Page MenuHome GnuPG
Feed Advanced Search

Aug 13 2019

werner added a project to T2893: gnupg should used ccid card key material fingerprints and not serial number: yubikey.
Aug 13 2019, 6:40 PM · yubikey, Feature Request, gnupg

Aug 5 2019

werner triaged T4669: Key expiration time sometimes improperly interpreted as a signed 32-bit value as Normal priority.
Aug 5 2019, 7:50 PM · Not A Bug, OpenPGP, gnupg

Jul 31 2019

dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

Please see my explanation on gnupg-devel about why the trailing NUL is a source of pain and difficulty for would-be adopters.

Jul 31 2019, 4:45 PM · gnupg, Bug Report
werner triaged T4652: avoid unnecessary trailing NUL byte in S-expressions as Low priority.
Jul 31 2019, 12:34 PM · gnupg, Bug Report
werner added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

Appending a nul byte is fail-safe programming and helps in debugging. It is on purpose and shall not be removed.

Jul 31 2019, 8:49 AM · gnupg, Bug Report

Jul 25 2019

gniibe changed the status of T4362: Replace the exec funtions for photoids in gpg by our standard exec functions. from Open to Testing.

Except w32_system function, it's done.

Jul 25 2019, 4:48 AM · gnupg, Feature Request
dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

I've just broken out my changes into two commits, one that makes gpg and gpgsm more robust. That should be applicable without any risk.

Jul 25 2019, 1:59 AM · gnupg, Bug Report

Jul 24 2019

aheinecke merged T4653: Kleopatra - Change Expiry Date into T4395: Kleopatra: Missing error handling when changing expiry.
Jul 24 2019, 9:46 AM · gpa, gnupg, gpgme, gpg4win, kleopatra
dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

I've just posted rGb84feb0c82eb to the dkg-fix-T4652 branch, which solves the failure problems by making agent_pkdecrypt and gpgsm_agent_pkdecrypt more robust.

Jul 24 2019, 6:24 AM · gnupg, Bug Report

Jul 23 2019

dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

fwiw, this patch appears to cause gpgsm to fail its test suite:

Jul 23 2019, 6:46 PM · gnupg, Bug Report
dkg updated the task description for T4652: avoid unnecessary trailing NUL byte in S-expressions.
Jul 23 2019, 5:46 PM · gnupg, Bug Report
dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

I've just pushed rG1ae16838660a to the dkg-fix-T4652 branch (i just adjusted it the commit message to include the GnuPG-bug-id)

Jul 23 2019, 5:40 PM · gnupg, Bug Report
dkg created T4652: avoid unnecessary trailing NUL byte in S-expressions.
Jul 23 2019, 5:37 PM · gnupg, Bug Report

Jul 22 2019

summitto added a comment to T169: Add a way to generate keypairs from a passphrase.

Hi everyone,

Jul 22 2019, 8:47 AM · gnupg, Feature Request

Jul 19 2019

gniibe added a comment to T4614: GPG: Cancel on pinpad hangs decryption process for 20 seconds.

It responds somehow, but the content has invalid data of (bChainParameter=0x04):

2019-07-05 09:36:41 scdaemon[71407] DBG: chan_17 -> S LOGIN-DATA aheinecke
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: PC_to_RDR_XfrBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 9
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 21
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bBWI ..............: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   wLevelParameter ...: 0x0000
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 40 05 00 CA 00
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0016]  6E 00 E1
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: RDR_to_PC_DataBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 4
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 21
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bStatus ...........: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bChainParameter ...: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 82 00 82
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: PC_to_RDR_XfrBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 9
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 22
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bBWI ..............: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   wLevelParameter ...: 0x0000
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 40 05 00 CA 00
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0016]  6E 00 E1
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: RDR_to_PC_DataBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 4
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 22
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bStatus ...........: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bChainParameter ...: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 82 00 82
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: PC_to_RDR_XfrBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 9
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 23
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bBWI ..............: 0x04
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   wLevelParameter ...: 0x0000
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0010]  00 40 05 00 CA 00
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   [0016]  6E 00 E1
2019-07-05 09:36:46 scdaemon[71407] DBG: ccid-driver: usb_bulk_read error: LIBUSB_ERROR_TIMEOUT
2019-07-05 09:36:46 scdaemon[71407] ccid_transceive failed: (0x1000a)
2019-07-05 09:36:46 scdaemon[71407] apdu_send_simple(1) failed: card I/O error
Jul 19 2019, 8:05 AM · backport, Restricted Project, scd, gnupg
gniibe added a comment to T4614: GPG: Cancel on pinpad hangs decryption process for 20 seconds.

After the cancellation, the card reader seems being screwed up:

Jul 19 2019, 8:02 AM · backport, Restricted Project, scd, gnupg
gniibe added a comment to T4614: GPG: Cancel on pinpad hangs decryption process for 20 seconds.

It is canceled:

2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: RDR_to_PC_DataBlock:
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   dwLength ..........: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSlot .............: 0
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bSeq ..............: 19
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bStatus ...........: 64
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver:   bError ............: 239
2019-07-05 09:36:41 scdaemon[71407] DBG: ccid-driver: CCID command failed: PIN cancelled
2019-07-05 09:36:41 scdaemon[71407] DBG: dismiss pinpad entry prompt
2019-07-05 09:36:41 scdaemon[71407] DBG: chan_7 -> INQUIRE DISMISSPINPADPROMPT
2019-07-05 09:36:41 scdaemon[71407] DBG: chan_7 <- END
2019-07-05 09:36:41 scdaemon[71407] verify CHV2 failed: Invalid response
2019-07-05 09:36:41 scdaemon[71407] operation decipher result: Invalid response
2019-07-05 09:36:41 scdaemon[71407] app_decipher failed: Invalid response
2019-07-05 09:36:41 scdaemon[71407] DBG: chan_7 -> ERR 100663372 Invalid response <SCD>
Jul 19 2019, 8:01 AM · backport, Restricted Project, scd, gnupg

Jul 16 2019

gniibe added a comment to T4042: RFC 4880 compliance.

It was rG07250279e7ec: * keyedit.c (keyedit_menu): Invisible alias "passwd" as "password". in 2004, which set default to rfc2440-text behavior.
And in 2007, the commit rGb550330067b6: * gpg.c (main): Disable --rfc2440-text and --force-v3-sigs by default. changed the default to no-rfc2440-text.

Jul 16 2019, 10:20 AM · OpenPGP, gnupg
gniibe closed T4105: Inconsistent output for revocation keys in --list-keys --with-colons as Resolved.

Thanks, fixed in master.

Jul 16 2019, 9:55 AM · Documentation, gnupg, Bug Report

Jul 12 2019

gniibe changed the status of T4280: gnupg doc doesn't build due to ImageMagick default policy from Open to Testing.

I disabled the dependency rules for the figures (it's only enabled for maintainers).

Jul 12 2019, 1:34 PM · gnupg, Documentation, Info Needed, Bug Report

Jul 10 2019

Valodim added a comment to T4163: hkps://hkps.pool.sks-keyservers.net has to many bad servers to be a good default.

We should put it of the agenda od the Brussesl summit in 3 weeks. I have a few ideas what we can do in gpg.

Jul 10 2019, 4:36 PM · gnupg, Keyserver

Jul 9 2019

werner closed T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32 as Resolved.
Jul 9 2019, 3:22 PM · gpgagent, gnupg, Bug Report
gniibe added a comment to T4616: Smartcard: Card reset required - It should be automatic.

I pushed my change of rGc51a5685554a: scd: ccid-driver: Initial getting ATR more robustly..
With TTXS, scdaemon correctly recovers from the error.

Jul 9 2019, 4:02 AM · gnupg, scd
gniibe added a comment to T4616: Smartcard: Card reset required - It should be automatic.

