Page MenuHome GnuPG
Feed Advanced Search

Jun 28 2023

gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

For the first issue, I added a check in: rCf65c30d470f5: cipher:ecc:fips: Reject use of SHAKE when it's ECDSA with RFC6979.

Jun 28 2023, 3:52 AM · libgcrypt, FIPS, Bug Report

Jun 27 2023

werner added a project to T3927: gpgsm certificate import fails because of hardcoded password length limitation: gnupg22.

This has long been fixed in 2.4. Given that Libgcrypt has support for PBKDF2 we can back port this.

Jun 27 2023, 6:00 PM · Feature Request, gnupg24, S/MIME
Jakuje added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

From the FIPS 186-5 there are some limitations to use the SHAKE in FIPS Mode that we will have to reflect:

Jun 27 2023, 5:22 PM · libgcrypt, FIPS, Bug Report

Jun 26 2023

werner claimed T6500: Keyserver access via http-proxy isn't attempted when using standard-resolver.
Jun 26 2023, 4:37 PM · gnupg, dns, Bug Report
ikloecker closed T6558: gpgtar: Does not stop spawned gpg process when exiting as Invalid.

Closing since the problem doesn't seem to occur if the operation is canceled properly.

Jun 26 2023, 12:15 PM · gnupg24, Restricted Project, gpgtar, Bug Report
ikloecker added a comment to T6558: gpgtar: Does not stop spawned gpg process when exiting.

Sorry about that. I tested an old build which didn't call gpgme_cancel_async and therefore probably didn't properly close the channels. It seems to work if gpgme_cancel_async is called to cancel the operation.

Jun 26 2023, 12:03 PM · gnupg24, Restricted Project, gpgtar, Bug Report
ikloecker added a comment to T6558: gpgtar: Does not stop spawned gpg process when exiting.

This option is already used. Running pgrep -a gpg in a loop (and ignoring gpg-agent processes) I get:

Mo 26. Jun 11:29:11 CEST 2023
19111 gpgtar --batch --status-fd 60 --gpg-args --no-tty --gpg-args --charset=utf8 --gpg-args --enable-progress-filter --gpg-args --exit-on-status-write-error --gpg-args --display=:0 --gpg-args --ttyname=/dev/pts/37 --gpg-args --ttytype=xterm-256color --decrypt --directory /tmp/kleopatra-JqIiXu/src -- /home/ingo/dev/g10/src.tar.gpg
19112 gpg --batch --status-fd=60 --output - --decrypt --no-tty --charset=utf8 --enable-progress-filter --exit-on-status-write-error --display=:0 --ttyname=/dev/pts/37 --ttytype=xterm-256color -- /home/ingo/dev/g10/src.tar.gpg
Jun 26 2023, 11:34 AM · gnupg24, Restricted Project, gpgtar, Bug Report
werner triaged T6558: gpgtar: Does not stop spawned gpg process when exiting as Normal priority.

Can you please test by adding --exit-on-status-write-error to the gpg invocation by gpgtar?

Jun 26 2023, 9:50 AM · gnupg24, Restricted Project, gpgtar, Bug Report

Jun 23 2023

ikloecker created T6558: gpgtar: Does not stop spawned gpg process when exiting.
Jun 23 2023, 4:33 PM · gnupg24, Restricted Project, gpgtar, Bug Report
werner triaged T6556: gpgtar: Removes existing output file on error as Normal priority.
Jun 23 2023, 10:10 AM · gnupg24 (gnupg-2.4.2), gnupg22 (gnupg-2.2.42), Restricted Project, gpgtar, Bug Report
gniibe added a comment to T6557: Support of SHAKE in MGF function of RSA.

Pushed a change in master.

