Page MenuHome GnuPG
Feed Advanced Search

Fri, Feb 13

werner added a comment to T7333: Allow gpg to auto-upload a new own key to LDAP servers.

Has now been backported to be released with 2.2.53

Fri, Feb 13, 2:55 PM · vsd34, gnupg26, gnupg22
werner moved T7333: Allow gpg to auto-upload a new own key to LDAP servers from Backlog to WIP on the vsd34 board.
Fri, Feb 13, 2:55 PM · vsd34, gnupg26, gnupg22
werner changed the status of T7333: Allow gpg to auto-upload a new own key to LDAP servers from Open to Testing.
Fri, Feb 13, 2:54 PM · vsd34, gnupg26, gnupg22
werner moved T7866: Allow separate LDAP keyserver for uploading from WIP to Done on the gnupg26 board.
Fri, Feb 13, 2:28 PM · gnupg22, vsd34, LDAP, Feature Request, gnupg26
werner moved T7866: Allow separate LDAP keyserver for uploading from Backlog to WiP on the gnupg22 board.
Fri, Feb 13, 2:28 PM · gnupg22, vsd34, LDAP, Feature Request, gnupg26
werner changed the status of T7866: Allow separate LDAP keyserver for uploading from Open to Testing.
Fri, Feb 13, 2:28 PM · gnupg22, vsd34, LDAP, Feature Request, gnupg26
gniibe added a comment to T7875: GnuPG: Deletion of kyber key fails.

Here is an attempt of mine this week:

diff --git a/g10/call-agent.c b/g10/call-agent.c
index 5e13a3e52..8949fad17 100644
--- a/g10/call-agent.c
+++ b/g10/call-agent.c
@@ -3290,13 +3290,14 @@ confirm_status_cb (void *opaque, const char *line)
    message.  If FORCE is true the agent is advised not to ask for
    confirmation. */
 gpg_error_t
-agent_delete_key (ctrl_t ctrl, const char *hexkeygrip, const char *desc,
+agent_delete_key (ctrl_t ctrl, const char *keygrip, const char *desc,
                   int force)
 {
   gpg_error_t err;
   char line[ASSUAN_LINELENGTH];
   struct default_inq_parm_s dfltparm;
   struct confirm_parm_s confirm_parm;
+  const char *keygrip2 = NULL;
Fri, Feb 13, 8:07 AM · Bug Report, PQC, gnupg26

Thu, Feb 12

werner lowered the priority of T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT` from Unbreak Now! to Normal.
Thu, Feb 12, 11:14 AM · gnupg26, CVE, TPM, Bug Report
gniibe added a comment to T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT`.

The fix causes a regression. Reported: https://lists.gnupg.org/pipermail/gnupg-devel/2026-February/036218.html

Thu, Feb 12, 2:49 AM · gnupg26, CVE, TPM, Bug Report
gniibe reopened T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT` as "Open".

This is not 2.5-only.

Thu, Feb 12, 2:48 AM · gnupg26, CVE, TPM, Bug Report

Mon, Feb 9

timegrid added a comment to T8092: GnuPG: Add algorithm info for all kyber choices on certificate generation.

Sorry for the ambiguity. The request was only about mentioning (bpX) for the first two choices, not to add more combinations.

Mon, Feb 9, 11:45 AM · Feature Request, PQC, gnupg26
werner triaged T8092: GnuPG: Add algorithm info for all kyber choices on certificate generation as Low priority.
Mon, Feb 9, 9:40 AM · Feature Request, PQC, gnupg26
werner added a comment to T8092: GnuPG: Add algorithm info for all kyber choices on certificate generation.

Although it is technicall possible to use all combinations, we should limit in the menu them to those as listed above. Too many algorithms pose an interop problem. Thus we provide brainpool because it is required in Germany and the two IETF curves for the general internet (for those who are playing mitigation against against physical experiments).

