Page MenuHome GnuPG
Feed Advanced Search

Oct 19 2022

gniibe triaged T6249: gpgrt: spawn functions as Normal priority.
Oct 19 2022, 3:12 AM · gnupg, libassuan, gpgrt

Oct 18 2022

gniibe added a comment to T6239: gnugp 2.3.8 fails to build with --disable-ldap.

Applied also in 2.2 branch.

Oct 18 2022, 3:34 AM · gnupg, Bug Report

Oct 15 2022

carlocab added a comment to T6239: gnugp 2.3.8 fails to build with --disable-ldap.

This also affects 2.2.40. Will the fix be backported there? Thanks.

Oct 15 2022, 8:07 AM · gnupg, Bug Report

Oct 14 2022

gniibe claimed T6239: gnugp 2.3.8 fails to build with --disable-ldap.

Thank you, confirmed. Pushing the fix.

Oct 14 2022, 3:00 AM · gnupg, Bug Report
gniibe closed T6200: gnupg: GPG_ERR_SOURCE_DEFAULT should be defined as Resolved.
Oct 14 2022, 1:52 AM · gnupg

Oct 10 2022

werner closed T4482: GPG: Error on sign-key with compliance de-vs because of SHA-1 usage, a subtask of T6063: GnuPG: Ignore invalid hash algorithm preferences when signing & encrypting combined, as Resolved.
Oct 10 2022, 11:23 AM · gnupg, Restricted Project
werner closed T4482: GPG: Error on sign-key with compliance de-vs because of SHA-1 usage as Resolved.
Oct 10 2022, 11:23 AM · OpenPGP, gnupg
werner added a subtask for T6063: GnuPG: Ignore invalid hash algorithm preferences when signing & encrypting combined: T4482: GPG: Error on sign-key with compliance de-vs because of SHA-1 usage.
Oct 10 2022, 11:17 AM · gnupg, Restricted Project
werner added a parent task for T4482: GPG: Error on sign-key with compliance de-vs because of SHA-1 usage: T6063: GnuPG: Ignore invalid hash algorithm preferences when signing & encrypting combined.
Oct 10 2022, 11:17 AM · OpenPGP, gnupg

Oct 5 2022

werner closed T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired as Resolved.
Oct 5 2022, 4:20 PM · workaround, gnupg, Keyserver, Bug Report

Sep 29 2022

werner closed T6222: gpg --faked-system-time "$(date +%s)!" doesn't work as Wontfix.

This is a debug option; I see no use case for this.

Sep 29 2022, 8:22 AM · gnupg, Bug Report

Sep 28 2022

werner added a comment to T6220: gpg --full-generate-key does not use max RSA keysize when --enable-large-rsa is set.

Add --expert and use a decent version of GnuPG. 2.2 is our long term support branch and is not the current stable production version (which is 2.3.7)

Sep 28 2022, 10:23 AM · g10code (gnupg-2.2), gnupg, Bug Report
2l47 added a comment to T6220: gpg --full-generate-key does not use max RSA keysize when --enable-large-rsa is set.

Perhaps --full-generate-key should provide more algorithm choices, then, e.g. ed25519?

Sep 28 2022, 9:26 AM · g10code (gnupg-2.2), gnupg, Bug Report
werner closed T6220: gpg --full-generate-key does not use max RSA keysize when --enable-large-rsa is set as Wontfix.

Sorry, this as been discussed ad nausea. We try our best to help people not to use useless and harmful (e.g. performance of the WoT) algorithm choices.

Sep 28 2022, 9:17 AM · g10code (gnupg-2.2), gnupg, Bug Report

Sep 27 2022

2l47 added projects to T6220: gpg --full-generate-key does not use max RSA keysize when --enable-large-rsa is set: gnupg, g10code (gnupg-2.2).
Sep 27 2022, 11:40 PM · g10code (gnupg-2.2), gnupg, Bug Report

Sep 22 2022

luweitest added a comment to T6207: can't open gpg-agent.

