Page MenuHome GnuPG
Feed Advanced Search

Jul 13 2023

jukivili added a comment to T6561: OpenPGP benchmarks on Windows OCB vs. CFB + MDC vs. Unsigned vs. Signed on real data..

Problem with SHA-256 on x86-64 is that it took long time for Intel to introduce SHA acceleration (SHA1 & SHA256) to their main CPU products.

Jul 13 2023, 4:29 PM · gnupg

Jul 12 2023

gniibe claimed T5252: bad expiration value when using --batch Creation-Date/Expire-Date.

Fixed in master.
Will backport into 2.4, after testing.

Jul 12 2023, 6:39 AM · gnupg, Bug Report

Jul 10 2023

aheinecke added a comment to T6570: Better performance with OCB encryption + sign.

So some more data from 2.4.3. Once unpatched and once with your patch.

Jul 10 2023, 8:20 PM · gnupg, Restricted Project

Jul 7 2023

werner added a comment to T6570: Better performance with OCB encryption + sign.

Am I correct that the reason for the speed up is that it can use a second CPU's engine. If there is a real performance improvement here, we should add this for example using a --compatibility-flag. This way we can gather experience and eventually make it the default. The compatibility flags won't introduce an API incompatibility.

Jul 7 2023, 1:17 PM · gnupg, Restricted Project
aheinecke added a comment to T6561: OpenPGP benchmarks on Windows OCB vs. CFB + MDC vs. Unsigned vs. Signed on real data..

I found this important to do because the SHA-256 results from your test looked extremly slow.

Jul 7 2023, 12:22 PM · gnupg
aheinecke added a comment to T6561: OpenPGP benchmarks on Windows OCB vs. CFB + MDC vs. Unsigned vs. Signed on real data..

For comparison here are my benchmark results on the same system. Once on Linux 64 bit and once on W32 and once with W64. All runs are native to exclude any virtualization issues.

Jul 7 2023, 12:20 PM · gnupg
gniibe added a comment to T6570: Better performance with OCB encryption + sign.

Updated the patch:

Jul 7 2023, 7:07 AM · gnupg, Restricted Project

Jul 6 2023

svuorela added a comment to T6259: Kleopatra: Improve startup performance .

I did a little bit of testing with okular, and it kind of gives similar numbers.

Jul 6 2023, 9:56 AM · vsd32 (vsd-3.2.0), gnupg, kleopatra, Restricted Project
gniibe added a comment to T6570: Better performance with OCB encryption + sign.

This is a patch for master (which uses nPth for gpg):

Jul 6 2023, 9:18 AM · gnupg, Restricted Project
gniibe added a comment to T6570: Better performance with OCB encryption + sign.

I'm trying to use a thread for computation of hashing. It works, but no performance gain, due to nPth.
I do:

npth_unprotect ();
gcry_md_write (mfx->md, mfx->buf, mfx->written);
npth_protect ();

to expect hashing is done in parallel.

Jul 6 2023, 8:11 AM · gnupg, Restricted Project

Jul 5 2023

gniibe added a comment to T6570: Better performance with OCB encryption + sign.

It seemed I was wrong that it is due to buffering.
In the use case of --sign and --encrypt, hashing is done with IOBUF's 64KiB buffer (already).

Jul 5 2023, 8:56 AM · gnupg, Restricted Project
gniibe updated the task description for T6570: Better performance with OCB encryption + sign.
Jul 5 2023, 8:47 AM · gnupg, Restricted Project
gniibe added a comment to T6561: OpenPGP benchmarks on Windows OCB vs. CFB + MDC vs. Unsigned vs. Signed on real data..

I observed the benchmark by libgcrypt (Windows emulation 32-bit on Debian):

Jul 5 2023, 8:27 AM · gnupg

Jul 4 2023

werner updated the task description for T6509: Release GnuPG 2.4.3.
Jul 4 2023, 4:57 PM · gnupg24 (gnupg-2.4.3), Release Info

Jul 3 2023

aheinecke triaged T6574: GnuPG / Gpg4win: Replace sha1sum.c with a tool in GnuPG as Wishlist priority.
Jul 3 2023, 12:54 PM · Restricted Project, Feature Request, gnupg, gpg4win
gniibe triaged T6570: Better performance with OCB encryption + sign as Normal priority.
Jul 3 2023, 10:42 AM · gnupg, Restricted Project
gniibe claimed T6561: OpenPGP benchmarks on Windows OCB vs. CFB + MDC vs. Unsigned vs. Signed on real data..

