Page MenuHome GnuPG
Feed Advanced Search

Sep 18 2017

werner edited projects for T3305: GPGSM should support default-new-key-algo like GnuPG, added: gnupg (gpg23); removed gnupg (gpg22).
Sep 18 2017, 4:28 PM · gnupg24, gnupg (gpg23), S/MIME

Aug 24 2017

werner triaged T3348: gpgsm: should default to --disable-crl-checks as Normal priority.
Aug 24 2017, 5:23 PM · gpgme, gnupg, S/MIME

Aug 23 2017

werner added a project to T3348: gpgsm: should default to --disable-crl-checks: gpgme.

I would suggest that MUAs who care about privacy do no use S/MIME at all or at least direct GPGME to not consider CRLs during signature verification. We don't have such a feature in GPGME right now but I think that is the right place to add it. X.509 is way to complicated to avoid meta data leaks.

Aug 23 2017, 10:59 AM · gpgme, gnupg, S/MIME

Aug 17 2017

marcus added a project to T3348: gpgsm: should default to --disable-crl-checks: gnupg.
Aug 17 2017, 3:03 PM · gpgme, gnupg, S/MIME

Aug 16 2017

dkg added a comment to T3348: gpgsm: should default to --disable-crl-checks.

i think it's strictly worse, even when the certificates are "trusted" in sense (1) -- with OpenPGP keyserver lookups, at least it is the client who decides which keyserver to use, on what protocol, to look up the given issuer fingerprint.

Aug 16 2017, 10:33 PM · gpgme, gnupg, S/MIME

Aug 15 2017

marcus added a comment to T3348: gpgsm: should default to --disable-crl-checks.

My comment was only in response to this:

Aug 15 2017, 5:53 PM · gpgme, gnupg, S/MIME
dkg added a comment to T3348: gpgsm: should default to --disable-crl-checks.

I see at least two different kinds of "trust" here.

Aug 15 2017, 5:50 PM · gpgme, gnupg, S/MIME
marcus added a comment to T3348: gpgsm: should default to --disable-crl-checks.

If the certificate is signed by a trusted root CA, doesn't that mean that we at least trust the URLs in the certificate chain for CRL and OCSP access?

Aug 15 2017, 5:40 PM · gpgme, gnupg, S/MIME
dkg added a comment to T3348: gpgsm: should default to --disable-crl-checks.

Making matters worse, i note that some CRLs, like those issued by MIT's Lincoln Lab are quick and easy to fetch over the Internet directly, but hang or timeout when fetched via Tor.

Aug 15 2017, 1:38 AM · gpgme, gnupg, S/MIME
bremner added a comment to T3348: gpgsm: should default to --disable-crl-checks.

Debian Bug 842291 shows some performance impact of the CRL checks (as well as the potential for privacy problems).

Aug 15 2017, 1:29 AM · gpgme, gnupg, S/MIME

Aug 14 2017

dkg created T3348: gpgsm: should default to --disable-crl-checks in the S1 Public space.
Aug 14 2017, 11:14 PM · gpgme, gnupg, S/MIME

Jul 27 2017

werner triaged T3305: GPGSM should support default-new-key-algo like GnuPG as Normal priority.
Jul 27 2017, 12:29 PM · gnupg24, gnupg (gpg23), S/MIME
aheinecke created T3305: GPGSM should support default-new-key-algo like GnuPG.
Jul 27 2017, 10:45 AM · gnupg24, gnupg (gpg23), S/MIME
werner added a project to T2313: gpg --import of secret keys prompts for passwords in 2.1: S/MIME.

Well, iff we implement that for gpg we also need to implement it for gpgsm.

Jul 27 2017, 9:41 AM · S/MIME, Feature Request, Stalled, gnupg, OpenPGP

Jul 17 2017

marcus added a comment to T1457: Decryption of msg encrypted to expired smime certificate fails if local-user is set.

I don't know if decryption method was changed, but at least the "can't sign using" message appears to be unchanged yet (from looking at the source code).

Jul 17 2017, 2:38 PM · Bug Report, gnupg, S/MIME

May 8 2017

werner closed T1259: pinentry should show fingerprint if certify a OpenPGP certificate as Wontfix.

7 years old and meanwhile Kleopatra has been reworked. Further showing two fingerprint (for the signing and the too be signed key) is confusing. In particular because the passphrase for the signing key is usually cached.

May 8 2017, 2:34 PM · gnupg, S/MIME, Feature Request

Apr 4 2017

kai merged T1861: gpgsm does not handle certificates with ambiguous name correctly into T1644: Do not expect KeyIDs to be unique.
Apr 4 2017, 2:57 PM · gnupg (gpg22), S/MIME, Bug Report
kai merged task T1861: gpgsm does not handle certificates with ambiguous name correctly into T1644: Do not expect KeyIDs to be unique.
Apr 4 2017, 2:57 PM · Duplicate, Bug Report, gnupg, gnupg (gpg20), S/MIME

Apr 3 2017

werner closed T2230: gpgsm decryption with smartcard fails with "Invalid session key" as Resolved.

we are now at 2.1.20 - time to mark this one as resolved.

