Page MenuHome GnuPG
Feed All Stories

Jul 8 2019

jukivili added a task to D490: PowerPC optimized routines for AES and SHA2 using PowerISA 2.07 instructions.: T4529: libgcrypt: POWER AES Vector Acceleration.
Jul 8 2019, 2:57 PM
jukivili added a task to D493: AES block modes for PPC: T4529: libgcrypt: POWER AES Vector Acceleration.
Jul 8 2019, 2:55 PM
jukivili added revisions to T4529: libgcrypt: POWER AES Vector Acceleration: D493: AES block modes for PPC, D494: rijndael/ppc: re-implement single-block mode, and implement OCB block cipher.
Jul 8 2019, 2:55 PM · libgcrypt, Feature Request
jukivili added a task to D494: rijndael/ppc: re-implement single-block mode, and implement OCB block cipher: T4529: libgcrypt: POWER AES Vector Acceleration.
Jul 8 2019, 2:55 PM
jukivili added a parent task for T4531: PowerPC performance improvements: T4460: libgcrypt performance TODOs.
Jul 8 2019, 2:52 PM
jukivili added a subtask for T4460: libgcrypt performance TODOs: T4531: PowerPC performance improvements.
Jul 8 2019, 2:52 PM · libgcrypt
aheinecke created T4616: Smartcard: Card reset required - It should be automatic.
Jul 8 2019, 2:30 PM · gnupg, scd
werner added a comment to T4276: Context.decrypt() throws an error if *any* signature is bad.

Using several python versions?

Jul 8 2019, 9:53 AM · gpgme, Python, Bug Report
werner added a comment to rG39c40e572c56: scd: Fix keygrip search..

Sorry for that

Jul 8 2019, 9:51 AM
gniibe added a comment to T4158: UIF (User Interaction Flag) DO support.

No. I intentionally select: Not-backporting this feature.
The feature is added for Yubikey, in the specification.
Use of the feature by Data-Object is not that so useful.

Jul 8 2019, 9:21 AM · Restricted Project, Feature Request, scd, gnupg
gniibe committed rG39c40e572c56: scd: Fix keygrip search. (authored by gniibe).
scd: Fix keygrip search.
Jul 8 2019, 5:32 AM
dkg reopened T4276: Context.decrypt() throws an error if *any* signature is bad as "Open".

rM7d0a979c07d2 disabled the test for this. @werner says:

Jul 8 2019, 4:38 AM · gpgme, Python, Bug Report

Jul 5 2019

slandden updated subscribers of D494: rijndael/ppc: re-implement single-block mode, and implement OCB block cipher.

@gcwilson Can you notify the performance team of this new patch?

Jul 5 2019, 7:42 PM
slandden updated the summary of D494: rijndael/ppc: re-implement single-block mode, and implement OCB block cipher.
Jul 5 2019, 7:38 PM
slandden created D494: rijndael/ppc: re-implement single-block mode, and implement OCB block cipher.
Jul 5 2019, 7:38 PM
pschoenb created T4615: gpg.exe very slow.
Jul 5 2019, 6:45 PM · Bug Report, gpg4win
werner added a comment to T3464: successful decryption with session key reports failure if public key is unknown.

Because this is a GPGME bug.

Jul 5 2019, 6:36 PM · gpgme, Bug Report
werner added a comment to T4607: enable `import-clean` by default.

That is a limit for the web key service to publish a certificate. IIRC, Debian developers do not use this but Debian creates the WKD from a database.

Jul 5 2019, 6:34 PM · Feature Request
dkg added a comment to T4607: enable `import-clean` by default.

This is especially relevant if you are not going to implement the fallback to import-clean that was proposed in T4591.

Jul 5 2019, 5:58 PM · Feature Request
dkg added a comment to T4607: enable `import-clean` by default.

I see that you have lowered the WKD limit to 64KiB with 6396f8d115f21ae15571b683e9ac9d1d7e3f44f4 -- i think this is a mistake, as reasonable certificates can be several times that size (e.g. zack's cleaned certificate, mentioned above). I'd prefer a limit of 256KiB.