OK. I'll take the signing part (possible performance improvement).

Jul 3 2023, 10:21 AM · gnupg
gniibe added a comment to T6561: OpenPGP benchmarks on Windows OCB vs. CFB + MDC vs. Unsigned vs. Signed on real data..

I looked through the code. What I observed is:

  • By jussi's improvements, AEAD code is optimized with AEAD_ENC_BUFFER_SIZE of 64KiB
    • this contributes much for better performance
  • If we invoke gpg --sign | gpg --encrypt then we can take advantage of multiple CPUs (but gpg is currently not automatically threaded in that way)
    • signing could be improved likewise, using larger buffer like 64KiB
  • CFB+MDC, it uses two functions together; encryption and hashing, and not with larger buffer like 64KiB
    • when signed, it also does hashing for signing, so three functions
Jul 3 2023, 4:50 AM · gnupg

Jun 26 2023

aheinecke added a comment to T6561: OpenPGP benchmarks on Windows OCB vs. CFB + MDC vs. Unsigned vs. Signed on real data..

! In T6561#172087, @werner wrote:
FWIW, gpg shows the actual cipher and encryption mode with -v. For example

Jun 26 2023, 3:03 PM · gnupg
werner added a comment to T6561: OpenPGP benchmarks on Windows OCB vs. CFB + MDC vs. Unsigned vs. Signed on real data..

FWIW, gpg shows the actual cipher and encryption mode with -v. For example

Jun 26 2023, 2:02 PM · gnupg
aheinecke added a comment to T6561: OpenPGP benchmarks on Windows OCB vs. CFB + MDC vs. Unsigned vs. Signed on real data..

s/CBC/CFB+MDC/

Jun 26 2023, 1:51 PM · gnupg
aheinecke renamed T6561: OpenPGP benchmarks on Windows OCB vs. CFB + MDC vs. Unsigned vs. Signed on real data. from OpenPGP benchmarks on Windows OCB vs. CBC vs. Unsigned vs. Signed on real data. to OpenPGP benchmarks on Windows OCB vs. CFB + MDC vs. Unsigned vs. Signed on real data..
Jun 26 2023, 1:50 PM · gnupg
werner added a comment to T6561: OpenPGP benchmarks on Windows OCB vs. CFB + MDC vs. Unsigned vs. Signed on real data..

s/CBC/CFB+MDC/

Jun 26 2023, 1:44 PM · gnupg
aheinecke triaged T6561: OpenPGP benchmarks on Windows OCB vs. CFB + MDC vs. Unsigned vs. Signed on real data. as Wishlist priority.
Jun 26 2023, 1:38 PM · gnupg

Jun 22 2023

werner added a comment to T2039: CRL issuingDistributionPoint support.

See for T6545 for a new request to support IDP.

Jun 22 2023, 11:46 AM · gnupg, Feature Request, dirmngr

Jun 20 2023

gniibe closed T6495: kbx/keybox-dump.c: close file handle when return as Resolved.

Thank you.
Applied to master, 2.4 branch and 2.2 branch.

Jun 20 2023, 2:23 AM · gnupg
gniibe closed T6482: Delete redundant characters as Resolved.

Thank you.
Applied to master, 2.4 branch, and 2.2 branch.

Jun 20 2023, 2:10 AM · gnupg

Jun 12 2023

werner added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

I consider the entire idea of receiving a passphrase and data on the same channel to be a bad for security and robust coding. The whole thing is a historical oddity which we kept for the sake of mutt(1)'s legacy way of invoking pgp. Thus I won't consider 3) the best option.

