Yubikeys allow that. See my mail to the mailing list.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Today
The extension .part is used by Mozilla/Firefox. Curl uses .tmp. Is that OK for Windows machine to use .part?
Yesterday
Seems like the OpenPGP Card Specification does not allow the change of retry counters.
That is a feature not a bug. Make also sense if your threat model is store-trafic-no-decrypt-later. If you can get the key you will also be abale to get the cleartext. Any nobody can remember a passphrase on par with the claimed Kyber security level.
Sat, Nov 22
Fri, Nov 21
When --output option is used and the user uses temporary file and is ready for checking an error, that is, it's already prepared, it's redundant and useless, indeed.
Let me explain about the change rG57affc4e98ab.
Thu, Nov 20
The tool tip for the menu is missing.
Please add the typical "Save at" dialog (instead of automatic saving with info "Key was saved at"). We should have consistent behavior when saving secret (and public) keys.
Applied the change to master: rG57affc4e98ab: common,agent,dirmngr,kbx:w32: Synchronous spawning daemon process.
Applied the change to master: rG57affc4e98ab: common,agent,dirmngr,kbx:w32: Synchronous spawning daemon process.
Wed, Nov 19
With the next gpg release (2.5.14) the keyboxd has an extended fingerprint table which carries a flags column. A bit in this column can eventually be used to mark subkeys with the "R" key flag and the search funtion can be enhanced to ignore keys with that flag set. This way we can more easily lookup the actual ADSK key (with the "E" key flag) and check whether this subkey has been revoked.
Tue, Nov 18
Mon, Nov 17
@ikloecker says that Kleo already support this feature. (I didn't know that.)
So, compatibility flag to switch on/off the feature would be needed,
or this feature is not needed in GnuPG at all.
Here is my attempt to do that:
Sun, Nov 16
Fix applied. Thanks.
Sat, Nov 15
I can confirm that the patch fixes the issue. Thanks!
Fri, Nov 14
Thu, Nov 13
Mon, Nov 10
Thu, Nov 6
Here is my idea to implement the feature:
(1) Extend struct iobuf_struct to have a field of temporary output (of int), just after real_fname.
- OUTPUTFILE: When it's 1, a file generated with real_fname original suffix removed and appended .tmp is used for the output
(2) Modify get_output_file in plaintext.c and make_outfile_name in openfile.c, so that OUTPUTFILE above is used and the field in iobuf_struct is marked.
(3) Modify proc_encrypted in mainproc.c so that rename .tmp file to the OUTPUTFILE or remove it when failure.
Wed, Nov 5
Alright, I change it from for notation data (and name).
[GNUPG:] NOTATION_NAME foo@foo.org [GNUPG:] NOTATION_FLAGS 0 1 [GNUPG:] NOTATION_DATA bla%20bla%20��%20blub
with change:
[GNUPG:] NOTATION_NAME foo@foo.org [GNUPG:] NOTATION_FLAGS 0 1 [GNUPG:] NOTATION_DATA bla%20bla%20%81%82%20blub
Since rfc2440 the PGP specs say:
Mon, Nov 3
That's a good question. Looking at https://datatracker.ietf.org/doc/draft-koch-librepgp/, it doesn't really specify what encoding is used for "human-readable" notation, so I'd personally lean towards encoding it to stay on the safe side. Unless I'm mistaken, status-fd will only be used locally, so escaping overhead should not be a problem.
Will be in 2.5.14 but I am not yet sure whether or when we put support into gpgme
There will be a new "pfc" record to emit the used preferences after a "uid" record. --list-options show-pref must be given.
The question is who shall correct the wrong encoding of notation data (assuming it is flagged as human readable). Escaping is a solution but needs a lot of extra bytes.
Sun, Nov 2
Mon, Oct 27
Oct 24 2025
Oct 23 2025
Oct 22 2025
Oct 21 2025
Implemented but not tested at all.
Oct 19 2025
For completeness, that's https://gitlab.freedesktop.org/poppler/poppler/-/issues/1595. dkg obviously filed that but it may be useful for others finding themselves here.
Oct 9 2025
Oct 8 2025
Fixed in 1.56.
Oct 3 2025
I updated the branch.
Oct 2 2025
We also discussed emails that can't be decrypted. They are due to implementation details just currently skipped. They will also be so in the future as an implementation detail.
Oct 1 2025
Sep 24 2025
Also implemented for 2.2
Sep 23 2025
I see no workaround.
The attachments in the original mail are not gone, yes.
But the mail can't be forwarded with them.
Sep 19 2025
ok, changed the text in the description of the ticket accordingly, but put two more "team" back in.
Dialogtext (winzige Politur):
Sep 18 2025
We decided to
Sep 17 2025
We got new suggestions for this:
Sep 12 2025
Sep 11 2025
Sep 10 2025
Sep 9 2025
Sep 2 2025
Aug 29 2025
Aug 28 2025
Especially when an LDAP is configured, keys should be automatically refreshed in short intervals (5 days? Configurable?) to notify users about revoked keys or signatures from a trusted key.
Keys that are close to their expiration dates should be prioritized.
Maybe users want to configure for what mail domains a lookup on a configured LDAP should be done.
I think it is save to say that we will not implement pgp/inline encryption with attachments
Aug 27 2025
The problem here is that we don't have the sha-2 fingerprint in our SQL tables. Thus we would not only need to do a full table search but also parse the actual blob to compute the sha-2 fingerprint.
I have done testing using my QES certificate with all combinations of the two options.
Aug 25 2025
Thanks for reporting/requesting.
Aug 23 2025
Aug 21 2025
Well, I will re-use this as a feature request to add this feature. Workaround is to list the key with --with-keygrip and backup the ~/.gnupg/private-keys-v1.d/<keygrip>.key files.
Aug 13 2025
Aug 11 2025
Aug 7 2025
Aug 4 2025
Looks good to me on gpg4win-5.0.0-beta357 @ win10 for the following migrations (as stated in the description):
- gpg4win 4.3.1 -> gpg4win 5.0
- gpg4win 4.4.1 -> gpg4win 5.0
Pushed the changes in {gniibe/synch-spawn} branch.
It consists of three commits: