Page MenuHome GnuPG
Feed Advanced Search

Feb 16 2024

werner closed T6999: Are you aware of implementations which would generate signatures with 0x0001 lbits in signature? as Resolved.

No, I am not aware. I can't remember whether PGP once had such a bug because @dshaw did most cross-testing and fixing for PGP bugs. I would suggest to remove any such checks. IIRC, this was introduced by PGP 2 to speed up signature checking. 30 years ago RSA operations were quite expensive.

Feb 16 2024, 10:01 AM · Documentation, gnupg

Feb 15 2024

werner added a comment to T6991: Adding XDG Base Directory paths as *fallbacks* over the existing ~/.gnupg paths.

That is simply because your XDG_RUNTIME is set to the same directory gnupg uses. See gnupg/common/homedir.c:_gnupg_socketdir_internal

Feb 15 2024, 5:44 PM · Support, gnupg, Feature Request
90 added a comment to T6991: Adding XDG Base Directory paths as *fallbacks* over the existing ~/.gnupg paths.

Funnily enough, runtime sockets already adhere to the XDGBDS somewhat by using $XDG_RUNTIME_DIR/gnupg as their path, while everything else uses strictly $GNUPGHOME or ~/.gnupg with no other alternative. Of course, I completely understand that the priority for this is rather low, but I am still happy to look into providing a patch myself that would add these fallbacks if it would help expedite the whole process.

Feb 15 2024, 5:36 PM · Support, gnupg, Feature Request
gniibe claimed T5894: Various issues with system headers and _WIN32_WINNT value in MinGW build of gnupg-2.3.4.

In master, I applied changes for include files which don't harm current target of MinGW-64.

Feb 15 2024, 6:48 AM · gnupg, Feature Request
gniibe added projects to T6991: Adding XDG Base Directory paths as *fallbacks* over the existing ~/.gnupg paths: gnupg, Support.
Feb 15 2024, 3:41 AM · Support, gnupg, Feature Request

Feb 11 2024

wiz added a comment to T5993: gpg should reject compressed packets outside of messages.

This is referenced from https://nvd.nist.gov/vuln/detail/CVE-2022-3219 for CVE-2022-3219. Can this please be fixed?

Feb 11 2024, 11:09 AM · Feature Request, gnupg

Feb 8 2024

aheinecke closed T5620: GnuPG, pinentry: Passphrase pattern error / warning does not match new logic as Resolved.

I think we can close this issue. Ikloecker explained why. The hint comes from the help files and I think at the time I opened the issue I did not use the help messages.

Feb 8 2024, 9:02 AM · gnupg, Restricted Project

Feb 7 2024

werner triaged T6962: gpg lock issue on Alma Linux upgraded servers as Normal priority.
Feb 7 2024, 9:21 AM · Support, gnupg
werner triaged T6975: The option --default-key gives up too early if there are multiple matches as Normal priority.
Feb 7 2024, 9:21 AM · Feature Request, gnupg
Angel added a comment to T6975: The option --default-key gives up too early if there are multiple matches.

Ingo, I concede it might be considered a bug on Request Tracker that it does not allow to specify the key as a fingerprint (or calculates it automatically from the email instead of relying on gpg doing it), but you generally want to keep expired keys around for decryption.

Feb 7 2024, 3:29 AM · Feature Request, gnupg

Feb 6 2024

ikloecker added a comment to T6975: The option --default-key gives up too early if there are multiple matches.

Quite frankly, if a third party application calls gpg with anything other than fingerprints to specify keys it's asking for trouble. I have changed KMail from using user IDs to using fingerprints when calling gpg more than 20 years ago.

Feb 6 2024, 8:42 AM · Feature Request, gnupg
Angel reopened T6975: The option --default-key gives up too early if there are multiple matches as "Open".

Sorry, Werner, but I have to disagree on this. Specifying them by fingerprint only works if you have a specific field for the key (including the case where you are just it on the config file).

Feb 6 2024, 3:17 AM · Feature Request, gnupg

Feb 5 2024

werner closed T6975: The option --default-key gives up too early if there are multiple matches as Wontfix.

Instead of tweaking this and risk a regression for some users I added a suggested to the man page to use a fingerprint.

Feb 5 2024, 8:53 AM · Feature Request, gnupg
werner closed T6972: Explicitly deprecate --use-embedded-filename -- it is hazardous as Resolved.