Jun 12 2023, 8:22 AM · Emacs, gnupg, Bug Report
gniibe added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

To summarize, here is the situation:

  • Ideally, it would be good to modify GnuPG and Emacs EasyPG to implement status handling and input handling in better way.
Jun 12 2023, 2:13 AM · Emacs, gnupg, Bug Report

Jun 10 2023

thesamesam added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

Ah, I see https://dev.gnupg.org/rG2f872fa68c6576724b9dabee9fb0844266f55d0d applies cleanly. I guess can go with that, although would prefer it if on the 2.4 branch.

Jun 10 2023, 11:00 PM · Emacs, gnupg, Bug Report
thesamesam added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

Is there a commit we could backport downstream to 2.4.x? We've had quite a few reports of this.

Jun 10 2023, 10:56 PM · Emacs, gnupg, Bug Report

Jun 5 2023

werner added a comment to T2701: Do not let users create keys without an expiration date.

To align the default expiration time with the BSI approval and other related software we change this now to 3 years.

Jun 5 2023, 3:06 PM · Feature Request, gnupg (gpg22)

Jun 1 2023

gniibe added a comment to T6512: keyboxd with data pipe.

The problem of hang of tests/openpgp/multisig.scm is solved by rGef4f22b9d98b: gpg: Graceful exit for signature checking with --batch.
But the problem itself is not yet solved.

Jun 1 2023, 5:04 AM · gnupg26, Bug Report
gniibe added a comment to T6512: keyboxd with data pipe.

It is reproducible by testing tests/openpgp/multisig.scm with keyboxd enabled (it hangs), with the modification of following.

Jun 1 2023, 4:58 AM · gnupg26, Bug Report
gniibe created T6512: keyboxd with data pipe.
Jun 1 2023, 4:51 AM · gnupg26, Bug Report

May 31 2023

werner closed T6506: Release GnuPG 2.4.2 as Resolved.
May 31 2023, 8:48 AM · gnupg, Release Info

May 30 2023

werner updated the task description for T6506: Release GnuPG 2.4.2.
May 30 2023, 4:42 PM · gnupg, Release Info

May 26 2023

werner triaged T6506: Release GnuPG 2.4.2 as Normal priority.
May 26 2023, 3:37 PM · gnupg, Release Info
werner edited Description on gnupg.
May 26 2023, 10:05 AM
werner edited projects for T6250: GPG-Agent doesn't work properly with smart cards and ed25519 keys and SSH Agent, added: gnupg; removed gnupg24.
May 26 2023, 10:03 AM · gnupg, Documentation, ssh

May 24 2023

gniibe added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

I pushed the change which keeps old status report behavior to master.
Let me test the change.

May 24 2023, 3:48 AM · Emacs, gnupg, Bug Report
gniibe added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

looks simpler to me.

May 24 2023, 3:24 AM · Emacs, gnupg, Bug Report

May 23 2023

werner added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

Hmm, for the latter this:

May 23 2023, 3:03 PM · Emacs, gnupg, Bug Report
gniibe added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

Orthogonally, here is possible change for GnuPG, if we need to support the workaround of compress-level 0 in ~/.gnupg/gpg.conf.

May 23 2023, 2:11 PM · Emacs, gnupg, Bug Report
gniibe added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

OK, here is my changes which always use make-temp-file (to avoid confusion between data input and passphrase input).

May 23 2023, 10:47 AM · Emacs, gnupg, Bug Report
gniibe claimed T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

I use epg.el with the change of removing the wait:

May 23 2023, 9:23 AM · Emacs, gnupg, Bug Report

May 17 2023

gniibe closed T6293: w32: putenv in Microsoft runtime doesn't support GNU extension as Resolved.
May 17 2023, 4:37 AM · gnupg, Bug Report

May 16 2023

ebo closed T2879: There is no way to selectively delete secret subkeys as Resolved.

Was resolved, see T4457

May 16 2023, 2:45 PM · gnupg, Feature Request

May 15 2023

werner closed T6489: GPG 2.4.0 encrypted files in FIPS mode is non-compliant as Resolved.

GnuPG is and can't be FIPS-140-3 compliant due to the way it is implemented. We may eventually employ the new hash-and-sign API of Libgcrypt to move into this direction but that has not yet been done. However, this also requires the use of the new indicator API and the, well, a RedHat kernel.