Apr 3 2017, 10:51 PM · Restricted Project, gnupg, S/MIME, scd, Bug Report

Mar 30 2017

admin created S/MIME.
Mar 30 2017, 6:42 PM

Feb 22 2017

aheinecke set Version to master on T2972: GPGSM: Chain too long on cross signed certificate.
Feb 22 2017, 3:06 PM · Bug Report, gnupg, KDE, S/MIME
aheinecke added a comment to T2972: GPGSM: Chain too long on cross signed certificate.

Feb 22 2017, 3:06 PM · Bug Report, gnupg, KDE, S/MIME
aheinecke set External Link to https://bugs.kde.org/show_bug.cgi?id=376563 on T2972: GPGSM: Chain too long on cross signed certificate.
Feb 22 2017, 3:06 PM · Bug Report, gnupg, KDE, S/MIME
aheinecke added projects to T2972: GPGSM: Chain too long on cross signed certificate: S/MIME, KDE, gnupg, Bug Report.
Feb 22 2017, 3:06 PM · Bug Report, gnupg, KDE, S/MIME

Jan 6 2017

werner removed a project from T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo: Unreleased.
Jan 6 2017, 5:30 PM · gnupg, Bug Report, S/MIME

Nov 29 2016

werner added a comment to T2230: gpgsm decryption with smartcard fails with "Invalid session key".

Yeah, lets do that. Commit 8489b12 to go into 2.1.17. Thanks.

Nov 29 2016, 7:51 PM · Restricted Project, gnupg, S/MIME, scd, Bug Report
werner added a project to T2230: gpgsm decryption with smartcard fails with "Invalid session key": Restricted Project.
Nov 29 2016, 7:51 PM · Restricted Project, gnupg, S/MIME, scd, Bug Report
lorenz added a comment to T2230: gpgsm decryption with smartcard fails with "Invalid session key".

What about putting in the suggested patch as an intermediate step towards a full
solution?

Nov 29 2016, 4:58 PM · Restricted Project, gnupg, S/MIME, scd, Bug Report

Sep 28 2016

werner added a project to T2110: Gpgsm 2.1 external key search gives duplicated results: S/MIME.
Sep 28 2016, 9:46 AM · gnupg (gpg22), S/MIME, Bug Report, gpg4win, Windows, Windows 32

Jul 31 2016

perske added a comment to T1644: Do not expect KeyIDs to be unique.

D198: 866_gnupg-2.1.14.diff

Jul 31 2016, 10:00 PM · gnupg (gpg22), S/MIME, Bug Report
perske added a comment to T1644: Do not expect KeyIDs to be unique.

With T1590 irrelevant, issues 1862, 1970, and 2336 resolved (very special
thanks to everyone who helped in fixing them!), this is the only problem left in
version 2.1.14 that forces me to use a patched version of gpgsm for my webmailer.

My patch from 2014-04-30 works, but by mistake ("if (cmp < 0)" in place of "if
(cmp > 0)" it selects not the newest but the oldest one of the ambiguous
certificates what is bad in the DFN PKI because an older one of the certificates
is revoked, so I attach a new patch against 2.1.14.

Jul 31 2016, 10:00 PM · gnupg (gpg22), S/MIME, Bug Report

Jun 15 2016

werner added a project to T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo: Unreleased.
Jun 15 2016, 10:15 PM · gnupg, Bug Report, S/MIME
werner closed T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo as Resolved.
Jun 15 2016, 10:15 PM · gnupg, Bug Report, S/MIME
werner removed a project from T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo: Restricted Project.
Jun 15 2016, 10:15 PM · gnupg, Bug Report, S/MIME

Jun 14 2016

TARehman added a comment to T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo.

Ah, I see. The GUI interface affects the S/MIME algorithm, not the general
one. I don't know why I didn't put that together sooner. Well, I'm glad that
it revealed the minor bug anyway.

Jun 14 2016, 4:12 PM · gnupg, Bug Report, S/MIME
werner added a project to T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo: S/MIME.
Jun 14 2016, 4:07 PM · gnupg, Bug Report, S/MIME

May 13 2016

lorenz added a comment to T2230: gpgsm decryption with smartcard fails with "Invalid session key".

Anything else I can do to help?

May 13 2016, 10:12 AM · Restricted Project, gnupg, S/MIME, scd, Bug Report

Feb 24 2016

lorenz added a comment to T2230: gpgsm decryption with smartcard fails with "Invalid session key".

For what it's worth, with the following trivial patch the decryption works:

diff --git a/sm/decrypt.c b/sm/decrypt.c
index a560272..aa6e874 100644

  • a/sm/decrypt.c

+++ b/sm/decrypt.c
@@ -74,9 +74,9 @@ prepare_decryption (ctrl_t ctrl, const char *hexkeygrip, const
char *desc,

    log_printhex ("pkcs1 encoded session key:", seskey, seskeylen);

  n=0;
  • if (seskeylen == 24)

+ if (seskeylen == 24 || seskeylen == 16)

{
  • /* Smells like a 3-des key. This might happen because a SC has

+ /* Smells like a 3-des or AES key. This might happen because a SC has

          already done the unpacking. */
     }
   else

I am not sure this is a good solution, though, it is probably better to somehow
pass along the information whether the padding is already stripped or not.

Kind regards,

Lorenz
Feb 24 2016, 4:05 PM · Restricted Project, gnupg, S/MIME, scd, Bug Report

Jan 29 2016

lorenz added a comment to T2230: gpgsm decryption with smartcard fails with "Invalid session key".

This is likey due to the card already decoding the pkcs#1 - we need to look
closer at this use case.

For reference, I have a OpenPGP v2.0 card from "ZeitControl".

I think the card will always remove the encoding internally and only return the
plaintext, as far as I can tell from
http://g10code.com/docs/openpgp-card-2.0.pdf, Section 7.2.9

Jan 29 2016, 10:31 AM · Restricted Project, gnupg, S/MIME, scd, Bug Report
werner added a project to T2230: gpgsm decryption with smartcard fails with "Invalid session key": S/MIME.
Jan 29 2016, 9:37 AM · Restricted Project, gnupg, S/MIME, scd, Bug Report

Sep 21 2015

werner removed a project from T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256: Restricted Project.
Sep 21 2015, 8:55 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME
werner closed T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256 as Resolved.
Sep 21 2015, 8:55 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME

Sep 8 2015

werner added a comment to T2091: allow s/mime encryption without issuer certificates present.

This should be something similar to gpg --always-trust

Sep 8 2015, 8:51 AM · gnupg, S/MIME, Feature Request
werner added projects to T2091: allow s/mime encryption without issuer certificates present: S/MIME, gnupg.
Sep 8 2015, 8:51 AM · gnupg, S/MIME, Feature Request

Aug 31 2015

aheinecke closed T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating as Resolved.
Aug 31 2015, 9:03 AM · gnupg, Bug Report, S/MIME, dirmngr
aheinecke removed a project from T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating: Restricted Project.
Aug 31 2015, 9:03 AM · gnupg, Bug Report, S/MIME, dirmngr
aheinecke added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

yes there are no remaining problems that I can see here.

Thanks -> resolved.

Aug 31 2015, 9:03 AM · gnupg, Bug Report, S/MIME, dirmngr

Aug 30 2015

werner added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

aheinecke: Did you had a chance to test this with 2.1.7 or master?

Aug 30 2015, 10:15 PM · gnupg, Bug Report, S/MIME, dirmngr

Aug 28 2015

aheinecke closed T1921: Duplicated certificates in gpgsm pubring (2.1) as Resolved.
Aug 28 2015, 11:04 PM · Bug Report, gnupg, dirmngr, S/MIME
aheinecke removed a project from T1921: Duplicated certificates in gpgsm pubring (2.1): Restricted Project.
Aug 28 2015, 11:04 PM · Bug Report, gnupg, dirmngr, S/MIME

Jun 25 2015

werner added a comment to T1921: Duplicated certificates in gpgsm pubring (2.1).

Pushed as 5e1a844. Thanks.

Jun 25 2015, 1:07 PM · Bug Report, gnupg, dirmngr, S/MIME
werner added a project to T1921: Duplicated certificates in gpgsm pubring (2.1): Restricted Project.
Jun 25 2015, 1:07 PM · Bug Report, gnupg, dirmngr, S/MIME

Jun 24 2015

aheinecke added a comment to T1921: Duplicated certificates in gpgsm pubring (2.1).

Ok now I found kbxutil and learned about ephemeral certificates (Yep reading
helps) ;-)

After the first import kbxutil lists the Root certificate three times.
Twice with ephemeral flags, once without. So gpgsm -k shows it only once. But
kbxutil --find-dups already lists those duplicates.

fpr=11:B9:1B:31:EE:09:E0:84:4D:25:4E:58:7A:65:CE:51:84:F3:6B:70 recno=5 7 8
fpr=98:2D:D4:1D:BE:91:EE:72:B3:B8:43:33:F2:21:F7:74:64:39:08:7E recno=2 4 6

Now after the verify gpgsm takes the first of those certificates and unsets the
ephemeral flag as it was used as part of a complete trustchain. (sm/certchain.c:

If the first certificate was ephemeral we now have two certificates that are not
ephemeral but are the same and gpgsm -k shows both.

My solution is to check in keydb_store_cert for ephemeral certificates and
instead of inserting those again without the ephemeral flag to remove the
ephemeral flag of the existing certificate.

It's still unclear to me though why there were three certificates (Two ephemeral
and one normal) I would have expected one ephemeral and one normal certificate.

Patch attached.

Jun 24 2015, 7:09 PM · Bug Report, gnupg, dirmngr, S/MIME
aheinecke added a comment to T1921: Duplicated certificates in gpgsm pubring (2.1).

D287: 648_0001-sm-Fix-cert-storage-for-ephemeral-certs.patch

Jun 24 2015, 7:09 PM · Bug Report, gnupg, dirmngr, S/MIME

Jun 22 2015

aheinecke reassigned T1921: Duplicated certificates in gpgsm pubring (2.1) from aheinecke to werner.
Jun 22 2015, 2:52 PM · Bug Report, gnupg, dirmngr, S/MIME
aheinecke added a comment to T1921: Duplicated certificates in gpgsm pubring (2.1).