Jul 5 2019, 5:56 PM · Feature Request
dkg added a comment to T3464: successful decryption with session key reports failure if public key is unknown.

why is this fix not relevant for the 2.2 stable branch? I've had no feedback on this proposed patch.

Jul 5 2019, 5:51 PM · gpgme, Bug Report
werner committed rG40ea9dbdc29b: Prepare NEWS for the next release (authored by werner).
Prepare NEWS for the next release
Jul 5 2019, 3:45 PM
Valodim added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

and from my understanding they are sending the self-signatures anyway.

Jul 5 2019, 3:31 PM · gnupg (gpg23), Feature Request
dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

This is not just about keys.openpgp.org. It's about any keystore that implements user id redaction, for whatever reason. When you say "what they can do is accept only user ids which…" i think you mean "the userid-redacting keystores can instead redistribute user ids which …". Is that right?

Jul 5 2019, 3:07 PM · gnupg (gpg23), Feature Request
werner added a comment to T4158: UIF (User Interaction Flag) DO support.

I think we should not backport this to 2.2 - okay?

Jul 5 2019, 11:14 AM · Restricted Project, Feature Request, scd, gnupg
werner removed a project from T3464: successful decryption with session key reports failure if public key is unknown: gnupg (gpg22).
Jul 5 2019, 11:12 AM · gpgme, Bug Report
werner edited projects for T4601: gpg --quiet --quick-sign-key is not quiet, added: gnupg (gpg23); removed gnupg (gpg22).
Jul 5 2019, 11:08 AM · gnupg24, gnupg (gpg23), Bug Report
werner added a comment to T4601: gpg --quiet --quick-sign-key is not quiet.

Quiet tricky to get right; needs some rework.

Jul 5 2019, 11:08 AM · gnupg24, gnupg (gpg23), Bug Report
werner closed T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver as Resolved.

Done for master and 2.2.

Jul 5 2019, 10:49 AM · gnupg (gpg22), wkd
werner closed T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver, a subtask of T4606: Release GnuPG 2.2.17, as Resolved.
Jul 5 2019, 10:49 AM · Release Info, gnupg (gpg22)
werner committed rG3242837d203a: gpg: With --auto-key-retrieve prefer WKD over keyservers. (authored by werner).
gpg: With --auto-key-retrieve prefer WKD over keyservers.
Jul 5 2019, 10:44 AM
werner committed rG6396f8d115f2: wkd: Change client/server limit back to 64 KiB (authored by werner).
wkd: Change client/server limit back to 64 KiB
Jul 5 2019, 10:44 AM
werner committed rG96bf8f477805: gpg: With --auto-key-retrieve prefer WKD over keyservers. (authored by werner).
gpg: With --auto-key-retrieve prefer WKD over keyservers.
Jul 5 2019, 10:33 AM
werner committed rGb0e8724b1025: wkd: Change client/server limit back to 64 KiB (authored by werner).
wkd: Change client/server limit back to 64 KiB
Jul 5 2019, 10:33 AM
aheinecke created T4614: GPG: Cancel on pinpad hangs decryption process for 20 seconds.
Jul 5 2019, 9:50 AM · backport, Restricted Project, scd, gnupg
aheinecke closed T4561: GPG / GPGSM: Pinentry cancels lead to wrong error codes as Resolved.

Works for me! :-)

Jul 5 2019, 9:44 AM · S/MIME, gnupg
aheinecke added a comment to T3928: canceling password dialog for decrypting is not recognized correctling..

I closed this as a duplicate of a newer task because I did not find this issue when creating T4561 and there was already work done for T4561.