Yes I do understand Windows XP is not supported. Just in case it is a minor problem that is easy to fix and will not cost you much effort. I'd like to add more information: I do not change
%LOCALAPPDATA%. There is no such environment variable. A similar environment variable is:
APPDATA=C:\Documents and Settings\myname\Application Data
I do set GNUPGHOME=E:\key, which I think should be allowed because I do not want my personal info be stored in system drive.

Sep 22 2022, 1:44 PM · Not A Bug, gnupg, Windows
werner added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

We should close this. The recent fix in 2.2 and the forthcoming 2.3 does everything we want. In the meantiime or if further problems turn up, --ignore-cert is a good workaround.

Sep 22 2022, 10:49 AM · workaround, gnupg, Keyserver, Bug Report
werner changed the status of T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired from Open to Testing.
Sep 22 2022, 10:46 AM · workaround, gnupg, Keyserver, Bug Report
werner removed a project from T6187: Kleopatra: Import of p12 file fails with "invalid crypto engine": Restricted Project.
Sep 22 2022, 10:41 AM · gpgme (gpgme 1.23.x), kleopatra, gnupg, Restricted Project
werner changed the status of T6200: gnupg: GPG_ERR_SOURCE_DEFAULT should be defined from Open to Testing.
Sep 22 2022, 10:40 AM · gnupg

Sep 21 2022

aheinecke closed T6207: can't open gpg-agent as Invalid.

This is a support question and not a bug. You should ask such questions on the channels for Gpg4win, which does the Community support for GnuPG on Windows: https://www.gpg4win.org/community.html

Sep 21 2022, 9:14 PM · Not A Bug, gnupg, Windows

Sep 20 2022

werner added a comment to T6207: can't open gpg-agent.

No, it does not matter.

Sep 20 2022, 9:51 AM · Not A Bug, gnupg, Windows

Sep 19 2022

luweitest added a comment to T6207: can't open gpg-agent.
E:\key>gpgconf --list-dirs
sysconfdir:C%3a\Documents and Settings\All Users\Application Data\GNU\etc\gnupg
bindir:C%3a\Program Files\gnupg\bin
libexecdir:C%3a\Program Files\gnupg\bin
libdir:C%3a\Program Files\gnupg\lib\gnupg
datadir:C%3a\Program Files\gnupg\share\gnupg
localedir:C%3a\Program Files\gnupg\share\locale
socketdir:E%3a\key
dirmngr-socket:E%3a\key\S.dirmngr
agent-ssh-socket:E%3a\key\S.gpg-agent.ssh
agent-extra-socket:E%3a\key\S.gpg-agent.extra
agent-browser-socket:E%3a\key\S.gpg-agent.browser
agent-socket:E%3a\key\S.gpg-agent
homedir:E%3a\key

The "sysconfdir" "C:\Documents and Settings\All Users\Application Data\GNU" does not exist actually. Does it matter?

Sep 19 2022, 5:12 AM · Not A Bug, gnupg, Windows

Sep 16 2022

werner added a comment to T4436: gpgsm refuses to encrypt with failure to check CRL.

I just fixed a bug related to the DP. That might be related. See rG0c8299e2b56ef2e1

Sep 16 2022, 4:54 PM · gnupg, S/MIME
werner closed T1141: dirmngr does not try all CRL DPs if first fetchable CRL is too old as Resolved.

That particular bug seems to have been solved a long time ago. I stumbled upon up while fixing a DP bug today.

Sep 16 2022, 4:43 PM · gnupg, Bug Report, dirmngr
werner added projects to T6207: can't open gpg-agent: Windows, gnupg.
Sep 16 2022, 10:40 AM · Not A Bug, gnupg, Windows

Sep 15 2022

aheinecke added a comment to T6195: gpg: New key has unknown trust after generation.

To clarify that I meant that the underlying problem is our current keylisting speed in Kleopatra I have opened T6206.

Sep 15 2022, 4:35 PM · Not A Bug, gnupg
aheinecke triaged T6206: Kleopatra: Listing certificates initially just takes too long. as Normal priority.
Sep 15 2022, 4:34 PM · S/MIME, gnupg, kleopatra
aheinecke added a comment to T6195: gpg: New key has unknown trust after generation.

keyboxd has nothing to do with this, it merely makes the lookup of keys a bit faster. The computation of the WoT itself takes long and there is no shortcut for it. Fortunately most users don't have a deeply meshed WoT with dedicated revokers etc., thus for them things are fast in the standard configuration.

Sep 15 2022, 4:17 PM · Not A Bug, gnupg

Sep 14 2022

werner added a comment to T6195: gpg: New key has unknown trust after generation.

keyboxd has nothing to do with this, it merely makes the lookup of keys a bit faster. The computation of the WoT itself takes long and there is no shortcut for it. Fortunately most users don't have a deeply meshed WoT with dedicated revokers etc., thus for them things are fast in the standard configuration.

Sep 14 2022, 4:23 PM · Not A Bug, gnupg
aheinecke closed T6195: gpg: New key has unknown trust after generation as Resolved.

I agree. We have to get rid of auto check trustdb and such stuff. I always found that impossible to program around because it either takes a long time (check-trustdb) or it might return invalid results (no check).
The solution for this is keyboxd.

Sep 14 2022, 12:27 PM · Not A Bug, gnupg
werner placed T6195: gpg: New key has unknown trust after generation up for grabs.

If you run gpg --export-ownertrust you will notice that the trust has been set to ultimate (value is 6). However, due to the no-auto-check-trustdb in your gpg.conf that will valeu will only be shown after running gpg --check-trustdb. The value shown in the key listing is the computed value and the computation is done by --check-trustdb. I don't see a bug here.

Sep 14 2022, 11:06 AM · Not A Bug, gnupg
gniibe claimed T6200: gnupg: GPG_ERR_SOURCE_DEFAULT should be defined.

Pushed changes.

Sep 14 2022, 10:01 AM · gnupg

Sep 13 2022

ikloecker changed the status of T6187: Kleopatra: Import of p12 file fails with "invalid crypto engine" from Open to Testing.

The export/backup of the secret part of S/MIME certificates has been fixed with T6189: Secret key backup of S/MIME certificate creates bad result. An exported certificate should now be imported without problems.

Sep 13 2022, 9:10 AM · gpgme (gpgme 1.23.x), kleopatra, gnupg, Restricted Project

Sep 12 2022

ikloecker added a comment to T6187: Kleopatra: Import of p12 file fails with "invalid crypto engine".

Now "BER error" is reported, if the user tries to import a .p8 certificate. (The certificate exported by Kleopatra wasn't stored as PKCS#12, but presumably as PKCS#8 which gpgsm cannot import. See T6189: Secret key backup of S/MIME certificate creates bad result.)

Sep 12 2022, 9:39 AM · gpgme (gpgme 1.23.x), kleopatra, gnupg, Restricted Project
werner claimed T6195: gpg: New key has unknown trust after generation.
Sep 12 2022, 8:26 AM · Not A Bug, gnupg

Sep 9 2022

aheinecke closed T6190: GPGSM: Import / Export of raw and p8 certs / containers broken as Invalid.
--import [files]
       Import  the certificates from the PEM or binary encoded files as well as from signed-only messages.
       This command may also be used to import a secret key from a PKCS#12 file.
Sep 9 2022, 4:17 PM · gnupg, S/MIME

Sep 8 2022

ikloecker created T6195: gpg: New key has unknown trust after generation.
Sep 8 2022, 10:26 AM · Not A Bug, gnupg

Sep 7 2022

werner added a comment to T6187: Kleopatra: Import of p12 file fails with "invalid crypto engine".

BTW, gnupg/doc/DETAILS tells that the fingerprint is optional:

Sep 7 2022, 4:46 AM · gpgme (gpgme 1.23.x), kleopatra, gnupg, Restricted Project
gniibe added a comment to T6187: Kleopatra: Import of p12 file fails with "invalid crypto engine".

Pushed the fix for GPG_ERR_INV_ENGINE.

