Page MenuHome GnuPG
Feed Advanced Search

Aug 21 2024

werner closed T3392: keyserver default should include pool onionbalance hkp://jirk5u4osbsr34t5.onion as Resolved.
Aug 21 2024, 1:45 PM · Too Old, Keyserver, Feature Request, dirmngr

Jan 4 2024

aheinecke merged T6876: GPGME(++) Add "include-key-block" and "auto-key-import" to context flags into T4856: GPG: Key Exchange Put public OpenPGP key into signature.
Jan 4 2024, 8:50 AM · Feature Request, gpgol, Keyserver, gnupg

Jan 19 2023

werner removed a project from T6020: Make %-expandos available for --default-keyserver-url: gnupg (gpg23).
Jan 19 2023, 4:47 PM · gnupg24, Feature Request, Keyserver
werner removed a project from T6040: Allow embedding preferred keyserver URL in signatures: gnupg (gpg23).
Jan 19 2023, 4:46 PM · gnupg24, Feature Request, Keyserver
werner removed a project from T6254: Warn in --recv-keys verbose output that no keys have been imported: gnupg (gpg23).
Jan 19 2023, 4:45 PM · gnupg24, Keyserver, Bug Report

Oct 20 2022

werner triaged T6254: Warn in --recv-keys verbose output that no keys have been imported as Normal priority.
Oct 20 2022, 10:14 PM · gnupg24, Keyserver, Bug Report
werner added projects to T6254: Warn in --recv-keys verbose output that no keys have been imported: gnupg (gpg23), Keyserver.

Oh yes, the usual import statistics should be shown here.

Oct 20 2022, 10:14 PM · gnupg24, Keyserver, Bug Report

Oct 5 2022

werner closed T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired as Resolved.
Oct 5 2022, 4:20 PM · workaround, gnupg, Keyserver, Bug Report

Sep 22 2022

werner added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

We should close this. The recent fix in 2.2 and the forthcoming 2.3 does everything we want. In the meantiime or if further problems turn up, --ignore-cert is a good workaround.

Sep 22 2022, 10:49 AM · workaround, gnupg, Keyserver, Bug Report
werner changed the status of T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired from Open to Testing.
Sep 22 2022, 10:46 AM · workaround, gnupg, Keyserver, Bug Report

Aug 30 2022

gniibe added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

In the situation of a certificate about to be expired in the cache:

Aug 30 2022, 8:31 AM · workaround, gnupg, Keyserver, Bug Report
dkg added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

Thanks, @gniibe -- i agree that this change to put_cert should be helpful, when encountering a certificate that is already invalid.

Aug 30 2022, 8:04 AM · workaround, gnupg, Keyserver, Bug Report

Aug 26 2022

gniibe added a parent task for T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired: T5882: Cross signing certificate in X.509 support.
Aug 26 2022, 7:41 AM · workaround, gnupg, Keyserver, Bug Report
gniibe added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

rejecting an intermediate certificate too.

Aug 26 2022, 2:42 AM · workaround, gnupg, Keyserver, Bug Report
gniibe added a project to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired: Restricted Project.

Pushed the change of mine to master, since I can confirm that it results validate_cert_chain working better, because of put_cert's rejecting an intermediate certificate too.

Aug 26 2022, 2:37 AM · workaround, gnupg, Keyserver, Bug Report

Aug 25 2022

werner triaged T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired as Wishlist priority.
Aug 25 2022, 8:42 AM · workaround, gnupg, Keyserver, Bug Report
werner added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

@dkg: Thanks for the detailed description of the problem.

Aug 25 2022, 8:41 AM · workaround, gnupg, Keyserver, Bug Report
gniibe added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

Thank you @dkg for the analysis. Unfortunately, the certificate cache is hashed by SHA-1 FPR, so, I think that it is a bit difficult to implement moving certs "front" / "back".

Aug 25 2022, 6:11 AM · workaround, gnupg, Keyserver, Bug Report
dkg reopened T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired as "Open".

Thanks for the followup about R3, @mpilgrem! Looking at your logs in more details, and the source code for find_cert_bysubject in dirmngr/certcache.c, i think i see what the issue is. It's slightly more subtle than not terminating early if a known trusted root can validate a truncated chain.

Aug 25 2022, 12:46 AM · workaround, gnupg, Keyserver, Bug Report

Aug 24 2022

dkg added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

@mpilgrem, i'm glad that removing the DST Root CA X3 from your windows control panel worked for you, but it still doesn't seem to be a reasonable fix from a GnuPG user perspective

Aug 24 2022, 10:59 PM · workaround, gnupg, Keyserver, Bug Report
werner closed T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired as Resolved.
Aug 24 2022, 6:26 PM · workaround, gnupg, Keyserver, Bug Report
mpilgrem placed T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired up for grabs.
Aug 24 2022, 11:33 AM · workaround, gnupg, Keyserver, Bug Report
mpilgrem added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

Doing the same thing on my second PC, I can be more precise:

Aug 24 2022, 11:31 AM · workaround, gnupg, Keyserver, Bug Report
Valodim reopened T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired as "Open".

