parent task for T4036: gnupg 2.2.9 release: T4014: when verifying signatures, gpg and gpgv should ensure signing capabilities.
Jul 4 2018, 9:16 AM · Release Info, gnupg
werner added a parent task for T4036: gnupg 2.2.9 release: T4018: gpg --with-colons --show-keys does not show revocation certificates.
Jul 4 2018, 9:15 AM · Release Info, gnupg
werner added a subtask for T4018: gpg --with-colons --show-keys does not show revocation certificates: T4036: gnupg 2.2.9 release.
Jul 4 2018, 9:15 AM · gnupg, Bug Report
werner closed T4018: gpg --with-colons --show-keys does not show revocation certificates as Resolved.

Will be released with 2.2.9

Jul 4 2018, 9:13 AM · gnupg, Bug Report
werner closed T4014: when verifying signatures, gpg and gpgv should ensure signing capabilities as Resolved.

Fix will also go into 2.2.9

Jul 4 2018, 9:10 AM · gpgv, gnupg, Bug Report

Jul 3 2018

werner raised the priority of T4052: Cannot generate NIST-P or Brainpool-P subkeys without explicitly specifying the algorithm from Wishlist to Low.
Jul 3 2018, 6:27 PM · gnupg, Bug Report
tookmund triaged T4052: Cannot generate NIST-P or Brainpool-P subkeys without explicitly specifying the algorithm as Wishlist priority.

This is really minor, just wanted to report it so it did not get forgotten.

Jul 3 2018, 6:06 PM · gnupg, Bug Report
tookmund created T4052: Cannot generate NIST-P or Brainpool-P subkeys without explicitly specifying the algorithm.
Jul 3 2018, 6:05 PM · gnupg, Bug Report
aheinecke added a revision to T2917: --locate-key should re-fetch key via WKD if it is expired: D463: Add ctx flag for auto-key-locate.
Jul 3 2018, 6:03 PM · gnupg (gpg22), Bug Report
werner closed T1173: gpg has no easy way to view the reason and description of revocation sigs as Resolved.

Backport done. To be released with 2.2.9.

Jul 3 2018, 12:34 PM · gnupg, Debian, Feature Request

Jul 2 2018

kallisti5 added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

User input, anything to solve the lack of entropy on servers would be *great*. We have a bunch of buildbot workers we would *love* to have sign their artifacts... however we end up (unsuccessfully) doing stupid things like this to try and drive up entropy as a non-root user:

Jul 2 2018, 8:46 PM · libgcrypt, gnupg
anarcat added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

Looking at the table in random(7) it seems clear to me that what we want to just invoke getrandom() with no arguments. This blocks until the kernel's PRNG has been adequately seeded, but once seeded it doesn't block, while still pulling from an unbreakably-strong PRNG. this is the best-of-both-worlds situation that we want.

Changing the GnuPG long-term (and short-term) key generation techniques to use this approach might require coordination with gcrypt. gcrypt's gcry_random_level currently has GCRY_WEAK_RANDOM and GCRY_STRONG_RANDOM and GCRY_VERY_STRONG_RANDOM, which doesn't represent the nuance described above.

One approach might be to just have gcrypt on Linux treat all values of gcry_random_level the same, and use getrandom() for all of them.

Jul 2 2018, 5:24 PM · libgcrypt, gnupg
dkg added a comment to T3894: re-evaluate default randomness choices during key generation on GNU/Linux platforms.

ping again…

Jul 2 2018, 4:47 PM · libgcrypt, gnupg
aheinecke added a comment to T2917: --locate-key should re-fetch key via WKD if it is expired.

Maybe a first step would be a "KEYLIST_MODE_WKD" which sets "auto-key-locate clear,nodefault,wkd" (Would be nice for T3910 ) or just a ctx_flag "auto-key-locate" so that the caller can decide?