I've tested this again and again the problem was no longer visible.

So I ran the following script for some time:

    export GNUPGHOME=$(mktemp -d)
    echo 11B91B31EE09E0844D254E587A65CE5184F36B70 S > $GNUPGHOME/trustlist.txt
    echo disable-crl-checks > $GNUPGHOME/gpgsm.conf
    gpgsm --import aheinecke.der > /dev/null 2>&1
    gpgsm --verify testsig > /dev/null 2>&1
    if [ $(gpgsm -k | grep 0x84F36B70 | wc -l) = "2" ]; then
        echo bug >> bugs
        echo bug
    else
        echo nobug >> nobugs
        echo nobug
    fi
    rm -r "$GNUPGHOME"

This resulted in 85 "bug" and 31 "nobug" entries. Entries were also always in a
row. Like 10 "nobug" followed by 30 "bug" situations and then again 5 "nobug".

Probably related to system I/O.

Werner do you need me to provide more information here or can you reproduce this?

Jun 22 2015, 2:52 PM · Bug Report, gnupg, dirmngr, S/MIME

Jun 18 2015

werner added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

The last fix was wrong and the reaper thread closed a reader object which was
still used by another thread. Fixed with commit c971983:

I assumed that the log_fd also has a reader object but that reader
object is used for stdout and needs to be closed by the consumer.

The real bug with the non-released ldap_wrapper control objects was
that when looping over distribution points we did not closed the used
reader object before the next iteration.  Now, the test case had more
than one DP and thus we lost one reader object.
Jun 18 2015, 1:40 PM · gnupg, Bug Report, S/MIME, dirmngr
aheinecke added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

amd64
libgcrypt 1.6.2
libksba 1.3.4-beta1

Btw. If I roll back your commit the crashes no longer happen.

As an additional note. From checking why dirmngr takes so long in my setup I
know that I have several certificates in my keyring where the CRL is not
available. Maybe thats part of the problem.

Jun 18 2015, 11:31 AM · gnupg, Bug Report, S/MIME, dirmngr
werner added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

x86 or amd64 ?
libgcrypt version?
libksba version?

Jun 18 2015, 10:48 AM · gnupg, Bug Report, S/MIME, dirmngr

Jun 17 2015

aheinecke added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

In valgrind it did not crash. The keylisting exited normally. But showed several
errors.

Attached is the valigrind log.

Jun 17 2015, 12:57 PM · gnupg, Bug Report, S/MIME, dirmngr
aheinecke added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

Jun 17 2015, 12:57 PM · gnupg, Bug Report, S/MIME, dirmngr
werner added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

Can you start dirmngr under valgrind?

gpgconf --kill dirmngr
valgrind --log-file=vg.log dirmngr --daemon --homedir /my/gnupg/home/dir

Jun 17 2015, 12:32 PM · gnupg, Bug Report, S/MIME, dirmngr
aheinecke added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

I've compiled current master and it works for the testcase. But when I start
kleopatra and it runs the keylist/verify dirmngr now crashes.

Can be triggered with gpgme: run-keylist --validate --cms

It crashes at different points but it never gets through all my certificates.

An example of the debug output that is collected before it crashes (differs
between crashes):

2015-06-16 19:09:15 dirmngr[9303.1] no CRL available for issuer id
18F071EAAC08885C9434A7DE1DB3AFC30F27DD32
2015-06-16 19:09:15 dirmngr[9303.1] DBG: chan_1 -> INQUIRE SENDCERT
2015-06-16 19:09:15 dirmngr[9303.1] DBG: chan_1 <- [ 44 20 30 82 04 7d 30 82 03
65 a0 03 02 01 02 02 ...(982 byte(s) skipped) ]
2015-06-16 19:09:15 dirmngr[9303.1] DBG: chan_1 <- [ 44 20 14 34 6d f5 07 c2 04
86 4a ba a1 71 50 b0 ...(187 byte(s) skipped) ]
2015-06-16 19:09:15 dirmngr[9303.1] DBG: chan_1 <- END
2015-06-16 19:09:15 dirmngr[9303.1] checking distribution points
2015-06-16 19:09:15 dirmngr[9303.1] no distribution point - trying issuer name
2015-06-16 19:09:15 dirmngr[9303.1] fetching CRL from default location
2015-06-16 19:09:15 dirmngr[9303.1] ldap wrapper 10199 started (reader
0x00007f6a580337a0)
2015-06-16 19:09:15 dirmngr[9303.0] ldap wrapper 10198 ready: exitcode=1
2015-06-16 19:09:15 dirmngr[9303.0] ldap worker stati:
2015-06-16 19:09:15 dirmngr[9303.0] c=0x00007f6a58033740 pid=10199/10199
rdr=0x00007f6a580337a0 ctrl=0x00007f6a580008c0/1 la=1434474555 rdy=0
2015-06-16 19:09:15 dirmngr[9303.0] c=0x00007f6a58022520 pid=-1/10198
rdr=0x0000000000000000 ctrl=0x0000000000000000/0 la=1434474554 rdy=1
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10199]: processing url 'ldap://'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10199]: host
'directory.verisign.com'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10199]: port 389
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10198]: processing url 'ldap://'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10198]: host
'directory.verisign.com'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10198]: port 389
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10199]: DN
'1.2.840.113549.1.9.1=#4865696E65636B656E40676D61696C2E636F6D,CN=Common
Name,ST=Some-State,C=DE'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10199]: filter
'objectClass=*'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10199]: attr
'certificateRevocationList'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10198]: DN
'1.2.840.113549.1.9.1=#4865696E65636B656E40676D61696C2E636F6D,CN=Common
Name,ST=Some-State,C=DE'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10198]: filter
'objectClass=*'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10198]: attr
'certificateRevocationList'
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10198]: searching 'ldap://'
failed: No such object
2015-06-16 19:09:15 dirmngr[9303.0] ldap worker stati:
2015-06-16 19:09:15 dirmngr[9303.0] c=0x00007f6a58033740 pid=10199/10199
rdr=0x00007f6a580337a0 ctrl=0x00007f6a580008c0/1 la=1434474555 rdy=0
2015-06-16 19:09:15 dirmngr[9303.0] c=0x00007f6a58022520 pid=-1/10198
rdr=0x0000000000000000 ctrl=0x0000000000000000/0 la=1434474555 rdy=1
2015-06-16 19:09:15 dirmngr[9303.0] dirmngr_ldap[10199]: searching 'ldap://'
failed: No such object
2015-06-16 19:09:15 dirmngr[9303.0] ldap wrapper 10199 ready: exitcode=1
2015-06-16 19:09:15 dirmngr[9303.0] ldap worker stati:
2015-06-16 19:09:15 dirmngr[9303.0] c=0x00007f6a58033740 pid=-1/10199
rdr=0x0000000000000000 ctrl=0x00007f6a580008c0/1 la=1434474555 rdy=1

Backtrace for this log (also differs):

#0 0x00007f6a69109cc9 in GI_raise (sig=sig@entry=6) at
../nptl/sysdeps/unix/sysv/linux/raise.c:56
#1 0x00007f6a6910d0d8 in
GI_abort () at abort.c:89
#2 0x00007f6a69146394 in __libc_message (do_abort=do_abort@entry=1,

fmt=fmt@entry=0x7f6a69254b28 "*** Error in `%s': %s: 0x%s ***\n") at

../sysdeps/posix/libc_fatal.c:175
#3 0x00007f6a6915266e in malloc_printerr (ptr=<optimized out>,
str=0x7f6a69254cf0 "double free or corruption (fasttop)", action=1)

at malloc.c:4996

#4 _int_free (av=<optimized out>, p=<optimized out>, have_lock=0) at malloc.c:3840
#5 0x00007f6a69d4fd2d in ?? () from /opt/gnupg/lib/libgcrypt.so.20
#6 0x0000000000428802 in ldap_wrapper (ctrl=ctrl@entry=0x7f6a580008c0,
reader=reader@entry=0x7f6a64c05cd0,

argv=argv@entry=0x7f6a64c05a80) at ldap-wrapper.c:772

#7 0x000000000042218c in run_ldap_wrapper (ctrl=ctrl@entry=0x7f6a580008c0,
multi_mode=multi_mode@entry=0, proxy=0x0,

host=<optimized out>, port=<optimized out>, user=<optimized out>, pass=0x0, 
dn=dn@entry=0x7f6a58001d50

"1.2.840.113549.1.9.1=#4865696E65636B656E40676D61696C2E636F6D,CN=Common
Name,ST=Some-State,C=DE",

filter=filter@entry=0x44dcc1 "objectClass=*", attr=attr@entry=0x44b50a

"certificateRevocationList", url=url@entry=0x0,

reader=reader@entry=0x7f6a64c05cd0, ignore_timeout=0) at ldap.c:191

#8 0x00000000004228ea in attr_fetch_ldap (ctrl=0x7f6a580008c0,

dn=0x7f6a58001d50

"1.2.840.113549.1.9.1=#4865696E65636B656E40676D61696C2E636F6D,CN=Common
Name,ST=Some-State,C=DE",

attr=attr@entry=0x44b50a "certificateRevocationList",

reader=reader@entry=0x7f6a64c05cd0) at ldap.c:287
#9 0x0000000000414aed in crl_fetch_default (ctrl=ctrl@entry=0x7f6a580008c0,