I'll reopen this ticket here, since the underlying issue is not quite resolved yet as @dkg helpfully outlined above.

Aug 24 2022, 9:41 AM · workaround, gnupg, Keyserver, Bug Report
mpilgrem closed T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired as Resolved.
Aug 24 2022, 2:04 AM · workaround, gnupg, Keyserver, Bug Report
mpilgrem added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

Thank you dkg. I am new to 'certificates' generally - and a little knowledge is a dangerous thing - but this is what I did:

Aug 24 2022, 1:47 AM · workaround, gnupg, Keyserver, Bug Report

Aug 23 2022

dkg added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

@mpilgrem: in the meantime, for connecting to keys.openpgp.org, which *has* cleaned up its certificate chain, you might also want to try killing your dirmngr process, and/or cleaning up the data in .gnupg/dirmngr-cache.d/.

Aug 23 2022, 9:24 PM · workaround, gnupg, Keyserver, Bug Report
dkg added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

Basically, the website in question (e.g. https://openpgpkey.gnupg.org/, which exhibits this problem) serves up three certificates:

Aug 23 2022, 9:17 PM · workaround, gnupg, Keyserver, Bug Report
mpilgrem added a project to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired: gnupg.
Aug 23 2022, 11:22 AM · workaround, gnupg, Keyserver, Bug Report

Aug 22 2022

Valodim added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

In that case, it's a bug in gnupg and there's nothing I can further do from my side 🤷

Aug 22 2022, 10:52 PM · workaround, gnupg, Keyserver, Bug Report
mpilgrem added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

Thank you Valodim. I am new to GnuPG etc, so not sure if I should be doing something at my end. At the moment, whatever you have changed does not seem to have affected my experience. This is my current log for the same failed commands as above:

2022-08-22 21:31:19 dirmngr[1152] listening on socket 'C:\\Users\\mike\\AppData\\Local\\gnupg\\S.dirmngr'
2022-08-22 21:31:19 dirmngr[1152] DBG: number of certs loaded from store 'ROOT': 70
2022-08-22 21:31:19 dirmngr[1152] DBG: certificate 'CA' already cached
2022-08-22 21:31:19 dirmngr[1152] DBG: number of certs loaded from store 'CA': 151
2022-08-22 21:31:19 dirmngr[1152] permanently loaded certificates: 221
2022-08-22 21:31:19 dirmngr[1152]     runtime cached certificates: 0
2022-08-22 21:31:19 dirmngr[1152]            trusted certificates: 221 (221,0,0,0)
2022-08-22 21:31:19 dirmngr[1152] handler for fd 704 started
2022-08-22 21:31:19 dirmngr[1152] DBG: chan_0x000002c0 -> # Home: C:\Users\mike\AppData\Roaming\gnupg
2022-08-22 21:31:19 dirmngr[1152] DBG: chan_0x000002c0 -> # Config: C:/Users/mike/AppData/Roaming/gnupg/dirmngr.conf
2022-08-22 21:31:19 dirmngr[1152] DBG: chan_0x000002c0 -> OK Dirmngr 2.3.7 at your service
2022-08-22 21:31:19 dirmngr[1152] DBG: chan_0x000002c0 <- GETINFO version
2022-08-22 21:31:19 dirmngr[1152] DBG: chan_0x000002c0 -> D 2.3.7
2022-08-22 21:31:19 dirmngr[1152] DBG: chan_0x000002c0 -> OK
2022-08-22 21:31:19 dirmngr[1152] DBG: chan_0x000002c0 <- KEYSERVER --clear hkps://keys.openpgp.org
2022-08-22 21:31:19 dirmngr[1152] DBG: chan_0x000002c0 -> OK
2022-08-22 21:31:19 dirmngr[1152] DBG: chan_0x000002c0 <- KS_SEARCH -- 575159689BEFB442
2022-08-22 21:31:19 dirmngr[1152] DBG: dns: dnsserver[0] '192.168.1.254'
2022-08-22 21:31:19 dirmngr[1152] DBG: dns: libdns initialized
2022-08-22 21:31:20 dirmngr[1152] DBG: dns: getsrv(_pgpkey-https._tcp.keys.openpgp.org) -> 0 records
2022-08-22 21:31:20 dirmngr[1152] DBG: dns: resolve_dns_name(keys.openpgp.org): Success
2022-08-22 21:31:20 dirmngr[1152] resolve_dns_addr for 'keys.openpgp.org': 'keys.openpgp.org' [already known]
2022-08-22 21:31:20 dirmngr[1152] resolve_dns_addr for 'keys.openpgp.org': 'keys.openpgp.org' [already known]
2022-08-22 21:31:20 dirmngr[1152] DBG: Using TLS library: NTBTLS 0.3.1
2022-08-22 21:31:20 dirmngr[1152] DBG: check_inet_support:  family: 23
2022-08-22 21:31:20 dirmngr[1152] DBG: check_inet_support:     addr: fe80::dc27:6f:dcb5:531e%4
2022-08-22 21:31:20 dirmngr[1152] DBG: check_inet_support:  family: 23
2022-08-22 21:31:20 dirmngr[1152] DBG: check_inet_support:     addr: 2a00:23c7:c181:f01:246b:c705:4a54:3265
2022-08-22 21:31:20 dirmngr[1152] DBG: check_inet_support:  family: 23
2022-08-22 21:31:20 dirmngr[1152] DBG: check_inet_support:     addr: 2a00:23c7:c181:f01:dc27:6f:dcb5:531e
2022-08-22 21:31:20 dirmngr[1152] DBG: check_inet_support:  family: 23
2022-08-22 21:31:20 dirmngr[1152] DBG: check_inet_support:     addr: fe80::9055:5c7f:95b9:e13d%47
2022-08-22 21:31:20 dirmngr[1152] DBG: check_inet_support:  family: 2
2022-08-22 21:31:20 dirmngr[1152] DBG: check_inet_support:     addr: 192.168.1.101
2022-08-22 21:31:20 dirmngr[1152] DBG: check_inet_support:  family: 2
2022-08-22 21:31:20 dirmngr[1152] DBG: check_inet_support:     addr: 172.22.176.1
2022-08-22 21:31:20 dirmngr[1152] DBG: http.c:connect_server: trying name='keys.openpgp.org' port=443
2022-08-22 21:31:20 dirmngr[1152] DBG: dns: resolve_dns_name(keys.openpgp.org): Success
2022-08-22 21:31:21 dirmngr[1152] DBG: http.c:1951:socket_new: object 0x036a2810 for fd 1020 created
2022-08-22 21:31:21 dirmngr[1152] certificate already cached
2022-08-22 21:31:21 dirmngr[1152] DBG: BEGIN Certificate 'subject':
2022-08-22 21:31:21 dirmngr[1152] DBG:      serial: 0431B075AFEFF12EBDD26C62BECFF6F47A91
2022-08-22 21:31:21 dirmngr[1152] DBG:   notBefore: 2022-08-22 14:26:24
2022-08-22 21:31:21 dirmngr[1152] DBG:    notAfter: 2022-11-20 14:26:23
2022-08-22 21:31:21 dirmngr[1152] DBG:      issuer: CN=R3,O=Let's Encrypt,C=US
2022-08-22 21:31:21 dirmngr[1152] DBG:     subject: CN=keys.openpgp.org
2022-08-22 21:31:21 dirmngr[1152] DBG:         aka: (8:dns-name16:keys.openpgp.org)
2022-08-22 21:31:21 dirmngr[1152] DBG:   hash algo: 1.2.840.113549.1.1.11
2022-08-22 21:31:21 dirmngr[1152] DBG:   SHA1 fingerprint: 8647D98EE3F7ADF2BB151AEAAF462BA2BDAFCDA4
2022-08-22 21:31:21 dirmngr[1152] DBG: END Certificate
2022-08-22 21:31:21 dirmngr[1152] Note: non-critical certificate policy not allowed
2022-08-22 21:31:21 dirmngr[1152] DBG: find_cert_bysubject: certificate found in the cache by subject DN
2022-08-22 21:31:21 dirmngr[1152] DBG: got issuer's certificate:
2022-08-22 21:31:21 dirmngr[1152] DBG: BEGIN Certificate 'issuer':
2022-08-22 21:31:21 dirmngr[1152] DBG:      serial: 400175048314A4C8218C84A90C16CDDF
2022-08-22 21:31:21 dirmngr[1152] DBG:   notBefore: 2020-10-07 19:21:40
2022-08-22 21:31:21 dirmngr[1152] DBG:    notAfter: 2021-09-29 19:21:40
2022-08-22 21:31:21 dirmngr[1152] DBG:      issuer: CN=DST Root CA X3,O=Digital Signature Trust Co.
2022-08-22 21:31:21 dirmngr[1152] DBG:     subject: CN=R3,O=Let's Encrypt,C=US