Sep 7 2022, 4:29 AM · gpgme (gpgme 1.23.x), kleopatra, gnupg, Restricted Project
gniibe added a comment to T6187: Kleopatra: Import of p12 file fails with "invalid crypto engine".

gpgsm may emit S IMPORT_PROBLEM 1 (with no fingerprint information) when it cannot find valid fingerprint.
I think that this case should be handled correctly by GPGME, not returning GPG_ERR_INV_ENGINE.

Sep 7 2022, 4:27 AM · gpgme (gpgme 1.23.x), kleopatra, gnupg, Restricted Project

Sep 6 2022

aheinecke lowered the priority of T6190: GPGSM: Import / Export of raw and p8 certs / containers broken from Normal to Low.
Sep 6 2022, 1:19 PM · gnupg, S/MIME
aheinecke renamed T6190: GPGSM: Import / Export of raw and p8 certs / containers broken from GPGSM: Import / Epxort of raw and p8 certs / containers broken to GPGSM: Import / Export of raw and p8 certs / containers broken.
Sep 6 2022, 1:18 PM · gnupg, S/MIME
aheinecke closed T6189: Secret key backup of S/MIME certificate creates bad result, a subtask of T6190: GPGSM: Import / Export of raw and p8 certs / containers broken, as Resolved.
Sep 6 2022, 1:18 PM · gnupg, S/MIME
aheinecke added a subtask for T6190: GPGSM: Import / Export of raw and p8 certs / containers broken: T6189: Secret key backup of S/MIME certificate creates bad result.
Sep 6 2022, 1:18 PM · gnupg, S/MIME
aheinecke triaged T6190: GPGSM: Import / Export of raw and p8 certs / containers broken as Normal priority.
Sep 6 2022, 1:16 PM · gnupg, S/MIME
aheinecke added a comment to T6187: Kleopatra: Import of p12 file fails with "invalid crypto engine".

Ok. That is about the Invalid Crypto Engine. But this does not explain why a .p12 export via Kleopatra leads to this error when we export a valid certificate. The same thing I do with Kleopatra on the Command Line works:

Sep 6 2022, 11:42 AM · gpgme (gpgme 1.23.x), kleopatra, gnupg, Restricted Project
ikloecker placed T6187: Kleopatra: Import of p12 file fails with "invalid crypto engine" up for grabs.

The error is generated in parse_import in gpgme/src/import.c:

if (errno || args == tail || *tail != ' ')
  {
    /* The crypto backend does not behave.  */
    free (import);
    return trace_gpg_error (GPG_ERR_INV_ENGINE);
  }
Sep 6 2022, 11:34 AM · gpgme (gpgme 1.23.x), kleopatra, gnupg, Restricted Project
ikloecker claimed T6187: Kleopatra: Import of p12 file fails with "invalid crypto engine".
Sep 6 2022, 11:33 AM · gpgme (gpgme 1.23.x), kleopatra, gnupg, Restricted Project

Sep 3 2022

werner triaged T6185: `gpg2 --list-keys --with-colons > /dev/full` exits with status 0 as Low priority.

The more relavant error is that there is no status output on failure which is what gpgme uses (due to double forking).

Sep 3 2022, 1:08 PM · Bug Report, gnupg
werner closed T6186: gpgv does not support --exit-on-status-write-error as Resolved.

gpgv returns success iff the signature is valid. That is the whole purpose of this tool.

Sep 3 2022, 1:02 PM · gnupg
DemiMarie created T6186: gpgv does not support --exit-on-status-write-error.
Sep 3 2022, 7:33 AM · gnupg
DemiMarie created T6185: `gpg2 --list-keys --with-colons > /dev/full` exits with status 0.
Sep 3 2022, 6:45 AM · Bug Report, gnupg

Sep 2 2022

vitusb added projects to T6184: zlib version 1.2.12 actually used by GnuPG / Gpg4Win suffers from CVE-2022-37434 / 2 patches are available: gnupg, gpg4win.
Sep 2 2022, 6:44 PM · Not A Bug, kleopatra, gpg4win
ikloecker added a comment to T5620: GnuPG, pinentry: Passphrase pattern error / warning does not match new logic.

