Page MenuHome GnuPG
Feed Advanced Search

Oct 23 2023

jukivili closed T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY as Resolved.
Oct 23 2023, 6:56 PM · Debian, libgcrypt, Bug Report

Jul 24 2023

ebo moved T5231: Debian: Get recent GnuPG stable into bullseye from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Jul 24 2023, 2:13 PM · Debian, Restricted Project

Apr 23 2023

jukivili added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

Here's fix for mode specific setkey clearing error code:

Apr 23 2023, 2:38 PM · Debian, libgcrypt, Bug Report

Apr 21 2023

werner added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

There is still a buglet because in some modes the weak key error can be swallowed by other errors. A fix would be something like:

Apr 21 2023, 9:09 AM · Debian, libgcrypt, Bug Report
gniibe added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

@jukivili Yes, please go ahead for both branches. Thank you.

Apr 21 2023, 5:06 AM · Debian, libgcrypt, Bug Report

Apr 20 2023

jukivili added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

About error code. You need to use gcry_err_code(error_code) to get the GPG_ERR_WEAK_KEY value.

Apr 20 2023, 6:22 PM · Debian, libgcrypt, Bug Report

Apr 17 2023

Wolff17 added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

Ok sorry, my bad, I have to use DES Keying option 2 to have 45 de ae ae e1 f4 6a 29, problem solved.

Apr 17 2023, 3:02 PM · Debian, libgcrypt, Bug Report
werner added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

Reading the commit rC5beadf201312: Add gcry_cipher_ctl command to allow weak keys in testing use-cases,
The test code in basic.c assumes that it is an application responsibility to confirm&ignore GPG_ERR_WEAK_KEY error when using GCRYCTL_SET_ALLOW_WEAK_KEY.

Apr 17 2023, 1:25 PM · Debian, libgcrypt, Bug Report
Wolff17 added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

Thank you for you responses! :)

Apr 17 2023, 9:50 AM · Debian, libgcrypt, Bug Report
jukivili added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

I'll add documentation about GCRYCTL_SET_ALLOW_WEAK_KEY which was missing from be original commit.

Apr 17 2023, 8:36 AM · Debian, libgcrypt, Bug Report
jukivili added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

tests/basic now actually fail because setkey not returning GPG_ERR_WEAK_KEY for weak keys with GCRYCTL_SET_ALLOW_WEAK_KEY.

Apr 17 2023, 8:34 AM · Debian, libgcrypt, Bug Report
jukivili added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

That's right. With GCRYCTL_SET_ALLOW_WEAK_KEY, setkey still returns GPG_ERR_WEAK_KEY when weak key is detected. However, cipher handle can still be used as if setkey succeeded.

Apr 17 2023, 8:31 AM · Debian, libgcrypt, Bug Report
gniibe added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

Reading the commit rC5beadf201312: Add gcry_cipher_ctl command to allow weak keys in testing use-cases,
The test code in basic.c assumes that it is an application responsibility to confirm&ignore GPG_ERR_WEAK_KEY error when using GCRYCTL_SET_ALLOW_WEAK_KEY.

Apr 17 2023, 2:50 AM · Debian, libgcrypt, Bug Report

Apr 16 2023

werner triaged T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY as Low priority.

Thanks for the report. Fix is easy. I only wonder why you want to use a weak DES key.

Apr 16 2023, 8:31 PM · Debian, libgcrypt, Bug Report

Apr 14 2023

Wolff17 created T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.
Apr 14 2023, 6:17 PM · Debian, libgcrypt, Bug Report

Apr 13 2023

gniibe closed T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt as Resolved.

Fixed in 1.10.2.

Apr 13 2023, 3:13 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Apr 3 2023

Wolff17 added a comment to T6435: libgcrypt | gcry_mpi_ec_mul return a truncated point coordinate.

Your quick support solve my problem, I am thanking you :)
Bye bye

Apr 3 2023, 10:25 AM · Debian, libgcrypt, Bug Report
werner closed T6435: libgcrypt | gcry_mpi_ec_mul return a truncated point coordinate as Resolved.

I added a remark to the print function. Thanks for the suggestion.