2022-08-22 21:31:21 dirmngr[1152] DBG:   hash algo: 1.2.840.113549.1.1.11
2022-08-22 21:31:21 dirmngr[1152] DBG:   SHA1 fingerprint: 48504E974C0DAC5B5CD476C8202274B24C8C7172
2022-08-22 21:31:21 dirmngr[1152] DBG: END Certificate
2022-08-22 21:31:21 dirmngr[1152] DBG: sigval: (sig-val 
2022-08-22 21:31:21 dirmngr[1152] DBG:          (rsa 
2022-08-22 21:31:21 dirmngr[1152] DBG:           (s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
2022-08-22 21:31:21 dirmngr[1152] DBG:           )
2022-08-22 21:31:21 dirmngr[1152] DBG:          (hash sha256))
2022-08-22 21:31:21 dirmngr[1152] DBG: PKCS#1 block type 1 encoded data:+01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                                   ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                                   ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                                   ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                                   ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                                   ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                                   ffffffffffffffffffffff003031300d0609608648016503040201050004207d \
2022-08-22 21:31:21 dirmngr[1152] DBG:                                   20adb93aafb8ffddebf14f6bf2430074c4967b9f55a80f31a62556bf74ac98
2022-08-22 21:31:21 dirmngr[1152] DBG: rsa_verify data:+01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffff003031300d0609608648016503040201050004207d \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  20adb93aafb8ffddebf14f6bf2430074c4967b9f55a80f31a62556bf74ac98
2022-08-22 21:31:21 dirmngr[1152] DBG: rsa_verify  sig:+33074e9b2d6823cffebf5744aad2a132b42ed88acfee01af908d51f04d582e5e \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  e29126d705f0ba2734504ef143b8fffee9bba6dbddae010450a3b0aa42caeed9 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  adbc3ac22b45e4feec6e49aaabf4c557be8d9833f4815ac8080f3adadae654bb \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ba5328dbb7ffc1eb5eae166076884bf57b4f052b155843ef17236529ce9d702d \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  6e4fe8dfdc69bd713758140457ee85c8e8d07f48efc8f3e256518527d02f1773 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  56af10db5b23bec31d10208733ffa48667c887e42f7ee03466cfefd0e068403c \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  5a539ca041cb062571ae38827ddee24e6ebc376d3c59dcf3e594b516398ae9c3 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  5cfe816fa4cfae2a240fdaf21bf298b68501a967a6ae967017534fc40406e33b
2022-08-22 21:31:21 dirmngr[1152] DBG: rsa_verify    n:+bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c5 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  4cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53b \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  c32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cac \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  e19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add2 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  86583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f1 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  18f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb15
2022-08-22 21:31:21 dirmngr[1152] DBG: rsa_verify    e:+010001
2022-08-22 21:31:21 dirmngr[1152] DBG: rsa_verify  cmp:+01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffff003031300d0609608648016503040201050004207d \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  20adb93aafb8ffddebf14f6bf2430074c4967b9f55a80f31a62556bf74ac98
2022-08-22 21:31:21 dirmngr[1152] DBG: rsa_verify    => Good
2022-08-22 21:31:21 dirmngr[1152] DBG: gcry_pk_verify: Success
2022-08-22 21:31:21 dirmngr[1152] certificate is good
2022-08-22 21:31:21 dirmngr[1152] certificate has expired
2022-08-22 21:31:21 dirmngr[1152] (expired at 2021-09-29 19:21:40)
2022-08-22 21:31:21 dirmngr[1152] Note: non-critical certificate policy not allowed
2022-08-22 21:31:21 dirmngr[1152] DBG: find_cert_bysubject: certificate found in the cache by subject DN
2022-08-22 21:31:21 dirmngr[1152] DBG: got issuer's certificate:
2022-08-22 21:31:21 dirmngr[1152] DBG: BEGIN Certificate 'issuer':
2022-08-22 21:31:21 dirmngr[1152] DBG:      serial: 44AFB080D6A327BA893039862EF8406B
2022-08-22 21:31:21 dirmngr[1152] DBG:   notBefore: 2000-09-30 21:12:19
2022-08-22 21:31:21 dirmngr[1152] DBG:    notAfter: 2021-09-30 14:01:15
2022-08-22 21:31:21 dirmngr[1152] DBG:      issuer: CN=DST Root CA X3,O=Digital Signature Trust Co.
2022-08-22 21:31:21 dirmngr[1152] DBG:     subject: CN=DST Root CA X3,O=Digital Signature Trust Co.
2022-08-22 21:31:21 dirmngr[1152] DBG:   hash algo: 1.2.840.113549.1.1.5