Jul 5 2019, 9:33 AM · gpgme, Bug Report
aheinecke merged task T3928: canceling password dialog for decrypting is not recognized correctling. into T4561: GPG / GPGSM: Pinentry cancels lead to wrong error codes.
Jul 5 2019, 9:33 AM · gpgme, Bug Report
aheinecke merged T3928: canceling password dialog for decrypting is not recognized correctling. into T4561: GPG / GPGSM: Pinentry cancels lead to wrong error codes.
Jul 5 2019, 9:33 AM · S/MIME, gnupg
gniibe committed rG38b9da7de335: sm: Return the last error for pubkey decryption. (authored by gniibe).
sm: Return the last error for pubkey decryption.
Jul 5 2019, 8:53 AM
gniibe committed rG6cc4119ec03b: gpg: Return the last error for pubkey decryption. (authored by gniibe).
gpg: Return the last error for pubkey decryption.
Jul 5 2019, 8:18 AM
werner lowered the priority of T4393: GnuPG should always accept key updates even if the update does not contain UIDs from Normal to Low.
Jul 5 2019, 8:02 AM · gnupg (gpg23), Feature Request
werner added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Not sending the user id packet, is just a bad idea because that user id exists and from my understanding they are sending the self-signatures anyway. They should not try to argue with the GDPR here, that is privacy theater. The key itself is a personal data and due to technical reasons this data is required. What they can do is to accept only user ids which carry just only mail address and no comments or name. posteo.de for example requires this for years and the WKD drafts has a feature to support this.

Jul 5 2019, 7:58 AM · gnupg (gpg23), Feature Request
werner added a comment to T4607: enable `import-clean` by default.

You are right. I again mixed this up with gpg-wks-client. Over there we have a limit implemented unsing --max-output to avoid compression based attacks.

Jul 5 2019, 7:51 AM · Feature Request
Laurent Montel <montel@kde.org> committed rKLEOPATRAb00dac8abf80: GIT_SILENT: increase qt version (we will depend against 5.60 will use qt5.11) (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: increase qt version (we will depend against 5.60 will use qt5.11)
Jul 5 2019, 7:48 AM
Laurent Montel <montel@kde.org> committed rLIBKLEO4829ebec63d1: GIT_SILENT: increase qt version (we will depend against 5.60 will use qt5.11) (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: increase qt version (we will depend against 5.60 will use qt5.11)
Jul 5 2019, 7:46 AM
werner triaged T4613: document implementation guidance for WKD clients in draft-koch-openpgp-webkey-service as Normal priority.
Jul 5 2019, 7:32 AM · Documentation, wkd

Jul 4 2019

dkg created T4613: document implementation guidance for WKD clients in draft-koch-openpgp-webkey-service.
Jul 4 2019, 11:04 PM · Documentation, wkd
dkg added a comment to T4607: enable `import-clean` by default.

@werner, i don't think there is a 64K limit either, at least not in 2.2.16. Here is 2.2.16 with an empty homedir fetching Zack's certificate here which is > 97KiB:

Jul 4 2019, 11:02 PM · Feature Request
jaymzh added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Just want to weigh in here to say this would be incredibly useful given the shift to the new keyserver model. See T4604 for more context.

Jul 4 2019, 10:33 PM · gnupg (gpg23), Feature Request
dkg added a comment to T4604: gpg 2.2 fails to download keys from a keyserver.

Not every incoming certificate that has no user ID will lack a user ID once it is merged with the local copy of the same certificate. T4393 describes that use case, so if you're interested in receiving user-ID-lacking updates to certificates that you already have a copy of, @jaymzh, you should follow up on that ticket.

Jul 4 2019, 10:24 PM · Bug Report
dkg added a comment to T4612: Add spare space to the keybox to always allow the import of revocations..

Once a revocation is added (to any part of the certificate), perhaps all the certification packets that are clearly made obsolete by the revocation could be dropped from the certificate? That would certainly free up space to be able to import additional revocations if needed.

Jul 4 2019, 10:21 PM · gnupg24, gnupg (gpg23), Bug Report
werner edited projects for T4512: gpg's --keyserver option should be more robustly deprecated, added: gnupg (gpg23); removed gnupg (gpg22), dirmngr.

Given the recent problems with the keyservers, I expect that the keyserver feature will go away anyway and thus I do not think we will put any more effort into this. Thus I re-tag this as gpg 2.3.

