In T6209#163363, @werner wrote:Also the use of the standard-resolver is not a good idea because it does not work with Tor.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed All Stories
All Stories
All Stories
Sep 16 2022
Sep 16 2022
vendion added a comment to T6209: GnuPG unable to interact with any keyserver throwing a "Not enabled" error.
• werner added a comment to T6209: GnuPG unable to interact with any keyserver throwing a "Not enabled" error.
The use of
• werner committed rG289fbc550d18: dirmngr: Fix CRL DP error fallback to other schemes. (authored by • werner).
dirmngr: Fix CRL DP error fallback to other schemes.
I just fixed a bug related to the DP. That might be related. See rG0c8299e2b56ef2e1
doc: Keep list of RFCs only in DETAILS
• werner committed rG0c8299e2b56e: dirmngr: Fix CRL DP error fallback to other schemes. (authored by • werner).
dirmngr: Fix CRL DP error fallback to other schemes.
• werner closed T1141: dirmngr does not try all CRL DPs if first fetchable CRL is too old as Resolved.
That particular bug seems to have been solved a long time ago. I stumbled upon up while fixing a DP bug today.
vitusb added a comment to T6203: GpgOL (Gpg4Win 3.1.24) / Error in parsing mail-headers (empty mail-body without correct decoded encryption-scheme) when using gpgol.dll 2.5.4 (gpgol.dll 2.5.0 from 3.1.16 works).
Here some further investigations ...
• ikloecker added a comment to T6209: GnuPG unable to interact with any keyserver throwing a "Not enabled" error.
I suspect that this has to do with your usage of tor (or gpg thinking that you use tor) because in dirmngr/dns-stuff.c I found
if (tor_mode) return gpg_error (GPG_ERR_NOT_ENABLED);
and all other places returning GPG_ERR_NOT_ENABLED seem to be related to S/MIME.
• ikloecker renamed T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption from Kleopatra: Message "not VS-NfD compliant" is shown incorrectly to GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption.
swdb: libksba 1.6.1
• werner triaged T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption as Normal priority.
• ikloecker changed the status of T6202: Kleopatra: Suppress errors of WKD lookups from Open to Testing.
Lookup on server should no longer report any errors caused by a failed WKD lookup.
• ikloecker committed rKLEOPATRA8e527a1df69f: Do not bother users with errors during WKD lookup (authored by • ikloecker).
Do not bother users with errors during WKD lookup
What is the output of gpgconf --list-dirs ?
• werner added a comment to T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption.
Works as designed. Whether the design is a good choice is a different
question.
• ebo added a comment to T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption.
In T6205#163303, @ikloecker wrote:Does the recipient know the public key that was used for encryption?
• ikloecker added a comment to T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption.
Does the recipient know the public key that was used for encryption?
Actually, noreturn isn't a keyword. The keyword is _Noreturn. noreturn is a convenience macro, which is provided in the header stdnoreturn.h. Funny enough, _Noreturn and the macro noreturn will be deprecated with C23 in favor of the new attribute [[noreturn]]. :-)
https://en.cppreference.com/w/c/language/_Noreturn
• ebo updated the task description for T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption.
• ebo added a comment to T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption.
The data from the above output was additionally OpenPGP encrypted to self.
The "not compliant" message only shows when the data is additionally encrypted to a public key.
Minor clean up.
Move function prototype to cipher.h.
Fix _gcry_err_code_to_errno.
More clean up.
• werner committed rSd786c3834a1a: Add no-chain option. (authored by Damien Goutte-Gattat via Gnupg-devel <gnupg-devel@gnupg.org>).
Add no-chain option.
• ebo added a comment to T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption.
gpg: Öffentlicher Schlüssel ist 2B2F1C74FE523D81
[GNUPG:] ENC_TO 2B2F1C74FE523D81 1 0
gpg: AES256.CFB verschlüsselter Sitzungsschlüssel
[GNUPG:] NEED_PASSPHRASE_SYM 9 3 8
gpg: Verschlüsselt mit einem Passwort
gpg: verschlüsselt mit RSA Schlüssel, ID 2B2F1C74FE523D81
[GNUPG:] NO_SECKEY 2B2F1C74FE523D81
[GNUPG:] BEGIN_DECRYPTION
gpg: AES256 verschlüsselte Daten
[GNUPG:] DECRYPTION_INFO 2 9 0
gpg: Ursprünglicher Dateiname=''
[GNUPG:] PLAINTEXT 62 1663253724
[GNUPG:] PLAINTEXT_LENGTH 4
test[GNUPG:] NEWSIG
gpg: Signatur vom 15.09.2022 16:55:24 Mitteleuropäische Sommerzeit
gpg: mittels RSA-Schlüssel 930A7B212C8EC8F1729DA3F5C464074875570823
[GNUPG:] ERRSIG C464074875570823 1 10 00 1663253724 9 930A7B212C8EC8F1729DA3F5C464074875570823
[GNUPG:] NO_PUBKEY C464074875570823
gpg: Signatur kann nicht geprüft werden: Kein öffentlicher Schlüssel
[GNUPG:] DECRYPTION_OKAY
[GNUPG:] GOODMDC
[GNUPG:] END_DECRYPTION
Fix use of noreturn.