May 15 2023, 8:51 PM · Not A Bug, gnupg, FIPS

May 12 2023

gniibe added a comment to T6275: gnupg26: Improve gnupg_spawn_process function.

Pushed to GnuPG master. Let us test. For my machine of Debian GNU/Linux, Wine emulation (Windows 32-bit, Windows 64-bit), make check goes all well.
After confirming the implementation, I'd like to put it into gpgrt.

May 12 2023, 1:50 AM · gnupg, libassuan, gpgrt

May 9 2023

werner closed T2703: provide option to ignore expiration date as Resolved.

Will be in 2.4.2

May 9 2023, 8:18 AM · gnupg, Feature Request
werner closed T4669: Key expiration time sometimes improperly interpreted as a signed 32-bit value as Resolved.
May 9 2023, 7:50 AM · Not A Bug, OpenPGP, gnupg

May 8 2023

fgunbin added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

@werner We could make the wait conditional on (equal epg-gpg-program "gpg"), that is, only when user has GnuPG 1.x.

May 8 2023, 4:54 PM · Emacs, gnupg, Bug Report
werner added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

Well okay, then I have no workaround. However, I won't consider this a bug because BEGIN_ENCRYPTION marks the start of the actual encryption process but not when it starts to read input data.

May 8 2023, 12:53 PM · Emacs, gnupg, Bug Report
gniibe added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

The change rG60963d98cfd8: gpg: Detect already compressed data also when using a pipe. for T6332 introduce IOBUF_IOCTL_PEEK.

May 8 2023, 11:10 AM · Emacs, gnupg, Bug Report

May 7 2023

stardiviner added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

@werner I tested by switch back to GnuPG 2.4.1 (I downgraded to 2.4.0 before to temporary work around issue), adding compress-level 0 to gpg.conf file. It's not working. The problem still exist.

May 7 2023, 5:09 PM · Emacs, gnupg, Bug Report

May 5 2023

werner triaged T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG) as High priority.

I have not yet experienced that although I am using Gnus with encrypted mail all the time. My guess is that this is due to the improved compressed input detection in gpg. You might be able to work around it by adding compress-level 0 to gpg.conf

May 5 2023, 7:35 PM · Emacs, gnupg, Bug Report
kloczek closed T4602: 2.2.16: test suite fails as Resolved.

Just checked 2.4.1 and looks like now everything is OK.

May 5 2023, 2:57 PM · Fedora, gnupg, Bug Report

Apr 28 2023

ebo closed T3456: GPG does not import secret subkeys from --export-secret-subkeys output if subkey stubs existed before as Resolved.

works, Gpg4win-4.1.1-beta295

Apr 28 2023, 4:02 PM · gnupg22 (gnupg-2.2.42), Restricted Project

Apr 25 2023

gniibe added a comment to T3456: GPG does not import secret subkeys from --export-secret-subkeys output if subkey stubs existed before.

Sorry, the comment above is my misunderstanding.

Apr 25 2023, 6:42 AM · gnupg22 (gnupg-2.2.42), Restricted Project
gniibe added a comment to T3456: GPG does not import secret subkeys from --export-secret-subkeys output if subkey stubs existed before.

For importing key/subkey case, it doesn't matter if the smartcard is connected or not. The data in the file will be overwritten by import.

Apr 25 2023, 6:14 AM · gnupg22 (gnupg-2.2.42), Restricted Project

Apr 24 2023

ebo added a comment to T3456: GPG does not import secret subkeys from --export-secret-subkeys output if subkey stubs existed before.

This works if the smartcard with the same private key is not connected, which it usually shouldn't be (outside of testing situations) so that's ok for me.
But I think we should inform the user what is done or isn't.
Currently we get in both cases:

gpg: Anzahl insgesamt bearbeiteter Schlüssel: 1
gpg:                             unverändert: 1
gpg:              gelesene geheime Schlüssel: 1
gpg:            geheime Schlüssel importiert: 1

Which is not very clear in any case but in case the smart card is connected it is in fact wrong, there is no secret key imported, the keystub remains.

