In T5151#139353, @nmset wrote:Using Context::setExpire(), expiry time of keys and subkeys can be changed in a predictable way, with good and bad passphrase (fails with error of course).
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Nov 23 2020
Nov 23 2020
Thanks.
Before step 2.d you should stop gpg-agent and other daemon
In T5151#139330, @ikloecker wrote:I highly recommend to use the new ChangeExpiryJob instead of the fragile (and apparently buggy) edit interactor.
• werner added a comment to T5076: [solved] gpg-agent respawn another process randomly and causes cached passphrase check failed / expired.
If you want to debug this, I suggest to use a logging socket. Put into all gpg-agent.conf files these lines:
In T5151#139332, @ikloecker wrote:Can you try if using the overload
As for renaming "Change Reset Code" to "Set Reset Code", what about "Change PIN" and "Change Admin PIN"? Should they also be renamed? If not, why not? Is there no default reset code? Is there a way to find out whether the reset code has already been set (in which case "change" would be more appropriate than "set")?
You write
This does not work.
Can you be more specific? What doesn't work? Which OS, which version of Kleopatra, what smartcard are you using?
Can you try if using the overload
Error Context::exportPublicKeys(const char *patterns[], Data &keyData, unsigned int flags)
which takes an array of patterns instead of a single pattern also crashes?
Unless you need some special features of GpgSetExpiryTimeEditInteractor or you have to support gpgme <1.15, I highly recommend to use the new ChangeExpiryJob instead of the fragile (and apparently buggy) edit interactor.
Nov 22 2020
Nov 22 2020
Nov 21 2020
Nov 21 2020
Nov 20 2020
Nov 20 2020
• gniibe added a comment to T5039: 2.2.22 regression: Nitrokey Pro 2 is no longer recognized automatically, requires --card-status.
Yes, it is due to a backport from master: rG1049f06c6d2e: scd:openpgp: Allow keygrip to be used to reference a key
Fixed in rG84020385be19: scd:openpgp: Public keys should be available for check_keyidstr..
Nov 19 2020
Nov 19 2020
I looked the gpg-agent.log, it indeed suggested the problem fixed in rG61aea64b3c17: scd: Fix the use case of verify_chv2 by CHECKPIN., which is included in 2.2.24.
Building and installing 2.2.24 at least made it not crash, the very least it's an improvement in that respect.
You have multiple readers and using PC/SC by specifying reader-port.
We fixed in master by T4998: scdaemon: PC/SC "No such device" without reader-port, and I didn't know similar fixes should be backported.
I will soon.
• werner triaged T5143: YubiKey 5 Nano GPG --card-edit verify command causes a segfault as High priority.
mgorny reopened T5039: 2.2.22 regression: Nitrokey Pro 2 is no longer recognized automatically, requires --card-status as "Open".
The problem seems to have returned in 2.2.24.
• gniibe reopened T5065: scdaemon doesn't detect card removal after boot/resume (Identiv SPR332v2) as "Testing".
• gniibe added a comment to T5065: scdaemon doesn't detect card removal after boot/resume (Identiv SPR332v2).
Thanks again for your report.
turkja added a comment to T5065: scdaemon doesn't detect card removal after boot/resume (Identiv SPR332v2).
I'm still having problems with 2.2.24. Now the card removal is detected correctly, but the initialization fails.
Nov 18 2020
Nov 18 2020
We had some card related regressions in 2.2.23. I would appreciate if you could first test again with 2.2.24 which was released yesterday.
• ikloecker lowered the priority of T5130: Kleopatra: Generating OpenPGP keys on Yubikey (with PIV enabled) fails with "General error" from High to Normal.
Resetting priority to normal for re-evaluation
• ikloecker reopened T5130: Kleopatra: Generating OpenPGP keys on Yubikey (with PIV enabled) fails with "General error" as "Open".
Re-opening. Now trying to generate new keys fails with a "Wrong card" error.
• ikloecker closed T5142: Qt gpgme's sign_key function should not set a remark with an empty string as Resolved.
Fixed. Workaround for gpgme 1.15 (and earlier) implemented in Kleopatra: Do not call setRemark() with an empty QString.