Jun 23 2023, 6:00 AM · libgcrypt, FIPS, Bug Report
gniibe changed the status of T6557: Support of SHAKE in MGF function of RSA, a subtask of T6539: The digest&sign/verify API with SHAKE-class digests does not work, from Open to Testing.
Jun 23 2023, 6:00 AM · libgcrypt, FIPS, Bug Report
gniibe changed the status of T6557: Support of SHAKE in MGF function of RSA from Open to Testing.
Jun 23 2023, 6:00 AM · libgcrypt, FIPS, Bug Report
gniibe updated the task description for T6557: Support of SHAKE in MGF function of RSA.
Jun 23 2023, 3:28 AM · libgcrypt, FIPS, Bug Report
gniibe renamed T6557: Support of SHAKE in MGF function of RSA from Support of SHAKE in MGF1 function of RSA to Support of SHAKE in MGF function of RSA.
Jun 23 2023, 3:27 AM · libgcrypt, FIPS, Bug Report
gniibe triaged T6557: Support of SHAKE in MGF function of RSA as Normal priority.
Jun 23 2023, 2:41 AM · libgcrypt, FIPS, Bug Report

Jun 22 2023

ikloecker created T6556: gpgtar: Removes existing output file on error.
Jun 22 2023, 5:44 PM · gnupg24 (gnupg-2.4.2), gnupg22 (gnupg-2.2.42), Restricted Project, gpgtar, Bug Report
werner triaged T6554: Kleopatra: Reports success when gpgtar is kill with SIGTERM or SIGKILL while folder is encrypted as Normal priority.

Due to the double fork in gpgme we won't get the exit code which gpgtar emits. Possible actions in a signal handler are also limited; in particular we can't use stdio or estream. The only option to print a status line would we by using write directly. However, this might mess with the libassuan buffering. Thus, it is not a good idea to pkill gpgtar. Same is true for gpg and gpgsm.

Jun 22 2023, 4:30 PM · vsd33 (vsd-3.3.0), gpgme, kleopatra, gpgtar, Restricted Project, Bug Report
ikloecker renamed T6554: Kleopatra: Reports success when gpgtar is kill with SIGTERM or SIGKILL while folder is encrypted from Kleopatra: Reports success when gpgtar is kill with SIGTERM while folder is encrypted to Kleopatra: Reports success when gpgtar is kill with SIGTERM or SIGKILL while folder is encrypted.
Jun 22 2023, 4:29 PM · vsd33 (vsd-3.3.0), gpgme, kleopatra, gpgtar, Restricted Project, Bug Report
ikloecker created T6554: Kleopatra: Reports success when gpgtar is kill with SIGTERM or SIGKILL while folder is encrypted.
Jun 22 2023, 4:17 PM · vsd33 (vsd-3.3.0), gpgme, kleopatra, gpgtar, Restricted Project, Bug Report
werner moved T6536: Extend P12 parser for ShroudedKeyBag inside a CertBag from Backlog to WiP on the gnupg24 board.
Jun 22 2023, 9:21 AM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Bug Report, S/MIME, Restricted Project
gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

I found the case of X.509, which also uses fixed length output for RSA-PSS and ECDSA: https://www.rfc-editor.org/rfc/rfc8692.html

Jun 22 2023, 7:29 AM · libgcrypt, FIPS, Bug Report

Jun 20 2023

Jakuje added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

Thank you for having a look into that! The proposed patch looks good. Should we have this change also in master?

Jun 20 2023, 1:58 PM · libgcrypt, FIPS, Bug Report

Jun 19 2023

gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

Here is a possible change (... to master, assuming it's good to support use case of RFC 8702):

diff --git a/cipher/keccak.c b/cipher/keccak.c
index 22c40302..76e08cb5 100644
--- a/cipher/keccak.c
+++ b/cipher/keccak.c
@@ -1630,8 +1630,8 @@ const gcry_md_spec_t _gcry_digest_spec_sha3_512 =
 const gcry_md_spec_t _gcry_digest_spec_shake128 =
   {
     GCRY_MD_SHAKE128, {0, 1},
-    "SHAKE128", shake128_asn, DIM (shake128_asn), oid_spec_shake128, 0,
-    shake128_init, keccak_write, keccak_final, NULL, keccak_extract,
+    "SHAKE128", shake128_asn, DIM (shake128_asn), oid_spec_shake128, 32,
+    shake128_init, keccak_write, keccak_final, keccak_read, keccak_extract,
     _gcry_shake128_hash_buffers,
     sizeof (KECCAK_CONTEXT),
     run_selftests
@@ -1639,8 +1639,8 @@ const gcry_md_spec_t _gcry_digest_spec_shake128 =
 const gcry_md_spec_t _gcry_digest_spec_shake256 =
   {
     GCRY_MD_SHAKE256, {0, 1},
-    "SHAKE256", shake256_asn, DIM (shake256_asn), oid_spec_shake256, 0,
-    shake256_init, keccak_write, keccak_final, NULL, keccak_extract,
+    "SHAKE256", shake256_asn, DIM (shake256_asn), oid_spec_shake256, 64,
+    shake256_init, keccak_write, keccak_final, keccak_read, keccak_extract,
     _gcry_shake256_hash_buffers,
     sizeof (KECCAK_CONTEXT),
     run_selftests
Jun 19 2023, 4:53 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

Reading RFC 8702, I realized that it defines the hash size in the use of CMS as: SHAKE128 : 32-byte SHAKE256 : 64-byte.

Jun 19 2023, 4:47 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

Applied rC8cdd0d353e19: cipher:pubkey: Check digest size which should not be zero. for 1.10.

Jun 19 2023, 4:36 AM · libgcrypt, FIPS, Bug Report

Jun 16 2023

werner added a subtask for T6540: gpgsm creates invalid CSR (invalid signature) when given invalid subject name: T6541: gpgsm incorrectly prompts "Possible actions for a RSA key:" and shows "Key-Length: 1024" when using nistp521r1 ECDSA key.
Jun 16 2023, 5:55 PM · gnupg24, S/MIME, Bug Report
werner added a parent task for T6541: gpgsm incorrectly prompts "Possible actions for a RSA key:" and shows "Key-Length: 1024" when using nistp521r1 ECDSA key: T6540: gpgsm creates invalid CSR (invalid signature) when given invalid subject name.
Jun 16 2023, 5:55 PM · gnupg24, S/MIME, Bug Report
werner triaged T6541: gpgsm incorrectly prompts "Possible actions for a RSA key:" and shows "Key-Length: 1024" when using nistp521r1 ECDSA key as Low priority.
Jun 16 2023, 5:55 PM · gnupg24, S/MIME, Bug Report
werner triaged T6540: gpgsm creates invalid CSR (invalid signature) when given invalid subject name as Normal priority.

Use Kleopatra which constructs the DN for you ;-).

Jun 16 2023, 5:52 PM · gnupg24, S/MIME, Bug Report
jjakob added a project to T6541: gpgsm incorrectly prompts "Possible actions for a RSA key:" and shows "Key-Length: 1024" when using nistp521r1 ECDSA key: Bug Report.
Jun 16 2023, 4:31 PM · gnupg24, S/MIME, Bug Report
jjakob created T6540: gpgsm creates invalid CSR (invalid signature) when given invalid subject name.
Jun 16 2023, 4:27 PM · gnupg24, S/MIME, Bug Report
gniibe claimed T6539: The digest&sign/verify API with SHAKE-class digests does not work.
Jun 16 2023, 9:36 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

I found this use case: RFC 8702
"Use of the SHAKE One-Way Hash Functions in the Cryptographic Message Syntax (CMS)": https://www.rfc-editor.org/rfc/rfc8702.html

Jun 16 2023, 9:35 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T6539: The digest&sign/verify API with SHAKE-class digests does not work.

Another possibility for digest&sign API: it is possible to determine the length of required hash function by the underlining field Fp of the curve in use. Then, use this length instead. It's better than to (try to) get the length by _gcry_md_get_algo_dlen (for SHAKE, it's undefined).

Jun 16 2023, 9:16 AM · libgcrypt, FIPS, Bug Report
gniibe changed the status of T6507: SCRYPT does not work in FIPS mode from Open to Testing.

Fixed in both of master and 1.10 branch.

Jun 16 2023, 8:11 AM · libgcrypt, FIPS, Bug Report
gniibe changed the status of T6515: GPG in FIPS mode spits out useless "out of core handler ignored in FIPS mode" message on every execution from Open to Testing.
Jun 16 2023, 7:28 AM · FIPS, Bug Report
gniibe claimed T6515: GPG in FIPS mode spits out useless "out of core handler ignored in FIPS mode" message on every execution.

For libgcrypt, initially when the code was put, it made some sense.
Now, it's useless, so, let's simply remove the message.

Jun 16 2023, 7:28 AM · FIPS, Bug Report
gniibe changed the status of T6511: EdDSA support in FIPS mode from Open to Testing.

Added: rC547dfb5aecc1: cipher:ecc: Add selftests for EdDSA.
Added: rC3ac2bba4a4b1: cipher:ecc: Implement PCT for EdDSA.

Jun 16 2023, 7:12 AM · FIPS, libgcrypt, Bug Report

Jun 15 2023

Jakuje created T6539: The digest&sign/verify API with SHAKE-class digests does not work.
Jun 15 2023, 5:34 PM · libgcrypt, FIPS, Bug Report

Jun 14 2023

werner added a project to T6536: Extend P12 parser for ShroudedKeyBag inside a CertBag: Bug Report.
Jun 14 2023, 12:39 PM · gnupg24 (gnupg-2.4.4), gnupg22 (gnupg-2.2.42), Bug Report, S/MIME, Restricted Project
gniibe added a comment to T6511: EdDSA support in FIPS mode.

I found that for EdDSA other than pure Ed25519, it can supply context.
I changed the semantics and API for adding context and input data, as we need to support both simultaneously.

Jun 14 2023, 7:49 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T6511: EdDSA support in FIPS mode.

I changed the lg-input-data.diff patch not to break the ABI, reusing the published symbol of gcry_pk_random_override_new.
With this approach, if/when needed, backporting may be easier.
Drawback is debugging internal of libgcrypt will be a bit confusing.

Jun 14 2023, 4:50 AM · FIPS, libgcrypt, Bug Report

Jun 13 2023

werner triaged T6535: Failure to export plaintext v5 secret key. as Normal priority.
Jun 13 2023, 7:41 PM · gnupg24, Bug Report
werner added a project to T6535: Failure to export plaintext v5 secret key.: gnupg24.

Thanks, we will take care of this.

Jun 13 2023, 7:41 PM · gnupg24, Bug Report
onickolay updated the task description for T6535: Failure to export plaintext v5 secret key..
Jun 13 2023, 2:43 PM · gnupg24, Bug Report
onickolay created T6535: Failure to export plaintext v5 secret key..
Jun 13 2023, 2:42 PM · gnupg24, Bug Report
werner added a comment to T6515: GPG in FIPS mode spits out useless "out of core handler ignored in FIPS mode" message on every execution.

Let's fix this in Libgcrypt (ignore setting of the handler)

Jun 13 2023, 11:19 AM · FIPS, Bug Report
Jakuje added a comment to T6511: EdDSA support in FIPS mode.

Another approach would be having "non-hash" algo for gcry_md_open.

Jun 13 2023, 9:53 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T6511: EdDSA support in FIPS mode.

Before adding FIPS support flag and tests, we need to modify implementation:

  • Adding PCT check for EdDSA
  • Adding support of gcry_pk_hash_sign/verify API for EdDSA
Jun 13 2023, 6:33 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T6271: The old FSF address in libgcrypt source code.

Thanks. I think that it was the oldest one: FSF used to be there in Cambridge, then moved to Tremont St. in Boston, and now it's in Franklin St.

Jun 13 2023, 3:10 AM · Documentation, libgcrypt, Bug Report

Jun 12 2023

Jakuje added a comment to T6271: The old FSF address in libgcrypt source code.

FYI, while going through the licenses again I noticed one of the pinentry files have even older address that so if you would do sed, this would not be matched:

Jun 12 2023, 4:11 PM · Documentation, libgcrypt, Bug Report
Coelacanthus added a comment to T6336: Don't use deprecated --supervised option in example systemd service units.

Actually, the entire systemd based launching is deprecated and thus the logged warning is on purpose.

