Page MenuHome GnuPG
Feed Advanced Search

Jan 15 2026

werner set External Link to https://gnupg.org/blog/20251226-cleartext-signatures.html on T7900: Cleartext Signature Forgery in GnuPG.
Jan 15 2026, 4:05 PM · Not A Bug, OpenBSD, gnupg

Jan 9 2026

werner closed T7904: GnuPG may downgrade digest algorithm to SHA1, a subtask of T7900: Cleartext Signature Forgery in GnuPG, as Resolved.
Jan 9 2026, 11:01 AM · Not A Bug, OpenBSD, gnupg

Jan 7 2026

andrewgdotcom added a comment to T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks.

So why are there different grades of failure? Why is "invalid packet" a less scary error message than "WARNING: message was not integrity protected" when both are equally bad things?

Jan 7 2026, 4:37 PM · Not A Bug, gnupg
werner added a comment to T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks.

Right. And the MDC detects this and only if says okay you get a good decryption status back.

Jan 7 2026, 11:57 AM · Not A Bug, gnupg
andrewgdotcom added a comment to T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks.

This warning shall only show up if a message was really modified and not in case of a simple truncation.

Jan 7 2026, 10:42 AM · Not A Bug, gnupg

Jan 5 2026

werner changed the visibility for T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks.
Jan 5 2026, 11:27 AM · Not A Bug, gnupg
werner changed the visibility for T7900: Cleartext Signature Forgery in GnuPG.
Jan 5 2026, 11:26 AM · Not A Bug, OpenBSD, gnupg

Jan 2 2026

werner changed the status of T7900: Cleartext Signature Forgery in GnuPG from Open to Testing.

(Testing for now for better visibility. Real or Semi-real bugs with fixes are already set to Resolved)

Jan 2 2026, 4:38 PM · Not A Bug, OpenBSD, gnupg
werner changed the status of T7902: OpenPGP Cleartext Signature Framework, a subtask of T7900: Cleartext Signature Forgery in GnuPG, from Open to Testing.
Jan 2 2026, 4:35 PM · Not A Bug, OpenBSD, gnupg
werner changed the status of T7902: OpenPGP Cleartext Signature Framework from Open to Testing.
Jan 2 2026, 4:35 PM · Not A Bug, OpenPGP, FAQ, gnupg
werner closed T7903: Multiple Plaintext Attack on Detached PGP Signatures in GnuPG, a subtask of T7900: Cleartext Signature Forgery in GnuPG, as Resolved.
Jan 2 2026, 4:24 PM · Not A Bug, OpenBSD, gnupg
werner closed T7903: Multiple Plaintext Attack on Detached PGP Signatures in GnuPG as Resolved.
Jan 2 2026, 4:24 PM · Not A Bug, OpenPGP, gnupg
werner changed the status of T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks, a subtask of T7900: Cleartext Signature Forgery in GnuPG, from Open to Testing.
Jan 2 2026, 4:22 PM · Not A Bug, OpenBSD, gnupg
werner changed the status of T7907: Encrypted Message Malleability Checks are Incorrectly Enforced Causing Plaintext Recovery Attacks from Open to Testing.

The described attack is not easy to understand and as of today the
gpg.fail website seems to have the same content as the draft we
received on 2025-10-23. There it states:

Jan 2 2026, 4:22 PM · Not A Bug, gnupg

Dec 30 2025

werner closed T7906: Memory Corruption in ASCII-Armor Parsing, a subtask of T7900: Cleartext Signature Forgery in GnuPG, as Resolved.
Dec 30 2025, 9:56 AM · Not A Bug, OpenBSD, gnupg

Dec 29 2025

werner changed the status of T7901: Cleartext Signature Forgery in NotDashEscaped header implementation in GnuPG, a subtask of T7900: Cleartext Signature Forgery in GnuPG, from Open to Testing.
Dec 29 2025, 7:13 PM · Not A Bug, OpenBSD, gnupg
werner triaged T7900: Cleartext Signature Forgery in GnuPG as Normal priority.
Dec 29 2025, 4:54 PM · Not A Bug, OpenBSD, gnupg
werner triaged T7903: Multiple Plaintext Attack on Detached PGP Signatures in GnuPG as Normal priority.

Note using the output of --decrypt directly on the tty is a Bad Idea(tm). You won't cat arbitrary files to your tty for the same reason.

Dec 29 2025, 3:46 PM · Not A Bug, OpenPGP, gnupg
werner edited projects for T7902: OpenPGP Cleartext Signature Framework, added: FAQ, OpenPGP, Not A Bug; removed g10code, Bug Report.

https://gnupg.org/blog/20251226-cleartext-signatures.html explains why we have cleartext signatures and how you properly use them. The suggestion of the reporters to remove them entirely is a no-go because there are too many systems (open source or in-house) which rely on that format. If properly used (i.e. using --output to get the signed text) there is no problem. Anyway the suggestion has always been to use detached signatures using two files or PGP/MIME).

Dec 29 2025, 3:37 PM · Not A Bug, OpenPGP, FAQ, gnupg

Sep 16 2025

werner closed T7810: Issues preventing the installation of GPA as Resolved.

Sorry, I don't know Fedora packaging details. Please ask on gnupg-users for help if you want to build gpa yourself on that platform. This bug report is only read by very few people but on gnupg-users you can get the attention of several thousand users and developers.