• ikloecker added a comment to T5142: Qt gpgme's sign_key function should not set a remark with an empty string.
I think Kleopatra is affected. It calls setRemark() on the job unconditionally with the text from the widget, and I'm pretty sure that this text is empty but not a null QString, if the user doesn't enter a remark.
• werner assigned T5142: Qt gpgme's sign_key function should not set a remark with an empty string to • ikloecker.
Ingo, can you please check? I guess we are not affected because Kleo already checks for an empty string. But dkg's suggestion sounds good to me.
• gniibe closed T5086: GnuPG fails to generate keys on-card in versions 2.2.22 and 2.2.23 as Resolved.
Nov 17 2020
Nov 17 2020
Note that you actually run 30 independent processes with gpg 1.4 but with gpg-agent there is just one process to handle the private key operations (decrypt). To utilize more cores you need to setup several GNUPGHOME with the same private keys.
I think that it is not gpg-agent but pinentry which causes millions of futex syscall errors.
For interactive use case, pinentry may be the point of contention.
I might be wrong if your key is not protected by passphrase.
Nov 16 2020
Nov 16 2020
22h49 added a comment to T5134: GPG - will not sign nor verify the pin when using a contactless reader.
Indeed, I think this might be a driver problem.
I don't see any problems in your PC/SC log, at all. If it is the failure of vendor's driver, we actually have no way to fix.
Nov 14 2020
Nov 14 2020
22h49 added a comment to T5134: GPG - will not sign nor verify the pin when using a contactless reader.
I have been able to resolve the problem by writing:
Nov 13 2020
Nov 13 2020
• gniibe closed T4688: `make distcheck` fails trying to make `rst/gpgme-python-howto.rst` as Resolved.
Nov 12 2020
Nov 12 2020
Sorry, I do not understand what kind of bug you are trying to report. it seems that you have a question about some software and you assume this is gpg4win. "invalid pocket" is however not an error any of our software emits.
• ikloecker closed T5130: Kleopatra: Generating OpenPGP keys on Yubikey (with PIV enabled) fails with "General error" as Resolved.
Note that Kleopatra verifies the currently active card before starting the generation of new keys. This prevents the destruction of keys on the wrong card.
I am trying to solve this problem since one month
• gniibe added a comment to T4800: python-gpgme signature revokation assertion error: `gpg->cmd.code' failed.
Thanks for your report, but your excerpt is irrelevant.
Push the change.
Thank you.
Nov 11 2020
Nov 11 2020
• werner closed T4789: Gpg4win-3.1.12, a subtask of T4819: Kleopatra / Win 10 - Sign and Encrypt window doesn't show up, as Resolved.
• werner closed T4789: Gpg4win-3.1.12, a subtask of T4890: print preview tries to use wrong key for decryption, as Resolved.
• werner closed T4789: Gpg4win-3.1.12, a subtask of T4969: Kleopatra: Disable rich text in notepad widget, as Resolved.
• werner closed T4789: Gpg4win-3.1.12, a subtask of T4987: GpgOL breaks URLs by inserting a line break after column 71 in text-only messages, as Resolved.
• ikloecker claimed T5130: Kleopatra: Generating OpenPGP keys on Yubikey (with PIV enabled) fails with "General error".
This is a regression of the multi-card, multi-app support in Kleopatra, i.e. T5066. Generating OpenPGP keys fails because the PIV app is active on the card and the code does not switch to the OpenPGP app. (It also does not switch to the correct card if multiple cards are inserted which could result in the destruction of keys on the wrong card.)
Nov 10 2020
Nov 10 2020
Works for me. Also with a gpg.conf-2 file. Do you use a /etc/gnupg/gpg.conf ?
• gniibe changed the status of T5086: GnuPG fails to generate keys on-card in versions 2.2.22 and 2.2.23 from Open to Testing.
For 2.2, rG61aea64b3c17: scd: Fix the use case of verify_chv2 by CHECKPIN. fixed this problem.
• gniibe added a comment to T4667: "gpg: deleting secret key failed: No pinentry" when in --batch mode with --pinentry=loopback.
Fixed in master.