When the computer is going to suspend, the scdaemon receives a message from USB layer as the interrupt transfer is shutting down, then scdaemon considers it's removal of device/card.
But in case of suspend (and the device does not support USB suspend), USB port is kept with the power.
So, it keeps running actually.

Jul 9 2019, 3:07 AM · gnupg, scd
gniibe added a comment to T4616: Smartcard: Card reset required - It should be automatic.

Here are results of my experiment with Intel NUC computer (which supports S4 (and S3)).

Jul 9 2019, 2:53 AM · gnupg, scd

Jul 8 2019

aheinecke created T4616: Smartcard: Card reset required - It should be automatic.
Jul 8 2019, 2:30 PM · gnupg, scd
gniibe added a comment to T4158: UIF (User Interaction Flag) DO support.

No. I intentionally select: Not-backporting this feature.
The feature is added for Yubikey, in the specification.
Use of the feature by Data-Object is not that so useful.

Jul 8 2019, 9:21 AM · Restricted Project, Feature Request, scd, gnupg

Jul 5 2019

werner added a comment to T4158: UIF (User Interaction Flag) DO support.

I think we should not backport this to 2.2 - okay?

Jul 5 2019, 11:14 AM · Restricted Project, Feature Request, scd, gnupg
aheinecke created T4614: GPG: Cancel on pinpad hangs decryption process for 20 seconds.
Jul 5 2019, 9:50 AM · backport, Restricted Project, scd, gnupg
aheinecke closed T4561: GPG / GPGSM: Pinentry cancels lead to wrong error codes as Resolved.

Works for me! :-)

Jul 5 2019, 9:44 AM · S/MIME, gnupg
aheinecke merged T3928: canceling password dialog for decrypting is not recognized correctling. into T4561: GPG / GPGSM: Pinentry cancels lead to wrong error codes.
Jul 5 2019, 9:33 AM · S/MIME, gnupg
werner added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Not sending the user id packet, is just a bad idea because that user id exists and from my understanding they are sending the self-signatures anyway. They should not try to argue with the GDPR here, that is privacy theater. The key itself is a personal data and due to technical reasons this data is required. What they can do is to accept only user ids which carry just only mail address and no comments or name. posteo.de for example requires this for years and the WKD drafts has a feature to support this.

Jul 5 2019, 7:58 AM · gnupg (gpg23), Feature Request

Jul 4 2019

jaymzh added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Just want to weigh in here to say this would be incredibly useful given the shift to the new keyserver model. See T4604 for more context.

Jul 4 2019, 10:33 PM · gnupg (gpg23), Feature Request

Jul 3 2019

werner added a parent task for T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver: T4606: Release GnuPG 2.2.17.
Jul 3 2019, 6:11 PM · gnupg (gpg22), wkd

Jul 2 2019

kloczek added a comment to T4602: 2.2.16: test suite fails.

I cannot do that because all listed above packages are my own products.
Fedora is not execution test suites in more than 90% of all packages so they are not aware of most of the issues exposed by test suites.
Please focus on possible causes of above tests.
I'm opened on any suggestions to make additional diagnostics.

Jul 2 2019, 4:02 PM · Fedora, gnupg, Bug Report
werner triaged T4602: 2.2.16: test suite fails as Low priority.

Thanks. You may want to ask on the mailing list gnupg-users to see whether someone else has had problems building on rawhide. Right now we do not have the time for individual support and thus I unfortunately need to prioritize this bug report down.

Jul 2 2019, 3:43 PM · Fedora, gnupg, Bug Report
kloczek added a comment to T4602: 2.2.16: test suite fails.
[tkloczko@barrel SPECS]$ uname -a
Linux barrel 5.1.5-300.fc30.x86_64 #1 SMP Sat May 25 18:00:11 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
[tkloczko@barrel SPECS]$ rpm -q libassuan-devel libcurl-devel libgcrypt-devel libgpg-error-devel libksba-devel libusb-devel npth-devel openldap-devel pcsc-lite-libs gnutls-devel sqlite-devel
libassuan-devel-2.5.3-2.1.fc31.x86_64
libcurl-devel-7.65.1-2.fc31.x86_64
libgcrypt-devel-1.8.4-4.1.fc31.x86_64
libgpg-error-devel-1.36-2.fc31.x86_64
libksba-devel-1.3.5-10.1.fc31.x86_64
libusb-devel-0.1.5-14.fc30.x86_64
npth-devel-1.6-3.fc31.x86_64
openldap-devel-2.4.47-2.2.fc31.x86_64
pcsc-lite-libs-1.8.25-2.1.fc31.x86_64
gnutls-devel-3.6.8-2.fc31.x86_64
sqlite-devel-3.28.0-2.fc31.x86_64