2022-08-22 21:31:21 dirmngr[1152] DBG:   SHA1 fingerprint: DAC9024F54D8F6DF94935FB1732638CA6AD77C13
2022-08-22 21:31:21 dirmngr[1152] DBG: END Certificate
2022-08-22 21:31:21 dirmngr[1152] DBG: sigval: (sig-val 
2022-08-22 21:31:21 dirmngr[1152] DBG:          (rsa 
2022-08-22 21:31:21 dirmngr[1152] DBG:           (s #D94CE0C9F584883731DBBB13E2B3FC8B6B62126C58B7497E3C02B7A81F2861EBCEE02E73EF49077A35841F1DAD68F0D8FE56812F6D7F58A66E3536101C73C3E5BD6D5E01D76E72FB2AA0B8D35764E55BC269D4D0B2F77C4BC3178E887273DCFDFC6DBDE3C90B8E613A16587D74362B55803DC763BE8443C639A10E6B579E3F29C180F6B2BD47CBAA306CB732E159540B1809175E636CFB96673C1C730C938BC611762486DE400707E47D2D66B525A39658C8EA80EECF693B96FCE68DC033F389F8292D14142D7EF06170955DF70BE5C0FB24FAEC8ECB61C8EE637128A82C053B77EF9B5E0364F051D1E485535CB00297D47EC634D2CE1000E4B1DF3AC2EA17BE#)
2022-08-22 21:31:21 dirmngr[1152] DBG:           )
2022-08-22 21:31:21 dirmngr[1152] DBG:          (hash sha256))
2022-08-22 21:31:21 dirmngr[1152] DBG: PKCS#1 block type 1 encoded data:+01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                                   ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                                   ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                                   ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                                   ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                                   ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                                   ffffffffffffffffffffff003031300d06096086480165030402010500042032 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                                   86ff65a65faf32085eea1388c3738ba7e37873c906cce3c4a28b4cc2a58988
2022-08-22 21:31:21 dirmngr[1152] DBG: rsa_verify data:+01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffff003031300d06096086480165030402010500042032 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  86ff65a65faf32085eea1388c3738ba7e37873c906cce3c4a28b4cc2a58988
2022-08-22 21:31:21 dirmngr[1152] DBG: rsa_verify  sig:+d94ce0c9f584883731dbbb13e2b3fc8b6b62126c58b7497e3c02b7a81f2861eb \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  cee02e73ef49077a35841f1dad68f0d8fe56812f6d7f58a66e3536101c73c3e5 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  bd6d5e01d76e72fb2aa0b8d35764e55bc269d4d0b2f77c4bc3178e887273dcfd \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  fc6dbde3c90b8e613a16587d74362b55803dc763be8443c639a10e6b579e3f29 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  c180f6b2bd47cbaa306cb732e159540b1809175e636cfb96673c1c730c938bc6 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  11762486de400707e47d2d66b525a39658c8ea80eecf693b96fce68dc033f389 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  f8292d14142d7ef06170955df70be5c0fb24faec8ecb61c8ee637128a82c053b \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  77ef9b5e0364f051d1e485535cb00297d47ec634d2ce1000e4b1df3ac2ea17be
2022-08-22 21:31:21 dirmngr[1152] DBG: rsa_verify    n:+dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c11814 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  8be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8c \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  e5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d
2022-08-22 21:31:21 dirmngr[1152] DBG: rsa_verify    e:+010001
2022-08-22 21:31:21 dirmngr[1152] DBG: rsa_verify  cmp:+01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  ffffffffffffffffffffff003031300d06096086480165030402010500042032 \
2022-08-22 21:31:21 dirmngr[1152] DBG:                  86ff65a65faf32085eea1388c3738ba7e37873c906cce3c4a28b4cc2a58988
2022-08-22 21:31:21 dirmngr[1152] DBG: rsa_verify    => Good
2022-08-22 21:31:21 dirmngr[1152] DBG: gcry_pk_verify: Success
2022-08-22 21:31:21 dirmngr[1152] certificate is good
2022-08-22 21:31:21 dirmngr[1152] certificate has expired
2022-08-22 21:31:21 dirmngr[1152] (expired at 2021-09-30 14:01:15)
2022-08-22 21:31:21 dirmngr[1152] root certificate is good and trusted
2022-08-22 21:31:21 dirmngr[1152] target certificate is NOT valid
2022-08-22 21:31:21 dirmngr[1152] TLS handshake failed: Certificate expired <Dirmngr>
2022-08-22 21:31:21 dirmngr[1152] error connecting to 'https://keys.openpgp.org:443': Certificate expired
2022-08-22 21:31:21 dirmngr[1152] command 'KS_SEARCH' failed: Certificate expired
2022-08-22 21:31:21 dirmngr[1152] DBG: chan_0x000002c0 -> ERR 167772261 Certificate expired <Dirmngr>
2022-08-22 21:31:21 dirmngr[1152] DBG: chan_0x000002c0 <- BYE
2022-08-22 21:31:21 dirmngr[1152] DBG: chan_0x000002c0 -> OK closing connection
2022-08-22 21:31:21 dirmngr[1152] handler for fd 704 terminated
Aug 22 2022, 10:38 PM · workaround, gnupg, Keyserver, Bug Report
Valodim added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

