In T5444#146395, @werner wrote:You should anyway use --quick-gen-key.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Apr 17 2025
Apr 17 2025
• werner added a comment to T5444: "gpg: key generation failed: Unknown elliptic curve" from "Key-Type: default".
ametzler1 added a comment to T5444: "gpg: key generation failed: Unknown elliptic curve" from "Key-Type: default".
This is still broken on 2.5.5.
Dec 2 2024
Dec 2 2024
• gniibe closed T5931: OpenSSH 8.9, 9.0, and 9.1 can't authenticate with gpg-agent and usb token (Gnuk >= 1.2.16 is required) as Resolved.
Closed, since this was documentation for the workaround, four years ago.
• werner added a comment to T5931: OpenSSH 8.9, 9.0, and 9.1 can't authenticate with gpg-agent and usb token (Gnuk >= 1.2.16 is required).
Just a reminder: with Gnuk 1.2.15 and an ed25519 key PubkeyAuthentication unbound is required for hosts using the new feature.
Apr 15 2024
Apr 15 2024
I just wanted to report that I'm having this issue on Fedora 39, with GnuPG version 2.4.4.
I'm being asked for the PIN for every operation (Sign, Decrypt, Authenticate) I'm having this issue on 2 different laptops using YubiKey 5C NFC and YubiKey 5C Nano (Firmware version: 5.4.3).
I tried disabling PIV (disable-application piv) and then PIN caching started working again, so I just wanted to report this as it's marked as resolved.
Feb 19 2024
Feb 19 2024
Angel added a comment to T5444: "gpg: key generation failed: Unknown elliptic curve" from "Key-Type: default".
Interesting. So the problem is not actually the Key-Type, but that the default key-type requires a Key-Curve parameter which has no value by default
Feb 14 2024
Feb 14 2024
jak added a comment to T5444: "gpg: key generation failed: Unknown elliptic curve" from "Key-Type: default".
It works in 2.4.4 if you add
Feb 4 2024
Feb 4 2024
Angel added a comment to T5444: "gpg: key generation failed: Unknown elliptic curve" from "Key-Type: default".
I recently stumbled upon this as well.
Jan 24 2024
Jan 24 2024
Jan 5 2024
Jan 5 2024
• werner moved T6255: --list-keys output truncated and loops repeatedly from Backlog to done on the gnupg24 board.
• werner moved T5109: Initial socket connection to server from Backlog to done on the gnupg24 board.
• werner moved T3398: fingerprint-based import screener is no defense against malice from Backlog to done on the gnupg24 board.
I sued the done column because we have not assigned it to any milestone.
Fixed a long time ago.
Dec 27 2023
Dec 27 2023
Dec 18 2023
Dec 18 2023
• aheinecke added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.
In T4393#180500, @andrewgdotcom wrote:Perhaps we need to open a new issue for this, to keep the discussion more focused?
andrewgdotcom added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.
@bernhard Following up on discussion elsewhere:
Oct 30 2023
Oct 30 2023
• ebo closed T6253: GpgSM: Backport ECC support to 2.2, a subtask of T4098: GpgSM: Add ECC support, as Resolved.
Oct 27 2023
Oct 27 2023
• werner changed the status of T6741: gpg 2.3+ may display garbled characters for date and time in non-English Windows, a subtask of T4365: Encoding problem: gpg truncates multibyte characters in interactive prompts on Windows, from Open to Testing.
Oct 25 2023
Oct 25 2023
• werner moved T3056: gpgme-1.8.0: test failures on NetBSD from QA for next release to gpgme 1.23.x on the gpgme board.
Oct 2 2023
Oct 2 2023
Sep 18 2023
Sep 18 2023
• ebo moved T4779: GpgSM: "Invalid Object" error when importing .p12 certs with wrong passphrase from QA to gnupg-2.4.3 on the gnupg24 board.
• ebo moved T4779: GpgSM: "Invalid Object" error when importing .p12 certs with wrong passphrase from Backlog to QA on the gnupg24 board.
• ebo closed T4779: GpgSM: "Invalid Object" error when importing .p12 certs with wrong passphrase as Resolved.
With VS-Desktop-3.2.0.0-beta214 and Gpg4win-4.2.1-beta31 the error is "Bad Passphrase" in this case.
I do not see a reason why this ticket is still open.
The already resolved Kleopatra Task T5713 is probably a duplicate of this one.
Aug 1 2023
Aug 1 2023
Dear Werner, have you had any toughts about this ?
Jul 24 2023
Jul 24 2023
• ebo moved T5462: gpgconf: Make gpg/keyserver option available again from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Jul 5 2023
Jul 5 2023
• werner closed T4921: Support import of PKCS#12 encoded ECC private keys., a subtask of T4098: GpgSM: Add ECC support, as Resolved.
Apr 5 2023
Apr 5 2023
• ebo moved T5653: de-vs and GnuPG 2.3.3 error from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T6224: Mirror internal LDAP to a WKD from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ebo moved T5936: gpg: Support specifiying user ID to revoke as UID hash for --quick-revoke-uid from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Mar 10 2023
Mar 10 2023
Jan 30 2023
Jan 30 2023
Those "curated keyrings" and keyservers don't work together. The whole idea of automated but curated keyrings is dead end.
Jan 19 2023
Jan 19 2023
Jan 17 2023
Jan 17 2023
I am very sure that this is resolved and we support that in Kleopatra.
Dec 22 2022
Dec 22 2022
Thanks all. It is a bug in Win32 OpenSSH. https://github.com/PowerShell/Win32-OpenSSH/issues/1953 it is already fixed. I think the issue will be resolved after the update is shipped. I could use ssh -T git@github.com as a workaround.
Well, not our bug... it's a kind of support question and answer:
This might help: https://stackoverflow.com/questions/3844393/what-to-do-about-pty-allocation-request-failed-on-channel-0
Dec 21 2022
Dec 21 2022
This does not look like a problem in GnuPG/gpg4win because gnupg implements the ssh-agent protocol and not the ssh server or client functionality. ssh tells sshd whether it shall allocate a PTY (Pseudo TTY). I don't use ssh with github but it is likely that you may only run commands (which don't require a PTY). Usually you would invoke a "git" command cia ssh.
Authentication succeed if I pressed enter after:PTY allocation request failed on channel 0
I try WinGPG 4.1.0, and I receive an error:
ssh git@github.com
PTY allocation request failed on channel 0
Dec 20 2022
Dec 20 2022
Note that in-source-tree builds are broken - see T6313
Release done
Dec 19 2022
Dec 19 2022
To be released tomorrow.
Dec 16 2022
Dec 16 2022
@raysatiro: Please re-open if you are able to give us a reproducer
Dec 15 2022
Dec 15 2022
Thanks. Commited to master.
Dec 14 2022
Dec 14 2022
In T6309#166019, @ametzler1 wrote:Missed some, will post an updated patch.
Dec 13 2022
Dec 13 2022
Missed some, will post an updated patch.
Dec 12 2022
Dec 12 2022
• werner edited projects for T6309: Typo fixes ("outpust" et al), added: gnupg (gpg23); removed gnupg.
• werner moved T6023: Check how GnuPG handles several keys from WKD from Backlog to WiP on the g10 board.
• werner moved T6023: Check how GnuPG handles several keys from WKD from Backlog to WiP on the common board.
• werner edited projects for T5079: Add compliance flag to trustlist.txt, added: gnupg (gpg23); removed gnupg (gpg22).
Dec 12 2022, 11:58 AM · gnupg22 (gnupg-2.2.45), gnupg24 (gnupg-2.4.1), Restricted Project, Feature Request
Dec 9 2022
Dec 9 2022
I also reproduced this bug. I am using a PIV configured YubiKey 5C NFC for GNOME Smartcard login, which uses pam_pkcs11, and pam_pkcs11 uses opensc to read it via pcscd.
Dec 6 2022
Dec 6 2022
Dec 1 2022
Dec 1 2022
Thanks for reporting. We usually test by moving the <keygrip>.key files around ;-)
Nov 30 2022
Nov 30 2022
Nov 29 2022
Nov 29 2022
Sure, but this will need adaption in FIPS mode as it fails with:
Patch using SHA1 instead of MD5.
There are other uses of MD5 and thus we can't disable it. For example gpgsm also lists the MD5 fingerprint of certificates because they are still in use at some places.
Nov 25 2022
Nov 25 2022
Sorry, it looks like no problem.
• gniibe added a comment to T5931: OpenSSH 8.9, 9.0, and 9.1 can't authenticate with gpg-agent and usb token (Gnuk >= 1.2.16 is required).
Implications are... you won't be possible to use new protocols introduced by newer OpenSSH:
Nov 24 2022
Nov 24 2022
amalon added a comment to T5931: OpenSSH 8.9, 9.0, and 9.1 can't authenticate with gpg-agent and usb token (Gnuk >= 1.2.16 is required).
Thanks. Adding 'PubkeyAuthentication unbound' to my ~/.ssh/config seems to workaround it for me on openssh-9.1p1-3 (arch). I don't quite follow what the implications of that setting are though.
• gniibe renamed T5931: OpenSSH 8.9, 9.0, and 9.1 can't authenticate with gpg-agent and usb token (Gnuk >= 1.2.16 is required) from OpenSSH 8.9 and 9.0 can't authenticate with gpg-agent and usb token (Gnuk >= 1.2.16 is required) to OpenSSH 8.9, 9.0, and 9.1 can't authenticate with gpg-agent and usb token (Gnuk >= 1.2.16 is required).
• gniibe added a comment to T5931: OpenSSH 8.9, 9.0, and 9.1 can't authenticate with gpg-agent and usb token (Gnuk >= 1.2.16 is required).
In my cases (tested with 9.1), here are the length of data to be signed by ssh-agent (emulation by gpg-agent).
- 164 bytes: Both features disabled by: ssh -o KexAlgorithms=-sntrup761x25519-sha512@openssh.com -o PubkeyAuthentication=unbound
- 192 bytes: Unbound only by: ssh -o PubkeyAuthentication=unbound
- 298 bytes: No Post Quantum only by: ssh -o KexAlgorithms=-sntrup761x25519-sha512@openssh.com
- 330 bytes: Both features enabled (no options)
Nov 22 2022
Nov 22 2022
• gniibe added a comment to T5931: OpenSSH 8.9, 9.0, and 9.1 can't authenticate with gpg-agent and usb token (Gnuk >= 1.2.16 is required).
I tested with openssh 9.1. When I add -o PubkeyAuthentication=unbound, I can make the length of data smaller.
Nov 17 2022
Nov 17 2022
Nov 9 2022
Nov 9 2022
amalon added a comment to T5931: OpenSSH 8.9, 9.0, and 9.1 can't authenticate with gpg-agent and usb token (Gnuk >= 1.2.16 is required).
In T5931#165009, @alexk wrote:A workaround you can add the following line to ~/.ssh/config or /etc/ssh/ssh_config:
KexAlgorithms -sntrup761x25519-sha512@openssh.comFor me ssh -o KexAlgorithms=-sntrup761x25519-sha512@openssh.com ... does work as well.
• alexk added a project to T5931: OpenSSH 8.9, 9.0, and 9.1 can't authenticate with gpg-agent and usb token (Gnuk >= 1.2.16 is required): workaround.
A workaround you can add the following line to ~/.ssh/config or /etc/ssh/ssh_config:
Nov 2 2022
Nov 2 2022
I've got a similar patch, but I'm not sure it's any better -- I'm adding EcDSA support for cards (via gnupg-pkcs11-scd) and with this patch I can sign subkeys and data.
• gniibe moved T5964: gnupg should use the KDFs implemented in libgcrypt from Next to Ready for release on the FIPS board.
Nov 1 2022
Nov 1 2022
• gniibe edited projects for T6250: GPG-Agent doesn't work properly with smart cards and ed25519 keys and SSH Agent, added: Documentation; removed Bug Report.
The problem here is how large the data to be signed is. It is an issue of protocol design. The protocols are explained in openssh/PROTOCOL.certkeys and openssh/PROTOCOL. Unfortunately, it seems that it was designed with not much consideration for smartcard use case, so, data to be signed may be longer (than the capability of smartcard).
Oct 31 2022
Oct 31 2022
alca7raz added a comment to T6250: GPG-Agent doesn't work properly with smart cards and ed25519 keys and SSH Agent.
Sadly, it doesn't work for me. But thank you.
• gniibe added a comment to T6250: GPG-Agent doesn't work properly with smart cards and ed25519 keys and SSH Agent.
I managed to find a way to minimize the data (less than the one on Oct 25).
And it somehow works for me.
Oct 30 2022
Oct 30 2022
alca7raz added a comment to T6250: GPG-Agent doesn't work properly with smart cards and ed25519 keys and SSH Agent.
So what should I do now? Should I report it to OpenSSH team?
Oct 28 2022
Oct 28 2022
• werner added a project to T5704: Ed448/X448 defined in draft-ietf-openpgp-crypto-refresh-04: OpenPGP.
Meanwhile I have _some_ doubts that the v5 format is a good idea. It will introduce a lot of problems and thus a more lean way of replacing the fingerprint should be re-considered. Even if that means, we have to live with two kinds of fingerprints for a decade or so.
Given that the OpenPGP WG practically decided to fork OpenPGP I don't see a reason why we should keep this bug open.
Will go into 2.3.9 and gpg4win 4.0.5
Has been release quite some time ago (2.3.8 and earlier)
• werner closed T4938: Support Signature Card V2.0 (NKS15), a subtask of T4098: GpgSM: Add ECC support, as Resolved.
• werner changed the status of T6253: GpgSM: Backport ECC support to 2.2, a subtask of T4098: GpgSM: Add ECC support, from Open to Testing.
• werner lowered the priority of T4612: Add spare space to the keybox to always allow the import of revocations. from Normal to Low.
Oct 27 2022
Oct 27 2022
• werner triaged T6250: GPG-Agent doesn't work properly with smart cards and ed25519 keys and SSH Agent as Normal priority.