(confirmation interaction is also fixed.)
• gniibe changed the status of T4998: scdaemon: PC/SC "No such device" without reader-port from Open to Testing.
Need another patch to export it:
diff --git a/g10/export.c b/g10/export.c index 8dd0b07d7..339424e19 100644 --- a/g10/export.c +++ b/g10/export.c @@ -627,6 +627,57 @@ canon_pk_algo (enum gcry_pk_algos algo) }
It's fixed in master by T3465: --pinentry-mode loopback with --delete-secret-keys, with new confirmation interaction.
For 2.2, you can use --batch and --yes, see T4667: "gpg: deleting secret key failed: No pinentry" when in --batch mode with --pinentry=loopback.
• gniibe raised the priority of T5018: Export keys to secure card failure: gpg: KEYTOCARD failed: Unusable secret key from Low to Normal.
• gniibe triaged T5018: Export keys to secure card failure: gpg: KEYTOCARD failed: Unusable secret key as Low priority.
Did you remove .gnupg entirely? Secret keys are stored in .gnupg/private-keys-v1.d. If it remained, you didn't import your secret keys.
If it was the case, I'd like to merge this report to T3391: cannot import subkey that was once marked to be on a card.
Nov 9 2020
Nov 9 2020
• werner added a comment to T4893: "Note: signatures using the MD5 algorithm are rejected" is emitted despite --quiet.
I reconsidered this. Suppressing such messages with --quiet is oka and will be in 2.2.24.
The "Reliability History" says (in Chinese):
异常代码: c0000005 异常偏移: 0002b6c0
The error code c0000005 is something like SEGV on POSIX, I guess.
It occurred at the address 0002b6c0.
Nov 5 2020
Nov 5 2020
• gniibe changed the status of T5121: a race condition between intr_cb call back and libusb_free_transfer in do_close_reader, a subtask of T5065: scdaemon doesn't detect card removal after boot/resume (Identiv SPR332v2), from Open to Testing.
Nov 4 2020
Nov 4 2020
I'm pretty sure what happens, but apparently I haven't been able to explain it clear enough. To reproduce you can do like this:
- On an old machine having GnuPG version 1, e.g. Red Hat Enterprise 5:
- gpg --homedir $PWD/homedir --gen-key
- tar cf homedir.tar homedir/pubring.gpg homedir/secring.gpg
- On a more modern machine having GnuPG version 2, e.g. Red Hat Enterprise 8:
- tar xf homedir.tar
- touch apa bepa
- gpg --homedir $PWD/homedir --sign apa # Does the migration, and signs "apa"
- mv homedir homedir.moved # Don't remove, just move
- tar xf homedir.tar
- gpg --homedir $PWD/homedir --sign bepa # This will fail as explaine in point 5 of the initial description
The inotify thing is only used to detect a deleted homedir and stop the agent. AFAIU your problem is that a migration is triggered again. The migration status is a file ~/.gnupg/.gpg-v21-migrated - are you sure that you have extracted it again?
Applying following SOS-handling, the key can be handled.
diff --git a/g10/parse-packet.c b/g10/parse-packet.c index 9cb254e24..be7fc6d67 100644 --- a/g10/parse-packet.c +++ b/g10/parse-packet.c @@ -188,6 +188,76 @@ mpi_read (iobuf_t inp, unsigned int *ret_nread, int secure) }
Note that there is no problem for encrypted key, because it is handled by opaque MPI.
• gniibe changed the status of T5116: GnuPG master shows an error when importing Ed25519 keys generated from Open to Testing.
• gniibe changed the status of T5116: GnuPG master shows an error when importing Ed25519 keys generated, a subtask of T5114: GnuPG fails to import back generated and exported EdDSA secret key., from Open to Testing.
Nov 3 2020
Nov 3 2020
• werner renamed T5119: TOFU messages are not completely and correctly localized to German from TOFO messages are not completely and correctly localized to German to TOFU messages are not completely and correctly localized to German.
• werner triaged T5119: TOFU messages are not completely and correctly localized to German as Low priority.
The whole TOFU stuff hash not yet been fully translated because there are conceptional problems with the way the code works.