Mon, Feb 9, 9:40 AM · Feature Request, PQC, gnupg26

Fri, Feb 6

timegrid created T8092: GnuPG: Add algorithm info for all kyber choices on certificate generation.
Fri, Feb 6, 2:31 PM · Feature Request, PQC, gnupg26

Wed, Feb 4

ebo renamed T6152: Allow giving context to gpg-agent from Text for Import of S/MIME certificates to Allow giving context to gpg-agent.
Wed, Feb 4, 11:56 AM · gnupg26, Feature Request, S/MIME
ebo edited projects for T6152: Allow giving context to gpg-agent, added: gnupg26; removed gnupg, Restricted Project.
Wed, Feb 4, 11:53 AM · gnupg26, Feature Request, S/MIME
gniibe claimed T8052: GnuPG: First listing of secret keys is empty.

I found two issues in libgpg-error for spawning functions.

Wed, Feb 4, 7:21 AM · gpgrt, Bug Report, gpgagent, gpd5x, gnupg26
gniibe added a comment to T8065: gnupg self test hang: clean migration.

POSIX documentation never says that PSHARED=0 prevents sharing among processes. In my opinion, it still conforms to POSIX even when a PSHARED=0 semaphore can be shared between parent and child processes.

Wed, Feb 4, 1:29 AM · gpgrt, NetBSD, gnupg26, Bug Report

Tue, Feb 3

wiz added a comment to T8065: gnupg self test hang: clean migration.

I've tried the new patch in my environment, and it fixes the gnupg HEAD self tests as well. Thank you!

Tue, Feb 3, 10:51 AM · gpgrt, NetBSD, gnupg26, Bug Report
gniibe changed the status of T8065: gnupg self test hang: clean migration from Open to Testing.
Tue, Feb 3, 6:48 AM · gpgrt, NetBSD, gnupg26, Bug Report
gniibe added a project to T8065: gnupg self test hang: clean migration: gpgrt.

In tests/migrations, (unlike tests/openpgp and tests/cms), the tests do not prepare gpg-agent, but it is gpg which invokes gpg-agent if needed.
Because of that, on NetBSD (where POSIX semaphore has a different semantics), it hangs with gpg --list-secret-key, when gpg tries to spawn the gpg-agent process.
In the old code of 2.4, it simply ignore the npth_protect and npth_unprotect when calling fork to spawn a process.
New code in libgpg-error cares about npth_protect and npth_unprotect but it was not sufficient; We need to care about NetBSD's semantics. Child process should not call npth_protect. With shared semantics, child process's calling npth_protect affects to cause parent process: it hangs.

Tue, Feb 3, 6:48 AM · gpgrt, NetBSD, gnupg26, Bug Report
gniibe added a comment to T8065: gnupg self test hang: clean migration.

@wiz Thank you for your quick feedback.

Tue, Feb 3, 6:33 AM · gpgrt, NetBSD, gnupg26, Bug Report

Mon, Feb 2

wiz added a comment to T8065: gnupg self test hang: clean migration.

Thank you for the patch. I've tried it in my environment, and gnupg 987c6a398a9505399b2c25a775d4b625753bc962 passes all its self-tests for me now!

Mon, Feb 2, 8:06 PM · gpgrt, NetBSD, gnupg26, Bug Report
werner triaged T8078: GpgAgent: trustlist.txt still requires LF on the last line as Low priority.

Oh yeah, the mentioned patch is bogus because it assumes that fgets has already set the eof flag while reading the last line. This seems not to be the case.

Mon, Feb 2, 3:46 PM · Bug Report, gpgagent, gnupg26
timegrid created T8078: GpgAgent: trustlist.txt still requires LF on the last line.
Mon, Feb 2, 3:20 PM · Bug Report, gpgagent, gnupg26
werner triaged T8076: Kleopatra: Unable to completely delete key with secret subkeys and "offline" primary key as Normal priority.
Mon, Feb 2, 12:08 PM · gnupg26, gpd5x, kleopatra, Bug Report
gniibe added a comment to T8065: gnupg self test hang: clean migration.

Thank you for the log.

Mon, Feb 2, 8:14 AM · gpgrt, NetBSD, gnupg26, Bug Report

Sun, Feb 1

ametzler1 added a comment to T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT`.

CVE-2026-24882 has been assigned to this issue.

Sun, Feb 1, 4:45 PM · gnupg26, CVE, TPM, Bug Report

Fri, Jan 30

timegrid added a comment to T8052: GnuPG: First listing of secret keys is empty.

I added the gpgsm log output (same error as in the gpg log)

Fri, Jan 30, 11:25 AM · gpgrt, Bug Report, gpgagent, gpd5x, gnupg26
timegrid updated the task description for T8052: GnuPG: First listing of secret keys is empty.
Fri, Jan 30, 11:24 AM · gpgrt, Bug Report, gpgagent, gpd5x, gnupg26
timegrid closed T8053: GpgSM: `log-file` is ignored as Invalid.

Ah, thanks for the pointer, I did not expect gpgsm to behave differently here. Then it's probably intentional and I'll close this as invalid.

Fri, Jan 30, 11:18 AM · gpd5x, Bug Report, S/MIME, gnupg26
pl13 added a comment to T8053: GpgSM: `log-file` is ignored.

The gnupg manual (page 113) mentions:

Fri, Jan 30, 10:30 AM · gpd5x, Bug Report, S/MIME, gnupg26
wiz added a comment to T8065: gnupg self test hang: clean migration.

Thank you for looking at this.
I'm testing with gnupg git head as of today, please let me know if you prefer 2.5.17 instead.

Fri, Jan 30, 9:46 AM · gpgrt, NetBSD, gnupg26, Bug Report
gniibe claimed T8065: gnupg self test hang: clean migration.
Fri, Jan 30, 9:02 AM · gpgrt, NetBSD, gnupg26, Bug Report
gniibe added a comment to T8065: gnupg self test hang: clean migration.

Thank you for your report.

Fri, Jan 30, 9:00 AM · gpgrt, NetBSD, gnupg26, Bug Report

Thu, Jan 29

timegrid removed a project from T6545: Support CRL extension issuingDistributionPoint: Restricted Project.
Thu, Jan 29, 3:23 PM · workaround, gnupg26, libksba, Feature Request
werner closed T8054: Key expiration year during key creation only shown with 2 digits as Wontfix.

This string comes from the Windows API and thus it is a Windows bug. It maye take some decades until this get fixed but at least they have meanwhile sfxed the "Westeuropäische Zeit" zu the correct "Mitteleuropäische Zeit" - Modulo Umlaut problems.

Thu, Jan 29, 2:32 PM · gnupg26
wiz added a comment to T8065: gnupg self test hang: clean migration.

I bisected it and found the commit that introduced this test failure:

Thu, Jan 29, 2:07 PM · gpgrt, NetBSD, gnupg26, Bug Report
wiz added a comment to T8065: gnupg self test hang: clean migration.

In the same environment, 2.4.9 passes its self tests.
I've reverted the update in pkgsrc until this can be resolved.

Thu, Jan 29, 8:56 AM · gpgrt, NetBSD, gnupg26, Bug Report

Wed, Jan 28

wiz added a comment to T8065: gnupg self test hang: clean migration.

The previous pkgsrc version was 2.4.9. However, I've just tested 2.5.14 and saw the same behaviour (so I guess there is no point in testing 2.5.16).

Wed, Jan 28, 5:17 PM · gpgrt, NetBSD, gnupg26, Bug Report
werner added projects to T8065: gnupg self test hang: clean migration: gnupg26, NetBSD.

Do you remember wether you had the same problem also with 2.5.14 or 2.5.16? Or can you test with these versions? Which version of libgpg-error are you using?

Wed, Jan 28, 4:13 PM · gpgrt, NetBSD, gnupg26, Bug Report
werner added a comment to T8029: IPC error on batch import of secret kyber cert.

My actual plan is to rework the imp[ort/export of secret keys to gpg-agent. Right now gpg-agent has knowledge of OpenPGP for import/export. This is not good and the required conversion should be moved to a helper tools for easier testing and to have this out of the gpg-agent process. For Kyber we right now don't use any conversion mut store the secret keys in gpg-agent's native format. Thus the passphrase is not necessary. We need to figure out why we have this problem here.

