The first, I guess. The problem is that you are technical capable of _decryption_ but gpg does not allow this because for some reasons the key is arbitrary limited to signing. A warning message should be printed in thus a case but decryption should succeed.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Jul 9 2020
Or this (don't allow anon keys for different usage):
diff --git a/g10/pubkey-enc.c b/g10/pubkey-enc.c index 14cbdbb0f..b8d4059cd 100644 --- a/g10/pubkey-enc.c +++ b/g10/pubkey-enc.c @@ -91,9 +91,6 @@ get_session_key (ctrl_t ctrl, struct pubkey_enc_list *list, DEK *dek) if (err) break;
Do you mean something like this?
It's in master (to be gnupg 2.3).
Enjoy.
Jul 8 2020
The qualitybar has now been removed from 2.2 and master.
Jul 4 2020
Jun 9 2020
Shall we backport this to 2.2 which is our LTS release?
Jun 8 2020
With the recent change the --sender option has an effect on the selection of the User ID used for the key validity check and the TRUST_ status lines:
Jun 4 2020
Jun 3 2020
We already have the option --sender which does what @mgorny requests but only in the TOFU case. I need to revisit the system to see whether we can extend it to WoT and direct key signatures.
May 29 2020
May 27 2020
GnuTLS seems to have some CMS support; see https://gitlab.com/gnutls/gnutls/-/issues/227 .
May 20 2020
I had assumed that GnuPG prioritized the safety of its users over strict adherence to a particular view of a cryptographic protocol
May 19 2020
See rG6dc3846d78192e393be73c16c72750734a9174d1 for examples on how to create a cert
May 14 2020
May 11 2020
Signing using ECDSA does now also work. Tested with 3 in disk keys: nistp256, nistp384 and RSA and verified using gpgsm and Governikus Signer.
May 8 2020
Apr 27 2020
Done for master
Apr 21 2020
Apr 16 2020
We do this now always if --auto-issuer-key-retrieve is set. Also backported to 2.2
I back ported @jukivili's changes back to 2.2 which gives a CFB decryption speedup of 25%. I also implemented AEAD _decryption_ in 2.2 to be prepared for mixed 2.2 and 2.3 version use. And AEAD is really fast compared to CFB. Willbe in 2.2.21.
Nope, I was wrong.
Apr 15 2020
Thanks for testing. It's actually an error of generating _unicode_mapping.c, which utf8.c includes.
Apr 14 2020
Thanks for reporting; the code is really new and not yet fully tested.
Apr 8 2020
It seems that the reference to PKCS#5 is correct. It is an issue of how to describe the case of more than 8-byte padding in OpenPGP.
Your example data is malformed, I suppose.
Apr 7 2020
Apr 6 2020
I also don't think that key size obfuscation is useful, after all the preferences of the key demand a certain key size.
Mar 31 2020
Mar 29 2020
Thanks for following up!
No, we always stated that the user id is a mandatory part of OpenPGP keyblocks and that non-compliant keyblocks are rejected. The only exception we made are for revocation signatures where we allow a standalone packet. That exception is done to allow typing in a printed out revocation signature.
To be clear: marking this ticket wontfix means (among other things) that it is the GnuPG project's upstream position that:
With OpenPGP we made user ids mandatory to avoid problems we had with PGP2. I see no reason to revert this.
Mar 28 2020
Nine months have passed since the patches for this problem have been available.
Mar 18 2020
Okay, in 2.2 the output now looks like this:
Won't happen for 2.2
Given that we may move to yet another format in 2.3 I now doubt that we should add such a feature to 2.2.
Mar 12 2020
For reference, here's an error message from openssl smime when it is trying to verify an e-mail message with no embedded certificate at all (despite it knowing about the relevant certificate):
There are likely some bugs in the new code and I also want to do some improvements; see rGb4f1159a5bd7. But things should basically work as before and thus I set this again to testing
Mar 11 2020
Feb 28 2020
i'd be unlikely to ship anything as /etc/gnupg/gpg.conf or /etc/gnupg/dirmngr.conf just because of the mess that admins have to deal with when shipped config files change.
Arggh, gpgconf uses its own option parser so adding the global config file there will require some extra work.
@dkg You might find this interesting. Debian could do stuff in /etc/gnupg/gpg.conf or /etc/gnupg/dirmngr.conf without patching GnuPG to change some defaults.
Feb 27 2020
All done in master with the latest libgpg-error (see T4859). There is always a global configure file in /etc/gnupg (or whatever "gpgconf --list-dirs sysconfdir" prints). The name of the configure file is the same as the user config file (gpg.conf, gpgsm.conf, gpg-agent.conf, ...) but for gpg.conf no versioned config names are used.
Feb 21 2020
Okay, we now have global conf files in master. The extra flags to ignore or force certain options will be added to libgpg-error.
Dec 20 2019
It has now been over 6 months since the patches were available to fix this problem and they have not been adopted upstream.
Dec 17 2019
Dec 12 2019
Dec 10 2019
That sounds like you might have a different issue in mind?
Figuring out the matching user id for a new key signature. Right, --import-options repair-key is the the default and does the same. However, it was also the major cause for the recent trouble with the keyservers because it tried to verify all signatures. repair-keys was made the default (T2236) because it seemed to be nearly for free - which was a false assumption. We should not use this option by default and only consider properly placed signathures as valid. This of course also means that a userid is required.
Dec 9 2019
@werner, i don't understand your last remark. what "required computations" do you think the proposed patches are "moving" from the server to the client?
Dec 8 2019
I see no reason to move required computations from the server to the client.
@werner Could you please give an update on this? Is there any blocker? Is something missing, which prevents merging (and releasing) this?
Dec 6 2019
In 2.2.18, this fix is not included. (partial fix was reverted)
Dec 4 2019
That is actually a GnuPG thing. We originally did it this way to help people remember their passphrase before they start using the key. I agree it is annoying and I would like to remove it too. At the same time we should really think about making no-passphrase the default and require it only with certain compliance settings.
Nov 18 2019
it's been almost a quarter year since my last nudge on this supplied patch. It's not clear to me why it hasn't been merged in master. I'm trying to not be a nag, but:
Nov 14 2019
I thought I close this after the release of 2.2.18.
Anway, it's done, so, closing.
Nov 12 2019
Is this resolved?
Nov 11 2019
Nov 7 2019
Oct 25 2019
Oct 19 2019
On July, 19th, @werner wrote:
You need to wait a bit more.
Oct 18 2019
Or... it could be a feature, not bug, so that failure of -e -r someone can be examined by --locate-keys someone.
Let me clarify the point.
Oct 17 2019
I think that we should apply further change:
diff --git a/g10/getkey.c b/g10/getkey.c index 077209415..1c337149c 100644 --- a/g10/getkey.c +++ b/g10/getkey.c @@ -1369,7 +1369,7 @@ get_best_pubkey_byname (ctrl_t ctrl, enum get_pubkey_modes mode, *retctx = NULL;
I found more wrong cases of get_best_pubkey_byname.
For ranking results,
(1) It may return non-encryption primary key as the most relevant key, when its validity is higher.
(2) It may not select encryption primary key even if its creation time is newer.
Oct 16 2019
I also think this makes the most sense.
In my opinion, --locate-key should locate encryption key.
Oct 15 2019
There are some problems with the definition of --locate-key. Further discussion required.
Oct 14 2019
@werner Yes, that sounds great, and would help already a lot, but extending it for card keys would be optimal. Thanks for your work.
In master (to be 2.3) you can add a Label: line into the sub key file of on-disk keys. I use this for quite some time now to show me alabel for my on-disk ssh keys so that I known which one was requested. We can and should extend this to card keys.
Oct 9 2019
I believe that constraint of ret_keyblock != NULL is OK.
Pushing the fix.
Perhaps, backport to 2.2 should be done, too.
Oct 7 2019
If we can assume ret_keyblock != NULL (it is, in current implementation), it can be as simple as:
diff --git a/g10/getkey.c b/g10/getkey.c index 6802026f6..27bbd354c 100644 --- a/g10/getkey.c +++ b/g10/getkey.c @@ -1354,6 +1354,8 @@ get_best_pubkey_byname (ctrl_t ctrl, enum get_pubkey_modes mode, int is_mbox = is_valid_mailbox (name); int wkd_tried = 0;
Oct 4 2019
diff --git a/g10/getkey.c b/g10/getkey.c index de5024198..051b21203 100644 --- a/g10/getkey.c +++ b/g10/getkey.c @@ -1272,6 +1272,48 @@ only_expired_enc_subkeys (kbnode_t keyblock) return any? 1 : 0; }