Page MenuHome GnuPG
Feed Advanced Search

Feb 24 2022

TheParanoidProgrammer added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

Ok, I managed to find 48504E974C0DAC5B5CD476C8202274B24C8C7172 via Powershell. It was in the CA store of my non-privileged user and since I always checked the certificate store as administrator it did not show up there. After removal of this intermediate certificate I am able to use hkps://keyserver.ubuntu.com.

Feb 24 2022, 10:43 PM · gnupg (gpg22), dirmngr
TheParanoidProgrammer added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

Ok, so order of loading is not a problem since the cache does not store them by insertion order, but instead indexes them by the first byte of their fingerprint.
So, I think the problem here is that the expired intermediate certificate (48504E974C0DAC5B5CD476C8202274B24C8C7172) is somehow loaded in Windows and since its fingerprint's first byte is less than the server-supplied intermediate (A053375BFE84E8B748782C7CEE15827A6AF5A405) Windows chooses this one. I can see that the expired intermediate certificate is indeed loaded on Windows if I increase verbosity of dirmngr logs. However, I am still unsure where this certificate lives. The log says it comes from the "CA" store, but searching for it visually or by fingerprint search in Windows Certificates Snap-In (MMC) does not let me find it.
I will keep looking, but if you want to reproduce in your VMs, I suppose adding the expired intermediate certificate and the expired root certificate to the system store should make this reproducible.

Feb 24 2022, 10:26 PM · gnupg (gpg22), dirmngr
bernhard added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

@TheParanoidProgrammer thanks for investigating further. It is highly appreciated!

Feb 24 2022, 9:16 AM · gnupg (gpg22), dirmngr
TheParanoidProgrammer added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

On a side note, it turns out that Ubuntu Maintainers ship gpg with GnuTLS dynamically linked, so that's why I went down that road first. I compiled gpg from source for Ubuntu with ntbtls for further tests. Interesting insight is that find_cert_bysubject returns different certificates on first try on my Ubuntu Machine compared to my Windows 10 Machine:

Feb 24 2022, 1:06 AM · gnupg (gpg22), dirmngr

Feb 23 2022

TheParanoidProgrammer added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

Ok, I may see three potential problems in dirmngr->validate.c->validate_cert_chain(), but it may also be my limited familiarity with the gnupg source.

  • Here we leave the certificate validation loop at the first trusted root certificate, even if it is expired as we only mark this fact for later evaluation.
  • Here we seem to only ever go up the chain, never sideways as is the case in the original patch for this bug.
  • And probably most impactful, here we fail the whole validation if any of the previously checked certificates is expired, so that even if we would fix the second point by checking sibling certificates, we would still get an overall failure.
Feb 23 2022, 10:18 PM · gnupg (gpg22), dirmngr
TheParanoidProgrammer added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

What I wonder is: In a number of tests in our machines (mostly virtual machines), the TLS access to keyserver.ubuntu.com does work. I have yet to see a VM where it does not. So there must be a difference.

Feb 23 2022, 9:37 PM · gnupg (gpg22), dirmngr
TheParanoidProgrammer added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

Not a solution yet, but some more insights.
Starting from @NoSubstitute 's log output and from @bernhard 's statement that we use ntbTLS I verified that my dirmngr.exe was indeed compiled with NTBTLS 0.2.0. I did so by running strings "C:\Program Files (x86)\GnuPG\bin\dirmngr.exe" | grep TLS which returned "This is NTBTLS 0.2.0 - Not Too Bad TLS" among other strings. I also grepped for some debug strings introduced in newer commits to verify that the NTBTLS version used is not the current HEAD of master, but at least some commit before 64f895dba734802662cbb81b64cd0b4af198ee71. I will just assume it is the actual 0.2.0 release for now.

Feb 23 2022, 9:33 PM · gnupg (gpg22), dirmngr

Feb 22 2022

bernhard reopened T5639: dirmngr uses the wrong Let's encrypt chain as "Open".
Feb 22 2022, 10:27 AM · gnupg (gpg22), dirmngr
bernhard added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

@NoSubstitute It is okay for me to keep this issue, if most people prefer it this way, was just asking.

Feb 22 2022, 10:27 AM · gnupg (gpg22), dirmngr
NoSubstitute added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

@bernard - well, that's the kicker, isn't it.

Feb 22 2022, 10:14 AM · gnupg (gpg22), dirmngr
bernhard added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

Ah, just seeing that this issue is resolved. Shall we open a new one to be well structured?
(If we reopen this one, there is a lot of old information in here that does not apply anymore before the fixes that went into dirmngr/gnupg).

Feb 22 2022, 9:02 AM · gnupg (gpg22), dirmngr
bernhard added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

Does gpg4win ship a TLS library with gpg or does it use a system default?

Feb 22 2022, 8:59 AM · gnupg (gpg22), dirmngr

Feb 21 2022

TheParanoidProgrammer added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

Alright, in the hope it helps to pin this down, trying to sum up what I tried during and after my conversation with @bernhard so far:

  • Windows 10 keeps both the old and new root CA in the store and manual edits to the root certificate store are undone by the OS sooner or later
  • ignoring the intermediate certificate with dirmngr --ignore-cert 48504E974C0DAC5B5CD476C8202274B24C8C7172 fixes the problem as a workaround, but is not a satisfying solution
  • I cloned the repository and took a look at the original patch; while it seems that we only check validity of certificates without considering the expiration date, the patch does fix the original bug which I confirmed by compiling gpg from source at the commit containing the patch and another version at the commit prior to the patch. That is, the patch successfully fixes this on my Ubuntu machine. On my Windows 10 machine the bug persists no matter if using a self-compiled version from those commits or the official versions from gpg4win.
  • During exploring the source code and finding out how to compile and test from source I found out that I can reproduce the bug on Ubuntu if I compile gpg with the patch applied, but with a GnuTLS version that does not have their patch for this issue. Since this is the case with the default GnuTLS dev sources in Ubuntu 20.04., I had to get GnuTLS library from the project itself in order to successfully compile gpg for Ubuntu. For Windows the problem persists, however. I did not find GnuTLS or any other TLS library in the application directory of the GPG install on Windows nor in the installer itself. So I'm wondering if the remaining issue on Windows is actually with the used TLS library there. Does gpg4win ship a TLS library with gpg or does it use a system default?
  • The fixed version of GnuTLS is 3.6.14 for the project itself, there are backports of this patch for Ubuntu Xenial and Bionic, unfortunately not for Focal yet.
Feb 21 2022, 10:05 PM · gnupg (gpg22), dirmngr
NoSubstitute added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

Hello.
@bernard has been so kind to try and help me with this exact issue over in the gpg4win forum, and it seems I'm not the only one who still has problems with the "broken" LE certificate chain and hkps://keyserver.ubuntu.com.

Feb 21 2022, 3:35 PM · gnupg (gpg22), dirmngr

Jan 10 2022

bernhard added a comment to T5751: Please remove pgp.surf.nl from default dirmngr config.

Ubuntu have been syncing since 7th December: https://www.mail-archive.com/sks-devel@nongnu.org/msg07174.html

Jan 10 2022, 12:06 PM · dirmngr, Keyserver
andrewgdotcom added a comment to T5751: Please remove pgp.surf.nl from default dirmngr config.

Ubuntu have been syncing since 7th December: https://www.mail-archive.com/sks-devel@nongnu.org/msg07174.html

Jan 10 2022, 12:00 PM · dirmngr, Keyserver
bernhard added a comment to T5751: Please remove pgp.surf.nl from default dirmngr config.

Why the Ubuntu server? AFAIU it does not sync with other servers and it has some tained pubkeys (which is both fine as a choice of this service, it just does not seem to fit the purposes best).

Jan 10 2022, 11:55 AM · dirmngr, Keyserver
werner changed the status of T5751: Please remove pgp.surf.nl from default dirmngr config from Open to Testing.
Jan 10 2022, 9:20 AM · dirmngr, Keyserver
werner added a comment to T5751: Please remove pgp.surf.nl from default dirmngr config.

For the next release I'll change the gnupg.net mappings to use the Ubuntu server also for non-TLS connections.

