Done
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Fri, Mar 14
Re-opening because I think rGaa36f6ae8bae needs to be backported to GnuPG 2.4 (see T7568). The fix for T7309 which introduced the regression has been backported to GnuPG 2.4.
I've offered https://github.com/bestpractical/gnupg-interface/pull/16 to GnuPG::Interface, and am testing it out in debian unstable.
Thu, Mar 13
I'll work on making a patch to offer a flexible test suite.
Alternately, i suppose we could ask GnuPG::Interface to drop the variant parts of that test entirely. @werner, If you have a preference for what they test, it would be good to know. I suspect your opinion would carry weight with the maintainer there.
Well, we also have the gpgme test suite which tests a couple of other things and for obvious reasons we need to keep this stable. Granted, sometimes we had to change the gpgme test suite as well. My personal preference would be your second choice.
Thanks for the fix for the double-free on --no-sig-cache, that appears to be an issue on all released gpg versions, as i can crash them directly when i --no-sig-cache.
Wed, Mar 12
Interestingly, from this i'm learning that the patch actually *normalizes* the output so that we see the same thing regardless of ordering. the different output based on certificate order happens only in the unpatched version.
Please test without the --import keys.pgp -- just import filtered.pgp or filtered2.pgp.
I can't replicate your findings here . In a test directory w/o a gpg.conf:
Uihhh
with --no-sig-cache --check-sigs i get the following error with the patch applied:
Did you also tried with --no-sig-cache ? That could help to get a better insight into the reason for that difference.
Tue, Mar 11
OK, now i really don't know what the issue is on the 2.4 branch. trying to replicate it with and without this patch, the --with-colons output of --check-sigs appears to depend on the order in which the certificates were ingested.
hm, digging a bit further, i think the above changes have to do with third-party signatures using SHA1, *not* with expired certifiers. in 2.4.7, i see a change from % to ! for these certifications. (2.2.x, which i know is EOL) shows the difference between ? and !. I'm trying to make a simpler replicator now.
With the patch "gpg: Fix regression for the recent malicious subkey DoS fix", there is a change in how gpg --check-sigs reports certifications from expired keys.
Fri, Mar 7
it would be great to include a test in the test suite that ensures that the --status output behaves as expected in the face of expired or revoked keys.
Thu, Mar 6
Please use "unbreak now" only for *released* software with a criticial bug.
Feb 5 2025
I think there's some confusion.
changed the workboard to gpd5x as this is still the case in Gpg4win 5.0-Beta versions.
Feb 3 2025
Jan 8 2025
Got a simple fix for this which does two things:
- Correctly act upon an error from the backup file writing
- Print a warning note.
In T2169#196673, @werner wrote:Shall we handle this with additional retry prompts, w/o a timeout? I think this makes sense because creating keys with a backup file and a passphrase is a manual task anyway.
There is a regression due to the regression fix in rGb30c15bf7c5336c4abb1f9dcd974cd77ba6c61a7 (from Dec 24 2015) or some related commits:
Jan 6 2025
Dec 5 2024
Dec 2 2024
Closed, since this was documentation for the workaround, four years ago.
Just a reminder: with Gnuk 1.2.15 and an ed25519 key PubkeyAuthentication unbound is required for hosts using the new feature.
Nov 29 2024
Fixed in 2.4.6.
Nov 25 2024
For this ticket, I reviewed the code around my SOS changes.
Because I'd like to focus the point of retaining binary representation when doing import->export,
I created another thicket: T7426
Nov 20 2024
thanks for the clarification. i was not objecting to the workflow, i was trying to understand so that i can interact with the bug tracker appropriately. I was unaware of the difference between "milestones" and other project tags. I'll try to get that right in the future.
Please do not add milestone tags.
Nov 14 2024
I put "scd" tag and let me claim this ticket.
Nov 12 2024
Nov 8 2024
For Beta-75 it looks similar judging from my first tries.
Nov 7 2024
I managed to get the same "loading certificate" message several times in a row on this test instance by stopping and starting Kleopatra in a row twice. After removing the Signature Card 2.0 this did not happen again in 5-6 tries, although I collected 2 lingering listing processes again (not both started on the same startup). Even import of a X.509 certificate worked.
Next I managed to have one gpg and one gpgsm process each left over from the last execution of Kleopatra.
After starting Kleopatra new anyway, again "loading certificate cache" and an additional pair of gpg and gpgsm listing processes start.
Had a occurrence of the never ending "loading certificate cache" issue again.
There was a leftover gpgsm process from the previous tests (although Kleopatra warned when I closed it, that processes still running in the background were there and would be aborted).
Nov 5 2024
Nov 2 2024
Nov 1 2024
@ebo Thank you for your continuous testing.
Oct 31 2024
Unfortunately, this seems not to have ended the sporadic hangs.
I just saw a hanging initial keylisting with gpg4win-beta-70 which has gpg 2.4.6
Oct 29 2024
Backported to 2.4 to go into 2.4.6
Fix backported to 2.4
Oct 24 2024
Passing ticket to werner to consider backports.
Oct 17 2024
Oct 9 2024
Oct 4 2024
Tested with VS-Desktop-3.2.94.2-Beta.
Works as expected on the cli.
Oct 2 2024
gpgme should handle lists correctly. In Kleopatra those options are not shown in the configuration dialog because they are GC_LEVEL_INVISIBLE, i.e. Kleopatra can read them programmatically but they are not shown to the user.
Oct 1 2024
In T6882#191854, @werner wrote:While testing this I noticed that only the last adsk or trusted key is listed. Thus several assurances of this options are not properly represented. See T7313
Fixed for master. Let's first test this with kleopatra.
Done for 2.2. It is already in 2.4.
Sep 27 2024
Will do.
It is reproducible bug even with master branch.
Sep 26 2024
werner: Can you also backport listing of "default-new-key-adsk" with gpgconf so that Kleopatra can check whether a default ADSK is set?
Backported to 2.2
I have a look at the log file of gpg-agent.log. I can see that six PKDECRYPT requests are handled simultaneously. I think that it's out of secure memory to decrypt the private key which results pinentry request.
Sep 25 2024
We won't do that for Windows.
Fixed in 2.2 with: rGc33523a0132e047032c4d65f9dedec0297bfbef3