Apr 24 2023, 12:54 PM · gnupg22 (gnupg-2.2.42), Restricted Project

Apr 20 2023

werner edited projects for T6303: Release GnuPG 2.4.0, added: gnupg; removed gnupg24, gnupg (gpg23).
Apr 20 2023, 1:37 PM · gnupg, Release Info

Apr 18 2023

Guldrelokk added a comment to T6455: Bug in regexp library may lead to out-of-bounds read.

Another miscellaneous correction for jimregexp. A condition was copy-pasted from another section without the necessary changes, resulting in incorrect logic. This seems harmless apart from inconsistent error reporting.

diff --git a/regexp/jimregexp.c b/regexp/jimregexp.c
index 1a8b8aae6..1b6e1b49c 100644
--- a/regexp/jimregexp.c
+++ b/regexp/jimregexp.c
@@ -778,7 +778,7 @@ static int regatom(regex_t *preg, int *flagp)
                                                        preg->err = REG_ERR_NULL_CHAR;
                                                        return 0;
                                                }
-                                               if (start == '\\' && *pattern == 0) {
+                                               if (end == '\\' && *pattern == 0) {
                                                        preg->err = REG_ERR_INVALID_ESCAPE;
                                                        return 0;
                                                }
Apr 18 2023, 12:24 PM · gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.1), Bug Report
Guldrelokk created T6455: Bug in regexp library may lead to out-of-bounds read.
Apr 18 2023, 12:20 PM · gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.1), Bug Report
gniibe changed the status of T3456: GPG does not import secret subkeys from --export-secret-subkeys output if subkey stubs existed before from Open to Testing.

Pushed the change not including OK_TO_CHANGE_ERROR_BEHAVIOR part.
Note that the modification affects main key case, too.

Apr 18 2023, 2:59 AM · gnupg22 (gnupg-2.2.42), Restricted Project

Apr 17 2023

gniibe added a comment to T3456: GPG does not import secret subkeys from --export-secret-subkeys output if subkey stubs existed before.

To minimize the impact of the change, I updated:

diff --git a/g10/import.c b/g10/import.c
index 1ed40a63c..345e8cc75 100644
--- a/g10/import.c
+++ b/g10/import.c
@@ -2955,9 +2955,23 @@ do_transfer (ctrl_t ctrl, kbnode_t keyblock, PKT_public_key *pk,
 {
   gpg_error_t err;
   struct import_stats_s subkey_stats = {0};
+  int force = 0;
+  int already_exist = agent_probe_secret_key (ctrl, pk);
+
+#ifndef OK_TO_CHANGE_ERROR_BEHAVIOR
+  if (already_exist == 1)
+    return gpg_error (GPG_ERR_EEXIST);
+#endif
+  if (already_exist == 2)
+    {
+      if (!opt.quiet)
+        log_info (_("key %s: card reference is overridden by key material\n"),
+                  keystr_from_pk (pk));
+      force = 1;
+    }
Apr 17 2023, 4:05 AM · gnupg22 (gnupg-2.2.42), Restricted Project

Apr 14 2023

gniibe added a comment to T3456: GPG does not import secret subkeys from --export-secret-subkeys output if subkey stubs existed before.

Changes may be something like:

diff --git a/g10/import.c b/g10/import.c
index 1ed40a63c..91ff0c8ec 100644
--- a/g10/import.c
+++ b/g10/import.c
@@ -2706,6 +2706,20 @@ transfer_secret_keys (ctrl_t ctrl, struct import_stats_s *stats,
           goto leave;
         }
Apr 14 2023, 9:20 AM · gnupg22 (gnupg-2.2.42), Restricted Project
gniibe edited projects for T3456: GPG does not import secret subkeys from --export-secret-subkeys output if subkey stubs existed before, added: Restricted Project; removed Info Needed.
Apr 14 2023, 8:07 AM · gnupg22 (gnupg-2.2.42), Restricted Project
gniibe merged T3391: cannot import subkey that was once marked to be on a card into T3456: GPG does not import secret subkeys from --export-secret-subkeys output if subkey stubs existed before.
Apr 14 2023, 8:05 AM · gnupg22 (gnupg-2.2.42), Restricted Project
gniibe merged task T3391: cannot import subkey that was once marked to be on a card into T3456: GPG does not import secret subkeys from --export-secret-subkeys output if subkey stubs existed before.
Apr 14 2023, 8:05 AM · Restricted Project, gpgagent, scd, gnupg, OpenPGP, Bug Report

Apr 13 2023

ebo added a comment to T3391: cannot import subkey that was once marked to be on a card.

isn't T3456 the same issue?