Unfortunately there are real world applications which make use of this option in special environments. Thus we can't remove it. I improved the warning in the man page.

Feb 5 2024, 8:44 AM · Documentation, gnupg, patch
werner closed T6974: Bump requisites on 2.2.x as Resolved.
Feb 5 2024, 8:24 AM · gnupg
werner added a project to T6974: Bump requisites on 2.2.x: gnupg.

There will be a 2.2.43 soonish. Thanks for the patch.

Feb 5 2024, 8:24 AM · gnupg
werner closed T6973: uninitialized err on p12_parse as Resolved.

Thanks. Applied to 2.4 will eventually be merged into master.

Feb 5 2024, 7:55 AM · gnupg
Angel added a comment to T6973: uninitialized err on p12_parse.

Feb 5 2024, 4:54 AM · gnupg
Angel created T6975: The option --default-key gives up too early if there are multiple matches.
Feb 5 2024, 1:26 AM · Feature Request, gnupg
Angel created T6973: uninitialized err on p12_parse.
Feb 5 2024, 12:40 AM · gnupg

Feb 4 2024

Angel merged task T2759: Misleading error message when trying to sign with an expired key into T4704: Wrong error message when key is expired.
Feb 4 2024, 3:55 AM · Bug Report, gnupg
Angel added a comment to T2759: Misleading error message when trying to sign with an expired key.

This was reported again 3 years later as T4704, and finally fixed in gnupg-2.4.4, released last week.

Feb 4 2024, 3:55 AM · Bug Report, gnupg

Feb 1 2024

kigikah added a comment to T6962: gpg lock issue on Alma Linux upgraded servers.
Feb 1 2024, 5:38 AM · Support, gnupg

Jan 30 2024

ncssyedaf added a comment to T6962: gpg lock issue on Alma Linux upgraded servers.

Thanks! We will try this out and update you with the results.

Jan 30 2024, 2:12 PM · Support, gnupg
werner edited projects for T6962: gpg lock issue on Alma Linux upgraded servers, added: gnupg, Support; removed Bug Report.

Since 2.2.20 we had these items in the NEWS

Jan 30 2024, 11:04 AM · Support, gnupg
gniibe closed T6923: gpg fails to parse sensitive revokers from param files as Resolved.

Fixed in GnuPG 2.4.4.

Jan 30 2024, 4:05 AM · gnupg, Bug Report

Jan 27 2024

stardiviner added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

I upgraded to gnupg 1.4.4 now, the problem is gone. Thanks for working.

Jan 27 2024, 5:09 AM · Emacs, gnupg, Bug Report

Jan 26 2024

fgunbin added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

Thanks @gniibe and everybody!

Jan 26 2024, 5:32 PM · Emacs, gnupg, Bug Report
gniibe closed T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG) as Resolved.

Fixed in GnuPG 2.4.4.

Jan 26 2024, 1:11 AM · Emacs, gnupg, Bug Report

Jan 25 2024

werner updated the task description for T6578: Release GnuPG 2.4.4.
Jan 25 2024, 11:37 AM · gnupg24 (gnupg-2.4.4), Release Info

Jan 24 2024

ikloecker created T6956: GnuPG: Allow import of gpgsk files.
Jan 24 2024, 9:30 AM · gnupg26, Feature Request, Restricted Project

Jan 23 2024

juergenhoetzel added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

Arch Linux: https://gitlab.archlinux.org/archlinux/packaging/packages/gnupg
FreeBSD: https://cgit.freebsd.org/ports/tree/security/gnupg

I don't see the patch is applied. Please wait for GnuPG release 2.4.4.

Jan 23 2024, 12:36 PM · Emacs, gnupg, Bug Report
ikloecker added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

Indeed, openSUSE has applied the patch: https://build.opensuse.org/package/show/openSUSE%3AFactory/gpg2

Jan 23 2024, 8:18 AM · Emacs, gnupg, Bug Report
gniibe added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

Arch Linux: https://gitlab.archlinux.org/archlinux/packaging/packages/gnupg
FreeBSD: https://cgit.freebsd.org/ports/tree/security/gnupg

Jan 23 2024, 1:05 AM · Emacs, gnupg, Bug Report

Jan 22 2024

ikloecker added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

Works as expected on openSUSE Tumbleweed with gpg2-2.4.3-4.2.x86_64:

$ gpg2 --version
gpg (GnuPG) 2.4.3
libgcrypt 1.10.3
[...]
Jan 22 2024, 10:02 PM · Emacs, gnupg, Bug Report
juergenhoetzel added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

i still observe the same behavior:

What do you mean? I can't replicate the behavior described by you, using the GnuPG from the repo, or the one of Debian 2.4.3-2.