It seems we were still providing the expired DST certificate, which led to an additional yet invalid trust path, which gnupg didn't consider "valid" overall. Mainstream TLS implementations are more lenient here which masked the issue for a bit.

Aug 22 2022, 5:42 PM · workaround, gnupg, Keyserver, Bug Report

Aug 18 2022

mpilgrem created T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.
Aug 18 2022, 1:32 PM · workaround, gnupg, Keyserver, Bug Report

Jun 24 2022

Saklad5 updated the task description for T6040: Allow embedding preferred keyserver URL in signatures.
Jun 24 2022, 4:07 PM · gnupg24, Feature Request, Keyserver
Saklad5 updated the task description for T6020: Make %-expandos available for --default-keyserver-url.
Jun 24 2022, 4:01 PM · gnupg24, Feature Request, Keyserver
Saklad5 added a comment to T6040: Allow embedding preferred keyserver URL in signatures.

I suppose you're right, we might have crossed that bridge a while ago. Simple availability of certificate- or even signature-specific keyserver URIs just make the risks of honor-keyserver-url more obvious than before.

Jun 24 2022, 3:32 PM · gnupg24, Feature Request, Keyserver
Valodim added a comment to T6040: Allow embedding preferred keyserver URL in signatures.

I suppose you're right, we might have crossed that bridge a while ago. Simple availability of certificate- or even signature-specific keyserver URIs just make the risks of honor-keyserver-url more obvious than before.

Jun 24 2022, 2:16 PM · gnupg24, Feature Request, Keyserver
ikloecker added a comment to T6040: Allow embedding preferred keyserver URL in signatures.

This is a reasonable feature, however it should be noted that this implies a fairly large metadata leak: You are essentially adding a URI to signatures that will be pinged on signature verification.

Jun 24 2022, 1:57 PM · gnupg24, Feature Request, Keyserver
Valodim added a comment to T6040: Allow embedding preferred keyserver URL in signatures.

This is a reasonable feature, however it should be noted that this implies a fairly large metadata leak: You are essentially adding a URI to signatures that will be pinged on signature verification.

Jun 24 2022, 12:31 PM · gnupg24, Feature Request, Keyserver
Saklad5 updated the task description for T6040: Allow embedding preferred keyserver URL in signatures.
Jun 24 2022, 1:38 AM · gnupg24, Feature Request, Keyserver
Saklad5 added a comment to T6040: Allow embedding preferred keyserver URL in signatures.

I don't see why this is a child task of T6020: the features are similar, but they don't actually impact each other in any way.

Jun 24 2022, 1:38 AM · gnupg24, Feature Request, Keyserver
Saklad5 renamed T6040: Allow embedding preferred keyserver URL in signatures from Allow embedding default keyserver URL in signatures to Allow embedding preferred keyserver URL in signatures.
Jun 24 2022, 1:37 AM · gnupg24, Feature Request, Keyserver

Jun 23 2022

werner triaged T6020: Make %-expandos available for --default-keyserver-url as Normal priority.
Jun 23 2022, 10:48 AM · gnupg24, Feature Request, Keyserver
werner added a subtask for T6020: Make %-expandos available for --default-keyserver-url: T6040: Allow embedding preferred keyserver URL in signatures.
Jun 23 2022, 10:47 AM · gnupg24, Feature Request, Keyserver
werner added a parent task for T6040: Allow embedding preferred keyserver URL in signatures: T6020: Make %-expandos available for --default-keyserver-url.
Jun 23 2022, 10:47 AM · gnupg24, Feature Request, Keyserver
werner triaged T6040: Allow embedding preferred keyserver URL in signatures as Normal priority.
Jun 23 2022, 10:46 AM · gnupg24, Feature Request, Keyserver
Saklad5 changed the edit policy for T6020: Make %-expandos available for --default-keyserver-url.
Jun 23 2022, 1:18 AM · gnupg24, Feature Request, Keyserver
Saklad5 changed the edit policy for T6040: Allow embedding preferred keyserver URL in signatures.
Jun 23 2022, 1:18 AM · gnupg24, Feature Request, Keyserver

Jun 22 2022

Saklad5 created T6040: Allow embedding preferred keyserver URL in signatures.
Jun 22 2022, 11:23 PM · gnupg24, Feature Request, Keyserver
Saklad5 raised the priority of T6020: Make %-expandos available for --default-keyserver-url from Wishlist to Needs Triage.
Jun 22 2022, 11:02 PM · gnupg24, Feature Request, Keyserver

Jun 9 2022

Saklad5 triaged T6020: Make %-expandos available for --default-keyserver-url as Wishlist priority.
Jun 9 2022, 12:41 AM · gnupg24, Feature Request, Keyserver

May 27 2022

sergi added a watcher for Keyserver: sergi.
May 27 2022, 10:08 PM

Apr 28 2022

werner closed T5751: Please remove pgp.surf.nl from default dirmngr config as Resolved.
Apr 28 2022, 8:50 AM · dirmngr, Keyserver

Mar 18 2022

Valodim added a watcher for Keyserver: Valodim.
Mar 18 2022, 12:28 PM

Mar 10 2022

Valodim added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

Gook luck on Solaris with this suggestion ;-)

Mar 10 2022, 12:27 PM · Feature Request, Keyserver, dirmngr
werner added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

Gook luck on Solaris with this suggestion ;-)

Mar 10 2022, 12:17 PM · Feature Request, Keyserver, dirmngr
Valodim added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

For the record, the typical response to "it doesn't work" support requests for keys.o.o still comes down to killall dirmngr.

Mar 10 2022, 10:57 AM · Feature Request, Keyserver, dirmngr

Jan 10 2022

bernhard added a comment to T5751: Please remove pgp.surf.nl from default dirmngr config.

Ubuntu have been syncing since 7th December: https://www.mail-archive.com/sks-devel@nongnu.org/msg07174.html

Jan 10 2022, 12:06 PM · dirmngr, Keyserver
andrewgdotcom added a watcher for Keyserver: andrewgdotcom.
Jan 10 2022, 12:05 PM
andrewgdotcom added a comment to T5751: Please remove pgp.surf.nl from default dirmngr config.