Jul 4 2019, 5:15 PM · gnupg24, gnupg (gpg23), Documentation, Keyserver, Bug Report
werner added a comment to T4566: dirmngr fails with HTTP 302 redirection to hkps.

And of course, thanks for your fix.

Jul 4 2019, 5:05 PM · gnupg (gpg22), dirmngr, Bug Report
werner closed T4566: dirmngr fails with HTTP 302 redirection to hkps as Resolved.

Applied to both branches. I have run no tests myself, though.

Jul 4 2019, 5:04 PM · gnupg (gpg22), dirmngr, Bug Report
werner committed rG064aeb14c9b8: dirmngr: fix handling of HTTPS redirections during HKP (authored by dkg).
dirmngr: fix handling of HTTPS redirections during HKP
Jul 4 2019, 5:02 PM
werner committed rGefb6e08ea2ca: dirmngr: fix handling of HTTPS redirections during HKP (authored by dkg).
dirmngr: fix handling of HTTPS redirections during HKP
Jul 4 2019, 4:33 PM
werner closed T4603: dirmngr WKD redirection changes paths as Resolved.

Fix will be in 2.2.17

Jul 4 2019, 4:26 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
werner closed T4603: dirmngr WKD redirection changes paths, a subtask of T4606: Release GnuPG 2.2.17, as Resolved.
Jul 4 2019, 4:26 PM · Release Info, gnupg (gpg22)
werner closed T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx` as Resolved.

Fix will be in 2.2.17.
See T4612 for the revocation case.

Jul 4 2019, 4:25 PM · Bug Report, gnupg (gpg22)
werner closed T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`, a subtask of T4606: Release GnuPG 2.2.17, as Resolved.
Jul 4 2019, 4:25 PM · Release Info, gnupg (gpg22)
werner created T4612: Add spare space to the keybox to always allow the import of revocations..
Jul 4 2019, 4:23 PM · gnupg24, gnupg (gpg23), Bug Report
werner closed T4604: gpg 2.2 fails to download keys from a keyserver as Wontfix.

Re 1.: I don't view this as a bug. gpg prints stats on what it has been done and clearly it has processed a key. If it would have imported the key you would see another stat line telling about this. There was however a bug in the stats output which has been fixed.

Jul 4 2019, 4:14 PM · Bug Report
werner triaged T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx` as Normal priority.
Jul 4 2019, 4:01 PM · gnupg24, gnupg (gpg23), Feature Request
werner closed T4607: enable `import-clean` by default as Resolved.
Jul 4 2019, 4:00 PM · Feature Request
werner closed T4607: enable `import-clean` by default, a subtask of T4606: Release GnuPG 2.2.17, as Resolved.
Jul 4 2019, 4:00 PM · Release Info, gnupg (gpg22)
werner committed rG2b7151b0a57f: gpg: Add "self-sigs-only" and "import-clean" to the keyserver options. (authored by werner).
gpg: Add "self-sigs-only" and "import-clean" to the keyserver options.
Jul 4 2019, 3:59 PM
werner added a parent task for T4607: enable `import-clean` by default: T4606: Release GnuPG 2.2.17.
Jul 4 2019, 3:47 PM · Feature Request
werner added a subtask for T4606: Release GnuPG 2.2.17: T4607: enable `import-clean` by default.
Jul 4 2019, 3:47 PM · Release Info, gnupg (gpg22)
werner committed rG23c978640812: gpg: Add "self-sigs-only" and "import-clean" to the keyserver options. (authored by werner).
gpg: Add "self-sigs-only" and "import-clean" to the keyserver options.
Jul 4 2019, 3:45 PM
werner lowered the priority of T4599: remap `--search` to `--locate-keys` (with warning) from High to Normal.
Jul 4 2019, 3:23 PM · gnupg (gpg23), dirmngr
werner committed rG4cbd058a3da9: gpg: Avoid printing false AKL error message. (authored by werner).
gpg: Avoid printing false AKL error message.
Jul 4 2019, 3:22 PM
werner committed rG46f3283b345e: gpg: New command --locate-external-key. (authored by werner).
gpg: New command --locate-external-key.
Jul 4 2019, 3:22 PM
werner committed rG11871433436b: gpg: Make the get_pubkey_byname interface easier to understand. (authored by werner).
gpg: Make the get_pubkey_byname interface easier to understand.
Jul 4 2019, 3:22 PM
werner committed rG91a6ba32347a: gpg: Avoid printing false AKL error message. (authored by werner).
gpg: Avoid printing false AKL error message.
Jul 4 2019, 3:21 PM
werner committed rGd00c8024e588: gpg: New command --locate-external-key. (authored by werner).
gpg: New command --locate-external-key.
Jul 4 2019, 3:15 PM
werner committed rG9980f81da765: gpg: Make the get_pubkey_byname interface easier to understand. (authored by werner).
gpg: Make the get_pubkey_byname interface easier to understand.
Jul 4 2019, 3:15 PM
werner removed a parent task for T4599: remap `--search` to `--locate-keys` (with warning): T4606: Release GnuPG 2.2.17.
Jul 4 2019, 11:33 AM · gnupg (gpg23), dirmngr
werner removed a subtask for T4606: Release GnuPG 2.2.17: T4599: remap `--search` to `--locate-keys` (with warning).
Jul 4 2019, 11:33 AM · Release Info, gnupg (gpg22)
werner edited projects for T4599: remap `--search` to `--locate-keys` (with warning), added: gnupg (gpg23); removed gnupg (gpg22).