Apr 13 2023, 2:57 PM · Restricted Project, gpgagent, scd, gnupg, OpenPGP, Bug Report
ebo added a project to T3391: cannot import subkey that was once marked to be on a card: Restricted Project.
Apr 13 2023, 2:50 PM · Restricted Project, gpgagent, scd, gnupg, OpenPGP, Bug Report
gniibe closed T6239: gnugp 2.3.8 fails to build with --disable-ldap as Resolved.
Apr 13 2023, 3:37 AM · gnupg, Bug Report

Apr 12 2023

ebo moved T6347: gpgtar needs to support a few more general command line args to be usable by gpgme from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Apr 12 2023, 2:52 PM · gnupg, Restricted Project

Apr 5 2023

ebo moved T5805: Kleopatra or GnuPG: Auto retrieve signers key from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Apr 5 2023, 1:54 PM · gnupg, kleopatra, Restricted Project
ebo moved T6119: GnuPG: Compliance mode status omitted when decrypting combined symmetric and asymmetric data from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Apr 5 2023, 1:52 PM · gnupg, Restricted Project

Apr 3 2023

ebo added a comment to T2069: Passphrase prompts for each subkey, but not clear which dialog belongs to which subkey.

On gpg4win 4.1.0 (and GnuPG VSD 3.1.26) there are no longer password prompts for the subkeys when exporting (or making a backup from) secret keys.

Apr 3 2023, 2:52 PM · gnupg24, Bug Report

Mar 29 2023

werner closed T1971: LDAP: --refresh-keys is not implemented as Resolved.

This has been solved loooong ago.

Mar 29 2023, 9:18 AM · Bug Report, dirmngr, gnupg

Mar 24 2023

werner closed T6422: --rfc4880 not working in Gpg4win 4.1.0? as Resolved.

OCB mode (i.e. packet 20) is only used if the keys announce it. Thus only after moving a (private) key from GnuPG to a non-GnuPG compatible implementation you will run into this problem. The compatibility options won't override the preference system.

Mar 24 2023, 9:14 AM · OpenPGP, Support, gnupg
cklassen removed External Link on T6422: --rfc4880 not working in Gpg4win 4.1.0?.
Mar 24 2023, 8:59 AM · OpenPGP, Support, gnupg
cklassen created T6422: --rfc4880 not working in Gpg4win 4.1.0?.
Mar 24 2023, 8:58 AM · OpenPGP, Support, gnupg

Mar 20 2023

gniibe closed T1734: [SUGGESTION] Implement a function to re-generate public keys and(!) "stubs" from private keys stored on smartcard only as Resolved.

gpg-agent now supports READKEY --card command which creates stub file when it's not yet available on host computer.
It was implemented by rG82cbab906a3e: agent: Add --card option for READKEY.

Mar 20 2023, 3:38 AM · gnupg, Feature Request

Mar 13 2023

aheinecke changed the status of T6346: Kleopatra: Run self test only at the first start on windows, a subtask of T6259: Kleopatra: Improve startup performance , from Open to Testing.
Mar 13 2023, 10:01 AM · vsd32 (vsd-3.2.0), gnupg, kleopatra, Restricted Project

Mar 3 2023

werner closed T6390: ECC: Explain GnuPG's CV25519 key and its ECDH (comarison to X25519) as Resolved.

Thanks for the description; this is good for documentation.

Mar 3 2023, 8:25 AM · Support, Documentation, OpenPGP, gnupg

Mar 2 2023

ikloecker added a project to T6399: Missing trustdb check on import of certificate: gnupg.
Mar 2 2023, 6:38 PM · gnupg22 (gnupg-2.2.42), OpenPGP, Restricted Project
tennox added a comment to T6381: Option to set default encryption subkey.