Apr 3 2023, 10:22 AM · Debian, libgcrypt, Bug Report
Wolff17 added a comment to T6435: libgcrypt | gcry_mpi_ec_mul return a truncated point coordinate.

You are right, w.y should be "00039E2C9AEC146C5799651C42691A3E35E291B6BC45FF079DDA3E70E709BF33".

Apr 3 2023, 9:39 AM · Debian, libgcrypt, Bug Report
werner added a comment to T6435: libgcrypt | gcry_mpi_ec_mul return a truncated point coordinate.

Can you please share the expected result with us? Note that Libgcrypt strips leading zeroes except when it is required to keep the value positive.

Apr 3 2023, 9:30 AM · Debian, libgcrypt, Bug Report
Wolff17 created T6435: libgcrypt | gcry_mpi_ec_mul return a truncated point coordinate.
Apr 3 2023, 9:24 AM · Debian, libgcrypt, Bug Report

Mar 8 2023

gniibe moved T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt from Backlog to Next on the FIPS board.
Mar 8 2023, 2:39 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
gniibe changed the status of T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt from Open to Testing.

Thank you.
Applied to both (master and 1.10).

Mar 8 2023, 2:39 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Mar 6 2023

tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Right, thanks for the review! Updated patches below.

Mar 6 2023, 5:11 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Actually, the same issue is in the mac case, which I missed on first couple of reviews:

-  enum gcry_mac_algos alg = va_arg (arg_ptr, enum gcry_cipher_algos);
+  enum gcry_mac_algos alg = va_arg (arg_ptr, enum gcry_mac_algos);
Mar 6 2023, 5:01 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Going through the code once more, there is one typo to be fixed:

+_gcry_fips_indicator_md (va_list arg_ptr)
+{
+  enum gcry_md_algos alg = va_arg (arg_ptr, enum gcry_cipher_algos);

should say

+_gcry_fips_indicator_md (va_list arg_ptr)
+{
+  enum gcry_md_algos alg = va_arg (arg_ptr, enum gcry_md_algos);

otherwise ack.

Mar 6 2023, 4:46 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Mar 1 2023

Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

We came to the same conclusion -- the SHAKE digests are not usable for sign/verify operations the way how it is implemented now. But it would be more clear if we would have explicit allow-list.

Mar 1 2023, 7:57 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

After consulting with our certs lab and studying the code I think SHAKE should not be a problem for now. All of the _gcry_digest_spec_shakeXXX seem to neither have an mdlen nor a read() function. pk_sign and pk_verify seem to both call md_read() which should fail because of the missing read function, kdf checks _gcry_md_get_algo_dlen() which should also disallow SHAKE.

Mar 1 2023, 12:55 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Feb 27 2023

tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Good catch. A similar problem might arise with SHA384 according to section D.R which states

Feb 27 2023, 3:15 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

One potential pitfall here is that SHAKE-128 and SHAKE-256 must not be available for use in signature operations. That's because https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf section C.C disallows the use of SHAKE in higher-level algorithms:

Feb 27 2023, 3:01 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

These look good to me.

Feb 27 2023, 1:45 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Right, we have received the same feedback from our cert lab but I haven't found time to update the bug yet. Here are the updated patches:

Feb 27 2023, 12:19 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

This marks GCRY_MD_CRC32, GCRY_MD_CRC24_RFC2440 and GCRY_MD_CRC32_RFC1510 as approved.

Feb 27 2023, 11:44 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Feb 16 2023

werner triaged T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt as Low priority.
Feb 16 2023, 11:43 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
tobhe created T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.
Feb 16 2023, 3:41 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

May 27 2022

sergi added a watcher for Debian: sergi.
May 27 2022, 10:04 PM
srgblnchtrn removed a watcher for Debian: srgblnchtrn.
May 27 2022, 10:04 PM

Aug 13 2021

werner changed the edit policy for Debian.
Aug 13 2021, 3:56 PM

Jun 2 2021

werner closed T5423: libgcrypt 1.8 ECDH as Resolved.
Jun 2 2021, 12:57 PM · Debian, libgcrypt

May 6 2021

werner added a project to T5423: libgcrypt 1.8 ECDH: Debian.

FWIW, I think that it is a Bad Thing to use unreleased stuff from 1.8 for Debian packages. Only released versions sshould be used or patches we explicitly made to fix a bug. At the very least Andreas should have asked upstream whether this commit should be used for Sid.

May 6 2021, 9:00 AM · Debian, libgcrypt

Mar 1 2021

cbiedl closed T5231: Debian: Get recent GnuPG stable into bullseye as Resolved.

[2021-02-24] gnupg2 2.2.27-1 MIGRATED to testing (Debian testing watch)

Mar 1 2021, 10:16 AM · Debian, Restricted Project

Feb 10 2021

werner closed T1089: Please store requests in a cache to avoid sending out duplicate requests (mailto: interface) as Wontfix.
Feb 10 2021, 10:59 AM · gnupg (gpg23), gnupg, Debian, Feature Request

Jan 11 2021

aheinecke created T5231: Debian: Get recent GnuPG stable into bullseye.
Jan 11 2021, 3:21 PM · Debian, Restricted Project

Jul 15 2020

werner closed T4982: [PATCH] qt libraries should be linked with -fPIC instead of -fpic as Wontfix.

We can't do anything about it except for corner cases which we won't do right now. In case there will be an easy solution to help Debian please re-open this bug.

Jul 15 2020, 4:45 PM · Debian, gpgme
werner edited projects for T4982: [PATCH] qt libraries should be linked with -fPIC instead of -fpic, added: Debian; removed Info Needed, Bug Report.
Jul 15 2020, 12:19 PM · Debian, gpgme

Jun 3 2019

gniibe closed T4031: gpg-check-pattern.1 in Debian generates warnings from test-groff as Resolved.

I added the section in tools.texi. Closing.

Jun 3 2019, 5:00 AM · Debian, gnupg, Bug Report

May 20 2019

dkg added a comment to T4106: Terminal use case for gpg-agent and gpg-agent for ssh-agent feature.

trigger what command? i'm pretty sure gpgconf --reload gpg-agent does not trigger updatestartuptty. And it should not do so, afaict -- if you think it should, i'd be interested in hearing the rationale for it.

May 20 2019, 5:28 AM · Debian, gpgagent, Bug Report
ageis added a comment to T4106: Terminal use case for gpg-agent and gpg-agent for ssh-agent feature.

Does gpgconf --reload gpg-agent trigger that command? that's the ExecReload setting in the systemd service unit I'm looking at.

May 20 2019, 1:05 AM · Debian, gpgagent, Bug Report

May 19 2019

dkg added a comment to T4106: Terminal use case for gpg-agent and gpg-agent for ssh-agent feature.

This doesn't sound systemd-specific to me, fwiw, though i don't understand how to reproduce the problem from the given description here.

May 19 2019, 9:05 PM · Debian, gpgagent, Bug Report

Sep 11 2018

werner closed T2968: gpg --search: Connection closed in DNS as Resolved.

We assume that this has meanwhile been fixed.

Sep 11 2018, 10:34 AM · Info Needed, gnupg (gpg22), Bug Report, Debian, Keyserver, dirmngr

Aug 29 2018

werner added a project to T2968: gpg --search: Connection closed in DNS: Info Needed.

@elonsatoshi: Were you able to check this with 2.2.9 which has a fix for the resolver?

Aug 29 2018, 2:53 PM · Info Needed, gnupg (gpg22), Bug Report, Debian, Keyserver, dirmngr

Aug 22 2018

gniibe updated the task description for T4106: Terminal use case for gpg-agent and gpg-agent for ssh-agent feature.
Aug 22 2018, 10:03 AM · Debian, gpgagent, Bug Report
gniibe updated the task description for T4106: Terminal use case for gpg-agent and gpg-agent for ssh-agent feature.
Aug 22 2018, 10:03 AM · Debian, gpgagent, Bug Report
gniibe updated the task description for T4106: Terminal use case for gpg-agent and gpg-agent for ssh-agent feature.
Aug 22 2018, 10:00 AM · Debian, gpgagent, Bug Report
gniibe claimed T4106: Terminal use case for gpg-agent and gpg-agent for ssh-agent feature.

This entry was created based on the conversation at #gnupg channel.
I can't reproduce keep hanging.
I confirmed that pinentry vanished (perhaps, because of timeout).

Aug 22 2018, 9:59 AM · Debian, gpgagent, Bug Report
gniibe updated the task description for T4106: Terminal use case for gpg-agent and gpg-agent for ssh-agent feature.
Aug 22 2018, 9:56 AM · Debian, gpgagent, Bug Report

Aug 21 2018

werner added a project to T4106: Terminal use case for gpg-agent and gpg-agent for ssh-agent feature: Debian.

gpg-agent has a pinentry caling timeout - doesn't that trigger?
In any case we agreed that Debian takes care of systemd support because that is not an upstream supported configuration.

Aug 21 2018, 5:28 PM · Debian, gpgagent, Bug Report

Jul 3 2018

werner closed T1173: gpg has no easy way to view the reason and description of revocation sigs as Resolved.

Backport done. To be released with 2.2.9.

Jul 3 2018, 12:34 PM · gnupg, Debian, Feature Request

Jun 21 2018

werner changed the status of T1173: gpg has no easy way to view the reason and description of revocation sigs from Open to Testing.

Done for master. Needs backport.

Jun 21 2018, 8:38 PM · gnupg, Debian, Feature Request
werner raised the priority of T1173: gpg has no easy way to view the reason and description of revocation sigs from Normal to High.
Jun 21 2018, 3:24 PM · gnupg, Debian, Feature Request

Jun 20 2018

werner added a comment to T4031: gpg-check-pattern.1 in Debian generates warnings from test-groff .

We should include the man page then in texi format into tools.texi

Jun 20 2018, 7:02 PM · Debian, gnupg, Bug Report
gniibe renamed T4031: gpg-check-pattern.1 in Debian generates warnings from test-groff from nroff created by yat2m generates warnings from test-groff to gpg-check-pattern.1 in Debian generates warnings from test-groff .
Jun 20 2018, 10:39 AM · Debian, gnupg, Bug Report

Jun 5 2018

werner closed T3971: gpgme-1.11.1 fails to build: cJSON.c:45:20: fatal error: gpgrt.h: Datei oder Verzeichnis nicht gefunden as Resolved.

Please dee the commit for a description of this fix.

Jun 5 2018, 9:54 AM · Debian, Bug Report, gpgme

Jun 4 2018

Eagle_Erwin added a comment to T3971: gpgme-1.11.1 fails to build: cJSON.c:45:20: fatal error: gpgrt.h: Datei oder Verzeichnis nicht gefunden.

I don't think this is an error in Debian. Debian Squeeze is packed with libgpg-error 1.26 in the latest stable release [1].
According to the list of changes, gpgrt.h is addes as an alias for gpg-error.h in 1.27 [2].
I think a quick (and correct) fix is to increase the NEED_GPG_ERROR_VERSION in configure.ac to at least 1.27 [3], so the build will fail nicely in the configure-step with a correct error.

Jun 4 2018, 8:40 PM · Debian, Bug Report, gpgme

May 11 2018

werner added a comment to T3971: gpgme-1.11.1 fails to build: cJSON.c:45:20: fatal error: gpgrt.h: Datei oder Verzeichnis nicht gefunden.

It seems that Debian does not install te required libgpg-error correctl.

May 11 2018, 11:23 AM · Debian, Bug Report, gpgme

May 10 2018

Elan added a project to T3971: gpgme-1.11.1 fails to build: cJSON.c:45:20: fatal error: gpgrt.h: Datei oder Verzeichnis nicht gefunden: Debian.
May 10 2018, 11:01 AM · Debian, Bug Report, gpgme

Nov 19 2017

elonsatoshi added a comment to T2968: gpg --search: Connection closed in DNS.

You know... I think connman and DNS have something to do with this. Connman does some weird DNS thing. And it auto-generates /etc/resolv.conf to use localhost as the DNS server.

Nov 19 2017, 4:48 AM · Info Needed, gnupg (gpg22), Bug Report, Debian, Keyserver, dirmngr

Nov 15 2017

werner closed T2902: dimrngr over tor fails obscurely on IPv6 records when NoIPv6Traffic flag is set as Resolved.

This has been fixed a while ago my having dirmngr print a hint on the possible problem. gpg will then print a warning about a problem with the Tor configuration and with --verbose print the hint on solving this as well.

Nov 15 2017, 6:56 PM · Debian, Bug Report, gnupg, dirmngr

Nov 1 2017

gniibe closed T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity as Resolved.

OK, closed.

Nov 1 2017, 7:17 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian

Oct 24 2017

werner placed T2968: gpg --search: Connection closed in DNS up for grabs.
Oct 24 2017, 3:00 PM · Info Needed, gnupg (gpg22), Bug Report, Debian, Keyserver, dirmngr

Oct 20 2017

werner edited projects for T2968: gpg --search: Connection closed in DNS, added: gnupg (gpg22); removed gnupg (gpg21), gnupg.
Oct 20 2017, 1:48 PM · Info Needed, gnupg (gpg22), Bug Report, Debian, Keyserver, dirmngr
werner added a comment to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.

Given that we received no info after nearly two years, shouldn't we simply assume that this bug as been fixed?

Oct 20 2017, 12:51 PM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian

Oct 14 2017

werner triaged T3447: delkey removes only public part of a subkey as Wishlist priority.

We need a way to delete a secret subkey.

Oct 14 2017, 12:35 PM · Debian, gnupg
werner added a comment to T3447: delkey removes only public part of a subkey.

No direct way. You can do this:

Oct 14 2017, 12:34 PM · Debian, gnupg
werner added a comment to T3447: delkey removes only public part of a subkey.

Ooops. you meant a subkey - let me check...

Oct 14 2017, 12:30 PM · Debian, gnupg
werner added a comment to T3447: delkey removes only public part of a subkey.

Sure: --delete-secret-and-public-key FINGERPRINT

Oct 14 2017, 12:29 PM · Debian, gnupg

Oct 13 2017

prudemar added a comment to T3447: delkey removes only public part of a subkey.

OK, sorry. Forgive me to ask here.. but is there a way how to remove both - the public and the private part? - and only of a specific subkey?

Oct 13 2017, 2:44 PM · Debian, gnupg
werner removed a project from T3447: delkey removes only public part of a subkey: Bug Report.

That is intended.

Oct 13 2017, 2:34 PM · Debian, gnupg
prudemar updated the task description for T3447: delkey removes only public part of a subkey.
Oct 13 2017, 12:36 PM · Debian, gnupg
prudemar updated the task description for T3447: delkey removes only public part of a subkey.
Oct 13 2017, 12:10 PM · Debian, gnupg
prudemar added projects to T3447: delkey removes only public part of a subkey: gnupg, Debian.
Oct 13 2017, 11:25 AM · Debian, gnupg

Aug 27 2017

elonsatoshi added a comment to T2968: gpg --search: Connection closed in DNS.

Well, I'm able to reproduce this issue on Parabola. I was also get a different error when I turn off my vpn: `server indicated a failure```, but now I get the dns error again.

elonsatoshi@tyger ~> gpg -vvv --debug-level guru --search elonsatoshi@riseup.net
gpg: using character set 'utf-8'
gpg: enabled debug flags: packet mpi crypto filter iobuf memory cache memstat trust hashing ipc clock lookup extprog
gpg: DBG: [not enabled in the source] start
gpg: DBG: chan_3 <- # Home: /home/elonsatoshi/.gnupg
gpg: DBG: chan_3 <- # Config: [none]
gpg: DBG: chan_3 <- OK Dirmngr 2.1.23 at your service
gpg: DBG: connection to the dirmngr established
gpg: DBG: chan_3 -> GETINFO version
gpg: DBG: chan_3 <- D 2.1.23
gpg: DBG: chan_3 <- OK
gpg: DBG: chan_3 -> KEYSERVER --clear hkps://pgp.mit.edu/
gpg: DBG: chan_3 <- OK
gpg: DBG: chan_3 -> KS_SEARCH -- elonsatoshi@riseup.net
gpg: DBG: chan_3 <- ERR 167772876 Connection closed in DNS <Dirmngr>
gpg: error searching keyserver: Connection closed in DNS
gpg: keyserver search failed: Connection closed in DNS
gpg: DBG: chan_3 -> BYE
gpg: DBG: [not enabled in the source] stop
gpg: keydb: handles=0 locks=0 parse=0 get=0
gpg:        build=0 update=0 insert=0 delete=0
gpg:        reset=0 found=0 not=0 cache=0 not=0
gpg: kid_not_found_cache: count=0 peak=0 flushes=0
gpg: sig_cache: total=0 cached=0 good=0 bad=0
gpg: random usage: poolsize=600 mixed=0 polls=0/0 added=0/0
              outmix=0 getlvl1=0/0 getlvl2=0/0
gpg: rndjent stat: collector=0x0000000000000000 calls=0 bytes=0
gpg: secmem usage: 0/32768 bytes in 0 blocks
elonsatoshi@tyger ~> sudo rc-service openvpn stop
[sudo] password for elonsatoshi: 
 * WARNING: openvpn is already stopped
elonsatoshi@tyger ~> pidof openvpn
elonsatoshi@tyger ~> gpg -vvv --debug-level guru --search elonsatoshi@riseup.net
gpg: using character set 'utf-8'
gpg: enabled debug flags: packet mpi crypto filter iobuf memory cache memstat trust hashing ipc clock lookup extprog
gpg: DBG: [not enabled in the source] start
gpg: DBG: chan_3 <- # Home: /home/elonsatoshi/.gnupg
gpg: DBG: chan_3 <- # Config: [none]
gpg: DBG: chan_3 <- OK Dirmngr 2.1.23 at your service
gpg: DBG: connection to the dirmngr established
gpg: DBG: chan_3 -> GETINFO version
gpg: DBG: chan_3 <- D 2.1.23
gpg: DBG: chan_3 <- OK
gpg: DBG: chan_3 -> KEYSERVER --clear hkps://pgp.mit.edu/
gpg: DBG: chan_3 <- OK
gpg: DBG: chan_3 -> KS_SEARCH -- elonsatoshi@riseup.net
gpg: DBG: chan_3 <- ERR 167772876 Connection closed in DNS <Dirmngr>
gpg: error searching keyserver: Connection closed in DNS
gpg: keyserver search failed: Connection closed in DNS
gpg: DBG: chan_3 -> BYE
gpg: DBG: [not enabled in the source] stop
gpg: keydb: handles=0 locks=0 parse=0 get=0
gpg:        build=0 update=0 insert=0 delete=0
gpg:        reset=0 found=0 not=0 cache=0 not=0
gpg: kid_not_found_cache: count=0 peak=0 flushes=0
gpg: sig_cache: total=0 cached=0 good=0 bad=0
gpg: random usage: poolsize=600 mixed=0 polls=0/0 added=0/0
              outmix=0 getlvl1=0/0 getlvl2=0/0
gpg: rndjent stat: collector=0x0000000000000000 calls=0 bytes=0
gpg: secmem usage: 0/32768 bytes in 0 blocks
Aug 27 2017, 4:58 PM · Info Needed, gnupg (gpg22), Bug Report, Debian, Keyserver, dirmngr

Aug 14 2017

marcus placed T1128: gpg should detect ambigious keys specifications up for grabs.
Aug 14 2017, 10:38 AM · Feature Request, Debian, gnupg

Aug 4 2017

marcus placed T2946: gpg-agent should be able to terminate when all its state expires up for grabs.
Aug 4 2017, 8:52 PM · gnupg, Debian, gpgagent, Feature Request

Jul 19 2017

justus closed T2940: dirmngr fails for hkps when http-proxy is in use as Resolved.

Implemented in da91d2106a17c796ddb066a34db92d33b21c81f7.

Jul 19 2017, 12:31 PM · Feature Request, gnupg (gpg22), Debian, gnupg, dirmngr

Jul 18 2017

justus claimed T2940: dirmngr fails for hkps when http-proxy is in use.
Jul 18 2017, 4:27 PM · Feature Request, gnupg (gpg22), Debian, gnupg, dirmngr

Jul 17 2017

marcus placed T1173: gpg has no easy way to view the reason and description of revocation sigs up for grabs.
Jul 17 2017, 6:26 PM · gnupg, Debian, Feature Request

Jul 14 2017

justus added a comment to T2946: gpg-agent should be able to terminate when all its state expires.

Another reoccurring concern is lingering agents spawned in test suites. See, e.g. a discussion from this week: https://github.com/pazz/alot/pull/1081#issuecomment-315131053

Jul 14 2017, 1:52 PM · gnupg, Debian, gpgagent, Feature Request
marcus reopened T2946: gpg-agent should be able to terminate when all its state expires as "Open".

Well, we always have to weigh the costs with the benefits. From the description of the task, the benefit was to satisfy "people [who] really don't like having idle processes lying around", which is not a strong motivation to take implementation and maintenance cost of any solution.

Jul 14 2017, 1:21 PM · gnupg, Debian, gpgagent, Feature Request
dkg added a comment to T2946: gpg-agent should be able to terminate when all its state expires.

This is a disappointing resolution. There are many other reasons for having a daemon, which include keeping a sensitive piece of data in memory (and not on disk) for a limited period of time, while providing controlled access to it. This is exactly what gpg-agent does.

Jul 14 2017, 12:38 PM · gnupg, Debian, gpgagent, Feature Request

Jul 13 2017

marcus closed T2946: gpg-agent should be able to terminate when all its state expires as Wontfix.

Werner's comments indicate that this is expected behavior. Also, concerns were raised that this is difficult to implement correctly, and it is difficult to test. So, I am closing as wontfix.

Jul 13 2017, 1:27 AM · gnupg, Debian, gpgagent, Feature Request
marcus closed T2739: pinentry can't access GPG_TTY after su/sudo to another user on GNU/Linux as Invalid.

The Debian report includes multiple workarounds for the quite unusual setup. So, I am closing here.

Jul 13 2017, 1:01 AM · Bug Report, Debian, pinentry

Jun 28 2017

marcus closed T1992: pinentry in text mode is skewed when using PuTTY and GNU screen as Invalid.
Jun 28 2017, 5:19 PM · Bug Report, Debian, pinentry

Jun 26 2017

justus closed T2856: Can't ssh-add a key w/o a passphrase as Resolved.

Fixed in 273964798592cd479c111f47e8ce46d5b1999d6a.

Jun 26 2017, 2:57 PM · Debian, Bug Report, gnupg, ssh

Jun 23 2017

werner raised the priority of T2856: Can't ssh-add a key w/o a passphrase from Normal to High.

Well, can you then please fix it?

Jun 23 2017, 5:14 PM · Debian, Bug Report, gnupg, ssh
werner added a comment to T2968: gpg --search: Connection closed in DNS.

Any update on this?

Jun 23 2017, 5:11 PM · Info Needed, gnupg (gpg22), Bug Report, Debian, Keyserver, dirmngr
werner closed T2928: stop fetching PTR records entirely as Resolved.
Jun 23 2017, 4:22 PM · Debian, Bug Report, gnupg, dirmngr

Jun 22 2017

marcus added a comment to T1129: Should cope better with read-only keyrings.

@werner do you have any updates on this?

Jun 22 2017, 4:35 PM · Stalled, gnupg, Debian, Feature Request

Jun 8 2017

dkg closed T3124: Debian 8 BPO with TB 45 and enigmail still hijacking gpg as Wontfix.

I don't think this is a problem for GnuPG to fix. The user is running an OS that launches a version of gnome-keyring by default which doesn't fully-implement gpg-agent's functionality, and yet presents the gpg-agent interface. The user needs to either disable gnome-keyring, or upgrade to a version of the OS (or of gnome-keyring) that doesn't present the gpg-agent interface.

Jun 8 2017, 8:56 PM · Debian

Jun 7 2017

justus assigned T3124: Debian 8 BPO with TB 45 and enigmail still hijacking gpg to dkg.

this is not the place to report Debian bugs, nevertheless, I have assigned this to our resident Debian expert.

Jun 7 2017, 10:46 AM · Debian