I tried to implement this but this is troublesome for other programs using the interface because a common patter is to use --search-keys to get a listing and then use --recv-key to import the keys - That won't work and will require changes to --recv-key too. Thus this change will not go into 2.2. Anyway, it is not dangerous to have --search-keys because the new default for import from keyservers will be to strip all key-signatures.

Jul 4 2019, 11:33 AM · gnupg (gpg23), dirmngr
aheinecke created T4611: GpgOL: Failure to update body after plain text conversion has been enabled.
Jul 4 2019, 10:49 AM · gpgol
aheinecke created T4610: GpgOL: Option to leave signature when permanently decrypting.
Jul 4 2019, 9:25 AM · gpg4win, gpgol
aheinecke created T4609: GpgOL: Add "Save decrypted copy".
Jul 4 2019, 9:18 AM · Feature Request, gpgol
werner added a comment to T4607: enable `import-clean` by default.

Well, I mixed this up. On sending a a new key to the server export-minimal is used. Receiving a key uses keep-uid=REQUESTED and a 64k limit.

Jul 4 2019, 8:51 AM · Feature Request
werner triaged T4608: gpgv --enable-special-filenames documentation appears to claim that it works for keyrings, but it does not as Low priority.

Because we use dot-locking in GnuPG and copy-update-write for keyrings. Granted: For gpgv this is not required but the code is identical to the gpg code and adding new code does not make much sense. After all gpgv is a stripped down version of gpg I once wrote for Debian. I see your use case but tehre are other ways to do this and thus anthing here has low priority.

Jul 4 2019, 8:41 AM · gpgv, Bug Report
jaymzh added a comment to T4604: gpg 2.2 fails to download keys from a keyserver.

Aha, thank you. Sorry I saw the original post about the flood attacks (https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f) which said to change your keyserver and I did, but I hadn't realized there were such significant differences.

Jul 4 2019, 6:55 AM · Bug Report

Jul 3 2019

dkg added a comment to T4604: gpg 2.2 fails to download keys from a keyserver.

I think what you're missing is the keys.openpgp.org documentation which makes it clear that they will not distribute identity information (read: "User IDs") without an explicit confirmation by the operator of the e-mail address named in the User ID. They strip down the certificate pretty significantly before redistribution, especially if the e-mail address hasn't been confirmed directly with the operators of that server.

Jul 3 2019, 11:39 PM · Bug Report
jaymzh reopened T4604: gpg 2.2 fails to download keys from a keyserver as "Open".

