I retract my patch in T8171#215603
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Mon, Mar 23
@m.eik gave us this link: https://github.com/ProtonMail/go-crypto/issues/184
It had already fixed in: rG55b5928099ba: dirmngr: Change the default keyserver.
And then in: rGa2f2523b99ff: Remove the default keyserver.
Thu, Mar 19
Setting to low because this has never been a problem in the last 30 or 35 years. A check to help pinpointing bad keys is however a good idea.
Wed, Mar 18
I sent a patch to gcrypt-devel mailing list for the preparation of the change of RSA secret key checking.
If enabled, wrong RSA secret key (wrong means: under the Libre/OpenPGP specification) is rejected at import when gpg-agent calls gcry_pk_test_key.
Tue, Mar 17
BTW, LibrePGP also demands p < q in "Algorithm-Specific Part for RSA Keys".
For OpenSSH, ssh-agent spec. defines p, q, and qInv.
FIPS has: FIPS 186-5 and SP 800-56Br2.
existing standards
Mon, Mar 16
CRT is used with GnuPG. In libgcrypt, pk_sign and pk_decrypt don't require P, Q, and U in a key (it's optional), but pk_test_key does.
Fri, Mar 13
Du we have any information on whether the CRT is used and whether u et al. is also wrong? For example due to an OpenSSL generated key?
Thu, Mar 12
Mon, Mar 9
I don't understand how to reproduce this. When a key is deleted then nothing referencing this key should remain in the key ring. I don't see why it should matter whether the deleted key was a card key or not.
Feb 27 2026
Feb 26 2026
Feb 25 2026
Also applied to 2.4 branch.
Libraries have been fixed (as well as GnuPG itself), so, closing.
Feb 24 2026
Feb 20 2026
Cool. Works for me now.
rG62b8bf2f introduced the regression. The intent of the fix was about comparison of -----END , which has nine characters.
But it also added afx->buffer_pos ==1, that affected.
Feb 19 2026
Using --enarmor and removing the checksum I sometimes get
Feb 10 2026
Feb 9 2026
AFAICS all conditions are protected by isascii(3) which
Feb 4 2026
Jan 29 2026
It seems this broke the self tests (and gpgme, and notmuch) on NetBSD: https://dev.gnupg.org/T8065
Jan 27 2026
This is a security update
Jan 25 2026
@werner I added an implementation https://dev.gnupg.org/D622
that matches Linux behavior and avoids the message about secure memory not being supported on Windows. The change is scoped to the pinentry tool and intentionally follows Linux behavior. Does this approach look reasonable to you?
I think "O" is a better key:
We need to change the accelerator. Right now gpg-agent uses
Jan 23 2026
I don't think that we will implement that any time soon. Today we too often require more mlock-able memory than available and in this case Libgcrypt resorts to allocating new memory arenas which are not locked. This is not as worse as one might think: the majro advantage with secmem is that a free() on secmem allocated memory will also wipe that memory. A better solution has always been to use an encrypted swap/paging file. 25 years ago, it was not easy to configure but today there should be no problem and hopefully already the default.
While key generation works now with an expiry date up to 2106-02-04, the representation on the command line is a bit ugly.
Jan 22 2026
Jan 21 2026
Jan 20 2026
On 2026-01-20, I found the message to security@gnupg.org of:
Message-ID: 4e708880-04ac-45bc-8d16-6b585f2652a1n@aisle.com
in may spam folder. It has a 10MB long attachment. That might be one of reasons to be identified as a spam.
Considering the current implementation (tpm2d doesn't support keyinfo like scdaemon), it would be good to check the buffer size.
(If key information is accessible easily, we can check with a specific key.)
Jan 15 2026
Looks good to me on gpg4win-5.0.0 @ win11. Tested with 20 starts of each combination:
- with / without keyboxd
- quitting kleopatra / killing all processes
I think this has been resolved in Gpg4win 5.
Jan 9 2026
Will be in the next release.
it does not make sense to have a workboard item for this parent ticket.
Looks good to me on gpg4win-5.0.0-beta479 @ win11:
This does not happen any more, tested with Gpg4win-5.0.0-beta479
Tested with Gpg4win-5.0.0-beta479
with Gpg4win-5.0.0-beta479 the listing after creating the new key with ADSK looks ok now:
Given that the 2.2 fix has been tested and resolved and we don't have another ticket for 2.6, we can close this one.
Note that for exploiting this bug a second preimage attack for SHA-1 is required. This kind of attack on SHA1 is not yet possible.
Jan 8 2026
Jan 7 2026
So why are there different grades of failure? Why is "invalid packet" a less scary error message than "WARNING: message was not integrity protected" when both are equally bad things?
Right. And the MDC detects this and only if says okay you get a good decryption status back.
This warning shall only show up if a message was really modified and not in case of a simple truncation.
Jan 5 2026
Jan 2 2026
(Testing for now for better visibility. Real or Semi-real bugs with fixes are already set to Resolved)
The described attack is not easy to understand and as of today the
gpg.fail website seems to have the same content as the draft we
received on 2025-10-23. There it states:
Dec 31 2025
Fixed in 2.5.16
Dec 30 2025
Also fixed in the other active branches.
