Okay, any thing else missing in nPth?
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Oct 20 2021
Oct 19 2021
Yeah, that will be helpful. Thanks. FWIW GnuPG 2.2.32 also lists PC/SC readers and not just the Linux default of CCID readers.
Version check is a data leak anyway and thus often disabled. Thus I don't see a risk for high value targets.
Just to be sure: Can you c+p the strings?
Hello @gniibe, you did the last work on nPTh. Would you be so kind and look into this?
Oct 18 2021
I would prefer to store legacy manuals on the web server. That is the easier solution.
Cool. Thanks.
( No need to certify the DSA things)
Oct 17 2021
Urgs, I already implemented this:
On macOS _NSGetExecutablePath could be used, but iiuc this requires linking against dyld. For other OSes we would also need more code. I doubt that this makes a lot of sense these days; but we should come up with a solution, even if that means we need an envvar to specify the location of that open gpgconf.ctl file.
Oct 16 2021
That looks like a support question. Please ask on a mailing list for help. Sorry, we can't do individual support here.
Oct 15 2021
Oct 14 2021
Even better. Thanks,
A way to get the output of "gpgconf --show-versions" might also be useful. Actually this command could be used to get the versions.
dots are not allowed in hostnames.
Oct 13 2021
We now require a way to get the actual image of a process. For macOS the BSD method is used and we obviously need to find another way for macOS.
Oct 12 2021
The new bugs have been fixed in 2.3.3; see T5565.
I won't anymore follow the path of first doing a test install. That is way to hairy in respect to "make distcheck". Change is already in my working directory.
Is that really required? Should we wait what the conlusion of the WG will be?
Bison used to be the de-facto standard yacc ;-)
On my new Windows 10 laptop I see a "Windows Hello for Business 1". Thus put everything with "Windows Hello" at the end of the list or skip unless a reader-port is set. IIRC there are device with "virtual" or "Virtual" in their name, they don't make sense for us either. I would also put devices with "SCM" or "Identiv" to the top of the list. In particular the substrings "SPR532" seems to identify the Identiv SPR332 which is what we use here and actualay a suggested reader for GnUPG VS-Desktop.
Oct 11 2021
Thanks for your findings. I recall that I read this in the announcement and cursed about this new tendency in GNU to break long standing APIs.
OpenPGP requires the P < U property and gpg does also. In some parts of the GnuPG we re-calculate the CRT parameters but not in these code paths. Right, a better error message would be appropriate. I'll turn this into a feature request.
Please ask on a mailing list etc. This is a bug tracker and pnly very few people are reading your report.
Oct 10 2021
As long as we can't replicate this, it does not make sense to keep this bug open. Please re-open it if you run into it again in a replicatable way.
Fixed in gpgex 1.0.8
Sure they don't get created - they are optional.
Thanks for the info.
Please use the --status-fd interface. This yields all the info you need. An exit code is not distinct enough for such purpose and you need to check the status lines in any case. For scripting gpgme-tool or gpgme-json might be useful as well because they do all the nitty-gritty parts of using gpg correctly
Oct 8 2021
Please hit "mostra de registro..." link in the blue box and show us its content (you may want to check that it does not show sensitive data)
Thanks for the log, however, I would suggest to use 3.1.16 and try again.
Do we really need to support DSA in FIPS mode? I mean standard DSA and not ECDSA.
There won't be any other 3.1 release - install GnuPG 2.2.32 on top of Gpg4win 3.1.16
Oct 7 2021
The LE web site has instruction on how to do this. However, it is complicated and depends on your system. The intermediate cert you listed is signed by the expired old root cert. If you remove this intermediate cert the other root cert will be found and we are done. The old LE certs had a 4 tier chain and the new one a 3 tier.
See https://dev.gnupg.org/rG341ab0123a8fa386565ecf13f6462a73a137e6a4 and https://letsencrypt.org/images/isrg-hierarchy.png
You should never ever downgrade. What is the problem with the new 2.2.32?
Oct 6 2021
I can't tell you why you get this error. However, since Oct 1 the keyserver access does in many case not work anymnore. This has been fixed in GnuPG 2.2.32, which I released a few minutes ago. You may install this on top of gpg4win 3.1.16.
Please update to 2.2.32 if you have problems with keyservers etc.
Backported to 2.2.32
We have been hit by the Let's Encrypt root cert switch. Thus a fixed version will soon be released. See T5639 for details of the problem.
You mean Gpg4win. The solution for Gpg4win 3.1.x is to install the latest GnUPG LTS installer for Windows on top of the latest Gpg4win version. See
https://lists.gnupg.org/pipermail/gnupg-announce/2021q3/000464.html
Noet that there will very soon be a 2.2.32 to fix a problem with Let's encrypt protected keyservers (T5639).
Thanks for the report. However, for 1.4 we will only apply important real world security patches. A brief review did not reveal any setious problems. Theoretical memory leaks will not be fixed. Note that your report also includes patches to parts of the code which are not anymore used.