I know the keyservers have been under attack, I'm using 'keys.openpgp.org' which is supposed to be more resilient to these, as I understand it?

Jul 3 2019, 10:47 PM · Bug Report
wiktor-k added a comment to T4108: Support for verifying OpenPGP standalone and timestamp signatures.

I'm also interested in fine details especially w.r.t. interfacing with GnuPG. I've seen multiple timestamping standards starting from RFC3161, to blockchains or secure time protocols even (ab)using Certificate Transparency logs and ideas on how to append the signature (timestamp flag vs unhashed notations) so I'll be eager to hear the details on the ML @stm!

Jul 3 2019, 10:31 PM · gnupg24, gnupg (gpg23), Feature Request
dkg added a comment to T4608: gpgv --enable-special-filenames documentation appears to claim that it works for keyrings, but it does not.

out of curiosity, why does gpgv need the name of the file?

Jul 3 2019, 9:30 PM · gpgv, Bug Report
dkg renamed T4608: gpgv --enable-special-filenames documentation appears to claim that it works for keyrings, but it does not from gpgv --enable-special-filenames does not appear to work for keyrings passed as file descriptors to gpgv --enable-special-filenames documentation appears to claim that it works for keyrings, but it does not.
Jul 3 2019, 9:17 PM · gpgv, Bug Report
dkg added a comment to T4607: enable `import-clean` by default.

in 2.2.16, anyway, gnupg does not appear to apply import-minimal for WKD.

Jul 3 2019, 9:10 PM · Feature Request
dkg reopened T4608: gpgv --enable-special-filenames documentation appears to claim that it works for keyrings, but it does not as "Open".

In that case, you can treat this ticket as a bug in the documentation, which still needs to be resolved.

Jul 3 2019, 9:07 PM · gpgv, Bug Report
werner closed T4608: gpgv --enable-special-filenames documentation appears to claim that it works for keyrings, but it does not as Invalid.

We need random access and the name of the file. Thus a file descriptor is not sufficient.

Jul 3 2019, 9:06 PM · gpgv, Bug Report
dkg created T4608: gpgv --enable-special-filenames documentation appears to claim that it works for keyrings, but it does not.
Jul 3 2019, 9:02 PM · gpgv, Bug Report
werner added a comment to T4108: Support for verifying OpenPGP standalone and timestamp signatures.

Indeed we are in urgent need for a timestamping service. I was already pondering with the idea to integrate existing X.509 stamping services into OpenPGP signatures. Please write to gnupg-devel if you want to reach a wider audience. Unfortunately I need to abstain for getting involved in your project; there are too many other things to do.

Jul 3 2019, 8:14 PM · gnupg24, gnupg (gpg23), Feature Request
werner added a comment to T4607: enable `import-clean` by default.

One reason is that you may want to look at older key- or self-signatures which import-clean removes. I can imgine use cases where this has been used for something. People are ofteh doing inetresting things with standard tools.

Jul 3 2019, 8:07 PM · Feature Request
stm added a comment to T4108: Support for verifying OpenPGP standalone and timestamp signatures.

Recently, I started a new project at savannah for developing free software and documentation in order to operate a Distributed OpenPGP Timestamping Service. Everyone is welcome to join.

Jul 3 2019, 7:55 PM · gnupg24, gnupg (gpg23), Feature Request
wiktor-k added a comment to T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver.

@dkg I believe @aheinecke gave the GpgOL description just as an example of why WKD-first retrieval would be beneficial (for details of that see https://wiki.gnupg.org/AutomatedEncryption#Trust_Levels) and I believe this ticket is a follow-up to my question on gnupg-devel ML: https://lists.gnupg.org/pipermail/gnupg-devel/2019-June/034372.html

Jul 3 2019, 7:26 PM · gnupg (gpg22), wkd
dkg added a comment to T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver.

auto-key-retrieve happens in the context of signature verification when the certificate is missing. If no signer User ID subpacket is present in the signature, then WKD simply won't work.

Jul 3 2019, 7:11 PM · gnupg (gpg22), wkd