Ubuntu have been syncing since 7th December: https://www.mail-archive.com/sks-devel@nongnu.org/msg07174.html

Jan 10 2022, 12:00 PM · dirmngr, Keyserver
bernhard added a comment to T5751: Please remove pgp.surf.nl from default dirmngr config.

Why the Ubuntu server? AFAIU it does not sync with other servers and it has some tained pubkeys (which is both fine as a choice of this service, it just does not seem to fit the purposes best).

Jan 10 2022, 11:55 AM · dirmngr, Keyserver
werner changed the status of T5751: Please remove pgp.surf.nl from default dirmngr config from Open to Testing.
Jan 10 2022, 9:20 AM · dirmngr, Keyserver
werner added a comment to T5751: Please remove pgp.surf.nl from default dirmngr config.

For the next release I'll change the gnupg.net mappings to use the Ubuntu server also for non-TLS connections.

Jan 10 2022, 9:20 AM · dirmngr, Keyserver

Dec 23 2021

andrewgdotcom added a comment to T5751: Please remove pgp.surf.nl from default dirmngr config.

Do you have a ballpark figure for the install base (not including variants such as debian with modified defaults)? That might help us decide what counts as "overloading".

Dec 23 2021, 1:29 AM · dirmngr, Keyserver

Dec 22 2021

werner added a comment to T5751: Please remove pgp.surf.nl from default dirmngr config.

The problem is just that there are not that much keyservers left and thus I added those running by large organisations. I really don't want to overload your servers. I would also trust nlnet more than canoncial which is why I started with them.
Its all a mess. Maybe no keyserver should be the default.

Dec 22 2021, 7:54 PM · dirmngr, Keyserver
andrewgdotcom created T5751: Please remove pgp.surf.nl from default dirmngr config.
Dec 22 2021, 6:47 PM · dirmngr, Keyserver

Nov 8 2021

nsauter added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

Any news here? Is this issue going to be fixed or not? It's really annoying.

Nov 8 2021, 1:05 PM · Feature Request, Keyserver, dirmngr

Nov 4 2021

ikloecker added a comment to T5675: Kleopatra 3.1.16 / Keyservers related functions are not working.

I suppose you have rebooted the PC after installing GnuPG 2.3.32. Just to make sure. And double check that there is only one dirmngr.exe with version 2.2.32 installed on your system.

Nov 4 2021, 2:45 PM · Keyserver, kleopatra, Bug Report
HannesESS changed the status of T5675: Kleopatra 3.1.16 / Keyservers related functions are not working from Duplicate to Wontfix.

I did a complete reinstall after cleaning out the complete system incl. registry.
No change in behavior of Gpg4win.

Nov 4 2021, 11:49 AM · Keyserver, kleopatra, Bug Report

Nov 3 2021

HannesESS added a comment to T5675: Kleopatra 3.1.16 / Keyservers related functions are not working.

THX for the quick reply Ingo...

Nov 3 2021, 5:48 PM · Keyserver, kleopatra, Bug Report
ikloecker added a comment to T5675: Kleopatra 3.1.16 / Keyservers related functions are not working.

Install GnuPG 2.2.32 on top of Gpg4win 3.1.16 to fix the problem.

Nov 3 2021, 1:55 PM · Keyserver, kleopatra, Bug Report
ikloecker merged task T5675: Kleopatra 3.1.16 / Keyservers related functions are not working into T5639: dirmngr uses the wrong Let's encrypt chain.
Nov 3 2021, 1:53 PM · Keyserver, kleopatra, Bug Report
HannesESS created T5675: Kleopatra 3.1.16 / Keyservers related functions are not working.
Nov 3 2021, 12:19 PM · Keyserver, kleopatra, Bug Report

Sep 22 2021

werner closed T5618: GPG Key Server Doesn´t Work as Resolved.

Ah well, Kleopatra has a GUI to set the keyserver - that is probably easier to use.

Sep 22 2021, 7:17 PM · Support, FAQ, Keyserver, gpg4win

Sep 7 2021

FierzvID added a member for Keyserver: FierzvID.
Sep 7 2021, 10:42 PM
FierzvID added a watcher for Keyserver: FierzvID.
Sep 7 2021, 10:41 PM

Aug 25 2021

werner triaged T5527: keys.gnupg.net is obsolete as Low priority.
Aug 25 2021, 4:31 PM · Keyserver, FAQ, Documentation
werner closed T5552: Key information loading is sometimes very slow. Suspected that the problem originated from gnupg. as Resolved.

Okay, I close this as a keyserver infrastructure problem. Feel free tore-open if you get other infos.

Aug 25 2021, 4:30 PM · FAQ, Keyserver, gnupg

Aug 13 2021

werner changed the edit policy for Keyserver.
Aug 13 2021, 11:06 PM

Jul 28 2021

werner removed a parent task for T4694: manage first-party attestations: Restricted Maniphest Task.
Jul 28 2021, 3:20 PM · Keyserver, Feature Request

Jul 15 2021

brent0919 added a comment to U11 Jacob Smith.