Pushed similar changes for GnuPG and libgcrypt (which are actually harmless as it is internal use, not exposed header).
• gniibe committed rGd5e29991c0c7: dirmngr:dns,doc,gpg: Fix for noreturn for C11. (authored by • gniibe).
dirmngr:dns,doc,gpg: Fix for noreturn for C11.
Sep 15 2022
Sep 15 2022
To clarify that I meant that the underlying problem is our current keylisting speed in Kleopatra I have opened T6206.
• aheinecke triaged T6206: Kleopatra: Listing certificates initially just takes too long. as Normal priority.
vitusb added a comment to T6203: GpgOL (Gpg4Win 3.1.24) / Error in parsing mail-headers (empty mail-body without correct decoded encryption-scheme) when using gpgol.dll 2.5.4 (gpgol.dll 2.5.0 from 3.1.16 works).
Here is another Test:
In T6195#163175, @werner wrote:keyboxd has nothing to do with this, it merely makes the lookup of keys a bit faster. The computation of the WoT itself takes long and there is no shortcut for it. Fortunately most users don't have a deeply meshed WoT with dedicated revokers etc., thus for them things are fast in the standard configuration.
I agree with that task. Errors should be logged but not exposed to the user. I like the decryption / verification audit log we have now for some years (quite new) which allows users to view the stderr of gpgme jobs. Something like that -> Perfect. I think we need this for Import also and basically for every job. If you had an idea, maybe in the status bar or so, to indicate that more error information would be available. That would be my dream solution.
• aheinecke added a comment to T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption.
Just for your understanding, it this output would say "COMPLIANCE 23" anywhere in it, Ingo and me should look at this issue, if it does not that is something for Werner or Gniibe.
• aheinecke added a comment to T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption.
Could you please post the output of 'gpg --status-fd 1 --verbose --decrypt "Neues Textdokument.txt.gpg"' here? That would help us to pinpoint the issue.
• aheinecke added a comment to T6203: GpgOL (Gpg4Win 3.1.24) / Error in parsing mail-headers (empty mail-body without correct decoded encryption-scheme) when using gpgol.dll 2.5.4 (gpgol.dll 2.5.0 from 3.1.16 works).
No, I was just meaning that you should not have to disarm your logs when include data is not set.
vitusb added a comment to T6203: GpgOL (Gpg4Win 3.1.24) / Error in parsing mail-headers (empty mail-body without correct decoded encryption-scheme) when using gpgol.dll 2.5.4 (gpgol.dll 2.5.0 from 3.1.16 works).
Should i create a new log without "include data" ?
• aheinecke added a comment to T6203: GpgOL (Gpg4Win 3.1.24) / Error in parsing mail-headers (empty mail-body without correct decoded encryption-scheme) when using gpgol.dll 2.5.4 (gpgol.dll 2.5.0 from 3.1.16 works).
Yeah the error would lie in here I think:
• aheinecke added a comment to T6203: GpgOL (Gpg4Win 3.1.24) / Error in parsing mail-headers (empty mail-body without correct decoded encryption-scheme) when using gpgol.dll 2.5.4 (gpgol.dll 2.5.0 from 3.1.16 works).
I do not have a mind to really analyze this today, but when the checkbox in the logging options for "include data" is not set. There should be no much as an IP Address or Fingerprint mentioned in the logs. This was important to me and if you find that there are issues with that it would be a different bug also.
• aheinecke added a comment to T6203: GpgOL (Gpg4Win 3.1.24) / Error in parsing mail-headers (empty mail-body without correct decoded encryption-scheme) when using gpgol.dll 2.5.4 (gpgol.dll 2.5.0 from 3.1.16 works).
We have tested this a lot of course. But I will have to analyze your logs. Thanks.
In T6111#160993, @ikloecker wrote:Please give this a try on Windows.
• aheinecke closed T6111: Kleopatra: Improve focus indicator for text labels, a subtask of T5824: Kleopatra: Full accessibility support, as Resolved.
:)
• ikloecker changed the status of T6111: Kleopatra: Improve focus indicator for text labels from Open to Testing.
• ikloecker changed the status of T6111: Kleopatra: Improve focus indicator for text labels, a subtask of T5824: Kleopatra: Full accessibility support, from Open to Testing.
• ikloecker committed rKLEOPATRA0f4b32053f8d: Draw focus indicator for labels only if focus was changed with keyboard (authored by • ikloecker).
