Fixed in master. Closing.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Jun 4 2019
Fixed in master (to be 2.3).
While it's not recommended, current master has a support of sharing same raw key materials. I think that it now works (I don't try, though).
Closing.
Jun 3 2019
I added the section in tools.texi. Closing.
May 31 2019
FYI, pEp annoyance was addressed and handled here: https://bugs.debian.org/891882
By this patch: https://sources.debian.org/src/enigmail/2:2.0.11+ds1-1/debian/patches/0002-Avoid-auto-download-of-pEpEngine-Closes-891882.patch/
May 30 2019
Thank you for your response.
For GnuPG, the error is: you don't have run-able libntbtls.so in your environment (because of your wrong configuration, perhaps) but you have it to link.
For GPGME, the error is: your linked libgpg-error.so.0 and the one which runs are different (because of your wrong configuration, perhaps).
May 29 2019
I also experienced this issue while testing my --delete-secret-key patches. Passing --pinentry-program /usr/bin/pinentry-tty to the gpg-agent worked around it.
I wrote a patch in a topic branch: rG108c22c9c50a: g10,agent: Support CONFIRM for --delete-key.
I think that gpg-agent side,
- agent/call-pinentry.c: This part is good
- agent/command.c: I wonder if use of status for passing the information of prompt is good or not
Perhaps, we need an improvement in
- g10/call-agent.c: how to ask user, by cpr_* function with no keyword is good?
- Currently, only using DESC
- Only applying to DELETE_KEY command
- Can be applied also to:
- PKSIGN
- PKDECRYPT
May 28 2019
May 27 2019
@werner Thank you for resolving this issue.
See the man page on how to delete subkeys or just the primary secret key with --delete-key.
May 25 2019
No sorry, we won't do that for the regular source. However, the full source for the binary installer is xz compressed. That is because we are legally required to publish the source but in reality the source ist not used and weel, to build you have lots of other requirements with xz being the simplest one.
May 23 2019
There is also a confusing case: a subkey expiration date is set, but the associated primary key is expired.
Pushing a fix in master.
May 22 2019
Actually I have a different approach to fix this bug(let). Please give me a few days.
@werner Thanks for merging the --dry-run patch in 110a4550179f !
May 21 2019
May 20 2019
When having a backup media, I'd recommend completely different one (for example, on paper using paperkey to be stored in a locker in basement), which requires different method for recovering. Brains may be easily confused when same private key material exists in multiple similar devices.
Thanks for this @gniibe. I have long been frustrated by trying to save the correct "stubs" to have my keyring point at two different smartcards. It was common and even advocated in my former community to place one's master key on a separate smartcard (certify capability), with a different one designated for daily usage.
Thanks Gniibe San for explanation.
May 17 2019
At the time the verification is done some output has already been written to the file 'signed'. When checking whether the deprecated abbreviated format
I can't see any bug here so I will close this bug now.
@blades: This feature will be available in GnuPG 2.3, which is planed to be released this year.
For Debian, Buster will come with GnuPG 2.2.12. After release of GnuPG 2.3, backport might be available (like GnuPG 2.2.x is available as backport for Stretch).
May 16 2019
Hi Werner,
Please use one of the mailing lists to solve your problem. 2.3 is a development version, so I wonder from where you got this version of GnuPG.
Helo and forgive me for the ignorance, Iam a new.
I subscribed to this topic because I need a fix like that, I have 2 yubikeys with same subkeys...
Now how is possible to install from master; It's about a debian based distro. Also, when this will be pushed for updates via apt-get;
Thank you.
Feature supported in master.
May 15 2019
Will give you more detailed info about your certificate. For even more details use --dump-chain instead of --list-chain.
May 14 2019
rG5b22d2c4008 tested good under Asan.
Thanks for your report.
May 13 2019
We update condig.{guess,sub} only when needed. In the past we had cases with regressions on some rare platforms.