Jan 10 2022, 9:20 AM · dirmngr, Keyserver

Dec 23 2021

alexnadtoka added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

@ikloecker yes sorry ok

Dec 23 2021, 11:35 AM · gnupg (gpg22), dirmngr
alexnadtoka updated subscribers of T5639: dirmngr uses the wrong Let's encrypt chain.

@bernard Right sorry. I have sent request to mailing lists

Dec 23 2021, 11:34 AM · gnupg (gpg22), dirmngr
ikloecker added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

@alexnadtoka, please stop adding the same information to two different issues. Let's use T5744: Issue with connecting to GPG server for any further comments.

Dec 23 2021, 11:32 AM · gnupg (gpg22), dirmngr
bernhard added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

@alexnadtoka wrote:

both versions had issues(( and send two requests to RU and EN comunity . No answer for two days already

Dec 23 2021, 11:06 AM · gnupg (gpg22), dirmngr
alexnadtoka added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

@bernhard yeah thank you. both versions had issues(( and send two requests to RU and EN comunity . No answer for two days already
The log clearlys says certificate is expired(( but it is not at least for keyserver... May be it is reffering to gpg key... I dont know... but it is not expired either. Probably I am missing something. Will try to contact community again.

Dec 23 2021, 10:41 AM · gnupg (gpg22), dirmngr
bernhard added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

@alexnadtoka When using Gpg4win-4.0.0 or 3.3.16 with an updated GnuPG the validation of dirmngr works fine with the Let's encrypt certificates again. If you have one of these versions, and you still have problems, you need to be more specific about which connection you are referring to.
Maybe it is best to ask on one of community channels (e.g. the gnupg-users mailinglist, see https://gnupg.org/documentation/mailing-lists.html )

Dec 23 2021, 10:05 AM · gnupg (gpg22), dirmngr
andrewgdotcom added a comment to T5751: Please remove pgp.surf.nl from default dirmngr config.

Do you have a ballpark figure for the install base (not including variants such as debian with modified defaults)? That might help us decide what counts as "overloading".

Dec 23 2021, 1:29 AM · dirmngr, Keyserver

Dec 22 2021

werner added a comment to T5751: Please remove pgp.surf.nl from default dirmngr config.

The problem is just that there are not that much keyservers left and thus I added those running by large organisations. I really don't want to overload your servers. I would also trust nlnet more than canoncial which is why I started with them.
Its all a mess. Maybe no keyserver should be the default.

Dec 22 2021, 7:54 PM · dirmngr, Keyserver
andrewgdotcom created T5751: Please remove pgp.surf.nl from default dirmngr config.
Dec 22 2021, 6:47 PM · dirmngr, Keyserver

Dec 21 2021

ikloecker added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

@alexnadtoka, did you do what Werner wrote in T5639#150626?

Dec 21 2021, 2:57 PM · gnupg (gpg22), dirmngr
alexnadtoka added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

Guys I am facing similar issue but my Lets ecnrypt certificates are all ok. What is the problem with my gpg4win client? When connecting to openpgp server it says certificate is expired. Anybody can help me?

Dec 21 2021, 9:28 AM · gnupg (gpg22), dirmngr

Dec 20 2021

ikloecker closed T5741: dirmngr does not ask keyservers for fingerprints as Resolved.
Dec 20 2021, 9:32 AM · Restricted Project, dirmngr

Dec 18 2021

werner added a comment to T5741: dirmngr does not ask keyservers for fingerprints.

ikloecker: Please go ahead

Dec 18 2021, 12:04 PM · Restricted Project, dirmngr

Dec 17 2021

werner added a comment to T5741: dirmngr does not ask keyservers for fingerprints.

IIRC, the problem is/was that this breaks some old keyservers. But there are no more old keyservers - if there are useful keyservers at all.

Dec 17 2021, 4:11 PM · Restricted Project, dirmngr

Dec 16 2021

ikloecker added a comment to T5741: dirmngr does not ask keyservers for fingerprints.

Proposed patch:

Dec 16 2021, 4:38 PM · Restricted Project, dirmngr
ikloecker created T5741: dirmngr does not ask keyservers for fingerprints.
Dec 16 2021, 4:34 PM · Restricted Project, dirmngr

Dec 6 2021

piec added a comment to T5657: dirmngr: libdns sends malformed dns requests.

Hi guys, I just tested the git version (426d82fcf1c133bfc1d5c931109d71db3f3815a9) and it works well thank you.

Dec 6 2021, 11:02 AM · Info Needed, Bug Report, dns, dirmngr
gniibe closed T5657: dirmngr: libdns sends malformed dns requests as Resolved.

Fixed in 2.2.33.

Dec 6 2021, 1:01 AM · Info Needed, Bug Report, dns, dirmngr

Nov 23 2021

werner lowered the priority of T5235: Delays in dirmngr http connections on Windows from Normal to Low.
Nov 23 2021, 9:14 AM · can't replicate, dirmngr, ntbtls, Windows, gnupg (gpg22)
werner added a project to T5235: Delays in dirmngr http connections on Windows: can't replicate.

Might be a TOR Thing?

Nov 23 2021, 9:14 AM · can't replicate, dirmngr, ntbtls, Windows, gnupg (gpg22)

Nov 8 2021

nsauter added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

Any news here? Is this issue going to be fixed or not? It's really annoying.

Nov 8 2021, 1:05 PM · Feature Request, Keyserver, dirmngr

Nov 3 2021

ikloecker merged T5675: Kleopatra 3.1.16 / Keyservers related functions are not working into T5639: dirmngr uses the wrong Let's encrypt chain.
Nov 3 2021, 1:53 PM · gnupg (gpg22), dirmngr

Oct 19 2021

bernhard added a comment to T4249: No connection to Keyserver possible.

This has not been set high on the priorities, because keyserver access works for most with Gpg4win (and thus GnuPG) on windows. A recent exception has been occurred about a month ago with Let's encrypt expired root certificate. So currently for Gpg4win 3.1.16 you need to update to a newer GnuPG (Version 2.2.32 at time of writing), by installing the simple installer,e.g. https://gnupg.org/ftp/gcrypt/binary/gnupg-w32-2.2.32_20211006.exe

Oct 19 2021, 10:57 AM · gnupg, dirmngr, Bug Report, gpg4win

Oct 15 2021

gniibe added a comment to T5657: dirmngr: libdns sends malformed dns requests.

I don't know if it's same in your case, but to fix my case, I pushed a change rG48359c723206: dns: Make reading resolv.conf more robust.

Oct 15 2021, 3:52 AM · Info Needed, Bug Report, dns, dirmngr
gniibe added a comment to T5657: dirmngr: libdns sends malformed dns requests.

I managed to create a case. Put a line:

Oct 15 2021, 3:28 AM · Info Needed, Bug Report, dns, dirmngr
gniibe added a comment to T5657: dirmngr: libdns sends malformed dns requests.

BTW, in your screen shot (log is preferred here), it shows 1c00, that must be actually written as AAAA (0x1c). In the bug T3803, we saw byte sequence like that, additional 00 was added then resulted malformed DNS packet.

Oct 15 2021, 2:17 AM · Info Needed, Bug Report, dns, dirmngr

Oct 14 2021

werner triaged T5657: dirmngr: libdns sends malformed dns requests as Normal priority.
Oct 14 2021, 1:26 PM · Info Needed, Bug Report, dns, dirmngr
werner added a comment to T5657: dirmngr: libdns sends malformed dns requests.

dots are not allowed in hostnames.

Oct 14 2021, 1:25 PM · Info Needed, Bug Report, dns, dirmngr
piec added a comment to T5657: dirmngr: libdns sends malformed dns requests.

OK, I'll gdb in there to see what happens. My domain is a classic pgp.domain.com

Oct 14 2021, 11:13 AM · Info Needed, Bug Report, dns, dirmngr
gniibe added a comment to T5657: dirmngr: libdns sends malformed dns requests.

Ah, other possible case is .. in hostname.

Oct 14 2021, 7:50 AM · Info Needed, Bug Report, dns, dirmngr
gniibe added a project to T5657: dirmngr: libdns sends malformed dns requests: Info Needed.
Oct 14 2021, 7:45 AM · Info Needed, Bug Report, dns, dirmngr
gniibe added a comment to T5657: dirmngr: libdns sends malformed dns requests.

It's hard to investigate your problem, with no information of host for the query.
I mean, there is no case to replicate (for us).

Oct 14 2021, 7:44 AM · Info Needed, Bug Report, dns, dirmngr

Oct 13 2021

piec created T5657: dirmngr: libdns sends malformed dns requests.
Oct 13 2021, 5:10 PM · Info Needed, Bug Report, dns, dirmngr

Oct 8 2021

werner added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

There won't be any other 3.1 release - install GnuPG 2.2.32 on top of Gpg4win 3.1.16

Oct 8 2021, 3:18 PM · gnupg (gpg22), dirmngr
bernhard added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

My experience on a Window 10 system (with Gpg4win 3.1.15 which has GnuPG 2.2.27) was, that removing the expired root certificate did not help with https://keyserver.ubuntu.com and the intermediate certificate was not in the windows store, so it could not be removed.

Oct 8 2021, 12:01 PM · gnupg (gpg22), dirmngr
ikloecker added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

Removing an intermediate cert from your local system doesn't help because any correctly configured server will send you all necessary intermediate certs together with the server cert. You'd have to remove the expired root certificate instead (see Workaround 1 on https://www.openssl.org/blog/blog/2021/09/13/LetsEncryptRootCertExpire/). The problem is that this will break certificate verification for any servers that still use the old intermediate cert, e.g. keyserver.ubuntu.com.

Oct 8 2021, 9:16 AM · gnupg (gpg22), dirmngr

Oct 7 2021

werner added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

The LE web site has instruction on how to do this. However, it is complicated and depends on your system. The intermediate cert you listed is signed by the expired old root cert. If you remove this intermediate cert the other root cert will be found and we are done. The old LE certs had a 4 tier chain and the new one a 3 tier.
See https://dev.gnupg.org/rG341ab0123a8fa386565ecf13f6462a73a137e6a4 and https://letsencrypt.org/images/isrg-hierarchy.png

Oct 7 2021, 5:33 PM · gnupg (gpg22), dirmngr
bernhard added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

One problem I see is that keyserver.ubuntu.com delivers a problematic intermediate(?) certificate:

Oct 7 2021, 1:59 PM · gnupg (gpg22), dirmngr
bernhard added a comment to T5639: dirmngr uses the wrong Let's encrypt chain.

If there is no easy way to install a new version of GnuPG, e.g. for Gpg4win or for GNU/Linux distributions: It may make sense to have instructions for the workaround ready.

Oct 7 2021, 9:30 AM · gnupg (gpg22), dirmngr

Oct 6 2021

werner closed T5639: dirmngr uses the wrong Let's encrypt chain as Resolved.
Oct 6 2021, 9:20 PM · gnupg (gpg22), dirmngr
werner triaged T5639: dirmngr uses the wrong Let's encrypt chain as High priority.
Oct 6 2021, 9:23 AM · gnupg (gpg22), dirmngr

Aug 13 2021

werner changed the edit policy for dirmngr.
Aug 13 2021, 10:56 PM

Jul 27 2021

werner triaged T5531: dirmngr --validate broken for DER encoded files as Normal priority.
Jul 27 2021, 7:59 AM · gnupg (gpg23), dirmngr, Bug Report

Jun 25 2021

werner closed T5068: LDAP keyserver does not support lookup by fingerprint as Resolved.

This has been solved in 2.2.26 commit rGc75fd75532

Jun 25 2021, 11:15 AM · LDAP, dirmngr, gnupg (gpg22)

Apr 16 2021

werner closed T2332: Cannot authenticate with LDAP keyserver as Resolved.

This has been fixed in version 2.2.16.

Apr 16 2021, 8:08 PM · gnupg, dirmngr, Bug Report

Feb 10 2021

werner closed T4599: remap `--search` to `--locate-keys` (with warning) as Wontfix.
Feb 10 2021, 3:03 PM · gnupg (gpg23), dirmngr
werner closed T4488: dirmngr: allow changing `use-tor` in a reload as Wontfix.

dirmngr needs to be killed for this. gpgconf --kill dirmngr.

Feb 10 2021, 3:02 PM · gnupg (gpg23), dirmngr
werner edited projects for T3287: Improve http proxy support by honoring SRV RRs., added: gnupg; removed gnupg (gpg23).
Feb 10 2021, 11:51 AM · gnupg, dirmngr
werner closed T2964: dirmngr and gpg-agent should work automatically even when GNUPGHOME is larger than sun_path as Resolved.

The now used /var/run thingy solves all these problems nicely. In fact we may eventually remove the use fallback of using sockets in the GNUPGHOMEDIR.

Feb 10 2021, 11:29 AM · Stalled, scd, gpgagent, Bug Report, gnupg, dirmngr
werner closed T2836: dirmngr: wakes up periodically as Resolved.

The other patches don't make sense because of future plans for dirmngr.

Feb 10 2021, 11:07 AM · gnupg, gnupg (gpg23), Bug Report, dirmngr

Jan 27 2021

aheinecke reopened T5068: LDAP keyserver does not support lookup by fingerprint as "Open".
Jan 27 2021, 12:19 PM · LDAP, dirmngr, gnupg (gpg22)
aheinecke changed the visibility for T5068: LDAP keyserver does not support lookup by fingerprint.
Jan 27 2021, 12:19 PM · LDAP, dirmngr, gnupg (gpg22)
Jab closed T5068: LDAP keyserver does not support lookup by fingerprint as Spite.
Jan 27 2021, 11:56 AM · LDAP, dirmngr, gnupg (gpg22)

Jan 11 2021

werner created T5235: Delays in dirmngr http connections on Windows.
Jan 11 2021, 8:52 PM · can't replicate, dirmngr, ntbtls, Windows, gnupg (gpg22)

Jan 8 2021

werner closed T4447: Fix addition of new GPG keys to LDAP as Resolved.

The code has been reworked to also support the updated schema which also stores the fingerprints and a parsed down mail address. See gnupg/doc/ldap/ . These changes are in master and 2.2.26. Sorry for taking so long to fix that.

Jan 8 2021, 9:56 AM · gnupg (gpg23), patch, LDAP, dirmngr, Bug Report

Dec 22 2020

pert added a comment to T4618: DANE OpenPGP certificate retrieval does not verify DNSSEC signatures.

Granted I'm not familiar with the functions and it may not be applicable, but the DNS resolver functions in the GNU C Library have semi-recently gained parameters (RES_USE_DNSSEC) to check for DNSSEC validation IIRC. Recent versions of glibc also don't trust the 'ad' bit unless an indication of its trustworthiness is set in /etc/resolv.conf, say if using a local validating resolver, so one can be sure that it's trustworthy. It also appears musl libc may support this.

Dec 22 2020, 5:35 AM · dns, dirmngr

Nov 27 2020

werner lowered the priority of T3392: keyserver default should include pool onionbalance hkp://jirk5u4osbsr34t5.onion from Normal to Wishlist.
Nov 27 2020, 5:39 PM · Keyserver, Feature Request, dirmngr

Nov 26 2020

gniibe added a parent task for T3168: dirmngr: gpg: keyserver receive failed: No keyserver available: T3517: dirmngr: retry without SRV due to buggy routers.
Nov 26 2020, 7:51 AM · dns, dirmngr
gniibe added a subtask for T3517: dirmngr: retry without SRV due to buggy routers: T3168: dirmngr: gpg: keyserver receive failed: No keyserver available.
Nov 26 2020, 7:51 AM · Feature Request, dns, dirmngr
gniibe merged T3722: gpg "No name" error into T3517: dirmngr: retry without SRV due to buggy routers.
Nov 26 2020, 7:31 AM · Feature Request, dns, dirmngr
gniibe merged T4817: dirmgr keys.openpgp.org:443 Address family not supported by protocol into T4977: dirmngr not working with linux kernel parameter ipv6.disable=1.
Nov 26 2020, 7:15 AM · Restricted Project, gnupg (gpg22), dirmngr, Bug Report

Sep 15 2020

werner created T5068: LDAP keyserver does not support lookup by fingerprint.
Sep 15 2020, 2:24 PM · LDAP, dirmngr, gnupg (gpg22)

Aug 28 2020

gniibe closed T4934: Returning automatic variable buffer from a function as Resolved.
Aug 28 2020, 2:58 AM · dirmngr, Restricted Project, Bug Report

Aug 27 2020

werner closed T4977: dirmngr not working with linux kernel parameter ipv6.disable=1 as Resolved.
Aug 27 2020, 3:03 PM · Restricted Project, gnupg (gpg22), dirmngr, Bug Report

Aug 18 2020

bernhard added a comment to T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

Just reading this issue in detail.

Aug 18 2020, 4:43 PM · gnupg (gpg22), Bug Report, dirmngr

Jul 13 2020

gniibe triaged T4977: dirmngr not working with linux kernel parameter ipv6.disable=1 as Normal priority.
Jul 13 2020, 3:14 AM · Restricted Project, gnupg (gpg22), dirmngr, Bug Report
gniibe changed the status of T4977: dirmngr not working with linux kernel parameter ipv6.disable=1 from Open to Testing.

Pushed fix to master and STABLE-BRANCH-2-2.

Jul 13 2020, 3:13 AM · Restricted Project, gnupg (gpg22), dirmngr, Bug Report
gniibe added a comment to T4977: dirmngr not working with linux kernel parameter ipv6.disable=1.

Thanks for your log.

Jul 13 2020, 2:54 AM · Restricted Project, gnupg (gpg22), dirmngr, Bug Report

Jul 11 2020

iyanmv added a comment to T4977: dirmngr not working with linux kernel parameter ipv6.disable=1.

$ cat /run/user/1000/dirmngr.log

2020-07-11 19:33:44 dirmngr[2305.0] permanently loaded certificates: 140
2020-07-11 19:33:44 dirmngr[2305.0]     runtime cached certificates: 0
2020-07-11 19:33:44 dirmngr[2305.0]            trusted certificates: 140 (139,0,0,1)
2020-07-11 19:39:24 dirmngr[2305.6] force-crl-refresh active for issuer id CE04B58CBA5B8069AA0D503634B861593BE86F20; update required
2020-07-11 19:39:24 dirmngr[2305.6] number of system provided CAs: 148
2020-07-11 19:39:24 dirmngr[2305.6] error creating socket: Address family not supported by protocol
2020-07-11 19:39:24 dirmngr[2305.6] error connecting to 'http://cdp1.pca.dfn.de/global-root-g2-ca/pub/crl/cacrl.crl': Address family not supported by protocol
2020-07-11 19:39:24 dirmngr[2305.6] error retrieving 'http://cdp1.pca.dfn.de/global-root-g2-ca/pub/crl/cacrl.crl': Address family not supported by protocol
2020-07-11 19:39:24 dirmngr[2305.6] crl_fetch via DP failed: Address family not supported by protocol
2020-07-11 19:39:24 dirmngr[2305.6] command 'ISVALID' failed: Address family not supported by protocol
2020-07-11 19:39:24 dirmngr[2305.6] force-crl-refresh active for issuer id 3476EB7C1E02B3BAF954EEE2EFD321F7B8E49D18; update required
2020-07-11 19:39:24 dirmngr[2305.6] error creating socket: Address family not supported by protocol
2020-07-11 19:39:24 dirmngr[2305.6] error connecting to 'http://pki0336.telesec.de/rl/TeleSec_GlobalRoot_Class_2.crl': Address family not supported by protocol
2020-07-11 19:39:24 dirmngr[2305.6] error retrieving 'http://pki0336.telesec.de/rl/TeleSec_GlobalRoot_Class_2.crl': Address family not supported by protocol
2020-07-11 19:39:24 dirmngr[2305.6] crl_fetch via DP failed: Address family not supported by protocol
2020-07-11 19:39:24 dirmngr[2305.6] command 'ISVALID' failed: Address family not supported by protocol
2020-07-11 19:39:24 dirmngr[2305.6] force-crl-refresh active for issuer id 70F42DB9235EC84DC35D445B3407CABF4324291C; update required
2020-07-11 19:39:24 dirmngr[2305.6] error creating socket: Address family not supported by protocol
Jul 11 2020, 7:42 PM · Restricted Project, gnupg (gpg22), dirmngr, Bug Report
iyanmv added a comment to T4977: dirmngr not working with linux kernel parameter ipv6.disable=1.

@gniibe I saw that you didn't understand what I meant by "dirmngr stops working properly" in E663.
Have a look at this post in Archlinux forum.

Jul 11 2020, 7:29 PM · Restricted Project, gnupg (gpg22), dirmngr, Bug Report

Jul 2 2020

werner closed T4758: gnupg-2.2.18/dirmngr/ldap-parse-uri.c:57:27: style: Same expression on both sides of '||'. as Resolved.

Fixed; In master the code already uses our generic scheme parser.

Jul 2 2020, 4:10 PM · LDAP, dirmngr, Bug Report

Jul 1 2020

werner closed T4618: DANE OpenPGP certificate retrieval does not verify DNSSEC signatures as Wontfix.
Jul 1 2020, 2:10 PM · dns, dirmngr
werner added a comment to T4618: DANE OpenPGP certificate retrieval does not verify DNSSEC signatures.

DANE for OpenPGP is an experimental RFC (RFC-7929) and it is likely that we will remove the support because it is too hard for most users to add keys to a zone. Further a validating resolver on the desktop is too hard to maintain and the cause of too many other failures. And no, unbound etc is not an option because it is not usable by the majority of GnuPG users.

Jul 1 2020, 2:10 PM · dns, dirmngr

Jun 30 2020

dkg added a comment to T4618: DANE OpenPGP certificate retrieval does not verify DNSSEC signatures.

The same concern has been reported at https://bugs.debian.org/964033 -- if dirmngr is not going to follow the specification, it should at least document (and maybe warn?) about how it is divergent.

Jun 30 2020, 9:30 PM · dns, dirmngr

Jun 26 2020

gniibe added a comment to T4977: dirmngr not working with linux kernel parameter ipv6.disable=1.

When I test it on Debian, disabling by,

Jun 26 2020, 7:25 AM · Restricted Project, gnupg (gpg22), dirmngr, Bug Report
gniibe claimed T4977: dirmngr not working with linux kernel parameter ipv6.disable=1.
Jun 26 2020, 7:06 AM · Restricted Project, gnupg (gpg22), dirmngr, Bug Report
gniibe added a comment to T4977: dirmngr not working with linux kernel parameter ipv6.disable=1.

Please get log of dirmngr, by putting

log-file /run/user/<YOURNUMBER-LIKE-1000>/dirmngr.log
Jun 26 2020, 7:04 AM · Restricted Project, gnupg (gpg22), dirmngr, Bug Report

Jun 25 2020

dkg added a comment to T4977: dirmngr not working with linux kernel parameter ipv6.disable=1.

Can you characterize the failure when ipv6.disable=1 ? The straightforward failure (connect() fails with EHOSTUNREACH after a few seconds) should presumably be treated the same as if some other host happened to be offline. That should result in dirmngr failing over to the next available address for the configured keyserver, right?

Jun 25 2020, 7:28 PM · Restricted Project, gnupg (gpg22), dirmngr, Bug Report

Jun 22 2020

werner added a comment to T4977: dirmngr not working with linux kernel parameter ipv6.disable=1.

The problem is that I have not yet found a _portable_ way to detect proper working v6 or v4 networking without doing a test connection. For privacy reasons we don't want to do that.

Jun 22 2020, 3:32 PM · Restricted Project, gnupg (gpg22), dirmngr, Bug Report
werner added projects to T4977: dirmngr not working with linux kernel parameter ipv6.disable=1: dirmngr, gnupg (gpg22).
Jun 22 2020, 3:20 PM · Restricted Project, gnupg (gpg22), dirmngr, Bug Report

May 21 2020

gniibe changed the status of T4934: Returning automatic variable buffer from a function from Open to Testing.

Fixed in master and applied to 2.2 branch too.

May 21 2020, 7:39 AM · dirmngr, Restricted Project, Bug Report