issuer=issuer@entry=0x7f6a58001d50

"1.2.840.113549.1.9.1=#4865696E65636B656E40676D61696C2E636F6D,CN=Common
Name,ST=Some-State,C=DE", reader=reader@entry=0x7f6a64c05cd0) at crlfetch.c:319
#10 0x000000000041439d in crl_cache_reload_crl (ctrl=ctrl@entry=0x7f6a580008c0,
cert=0x7f6a58002740) at crlcache.c:2554
#11 0x000000000040e1d5 in inquire_cert_and_load_crl (ctx=0x7f6a58000950) at
server.c:589
#12 cmd_isvalid (ctx=0x7f6a58000950, line=<optimized out>) at server.c:901
#13 0x00007f6a6a23e96a in ?? () from /opt/gnupg/lib/libassuan.so.0
#14 0x00007f6a6a23ed49 in assuan_process () from /opt/gnupg/lib/libassuan.so.0
#15 0x000000000040edc7 in start_command_handler (fd=fd@entry=1) at server.c:2243
#16 0x000000000040ada5 in start_connection_thread (arg=arg@entry=0x1) at
dirmngr.c:1937
#17 0x00007f6a69908dbc in thread_start (startup_arg=<optimized out>) at npth.c:265
#18 0x00007f6a696f1182 in start_thread (arg=0x7f6a64c06700) at pthread_create.c:312
#19 0x00007f6a691cd47d in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:111

A different backtrace:

#0 0x00007fe9e9805cc9 in GI_raise (sig=sig@entry=6) at
../nptl/sysdeps/unix/sysv/linux/raise.c:56
#1 0x00007fe9e98090d8 in
GI_abort () at abort.c:89
#2 0x00007fe9e9842394 in __libc_message (do_abort=do_abort@entry=1,

fmt=fmt@entry=0x7fe9e9950b28 "*** Error in `%s': %s: 0x%s ***\n") at

../sysdeps/posix/libc_fatal.c:175
#3 0x00007fe9e984dac2 in malloc_printerr (ptr=<optimized out>,
str=0x7fe9e994cbfc "corrupted double-linked list", action=1)

at malloc.c:4996

#4 malloc_consolidate (av=av@entry=0x7fe9d8000020) at malloc.c:4165
#5 0x00007fe9e984edf8 in _int_malloc (av=0x7fe9d8000020, bytes=1025) at
malloc.c:3423
#6 0x00007fe9e98517b0 in GI_libc_malloc (bytes=1025) at malloc.c:2891
#7 0x00007fe9ea44ad11 in ?? () from /opt/gnupg/lib/libgcrypt.so.20
#8 0x00007fe9ea44bc19 in ?? () from /opt/gnupg/lib/libgcrypt.so.20
#9 0x00007fe9ea93b284 in init_membuf (maxlen=0, initiallen=<optimized out>,
mb=0x7fe9e53018e0, ctx=0x7fe9d8000950)

at assuan-inquire.c:64

#10 assuan_inquire (ctx=ctx@entry=0x7fe9d8000950, keyword=keyword@entry=0x44774b
"SENDCERT",

r_buffer=r_buffer@entry=0x7fe9e5301d50,

r_length=r_length@entry=0x7fe9e5301d60, maxlen=maxlen@entry=0) at
assuan-inquire.c:169
#11 0x000000000040dfca in inquire_cert_and_load_crl (ctx=0x7fe9d8000950) at
server.c:567
#12 cmd_isvalid (ctx=0x7fe9d8000950, line=<optimized out>) at server.c:901
#13 0x00007fe9ea93a96a in dispatch_command (ctx=0x7fe9d8000950, line=<optimized
out>, linelen=<optimized out>)

at assuan-handler.c:675

#14 0x00007fe9ea93ad49 in process_request (ctx=0x7fe9d8000950) at
assuan-handler.c:871
#15 assuan_process (ctx=0x7fe9d8000950) at assuan-handler.c:894
#16 0x000000000040edc7 in start_command_handler (fd=fd@entry=6) at server.c:2243
#17 0x000000000040ada5 in start_connection_thread (arg=arg@entry=0x6) at
dirmngr.c:1937
#18 0x00007fe9ea004dbc in thread_start (startup_arg=<optimized out>) at npth.c:265
#19 0x00007fe9e9ded182 in start_thread (arg=0x7fe9e5302700) at pthread_create.c:312
#20 0x00007fe9e98c947d in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:111

Jun 17 2015, 10:02 AM · gnupg, Bug Report, S/MIME, dirmngr

Jun 16 2015

werner added a project to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating: Restricted Project.
Jun 16 2015, 6:15 PM · gnupg, Bug Report, S/MIME, dirmngr
werner added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

Well, there was the ldap-reaper thread still running and due to a bug in the log
output handing code it was not able to remove its context structures and thus it
kept on spinning.

Fixed with commit 685b782.

Jun 16 2015, 6:15 PM · gnupg, Bug Report, S/MIME, dirmngr

Jun 12 2015

werner claimed T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.
Jun 12 2015, 1:55 PM · gnupg, Bug Report, S/MIME, dirmngr

May 26 2015

aheinecke added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

By killing I meant sending SIGTERM (15) through the kill command.

But
"gpgconf --kill dirmngr" also does not kill the dirmngr. Is this problem not
reproducible for you?

kill -9 kills it of course.