Jan 22 2024, 6:04 PM · Emacs, gnupg, Bug Report
gniibe added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

i still observe the same behavior:

Jan 22 2024, 5:57 AM · Emacs, gnupg, Bug Report

Jan 21 2024

juergenhoetzel added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

For a while, distributions can apply rG2f872fa68c65 for 2.4 series.

Jan 21 2024, 7:59 PM · Emacs, gnupg, Bug Report

Jan 18 2024

ebo closed T6736: Year 2038 issue for key validity date, a subtask of T4195: Fix time API in gpgme, as Resolved.
Jan 18 2024, 11:43 AM · gnupg, kleopatra, Restricted Project, gpgme, Feature Request

Jan 15 2024

aheinecke triaged T6927: gpgsm: Accept file names for input and output in server mode as Low priority.

I do not think this is a very common usecase. For me regarding CMS file operations it would be more important to implement T2435: gpgsm combined sign and encrypt which I find the most annyoing issue regarding CMS file encryption.

Jan 15 2024, 10:50 AM · gnupg, Restricted Project

Jan 12 2024

werner renamed T6929: Kleopatra: Allow revocation of RSA 2048 keys from Kleopatra: Allow revokation of RSA 2048 keys to Kleopatra: Allow revocation of RSA 2048 keys.
Jan 12 2024, 4:44 PM · kleopatra, gnupg
werner moved T5768: Dirmngr: Use windows proxy settings if system proxy settings should be used from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Jan 12 2024, 3:52 PM · Feature Request, gnupg, Restricted Project
werner closed T5768: Dirmngr: Use windows proxy settings if system proxy settings should be used as Resolved.
Jan 12 2024, 3:52 PM · Feature Request, gnupg, Restricted Project
werner closed T5252: bad expiration value when using --batch Creation-Date/Expire-Date as Resolved.
Jan 12 2024, 3:36 PM · gnupg, Bug Report

Jan 11 2024

werner added a project to T5590: OpenPGP: Curve 448, modernize?: rationale.
Jan 11 2024, 4:02 PM · rationale, gnupg, OpenPGP
werner closed T5590: OpenPGP: Curve 448, modernize? as Wontfix.

Way to late for a change and also adding another algorithm (SIV) complicates things for no good purposes.

Jan 11 2024, 4:00 PM · rationale, gnupg, OpenPGP
werner added a comment to T6927: gpgsm: Accept file names for input and output in server mode.

This either requires an updated libassuan which allows "INPUT FILE=foo" in addition to INPUT FD=n" or using custom handlers in for INPUT et al. in gpgsm. I'd prefer the former. Anoter option would be to open and close the file in ggpgme and pass the fd.

Jan 11 2024, 12:03 PM · gnupg, Restricted Project
werner changed the status of T6929: Kleopatra: Allow revocation of RSA 2048 keys from Open to Testing.

Already done with rG89c7eccba51554 which will be in the next VSD release.

Jan 11 2024, 12:00 PM · kleopatra, gnupg
ebo created T6929: Kleopatra: Allow revocation of RSA 2048 keys.
Jan 11 2024, 10:57 AM · kleopatra, gnupg
werner triaged T6923: gpg fails to parse sensitive revokers from param files as Normal priority.
Jan 11 2024, 9:09 AM · gnupg, Bug Report

Jan 10 2024

ikloecker placed T6927: gpgsm: Accept file names for input and output in server mode up for grabs.
Jan 10 2024, 2:24 PM · gnupg, Restricted Project
ikloecker created T6927: gpgsm: Accept file names for input and output in server mode.
Jan 10 2024, 2:03 PM · gnupg, Restricted Project

Jan 4 2024

werner closed T1839: Can't Encrypt with PIV-I Encryption Certificate - Unsupported Certificate as Resolved.