The problem with the systemd launched gpg-agent is that it creates a race: gpg launches gpg-agent as needed and to avoid concurrent launching by other gpg or gpgsm processes, it takes a file system lock during the launch process. systemd does not know about this and we end up with sometimes end up with two gpg-agent processes. Eventually one of those processes detects that it does not own the socket and terminates itself. No real harm here but you may see smart card lockups or a flushed password cache.

Jun 12 2023, 11:56 AM · Bug Report
werner added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

I consider the entire idea of receiving a passphrase and data on the same channel to be a bad for security and robust coding. The whole thing is a historical oddity which we kept for the sake of mutt(1)'s legacy way of invoking pgp. Thus I won't consider 3) the best option.

Jun 12 2023, 8:22 AM · Emacs, gnupg, Bug Report
gniibe added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

To summarize, here is the situation:

  • Ideally, it would be good to modify GnuPG and Emacs EasyPG to implement status handling and input handling in better way.
Jun 12 2023, 2:13 AM · Emacs, gnupg, Bug Report

Jun 10 2023

thesamesam added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

Ah, I see https://dev.gnupg.org/rG2f872fa68c6576724b9dabee9fb0844266f55d0d applies cleanly. I guess can go with that, although would prefer it if on the 2.4 branch.

Jun 10 2023, 11:00 PM · Emacs, gnupg, Bug Report
thesamesam added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

Is there a commit we could backport downstream to 2.4.x? We've had quite a few reports of this.

Jun 10 2023, 10:56 PM · Emacs, gnupg, Bug Report

Jun 8 2023

gniibe added a comment to T6511: EdDSA support in FIPS mode.

I'm going to add selftest of EdDSA with test vectors from RFC 8032.

Jun 8 2023, 8:32 AM · FIPS, libgcrypt, Bug Report
gniibe changed the status of T6512: keyboxd with data pipe from Open to Testing.

With the fix of T6523, make check goes all well (on Wine emulation and on Windows, for i686 and for x86_64).

Jun 8 2023, 7:45 AM · gnupg26, Bug Report
gniibe changed the status of T6523: gpgscm: call-with-io deadlock when larger stderr output from Open to Testing.

Fixed in master.

Jun 8 2023, 7:43 AM · gnupg26, Bug Report
gniibe changed the status of T6523: gpgscm: call-with-io deadlock when larger stderr output, a subtask of T6512: keyboxd with data pipe, from Open to Testing.
Jun 8 2023, 7:43 AM · gnupg26, Bug Report
gniibe added a comment to T6523: gpgscm: call-with-io deadlock when larger stderr output.

I modified ffi.c, to have renamed process-spawn-io function doing I/O by C.

Jun 8 2023, 7:39 AM · gnupg26, Bug Report
gniibe triaged T6523: gpgscm: call-with-io deadlock when larger stderr output as Low priority.
Jun 8 2023, 7:37 AM · gnupg26, Bug Report

Jun 7 2023

gniibe added a comment to T6512: keyboxd with data pipe.

Calling assuan_release before kbx_client_data_release is the best (and we join the thread).

Jun 7 2023, 8:24 AM · gnupg26, Bug Report

Jun 6 2023

ebo closed T6196: Kleopatra: Canceling encrypt operation in the notepad causes a bogus error message as Resolved.

works

Jun 6 2023, 8:51 AM · Restricted Project, kleopatra, Bug Report

Jun 5 2023

werner changed the status of T6503: Do not make use of the VirtualStore under Windows from Open to Testing.

Works in kleopatra; tested with gpg4win-4.2.0-beta339.

Jun 5 2023, 12:53 PM · gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.2), Bug Report, kleopatra
werner triaged T6515: GPG in FIPS mode spits out useless "out of core handler ignored in FIPS mode" message on every execution as Normal priority.
Jun 5 2023, 12:49 PM · FIPS, Bug Report
gniibe added a comment to T6512: keyboxd with data pipe.

tests/openpgp/import.scm hangs with 4096*4.

Jun 5 2023, 7:03 AM · gnupg26, Bug Report

Jun 2 2023

werner edited projects for T3164: The argument parser does not detect invalid integers, added: gpgrt, Bug Report; removed common.
Jun 2 2023, 11:52 AM · Bug Report, gpgrt
werner removed a project from T5323: adduid and key expiration oddity in gpg-wks-client: gnupg (gpg23).
Jun 2 2023, 11:49 AM · gnupg24, Bug Report, wkd
gniibe added a comment to T6512: keyboxd with data pipe.

Test with Wine (i686) emulation, I encountered another hang at: Checking armored_key_8192

Jun 2 2023, 8:33 AM · gnupg26, Bug Report
gniibe added a comment to T6512: keyboxd with data pipe.

It looks like having the datastream_thread may be not worth.
One possibility is to implement synchronous read from pipe in kbx_client_data_wait, instead of datastream_thread.

Jun 2 2023, 8:29 AM · gnupg26, Bug Report

Jun 1 2023

SineSwiper created T6515: GPG in FIPS mode spits out useless "out of core handler ignored in FIPS mode" message on every execution.
Jun 1 2023, 5:48 PM · FIPS, Bug Report
ikloecker changed the status of T6492: Kleopatra: Entries in certificate drop-down are not sorted from Open to Testing.

When testing please note that the last changes (i.e. "Ignore expired subkeys when looking for newest subkey" and ""Sort by fingerprint as last resort for deterministic sort order") have not been merged to the gpg4win/3.1.27 branch.

Jun 1 2023, 10:49 AM · Restricted Project, kleopatra, Bug Report
gniibe claimed T6511: EdDSA support in FIPS mode.
Jun 1 2023, 9:46 AM · FIPS, libgcrypt, Bug Report
werner raised the priority of T6511: EdDSA support in FIPS mode from Normal to High.

They re-used the same file name for the update from March and no history section. Anyway that looks promising and may solve the problem of having different algorithms allowed for restricted communication in the EU and the US.

Jun 1 2023, 9:26 AM · FIPS, libgcrypt, Bug Report
Jakuje added a comment to T6511: EdDSA support in FIPS mode.

Correct, but the last revision of FIPS 140-3 lists the EdDSA already. The same for the IG for FIPS 140-3:

Jun 1 2023, 9:08 AM · FIPS, libgcrypt, Bug Report
werner triaged T6511: EdDSA support in FIPS mode as Normal priority.

My understanding is that FIPS 186-x lists more algorithms than approved for FIPS 140-y; the approved algorithms for 140-y are in the latest revisions of SP800-140. I have not checked the latter document, though.

Jun 1 2023, 9:05 AM · FIPS, libgcrypt, Bug Report
werner triaged T6512: keyboxd with data pipe as Low priority.

See also commit rG6fcc263c18 from 2020 where I switched to D-lines.

Jun 1 2023, 8:57 AM · gnupg26, Bug Report
gniibe added a comment to T6512: keyboxd with data pipe.

The problem of hang of tests/openpgp/multisig.scm is solved by rGef4f22b9d98b: gpg: Graceful exit for signature checking with --batch.
But the problem itself is not yet solved.

Jun 1 2023, 5:04 AM · gnupg26, Bug Report
gniibe added a comment to T6512: keyboxd with data pipe.

It is reproducible by testing tests/openpgp/multisig.scm with keyboxd enabled (it hangs), with the modification of following.

Jun 1 2023, 4:58 AM · gnupg26, Bug Report
gniibe created T6512: keyboxd with data pipe.
Jun 1 2023, 4:51 AM · gnupg26, Bug Report

May 31 2023

Jakuje created T6511: EdDSA support in FIPS mode.
May 31 2023, 4:51 PM · FIPS, libgcrypt, Bug Report

May 30 2023

werner triaged T6507: SCRYPT does not work in FIPS mode as Normal priority.
May 30 2023, 1:42 PM · libgcrypt, FIPS, Bug Report
Jakuje created T6507: SCRYPT does not work in FIPS mode.
May 30 2023, 11:33 AM · libgcrypt, FIPS, Bug Report
werner moved T6497: gpgtar does not return failure code to gpgme from QA to gnupg-2.4.2 on the gnupg24 board.
May 30 2023, 10:55 AM · gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.2), Bug Report, Restricted Project
werner moved T6503: Do not make use of the VirtualStore under Windows from QA to gnupg-2.4.2 on the gnupg24 board.
May 30 2023, 10:54 AM · gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.2), Bug Report, kleopatra
werner renamed T6504: Adding an ADSK to several keys may fail with Wrong Key Usage. from Adding an ADKS to several keys may fail with Wrong Key Usage. to Adding an ADSK to several keys may fail with Wrong Key Usage..
May 30 2023, 10:36 AM · gnupg24 (gnupg-2.4.2), OpenPGP, Bug Report