Sep 16 2025, 1:22 PM · Fedora, Not A Bug, gpa

May 19 2025

chengr28 added a comment to T7577: GnuPG could not work when TCP congestion provider is set to BBR2 in Windows.

Spent some time discovering and unfortunately it's Windows's bug in loopback interface.
I wrote a test demo (blocking mode) to exchange data and watched their packets, found that network stack would drop packets when congestion control algorithm is set to BBR2. It seems the second data exchange was broken.

May 19 2025, 3:20 PM · Support, Not A Bug, gnupg, Bug Report

May 6 2025

dkg added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

To avoid further noise on this ticket, i've done as requested and posted to gnupg-devel : https://lists.gnupg.org/pipermail/gnupg-devel/2025-May/035875.html

May 6 2025, 10:26 PM · Not A Bug, gnupg

May 5 2025

werner added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

For the records:

May 5 2025, 9:24 AM · Not A Bug, gnupg
werner added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

A bug tracker shall never be used for discussion because the audience is not as expected. Only very few people follow a certain bug but several hundreds are following discussion on gnupg-devel@. That is basic hacker knowledge.

May 5 2025, 9:14 AM · Not A Bug, gnupg

May 4 2025

heiko added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

I am surprised that you don't want to use the issue tracker for issues.
GnuPG's trust calculations are quite clearly broken, by any metric. There's nothing to discuss here.

May 4 2025, 8:13 PM · Not A Bug, gnupg
werner closed T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate as Resolved.

Heiko, I told you already in T7106 that it is not a good idea to re-open a ticket. If you really want to discuss stuff, take that to a mailing list.

May 4 2025, 8:06 PM · Not A Bug, gnupg
heiko reopened T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate as "Open".

I see two interesting angles from which to think about this Web of Trust calculation:

May 4 2025, 1:26 PM · Not A Bug, gnupg

May 2 2025

werner closed T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate as Resolved.

> I'm not sure i understand why "the latest" should be preferred.

May 2 2025, 10:26 AM · Not A Bug, gnupg
dkg added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

A bit more experimentation shows the same behavior, even if Alice's tsig of Bill is full, not marginal, and even if all signatures are made in the same second, which is the finest resolution that OpenPGP objects can report.

May 2 2025, 12:48 AM · Not A Bug, gnupg
dkg added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

Interesting analysis, thanks for the sleuthing! I'm not sure i understand why "the latest" should be preferred. For example, in the graph made in this example, which part of the graph is the "latest"? Since the path from Alice to Carol is two hops long at least, it's conceivable that one path (A→Bob→C) has both "the latest" tsig *and* "the earliest" tsig, if the other path (A→Bill→C) happens to have been made between the other two tsigs.

May 2 2025, 12:15 AM · Not A Bug, gnupg

Apr 29 2025

werner edited projects for T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate, added: Not A Bug; removed Bug Report.

I also spend some time with this and the problem is described by this comment in trustdb.c:

Apr 29 2025, 1:13 PM · Not A Bug, gnupg

Apr 28 2025

werner changed the status of T7106: Trailing newline trouble in clearsigned message generation and verification from Wontfix to Resolved.

No, it is not a bug and I beg you not to change the status again. Don't start the same trouble here as some of you guys did with the IETF WG!

Apr 28 2025, 5:19 PM · Not A Bug, gnupg
heiko changed the status of T7106: Trailing newline trouble in clearsigned message generation and verification from Resolved to Wontfix.
Apr 28 2025, 3:08 PM · Not A Bug, gnupg
heiko added a comment to T7106: Trailing newline trouble in clearsigned message generation and verification.

Err, I don't see why I would "need to test" anything further.

Apr 28 2025, 2:45 PM · Not A Bug, gnupg
werner closed T7106: Trailing newline trouble in clearsigned message generation and verification as Resolved.

This is just one build of PGP and you would need to test all versions on Windows, macOS and Unix. You also need to test against all versions of GnuPG since 1998 (when we started with interop tests). We won't change this in GnuPG and risk regression. If you have a problem with that go and add a fix to your tool - name it bug compatibility or whatever. And please do not re-open this bug.

Apr 28 2025, 2:20 PM · Not A Bug, gnupg
heiko reopened T7106: Trailing newline trouble in clearsigned message generation and verification as "Open".
Apr 28 2025, 12:05 PM · Not A Bug, gnupg
heiko added a comment to T7106: Trailing newline trouble in clearsigned message generation and verification.

This has been implemented and tested to be compatible with PGP - a looong time ago. iirc this was discussed around 1999 but might be only by private mail between the PGP hackers and me. Thus any change now might break PGP - which is still widely used (although mostly for encryption).

Apr 28 2025, 12:04 PM · Not A Bug, gnupg

Apr 8 2025

werner closed T7598: Avoiding keyboxd by default as Wontfix.

We suggest the use of the keyboxd for a reason. The use of multiple keyrings has always been a problem and has been kept on demand from a couple of people. Eventually things change and for a new installation the use of the keyboxd is the suggested way to run GnuPG. Support for pubring.gpg and even pubring.kbx may eventually be removed - not now or in the next year but it may happen. You have been warned ;-)

Apr 8 2025, 8:34 PM · Not A Bug, gnupg24 (gnupg-2.4.5), keyboxd