Page MenuHome GnuPG
Feed Advanced Search

Jul 2 2020

werner added a comment to T4981: internationalization (support UNICODE/UTF-8 character set).

Your welcome.

Jul 2 2020, 9:19 PM · i18n, FreeBSD, Feature Request
Walter_von_Entferndt closed T4981: internationalization (support UNICODE/UTF-8 character set) as Invalid.
Jul 2 2020, 6:58 PM · i18n, FreeBSD, Feature Request
Walter_von_Entferndt added a comment to T4981: internationalization (support UNICODE/UTF-8 character set).

I regret to have distracted your attention. All the above applies to a terminal window (KDE's konsole) in my GUI KDE. On the bare FreeBSD console, everything is fine. So this is a bug in some KDE library or konsole. I'm sorry I did not have the idea to test that on the bare console right away. I'll close this bug here.

Jul 2 2020, 6:57 PM · i18n, FreeBSD, Feature Request
Walter_von_Entferndt added a comment to T4981: internationalization (support UNICODE/UTF-8 character set).

Hello Mr. Niibe,

Jul 2 2020, 12:15 PM · i18n, FreeBSD, Feature Request
gniibe added a comment to T4981: internationalization (support UNICODE/UTF-8 character set).

It seems that nl_langinfo(CODESET) returns US-ASCII on your system.

Jul 2 2020, 8:16 AM · i18n, FreeBSD, Feature Request

Jun 29 2020

werner added projects to T4981: internationalization (support UNICODE/UTF-8 character set): FreeBSD, i18n.
Jun 29 2020, 1:27 PM · i18n, FreeBSD, Feature Request
werner added a comment to T4981: internationalization (support UNICODE/UTF-8 character set).

My FreeBSD box is currently not up, so I can't test right now. You may want to look into gnupg/common/utf8conv.c and there set_native_charset(). For historical reasons we start off with latin-1 but then swicth to the selected charset and intialize iconv accordingly. In the case of an error we sometimes fallback to utf-8. You may want to add some debug code (log_debug ("foo bar string=%s\n", some_string);)

Jun 29 2020, 1:25 PM · i18n, FreeBSD, Feature Request
Walter_von_Entferndt added a comment to T4981: internationalization (support UNICODE/UTF-8 character set).

in your test, which you did on Linux I guess, utf-8 is written downcase, whereas on my system, it is written uppercase 'UTF-8, conforming to what I find elsewhere (e.g. Wikipedia and RFC 3629). I do not know though, if there is a recommended way to spell it. So the bug might be: gpg does not compare the RFC spelling uppercase, but the linuxism: utf-8 witten downcase. Then the correct fix would be to compare uppercase UTF-8 only, and let Linux fix their system to use the correct uppercase throughout the system... ;)
2nd, I know that FreeBSD has some issues with internationalization: it does not support charsets in their POSIX meaning, but emulates them by combining all available locales and (matching) CODESETs. Usually, this is not a problem, and most translations and handling of UTF-8 works as expected. Maybe this has some subtle effect causing this issue.

Jun 29 2020, 12:34 PM · i18n, FreeBSD, Feature Request
Walter_von_Entferndt added a comment to T4981: internationalization (support UNICODE/UTF-8 character set).

Hello Werner,

Jun 29 2020, 12:12 PM · i18n, FreeBSD, Feature Request

Jun 28 2020

werner added a comment to T4981: internationalization (support UNICODE/UTF-8 character set).

OpenPGP specifies the use of UTF-8 for all meta data (ie. everything except for the signed/encrypted data). GnuPG has always supported this. I don't known on which OS you are but some don't have UTF-8 support on the command line or tty so you need to tweak your environment first.

Jun 28 2020, 4:30 PM · i18n, FreeBSD, Feature Request

Jun 26 2020

Walter_von_Entferndt created T4981: internationalization (support UNICODE/UTF-8 character set).
Jun 26 2020, 4:23 PM · i18n, FreeBSD, Feature Request

Jun 9 2020

werner changed the status of T4735: Please provide an option to make --verify accept only signatures from specific trusted UID from Open to Testing.
Jun 9 2020, 6:31 PM · gnupg (gpg23), Feature Request
werner added a comment to T4735: Please provide an option to make --verify accept only signatures from specific trusted UID.

Shall we backport this to 2.2 which is our LTS release?

Jun 9 2020, 6:31 PM · gnupg (gpg23), Feature Request

Jun 8 2020

werner added a comment to T4735: Please provide an option to make --verify accept only signatures from specific trusted UID.

With the recent change the --sender option has an effect on the selection of the User ID used for the key validity check and the TRUST_ status lines:

Jun 8 2020, 8:43 PM · gnupg (gpg23), Feature Request

Jun 5 2020

aheinecke added a comment to T4609: GpgOL: Add "Save decrypted copy".

MAPI Namespace has a pickFolder method which can be used here.

Jun 5 2020, 11:17 AM · Feature Request, gpgol

Jun 4 2020

werner triaged T4735: Please provide an option to make --verify accept only signatures from specific trusted UID as High priority.
Jun 4 2020, 12:20 PM · gnupg (gpg23), Feature Request
werner updated subscribers of T4735: Please provide an option to make --verify accept only signatures from specific trusted UID.
Jun 4 2020, 10:48 AM · gnupg (gpg23), Feature Request

Jun 3 2020

werner added a comment to T4735: Please provide an option to make --verify accept only signatures from specific trusted UID.

We already have the option --sender which does what @mgorny requests but only in the TOFU case. I need to revisit the system to see whether we can extend it to WoT and direct key signatures.

Jun 3 2020, 5:49 PM · gnupg (gpg23), Feature Request
werner claimed T4735: Please provide an option to make --verify accept only signatures from specific trusted UID.
Jun 3 2020, 5:45 PM · gnupg (gpg23), Feature Request

Jun 2 2020

aheinecke added projects to T4773: Option to always permanently decrypt: gpgol, gpg4win.
Jun 2 2020, 2:58 PM · gpg4win, gpgol, Feature Request
JJworx added a comment to T4773: Option to always permanently decrypt.

no prob

Jun 2 2020, 2:47 PM · gpg4win, gpgol, Feature Request
aheinecke added a comment to T4773: Option to always permanently decrypt.

Uh, I just noticed that this issue is from dec. 2019 I am unsure why I overlooked this and only noticed it in my regular tracker check today.

Jun 2 2020, 11:47 AM · gpg4win, gpgol, Feature Request
aheinecke claimed T4773: Option to always permanently decrypt.

@JJworx Thanks for the suggestion / feature request.

Jun 2 2020, 11:45 AM · gpg4win, gpgol, Feature Request

May 29 2020

werner added a comment to T4788: System wide configuration of the GnuPG system.
May 29 2020, 3:16 PM · gnupg (gpg23), Feature Request, gpg4win, g10code
werner added a comment to T4635: ship gpgscm and necessary *.scm files from gpgrt.

FYIL This is delayed because there are some dependencies to internals of gnupg.

May 29 2020, 2:32 PM · Tests, gpgrt, Feature Request
werner closed T4952: libgpg-error/gpgrt lock-obj for big-endian 64-bit MIPS as Resolved.

Merged. Thanks.

May 29 2020, 2:29 PM · gpgrt, Feature Request

May 28 2020

PWRzTOtacorTPq7KNW4oFec8F added a comment to T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)).

Is there a blogpost or similar where the use of several smartcards following this improvement is explained to n00bs like me? :) For now all I find is this thread and some SE answers saying it does not work yet (https://security.stackexchange.com/questions/154702/gpg-encryption-subkey-on-multiple-smart-cards-issue) . If somebody could post a new answer on SE / write a small blog post or similar that would be great. Useful would be to have 1) from which versions and over is that available 2) how this works / how to use.

May 28 2020, 10:18 PM · Restricted Project, gnupg, Feature Request

May 27 2020

werner added a comment to T4098: GpgSM: Add ECC support.

GnuTLS seems to have some CMS support; see https://gitlab.com/gnutls/gnutls/-/issues/227 .

May 27 2020, 10:35 AM · gnupg (gpg23), Feature Request, S/MIME

May 22 2020

gniibe claimed T4952: libgpg-error/gpgrt lock-obj for big-endian 64-bit MIPS.
May 22 2020, 2:05 AM · gpgrt, Feature Request

May 21 2020

gniibe added a comment to T4952: libgpg-error/gpgrt lock-obj for big-endian 64-bit MIPS.

libgpg-error used to be blamed because of this kind of architectural support in earlier stage of building operating system.
T4774 is my try to fix the problem.

May 21 2020, 6:46 AM · gpgrt, Feature Request
gniibe added a comment to T4952: libgpg-error/gpgrt lock-obj for big-endian 64-bit MIPS.

Thank you for your work. Please go ahead.

May 21 2020, 6:43 AM · gpgrt, Feature Request

May 20 2020

dkg added a comment to T4952: libgpg-error/gpgrt lock-obj for big-endian 64-bit MIPS.

If there's no objection to this in a few days, i'll go ahead and merge it to master.

May 20 2020, 10:00 PM · gpgrt, Feature Request
anarcat added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

I had assumed that GnuPG prioritized the safety of its users over strict adherence to a particular view of a cryptographic protocol

May 20 2020, 4:12 AM · gnupg (gpg23), Feature Request

May 19 2020

dkg added a comment to T4952: libgpg-error/gpgrt lock-obj for big-endian 64-bit MIPS.

branch dkg/fix-4952 contains this fix in an easily applicable form as 0db8c768843db3e85935b972f1ed9d1b98159c46

May 19 2020, 8:49 PM · gpgrt, Feature Request
dkg created T4952: libgpg-error/gpgrt lock-obj for big-endian 64-bit MIPS.
May 19 2020, 7:41 PM · gpgrt, Feature Request
werner closed T4920: Support ECDH in Libksba as Resolved.
May 19 2020, 4:49 PM · libksba, Feature Request, S/MIME
werner closed T4920: Support ECDH in Libksba, a subtask of T4098: GpgSM: Add ECC support, as Resolved.
May 19 2020, 4:49 PM · gnupg (gpg23), Feature Request, S/MIME
werner lowered the priority of T4896: ksba: Ed25519 support from High to Normal.

Parsing and creating of certs does now work. I was not able to find sample CMS objects so this part is not yet finished.

May 19 2020, 3:12 PM · Info Needed, libksba, Feature Request, S/MIME
werner closed T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed, a subtask of T4888: GpgSM: Support ECC key generation by gpgsm_genkey, as Resolved.
May 19 2020, 2:43 PM · Restricted Project, Feature Request, S/MIME
werner closed T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed as Resolved.
May 19 2020, 2:43 PM · Restricted Project, Feature Request, S/MIME
werner added a comment to T4888: GpgSM: Support ECC key generation by gpgsm_genkey.

Finished if an existing key is used. See rG6dc3846d78192e393be73c16c72750734a9174d1 for examples.

May 19 2020, 2:42 PM · Restricted Project, Feature Request, S/MIME
werner added a comment to T4098: GpgSM: Add ECC support.

See rG6dc3846d78192e393be73c16c72750734a9174d1 for examples on how to create a cert

May 19 2020, 2:41 PM · gnupg (gpg23), Feature Request, S/MIME
werner created T4951: Support point compression in Libgcrypt.
May 19 2020, 2:25 PM · Feature Request, libgcrypt
aheinecke removed a subtask for T4388: GpgOL: Add draft encryption as an option.: T4660: Gpg4win 3.1.11.
May 19 2020, 11:49 AM · Feature Request, gpg4win, gpgol
aheinecke changed the status of T4388: GpgOL: Add draft encryption as an option. from Testing to Open.

I'm moving this from testing to open again. Especially the deletion is an issue. I had a report that even for a sent mail Outlook.com also stores an unencrypted variant in the "Trash Bin".

May 19 2020, 11:49 AM · Feature Request, gpg4win, gpgol
aheinecke closed T4660: Gpg4win 3.1.11, a subtask of T4388: GpgOL: Add draft encryption as an option., as Resolved.
May 19 2020, 11:46 AM · Feature Request, gpg4win, gpgol

May 14 2020

werner removed a subtask for T4098: GpgSM: Add ECC support: T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed.
May 14 2020, 10:50 AM · gnupg (gpg23), Feature Request, S/MIME
werner removed a parent task for T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed: T4098: GpgSM: Add ECC support.
May 14 2020, 10:50 AM · Restricted Project, Feature Request, S/MIME
werner added a parent task for T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed: T4888: GpgSM: Support ECC key generation by gpgsm_genkey.
May 14 2020, 10:50 AM · Restricted Project, Feature Request, S/MIME
werner added a subtask for T4888: GpgSM: Support ECC key generation by gpgsm_genkey: T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed.
May 14 2020, 10:50 AM · Restricted Project, Feature Request, S/MIME
werner added a subtask for T4098: GpgSM: Add ECC support: T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed.
May 14 2020, 10:47 AM · gnupg (gpg23), Feature Request, S/MIME
werner added a parent task for T4092: Certificate requests generated from card-based ECDSA keys are incorrectly marked as RSA-signed: T4098: GpgSM: Add ECC support.
May 14 2020, 10:47 AM · Restricted Project, Feature Request, S/MIME
werner closed T4487: libksba: please refresh ASN.1 components from more recent RFCs with BSD licensing as Wontfix.

Won't fix because there is no need for it. ASN.1 modules are the formal description of a protocol and as such not copyrightable.

May 14 2020, 9:45 AM · libksba, Feature Request

May 11 2020

werner claimed T4896: ksba: Ed25519 support.
May 11 2020, 7:50 PM · Info Needed, libksba, Feature Request, S/MIME
werner changed the status of T4098: GpgSM: Add ECC support from Open to Testing.

Signing using ECDSA does now also work. Tested with 3 in disk keys: nistp256, nistp384 and RSA and verified using gpgsm and Governikus Signer.

May 11 2020, 6:46 PM · gnupg (gpg23), Feature Request, S/MIME

May 8 2020

werner added a project to T4098: GpgSM: Add ECC support: gnupg (gpg23).
May 8 2020, 6:16 PM · gnupg (gpg23), Feature Request, S/MIME
werner renamed T4098: GpgSM: Add ECC support from GpgSM: Add ECC support (Option to create an X.509/ECDSA key) to GpgSM: Add ECC support.
May 8 2020, 6:15 PM · gnupg (gpg23), Feature Request, S/MIME
werner added a comment to T4098: GpgSM: Add ECC support.

Basic en- and decryption test against Governikus_Signer has now been done. Beware: I had to add a debug option to gpgsm to workaround non-compliance in algorithm support of Governikus; see the rG68b857df13c8a4e6cae5e3a29fd065bf90764547 for details.

May 8 2020, 6:14 PM · gnupg (gpg23), Feature Request, S/MIME
aheinecke claimed T4807: Mime Compatibility with Symantec PGP.

I'm not sure what to do here. The problem is that all users in clients without PGP/MIME Support will see the attachment names. That is why we use the names as they are.

May 8 2020, 3:27 PM · gpgol, Feature Request
aheinecke assigned T4930: Support --multifile --detach-sign to werner.
May 8 2020, 11:47 AM · Feature Request
aheinecke triaged T4930: Support --multifile --detach-sign as Wishlist priority.
May 8 2020, 11:47 AM · Feature Request

May 7 2020

werner created T4938: Support Signature Card V2.0 (NKS15).
May 7 2020, 8:18 AM · eIDAS, scd, Feature Request, S/MIME

May 4 2020

werner changed the status of T4920: Support ECDH in Libksba, a subtask of T4098: GpgSM: Add ECC support, from Open to Testing.
May 4 2020, 3:05 PM · gnupg (gpg23), Feature Request, S/MIME
werner changed the status of T4920: Support ECDH in Libksba from Open to Testing.

It works for me(tm).

May 4 2020, 3:05 PM · libksba, Feature Request, S/MIME

Apr 29 2020

ppalaga added a comment to T4930: Support --multifile --detach-sign.

That would be awesome, thanks!

Apr 29 2020, 6:26 PM · Feature Request
werner added a comment to T4930: Support --multifile --detach-sign.

API-wise this would be possible because right now gpg errors out with

Apr 29 2020, 11:55 AM · Feature Request
ppalaga updated the task description for T4930: Support --multifile --detach-sign.
Apr 29 2020, 10:29 AM · Feature Request
ppalaga set External Link to https://issues.apache.org/jira/browse/MGPG-82 on T4930: Support --multifile --detach-sign.
Apr 29 2020, 10:24 AM · Feature Request
ppalaga created T4930: Support --multifile --detach-sign.
Apr 29 2020, 10:20 AM · Feature Request

Apr 27 2020

werner changed the status of T4921: Support import of PKCS#12 encoded ECC private keys. from Open to Testing.
Apr 27 2020, 8:09 PM · gnupg22 (gnupg-2.2.42), backport, Feature Request, S/MIME
werner changed the status of T4921: Support import of PKCS#12 encoded ECC private keys., a subtask of T4098: GpgSM: Add ECC support, from Open to Testing.
Apr 27 2020, 8:09 PM · gnupg (gpg23), Feature Request, S/MIME
werner added a comment to T4921: Support import of PKCS#12 encoded ECC private keys..

Done for master

Apr 27 2020, 8:09 PM · gnupg22 (gnupg-2.2.42), backport, Feature Request, S/MIME

Apr 24 2020

werner created T4926: Add API to map a curve name to its canonical OID..
Apr 24 2020, 2:15 PM · Feature Request, libgcrypt

Apr 23 2020

asv added a comment to T4923: Compile Kleopatra with DEP/ASLR support.

Seems like this is applicable to other binaries as well:

Apr 23 2020, 4:15 PM · kleopatra, Feature Request
werner triaged T4923: Compile Kleopatra with DEP/ASLR support as Normal priority.
Apr 23 2020, 2:53 PM · kleopatra, Feature Request

Apr 22 2020

asv created T4923: Compile Kleopatra with DEP/ASLR support.
Apr 22 2020, 8:36 AM · kleopatra, Feature Request

Apr 21 2020

werner created T4921: Support import of PKCS#12 encoded ECC private keys..
Apr 21 2020, 5:01 PM · gnupg22 (gnupg-2.2.42), backport, Feature Request, S/MIME
werner created T4920: Support ECDH in Libksba.
Apr 21 2020, 2:33 PM · libksba, Feature Request, S/MIME

Apr 20 2020

BenM added a comment to T3505: Port GPGME's Python bindings to Windows.

On further thought, it's possible that something closer to what
Bernhard wants (and incidentally more along the lines of what I was
thinking of in some of our discussions just after the initial port)
might be achievable with Cython.

Apr 20 2020, 8:00 PM · Feature Request, gpgme, Python
werner added a comment to T3505: Port GPGME's Python bindings to Windows.

FWIW, GPGME is basically C90 and we only recently started to use C99 variadic macros - they are a cpp feature, though.

Apr 20 2020, 7:29 AM · Feature Request, gpgme, Python

Apr 19 2020

BenM added a comment to T3505: Port GPGME's Python bindings to Windows.

CFFI has no real means of generating the needed bindings on the fly
like SWIG does, except via its ABI methods, but those are inferior to
what SWIG does. It also can't handle all the ifdefs (or really any of
the ifdefs) in gpgme.h.

Apr 19 2020, 7:46 PM · Feature Request, gpgme, Python

Apr 17 2020

werner added a comment to T4098: GpgSM: Add ECC support.

I am working on the Telesec Signature Card v2. I will add encryption support to gpgsm.

Apr 17 2020, 6:03 PM · gnupg (gpg23), Feature Request, S/MIME

Apr 16 2020

werner closed T4917: Add AEAD support to --show-session-key as Invalid.

Nope, I was wrong.

Apr 16 2020, 9:19 AM · Feature Request, gnupg (gpg23)
werner created T4917: Add AEAD support to --show-session-key.
Apr 16 2020, 9:16 AM · Feature Request, gnupg (gpg23)

Apr 8 2020

johnmar added a comment to T4630: libgcrypt: POWER GHASH Vector Acceleration.

Hi @slandden.
Do you have any updates?

Apr 8 2020, 6:02 PM · Feature Request, libgcrypt

Apr 7 2020

werner created T4910: Allow to add a no-mail notation to user-ids.
Apr 7 2020, 8:38 AM · gnupg24, gnupg (gpg23), Feature Request

Apr 6 2020

gniibe changed the status of T4888: GpgSM: Support ECC key generation by gpgsm_genkey, a subtask of T4098: GpgSM: Add ECC support, from Open to Testing.
Apr 6 2020, 6:49 AM · gnupg (gpg23), Feature Request, S/MIME
gniibe changed the status of T4888: GpgSM: Support ECC key generation by gpgsm_genkey from Open to Testing.
Apr 6 2020, 6:49 AM · Restricted Project, Feature Request, S/MIME

Apr 2 2020

gniibe added a comment to T4864: New scdaemon command to watch device removal.

It runs like:

$ gpg-connect-agent "scd devinfo --watch" /bye
S DEVINFO_START
S DEVINFO_END
S DEVINFO_STATUS new
S DEVINFO_START
S DEVICE generic D276000124010200F517000000010000 openpgp
S DEVINFO_END
S DEVINFO_STATUS removal
S DEVINFO_START
S DEVINFO_END
OK
$ 
Apr 2 2020, 8:49 AM · Restricted Project, Feature Request, scd, Bug Report
gniibe changed the status of T4864: New scdaemon command to watch device removal from Open to Testing.

Push the change to master.

Apr 2 2020, 8:46 AM · Restricted Project, Feature Request, scd, Bug Report

Mar 31 2020

gniibe added a comment to T4888: GpgSM: Support ECC key generation by gpgsm_genkey.

genkey for Ed25519 works now with libksba in master.

Mar 31 2020, 8:59 AM · Restricted Project, Feature Request, S/MIME
gniibe added a comment to T4896: ksba: Ed25519 support.

For public key, it's done.

Mar 31 2020, 8:59 AM · Info Needed, libksba, Feature Request, S/MIME

Mar 30 2020

gniibe added a project to T4896: ksba: Ed25519 support: libksba.
Mar 30 2020, 7:55 AM · Info Needed, libksba, Feature Request, S/MIME
gniibe created T4896: ksba: Ed25519 support.
Mar 30 2020, 7:55 AM · Info Needed, libksba, Feature Request, S/MIME

Mar 29 2020

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Thanks for following up!

Mar 29 2020, 6:46 PM · gnupg (gpg23), Feature Request
werner added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

No, we always stated that the user id is a mandatory part of OpenPGP keyblocks and that non-compliant keyblocks are rejected. The only exception we made are for revocation signatures where we allow a standalone packet. That exception is done to allow typing in a printed out revocation signature.

Mar 29 2020, 6:30 PM · gnupg (gpg23), Feature Request
dkg updated subscribers of T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

To be clear: marking this ticket wontfix means (among other things) that it is the GnuPG project's upstream position that:

Mar 29 2020, 5:38 PM · gnupg (gpg23), Feature Request
werner closed T4393: GnuPG should always accept key updates even if the update does not contain UIDs as Wontfix.

With OpenPGP we made user ids mandatory to avoid problems we had with PGP2. I see no reason to revert this.

Mar 29 2020, 11:25 AM · gnupg (gpg23), Feature Request

Mar 28 2020

ilf added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

Nine months have passed since the patches for this problem have been available.

Mar 28 2020, 5:43 PM · gnupg (gpg23), Feature Request

Mar 27 2020

werner triaged T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation as Normal priority.

I recall that I talked with Stephan about it but things got lost.

Mar 27 2020, 7:12 PM · FIPS, libgcrypt, Feature Request