I have introduced this hint exactly because it's impossible to describe the rules automatically.

Sep 2 2022, 4:28 PM · gnupg, Restricted Project
ikloecker added a comment to T5620: GnuPG, pinentry: Passphrase pattern error / warning does not match new logic.

These hints are taken from the help.txt file.

Sep 2 2022, 4:28 PM · gnupg, Restricted Project
ikloecker added a comment to T5620: GnuPG, pinentry: Passphrase pattern error / warning does not match new logic.

gpg-agent passes to pinentry a short and a long hint for the passphrase constraints (see constraints-hint-* in pinentry.texi). If these hints are set, then pinentry shows them even before the user has started to enter a passphrase. The error message can then simply be "Read the hint, stupid!". Just kidding, of course.

Sep 2 2022, 4:27 PM · gnupg, Restricted Project
werner added a comment to T5542: w32: Values under HKLM ignored if HKCU entry for GnuPG exists.

Can you please give a more detailed example with regedit files to demonstrate that?

Sep 2 2022, 3:15 PM · Windows, gnupg, Restricted Project
werner lowered the priority of T5620: GnuPG, pinentry: Passphrase pattern error / warning does not match new logic from Normal to Low.

Can't we get them from the help.txt file? Putting a tooltip into the pattern file would be an option but needs substantial changes,

Sep 2 2022, 3:13 PM · gnupg, Restricted Project
werner closed T6173: Invalid signing-key when doing a signature-check of GnuPG installer-packages, signed by Werner Koch's signing-key in de-vs Mode (aka VS-NfD Mode) as Resolved.
Sep 2 2022, 3:06 PM · Restricted Project, workaround, gnupg
werner closed T6177: GnuPG mishandles write errors on status fd and stdout as Wontfix.
Sep 2 2022, 8:47 AM · gnupg
DemiMarie created T6177: GnuPG mishandles write errors on status fd and stdout.
Sep 2 2022, 2:15 AM · gnupg

Aug 31 2022

werner closed T6174: Option --require-comliance does not work in sign+encrypt mode as Resolved.
Aug 31 2022, 5:46 PM · Restricted Project, OpenPGP, Bug Report, gnupg
werner added a comment to T6173: Invalid signing-key when doing a signature-check of GnuPG installer-packages, signed by Werner Koch's signing-key in de-vs Mode (aka VS-NfD Mode).

Small correction: We don't have replicas of our code signing key. I mistook this with out Authenticode signing key.

Aug 31 2022, 4:55 PM · Restricted Project, workaround, gnupg

Aug 30 2022

werner triaged T6174: Option --require-comliance does not work in sign+encrypt mode as High priority.
Aug 30 2022, 6:53 PM · Restricted Project, OpenPGP, Bug Report, gnupg
werner edited projects for T6173: Invalid signing-key when doing a signature-check of GnuPG installer-packages, signed by Werner Koch's signing-key in de-vs Mode (aka VS-NfD Mode), added: workaround, Restricted Project; removed gpg4win.

In general I use my standard ed25519 signing token for all software. However, GnuPG VS-Desktop is signed using a Brainpool key named GnuPG.com (stored on a smartcard with 2 replicas) for the simple reason that it does not raise questions when ppl update their GnuPG VS-Desktop and run into a non-compliant key.

Aug 30 2022, 5:19 PM · Restricted Project, workaround, gnupg
vitusb triaged T6173: Invalid signing-key when doing a signature-check of GnuPG installer-packages, signed by Werner Koch's signing-key in de-vs Mode (aka VS-NfD Mode) as Normal priority.
Aug 30 2022, 2:57 PM · Restricted Project, workaround, gnupg
gniibe added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

In the situation of a certificate about to be expired in the cache:

Aug 30 2022, 8:31 AM · workaround, gnupg, Keyserver, Bug Report
dkg added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

Thanks, @gniibe -- i agree that this change to put_cert should be helpful, when encountering a certificate that is already invalid.

