In T4060#190972, @werner wrote:We need a way to pass --known-notation to gpgme_op_verify
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Sep 4 2024
Sep 4 2024
wiktor-k added a comment to T4060: Add ability to mark critical notations as "recognized" during signature verification.
• werner reopened T4060: Add ability to mark critical notations as "recognized" during signature verification as "Open".
We need a way to pass --known-notation to gpgme_op_verify
Aug 28 2023
Aug 28 2023
Jul 24 2023
Jul 24 2023
• ebo moved T5424: GnuPG w32: Expand environment variables when reading registry paths from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T5537: Use CSIDL_LOCAL_APPDATA for the socketdir from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T5655: In -de-vs mode it is not possible so verify sigs with Ed25519 release keys. from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T5732: Backport option reading in gpgconf to 2.2 from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T5800: gpgconf: Ignores keyserver option in gpgsm.conf from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T6138: gpgconf: List auto-key-import and include-key-block again from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Jul 5 2023
Jul 5 2023
• werner removed a project from T2701: Do not let users create keys without an expiration date: gnupg.
Also done for 2.2.
Jun 5 2023
Jun 5 2023
To align the default expiration time with the BSI approval and other related software we change this now to 3 years.
Apr 5 2023
Apr 5 2023
• ebo moved T6238: regexp for trust signature domain restriction does not work if key only has an e-mail address from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T5972: Can't insert charaters in a magic-wand generated password from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T6067: dirmngr 2.2 does not ask keyservers for fingerprints from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T5650: Check problems with gpgconf and global config files from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T4729: WKD via http_proxy does not work if DNS is broken/unavailable from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Jan 20 2023
Jan 20 2023
• werner added a comment to T5655: In -de-vs mode it is not possible so verify sigs with Ed25519 release keys..
The introduction of --override-compliance-check actually hid the real
cause for the signature verification problem in de-vs mode for the
Ed25519 key. The real fix is to handle the EdDSA algorithm in
gnupg_pk_is_allowed.
Jan 19 2023
Jan 19 2023
Release quite some time ago.
• werner moved T6253: GpgSM: Backport ECC support to 2.2 from Backlog to For next release on the gnupg (gpg22) board.
Dec 12 2022
Dec 12 2022
• werner moved T6238: regexp for trust signature domain restriction does not work if key only has an e-mail address from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• werner moved T6263: Allow OCB encryption in 2.2 from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Dec 9 2022
Dec 9 2022
Dec 6 2022
Dec 6 2022
hydra3333 added a comment to T6241: cross-compile fails after commit 745d333cf7b5b6fee62e3b26c8a2ccc004e017da.
Thanks !
• werner closed T6241: cross-compile fails after commit 745d333cf7b5b6fee62e3b26c8a2ccc004e017da as Resolved.
A real fix will be in the next gpgrt release
Dec 5 2022
Dec 5 2022
• ikloecker edited projects for T2671: "Invalid option" with utf-16 config files (windows), added: gnupg (gpg22); removed kleopatra.
In T2671#158357, @werner wrote:It seems that editing a pre-created revocation certificate on Windows with Notepad doesn't let Kleopatra detect this correctly as OpenPGP file and thus refuses to import. Works on the command line but needs more testing.
Nov 17 2022
Nov 17 2022
We need to do this also for CHANGE REFERENCE DATA - however, there should be an extra option so that we can debug this despite of the redacting.
Nov 16 2022
Nov 16 2022
Nov 14 2022
Nov 14 2022
Oct 31 2022
Oct 31 2022
Oct 28 2022
Oct 28 2022
• werner changed the status of T6238: regexp for trust signature domain restriction does not work if key only has an e-mail address from Open to Testing.
• werner lowered the priority of T4921: Support import of PKCS#12 encoded ECC private keys. from High to Normal.
Shall we really backport this to 2.2 given that ECC for S/MIME is in most cases a smartcard thing?
• werner closed T6252: Support ECC for Netkey cards also in 2.2, a subtask of T6253: GpgSM: Backport ECC support to 2.2, as Resolved.
• werner added a comment to T6238: regexp for trust signature domain restriction does not work if key only has an e-mail address.
Fixed for master but not yet tested.
• werner moved T6238: regexp for trust signature domain restriction does not work if key only has an e-mail address from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• werner moved T6252: Support ECC for Netkey cards also in 2.2 from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• werner moved T6253: GpgSM: Backport ECC support to 2.2 from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Oct 24 2022
Oct 24 2022
• ebo closed T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption as Resolved.
works as proposed by werner.
Oct 20 2022
Oct 20 2022
• werner added a parent task for T6252: Support ECC for Netkey cards also in 2.2: T6253: GpgSM: Backport ECC support to 2.2.
• werner added a subtask for T6253: GpgSM: Backport ECC support to 2.2: T6252: Support ECC for Netkey cards also in 2.2.
• werner changed the status of T6252: Support ECC for Netkey cards also in 2.2 from Open to Testing.
• werner added a parent task for T6252: Support ECC for Netkey cards also in 2.2: T4938: Support Signature Card V2.0 (NKS15).
• werner added a comment to T6238: regexp for trust signature domain restriction does not work if key only has an e-mail address.
The latter. Detecting mail addresses with regexp is anyway a kludge and we have more stringent code to detect mail addresses in a user-id.
dkg added a comment to T6238: regexp for trust signature domain restriction does not work if key only has an e-mail address.
@werner i'm not sure i understand what "easy to enclose them in angle brackets just for comparison" means.
Oct 19 2022
Oct 19 2022
• gniibe changed the status of T6244: GnuPG: GnuPG 2.2.40 LTS FTBFS against new Libgpg-error 1.46 from Open to Testing.
Oct 18 2022
Oct 18 2022
• werner added a comment to T6238: regexp for trust signature domain restriction does not work if key only has an e-mail address.
We already detect mail addresses for different purposes and thus it will be easy to enclose them in angle brackets just for comparision.. Almost all trust signatures out there are created by gpg and used to restrict the mail domain. No need for different regexp. See also the comments in the code related to the history.
Ah, sorry, I did my own changes before looking T6244#164317
Pushed the changes to 2.2 and master.
Thank you for your report. The issue is handling of static linking in GnuPG.
Oct 17 2022
Oct 17 2022
neal added a comment to T6238: regexp for trust signature domain restriction does not work if key only has an e-mail address.
It will be hard to fix this. GnuPG supports exactly one class of regular expressions: something bracketed between "<[^>]+[@.]" and ">$" . Even if the next release of gpg supports more regular expressions, gpg will have to wait years before it can start emitting different regular expressions for scoped tsigs by default.
dkg added a comment to T6238: regexp for trust signature domain restriction does not work if key only has an e-mail address.
I recommend, when making a User ID with only an e-mail address, to populate the User IDs by wrapping it in an angle bracket, rather than just leaving the raw e-mail address. It's not just the regexp matcher -- there are other pieces of OpenPGP software that won't recognize a raw e-mail address in a user ID as an e-mail address. It also makes it easy to distinguish such a User ID from a User ID that is not at all an e-mail address.
Thank you for your report. IIUC, your log is the build log of GnuPG 2.2, so, I put the tag "gnupg (gpg22)".
Oct 15 2022
Oct 15 2022
I believe https://dev.gnupg.org/T6239 also applies here. It would be great if the fix could be backported.
Oct 14 2022
Oct 14 2022
Oct 13 2022
Oct 13 2022
• werner triaged T6238: regexp for trust signature domain restriction does not work if key only has an e-mail address as Normal priority.
Sep 29 2022
Sep 29 2022
• werner changed the status of T6221: When encrypting, gpg claims DE_VS compliance with non-compliant gcrypt from Open to Testing.
Indeed, the status line should not be emitted in this case. Thanks.
justus added a comment to T6221: When encrypting, gpg claims DE_VS compliance with non-compliant gcrypt.
% gpgconf --list-options gpg | grep compliance compliance:16:2::1:1::"gnupg:: compliance_de_vs:144:3::2:2::0:: % dpkg --list libgcrypt20 | cat Desired=Unknown/Install/Remove/Purge/Hold | Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend |/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad) ||/ Name Version Architecture Description +++-=================-============-============-===================================== ii libgcrypt20:amd64 1.10.1-2 amd64 LGPL Crypto library - runtime library % gpg --version gpg (GnuPG) 2.2.39 libgcrypt 1.10.1 Copyright (C) 2022 g10 Code GmbH License GNU GPL-3.0-or-later <https://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law.
• aheinecke triaged T6221: When encrypting, gpg claims DE_VS compliance with non-compliant gcrypt as Low priority.
With a gcrypt not claiming compliance you should not get the status compliant or not but GnuPG should error out with forbidden.
• werner added a project to T6221: When encrypting, gpg claims DE_VS compliance with non-compliant gcrypt: gnupg (gpg22).
Justus, you should know how to write a proper bug report. Please do that and don't just paste some more or less random output here with just hint that Libgcrypt is not compliant. tia.
Sep 25 2022
Sep 25 2022
Sep 22 2022
Sep 22 2022
• werner removed a project from T6067: dirmngr 2.2 does not ask keyservers for fingerprints: Restricted Project.
• werner changed the status of T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption from Open to Testing.
• werner moved T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Sep 16 2022
Sep 16 2022
• ikloecker renamed T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption from Kleopatra: Message "not VS-NfD compliant" is shown incorrectly to GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption.
• werner triaged T6205: GnuPG: Unknown encryption keys should not result in non-compliant encryption on decryption as Normal priority.
Sep 15 2022
Sep 15 2022
• gniibe closed T5721: gpg22: Update *.m4 to prefer use of gpgrt-config and *.pc to *-config as Resolved.
Sep 14 2022
Sep 14 2022
• ebo removed a project from T5972: Can't insert charaters in a magic-wand generated password : Restricted Project.
works now
Sep 6 2022
Sep 6 2022
Sep 2 2022
Sep 2 2022
Thanks for testing. I guess I will do a new release.
Sep 1 2022
Sep 1 2022
Applies cleanly and fixes the crash. 👍
For master (2.3) the fix is not needed due to another way the code works, but having a more robust function is always good.
You may try the above commit - if should apply cleanly to 2.2.37.
You are right. This due to your old binary private key (stubs). Otherwise you would at least have one item ("Key:"). I need to see what do do about the release. Maybe a tool to update the key files would we a good workaround.
Aug 31 2022
Aug 31 2022
Aug 24 2022
Aug 24 2022