Still about half of the packages are from Fedora rawhide but rest are mine.
Just checked and the test suite fails exactly the same way even started without palatalisation.

Jul 2 2019, 3:11 PM · Fedora, gnupg, Bug Report
werner added a comment to T4602: 2.2.16: test suite fails.

Please share with us the OS used, the versions of the libtaries used and other configuration information.
Also please run again using "make check" without any extra options.

Jul 2 2019, 9:32 AM · Fedora, gnupg, Bug Report
kloczek created T4602: 2.2.16: test suite fails.
Jul 2 2019, 9:00 AM · Fedora, gnupg, Bug Report

Jul 1 2019

werner claimed T4599: remap `--search` to `--locate-keys` (with warning).
Jul 1 2019, 7:31 PM · gnupg (gpg23), dirmngr
dkg created T4599: remap `--search` to `--locate-keys` (with warning).
Jul 1 2019, 6:16 PM · gnupg (gpg23), dirmngr
t8m added a comment to T1333: GPGSM rejects OCSP responder cert without keyUsage.

Ping?

Jul 1 2019, 5:40 PM · Bug Report, gnupg
aheinecke created T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver.
Jul 1 2019, 9:13 AM · gnupg (gpg22), wkd
aheinecke reassigned T4395: Kleopatra: Missing error handling when changing expiry from aheinecke to werner.

Werner: I'm assigning this to you. Because the underlying reason is a missing status from gpg. I think we should add that for 2.3 as any new status line tends to break things.

Jul 1 2019, 8:45 AM · gpa, gnupg, gpgme, gpg4win, kleopatra
gniibe changed the status of T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32 from Open to Testing.
Jul 1 2019, 6:14 AM · gpgagent, gnupg, Bug Report

Jun 28 2019

werner added a subtask for T2019: Order of magnitude degradation in performance in gpg2 cf gpg: T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.
Jun 28 2019, 12:01 PM · Stalled, Bug Report, gnupg
dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

sorry to keep pinging this, but given the ongoing flooding attacks (e.g. T4591) and how SKS and similar keyservers are unable to safely transmit flooded certificates, i think this kind of fix is urgent if we expect gpg to be able to retrieve revocations safely. What's the status here?

Jun 28 2019, 10:05 AM · gnupg (gpg23), Feature Request

Jun 26 2019

wiktor-k added a comment to T4584: --quick-sign-key offers no way to override a current certification.

For the record in my original message I asked about adding self-signatures.

Jun 26 2019, 11:12 AM · Restricted Project, gnupg (gpg22), Feature Request
werner triaged T4584: --quick-sign-key offers no way to override a current certification as Normal priority.
Jun 26 2019, 7:53 AM · Restricted Project, gnupg (gpg22), Feature Request

Jun 25 2019

dkg added a comment to T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

I'm unlikely to put a windows-specific patch into the debian source, as
i have no good way of testing it, and it wouldn't affect any binary that
we ship.

Jun 25 2019, 2:57 AM · gpgagent, gnupg, Bug Report

Jun 24 2019

Valodim added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

It's been a while, any word on this? I sent the DCO as requested. Are there any technical concerns left to address?

Jun 24 2019, 12:48 PM · gnupg (gpg23), Feature Request
gniibe added a comment to T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

@dkg, for your patch, it can be improved for Windows by using its event mechanism. You can see gnupg/scd/scdaemon.c.