May 29 2023

chengr28 added a comment to T6322: The warning "lower 3 bits of the secret key are not cleared" keeps showing even cv25519 key was generated by GnuPG.

And thanks gniibe! I have tested 2.4.1 several times in this month (including existing and new keys), the warning was never shown again.

May 29 2023, 9:14 AM · gnupg24, Bug Report
chengr28 added a comment to T6322: The warning "lower 3 bits of the secret key are not cleared" keeps showing even cv25519 key was generated by GnuPG.

Hi zhangguangzhi, I think that it's version-specific problem.
I traced the chain and this warning message was added in release 2.3.3 T5565.
The problem should be able to reproduce between 2.3.3 and 2.4.0.

May 29 2023, 8:45 AM · gnupg24, Bug Report
zhangguangzhi added a comment to T6322: The warning "lower 3 bits of the secret key are not cleared" keeps showing even cv25519 key was generated by GnuPG.

Hi,i try to reproduce the problem, my platform is linux and gnupg2-2.2.32-3, but i can't find “gpg: warning: lower 3 bits of the secret key are not cleared". Excuse me, is this a platform-specific or version-specific problem, or is it my operation wrong.

May 29 2023, 5:53 AM · gnupg24, Bug Report

May 26 2023

werner changed the status of T6497: gpgtar does not return failure code to gpgme from Open to Testing.
May 26 2023, 3:57 PM · gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.2), Bug Report, Restricted Project
werner added a comment to T6386: gpg-agent 2.2: Command "READKEY --card --no-data -- OPENPGP.1" overwrites protected-private-key with shadowed-private-key.

Due to back porting another change the fix for 2.2 is now also needed in 2.4.

May 26 2023, 2:25 PM · gnupg22 (gnupg-2.2.42), Bug Report
werner edited projects for T6465: Store the ECDH parameters in the key file, added: gnupg26; removed gnupg24.
May 26 2023, 10:00 AM · gnupg26, OpenPGP, scd, Bug Report

May 25 2023

werner added a comment to T6375: gpg-agent race-condition with parallel clients.

FWIW: I have not done any tests but the comment below is about the case I suspected to be the cuase for your problem:

May 25 2023, 3:13 PM · gnupg24, gpgagent, Bug Report
werner closed T6179: gnupg 2.3.7 broke YubiKey support: DBG: Curve with OID not supported: 2b06010401da470f01 as Resolved.
May 25 2023, 12:44 PM · gnupg24, scd, Bug Report
werner closed T6504: Adding an ADSK to several keys may fail with Wrong Key Usage. as Resolved.

The fix actually does the same as my suggested workaround.

May 25 2023, 12:03 PM · gnupg24 (gnupg-2.4.2), OpenPGP, Bug Report
werner moved T6504: Adding an ADSK to several keys may fail with Wrong Key Usage. from Backlog to gnupg-2.4.2 on the gnupg24 board.
May 25 2023, 12:03 PM · gnupg24 (gnupg-2.4.2), OpenPGP, Bug Report
werner lowered the priority of T6504: Adding an ADSK to several keys may fail with Wrong Key Usage. from High to Normal.

There is an easy workaround: Append an exclamation mark to the adsk key. This way gpg will only search for this subkey.
An example with my test keys:

May 25 2023, 11:21 AM · gnupg24 (gnupg-2.4.2), OpenPGP, Bug Report
werner moved T6503: Do not make use of the VirtualStore under Windows from Backlog to QA on the gnupg22 board.
May 25 2023, 11:11 AM · gnupg22 (gnupg-2.2.42), gnupg24 (gnupg-2.4.2), Bug Report, kleopatra