Here is an experimental change to support the feature.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Fri, Jul 11
I'm testing the following patch with experimental change of libgpg-error.
Wed, Jul 9
Tue, Jul 8
Mon, Jul 7
Thu, Jul 3
Can't you just use file descriptors everywhere and use _get_osfhandle. That is what I am used to seeing in Windows code in Gnulib (although I do not touch it much).
Wed, Jul 2
Regarding 64bit handles https://learn.microsoft.com/en-us/windows/win32/winprog64/interprocess-communication
tells us:
This seems to be a good opportunity to replace paperkey with a new tool to take advantage of the smaller ECC keys which allow us to re-generate most stuff.
Mon, Jun 30
Ingo tested this and it worked.
Thu, Jun 26
Wed, Jun 25
But we have the same problems on Unix as described by T7699. (funny, the other bug mentioned above has 76 reversed)
Mon, Jun 23
Wed, Jun 18
We decided in T7579: Kleopatra: improve menu items to remove this action. Users will instead have to mark certificates they want to update and use the Update Certificates action in the "Certificates" menu.
After several gpg4win-5 betas be can set this task to resolved.
I claim this resolved given several gpg4win-5 betas.
I claim this resolved given that we had several gpg4win-5 betas and no reported problems was related to this.
The actual project we had in mind for this was more or less canceled and thus I re-prioritize this task.
This was release with 2.5.7.
Tue, Jun 17
Jun 2 2025
We do this now also for gpg-wks-server. Further gpg-wks-client now sends the current language to the server so that the server can get back to the user with a proper translated text (if configured).
May 30 2025
Alright. We use utf-8 in our template files and switch to QP encoding when needed.
May 28 2025
Just as a reminder, knowledge transfer, because this is easily overlooked in testing but at least one customer would have gotten very annoyed if we had ever deployed an "Update all certificates" function which "added" new certificates. Even with the update of a single cert, we had a "funny" issue, like if you had expired certificates from anywhere and not from WKD (which old keyrings have a lot, maybe with many uids). Suddenly an update would pull in new keys which come from WKD but maybe there they all only have one UID. Because for keyservers the identifier was the fingerprint and for WKD the identifier was the userid.
Or even worse, you explicitly threw out the OpenPGP keys from WKD because you wanted to use only S/MIME, then such a function may not search on any OpenPGP Sources.
When I worked at Kleopatra we didn't want such a feature in GnuPG. Our strategy was to update keys when they are used, about to be used or close to expiry. The whole locate-external-key thing.
I think the feature we had to update in the certificate details is good. But i recommend especially keeping the S/MIME / OpenPGP difference in mind. I would also call it "Search updated certificates" with a tooltip that it might also find "new" certificates for the user. And then an option to disable this either for S/MIME or for OpenPGP.
May 27 2025
Tools / Refresh OpenPGP certificates runs gpg --refresh-keys. I don't think that this command knows anything about WKD.
May 26 2025
May 22 2025
Please solve this the same as our solution in T7630: add a button in the results window to open a new window with all the imported certificates.
Fixed in most cases.
Edge cases will be examined further.
May 16 2025
In T5993#201111, @werner wrote:For example Poppler uses GnuPG comment packets to lower its own attack surface by leaving all OpenPGP handling to gpg. The patch (or at least the version we noticed in Fedora and Debian) entirely breaks this use.
(The commits had a wrong bug it in their message)
It might be useful to have samples of compressed keys:
No, we can't do much about this. It has always been easy to create compression bombs and the more relevant thing here is compressed signed or encrypted data. Or just compressed mails. The patch by @DemiMarie is way to complicated for what it wants to achieve and actually breaks existing use cases. For example Poppler uses GnuPG comment packets to lower its own attack surface by leaving all OpenPGP handling to gpg. The patch (or at least the version we noticed in Fedora and Debian) entirely breaks this use.
May 15 2025
"Geheimen Team-Schlüssel zum internen Teilen abspeichern." is grammatically correct, but it sound very formal and clunky for a UI tooltip. It lacks clarity, therefore I suggest:
May 14 2025
Tooltip: Save this secret key to share with other team members.
dt. Menüeintrag: Geheimen Team-Schlüssel speichern
Tooltip: Geheimen Schlüssel speichern und mit Team teilen.
Werner strongly prefers to include it in the self-tests instead of adding a command to the drop-down list.
I will therefore update the description accordingly.
May 13 2025
Meanwhile we have some support for an empty subject but gpgsm still prints an error notice. See the T7171 for more.
May 11 2025
Included in 1.11.1.
May 10 2025
May 6 2025
engl. Menu Entry: Save Secret Team Key
Tooltip: Save this secret key to share with other team members.
Discussion and background for naming things and german translation
For the icon:
We decided to
May 2 2025
A brief update: This feature has not made it onto the roadmap of specific things to implement so far.
There was another customer wish for this, RT #34722
Apr 22 2025
BTW, fingerprints for X.509 are not well defined because you get a different one when changing the *unsigned" attributes. Not a common case but one should be aware of it.
regarding the 403: one has to try the correct page AFAIK. Didn't research which one, look in the update checker code.
Apr 19 2025
Apr 17 2025
In any case, the actual connectivity test needs to be performed by GnuPG. Otherwise we might just test whether the Qt/KDE libraries can reach versions.gnupg.org, but not whether dirmngr can. Werner proposed something like gpg --fetch-key https://gnupg.org/index.html.
Apr 14 2025
Apr 9 2025
this is not yet in master and not included in the current testbulid
Apr 3 2025
Apr 2 2025
We have done all of this and the rest of the work is now in T7593
Mar 26 2025
Hey there. I wanted to bring this up again, to see if we can perhaps get this changed after all:
Mar 21 2025
Mar 20 2025
Mar 14 2025
BTW, do we really need a C++ API for this? Might make sense due to the need for a context.
Mar 13 2025
Well I finally did some more tracing and removeOurAttachments_o is not called when the attachments vanish.
5.0Beta:145: OK and works, both for signing and encryption