Jun 24 2019, 4:00 AM · gpgagent, gnupg, Bug Report
dkg updated subscribers of T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

Hm, T4521 suggests that the two different cases should not be treated differently. If you think that they *should* cause distinct behavior, please do mention it over there!

Jun 24 2019, 2:24 AM · gpgagent, gnupg, Bug Report
gniibe added a comment to T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

There are two different cases: (1) By SIGTERM and (2) By KILLAGENT. It's true that the agent stops accepting on the listening socket for (1), but it's not the case for (2).
This particular problem is for the case (2).

Jun 24 2019, 1:59 AM · gpgagent, gnupg, Bug Report

Jun 21 2019

dkg added a comment to T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

@gniibe, thanks for the diagnosis! I agree that restarting or shutting down the backends should be done in the reverse order as a simple workaround.

Jun 21 2019, 6:24 PM · gpgagent, gnupg, Bug Report
gniibe added a comment to T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

Correct solution is to implement KILLAGENT synchronously, but it's somehow harder to implement.
Easier workaround is modifying gpgconf like:

Jun 21 2019, 3:47 AM · gpgagent, gnupg, Bug Report
gniibe edited projects for T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32, added: gnupg, gpgagent; removed gnupg (gpg22).

I found a race condition between KILLAGENT command and accepting another request.
Here is a patch to replicate the race condition :

Jun 21 2019, 2:33 AM · gpgagent, gnupg, Bug Report

Jun 20 2019

huowen added a comment to T4395: Kleopatra: Missing error handling when changing expiry.

Hello,
when can we fix it?

Jun 20 2019, 2:12 AM · gpa, gnupg, gpgme, gpg4win, kleopatra

Jun 18 2019

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

we now have a DCO from @Valodim

Jun 18 2019, 2:05 PM · gnupg (gpg23), Feature Request

Jun 16 2019

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

@werner, My usual approach for private branches is to prefix with dkg/, but (a) playfair rejects branch names with a /, and (b) i'm not the author of these patches, and i didn't want to claim credit that doesn't belong to me.

Jun 16 2019, 5:40 PM · gnupg (gpg23), Feature Request

Jun 14 2019

werner added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Please use a private branch as usual. There has been no agreement or a discussion over this change nor do we have a DCO from him.

Jun 14 2019, 6:10 PM · gnupg (gpg23), Feature Request
dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

I've pushed @Valodim's proposed patches to the fix-4393 branch in our git repo. they look good to me, and i think they should be merged to master.

Jun 14 2019, 6:08 PM · gnupg (gpg23), Feature Request

Jun 10 2019

kaspro added a comment to T4301: Handling multiple subkeys on two SmartCards.

Thanks a lot @gniibe for this change.
I do understand and share your concerns, nevertheless are there, in my opinion valid reasons to be able to have a backup or duplicate, especially on the same or similar media type.
Consider for example giving multiple devices a chance of common interaction, using the keys for backup encryption etc. - I think there are several possible use-cases which can benefit from this.

Jun 10 2019, 7:40 PM · Restricted Project, gnupg, scd, Bug Report

Jun 8 2019

werner triaged T4564: gpgconf --change-options prints warning about dirmngr_ldapservers.conf when GNUPGHOME is set as Wishlist priority.
Jun 8 2019, 10:41 AM · gnupg, Bug Report

Jun 7 2019

dkg created T4564: gpgconf --change-options prints warning about dirmngr_ldapservers.conf when GNUPGHOME is set.
Jun 7 2019, 10:28 PM · gnupg, Bug Report
aheinecke created T4561: GPG / GPGSM: Pinentry cancels lead to wrong error codes.
Jun 7 2019, 9:56 AM · S/MIME, gnupg

Jun 6 2019

werner added a comment to T4544: More prompts before key deletion.

Nope

Jun 6 2019, 7:39 AM · gnupg, Feature Request, patch
matheusmoreira renamed T4544: More prompts before key deletion from Key deletion: more prompts, new commands to More prompts before key deletion.
Jun 6 2019, 5:39 AM · gnupg, Feature Request, patch
matheusmoreira reopened T4544: More prompts before key deletion as "Open".