Wed, Jan 28, 11:47 AM · gnupg26, Bug Report, gpd5x, kleopatra

Tue, Jan 27

werner closed T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT` as Resolved.
Tue, Jan 27, 5:18 PM · gnupg26, CVE, TPM, Bug Report
werner closed T8049: Null pointer dereference with overlong signature packet as Resolved.
Tue, Jan 27, 5:17 PM · segv, gnupg26, Bug Report
werner renamed T8049: Null pointer dereference with overlong signature packet from Security (internal) - Aisle Research report: Null pointer dereference with overlong signature packet to Null pointer dereference with overlong signature packet.
Tue, Jan 27, 5:16 PM · segv, gnupg26, Bug Report
werner changed the visibility for T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT`.
Tue, Jan 27, 5:12 PM · gnupg26, CVE, TPM, Bug Report
werner closed T8044: gpg-agent stack buffer overflow in pkdecrypt using KEM as Resolved.
Tue, Jan 27, 5:12 PM · CVE, gnupg26, gpgagent, Bug Report
ebo moved T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT` from Backlog to Done on the gnupg26 board.
Tue, Jan 27, 2:34 PM · gnupg26, CVE, TPM, Bug Report
ebo edited projects for T8045: Stack-based buffer overflow in TPM2 `PKDECRYPT`, added: gnupg26; removed gnupg.
Tue, Jan 27, 2:33 PM · gnupg26, CVE, TPM, Bug Report
ebo moved T8044: gpg-agent stack buffer overflow in pkdecrypt using KEM from Backlog to Done on the gnupg26 board.
Tue, Jan 27, 2:31 PM · CVE, gnupg26, gpgagent, Bug Report
ebo closed T7990: export-minimal unexpectedly omits expired key as Resolved.

Option works in Gpg4win-5.0.1 with GnuPG 2.5.17

Tue, Jan 27, 2:29 PM · gnupg26, Feature Request, Gentoo
ebo moved T8026: Kleopatra: Export of multiple S/MIME certificates only exports one from Done to gpd-5.0.1 on the gpd5x board.
Tue, Jan 27, 1:58 PM · gpd5x (gpd-5.0.1), gnupg26, Bug Report
ebo closed T8026: Kleopatra: Export of multiple S/MIME certificates only exports one as Resolved.
Tue, Jan 27, 1:54 PM · gpd5x (gpd-5.0.1), gnupg26, Bug Report
ebo moved T8026: Kleopatra: Export of multiple S/MIME certificates only exports one from WIP to Done on the gnupg26 board.

works in Gpg4win 5.0.1 with GnuPG 2.5.17

Tue, Jan 27, 1:52 PM · gpd5x (gpd-5.0.1), gnupg26, Bug Report

Mon, Jan 26

timegrid added a comment to T8052: GnuPG: First listing of secret keys is empty.

To reproduce the hang, a loop will suffice (usually happens within the first 15 times, once it needed 50 runs):

Mon, Jan 26, 11:39 AM · gpgrt, Bug Report, gpgagent, gpd5x, gnupg26
timegrid added a comment to T8053: GpgSM: `log-file` is ignored.

There's no other configuration, this happens with a clean gnupghome with one smime cert + root cert and the above gpgsm.conf (output on stdin/stderr):

Mon, Jan 26, 11:18 AM · gpd5x, Bug Report, S/MIME, gnupg26

Sun, Jan 25

werner added a comment to T8049: Null pointer dereference with overlong signature packet.

Reconsidering this all I don't think it makes any sense to distinguish between (-1) and GPG_ERR_INV_PACKET. We use (-1) for a too short read of the hashed or unhashed area (premature eof). INV_PACKET is for unknown versions, too much data (arbitrary limit), bad parameters, and underflow. Let's forget my previous comment and always use INV_PACKET.

Sun, Jan 25, 5:23 PM · segv, gnupg26, Bug Report

Fri, Jan 23

werner lowered the priority of T8049: Null pointer dereference with overlong signature packet from Unbreak Now! to Normal.
Fri, Jan 23, 9:18 PM · segv, gnupg26, Bug Report
werner added a comment to T8053: GpgSM: `log-file` is ignored.

Please run with --debug 0 which should show you which confiration files are read in which order. Is there anything in a common.conf file? A log-file statement tehre would overwrite the command line option.

Fri, Jan 23, 9:16 PM · gpd5x, Bug Report, S/MIME, gnupg26
ebo created T8054: Key expiration year during key creation only shown with 2 digits.
Fri, Jan 23, 3:48 PM · gnupg26
timegrid updated the task description for T8052: GnuPG: First listing of secret keys is empty.
Fri, Jan 23, 2:43 PM · gpgrt, Bug Report, gpgagent, gpd5x, gnupg26
timegrid created T8053: GpgSM: `log-file` is ignored.
Fri, Jan 23, 2:28 PM · gpd5x, Bug Report, S/MIME, gnupg26
timegrid added a project to T8052: GnuPG: First listing of secret keys is empty: Bug Report.
Fri, Jan 23, 2:22 PM · gpgrt, Bug Report, gpgagent, gpd5x, gnupg26
timegrid created T8052: GnuPG: First listing of secret keys is empty.
Fri, Jan 23, 2:14 PM · gpgrt, Bug Report, gpgagent, gpd5x, gnupg26
timegrid removed a project from T6545: Support CRL extension issuingDistributionPoint: gnupg22.
Fri, Jan 23, 11:49 AM · workaround, gnupg26, libksba, Feature Request
timegrid edited projects for T6436: Double pinentry on change password, added: gpd5x; removed gnupg22, Restricted Project.
Fri, Jan 23, 11:47 AM · gpd5x, gnupg26, Feature Request
timegrid changed the edit policy for T6677: GPGSM: Add support for cert extension 2.5.29.36 Policy Constraints.
Fri, Jan 23, 11:19 AM · Feature Request, gnupg26, S/MIME

Wed, Jan 21

werner shifted T8044: gpg-agent stack buffer overflow in pkdecrypt using KEM from the Restricted Space space to the S1 Public space.
Wed, Jan 21, 12:23 PM · CVE, gnupg26, gpgagent, Bug Report
ebo raised the priority of T8019: gpg does not print warning about untrusted key when verifying signatures made by expired (and untrusted) keys from Normal to High.

setting to High as we need this for T7790

Wed, Jan 21, 11:40 AM · Feature Request, S/MIME, OpenPGP, gnupg26
timegrid added a comment to T8048: Keyboxd: S/MIME certificate is imported on ldap search.

The "ca" root cert is not on the ldap, if that matters

Wed, Jan 21, 10:23 AM · keyboxd, Bug Report, gnupg26, S/MIME, LDAP, gpd5x
werner changed the status of T8044: gpg-agent stack buffer overflow in pkdecrypt using KEM from Open to Testing.
Wed, Jan 21, 10:20 AM · CVE, gnupg26, gpgagent, Bug Report
timegrid renamed T8048: Keyboxd: S/MIME certificate is imported on ldap search from GnuPG: S/MIME certificate is imported on ldap search to Keyboxd: S/MIME certificate is imported on ldap search.
Wed, Jan 21, 10:14 AM · keyboxd, Bug Report, gnupg26, S/MIME, LDAP, gpd5x
timegrid added a comment to T8048: Keyboxd: S/MIME certificate is imported on ldap search.

some other certificates, but I guess those are from other tests

Wed, Jan 21, 10:08 AM · keyboxd, Bug Report, gnupg26, S/MIME, LDAP, gpd5x
timegrid added a project to T8048: Keyboxd: S/MIME certificate is imported on ldap search: Bug Report.
Wed, Jan 21, 10:00 AM · keyboxd, Bug Report, gnupg26, S/MIME, LDAP, gpd5x
timegrid renamed T8048: Keyboxd: S/MIME certificate is imported on ldap search from Kleopatra: S/MIME certificate is imported on ldap search to GnuPG: S/MIME certificate is imported on ldap search.
Wed, Jan 21, 10:00 AM · keyboxd, Bug Report, gnupg26, S/MIME, LDAP, gpd5x

Tue, Jan 20

werner claimed T8044: gpg-agent stack buffer overflow in pkdecrypt using KEM.
Tue, Jan 20, 2:44 PM · CVE, gnupg26, gpgagent, Bug Report
werner added a comment to T8044: gpg-agent stack buffer overflow in pkdecrypt using KEM.

I have this fix committed to my working directory:

Tue, Jan 20, 12:54 PM · CVE, gnupg26, gpgagent, Bug Report
werner added a project to T8044: gpg-agent stack buffer overflow in pkdecrypt using KEM: CVE.

We have no CVE yet. However, CVE is also a good tag for security bugs,

Tue, Jan 20, 12:18 PM · CVE, gnupg26, gpgagent, Bug Report
werner renamed T8044: gpg-agent stack buffer overflow in pkdecrypt using KEM from Security (internal) - gpg-agent stack buffer overflow to gpg-agent stack buffer overflow in pkdecrypt using KEM.
Tue, Jan 20, 12:10 PM · CVE, gnupg26, gpgagent, Bug Report

Mon, Jan 19

thesamesam added a comment to T7990: export-minimal unexpectedly omits expired key.

It works well for us. Thanks again.

Mon, Jan 19, 7:05 AM · gnupg26, Feature Request, Gentoo

Jan 15 2026

ikloecker renamed T8029: IPC error on batch import of secret kyber cert from Kleopatra: IPC error on import of secret kyber cert to IPC error on batch import of secret kyber cert.
Jan 15 2026, 10:38 AM · gnupg26, Bug Report, gpd5x, kleopatra

Jan 13 2026

ikloecker added a project to T8029: IPC error on batch import of secret kyber cert: gnupg26.

@werner: gpg fails to batch import secret Kyber keys:

$ GNUPGHOME=/home/ingo/dev/g10/.gnupghomes/empty gpg --batch --import --verbose ~/dev/g10/testdata/exported/Kyber768_0xDD89C34EF2B69576_SECRET.asc 
gpg: WARNING: unsafe permissions on homedir '/home/ingo/dev/g10/.gnupghomes/empty'
gpg: enabled compatibility flags:
gpg: sec  brainpoolP256r1/DD89C34EF2B69576 2024-11-14  Kyber768 <kyber768@example.net>
gpg: using pgp trust model
gpg: key DD89C34EF2B69576: public key "Kyber768 <kyber768@example.net>" imported
gpg: key DD89C34EF2B69576/DD89C34EF2B69576: secret key imported
gpg: key DD89C34EF2B69576/D07DD3BF9F1AAF4F: error sending to agent: IPC parameter error
gpg: error reading '/home/ingo/dev/g10/testdata/exported/Kyber768_0xDD89C34EF2B69576_SECRET.asc': IPC parameter error
gpg: import from '/home/ingo/dev/g10/testdata/exported/Kyber768_0xDD89C34EF2B69576_SECRET.asc' failed: IPC parameter error
gpg: Total number processed: 0
gpg:               imported: 1
gpg:       secret keys read: 1
Jan 13 2026, 2:27 PM · gnupg26, Bug Report, gpd5x, kleopatra
ebo edited projects for T7757: Kleopatra: Error "no data" on decryption of tar.gpg archive, added: gpd5x (gpd-5.0.0); removed gpd5x.
Jan 13 2026, 12:48 PM · gpd5x (gpd-5.0.0), gnupg26, kleopatra
ebo edited projects for T1825: Add a re-encrypt to additional key, added: gpd5x (gpd-5.0.0); removed gpd5x.
Jan 13 2026, 12:46 PM · gpd5x (gpd-5.0.0), gnupg26, Feature Request
ebo edited projects for T7709: Decryption with ECC smartcard keys broken, added: gpd5x (gpd-5.0.0); removed gpd5x.
Jan 13 2026, 12:45 PM · gpd5x (gpd-5.0.0), gnupg26, Bug Report
ebo edited projects for T7730: gpg: retrieve a certificate from an LDAP server before sending it to the LDAP server, added: gpd5x (gpd-5.0.0); removed gpd5x.
Jan 13 2026, 12:45 PM · gpd5x (gpd-5.0.0), gnupg22 (gnupg-2.2.52), gnupg26, Feature Request
ebo edited projects for T7759: Kleopatra: Notepad encryption with S/MIME fails, added: gpd5x (gpd-5.0.0); removed gpd5x.
Jan 13 2026, 12:45 PM · gpd5x (gpd-5.0.0), gnupg26, gpgme, kleopatra
ebo edited projects for T7855: keybox/keydb locking issue in 2.6 , added: gpd5x (gpd-5.0.0); removed gpd5x.
Jan 13 2026, 12:45 PM · gpd5x (gpd-5.0.0), gnupg26
ebo edited projects for T7983: gpg: the validity of a secret key is changed by making a certification with it, added: gpd5x (gpd-5.0.0); removed gpd5x.
Jan 13 2026, 12:45 PM · gpd5x (gpd-5.0.0), keyboxd, Bug Report, gnupg26

Jan 12 2026

werner changed the status of T8026: Kleopatra: Export of multiple S/MIME certificates only exports one from Open to Testing.
Jan 12 2026, 4:51 PM · gpd5x (gpd-5.0.1), gnupg26, Bug Report
werner added a comment to T8026: Kleopatra: Export of multiple S/MIME certificates only exports one.

Thanks Eva and Ingo. It seems 2.5.17 is not too far away.

Jan 12 2026, 4:28 PM · gpd5x (gpd-5.0.1), gnupg26, Bug Report
ikloecker removed a project from T8026: Kleopatra: Export of multiple S/MIME certificates only exports one: kleopatra.

I can reproduce this on the command line:

C:\Users\g10code>"c:\Program Files\GnuPG\bin\gpgsm.exe" --export --armor 579BAF3DF16AD462457BCC0897ADBC143D76EA7B 5A2B80F98F518D50891B1F0C7C6131AD107F9938 DB625D2BBBB5A3FD985C0233249B03090E85D402
Issuer ...: /CN=CA IVBB Deutsche Telekom AG 20/OU=Bund/O=PKI-1-Verwaltung/C=DE
Serial ...: 02195D190EBE34
Subject ..: /CN=iOS Test-Smartcard iostest01.sc/OU=BSI/O=Bund/C=DE/SerialNumber=2
    aka ..: iostest01.sc@bsi.bund.de
Keygrip ..: 527CE32FD0552D18479442EF90DD5E434C036329
Jan 12 2026, 3:36 PM · gpd5x (gpd-5.0.1), gnupg26, Bug Report
ikloecker added a project to T8026: Kleopatra: Export of multiple S/MIME certificates only exports one: gnupg26.

I can reproduce the issue only (!!!) with keyboxd (on Windows).

Jan 12 2026, 3:25 PM · gpd5x (gpd-5.0.1), gnupg26, Bug Report

Jan 9 2026

werner moved T7866: Allow separate LDAP keyserver for uploading from QA to WIP on the gnupg26 board.
Jan 9 2026, 3:50 PM · gnupg22, vsd34, LDAP, Feature Request, gnupg26
werner changed the status of T7990: export-minimal unexpectedly omits expired key from Open to Testing.
Jan 9 2026, 3:43 PM · gnupg26, Feature Request, Gentoo
werner added a comment to T7990: export-minimal unexpectedly omits expired key.

So w/o the new option we have:

Jan 9 2026, 3:11 PM · gnupg26, Feature Request, Gentoo
werner triaged T7990: export-minimal unexpectedly omits expired key as High priority.
Jan 9 2026, 2:47 PM · gnupg26, Feature Request, Gentoo
timegrid added a comment to T7866: Allow separate LDAP keyserver for uploading.

The behaviour might have changed a bit because of the ldap: prefix i use now, or i have missed this case the last time:
Given some cert on the "download" server, I can find it, if dirmngr.conf contains only the "download" server, or if the "download" server is listed first:

Jan 9 2026, 2:17 PM · gnupg22, vsd34, LDAP, Feature Request, gnupg26
ebo added a project to T7804: de-vs compliance not shown if also password encrypted: test on hold.

testing with 2.5/2.6 will wait for special build

Jan 9 2026, 1:55 PM · test on hold, gnupg22 (gnupg-2.2.49), vsd33 (vsd-3.3.3), Bug Report, vsd, gnupg26
werner closed T7663: Certificated signed using SHA-1 isn't trusted, but needs --force-sign-key to re-sign. as Resolved.
Jan 9 2026, 1:42 PM · gnupg26, Feature Request