Note that we now have also an option instead of the workaround from 2015

Jan 4 2024, 4:18 PM · gnupg, dirmngr, S/MIME, Feature Request
aheinecke merged T6876: GPGME(++) Add "include-key-block" and "auto-key-import" to context flags into T4856: GPG: Key Exchange Put public OpenPGP key into signature.
Jan 4 2024, 8:50 AM · Feature Request, gpgol, Keyserver, gnupg

Jan 3 2024

ebo added a subtask for T6626: Kleopatra: Improve certification and revocation: T6712: Kleopatra: When revoking a local certification do not ask to publish the revocation.
Jan 3 2024, 11:27 AM · kleopatra
ebo added a subtask for T6626: Kleopatra: Improve certification and revocation: Unknown Object (Maniphest Task).
Jan 3 2024, 10:37 AM · kleopatra

Dec 27 2023

gniibe changed the status of T6641: pinentry-tty & pinentry-curses breaks tty when timeout occurs or CTRL-C is pressed from Open to Testing.
Dec 27 2023, 1:33 AM · gnupg, pinentry
gniibe changed the status of T6843: after enable kdf-setup impossible change user/admin pin from Open to Testing.

It would be good to apply this to 2.2, so adding "backport" tag.

Dec 27 2023, 1:25 AM · gnupg22 (gnupg-2.2.43), scd, yubikey

Dec 26 2023

dkg added a comment to T6222: gpg --faked-system-time "$(date +%s)!" doesn't work.

One use case that seems sensible to me is to try to convince a long-running operation (e.g. a sequence of key generations) to all use a single timestamp. In this scenario, there's no interest in setting the clock to be some variant of the current time, just an interest in it remaining fixed across all the operations.

Dec 26 2023, 5:57 PM · gnupg, Bug Report
gniibe closed T2440: scdaemon grabs card exclusively; it'd be nice if it didn't as Resolved.

GnuPG 2.2 and 2.4 now have --pcsc-shared option for a user who can control his action in detail.
So, closing this bug report.

Dec 26 2023, 7:00 AM · scd, Feature Request, gnupg
gniibe triaged T6908: Windows: file watching to support things like inotify as Wishlist priority.
Dec 26 2023, 5:27 AM · gnupg, Windows

Dec 22 2023

gniibe edited projects for T6843: after enable kdf-setup impossible change user/admin pin, added: gnupg, scd; removed Support, Windows.

Thank you for the bug report. Although it's a corner case, it is a discrepancy in the implementation which results unrecoverable situation of the device.

Dec 22 2023, 3:44 AM · gnupg22 (gnupg-2.2.43), scd, yubikey

Dec 21 2023

werner added a comment to T6902: gpgconf: the questionable value 256 for flags in gpgrt_opt_t.

That was my fault in commit rG8fc9de8d6bf663f7c8419b42dab01f590a694d59 obviously I assumed that the macros were always used.

Dec 21 2023, 10:25 AM · gnupg22 (gnupg-2.2.43), gnupg24 (gnupg-2.4.4)

Dec 20 2023

andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

@aheinecke as promised, attached some test vectors:

Dec 20 2023, 12:42 PM · Feature Request, gnupg
gniibe created T6902: gpgconf: the questionable value 256 for flags in gpgrt_opt_t.
Dec 20 2023, 1:32 AM · gnupg22 (gnupg-2.2.43), gnupg24 (gnupg-2.4.4)

Dec 19 2023

andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

This has always worked on the client site since we implemented keyserver access.

Dec 19 2023, 3:57 PM · Feature Request, gnupg
werner added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

I see no problem to return only revocation packets. Clients must verify them anyway against their public keys and the fingerprint makes this easy. Verification against a primary key delivered along the revocation is more or less useless because that primary key must anyway been looked up in the client's keyring and th local existance of a primary key is anyway required to ask a keyserver for a revocation.

Dec 19 2023, 1:49 PM · Feature Request, gnupg
andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

The trick here is that during import gpg tracks those invalid signatures and then tries to apply them to other keys.

Dec 19 2023, 1:17 PM · Feature Request, gnupg
werner added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Appended. Yes, it is considered an invalid signature and ignored. Anyone can insert an invalid signature. The trick here is that during import gpg tracks those invalid signatures and then tries to apply them to other keys. The use case here is this:

Dec 19 2023, 12:56 PM · Feature Request, gnupg
andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

If you need the fingerprint, why don't you take it from the revocation certificate - for many years it is in subpacket 33.

Dec 19 2023, 12:51 PM · Feature Request, gnupg
aheinecke added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Hi, Andre.
...