Here are the patches without any new commands:

Jun 6 2019, 3:58 AM · gnupg, Feature Request, patch
matheusmoreira added a comment to T4544: More prompts before key deletion.

@werner Only patches 2 and 3 introduce new commands. What do you think about the other changes?

Jun 6 2019, 3:20 AM · gnupg, Feature Request, patch

Jun 5 2019

werner closed T4544: More prompts before key deletion as Wontfix.

In case I not already mentioned it: There won't be any new commands to delete a key. Of course you are free to change GnuPG as you like but I won't apply them here.

Jun 5 2019, 6:18 PM · gnupg, Feature Request, patch
matheusmoreira changed Version from 2.2.15 to 2.2.16 on T4544: More prompts before key deletion.
Jun 5 2019, 11:53 AM · gnupg, Feature Request, patch

Jun 4 2019

gniibe closed T2747: gpg crashes when it receives a SIGTERM while it's cleaning up as Resolved.

Fixed in master. Closing.

Jun 4 2019, 6:43 AM · gnupg, Bug Report
gniibe closed T4137: IPC syntax error when `gpg` starts `gpg-agent` without `$TERM` variable as Resolved.

Fixed in master (to be 2.3).

Jun 4 2019, 4:37 AM · gnupg, Bug Report
gniibe closed T3119: gpg: Improve public key decryption, a subtask of T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)), as Resolved.
Jun 4 2019, 2:34 AM · Restricted Project, gnupg, Feature Request
gniibe closed T1854: Problems with same encryption and signing key on smartcard as Resolved.

While it's not recommended, current master has a support of sharing same raw key materials. I think that it now works (I don't try, though).
Closing.

Jun 4 2019, 2:33 AM · gnupg, Feature Request, scd
gniibe closed T2903: "gpg --card-status" does not add any entries to the private key ring as Resolved.
Jun 4 2019, 2:30 AM · Info Needed, Bug Report, gnupg
gniibe closed T2298: Unblocking a smartcard PIN not possible in 2.1 as Resolved.
Jun 4 2019, 2:29 AM · Info Needed, gnupg, scd, Bug Report
gniibe closed T1082: scd rewrites ~/.gnupg/reader_0.status with same content when SERIALNO is issued as Resolved.
Jun 4 2019, 2:25 AM · gnupg, Info Needed, gpg4win, Bug Report, scd
gniibe closed T3465: --pinentry-mode loopback with --delete-secret-keys as Resolved.
Jun 4 2019, 2:24 AM · gnupg, Bug Report
gniibe closed T4546: make check error on gnupg-2.2.15 and gpgme-1.13.0 as Resolved.
Jun 4 2019, 1:52 AM · Not A Bug, gnupg, gpgme, Bug Report

Jun 3 2019

gniibe closed T4031: gpg-check-pattern.1 in Debian generates warnings from test-groff as Resolved.

I added the section in tools.texi. Closing.

Jun 3 2019, 5:00 AM · Debian, gnupg, Bug Report

May 31 2019

gniibe added a comment to T4546: make check error on gnupg-2.2.15 and gpgme-1.13.0.

FYI, pEp annoyance was addressed and handled here: https://bugs.debian.org/891882
By this patch: https://sources.debian.org/src/enigmail/2:2.0.11+ds1-1/debian/patches/0002-Avoid-auto-download-of-pEpEngine-Closes-891882.patch/

May 31 2019, 7:57 AM · Not A Bug, gnupg, gpgme, Bug Report

May 30 2019

ideaantenna added a comment to T4546: make check error on gnupg-2.2.15 and gpgme-1.13.0.

Thank you for your response.

May 30 2019, 9:44 PM · Not A Bug, gnupg, gpgme, Bug Report
gniibe claimed T4546: make check error on gnupg-2.2.15 and gpgme-1.13.0.