That sounds like a great (and better) solution! Thank you for your attention & effort 👍🙏

Mar 2 2023, 3:08 PM · gnupg
werner closed T6381: Option to set default encryption subkey as Resolved.

See T6395 for the new feature. It will be released with 2.4.1 but it will take some time that it can actually be used because the other party needs to have an OpenPG implementation which supports this.

Mar 2 2023, 12:19 PM · gnupg

Feb 26 2023

werner closed T6389: gpgtar --encrypt doesn't accept absolute path to a directory (gpgtar: skipping invalid name) as Wontfix.

Please use

gpgtar -C /home/matt/data ....

instead of using an absolute name. This makes things much easier to implement in a secure way: You don't want to have absolute file names in the tarball and mapping them to relative names is not easy or even impossible in case of, say "/home/foo/x.data /home/bar/x.data". Keep in mind that gpgtar does also not handle symlinks and other special files.

Feb 26 2023, 7:25 PM · gnupg, Bug Report
werner closed T4436: gpgsm refuses to encrypt with failure to check CRL as Resolved.

I guess this is fixed with this commit for 2.2. and 2.4. Given that the report is quite old with not new infos since 2019, I'll close it.

Feb 26 2023, 7:17 PM · gnupg, S/MIME

Feb 23 2023

werner added a comment to T6381: Option to set default encryption subkey.

The reason why gpg does not encrypt to multiple subkeys is that the older subkeys are viewed as deprecated. You could write a tool which does a heuristic to check when the time is reached that no more messages are encrypted to an older subkey (or are used to decrypt archived mails). At that point you can take the private part of the old subkey offline.

Feb 23 2023, 8:57 AM · gnupg

Feb 22 2023

tennox added a comment to T6381: Option to set default encryption subkey.

Debian's wiki also speaks a lot about the advantages & dream of subkeys, but also mentions the caveat:

Feb 22 2023, 7:44 PM · gnupg
tennox added a comment to T6381: Option to set default encryption subkey.

I've read many articles mentioning the improved key handling when different devices just have different subkeys, thus allowing a semantic connection to a primary identity (instead of different "Identities" on different devices)

Feb 22 2023, 7:38 PM · gnupg
ikloecker added a comment to T6381: Option to set default encryption subkey.

What do you want to achieve by using multiple encryption subkeys? Do you realize that gpg will always encrypt to one subkey (unless you explicitely specify multiple subkeys), i.e. you won't be able to decrypt on device 1 what you have encrypted for device 2 and vice-versa. Usually, this makes little sense because it seems you want to be able to decrypt anything on your main machine.

Feb 22 2023, 11:44 AM · gnupg

Feb 21 2023

tennox added a comment to T6381: Option to set default encryption subkey.

Thanks for the reply :)

Feb 21 2023, 2:44 PM · gnupg
werner added a project to T6381: Option to set default encryption subkey: gnupg.

Sorry, I think you have to fix the other tools. The ! suffix has virtually been supported forever and any new option to do the same complicates the code and the documentation.

Feb 21 2023, 8:05 AM · gnupg

Feb 16 2023

ikloecker updated subscribers of T6377: Kleopatra: gpgsk file contains shadowed private key.
Feb 16 2023, 10:13 AM · kleopatra
ikloecker added a project to T6377: Kleopatra: gpgsk file contains shadowed private key: gnupg.

Kleopatra simply copies the content of the corresponding *.key file in the private-keys-v1.d folder. If the *.key file contains a shadowed key after issuing a KEYTOCARD --force [...] command followed by a SCD LEARN --force command (note the SCD!), then gpg-agent is to blame.

Feb 16 2023, 10:08 AM · kleopatra

Feb 15 2023

ikloecker closed T6348: gpgtar: Error when using --status-fd as Resolved.

Works now for gpgme. Thanks!

Feb 15 2023, 8:18 AM · gnupg, Restricted Project

Feb 14 2023

positron added a comment to T6370: Print diagnostics to explain certain expiration cases.

Understood. I appreciate the time you took to analyse the issue. Thanks.

Feb 14 2023, 6:27 PM · Feature Request, gnupg