Aug 30 2022, 8:04 AM · workaround, gnupg, Keyserver, Bug Report

Aug 26 2022

gniibe added a parent task for T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired: T5882: Cross signing certificate in X.509 support.
Aug 26 2022, 7:41 AM · workaround, gnupg, Keyserver, Bug Report
gniibe added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

rejecting an intermediate certificate too.

Aug 26 2022, 2:42 AM · workaround, gnupg, Keyserver, Bug Report
gniibe added a project to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired: Restricted Project.

Pushed the change of mine to master, since I can confirm that it results validate_cert_chain working better, because of put_cert's rejecting an intermediate certificate too.

Aug 26 2022, 2:37 AM · workaround, gnupg, Keyserver, Bug Report

Aug 25 2022

werner triaged T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired as Wishlist priority.
Aug 25 2022, 8:42 AM · workaround, gnupg, Keyserver, Bug Report
werner added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

@dkg: Thanks for the detailed description of the problem.

Aug 25 2022, 8:41 AM · workaround, gnupg, Keyserver, Bug Report
gniibe added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

Thank you @dkg for the analysis. Unfortunately, the certificate cache is hashed by SHA-1 FPR, so, I think that it is a bit difficult to implement moving certs "front" / "back".

Aug 25 2022, 6:11 AM · workaround, gnupg, Keyserver, Bug Report
dkg reopened T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired as "Open".

Thanks for the followup about R3, @mpilgrem! Looking at your logs in more details, and the source code for find_cert_bysubject in dirmngr/certcache.c, i think i see what the issue is. It's slightly more subtle than not terminating early if a known trusted root can validate a truncated chain.

Aug 25 2022, 12:46 AM · workaround, gnupg, Keyserver, Bug Report

Aug 24 2022

dkg added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

@mpilgrem, i'm glad that removing the DST Root CA X3 from your windows control panel worked for you, but it still doesn't seem to be a reasonable fix from a GnuPG user perspective

Aug 24 2022, 10:59 PM · workaround, gnupg, Keyserver, Bug Report
werner closed T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired as Resolved.
Aug 24 2022, 6:26 PM · workaround, gnupg, Keyserver, Bug Report
werner triaged T6152: Text for Import of S/MIME certificates as Normal priority.

The PKCS#12 import was a late add-on because I consider P#12 to be a nasty and insecure format. Unfortunately it survived and is now the mainly used interchange format. Eventually we need to improve things here. However, ppl should use smartcards for S/MIME.

Aug 24 2022, 6:25 PM · Feature Request, S/MIME, gnupg, Restricted Project
werner closed T6119: GnuPG: Compliance mode status omitted when decrypting combined symmetric and asymmetric data as Resolved.
Aug 24 2022, 5:23 PM · gnupg, Restricted Project
ikloecker added a project to T6152: Text for Import of S/MIME certificates: gnupg.
Aug 24 2022, 2:44 PM · Feature Request, S/MIME, gnupg, Restricted Project
werner added a comment to T6153: Kleopatra: No error when import from Keyserver fails.

If you use an IP address there is no server name and thus a) TLS can't check the name and b) virtual servers won't work. But as you stated this is not the problem: With rGb231959728a0056 (T2924) https is handled in another way than hkps.
Now, that change was only applied to KS_GET and not to KS_SEARCH. This is kind of correct but shows this surprising behaviour: For the preferred keyserver we really want to do a plain fetch and don't have all the hkp ip/name mapping we do.

Aug 24 2022, 2:23 PM · gnupg, kleopatra
aheinecke renamed T6153: Kleopatra: No error when import from Keyserver fails from Kleopatra: Import from keyserver does not work to Kleopatra: No error when import from Keyserver fails.
Aug 24 2022, 12:27 PM · gnupg, kleopatra
mpilgrem placed T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired up for grabs.
Aug 24 2022, 11:33 AM · workaround, gnupg, Keyserver, Bug Report
mpilgrem added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

Doing the same thing on my second PC, I can be more precise:

Aug 24 2022, 11:31 AM · workaround, gnupg, Keyserver, Bug Report
Valodim reopened T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired as "Open".