For GnuPG, the error is: you don't have run-able libntbtls.so in your environment (because of your wrong configuration, perhaps) but you have it to link.
For GPGME, the error is: your linked libgpg-error.so.0 and the one which runs are different (because of your wrong configuration, perhaps).

May 30 2019, 4:25 AM · Not A Bug, gnupg, gpgme, Bug Report

May 29 2019

ideaantenna removed projects from T4546: make check error on gnupg-2.2.15 and gpgme-1.13.0: Enigmail, gpgagent.
May 29 2019, 7:00 PM · Not A Bug, gnupg, gpgme, Bug Report
ideaantenna updated the task description for T4546: make check error on gnupg-2.2.15 and gpgme-1.13.0.
May 29 2019, 6:55 PM · Not A Bug, gnupg, gpgme, Bug Report
ideaantenna added projects to T4546: make check error on gnupg-2.2.15 and gpgme-1.13.0: gpgme, gnupg.
May 29 2019, 6:52 PM · Not A Bug, gnupg, gpgme, Bug Report
matheusmoreira added a comment to T3465: --pinentry-mode loopback with --delete-secret-keys.

I also experienced this issue while testing my --delete-secret-key patches. Passing --pinentry-program /usr/bin/pinentry-tty to the gpg-agent worked around it.

May 29 2019, 10:16 AM · gnupg, Bug Report
matheusmoreira updated the task description for T4544: More prompts before key deletion.
May 29 2019, 10:10 AM · gnupg, Feature Request, patch
matheusmoreira updated the task description for T4544: More prompts before key deletion.
May 29 2019, 10:00 AM · gnupg, Feature Request, patch
gniibe claimed T3465: --pinentry-mode loopback with --delete-secret-keys.

I wrote a patch in a topic branch: rG108c22c9c50a: g10,agent: Support CONFIRM for --delete-key.
I think that gpg-agent side,

  • agent/call-pinentry.c: This part is good
  • agent/command.c: I wonder if use of status for passing the information of prompt is good or not

Perhaps, we need an improvement in

  • g10/call-agent.c: how to ask user, by cpr_* function with no keyword is good?
  • Currently, only using DESC
  • Only applying to DELETE_KEY command
  • Can be applied also to:
    • PKSIGN
    • PKDECRYPT
May 29 2019, 5:30 AM · gnupg, Bug Report
gniibe closed T4494: UBsan finding "armor.c:1159:11: runtime error: member access within null pointer..." as Resolved.
May 29 2019, 3:06 AM · gnupg
gniibe closed T4504: Asan findings in iconv configure test causing config failure as Resolved.
May 29 2019, 3:05 AM · gpgrt, gnupg

May 28 2019

werner triaged T4544: More prompts before key deletion as Low priority.
May 28 2019, 6:12 PM · gnupg, Feature Request, patch
matheusmoreira added revisions to T4544: More prompts before key deletion: D480: gpg: factor out secret key deletion function, D485: gpg: add the --delete-secret-subkeys command, D488: gpg: add the --delete-secret-key-stubs command, D481: gpg: confirm deletion of each key individually, D482: gpg: confirm again before deleting primary key.
May 28 2019, 5:39 PM · gnupg, Feature Request, patch
matheusmoreira created T4544: More prompts before key deletion in the S1 Public space.
May 28 2019, 5:21 PM · gnupg, Feature Request, patch
werner closed T4462: GnuPG: Segfaults trying to encrypt / locate by mbox for specific keys as Resolved.
May 28 2019, 5:08 PM · Bug Report, gnupg

May 27 2019

matheusmoreira added a comment to T4457: Improve deletion of secret subkeys (don't delete primary key when subkey deletion is requested).

@werner Thank you for resolving this issue.

May 27 2019, 1:04 PM · patch, Bug Report, gnupg
werner closed T4457: Improve deletion of secret subkeys (don't delete primary key when subkey deletion is requested) as Resolved.

See the man page on how to delete subkeys or just the primary secret key with --delete-key.

May 27 2019, 12:57 PM · patch, Bug Report, gnupg