Page MenuHome GnuPG
Feed Advanced Search

Mar 29 2022

gniibe merged task T5396: Remove USE_RANDOM_DAEMON support from libgcrypt into T5706: libgcrypt: random: Remove the feature getting randomness from random daemon.
Mar 29 2022, 1:41 AM · libgcrypt
gniibe closed T5396: Remove USE_RANDOM_DAEMON support from libgcrypt as Resolved.

Done in master to be 1.11 for server side rC754ad5815b5b: random: Remove use of experimental random daemon.

Mar 29 2022, 1:37 AM · libgcrypt
gniibe closed T5835: libgcrypt: More robust/portable integrity check as Resolved.

Done in 1.10.1.

Mar 29 2022, 1:32 AM · Bug Report, libgcrypt, FIPS

Mar 28 2022

werner closed T5810: Release Libgcrypt 1.10.1 as Resolved.
Mar 28 2022, 4:43 PM · libgcrypt, Release Info
werner triaged T5905: Release Libgcrypt 1.10.2 as Low priority.
Mar 28 2022, 3:44 PM · Release Info, libgcrypt

Mar 24 2022

gniibe added a comment to T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.

GetNativeSystemInfo. Would you like me to submit a patch that used that in jent_ncpu?

Mar 24 2022, 12:57 AM · backport, libgcrypt, Bug Report

Mar 23 2022

eliz added a comment to T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.

Yes, I see the problem:

Mar 23 2022, 2:55 PM · backport, libgcrypt, Bug Report
gniibe added a comment to T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.

In libgcrypt (1.10), we have a copy of the jitterentropy 3.3.0 from:
http://www.chronox.de/jent.html
or https://github.com/smuellerDD/jitterentropy-library

Mar 23 2022, 1:02 AM · backport, libgcrypt, Bug Report

Mar 22 2022

eliz added a comment to T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.

Let me ask a more specific question, since you mentioned "support of detecting numbers of CPU and having more than 1 CPUs": can you point me to the code which detects the number of CPUs on MS-Windows systems, where I could learn how that code is affected by having EOPNOTSUPP defined? I will then hopefully understand better what you are saying, and either agree with you that this is unworkable on Windows, or propose a better solution.

Mar 22 2022, 1:55 PM · backport, libgcrypt, Bug Report
eliz added a comment to T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.

Can you please tell more about how this causes non-working code? MinGW64 defines EOPNOTSUPP to an arbitrary constant which (AFAICT) is never actually returned or used in the MS-Windows runtime. Their documentation, in https://docs.microsoft.com/en-us/cpp/c-runtime-library/errno-constants?view=msvc-170, says:

Mar 22 2022, 1:45 PM · backport, libgcrypt, Bug Report
gniibe added a comment to T5870: libgcrypt: AEAD API for FIPS 140 (in future).

I had thought that we need to combine hkdf so that key and iv can generate within libgcrypt internally.
Probably, this assumption of mine may be wrong.

Mar 22 2022, 10:53 AM · Feature Request, FIPS, libgcrypt
gniibe claimed T5891: EOPNOTSUPP is not defined in mingw.org's MinGW, fails compilation of libgcrypt-1.10.0.

Thank you for your report.

Mar 22 2022, 3:11 AM · backport, libgcrypt, Bug Report

Mar 16 2022

gniibe closed T5157: libgcrypt: ARM64 Builds on macOS fail as Resolved.
Mar 16 2022, 3:09 PM · toolchain, MacOS, libgcrypt, Bug Report
gniibe closed T5157: libgcrypt: ARM64 Builds on macOS fail, a subtask of T5159: make check fails for libgcrypt on Apple Silicon / ARM Mac, as Resolved.
Mar 16 2022, 3:09 PM · Restricted Project, MacOS, libgcrypt, Bug Report
gniibe closed T4900: OS X 10.12 and dyld: Library not loaded: /usr/local/lib/libgcrypt.20.dylib as Resolved.
Mar 16 2022, 2:55 PM · MacOS, libgcrypt, Bug Report
gniibe moved T5835: libgcrypt: More robust/portable integrity check from Next to Ready for release on the FIPS board.
Mar 16 2022, 6:16 AM · Bug Report, libgcrypt, FIPS

Mar 14 2022

werner triaged T5596: Libgcrypt documentation: corrections to obvious misprints as Normal priority.

Thanks for you patches. Most of them applied cleanly despite that I delayed processing them for half a year.

Mar 14 2022, 8:59 AM · libgcrypt, patch, Documentation, Bug Report

Mar 12 2022

jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 12 2022, 9:40 AM · libgcrypt
jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 12 2022, 9:39 AM · libgcrypt

Mar 9 2022

jukivili closed T5875: libgcrypt: VAES/AVX2 AES-OCB encryption performance issue with Intel CPUs, sudden drop in throughput with larger input sizes as Resolved.
Mar 9 2022, 7:47 PM · libgcrypt
jukivili added a comment to T5875: libgcrypt: VAES/AVX2 AES-OCB encryption performance issue with Intel CPUs, sudden drop in throughput with larger input sizes.

Fix pushed to master. Updated graph:

Mar 9 2022, 7:47 PM · libgcrypt
jukivili triaged T5875: libgcrypt: VAES/AVX2 AES-OCB encryption performance issue with Intel CPUs, sudden drop in throughput with larger input sizes as Normal priority.
Mar 9 2022, 4:42 PM · libgcrypt
gniibe added a project to T4873: Enable AES GCM in FIPS mode: FIPS.
Mar 9 2022, 12:58 AM · FIPS, libgcrypt, Feature Request

Mar 8 2022

Jakuje added a comment to T5870: libgcrypt: AEAD API for FIPS 140 (in future).

You are combining two concepts here -- the KDF and the AEAD cipher itself (at least from the FIPS terminology). I would like to avoid mixing these two together in the new API. If you would like to implement the SSH/TLS KDF, I would suggest to use the kdf API you already have. Then we are here left only with a new geniv API to implement. In the T4873 I mentioned example how it is now used in libssh using libgcrypt, which implements the iv increment outside of the libgcrypt:

Mar 8 2022, 3:51 PM · Feature Request, FIPS, libgcrypt
werner closed T5691: Release libgcrypt 1.10.0 as Resolved.
Mar 8 2022, 11:02 AM · FIPS, Release Info, libgcrypt

Mar 7 2022

jukivili added a comment to T5870: libgcrypt: AEAD API for FIPS 140 (in future).

Is large change to cipher API really needed (new open/encrypt with less flexibility)? How that would affect performance? Would following new interfaces to gcry_cipher API work instead?

  • gcry_cipher_setup_geniv(hd, int ivlen, int method): for setting up IV generator with parameters such as IV length, method id (RFC5116, TLS 1.3, SSH, etc), (other parameters?)
  • gcry_cipher_geniv(hd, byte *outiv): for generating new iv: generate IV using select method, set IV internally and output generated IV to 'ivout'.
  • gcry_cipher_genkey(hd, byte *outkey, int keylen, int method): for generating keys, generate key internally with parameters (method id, other?), setup key internally and output generated key to 'outkey'. (how keys from key exchange protocol be handled? using existing setkey?)
Mar 7 2022, 9:04 PM · Feature Request, FIPS, libgcrypt

Mar 6 2022

jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 6 2022, 6:35 PM · libgcrypt

Mar 5 2022

jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 5 2022, 2:09 PM · libgcrypt
jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 5 2022, 1:23 PM · libgcrypt
jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 5 2022, 1:21 PM · libgcrypt

Mar 3 2022

Jakuje added a comment to T5870: libgcrypt: AEAD API for FIPS 140 (in future).

I think this is not urgent as we are able to FIPS certify libgcrypt without that, but the modern protocols and algorithm use this and if we want to use libgcrypt to implement these in FIPS compliant way, we certainly need something like that.

Mar 3 2022, 2:08 PM · Feature Request, FIPS, libgcrypt
werner lowered the priority of T5870: libgcrypt: AEAD API for FIPS 140 (in future) from Unbreak Now! to Normal.

I don't think it is justified to tag this as "unbreak now" - which we use for severe bugs inhibiting the use of a deployed version.

Mar 3 2022, 9:40 AM · Feature Request, FIPS, libgcrypt
gniibe triaged T5870: libgcrypt: AEAD API for FIPS 140 (in future) as Unbreak Now! priority.
Mar 3 2022, 1:13 AM · Feature Request, FIPS, libgcrypt

Mar 2 2022

jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 2 2022, 8:39 PM · libgcrypt
jukivili updated the task description for T4460: libgcrypt performance TODOs.
Mar 2 2022, 8:37 PM · libgcrypt
jukivili closed T5700: libgcrypt: bulk AES-GCM acceleration for ppc64le as Resolved.
Mar 2 2022, 8:24 PM · patch, ppc, libgcrypt, Feature Request

Feb 24 2022

jukivili closed T4486: Add AEAD mode AES-SIV to libgcrypt (RFC 5297) as Resolved.
Feb 24 2022, 6:06 PM · Feature Request, libgcrypt
jukivili closed T5356: gnupg2 test failure on s390x as Resolved.
Feb 24 2022, 6:05 PM · libgcrypt, Bug Report
jukivili closed T5694: poly1305-s390x.S is compiled despite --disable-asm as Resolved.
Feb 24 2022, 6:05 PM · libgcrypt, Bug Report
jukivili closed T5796: libgcrypt-1.9.4 build failure on ARM without NEON as Resolved.
Feb 24 2022, 6:05 PM · arm, libgcrypt, Gentoo, Bug Report

Feb 23 2022

gniibe moved T5835: libgcrypt: More robust/portable integrity check from Backlog to Next on the FIPS board.
Feb 23 2022, 12:38 AM · Bug Report, libgcrypt, FIPS

Feb 18 2022

gniibe triaged T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1) as Normal priority.
Feb 18 2022, 1:01 AM · Bug Report, libgcrypt

Feb 17 2022

gniibe added a project to T5811: libgcrypt: Remove random-daemon (server side): Restricted Project.
Feb 17 2022, 5:48 AM · libgcrypt
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

I simplified the script not to use cmp: rC3c8b6c4a9cad: fips: Fix gen-note-integrity.sh script not to use cmp utility.
And I clarified the semantics of the integrity check.

Feb 17 2022, 3:48 AM · Bug Report, libgcrypt, FIPS
neverpanic added a comment to T5835: libgcrypt: More robust/portable integrity check.

Ah, right, I can get that added to the containers tomorrow.

Feb 17 2022, 1:39 AM · Bug Report, libgcrypt, FIPS
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

I located the cause:

../../src/gen-note-integrity.sh: line 78: cmp: command not found
Feb 17 2022, 1:36 AM · Bug Report, libgcrypt, FIPS

Feb 16 2022

neverpanic added a comment to T5835: libgcrypt: More robust/portable integrity check.

That only seems to work in some configurations: https://gitlab.com/redhat-crypto/libgcrypt/libgcrypt-mirror/-/pipelines/472626834

Feb 16 2022, 7:24 PM · Bug Report, libgcrypt, FIPS
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

I pushed the change: rCa340e9803882: fips: More portable integrity check.
It uses .note.fdo.integrity section, not loaded onto memory.
It simplifies the logic, and switches to dladdr (from dladdr1).

Feb 16 2022, 12:36 PM · Bug Report, libgcrypt, FIPS
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

Pushed the change which fixes the build with ld.gold.
rC9dcf9305962b: fips: Integrity check improvement, with only loadable segments.

Feb 16 2022, 6:29 AM · Bug Report, libgcrypt, FIPS
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

Thank you for your suggestions, @werner.
I agree that we should not put much effort to develop our own methodology here; Too much effort may introduce possibility of unmaintainable code, which should be avoided for the particular purpose of "integrity".

Feb 16 2022, 3:07 AM · Bug Report, libgcrypt, FIPS

Feb 15 2022

werner added a comment to T5835: libgcrypt: More robust/portable integrity check.

Folks, you are opening a can of worms. The only secure why to sign a file is to have a detached signature. That is often non-practical and thus putting the signature/MAC at one certain position and exempt just this one position from hashing is the next best alternative. Any more complicated rules will inevitably introduce security flaws. If a binary is stripped, it is a different binary than a non-stripped one, if it is linked with another linker, it is a different one. And that binary will even be able to figure this out and change behavior. Please keep it simple.

Feb 15 2022, 1:51 PM · Bug Report, libgcrypt, FIPS
neverpanic added a comment to T5835: libgcrypt: More robust/portable integrity check.

Thanks! Maybe it would be simpler to use dl_iterate_phdr(3) for this. I wasn't aware of the function, but a colleague just implemented a proof-of-concept of what you're proposing in https://gitlab.com/dueno/integrity-notes.

Feb 15 2022, 11:58 AM · Bug Report, libgcrypt, FIPS
gniibe added a comment to T5835: libgcrypt: More robust/portable integrity check.

I am going to apply https://gitlab.com/redhat-crypto/libgcrypt/libgcrypt-mirror/-/commit/64ccc25c4b4a2c8c4e13e7e37ff1c8c60a3d8401
And consider adding the code to limit hashing content (from start of the file to end of data section).

Feb 15 2022, 7:40 AM · Bug Report, libgcrypt, FIPS
gniibe updated the task description for T5835: libgcrypt: More robust/portable integrity check.
Feb 15 2022, 3:39 AM · Bug Report, libgcrypt, FIPS
gniibe triaged T5835: libgcrypt: More robust/portable integrity check as High priority.
Feb 15 2022, 3:38 AM · Bug Report, libgcrypt, FIPS

Feb 10 2022

gniibe added a comment to T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1).

It was addressed in rC04f325d8917d: released 1.1.4 as "(obsolete)" feature, in Aug 2001.

Feb 10 2022, 1:32 AM · Bug Report, libgcrypt
gniibe renamed T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1) from libgcrypt: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1 to libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1).
Feb 10 2022, 1:19 AM · Bug Report, libgcrypt

Feb 9 2022

gniibe added a comment to T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1).

Instead, let us remove the feature.

Feb 9 2022, 12:33 PM · Bug Report, libgcrypt
gniibe added a project to T5817: libgcrypt: Add Balloon KDF: Restricted Project.
Feb 9 2022, 2:58 AM · libgcrypt, Feature Request
gniibe claimed T5822: libgcrypt: Remove GCRYCTL_ENABLE_M_GUARD support (was: _gcry_private_malloc returns 4-byte alignment memory when use_m_guard==1).
Feb 9 2022, 2:58 AM · Bug Report, libgcrypt

Feb 8 2022

gniibe added a comment to T5817: libgcrypt: Add Balloon KDF.

Tested on a big endian machine.

$ uname -a
Linux perotto 5.15.0-2-powerpc64 #1 SMP Debian 5.15.5-2 (2021-12-18) ppc64 GNU/Linux
Feb 8 2022, 4:00 AM · libgcrypt, Feature Request

Feb 7 2022

werner closed T5467: Release libgcrypt 1.8.9 as Resolved.
Feb 7 2022, 10:01 AM · libgcrypt, Release Info
werner triaged T5818: Release Libgcrypt 1.8.10 as Low priority.
Feb 7 2022, 9:44 AM · Release Info, libgcrypt
gniibe triaged T5817: libgcrypt: Add Balloon KDF as Normal priority.
Feb 7 2022, 6:15 AM · libgcrypt, Feature Request

Feb 2 2022

werner added a comment to T5691: Release libgcrypt 1.10.0.

it will be but we first prefer to do some final tests with that version. Feel free to also test. Either this or the next micro version will eventually be announced.

Feb 2 2022, 8:16 PM · FIPS, Release Info, libgcrypt
carlocab added a comment to T5691: Release libgcrypt 1.10.0.

Hi there, is this the new stable version of libgcrypt? Apologies if this is the wrong place to ask; I just couldn’t find any other release announcement for 1.10.0.

Feb 2 2022, 5:09 PM · FIPS, Release Info, libgcrypt
gniibe triaged T5811: libgcrypt: Remove random-daemon (server side) as Normal priority.
Feb 2 2022, 3:41 AM · libgcrypt
gniibe closed T5706: libgcrypt: random: Remove the feature getting randomness from random daemon as Resolved.
Feb 2 2022, 3:36 AM · libgcrypt
gniibe closed T5714: tests: Do not run tests for algorithms that are not built-in as Resolved.
Feb 2 2022, 3:35 AM · libgcrypt, Bug Report
gniibe closed T5797: New API for modern password hash function as Resolved.
Feb 2 2022, 3:32 AM · Feature Request, libgcrypt
gniibe closed T5637: Use poll for libgcrypt (support more than 1024 fds) as Resolved.
Feb 2 2022, 3:31 AM · libgcrypt, Feature Request
gniibe closed T5752: libgcrypt: Adding aes-wrap-pad (RFC5649) support as Resolved.
Feb 2 2022, 3:30 AM · Feature Request, libgcrypt
gniibe closed T5540: Update fipsdrv and cavs_driver.pl as Resolved.
Feb 2 2022, 1:25 AM · FIPS, libgcrypt
gniibe closed T5600: Provide module name/version API for FIPS 140-3 as Resolved.
Feb 2 2022, 1:25 AM · libgcrypt, FIPS, Bug Report
gniibe closed T5512: Implement service indicators as Resolved.
Feb 2 2022, 1:24 AM · Feature Request, FIPS, libgcrypt
gniibe closed T5759: Rename rndlinux module to rndoldlinux, a subtask of T5692: New entropy gatherer using the genentropy system call., as Resolved.
Feb 2 2022, 1:23 AM · libgcrypt, FIPS
gniibe closed T5759: Rename rndlinux module to rndoldlinux as Resolved.
Feb 2 2022, 1:23 AM · libgcrypt, FIPS
gniibe closed T5747: Provide a way to request non-FIPS service in FIPS mode as Resolved.
Feb 2 2022, 1:23 AM · Feature Request, FIPS, libgcrypt
gniibe closed T5665: libgcrypt : Restrict message digest use for FIPS 140-3 as Resolved.
Feb 2 2022, 1:22 AM · FIPS, Bug Report, libgcrypt
gniibe closed T5636: Run integrity checks + selftests from library constructor in FIPS as Resolved.
Feb 2 2022, 1:22 AM · FIPS, libgcrypt, Bug Report
gniibe closed T5692: New entropy gatherer using the genentropy system call. as Resolved.
Feb 2 2022, 1:22 AM · libgcrypt, FIPS
gniibe closed T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation as Resolved.
Feb 2 2022, 1:21 AM · FIPS, libgcrypt, Feature Request
gniibe closed T5710: FIPS: disable DSA for FIPS as Resolved.
Feb 2 2022, 1:21 AM · FIPS, libgcrypt
gniibe closed T5723: libgcrypt: Remove random-fips.c as Resolved.
Feb 2 2022, 1:21 AM · FIPS, libgcrypt
gniibe closed T5523: jitter entropy RNG update as Resolved.
Feb 2 2022, 1:21 AM · FIPS, libgcrypt
gniibe closed T5541: Envvar LIBGCRYPT_FORCE_FIPS_MODE as Resolved.
Feb 2 2022, 1:20 AM · Feature Request, FIPS, libgcrypt
gniibe closed T5550: Fix check_binary_integrity as Resolved.
Feb 2 2022, 1:20 AM · FIPS, libgcrypt
gniibe closed T5508: Allow hardware optimizations in FIPS as Resolved.
Feb 2 2022, 1:20 AM · FIPS, libgcrypt, Bug Report
gniibe closed T5244: libgcrypt: Restrict MD5 use as Resolved.
Feb 2 2022, 1:19 AM · Bug Report, FIPS, libgcrypt
gniibe closed T5520: Fix tests in FIPS mode as Resolved.
Feb 2 2022, 1:18 AM · FIPS, libgcrypt, Bug Report
gniibe closed T5617: fips: Check library integrity before running selftests as Resolved.
Feb 2 2022, 1:17 AM · FIPS, libgcrypt, Bug Report
gniibe closed T5645: RSA/DSA keygen modification for FIPS/ACVP testing as Resolved.
Feb 2 2022, 1:16 AM · libgcrypt, FIPS, Bug Report
gniibe moved T5512: Implement service indicators from Next to Ready for release on the FIPS board.
Feb 2 2022, 1:15 AM · Feature Request, FIPS, libgcrypt
gniibe moved T5691: Release libgcrypt 1.10.0 from Next to Ready for release on the FIPS board.
Feb 2 2022, 1:15 AM · FIPS, Release Info, libgcrypt

Feb 1 2022

werner changed the status of T5691: Release libgcrypt 1.10.0 from Open to Testing.
Feb 1 2022, 9:49 PM · FIPS, Release Info, libgcrypt
werner triaged T5810: Release Libgcrypt 1.10.1 as Low priority.
Feb 1 2022, 9:38 PM · libgcrypt, Release Info
pmgdeb added a comment to T5806: Error codes in rsa.c:generate_fips().

Thanks, Werner. This was originally reported by Alejandro Masino.

Feb 1 2022, 2:44 PM · libgcrypt, Bug Report

Jan 31 2022

werner closed T5806: Error codes in rsa.c:generate_fips() as Resolved.

Thanks

Jan 31 2022, 1:31 PM · libgcrypt, Bug Report
gniibe added projects to T5797: New API for modern password hash function: Feature Request, Restricted Project.
Jan 31 2022, 1:22 AM · Feature Request, libgcrypt

Jan 29 2022

pmgdeb created T5806: Error codes in rsa.c:generate_fips().
Jan 29 2022, 2:07 PM · libgcrypt, Bug Report