Jul 2 2018, 11:13 AM · gnupg (gpg22), Bug Report
werner raised the priority of T2917: --locate-key should re-fetch key via WKD if it is expired from Normal to High.
Jul 2 2018, 10:39 AM · gnupg (gpg22), Bug Report

Jun 29 2018

gniibe closed T2986: Can not access keyserver without the standard-resolver option as Resolved.

The cause is: ! in nsswitch.conf
This was fixed (2.2 branch) by rGd4c0187dd931: libdns: Hack to skip negation term. for GnuPG in Jan 2017.
I found it was fixed in the original libdns, and this fix is merged into rG20c289606f89: libdns: Sync to upstream. to GnuPG.

Jun 29 2018, 1:57 AM · Bug Report, gnupg

Jun 28 2018

justus placed T2986: Can not access keyserver without the standard-resolver option up for grabs.
Jun 28 2018, 4:15 PM · Bug Report, gnupg

Jun 24 2018

werner triaged T4042: RFC 4880 compliance as Normal priority.
Jun 24 2018, 9:50 PM · OpenPGP, gnupg
stm created T4042: RFC 4880 compliance.
Jun 24 2018, 12:43 PM · OpenPGP, gnupg

Jun 21 2018

werner changed the status of T1173: gpg has no easy way to view the reason and description of revocation sigs from Open to Testing.

Done for master. Needs backport.

Jun 21 2018, 8:38 PM · gnupg, Debian, Feature Request
werner raised the priority of T1173: gpg has no easy way to view the reason and description of revocation sigs from Normal to High.
Jun 21 2018, 3:24 PM · gnupg, Debian, Feature Request
werner added a comment to T4018: gpg --with-colons --show-keys does not show revocation certificates.

I implemented it in master and if you agree I will backport it to stable. This is the new output:

Jun 21 2018, 3:20 PM · gnupg, Bug Report

Jun 20 2018

werner added a comment to T4031: gpg-check-pattern.1 in Debian generates warnings from test-groff .

We should include the man page then in texi format into tools.texi

Jun 20 2018, 7:02 PM · Debian, gnupg, Bug Report
gniibe renamed T4031: gpg-check-pattern.1 in Debian generates warnings from test-groff from nroff created by yat2m generates warnings from test-groff to gpg-check-pattern.1 in Debian generates warnings from test-groff .
Jun 20 2018, 10:39 AM · Debian, gnupg, Bug Report
gniibe added a parent task for T4036: gnupg 2.2.9 release: T2348: Improve detection of IPv6 and IPv4 availibility.
Jun 20 2018, 9:28 AM · Release Info, gnupg
gniibe added a subtask for T2348: Improve detection of IPv6 and IPv4 availibility: T4036: gnupg 2.2.9 release.
Jun 20 2018, 9:28 AM · gnupg, dirmngr, Feature Request
gniibe changed the status of T2348: Improve detection of IPv6 and IPv4 availibility from Open to Testing.

I manually configure IPv6 only environment, and now (forthcoming 2.2.9), it works fine for me.
So, I move this state to Testing.

Jun 20 2018, 9:26 AM · gnupg, dirmngr, Feature Request
gniibe added a comment to T4036: gnupg 2.2.9 release.
Jun 20 2018, 8:23 AM · Release Info, gnupg
gniibe added a parent task for T4036: gnupg 2.2.9 release: T3803: dirmngr issues malformed DNS queries.
Jun 20 2018, 8:03 AM · Release Info, gnupg
gniibe removed a subtask for T4036: gnupg 2.2.9 release: T3803: dirmngr issues malformed DNS queries.
Jun 20 2018, 8:03 AM · Release Info, gnupg
gniibe added a parent task for T4036: gnupg 2.2.9 release: T3374: gpg recv-keys fail if first dns server end up with "Connection refused".
Jun 20 2018, 8:02 AM · Release Info, gnupg
gniibe removed a subtask for T4036: gnupg 2.2.9 release: T3374: gpg recv-keys fail if first dns server end up with "Connection refused".
Jun 20 2018, 8:02 AM · Release Info, gnupg