Draw focus indicator for labels only if focus was changed with keyboard
Add missing include
• ikloecker changed the status of T6155: Kleopatra: Certify expired userids offered but leads to General Error from Open to Testing.
• ikloecker added a comment to T6155: Kleopatra: Certify expired userids offered but leads to General Error.
The Certify action is now disabled everywhere for revoked and expired keys, i.e. in the main menu and the certificate list context menu, in the Certficate Details dialog, and in the Certifications dialog. Moreover, after importing a revoked or expired public OpenPGP key, the user isn't asked anymore whether they want to certify it.
• ikloecker committed rKLEOPATRA4e596c03813b: Require a valid key for the Certify command (authored by • ikloecker).
Require a valid key for the Certify command
• ikloecker committed rKLEOPATRAa0f79d1f10ad: Add possibility to require valid keys for a command (authored by • ikloecker).
Add possibility to require valid keys for a command
• ikloecker committed rKLEOPATRA6c387232bdfc: Don't ask user to certify an imported expired or revoked OpenPGP key (authored by • ikloecker).
Don't ask user to certify an imported expired or revoked OpenPGP key
• ikloecker committed rKLEOPATRAc72081d7f427: Disable Certify action if key cannot be certified (authored by • ikloecker).
Disable Certify action if key cannot be certified
• ikloecker committed rKLEOPATRA1545acf09493: Add helper to check if a key can be certified (authored by • ikloecker).
Add helper to check if a key can be certified
• ikloecker committed rKLEOPATRA82d513813124: Short-circuit check for revoked or expired user ID (authored by • ikloecker).
Short-circuit check for revoked or expired user ID
• ikloecker moved T6155: Kleopatra: Certify expired userids offered but leads to General Error from Restricted Project Column to Restricted Project Column on the Restricted Project board.
yat2m: Use __noreturn__ attribute.
Remove extra semicolons.
• gniibe added a project to T6204: gpgme:python Fix setup.py, using pkg-config (not deprecated gpg-error-config and gpgme-config): Restricted Project.
Pushed the fix.
Note that non-in-tree build never been reliable (using the result of the configure, in tree).
So, I basically don't consider the use case of non-in-tree build.
Fix for modern compiler.
• gniibe committed rMae9258fbf3b9: build:python: Don't use gpg-error-config/gpgme-config. (authored by • gniibe).
build:python: Don't use gpg-error-config/gpgme-config.
• gniibe added a comment to T6204: gpgme:python Fix setup.py, using pkg-config (not deprecated gpg-error-config and gpgme-config).
Reviewing the build process, it's just better to use @...VAR...@ by configure (instead of invoke pkg-config again in setup.py).
• gniibe closed T5721: gpg22: Update *.m4 to prefer use of gpgrt-config and *.pc to *-config as Resolved.
build: Update gpg-error.m4.
• gniibe committed rGddc6f7d19491: build: Use LDAP_DEPRECATED to detect ldap library. (authored by • gniibe).
build: Use LDAP_DEPRECATED to detect ldap library.
• gniibe committed rG7a936505dcc4: build: Update .gitignore for translations under po/. (authored by • gniibe).
build: Update .gitignore for translations under po/.
Sep 14 2022
Sep 14 2022
ebeiersdorfer added a comment to T6014: Add support for relative redirect URI-references to dirmngr.
Awesome, thanks all! From an end user perspective that would be a perfectly acceptable outcome, the warning just serves to confuse people. Appreciate the help!
• ikloecker edited projects for T6014: Add support for relative redirect URI-references to dirmngr, added: dirmngr; removed kleopatra.
I have created the spin-off T6202: Kleopatra: Suppress errors of WKD lookups to deal with not bothering Kleopatra's users with error messages when doing a WKD lookup in the background. This task is for improving dirmngr.
• werner committed rDa5a2a83e2d60: web: Point to currently implemented OpenPGP spec (authored by • werner).
web: Point to currently implemented OpenPGP spec
keyboxd has nothing to do with this, it merely makes the lookup of keys a bit faster. The computation of the WoT itself takes long and there is no shortcut for it. Fortunately most users don't have a deeply meshed WoT with dedicated revokers etc., thus for them things are fast in the standard configuration.
• werner committed rG50d12860ef21: tests: Restrict the use of gpgconf.ctl to make check. (authored by • werner).
tests: Restrict the use of gpgconf.ctl to make check.
• ebo removed a project from T5972: Can't insert charaters in a magic-wand generated password : Restricted Project.
works now
cpp: Reject signing expired keys
• ikloecker committed rKLEOPATRA7ceef3e16d64: Do not offer expired user ID for certification (authored by • ikloecker).
Do not offer expired user ID for certification
• ikloecker committed rKLEOPATRA39d9c325c50f: Refuse to certify revoked or expired keys (authored by • ikloecker).
Refuse to certify revoked or expired keys
