Page MenuHome GnuPG
Feed Advanced Search

Thu, Jun 5

philiperm added a watcher for gnupg: philiperm.
Thu, Jun 5, 8:45 PM
ikloecker added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

In Kleopatra we explicitly trigger a re-reading of the smart card after each operation involving a smart card to ensure that Kleopatra doesn't show wrong information. There's so much that can go wrong with physical smart cards that this is the only way to make sure you don't tell the user lies. I think gpg --edit-card also re-reads the smart card after each operation.

Thu, Jun 5, 2:57 PM · gnupg, Bug Report
ikloecker removed a project from T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated): gpgme.

There is no bug in the contexts and there's nothing to document anywhere. If anything then it's a bug in gpg's generate command or a more general issue (in gpg-agent) with keeping track of the storage location of private keys as I have already explained in T7620#200613. I'm removing the gpgme tag because there's nothing wrong in gpgme and there's nothing we can do in gpgme. It needs to be addressed in gnupg.

Thu, Jun 5, 2:45 PM · gnupg, Bug Report
Saturneric added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

In practice, calling gpgme_get_key() will often pick up most changes because GPGME asks the underlying GPG agent daemon, which may re-read the keyring. That gives the impression that a long-lived context automatically reflects live updates. However, as aheinecke noted, some updates can still go unnoticed in a single gpgme_ctx_t, so it isn’t a strictly frozen snapshot nor a perfectly live view—behaviors are mixed.

Thu, Jun 5, 12:33 PM · gnupg, Bug Report
Saturneric added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

Maybe we should make the documentation clearer about context key reuse. But the context is specifically designed to cache information about a key, so as to avoid memory overhead. I learned early on that its best for each new operation to use a new context. A context is basically an instance of gpg or gpgsm. So you start one process, ask it for a keylist, keep the process running, start another process, modify the key database, and then ask the first process again about his worldview. Either the first process is a bit confused because it has read data and then that data changed (what happens here) or it has no idea about the change since it was efficient and only read the database once. But here in this example you should be able to reproduce this also by making any other modifications to the key, adding other subkeys, userids etc. That GPGME even notices the secret key is more of a side effect of how the programming works because the GPGME gpg process will ask the gpg-agent (so a third process).

Thu, Jun 5, 12:14 PM · gnupg, Bug Report
gniibe added a comment to T7589: Unable to export SSH keys for ED25519 keys generate on a SmartCard.

The problem was: In scdaemon, PKSIGN with OPENPGP.3 didn't work well for Ed25519 (done by do_auth function in app-openpgp.c), when --hash=sha512 (not SHA1).

Thu, Jun 5, 2:52 AM · gnupg, ssh, Bug Report

Wed, Jun 4

gniibe changed the status of T7589: Unable to export SSH keys for ED25519 keys generate on a SmartCard from Open to Testing.

I located the bug in scdaemon.

Wed, Jun 4, 6:58 AM · gnupg, ssh, Bug Report

Tue, Jun 3

gniibe changed the status of T7668: gnupg: regexp and build with -fsanitize=address from Open to Testing.

Pushed the change: rG16ee68259d1d: gpg,regexp: Use -DREGEXP_PREFIX=gnupg_.

Tue, Jun 3, 4:42 AM · Bug Report, gnupg

Mon, Jun 2

werner updated the task description for T7586: Release GnuPG 2.5.6.
Mon, Jun 2, 6:09 PM · gnupg, Release Info
werner closed T7586: Release GnuPG 2.5.6 as Resolved.
Mon, Jun 2, 6:08 PM · gnupg, Release Info
werner updated the task description for T7671: Release GnuPG 2.5.7.
Mon, Jun 2, 6:08 PM · Release Info, gnupg
werner updated the task description for T7671: Release GnuPG 2.5.7.
Mon, Jun 2, 5:57 PM · Release Info, gnupg
werner triaged T7672: Release GnuPG 2.5.8 as Normal priority.
Mon, Jun 2, 5:50 PM · Release Info, gnupg
werner triaged T7671: Release GnuPG 2.5.7 as Normal priority.
Mon, Jun 2, 3:09 PM · Release Info, gnupg
gniibe added a project to T7664: tests/openpgp/ecc.scm fails when building GPG with address sanitizer: gnupg.
Mon, Jun 2, 6:39 AM · gnupg, Bug Report
gniibe claimed T7589: Unable to export SSH keys for ED25519 keys generate on a SmartCard.
Mon, Jun 2, 6:38 AM · gnupg, ssh, Bug Report

Sat, May 31

ametzler1 created T7670: updated nl.po for gnupg 2.4.
Sat, May 31, 3:29 PM · i18n, gnupg, Bug Report

Wed, May 28

aheinecke added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

I do not think that this is the only place where such an issue occurs. Maybe we should make the documentation clearer about context key reuse. But the context is specifically designed to cache information about a key, so as to avoid memory overhead. I learned early on that its best for each new operation to use a new context. A context is basically an instance of gpg or gpgsm. So you start one process, ask it for a keylist, keep the process running, start another process, modify the key database, and then ask the first process again about his worldview. Either the first process is a bit confused because it has read data and then that data changed (what happens here) or it has no idea about the change since it was efficient and only read the database once. But here in this example you should be able to reproduce this also by making any other modifications to the key, adding other subkeys, userids etc. That GPGME even notices the secret key is more of a side effect of how the programming works because the GPGME gpg process will ask the gpg-agent (so a third process).

Wed, May 28, 9:19 PM · gnupg, Bug Report
aheinecke added a comment to T7434: Kleopatra: Initial keylisting hangs for ~60 seconds (gpg-agent: Socket ...S.gpg-agent cannot be bound).

The more I think of this, the more likely this appears to me as the source for all that random startup weirdness of GnuPG. Say you are on a large keyring and on a train, then that keyring is first passed through your enterprise malware protection for scanning or something like that. Then it works again until some metric, hash or something else changes.

Wed, May 28, 8:37 PM · gnupg, kleopatra
aheinecke added a comment to T7434: Kleopatra: Initial keylisting hangs for ~60 seconds (gpg-agent: Socket ...S.gpg-agent cannot be bound).

My recommendation would at this point be to use procmon with a file filter for just "If path contains gnupg then include" I mean maybe go only for the locking dirs but this way you will not only see what the GnuPG processes are doing but what everyone on the system is doing to the locks. So you will see when my old friends, third party security software might interfere.
For example: You will see on a default Windows which files are checked through telemetry. And here in this example you see directly that the Microsoft Malware Protection Engine is accessing the agents socket.

Wed, May 28, 8:16 PM · gnupg, kleopatra

Fri, May 23

werner closed T7428: Release GnuPG 2.4.8 as Resolved.
Fri, May 23, 11:58 AM · gnupg, Release Info