Thanks for the report. Frankly the curses pinentries are not that widely tested.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Feb 23 2021
With 2.2 the second works if the first passphrase prompt was canceled. Test invocation:
Feb 22 2021
The configure run tells you what libraries are missing - none in your case. However, something is wrong with your development setup: The configure run detected libksba but cc compiler did not found it anymore. Check that you don't have any special envvars set etc. What is the actual compiler command which failed (make sure not to pass V=0 to make for this).
Feb 21 2021
Dear Werner,
Feb 20 2021
Feb 18 2021
I think you're saying "GnuPG will reject all subpackets marked with a critical flag unless there is a specific known semantic for *criticality* for that subpacket" Am I understanding that right? Is there a published list of criticality semantics that GnuPG is willing to accept? How do those semantics differ from standard semantics for the packet in question?
Feb 9 2021
Critical attributes are well known from CMS and X.509 and some have a history which can only be described as cargo cult. We should not allow them in the OpenPGP ecosystem without giving them a specific semantic aside from "we do something with it".
Done. FWIW. in 2.3 symcryptrun will be removed entirely.
RFC 4880 says:
Without any defined semantic it is not proper to ignore a critical bit. The software which created this keyblock seems to aim for incompatibility.
Thanks. Applied in rG4ca8ca5f7f58: po: Update Simplified Chinese Translation..
Feb 8 2021
Done all comments.
So 'out of core' actually means:
- run out of the memory resource, in other words, insufficient memory resources ?
Partly understand, so 'core' means 'core-memory', and for nowadays just 'memory'.
Here are my comments.
Feb 5 2021
Jan 27 2021
Jan 18 2021
Jan 12 2021
Jan 11 2021
Jan 8 2021
If you encounter this error message when running gpgconf --list-options gpg:
gpgconf: Option gpgconf-gpg.conf, needed by backend GnuPG, is not absolute
please simply create an empty file /etc/gnupg/gpg.conf or wherever your global configuration files are expected ("gpgconf --list-dirs sysconfdir" shows it). Bug fixed with commit rG9f37d3e6f307a9
Thanks for your answers. If you see another problem with kleopatra, please test the latest Kleopatra version which we will release the next days.
- I created another handful of key pairs and tested around. However, I could not recreate the problem now. I can store the secret key in Kleopatra, but the file differs from the backup key. It seems to be a stub indeed. And even if I want to perform an operation directly in Kleopatra, the smartcard is requested.
Jan 7 2021
Why do you think you can still export more than a stub key?
The listing shows that the private keys are stored on a card ("sec>", "ssb>"). Why do you think you can still export more than a stub key? If I export a test key (just the primary key in this case) and run "gpg --show-keys" on the exported file I get the expected "sec>" marker. Looking with --list-packets at it we get:
The exact commands given and the output. Adding -v is always helpful.
Hi, I'm the user that reported this bug.
On Thu, 7 Jan 2021 09:56, bernhard (Bernhard Reiter) said:
The user reported to
Please describe exactly what you did so that we can replicate this.
Jan 5 2021
Dec 23 2020
The patch will be in 2.2.27. Thanks.
Good catch. This is due to back porting a change from master. However the extra introduced conditional of
if (sig->version >=4)
will always evaluate to true. It is set a bit above and GnuPG does not handle public key packets with version 3 anymore. So this if can actually be removed. Thus no harm.
Already have set another, thanks gnibe! See ya!
Please change your passphrase for your card, BTW.
Good. The error recovery worked well.
Dec 22 2020
$ gpg --card-status $ gpgconf --kill scdaemon $ git fetch << (Used my PIN, I have reverted to my previous code other day, is not anymore 123456)
Dec 21 2020
Thank you for your testing.
May I ask more test, please?
Dec 20 2020
Hi, I have applied both patch and appears Yubikey is now working correct. I have uploaded the log here.
Dec 16 2020
In T5167#140229, @gbschenkel wrote:Nice, I gonna apply the patch and see if resolves for me!
Nice, I gonna apply the patch and see if resolves for me!
Dec 10 2020
With my Yubikey NEO, when I use OTP (touching the button to generate OTP output as key input), I observed "card eject" event:
2020-12-10 11:23:05 scdaemon[7254] DBG: ccid-driver: CCID: interrupt callback 0 (2) 2020-12-10 11:23:05 scdaemon[7254] DBG: ccid-driver: CCID: NotifySlotChange: 02 2020-12-10 11:23:05 scdaemon[7254] DBG: ccid-driver: CCID: card removed 2020-12-10 11:23:05 scdaemon[7254] DBG: enter: apdu_get_status: slot=0 hang=0 2020-12-10 11:23:05 scdaemon[7254] DBG: leave: apdu_get_status => sw=0x1000c status=0 2020-12-10 11:23:05 scdaemon[7254] DBG: Removal of a card: 0
Dec 9 2020
I checked the development log for the addition of:
libusb_clear_halt (handle->idev, handle->ep_intr);
In T5167#139966, @gbschenkel wrote:I have another yubikey neo but its clean. Can it help it?
I have another yubikey neo but its clean. Can it help it?
In T5167#139964, @gbschenkel wrote:Changing modes will I lose/change my OTP and FIDO codes?
Dec 8 2020
Changing modes will I lose/change my OTP and FIDO codes?
I would add "Provide a verbose message of why the key cannot be imported".
Following device (a bit older than yours, I guess) works well:
DBG: ccid-driver: idVendor: 1050 idProduct: 0112 bcdDevice: 0334
When I configure it to OTP+FIDO+CCID, it also works for me, it is:
DBG: ccid-driver: idVendor: 1050 idProduct: 0116 bcdDevice: 0334
Thanks a lot.
Let me explain the situation.
Dec 7 2020
Hi, I changed the PIN, killed the gpg-agent and scdaemon, edited the scdaemon.conf to include your instruction, after, I run the following commands:
Thank you for the information.
In the log, the driver detects removal of card wrongly.
That's the cause of this problem.
In T5167#139880, @gniibe wrote:Please show us the output of gpg --card-status, and your configuration if you have something special. Are you using Yubikey also for gpg's signing, or is it only for SSH?
Please show us the output of gpg --card-status, and your configuration if you have something special. Are you using Yubikey also for gpg's signing, or is it only for SSH?
Dec 6 2020
There is no caching for smardcard PINs. Once a key (or group of keys) on a hard has been used (i.e. PIN entered). that key can be used as long as the card has not been reset or powered-down. No rule without exception: Some cards may require that a PIN entry is required for each crypto operation. For example the OpenPGP card (which is implemented on a Yubikey) does this for the signing key but not for the authentication (ssh) key. To disable this for the signing key you use the "forcesig" command of gpg --card-edit.
Dec 3 2020
I was wrong. Patch is being updated...
Dec 2 2020
In T5163#139750, @werner wrote:You better wipe ecc_d_padded or use xtrymalloc_secure.
You better wipe ecc_d_padded or use xtrymalloc_secure.
Here is a patch:
In future, please try to minimize your log. Your log actually includes information of the session of keytocard before setting key attributes correctly.
Dec 1 2020
Nov 26 2020
Nov 24 2020
Stable now and works as expected. Thank you!
Nov 23 2020
Killing the daemon using gpgconf is fine if you are aware you need to do it. We weren't, and I suspect few other users would be either.