[[ URL | foreach ($list as $item) {

work_miracles($item);

} ]]

Jul 15 2021, 6:55 PM · Keyserver

Jun 21 2021

Valodim added a comment to T4163: hkps://hkps.pool.sks-keyservers.net has to many bad servers to be a good default.

The sks pool is now officially gone.

Jun 21 2021, 11:50 PM · gnupg, Keyserver

Feb 2 2021

werner closed T5105: can't find users with Kleopatra when press "Look up on server" as Resolved.

Please do not repeat you question, this won't give you anymore attention. Read my comment above and please ask on a mailing list etc.

Feb 2 2021, 4:00 PM · Support, kleopatra, Keyserver
fabior added a comment to T5105: can't find users with Kleopatra when press "Look up on server".

Good morning,

Feb 2 2021, 12:38 PM · Support, kleopatra, Keyserver

Jan 28 2021

Valodim added a comment to T4163: hkps://hkps.pool.sks-keyservers.net has to many bad servers to be a good default.

The last server of the HKPS pool dropped off for several hours yesterday, during which hkps.pool.sks-keyservers.net could not be resolved.

Jan 28 2021, 11:17 AM · gnupg, Keyserver

Jan 5 2021

wiktor-k added a comment to T4694: manage first-party attestations.

For the context of all subscribed parties I think Werner refers to what Hockeypuck is doing: https://lists.gnupg.org/pipermail/gnupg-users/2020-December/064441.html

Jan 5 2021, 10:45 AM · Keyserver, Feature Request
werner lowered the priority of T4694: manage first-party attestations from High to Low.

Meanwhile there are simpler ideas and code on how to do only authenticated uploads. Thus lowering the prio.

Jan 5 2021, 10:41 AM · Keyserver, Feature Request
werner triaged T5072: Keyserver presents the expiry date incorrectly as Low priority.
Jan 5 2021, 9:37 AM · Keyserver
werner triaged T5105: can't find users with Kleopatra when press "Look up on server" as Low priority.

(Reporter has problems running his own keyserver and accessing it.)

Jan 5 2021, 9:28 AM · Support, kleopatra, Keyserver

Dec 4 2020

Valodim added a comment to T4163: hkps://hkps.pool.sks-keyservers.net has to many bad servers to be a good default.

Perhaps of interest for this issue: the HKPS pool has consisted of only a single server for a couple of months now.

Dec 4 2020, 1:07 PM · gnupg, Keyserver

Nov 27 2020

werner lowered the priority of T3392: keyserver default should include pool onionbalance hkp://jirk5u4osbsr34t5.onion from Normal to Wishlist.
Nov 27 2020, 5:39 PM · Too Old, Keyserver, Feature Request, dirmngr

Oct 19 2020

fabior added a comment to T5105: can't find users with Kleopatra when press "Look up on server".

My sks keyserver is in Linux Ubuntu 18.04 LTS. As a client I'm using windows 10 and gpg4win is 3.1.13.

Oct 19 2020, 6:12 PM · Support, kleopatra, Keyserver
werner removed Version on T5105: can't find users with Kleopatra when press "Look up on server".
Oct 19 2020, 1:27 PM · Support, kleopatra, Keyserver
werner edited projects for T5105: can't find users with Kleopatra when press "Look up on server", added: Keyserver, kleopatra; removed gpg4win.

Are you on Windows or Linux? What version of Kleopatra or Gpg4win are you using?

Oct 19 2020, 1:27 PM · Support, kleopatra, Keyserver

Sep 17 2020

Georg3 created T5072: Keyserver presents the expiry date incorrectly in the S1 Public space.
Sep 17 2020, 10:35 AM · Keyserver

Aug 12 2020

auth0rize created U11 Jacob Smith in the S1 Public space.
Aug 12 2020, 8:11 AM · Keyserver

Jul 9 2020

werner closed T4856: GPG: Key Exchange Put public OpenPGP key into signature as Resolved.
Jul 9 2020, 1:15 PM · Feature Request, gpgol, Keyserver, gnupg

Mar 14 2020

werner added a comment to T4856: GPG: Key Exchange Put public OpenPGP key into signature.

I think that this chnage is useful enough to be backported to 2.2. Done that.

Mar 14 2020, 8:14 PM · Feature Request, gpgol, Keyserver, gnupg

Mar 13 2020

werner changed the status of T4856: GPG: Key Exchange Put public OpenPGP key into signature from Open to Testing.
Mar 13 2020, 5:29 PM · Feature Request, gpgol, Keyserver, gnupg
werner added a comment to T4856: GPG: Key Exchange Put public OpenPGP key into signature.

You can test it now out using GnuPG master: Just add --include-key-block and you can then verify using an empty keyring. Currently --auto-key-retrieve is not needed but we need to think on how we can enable or disable this during verification.

Mar 13 2020, 5:28 PM · Feature Request, gpgol, Keyserver, gnupg