I'm going to bring newest m4/iconv.m4 from original (gettext), which apparently fixed file descriptor leaks.
Thanks for your report.
An FYI... Once we cleared the earlier findings GnuPG tested OK under Asan. GnuPG itself had no findings, and it did not cause any dependent libraries to generate findings.
May 12 2019
Thanks for the tests. I just fixed this one and will do replace some code in master, soon.
This patch tested OK.
May 10 2019
It looks like this patch clears this finding:
It looks like this patch clears this finding:
We fixed this bug already in the repo. See T4459.
May 9 2019
It appears this issue was first identified and triaged in 2016: T2879
The subkey deletion feature also showed up in other issues since then:
May 8 2019
Diffs downloaded from the revisions don't include commit messages for some reason. Here are all the commits I submitted for review as patch files with messages:
May 7 2019
@werner could you review the patches posted here by @matheusmoreira ? This looks concretely useful, and i would like to have this fixed.
May 6 2019
The digest algorithm used is computed based on the preferences in the key if encryption is also used. Thus this should always work and any decent key has sha256 in its preferences. In case sha1 has a higher precedence, as seen on old keys, --personal-digest-preferences can be used to prefer sha256. However, it is way better to fix the key. The easisies way to do that is to change the expiration date - then the new standard preferences will be used.
May 4 2019
May 3 2019
May 2 2019
Apr 30 2019
@werner Here are the patches:
If you have a patch please send it either by mail to gnupg-devel or attach it here. Thanks.
In T4457#124752, @matheusmoreira wrote:I thought about building a list of keys targeted for deletion so gpg can then ask the user to confirm the deletion of each key individually.
Apr 29 2019
Request for key | Thu, 7 Jun 2018 11:48 +0200 |
Reply from us | Thu, 7 Jun 2018 19:05 +0200 |
Report date | Fri, 8 Jun 2018 09:14 +0200 |
Fix committed | Fri, 8 Jun 2018 11:09 +0200 |
Announcement and release | Fri, 8 Jun 2018 15:41 +0200 |
Apr 27 2019
@dkg, thanks for the feedback. I read [doc/HACKING](https://www.gnupg.org/faq/HACKING.html) and revised the commit message so that it contains ChangeLog entries and a marker line before my description. I compared my new message to prior log entries and they seem to match now. Is this appropriate? If so, I will revise my other commits in the same manner.
Thanks for this work, @matheusmoreira ! I personally think a reusable function in common/ would be preferable, but it's probably up to @werner to decide what's best here.
Apr 26 2019
@dkg Sure! I thought I was supposed to email the patches to the development mailing list. [I've uploaded my delete-secret-subkey branch to GitHub.](https://github.com/matheusmoreira/gnupg/tree/delete-secret-subkey) You can see a comparison here. I'll describe my changes.
@werner This issue also applies to GPA. Looking at the edit key interface I can't see how we can handle this. Am I overlooking something or do we just loose the error information / is it not emited by gnupg?
nice, i'm glad to hear you've got something working, @matheusmoreira ! if you can point to your branch, or send patches here so that other folks can review, that would be great.
Ha, fancy that, I just added the method of using gpg-connect-agent to our new handbook, I agree that having a --delete-secret-subkeys command would be incredibly handy here.
I managed to make it work on my branch: gpg --delete-secret-key FPR! deletes just that key and no others! I will prepare a patch for this specific change and then try to implement the --delete-secret-subkeys command.
Apr 23 2019
FWIW, with 4a130bbc2c2f4be6e8c6357512a943f435ade28f I fixed a similar report by @syscomet but lacking a test case this was a blind flight ("This patch is not tested but a good guess."). Thanks for tracking it down.
Apr 21 2019
This bug makes it impossible to use gpg-agent as ssh-agent for keys generated from gnupg.
(How should I understand what passphrase should I enter?)
The only way is to load them with ssh-add.
Apr 19 2019
Paul Wouters writes to me: