Page MenuHome GnuPG
Feed Advanced Search

Apr 3 2015

gniibe added a comment to T1509: gnupg2 (gpg-agent): Disable producing of core dumps for gpg-agent via prctl(PR_SET_DUMPABLE, 0) as ssh-agent does.

As I wrote to #712744, distribution nowadays is conservative enough for its
default kernel settings, and it doesn't require each application to have special
settings.

I think that we will be able to close this soon.

Apr 3 2015, 5:51 AM · gnupg, Debian, gnupg (gpg20), Feature Request, gpgagent

Mar 19 2015

werner added projects to T1792: hkps: Hostname verification uses the wrong hostname: Restricted Project, gnupg.
Mar 19 2015, 3:40 PM · gnupg, Bug Report, Debian, dirmngr
werner added a comment to T1792: hkps: Hostname verification uses the wrong hostname.

Thanks. Fixed with commit dc10d46.

Mar 19 2015, 3:40 PM · gnupg, Bug Report, Debian, dirmngr

Mar 17 2015

davidw added a comment to T1792: hkps: Hostname verification uses the wrong hostname.

The attached patch fixes hkps: hostname verification and makes
hkps: use SNI correctly.

The patch is against GnuPG 2.1.2. It has been tested successfully against
hkps://hkps.pool.sks-keyservers.net on FreeBSD 10.1 using GnuTLS 3.2.21 and the
2.1 setup instructions at https://sks-keyservers.net/overview-of-pools.php#pool_hkps

Mar 17 2015, 5:21 AM · gnupg, Bug Report, Debian, dirmngr
davidw added a comment to T1792: hkps: Hostname verification uses the wrong hostname.

D275: 586_poolname_and_SNI.patch

Mar 17 2015, 5:21 AM · gnupg, Bug Report, Debian, dirmngr

Mar 16 2015

werner closed T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable as Resolved.
Mar 16 2015, 3:13 PM · Not A Bug, Debian, Bug Report, gnupg

Feb 17 2015

dkg added projects to T1845: sending large keys to keyserver push fails with silent hang and "assuan_inquire failed: Too much data for IPC layer": libassuan, Bug Report, Debian.
Feb 17 2015, 10:05 PM · gnupg, gnupg (gpg21), Debian, Bug Report

Feb 16 2015

dkg added projects to T1841: gpg-connect-agent: percent+ function doesn't encode '+': gnupg, Bug Report, Debian.
Feb 16 2015, 9:57 AM · Debian, Bug Report, gnupg
dkg set Version to 2.0.26 on T1841: gpg-connect-agent: percent+ function doesn't encode '+'.
Feb 16 2015, 9:57 AM · Debian, Bug Report, gnupg

Feb 4 2015

werner added a project to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity: Info Needed.
Feb 4 2015, 9:24 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian

Jan 27 2015

werner added projects to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity: gnupg (gpg14), gnupg.
Jan 27 2015, 8:42 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian

Jan 26 2015

werner added a comment to T1064: gpgsm: manual page misses to document options.

Should be fixed by commit 017c6f8fba9ae141a46084d6961ba60c4230f97a
on 2014-06-24.

Jan 26 2015, 2:59 PM · backport, gnupg, Debian, Feature Request
werner closed T1064: gpgsm: manual page misses to document options as Resolved.
Jan 26 2015, 2:59 PM · backport, gnupg, Debian, Feature Request

Jan 19 2015

werner added a comment to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.

D281: 541_0001-Fix-a-problem-with-select-and-high-fds.patch

Jan 19 2015, 4:51 PM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian
werner added a comment to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.

Given that it seems not easy to reproduce this bug can you please test
commit 8adb5ff or the attsched patch to see whether this helps.

If it does not help, can you do a gpg build with debug symbols and run your case
again. If possible attach a debugger for a backtrace or produce it with a dump file.

Jan 19 2015, 4:51 PM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian

Jan 18 2015

freg set Version to 1.4.18 on T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity.
Jan 18 2015, 11:31 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian
freg added projects to T1818: gnupg fails (buffer overflow detected) to encrypt archive when called from duplicity: Debian, Bug Report.
Jan 18 2015, 11:31 AM · Info Needed, gnupg, gnupg (gpg14), Bug Report, Debian

Dec 22 2014

werner added a comment to T1792: hkps: Hostname verification uses the wrong hostname.

Well, that is quite possible. I have seen other reports about this. I have not
yet come around to look at the hkps bugs.

Dec 22 2014, 2:47 PM · gnupg, Bug Report, Debian, dirmngr

Dec 20 2014

kyrias added projects to T1792: hkps: Hostname verification uses the wrong hostname: dirmngr, Debian, Bug Report.
Dec 20 2014, 4:55 PM · gnupg, Bug Report, Debian, dirmngr

Dec 11 2014

werner added a project to T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable: Not A Bug.
Dec 11 2014, 3:46 PM · Not A Bug, Debian, Bug Report, gnupg
werner added a comment to T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable.

Yes, this is the case for a very long time. I also won't call this a
bug.

There is no way to protect an update by a lock without having write
permissions to the same directory. Well, one could setup a second
file system hierarchy below /var/run and use that for the locking
file. However, this assume that all process accessing the files are
on the local machine. One of the reasons why we can't use a locking
API are remotely mounted file systems. See the comments in
common/dotlock.c .

And yes, we need lock the file even if the local process as no write
permissions to the directory - other processes may have and the
reading process may thus read garbage.

By using --lock-never you assert that there is no other processing
writing to the gpg data files. Thus using this is the Right Thing.

Dec 11 2014, 3:46 PM · Not A Bug, Debian, Bug Report, gnupg
werner closed T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call as Resolved.
Dec 11 2014, 12:02 PM · gpgme, Bug Report, Debian
werner removed a project from T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call: Too Old.
Dec 11 2014, 12:02 PM · gpgme, Bug Report, Debian
werner added a comment to T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call.

I assume this is related to T1630 which has been fixed

Dec 11 2014, 12:02 PM · gpgme, Bug Report, Debian

Dec 8 2014

werner set External Link to https://bugs.debian.org/771976 on T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable.
Dec 8 2014, 12:55 PM · Not A Bug, Debian, Bug Report, gnupg

Dec 4 2014

dkg added a comment to T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable.

oh, and this appears to be the case for 1.4.x, 2.0.x, and 2.1.x

Dec 4 2014, 3:21 AM · Not A Bug, Debian, Bug Report, gnupg
dkg added a comment to T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable.

That link to the debian bts is a little wacky, somehow roundup is attaching the
comma to the end of it. it should be: https://bugs.debian.org/771976

Dec 4 2014, 3:20 AM · Not A Bug, Debian, Bug Report, gnupg
dkg added projects to T1781: "gpg --list-keys" fails when $GNUPGHOME is not writable: gnupg, Bug Report, Debian.
Dec 4 2014, 3:02 AM · Not A Bug, Debian, Bug Report, gnupg

Oct 3 2014

werner closed T1732: Don't break existing keys larger than 4k as Resolved.
Oct 3 2014, 6:20 PM · Not A Bug, Debian, Bug Report, gnupg
werner set External Link to https://bugs.debian.org/739424 on T1732: Don't break existing keys larger than 4k.
Oct 3 2014, 6:19 PM · Not A Bug, Debian, Bug Report, gnupg
werner reopened T1732: Don't break existing keys larger than 4k as "Open".
Oct 3 2014, 6:19 PM · Not A Bug, Debian, Bug Report, gnupg
werner added a comment to T1732: Don't break existing keys larger than 4k.

dkg developed a reasonsable patch which will be included in the next 1.4 version.

Oct 3 2014, 6:19 PM · Not A Bug, Debian, Bug Report, gnupg

Oct 2 2014

werner closed T1732: Don't break existing keys larger than 4k as Resolved.
Oct 2 2014, 7:11 PM · Not A Bug, Debian, Bug Report, gnupg
werner added a comment to T1732: Don't break existing keys larger than 4k.

No bug and I already set this bug to resolved.

Oct 2 2014, 7:11 PM · Not A Bug, Debian, Bug Report, gnupg

Oct 1 2014

ciaby added a comment to T1732: Don't break existing keys larger than 4k.

Judging by the lack of reply, I assume that this bug won't be fixed, correct?

Oct 1 2014, 3:41 AM · Not A Bug, Debian, Bug Report, gnupg

Sep 26 2014

ciaby reopened T1732: Don't break existing keys larger than 4k as "Open".
Sep 26 2014, 6:23 PM · Not A Bug, Debian, Bug Report, gnupg
ciaby added a comment to T1732: Don't break existing keys larger than 4k.

I read that. It says that RSA-2048 keys are going to be safe until 2030. Doesn't
sound like a lot to me... Considering the average human lifespan, I could be
around until 2070. So, nope, not enough.
If all the emails I sent till now have been intercepted and stored (which seems
to be the case according to Snowden), using a RSA-2048 key simply means that all
my private correspondence is going to be public (or at least accessible) in 16
years time. Now, the only thing I'm asking is to raise the amount of secure
memory allocated by GnuPG to 128k to let people use key sizes up to 16384,
something that was even allowed by the keygen itself.

Sep 26 2014, 6:23 PM · Not A Bug, Debian, Bug Report, gnupg
werner added a comment to T1732: Don't break existing keys larger than 4k.

Please read the FAQ starting with
https://gnupg.org/faq/gnupg-faq.html#default_rsa2048

Sep 26 2014, 12:54 PM · Not A Bug, Debian, Bug Report, gnupg
werner closed T1732: Don't break existing keys larger than 4k as Resolved.
Sep 26 2014, 12:54 PM · Not A Bug, Debian, Bug Report, gnupg
ciaby added a comment to T1732: Don't break existing keys larger than 4k.

By the way, is this all bullshit?
AES-256 == RSA-15360 / DSA-15360 (NIST)
http://csrc.nist.gov/groups/SMA/ispab/documents/minutes/2006-03/E_Barker-
March2006-ISPAB.pdf

AES=256 == RSA-15424 / DSA-15424 (ECRYPT2)
http://www.ecrypt.eu.org/documents/D.SPA.20.pdf

Sep 26 2014, 4:36 AM · Not A Bug, Debian, Bug Report, gnupg

Sep 25 2014

ciaby added a comment to T1732: Don't break existing keys larger than 4k.

Ok, got it. So I can just throw away my key and make a new one?
Fantastic. Thanks a lot.
Sounds a lot like "640K ought to be enough for anybody".
So long, and thanks for all the good work on GnuPG (seriously).

Sep 25 2014, 10:11 PM · Not A Bug, Debian, Bug Report, gnupg
werner added a comment to T1732: Don't break existing keys larger than 4k.

No.

Please read the FAQ on key sizes and if you have a lot of time the countless
discussions on gnupg-users. No, you are not paranoid but you are tuning the
wrong parameters. IT will never be a standard. There will never be any keys
larger than 4k RSA in real use.

Sep 25 2014, 9:46 PM · Not A Bug, Debian, Bug Report, gnupg
ciaby added a comment to T1732: Don't break existing keys larger than 4k.

Yes, I know how to change the code and make it work on _my_ machine.
There is the tiny problem that everyone else has to do it, too.
Can we make that change the default? I don't see a big problem in using 64k or
128k instead of 32k of secure memory.
By the way, 16k of key size is ridiculous now, but it's going to be kind of
standard in the not so distant future. Or am I too paranoid? :)
Just trying to have a GnuPG key which is future-proof, also taking in
consideration the possible use of quantum computers in the future.

Sep 25 2014, 9:17 PM · Not A Bug, Debian, Bug Report, gnupg
werner added a project to T1732: Don't break existing keys larger than 4k: Not A Bug.
Sep 25 2014, 8:51 PM · Not A Bug, Debian, Bug Report, gnupg
werner added a comment to T1732: Don't break existing keys larger than 4k.

Sorry, there is a limit on the size of secret keys which depends on
several factors. We allow for way longer keys than can be generated
by gpg to take the fuzziness in account, but only up to some limit.
You are on your own if you want to use ridiculous long keys.

Hint: You may increase the size of the secure memory my changing the
line

    /* initialize the secure memory. */
    got_secmem=secmem_init( 32768 );

in g10/gpg.c. Use a larger value there and it will work.

Sep 25 2014, 8:51 PM · Not A Bug, Debian, Bug Report, gnupg
ciaby added projects to T1732: Don't break existing keys larger than 4k: gnupg, Bug Report, Debian.
Sep 25 2014, 1:31 AM · Not A Bug, Debian, Bug Report, gnupg

Sep 17 2014

werner added a project to T1428: --fingerprint and --with-fingerprint create slightly different results: gnupg (gpg21).
Sep 17 2014, 7:00 PM · gnupg (gpg21), Debian, Bug Report, gnupg

Sep 3 2014

werner closed T1622: exits with a fatal error regarding missing trustdb although key is imported as Resolved.
Sep 3 2014, 9:47 AM · Debian, Bug Report, gnupg
werner added a comment to T1622: exits with a fatal error regarding missing trustdb although key is imported.

also fixed in 2.0

Sep 3 2014, 9:47 AM · Debian, Bug Report, gnupg
werner reopened T1622: exits with a fatal error regarding missing trustdb although key is imported as "Open".
Sep 3 2014, 9:47 AM · Debian, Bug Report, gnupg

Jul 3 2014

werner added a project to T1661: Gnupg directories not variable in the documentation: Feature Request.
Jul 3 2014, 11:28 AM · Feature Request, Debian, gnupg
werner lowered the priority of T1661: Gnupg directories not variable in the documentation from Normal to Wishlist.
Jul 3 2014, 11:28 AM · Feature Request, Debian, gnupg
werner removed a project from T1661: Gnupg directories not variable in the documentation: Bug Report.
Jul 3 2014, 11:28 AM · Feature Request, Debian, gnupg

Jul 1 2014

aheinecke set External Link to https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725804 on T1661: Gnupg directories not variable in the documentation.
Jul 1 2014, 10:58 AM · Feature Request, Debian, gnupg
aheinecke updated subscribers of T1661: Gnupg directories not variable in the documentation.
Jul 1 2014, 10:58 AM · Feature Request, Debian, gnupg
aheinecke set Version to 2.0.25 on T1661: Gnupg directories not variable in the documentation.
Jul 1 2014, 10:58 AM · Feature Request, Debian, gnupg
aheinecke added projects to T1661: Gnupg directories not variable in the documentation: gnupg, Bug Report, Debian.
Jul 1 2014, 10:58 AM · Feature Request, Debian, gnupg

Jun 30 2014

werner added a comment to T1042: Auto-generate a revocation certificate?.

Done for 2.1 with commit 03018ef

Jun 30 2014, 4:44 PM · gnupg, Debian, Feature Request
werner closed T1042: Auto-generate a revocation certificate? as Resolved.
Jun 30 2014, 4:44 PM · gnupg, Debian, Feature Request
werner changed Version from 2.x to 2.1 on T1042: Auto-generate a revocation certificate?.
Jun 30 2014, 4:44 PM · gnupg, Debian, Feature Request

Jun 23 2014

werner closed T1622: exits with a fatal error regarding missing trustdb although key is imported as Resolved.
Jun 23 2014, 10:17 AM · Debian, Bug Report, gnupg
werner removed a project from T1622: exits with a fatal error regarding missing trustdb although key is imported: Restricted Project.
Jun 23 2014, 10:17 AM · Debian, Bug Report, gnupg

Mar 7 2014

werner added a comment to T1622: exits with a fatal error regarding missing trustdb although key is imported.

Also applied to master.

Mar 7 2014, 10:43 AM · Debian, Bug Report, gnupg

Mar 6 2014

werner added a comment to T1622: exits with a fatal error regarding missing trustdb although key is imported.

Fixed with commit 23191d7.
This should be the same patch as used by Debian.

Mar 6 2014, 4:33 PM · Debian, Bug Report, gnupg
werner added a project to T1622: exits with a fatal error regarding missing trustdb although key is imported: Restricted Project.
Mar 6 2014, 4:33 PM · Debian, Bug Report, gnupg
werner changed External Link from https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737128&archived=no&mbox=no to https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737128 on T1622: exits with a fatal error regarding missing trustdb although key is imported.
Mar 6 2014, 4:11 PM · Debian, Bug Report, gnupg
werner changed Version from 1.4.16 to 1.4.16-1ubuntu1 on T1622: exits with a fatal error regarding missing trustdb although key is imported.
Mar 6 2014, 4:06 PM · Debian, Bug Report, gnupg

Mar 3 2014

bdmurray set External Link to https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737128&archived=no&mbox=no on T1622: exits with a fatal error regarding missing trustdb although key is imported.
Mar 3 2014, 9:20 PM · Debian, Bug Report, gnupg
bdmurray added projects to T1622: exits with a fatal error regarding missing trustdb although key is imported: gnupg, Bug Report, Debian.
Mar 3 2014, 9:19 PM · Debian, Bug Report, gnupg
bdmurray set Version to 1.4.16 on T1622: exits with a fatal error regarding missing trustdb although key is imported.
Mar 3 2014, 9:19 PM · Debian, Bug Report, gnupg

Oct 4 2013

werner closed T1486: gpg --verify suggests entire file was verified, even if file contains auxiliary data as Resolved.
Oct 4 2013, 9:27 PM · Documentation, Debian, Bug Report, gnupg
werner removed a project from T1486: gpg --verify suggests entire file was verified, even if file contains auxiliary data: Restricted Project.
Oct 4 2013, 9:27 PM · Documentation, Debian, Bug Report, gnupg
werner added a comment to T1486: gpg --verify suggests entire file was verified, even if file contains auxiliary data.

Done for 1.4.15 and 2.0.22.

Oct 4 2013, 9:27 PM · Documentation, Debian, Bug Report, gnupg
werner added a comment to T1486: gpg --verify suggests entire file was verified, even if file contains auxiliary data.

Will do so.

Oct 4 2013, 2:27 PM · Documentation, Debian, Bug Report, gnupg
werner added a project to T1486: gpg --verify suggests entire file was verified, even if file contains auxiliary data: Restricted Project.
Oct 4 2013, 2:27 PM · Documentation, Debian, Bug Report, gnupg
werner added a project to T1486: gpg --verify suggests entire file was verified, even if file contains auxiliary data: Documentation.
Oct 4 2013, 8:36 AM · Documentation, Debian, Bug Report, gnupg

Aug 21 2013

thijs added a comment to T1486: gpg --verify suggests entire file was verified, even if file contains auxiliary data.

D169: 384_verify_doc.patch

Aug 21 2013, 10:47 PM · Documentation, Debian, Bug Report, gnupg
thijs added a comment to T1486: gpg --verify suggests entire file was verified, even if file contains auxiliary data.

I'm reading in your response that you're not eager to change the behaviour of
--verify in this regard, right?

If that's the case, perhaps you can consider this patch to add a note to the
documentation, making it clear what is expected when using --verify on inline
signed files with auxiliary data. Afterall, we've seen several places where
--verify was used insecurely in the wild, so some warning may be in order.

Aug 21 2013, 10:47 PM · Documentation, Debian, Bug Report, gnupg

Aug 12 2013

dleidert added a comment to T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call.

Hm. The process disappears after some time. Maybe it just needs some time to
finish. Maybe not a bug anymore. Please take a look at it yourself.

Aug 12 2013, 10:11 PM · gpgme, Bug Report, Debian
dleidert changed Version from 1.0.2 to 1.4.2 on T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call.
Aug 12 2013, 10:07 PM · gpgme, Bug Report, Debian
dleidert reopened T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call as "Open".
Aug 12 2013, 10:07 PM · gpgme, Bug Report, Debian
dleidert added a comment to T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call.

Can you please take a look at it again? If I compile long_genkey.c and run it
via ./long_genkey async it leaves a process behind, which should better be killed:

ps aux | grep gpg
dl 7577 7.0 0.0 24416 1924 pts/2 SL 22:05 0:00 gpg
--enable-special-filenames --use-agent --batch --no-sk-comment --lc-messages
de_DE.utf8 --lc-ctype de_DE.utf8 --status-fd 4 --no-tty --charset utf8
--enable-progress-filter --display :0 --ttyname /dev/pts/2 --ttytype xterm
--gen-key -- -&5

Aug 12 2013, 10:07 PM · gpgme, Bug Report, Debian

Jul 16 2013

werner added a comment to T1509: gnupg2 (gpg-agent): Disable producing of core dumps for gpg-agent via prctl(PR_SET_DUMPABLE, 0) as ssh-agent does.

What is the threat model for this? If you are able to ptrace a process you can
do all other kind of stuff, like replacing gpg with your own code. If the box
has been taken over, we are in game-over state.

Disabling core dumps is a different issue because a core dump leaves traces of
the process on the disk.

Jul 16 2013, 1:17 PM · gnupg, Debian, gnupg (gpg20), Feature Request, gpgagent

Jul 12 2013

gniibe added a comment to T1509: gnupg2 (gpg-agent): Disable producing of core dumps for gpg-agent via prctl(PR_SET_DUMPABLE, 0) as ssh-agent does.

I think that original reporter's intention is to prevent attaching by ptrace.
By PR_SET_DUMPABLE disabled, ptrace PTRACE_ATTACH won't work any more.
This would be better if we care about kernel compatibility.
In http://bugs.debian.org/714107, I found that setrlimit64 doesn't work reliably
for 2.6.34 or older. PR_SET_DUMPABLE seems to work for even 2.4.x.

Jul 12 2013, 2:15 PM · gnupg, Debian, gnupg (gpg20), Feature Request, gpgagent

Jun 26 2013

thijs added a comment to T1486: gpg --verify suggests entire file was verified, even if file contains auxiliary data.

Yes. I think we're in agreement that MIME and detached signatures are the best way.

However, the functionality in gpg to check cleartext messages is there. If gpg
is confronted with a cleartext file containing auxilliary data, wouldn't it
better refrain from giving a positive return code when checking that file?

Jun 26 2013, 10:35 AM · Documentation, Debian, Bug Report, gnupg

Jun 20 2013

iankko added a comment to T1509: gnupg2 (gpg-agent): Disable producing of core dumps for gpg-agent via prctl(PR_SET_DUMPABLE, 0) as ssh-agent does.

Hello Werner,

Jun 20 2013, 1:03 PM · gnupg, Debian, gnupg (gpg20), Feature Request, gpgagent

Jun 19 2013

werner added a comment to T1509: gnupg2 (gpg-agent): Disable producing of core dumps for gpg-agent via prctl(PR_SET_DUMPABLE, 0) as ssh-agent does.

GnuPG uses setrlimit do disable core dumps. It has always done so. See
common/sysutils.c:disable_core_dumps. Do you have a test case which shows that
it does not work?

Jun 19 2013, 11:11 PM · gnupg, Debian, gnupg (gpg20), Feature Request, gpgagent
iankko added projects to T1509: gnupg2 (gpg-agent): Disable producing of core dumps for gpg-agent via prctl(PR_SET_DUMPABLE, 0) as ssh-agent does: gpgagent, Feature Request, gnupg (gpg20), Debian, gnupg.
Jun 19 2013, 3:00 PM · gnupg, Debian, gnupg (gpg20), Feature Request, gpgagent

May 22 2013

werner added a comment to T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call.

1.0.2 is more than 8 years old. The code chnaged a lot in the meantime. Feel
free to re-open if the problems persists with 1.4.x?

May 22 2013, 2:57 PM · gpgme, Bug Report, Debian
werner closed T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call as Resolved.
May 22 2013, 2:57 PM · gpgme, Bug Report, Debian
werner added a project to T1415: gpgme_cancel() does not stop gpg process from finishing asynchronous call: Too Old.
May 22 2013, 2:57 PM · gpgme, Bug Report, Debian

Apr 22 2013

werner added a project to T1060: extract signature from encrypted and signed file/message: gnupg (gpg21).
Apr 22 2013, 10:00 AM · gnupg (gpg21), gnupg, Debian, Feature Request
werner added a comment to T1060: extract signature from encrypted and signed file/message.

Pending for a long time; should be considered for 2.1

Apr 22 2013, 10:00 AM · gnupg (gpg21), gnupg, Debian, Feature Request
werner changed Due Date from Feb 1 2010, 1:00 AM to Oct 31 2013, 1:00 AM on T1060: extract signature from encrypted and signed file/message.
Apr 22 2013, 10:00 AM · gnupg (gpg21), gnupg, Debian, Feature Request
werner removed Due Date on T1089: Please store requests in a cache to avoid sending out duplicate requests (mailto: interface).
Apr 22 2013, 9:56 AM · gnupg (gpg23), gnupg, Debian, Feature Request
werner added a project to T1089: Please store requests in a cache to avoid sending out duplicate requests (mailto: interface): gnupg (gpg21).
Apr 22 2013, 9:56 AM · gnupg (gpg23), gnupg, Debian, Feature Request
werner added a project to T1038: Specify and use multiple keyservers: gnupg (gpg21).
Apr 22 2013, 9:54 AM · gnupg (gpg21), gnupg, Debian, Feature Request

Apr 19 2013

werner added a comment to T1064: gpgsm: manual page misses to document options.

Fixed in master

Apr 19 2013, 6:01 PM · backport, gnupg, Debian, Feature Request
werner added a project to T1064: gpgsm: manual page misses to document options: backport.
Apr 19 2013, 6:01 PM · backport, gnupg, Debian, Feature Request

Apr 18 2013

werner added a comment to T1486: gpg --verify suggests entire file was verified, even if file contains auxiliary data.

This is an application problem. For example KMail renders the signed parts in a
frame with a different color so to visible explain what has been signed. Mutt
has a similar feature. We can't do anything about this in gpg than to emit
certain status lines and to output the signed data.

This is long known problem with signatures and not even the worst. MUAs
introduced ways to mitigate the problems 2 decades ago. The best working
solutions is to use PGP/MIME for mail and detached signatures for other data.

Apr 18 2013, 11:10 AM · Documentation, Debian, Bug Report, gnupg