I'll reopen this ticket here, since the underlying issue is not quite resolved yet as @dkg helpfully outlined above.

Aug 24 2022, 9:41 AM · workaround, gnupg, Keyserver, Bug Report
mpilgrem closed T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired as Resolved.
Aug 24 2022, 2:04 AM · workaround, gnupg, Keyserver, Bug Report
mpilgrem added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

Thank you dkg. I am new to 'certificates' generally - and a little knowledge is a dangerous thing - but this is what I did:

Aug 24 2022, 1:47 AM · workaround, gnupg, Keyserver, Bug Report

Aug 23 2022

dkg added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

@mpilgrem: in the meantime, for connecting to keys.openpgp.org, which *has* cleaned up its certificate chain, you might also want to try killing your dirmngr process, and/or cleaning up the data in .gnupg/dirmngr-cache.d/.

Aug 23 2022, 9:24 PM · workaround, gnupg, Keyserver, Bug Report
dkg added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

Basically, the website in question (e.g. https://openpgpkey.gnupg.org/, which exhibits this problem) serves up three certificates:

Aug 23 2022, 9:17 PM · workaround, gnupg, Keyserver, Bug Report
mpilgrem added a project to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired: gnupg.
Aug 23 2022, 11:22 AM · workaround, gnupg, Keyserver, Bug Report

Aug 17 2022

aheinecke triaged T6138: gpgconf: List auto-key-import and include-key-block again as Normal priority.
Aug 17 2022, 11:53 AM · gnupg (gpg22), Restricted Project

Aug 15 2022

aheinecke moved T6119: GnuPG: Compliance mode status omitted when decrypting combined symmetric and asymmetric data from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Aug 15 2022, 2:02 PM · gnupg, Restricted Project

Aug 2 2022

werner added a project to T6119: GnuPG: Compliance mode status omitted when decrypting combined symmetric and asymmetric data: Restricted Project.

Fixed in 2.2 and master. Did a couple of manual tests using 2.2 on Linux. gpgsplit comes handy to add a couple more tag-3 packets (same algos or one patched to camellia for the negative test)

Aug 2 2022, 6:55 PM · gnupg, Restricted Project
werner added a comment to T6119: GnuPG: Compliance mode status omitted when decrypting combined symmetric and asymmetric data.

This also points out that the cipher algos and modes of the symmetric encrypted session key packets where never checked for compliance. We only checked the compliance of the bulk encryption cipher algo.

Aug 2 2022, 6:04 PM · gnupg, Restricted Project
aheinecke renamed T6119: GnuPG: Compliance mode status omitted when decrypting combined symmetric and asymmetric data from GnuPG: Complaince mode status omitted when decrypting combined symmetric and asymmetric data to GnuPG: Compliance mode status omitted when decrypting combined symmetric and asymmetric data.
Aug 2 2022, 4:41 PM · gnupg, Restricted Project
aheinecke added a comment to T6119: GnuPG: Compliance mode status omitted when decrypting combined symmetric and asymmetric data.

This was added in b03fab09e188f7bb10237d4f20455e4026737e4e

Aug 2 2022, 4:41 PM · gnupg, Restricted Project
aheinecke added a comment to T6119: GnuPG: Compliance mode status omitted when decrypting combined symmetric and asymmetric data.

Oh, there appears to be a reason for that. In line 699 of mainproc.c:

/* Symmetric encryption and asymmetric encryption voids compliance.  */
   && (c->symkeys != !!c->pkenc_list )
Aug 2 2022, 4:37 PM · gnupg, Restricted Project
aheinecke triaged T6119: GnuPG: Compliance mode status omitted when decrypting combined symmetric and asymmetric data as High priority.
Aug 2 2022, 4:30 PM · gnupg, Restricted Project

Aug 1 2022

werner closed T6098: Path traversal bug in gpg-wks-server as Resolved.
Aug 1 2022, 11:20 AM · wkd, gnupg