Thanks for the explanation. To me this sounds very reasonable and I think that I am starting to better understand your use case in Hockeypuck.
Having a test example key + the intended revocation update would help at least me to dig into it a bit and see how this might conflict with RFC4880.

Dec 19 2023, 12:48 PM · Feature Request, gnupg
andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

I'm curious about the parsing implications of this bit:

Dec 19 2023, 12:46 PM · Feature Request, gnupg
werner added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Well, the quoted paragraph ended with a

Dec 19 2023, 12:46 PM · Feature Request, gnupg
andrewgdotcom added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Individual UID revocation sigs are not particularly useful, because they cannot be validated without the original UID. Such things are out of scope.

Dec 19 2023, 12:04 PM · Feature Request, gnupg
aheinecke added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Hi,
so I talked to werner about this, and of course GnuPG accepts minimal revocations.
A revocation certificate. So that was my point. As he understood you, you wanted to revoke not the whole key but only a single user id but without the user id packet? Sorry I am not really the protocol expert. But for me a revoked key without any user ids sounds to me just like a "standard" revocation certificate revoking the whole key. And as said, that is well within the the Standard and accepted, and even used by GnuPG. E.g. in case of a keyrollover we attach such a minimal revocation certificate to WKD keys when we deliver key updates.

Dec 19 2023, 11:40 AM · Feature Request, gnupg
aheinecke added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

From a technical standpoint I think the most minimal revocations which are technically possible should be accepted and thus I endorse the feature request.

Dec 19 2023, 9:34 AM · Feature Request, gnupg
bernhard added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

In any case this is technically required

Dec 19 2023, 9:30 AM · Feature Request, gnupg
werner closed T6900: GnuPG: Accept revocation certificates without UserID as Wontfix.

Actually the public key is personalized data as much as a mail address. In any case this is technically required and users take an informed decisions when they distribute their public key to a site not controlled by them.

Dec 19 2023, 9:24 AM · Feature Request, gnupg

Dec 18 2023

aheinecke added a comment to T6900: GnuPG: Accept revocation certificates without UserID.

Just to clarify, above ticket does not reflect my Opinion. It is a direct quote from a different ticket. It is my expert opinion that a combination of "Name <email> + Cryptographic Data" is not a personalised dataset since anyone can create it. But let us please not argue about that.

Dec 18 2023, 8:17 PM · Feature Request, gnupg
aheinecke raised the priority of T6900: GnuPG: Accept revocation certificates without UserID from Normal to Needs Triage.
Dec 18 2023, 8:05 PM · Feature Request, gnupg
aheinecke triaged T6900: GnuPG: Accept revocation certificates without UserID as Normal priority.
Dec 18 2023, 8:05 PM · Feature Request, gnupg

Dec 12 2023

werner closed T6871: SmartCard stopped working in 2.4 as Resolved.
Dec 12 2023, 3:31 PM · gnupg, scd, Support, Documentation
aheinecke triaged T6860: Backup of Brainpool SMIME certificate not possible as Normal priority.

Should be fixed for the next release.

Dec 12 2023, 7:14 AM · kleopatra, gnupg
aheinecke added a comment to T6859: S/MIME keys are not deleted.

Checking if the key is not otherwise used is unrelated and should be a diifferent Task since this also relates to OpenPGP. For me this Task is about creating a similar API for gpgsm (--delete-secret-key) that we have for OpenPGP.

Dec 12 2023, 7:12 AM · Restricted Project, S/MIME, kleopatra, gnupg

Dec 11 2023

ebo added a comment to T6859: S/MIME keys are not deleted.

As it is so complicated to check all possibilities:

Dec 11 2023, 5:12 PM · Restricted Project, S/MIME, kleopatra, gnupg
werner added a comment to T6859: S/MIME keys are not deleted.

Searching by keygrip is actually fast with keyboxd.

Dec 11 2023, 5:04 PM · Restricted Project, S/MIME, kleopatra, gnupg
aheinecke lowered the priority of T6859: S/MIME keys are not deleted from Normal to Low.

Actually prio is rather low or even Wontfix. Since it has been this way forever and no one really complained. I think deleting secret keys esp. for S/MIME where you can't just create a testing key but need to have it signed by a CA is not really there.