May 26 2015, 6:53 PM · gnupg, Bug Report, S/MIME, dirmngr
werner added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

How do you kill dirmngr? Using "gpgconf --kill dirmngr" or by sending a signal

  • which one?
May 26 2015, 6:21 PM · gnupg, Bug Report, S/MIME, dirmngr
werner changed Version from master to 2.1 on T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.
May 26 2015, 6:21 PM · gnupg, Bug Report, S/MIME, dirmngr
werner added a project to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating: gnupg.
May 26 2015, 6:18 PM · gnupg, Bug Report, S/MIME, dirmngr
aheinecke added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

Can you let me know when you can take a look at this or was my assignment wrong
here? (If so please change it)

This is a pretty major bug imho that would leave our application servers
(without manual intervention) if we would deploy 2.1 in our company. As such it
is blocking our adoption of 2.1.

I would appreciate some kind of reaction / confirmation on this issue.

May 26 2015, 5:55 PM · gnupg, Bug Report, S/MIME, dirmngr

May 13 2015

aheinecke set Version to master on T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.
May 13 2015, 3:40 PM · gnupg, Bug Report, S/MIME, dirmngr
aheinecke added projects to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating: dirmngr, S/MIME, Bug Report.
May 13 2015, 3:40 PM · gnupg, Bug Report, S/MIME, dirmngr

May 11 2015

aheinecke reopened T1921: Duplicated certificates in gpgsm pubring (2.1) as "Open".
May 11 2015, 3:46 PM · Bug Report, gnupg, dirmngr, S/MIME
aheinecke added a comment to T1921: Duplicated certificates in gpgsm pubring (2.1).

During deployment of gnupg 2.1.3 this bug was still noticed and I can still
reproduce it with git master. -> back to chatting

I must have messed up the test in T1921 (aheinecke on Apr 08 2015, 04:36 PM / Roundup). Probably by using a different
sysconfig dir for that test. Apologies for that.

May 11 2015, 3:46 PM · Bug Report, gnupg, dirmngr, S/MIME
werner added projects to T1259: pinentry should show fingerprint if certify a OpenPGP certificate: S/MIME, gnupg.
May 11 2015, 2:12 PM · gnupg, S/MIME, Feature Request
werner removed a project from T1259: pinentry should show fingerprint if certify a OpenPGP certificate: pinentry.
May 11 2015, 2:12 PM · gnupg, S/MIME, Feature Request

Apr 30 2015

perske changed Version from 2.0.22, 2.1.2 to 2.0.22, 2.1.3 on T1644: Do not expect KeyIDs to be unique.
Apr 30 2015, 8:16 PM · gnupg (gpg22), S/MIME, Bug Report
perske added a comment to T1644: Do not expect KeyIDs to be unique.

I propose to implement a partly solution as a start: Add a 4th parameter
"allow_ambiguous" to gpgsm_find_cert() in "sm/certlist.c".

When called from "sm/gpgsm.c" or "sm/server.c" or anywhere else, set this
parameter to 0. Then gpgsm_find_cert() will behave like before.

When called by inq_certificate() in "sm/call-dirmngr.c", set this parameter to

  1. Then gpgsm_find_cert() will not bail out an ambiguous certificates, but

return the newest one of the matching certificates (according to
validity.notBefore).

(I am not sure what to pass when called by run_command_inq_cb() in
"sm/call-dirmngr.c" because I did not yet understand in which situation this
callback is used.)

As far as I can see, this change never hurts, but it helps when there are
multiple certificates for intermediate CAs with identical subject and identical
key by allowing to use "gpgsm" without "--disable-crl-checs --disable-dirmngr".

See attached patch.

(A complete solution probably requires call-dirmngr to return all matching
certificates and dirmngr to try each of the returned certificates in a loop.)

Apr 30 2015, 8:16 PM · gnupg (gpg22), S/MIME, Bug Report
perske added a comment to T1644: Do not expect KeyIDs to be unique.

D199: 601_gnupg.diff

Apr 30 2015, 8:16 PM · gnupg (gpg22), S/MIME, Bug Report

Apr 27 2015

perske added a comment to T1644: Do not expect KeyIDs to be unique.

The error "Ambiguous Name" is generated in "sm/certlist.c" in gpgsm_find_cert().

Arguments to this function are:

name:

"/1.2.840.113549.1.9.1=#636140756E692D6D75656E737465722E6465,CN=Zertifizierungsstelle
Universitaet Muenster - G02,O=Universitaet Muenster,C=DE"

keyid: NULL

Caller is the function inq_certificate() in "sm/call-dirmngr.c".
Argument to this function is:

line: "SENDCERT

/1.2.840.113549.1.9.1=#636140756E692D6D75656E737465722E6465,CN=Zertifizierungsstelle
Universitaet Muenster - G02,O=Universitaet Muenster,C=DE"
This is caused in function gpgsm_dirmngr_isvalid() in "sm/call-dirmngr.c" by
calling assuan_transact() with

  line: "ISVALID A52EFAEFBC86EF98C5E9AA92B3ECEC4101080F0A.1700BFBB98F74B"

When looking up the CRL, GnuPG assumes that there is only one certificate with
the Distinguished Name of the Certification Authority.
But that is not true: Distinguished Names distinguish identities, not
certificates. The same identity can hold multiple certificates at the same time.
So GnuPG must be fixed to allow multiple valid certificates with the same
Distinguished Name.
Wenn looking up a CRL, GnuPG may use any of these certificates.
My proposal: Perhaps you could implement and use a dirmngr function "SENDANYCERT"?

