Page MenuHome GnuPG
Feed Advanced Search

Yesterday

aheinecke added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

I do not think that this is the only place where such an issue occurs. Maybe we should make the documentation clearer about context key reuse. But the context is specifically designed to cache information about a key, so as to avoid memory overhead. I learned early on that its best for each new operation to use a new context. A context is basically an instance of gpg or gpgsm. So you start one process, ask it for a keylist, keep the process running, start another process, modify the key database, and then ask the first process again about his worldview. Either the first process is a bit confused because it has read data and then that data changed (what happens here) or it has no idea about the change since it was efficient and only read the database once. But here in this example you should be able to reproduce this also by making any other modifications to the key, adding other subkeys, userids etc. That GPGME even notices the secret key is more of a side effect of how the programming works because the GPGME gpg process will ask the gpg-agent (so a third process).

Wed, May 28, 9:19 PM · gnupg, gpgme, Bug Report
aheinecke added a comment to T7434: Kleopatra: Initial keylisting hangs for ~60 seconds (gpg-agent: Socket ...S.gpg-agent cannot be bound).

The more I think of this, the more likely this appears to me as the source for all that random startup weirdness of GnuPG. Say you are on a large keyring and on a train, then that keyring is first passed through your enterprise malware protection for scanning or something like that. Then it works again until some metric, hash or something else changes.

Wed, May 28, 8:37 PM · gnupg, kleopatra
aheinecke added a comment to T7434: Kleopatra: Initial keylisting hangs for ~60 seconds (gpg-agent: Socket ...S.gpg-agent cannot be bound).

My recommendation would at this point be to use procmon with a file filter for just "If path contains gnupg then include" I mean maybe go only for the locking dirs but this way you will not only see what the GnuPG processes are doing but what everyone on the system is doing to the locks. So you will see when my old friends, third party security software might interfere.
For example: You will see on a default Windows which files are checked through telemetry. And here in this example you see directly that the Microsoft Malware Protection Engine is accessing the agents socket.

Wed, May 28, 8:16 PM · gnupg, kleopatra

Fri, May 23

werner closed T7428: Release GnuPG 2.4.8 as Resolved.
Fri, May 23, 11:58 AM · gnupg, Release Info

Mon, May 19

chengr28 added a comment to T7577: GnuPG could not work when TCP congestion provider is set to BBR2 in Windows.

Spent some time discovering and unfortunately it's Windows's bug in loopback interface.
I wrote a test demo (blocking mode) to exchange data and watched their packets, found that network stack would drop packets when congestion control algorithm is set to BBR2. It seems the second data exchange was broken.

Mon, May 19, 3:20 PM · Support, Not A Bug, gnupg, Bug Report

Fri, May 16

dkg added a comment to T5993: gpg should reject compressed packets outside of messages.

For example Poppler uses GnuPG comment packets to lower its own attack surface by leaving all OpenPGP handling to gpg. The patch (or at least the version we noticed in Fedora and Debian) entirely breaks this use.

Fri, May 16, 4:12 PM · Feature Request, gnupg
werner closed T5993: gpg should reject compressed packets outside of messages as Resolved.
Fri, May 16, 2:46 PM · Feature Request, gnupg
werner added a comment to T5993: gpg should reject compressed packets outside of messages.

(The commits had a wrong bug it in their message)

Fri, May 16, 2:44 PM · Feature Request, gnupg
werner added a comment to T5993: gpg should reject compressed packets outside of messages.

It might be useful to have samples of compressed keys:

Fri, May 16, 2:20 PM · Feature Request, gnupg
werner updated subscribers of T5993: gpg should reject compressed packets outside of messages.

No, we can't do much about this. It has always been easy to create compression bombs and the more relevant thing here is compressed signed or encrypted data. Or just compressed mails. The patch by @DemiMarie is way to complicated for what it wants to achieve and actually breaks existing use cases. For example Poppler uses GnuPG comment packets to lower its own attack surface by leaving all OpenPGP handling to gpg. The patch (or at least the version we noticed in Fedora and Debian) entirely breaks this use.

Fri, May 16, 12:04 PM · Feature Request, gnupg

Wed, May 14

werner added a comment to T7589: Unable to export SSH keys for ED25519 keys generate on a SmartCard.

Using the primary key for ssh was not intended and thus not tested. I have not yet found the time too look closer at your report. Just one remark:

Wed, May 14, 12:32 PM · gnupg, ssh, Bug Report
werner added a project to T7589: Unable to export SSH keys for ED25519 keys generate on a SmartCard: gnupg.
Wed, May 14, 12:07 PM · gnupg, ssh, Bug Report

Tue, May 13

werner closed T7171: Allow for empty Subject in X.509 as Resolved.
Tue, May 13, 3:21 PM · libksba, Bug Report, gnupg, S/MIME
werner closed T6941: gpgsm/dirmngr: support for end-entity certificates with an empty "Subject DN", a subtask of T7171: Allow for empty Subject in X.509, as Resolved.
Tue, May 13, 3:00 PM · libksba, Bug Report, gnupg, S/MIME
werner added a subtask for T7171: Allow for empty Subject in X.509: T6941: gpgsm/dirmngr: support for end-entity certificates with an empty "Subject DN".
Tue, May 13, 2:58 PM · libksba, Bug Report, gnupg, S/MIME

Fri, May 9

werner set External Link to https://lists.gnupg.org/pipermail/gnupg-announce/2025q2/000492.html on T7586: Release GnuPG 2.5.6.
Fri, May 9, 5:02 PM · gnupg, Release Info

Thu, May 8

ikloecker added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

I think it would be much better if GnuPG automatically performed a key listing immediately after key generation when a smartcard is involved. This would allow GnuPG to detect the presence of the subkey on the card right away, rather than leaving it marked as a stub until the user manually lists keys.

Thu, May 8, 9:14 PM · gnupg, gpgme, Bug Report
Saturneric added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

I see that you generated the secret encryption subkey with backup. This means that the secret subkey is generated on your computer, then copied to the card, and then deleted from your computer. The deletion is the reason why the subkey is marked as stub. Only after listing the keys on the card gpg notices that the secret key is actually on the card.

Thu, May 8, 6:37 PM · gnupg, gpgme, Bug Report
werner updated the task description for T7586: Release GnuPG 2.5.6.
Thu, May 8, 3:43 PM · gnupg, Release Info
werner closed T7632: gnupg test suite fails to build on AIX. as Resolved.
Thu, May 8, 3:32 PM · AIX, gnupg, Bug Report
werner closed T7638: gpg on Solaris does not print a signal description as Resolved.
Thu, May 8, 3:32 PM · Solaris, gnupg, Bug Report
werner closed T7576: keyboxd: Searching <email@Example.COM> as Resolved.
Thu, May 8, 3:31 PM · gnupg, Bug Report
werner closed T7583: 2.5.5 removes sig on clean that 2.5.4 and earlier kept as Resolved.
Thu, May 8, 3:30 PM · gnupg, Bug Report
werner closed T7547: signatures from revoked or expired keys show up as missing keys, a subtask of T7527: Keyring/keybox denial of service, as Resolved.
Thu, May 8, 3:29 PM · OpenPGP, gnupg, Bug Report
werner updated the task description for T7586: Release GnuPG 2.5.6.
Thu, May 8, 3:29 PM · gnupg, Release Info

Wed, May 7

dkg added a comment to T7583: 2.5.5 removes sig on clean that 2.5.4 and earlier kept.

btw, my clue was that in that last --check-sigs, if i used --debug-all i got this:

Wed, May 7, 10:35 PM · gnupg, Bug Report
dkg added a comment to T7583: 2.5.5 removes sig on clean that 2.5.4 and earlier kept.

This affects certification-only primary keys when doing web-of-trust calculations.

Wed, May 7, 9:46 PM · gnupg, Bug Report
collinfunk added a comment to T7638: gpg on Solaris does not print a signal description.

Hi Werner, I submitted a patch right after this bug report using AC_CHECK_DECLS([_sys_siglist]) [1].

Wed, May 7, 3:03 AM · Solaris, gnupg, Bug Report

Tue, May 6

dkg added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

To avoid further noise on this ticket, i've done as requested and posted to gnupg-devel : (https://lists.gnupg.org/pipermail/gnupg-devel/2025-May/035875.html

Tue, May 6, 10:26 PM · Not A Bug, gnupg
ikloecker added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

The first call of get_key receives the following key listing from gpg:

2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: sec:-:256:19:C4A24EB0B5F2E025:1746474606:::u:::s
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: cESCA:::D2760001240100000006180489130000::brainp
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: oolP256r1:23::0:<LF>
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: fpr:::::::::DEC0948C398A6E7B50746EC6C4A24EB0B5F2
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: E025:<LF>
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: grp:::::::::06BDACFBDEDBC5783A75AE5E7251FA3369C4
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: 0FF4:<LF>
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: uid:-::::1746474606::2222D8E2F373B9BDEE0DEA2A20A
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: 9402214E9F984::Eric <eric@bktus.com>::::::::::0:
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: <LF>
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: ssb:-:256:19:EAFC5EA29B758B22:1746474606::::::a:
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: ::D2760001240100000006180489130000::brainpoolP25
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: 6r1:23:<LF>
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: fpr:::::::::1AD596DDEC9B8CF3C1AC6C41EAFC5EA29B75
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: 8B22:<LF>
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: grp:::::::::52F0797C0B0439BBD718E2534D46656A6C45
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: 6A78:<LF>
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: ssb:-:256:18:A874804DB497B91C:1746474606::::::e:
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: ::#::brainpoolP256r1:23:<LF>
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: fpr:::::::::33B273C7BD46E4EB63DD6874A874804DB497
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: B91C:<LF>
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: grp:::::::::34A1F8D9B2AA0CF07C2E042D70E10F9D4EBE
2025-05-05 21:50:23 gpgme[57059]     _gpgme_io_read: check: E734:<LF>

Note the line

ssb:-:256:18:A874804DB497B91C:1746474606::::::e:::#::brainpoolP256r1:23:<LF>

where the # marks the subkey as stub.

Tue, May 6, 9:21 AM · gnupg, gpgme, Bug Report
werner added a comment to T7638: gpg on Solaris does not print a signal description.

Right now we have

Tue, May 6, 8:32 AM · Solaris, gnupg, Bug Report
collinfunk added a comment to T7638: gpg on Solaris does not print a signal description.

Interesting, that sounds like a portable method. I am not very familiar with GPG internals, but to me that sounds like quite a bit of work. Unless there is another benefit to doing so, I don't think it is worth it just to print signal names.

Tue, May 6, 4:26 AM · Solaris, gnupg, Bug Report

Mon, May 5

Saturneric added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

I have now identified the exact conditions and a reproducible path for the issue I previously reported. I will also attach the relevant gpgme.log.

Mon, May 5, 10:01 PM · gnupg, gpgme, Bug Report
werner added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

I doubt that this is a gpgme problem. With a gpgme log we will be able see the exact commands send to gpg and replicate this on the command line.

Mon, May 5, 5:45 PM · gnupg, gpgme, Bug Report
werner added a comment to T7628: gpg uses "month" as a synonym for 30 days.

And the US administration might even change the definition of a year to, say, 100 months so that potus can rightfully keep his promise that there won't be more election in the foreseeable future ;-)

Mon, May 5, 4:27 PM · gnupg, Bug Report
ikloecker added a comment to T7628: gpg uses "month" as a synonym for 30 days.

By the way, "years" is also "incorrect" once in ~4 years because it uses n*365 days. Werner's advice still applies. Enter an ISO date if you want an exact date. Or use a UI tool like Kleopatra.

Mon, May 5, 3:31 PM · gnupg, Bug Report
werner triaged T7632: gnupg test suite fails to build on AIX. as High priority.
Mon, May 5, 11:12 AM · AIX, gnupg, Bug Report
werner triaged T7638: gpg on Solaris does not print a signal description as Low priority.

The main problem here was that this all is not async-safe and thus I once implemented only the standard cases I could test easily.

Mon, May 5, 11:11 AM · Solaris, gnupg, Bug Report
ikloecker added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

The logs of gpgme would be helpful, i.e. run your test program with GPGME_DEBUG=8:$(pwd)/gpgme-$(date +"%Y-%m-%d-%H%M%S").log to create a log file with gpgme's logs.

Mon, May 5, 11:07 AM · gnupg, gpgme, Bug Report
werner added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

For the records:

Mon, May 5, 9:24 AM · Not A Bug, gnupg
werner added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

A bug tracker shall never be used for discussion because the audience is not as expected. Only very few people follow a certain bug but several hundreds are following discussion on gnupg-devel@. That is basic hacker knowledge.

Mon, May 5, 9:14 AM · Not A Bug, gnupg
werner changed the status of T7583: 2.5.5 removes sig on clean that 2.5.4 and earlier kept from Open to Testing.
Mon, May 5, 9:12 AM · gnupg, Bug Report

Sun, May 4

collinfunk created T7638: gpg on Solaris does not print a signal description.
Sun, May 4, 8:43 PM · Solaris, gnupg, Bug Report
heiko added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

I am surprised that you don't want to use the issue tracker for issues.
GnuPG's trust calculations are quite clearly broken, by any metric. There's nothing to discuss here.

Sun, May 4, 8:13 PM · Not A Bug, gnupg
werner closed T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate as Resolved.

Heiko, I told you already in T7106 that it is not a good idea to re-open a ticket. If you really want to discuss stuff, take that to a mailing list.

Sun, May 4, 8:06 PM · Not A Bug, gnupg
heiko reopened T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate as "Open".

I see two interesting angles from which to think about this Web of Trust calculation:

Sun, May 4, 1:26 PM · Not A Bug, gnupg

Fri, May 2

werner added a comment to T7583: 2.5.5 removes sig on clean that 2.5.4 and earlier kept.

Yes, this is related to T7547. With my last fix for that I overlooked that we use PUBKEY_USAGE_CERT to internally request the primary key but that one is not set because in general USAGE_SIG means the same (except for some case in PGP7 mode).

Fri, May 2, 11:03 AM · gnupg, Bug Report
werner added a project to T7632: gnupg test suite fails to build on AIX.: AIX.
Fri, May 2, 10:30 AM · AIX, gnupg, Bug Report
werner triaged T7629: gcc 15 warns about -Wunterminated-string-initialization in gnupg as Low priority.
Fri, May 2, 10:26 AM · gnupg, Bug Report
werner closed T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate as Resolved.

> I'm not sure i understand why "the latest" should be preferred.

Fri, May 2, 10:26 AM · Not A Bug, gnupg
collinfunk added a project to T7629: gcc 15 warns about -Wunterminated-string-initialization in gnupg: gnupg.
Fri, May 2, 6:50 AM · gnupg, Bug Report
collinfunk added a project to T7632: gnupg test suite fails to build on AIX.: gnupg.
Fri, May 2, 6:49 AM · AIX, gnupg, Bug Report
dkg added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

A bit more experimentation shows the same behavior, even if Alice's tsig of Bill is full, not marginal, and even if all signatures are made in the same second, which is the finest resolution that OpenPGP objects can report.

Fri, May 2, 12:48 AM · Not A Bug, gnupg
dkg added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

Interesting analysis, thanks for the sleuthing! I'm not sure i understand why "the latest" should be preferred. For example, in the graph made in this example, which part of the graph is the "latest"? Since the path from Alice to Carol is two hops long at least, it's conceivable that one path (A→Bob→C) has both "the latest" tsig *and* "the earliest" tsig, if the other path (A→Bill→C) happens to have been made between the other two tsigs.

Fri, May 2, 12:15 AM · Not A Bug, gnupg

Tue, Apr 29

werner edited projects for T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate, added: Not A Bug; removed Bug Report.

I also spend some time with this and the problem is described by this comment in trustdb.c:

Tue, Apr 29, 1:13 PM · Not A Bug, gnupg

Apr 28 2025

werner changed the status of T7106: Trailing newline trouble in clearsigned message generation and verification from Wontfix to Resolved.

No, it is not a bug and I beg you not to change the status again. Don't start the same trouble here as some of you guys did with the IETF WG!

Apr 28 2025, 5:19 PM · Not A Bug, gnupg
heiko changed the status of T7106: Trailing newline trouble in clearsigned message generation and verification from Resolved to Wontfix.
Apr 28 2025, 3:08 PM · Not A Bug, gnupg
heiko added a comment to T7106: Trailing newline trouble in clearsigned message generation and verification.

Err, I don't see why I would "need to test" anything further.

Apr 28 2025, 2:45 PM · Not A Bug, gnupg
werner closed T7106: Trailing newline trouble in clearsigned message generation and verification as Resolved.

This is just one build of PGP and you would need to test all versions on Windows, macOS and Unix. You also need to test against all versions of GnuPG since 1998 (when we started with interop tests). We won't change this in GnuPG and risk regression. If you have a problem with that go and add a fix to your tool - name it bug compatibility or whatever. And please do not re-open this bug.

Apr 28 2025, 2:20 PM · Not A Bug, gnupg
heiko reopened T7106: Trailing newline trouble in clearsigned message generation and verification as "Open".
Apr 28 2025, 12:05 PM · Not A Bug, gnupg
heiko added a comment to T7106: Trailing newline trouble in clearsigned message generation and verification.

This has been implemented and tested to be compatible with PGP - a looong time ago. iirc this was discussed around 1999 but might be only by private mail between the PGP hackers and me. Thus any change now might break PGP - which is still widely used (although mostly for encryption).

Apr 28 2025, 12:04 PM · Not A Bug, gnupg

Apr 27 2025

werner closed T7628: gpg uses "month" as a synonym for 30 days as Wontfix.

The report is correct but it does not make sense to fix it. If you want to use a concrete expiration date just enter the IS date at the prompt; use ? at the prompt for a short description.

Apr 27 2025, 9:19 PM · gnupg, Bug Report
ametzler1 created T7628: gpg uses "month" as a synonym for 30 days.
Apr 27 2025, 1:29 PM · gnupg, Bug Report

Apr 23 2025

werner closed T7622: `gpg --encrypt --default-recipient-self` emits wrong message about "signing" as Wontfix.

This is really a minor thing and and it is actually true if you also sign something.

Apr 23 2025, 8:58 AM · gnupg, Bug Report
gniibe changed the status of T7623: gpgscm: Fix fixed-size characters (for portability, specifically for GCC 15 or later) from Open to Testing.
Apr 23 2025, 3:16 AM · gnupg, gpgrt, Bug Report

Apr 22 2025

werner added projects to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated): gpgme, gnupg.
Apr 22 2025, 9:35 AM · gnupg, gpgme, Bug Report
gniibe added a comment to T7623: gpgscm: Fix fixed-size characters (for portability, specifically for GCC 15 or later).

doc/HACKING says it's OK to use variadic arg macros (from C99 features).
If it's OK, this patch can fix the initialization (which silences GCC 15 warnings):

Apr 22 2025, 7:53 AM · gnupg, gpgrt, Bug Report
gniibe renamed T7623: gpgscm: Fix fixed-size characters (for portability, specifically for GCC 15 or later) from gpgscm: Don't use fixed size characters (for portability, specifically for GCC 15 or later) to gpgscm: Fix fixed-size characters (for portability, specifically for GCC 15 or later).
Apr 22 2025, 7:50 AM · gnupg, gpgrt, Bug Report
gniibe triaged T7623: gpgscm: Fix fixed-size characters (for portability, specifically for GCC 15 or later) as Normal priority.
Apr 22 2025, 4:06 AM · gnupg, gpgrt, Bug Report

Apr 21 2025

dkg created T7622: `gpg --encrypt --default-recipient-self` emits wrong message about "signing".
Apr 21 2025, 6:20 PM · gnupg, Bug Report

Apr 20 2025

ametzler1 created T7619: [yat2m] gpg-agent manpage formatting issues.
Apr 20 2025, 4:09 PM · Documentation, yat2m, Bug Report

Apr 19 2025

ametzler1 created T7618: gpgsm: Allow selecting keys by SHA2 fpr.
Apr 19 2025, 4:53 PM · S/MIME, gnupg26, Feature Request
ametzler1 reopened T1421: GnuPG should verify --homedir option before creating a key as "Open".

Good morning,
I stumbled upon this when digging through old Debian bug reports against 1.4 and checking whether they still applied to 2.4. This one really still applies.

Apr 19 2025, 7:29 AM · Bug Report, gnupg

Apr 17 2025

dkg added a project to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate: gnupg.
Apr 17 2025, 7:24 PM · Not A Bug, gnupg

Apr 15 2025

andreasstieger added a comment to T7605: [PATCH] mail-to-translators, gpg-authcode-sign.sh: convert legacy egrep.

POSIX specifies and requires grep -E, but only mentions egrep as old.

Apr 15 2025, 9:51 AM · gnupg, Bug Report
werner triaged T7605: [PATCH] mail-to-translators, gpg-authcode-sign.sh: convert legacy egrep as Low priority.

Removing egrep from a Unix system will break all kind of stuff. I am not even sure whether old Unices support grep -E.

Apr 15 2025, 9:06 AM · gnupg, Bug Report

Apr 14 2025

andreasstieger updated the task description for T7605: [PATCH] mail-to-translators, gpg-authcode-sign.sh: convert legacy egrep.
Apr 14 2025, 9:23 PM · gnupg, Bug Report
andreasstieger created T7605: [PATCH] mail-to-translators, gpg-authcode-sign.sh: convert legacy egrep.
Apr 14 2025, 9:22 PM · gnupg, Bug Report

Apr 9 2025

werner changed the status of T7547: signatures from revoked or expired keys show up as missing keys, a subtask of T7527: Keyring/keybox denial of service, from Open to Testing.
Apr 9 2025, 1:54 PM · OpenPGP, gnupg, Bug Report
werner changed the status of T7544: Kleopatra (gnupg, gpgsm) hang on key-creation when x.509 certs are in keystore from Open to Testing.

There is no well defined pripority for the CRL DPs. The code enumarates the DP and tries one after the other until it founds one. If you use --ignore-http_dp http DPs are skipped and with --ignore-ldap-dp LDAP DPs are ignored.

Apr 9 2025, 1:50 PM · gnupg, kleopatra, Bug Report

Apr 8 2025

werner moved T7478: _gpg_close_all_fds hangs on nwer Linux systems in a simple chroot w/o /proc/self/fd from Backlog to QA on the gpgrt board.
Apr 8 2025, 8:44 AM · Linux, gnupg, gpgrt, Bug Report

Apr 7 2025

gniibe changed the status of T4021: dirmngr: dirmngr/dns.c issue with 127.0.0.1 from Open to Testing.

Fix pushed by: rG1ed8b0e7b403: dirmngr: Fix libdns with 127.0.0.1.

Apr 7 2025, 4:45 AM · gnupg24, dirmngr
gniibe added a comment to T4021: dirmngr: dirmngr/dns.c issue with 127.0.0.1.

For Linux kernel, once, it was proposed:
https://patchwork.ozlabs.org/project/netdev/patch/1490748756.24891.27.camel@edumazet-glaptop3.roam.corp.google.com/

Apr 7 2025, 4:10 AM · gnupg24, dirmngr
gniibe added a comment to T4021: dirmngr: dirmngr/dns.c issue with 127.0.0.1.

Another problem with same cause (possibly) is reported: https://lists.gnupg.org/pipermail/gnupg-devel/2025-April/035845.html

Apr 7 2025, 3:56 AM · gnupg24, dirmngr

Apr 6 2025

ametzler1 added a comment to T7071: gpg: Support of No CRC in ASCII armor.

this marked as fixed in 2.4.7. However afaict only one of the two patches made it to STABLE-BRANCH-2-4, b1857a2836c9a91ef4e359ef7ba949b54c77219d did not.

Apr 6 2025, 6:33 PM · gnupg, Bug Report

Apr 2 2025

werner edited projects for T7328: Add Kleopatra configs to gpgconf -X, added: gnupg, Windows; removed gnupg22.
Apr 2 2025, 11:31 AM · Windows, gnupg, Feature Request

Mar 26 2025

gniibe changed the status of T7576: keyboxd: Searching <email@Example.COM> from Open to Testing.
Mar 26 2025, 8:20 AM · gnupg, Bug Report
gniibe added a comment to T7576: keyboxd: Searching <email@Example.COM>.

OK. Relying on SQLite semantics for COLLATE NOCASE would not be good.
Exactly same existing semantics (only care about ASCII uppercase characters) is good.

Mar 26 2025, 6:26 AM · gnupg, Bug Report

Mar 25 2025

werner updated the task description for T7530: Release GnuPG 2.5.5.
Mar 25 2025, 9:35 AM · Release Info, gnupg
werner triaged T7586: Release GnuPG 2.5.6 as Normal priority.
Mar 25 2025, 9:35 AM · gnupg, Release Info

Mar 24 2025

ikloecker added a comment to T7583: 2.5.5 removes sig on clean that 2.5.4 and earlier kept.

I noticed that the signing key B0D589D46708EC99 is a certify-only key. That signatures made with this key are dropped could be another regression of the fix for dkj's DoS bug.

Mar 24 2025, 10:50 PM · gnupg, Bug Report
ametzler1 added a comment to T7583: 2.5.5 removes sig on clean that 2.5.4 and earlier kept.

Taking a bigger sample of keys from the same domain and doing the same testing shows that the signature by B0D589D46708EC99 is removed on all keys.

Mar 24 2025, 6:32 PM · gnupg, Bug Report
werner added a comment to T7576: keyboxd: Searching <email@Example.COM>.

You mean this would be better becuase it is not clear how we handle X.509 addrsppec (see override_mbox arg of store_into_userid)? I guess COLLATE NOCASE does it the standard way by folding all uppercase characters and not just the ASCII characters as we do in GnuPG. This would be a problem.

Mar 24 2025, 9:45 AM · gnupg, Bug Report

Mar 23 2025

ametzler1 renamed T7583: 2.5.5 removes sig on clean that 2.5.4 and earlier kept from 2.5.5 remves sig on clean that 2.5.4 and earlier kept to 2.5.5 removes sig on clean that 2.5.4 and earlier kept.
Mar 23 2025, 12:49 PM · gnupg, Bug Report
ametzler1 created T7583: 2.5.5 removes sig on clean that 2.5.4 and earlier kept.
Mar 23 2025, 12:49 PM · gnupg, Bug Report

Mar 21 2025

werner triaged T7577: GnuPG could not work when TCP congestion provider is set to BBR2 in Windows as Normal priority.

Indeed, GnuPG's IPC uses TCP connections from 127.0.0.1 to 127.0.0.1 taking the destination port (and a cookie) from a file. We can't change that easily to the new Unix socket implementation Windows recently introduced. I hope there is a way to exclude localhost->localhost from congestion control.

Mar 21 2025, 8:43 PM · Support, Not A Bug, gnupg, Bug Report
gniibe added a comment to T7576: keyboxd: Searching <email@Example.COM>.

I changed my mind. SQLite specific patch might be better:

diff --git a/kbx/backend-sqlite.c b/kbx/backend-sqlite.c
index 4c67c3ef7..1db2f2c8d 100644
--- a/kbx/backend-sqlite.c
+++ b/kbx/backend-sqlite.c
@@ -154,7 +154,7 @@ static struct
      /* The full user id - for X.509 the Subject or altSubject.  */
      "uid  TEXT NOT NULL,"
      /* The mail address if available or NULL.  */
-     "addrspec TEXT,"
+     "addrspec TEXT COLLATE NOCASE,"
      /* The type of the public key: 1 = openpgp, 2 = X.509.  */
      "type  INTEGER NOT NULL,"
      /* The order number of the user id within the keyblock or
Mar 21 2025, 8:50 AM · gnupg, Bug Report
gniibe added a comment to T7576: keyboxd: Searching <email@Example.COM>.

I changed my mind. SQLite specific patch might be better:

diff --git a/kbx/backend-sqlite.c b/kbx/backend-sqlite.c
index 4c67c3ef7..1db2f2c8d 100644
--- a/kbx/backend-sqlite.c
+++ b/kbx/backend-sqlite.c
@@ -154,7 +154,7 @@ static struct
      /* The full user id - for X.509 the Subject or altSubject.  */
      "uid  TEXT NOT NULL,"
      /* The mail address if available or NULL.  */
-     "addrspec TEXT,"
+     "addrspec TEXT COLLATE NOCASE,"
      /* The type of the public key: 1 = openpgp, 2 = X.509.  */
      "type  INTEGER NOT NULL,"
      /* The order number of the user id within the keyblock or
Mar 21 2025, 8:36 AM · gnupg, Bug Report
gniibe updated the task description for T7576: keyboxd: Searching <email@Example.COM>.
Mar 21 2025, 8:27 AM · gnupg, Bug Report
gniibe claimed T7576: keyboxd: Searching <email@Example.COM>.

Here is a possible change:

Mar 21 2025, 8:15 AM · gnupg, Bug Report