Dec 11 2023, 1:15 PM · Restricted Project, S/MIME, kleopatra, gnupg
aheinecke triaged T6859: S/MIME keys are not deleted as Normal priority.

I know I discussed this with werner several times and never really understood it because it makes for an inconsistent user interface / user experience. You delete an OpenPGP Secret key and then the keyfile is gone, you delete an S/MIME secret key and then the keyfile still exists. But it has been so forever T960
Maybe kleopatra should for the very rare cases where a key is used by multiple certificates do a search for the keygrip and warn if this also deletes the secret portion of another secret key? But that would then be also true for OpenPGP.

Dec 11 2023, 1:12 PM · Restricted Project, S/MIME, kleopatra, gnupg
werner closed T6850: dirmngr fails `gpg --recv-key` in very non-obious way if local TOR node in SafeSocks mode is running as Wontfix.

For various reasons dirmngr requires and implements a full resolver and implements that. This way all DNS queries are passed through Tor. Thus this is a feature and not a bug. The error message could be better but we can only return what SOCKS tells us.

Dec 11 2023, 8:37 AM · gnupg, Tor, Not A Bug, dirmngr

Nov 30 2023

ebo created T6860: Backup of Brainpool SMIME certificate not possible .
Nov 30 2023, 3:23 PM · kleopatra, gnupg
ebo created T6859: S/MIME keys are not deleted.
Nov 30 2023, 2:53 PM · Restricted Project, S/MIME, kleopatra, gnupg

Nov 28 2023

jengelh added a comment to T2813: gnupg v2 does not allow for parallel processing any more.

What is your usecase of doing a thousand secret key operations (signing) on apparently extremely small data files a minute

Nov 28 2023, 12:28 AM · gnupg, Info Needed

Nov 27 2023

aheinecke added a comment to T2813: gnupg v2 does not allow for parallel processing any more.

by default we keep the unlocked secret key limited to this very tiny process (gpg-agent) which only does the secret key operations. That is I think the best decision. It is IMO not really a bottleneck since except for very small data bits the bottleneck is usually the hashing. What is your usecase of doing a thousand secret key operations (signing) on apparently extremely small data files a minute? And even then are you sure it is not your disk IO that is the bottleneck and it is in fact gpg-agent?

Nov 27 2023, 9:06 PM · gnupg, Info Needed
jengelh added a comment to T2813: gnupg v2 does not allow for parallel processing any more.

Why couldn't gpg-agent just fake these homedirs on its own?

Nov 27 2023, 5:58 PM · gnupg, Info Needed
aheinecke added a comment to T2813: gnupg v2 does not allow for parallel processing any more.

Well this depends of course. If the "Hard work" is the actual signing it depends a ton on your Key. An ECC key will go much quicker then for example RSA4096 but IMO the "Hard work" when signing is the hashing and that is done in parralel for extremely specialized setups you could run multiple gpg-agents in different homedirs with access to the same key.

Nov 27 2023, 4:13 PM · gnupg, Info Needed
jengelh added a comment to T2813: gnupg v2 does not allow for parallel processing any more.

I create 1000 empty files, and sign then using GNU parallel+gpg and trying various parallelization factors. (CPU used is AMD 3700X with 16 threads.)

Nov 27 2023, 11:32 AM · gnupg, Info Needed
ebo moved T6259: Kleopatra: Improve startup performance from WiP to vsd-3.2.0 on the vsd32 board.
Nov 27 2023, 8:42 AM · vsd32 (vsd-3.2.0), gnupg, kleopatra, Restricted Project

Nov 25 2023

aheinecke closed T6259: Kleopatra: Improve startup performance as Resolved.

I'm quite happy with that now. The only thing left to do would be to benchmark this, but to keep this as a an open task for that seems wrong.

Nov 25 2023, 10:16 PM · vsd32 (vsd-3.2.0), gnupg, kleopatra, Restricted Project
aheinecke closed T6344: Kleopatra, GPG: AboutData ctor on Windows takes too long, a subtask of T6259: Kleopatra: Improve startup performance , as Resolved.
Nov 25 2023, 5:06 PM · vsd32 (vsd-3.2.0), gnupg, kleopatra, Restricted Project

Nov 21 2023

ebo moved T6259: Kleopatra: Improve startup performance from QA to WiP on the vsd32 board.
Nov 21 2023, 4:14 PM · vsd32 (vsd-3.2.0), gnupg, kleopatra, Restricted Project