Apr 27 2015, 2:05 PM · gnupg (gpg22), S/MIME, Bug Report
perske changed Version from 2.0.22 to 2.0.22, 2.1.2 on T1644: Do not expect KeyIDs to be unique.
Apr 27 2015, 2:05 PM · gnupg (gpg22), S/MIME, Bug Report
perske added a comment to T1644: Do not expect KeyIDs to be unique.

With 2.1.2, the bug still exists:

[/home/permail/RHEL5/devel/gpgfamily/bin/gpgsm] [--no-greeting] [--yes]
[--auto-issuer-key-retrieve] [--batch] [--no-tty] [--homedir]
[/home/p/perske/.perMail/gnupghome] [--base64] [--detach] [--local-user]
[&7CF2C58D823C0ED461ED6B1FD13F9E96B6F7C436] [--status-fd] [8] [--output]
[/index/permail/RHEL5/devel/sso/work/pgp.fe5316b600000e8a.out] [--sign]
[/index/permail/RHEL5/devel/sso/work/pgp.fe5316b600000e8a.dat]
(using a self-written pinentry replacement)

Output is now reduced, but basically unchanged:

gpgsm: Note: non-critical certificate policy not allowed
gpgsm: certificate not found: Ambiguous name
gpgsm: certificate
#1700BFBB98F74B/1.2.840.113549.1.9.1=#636140756E692D6D75656E737465722E6465,CN=Zertifizierungsstelle
Universitaet Muenster - G02,O=Universitaet Muenster,C=DE
gpgsm: checking the CRL failed: Not found
gpgsm: can't sign using '&7CF2C58D823C0ED461ED6B1FD13F9E96B6F7C436': Not found

Currently used versions:

gnupg-1.4.18.tar.bz2
gnupg-2.1.2.tar.bz2 (build process patched according to T1862)
libassuan-2.2.0.tar.bz2
libgcrypt-1.6.2.tar.bz2
libgpg-error-1.18.tar.bz2
libksba-1.3.2.tar.bz2
npth-1.1.tar.bz2
pinentry-0.9.0.tar.bz2
(my own) pinentry.c

Apr 27 2015, 12:56 PM · gnupg (gpg22), S/MIME, Bug Report

Apr 22 2015

werner added projects to T1839: Can't Encrypt with PIV-I Encryption Certificate - Unsupported Certificate: Feature Request, gnupg.
Apr 22 2015, 8:57 AM · gnupg, dirmngr, S/MIME, Feature Request
werner added a comment to T1839: Can't Encrypt with PIV-I Encryption Certificate - Unsupported Certificate.

That is not a bug but due to non-supported certificate policy constraints.

If you want to ignore them as a workaround you may modify the function
unknown_criticals which you find in
gnupg/dirmngr/validate.c and gnupg/sm/validate.c. Add to the
"known" array the strings "2.5.29.36" and "2.5.29.54".

Apr 22 2015, 8:57 AM · gnupg, dirmngr, S/MIME, Feature Request
werner removed projects from T1839: Can't Encrypt with PIV-I Encryption Certificate - Unsupported Certificate: Bug Report, gpg4win.
Apr 22 2015, 8:57 AM · gnupg, dirmngr, S/MIME, Feature Request
gniibe added projects to T1839: Can't Encrypt with PIV-I Encryption Certificate - Unsupported Certificate: S/MIME, dirmngr.
Apr 22 2015, 2:27 AM · gnupg, dirmngr, S/MIME, Feature Request
gniibe added a comment to T1839: Can't Encrypt with PIV-I Encryption Certificate - Unsupported Certificate.

Here is error in dirmngr:

2015-04-22 09:23:41 dirmngr[3108.0] critical certificate extension 2.5.29.36 is
not supported
2015-04-22 09:23:41 dirmngr[3108.0] critical certificate extension 2.5.29.54 is
not supported
2015-04-22 09:23:41 dirmngr[3108.0] error checking validity of CRL issuer
certificate: Unsupported certificate
2015-04-22 09:23:41 dirmngr[3108.0] crl_parse_insert failed: Unsupported certificate
2015-04-22 09:23:41 dirmngr[3108.0] crl_cache_insert via DP failed: Unsupported
certificate
2015-04-22 09:23:41 dirmngr[3108.0] command 'ISVALID' failed: Unsupported
certificate
2015-04-22 09:23:41 dirmngr[3108.0] DBG: chan_0 -> ERR 167772263 Unsupported
certificate <Dirmngr>
2015-04-22 09:23:41 dirmngr[3108.0] DBG: chan_0 <- [eof]

Apr 22 2015, 2:27 AM · gnupg, dirmngr, S/MIME, Feature Request

Apr 8 2015

aheinecke closed T1921: Duplicated certificates in gpgsm pubring (2.1) as Resolved.
Apr 8 2015, 4:36 PM · Bug Report, gnupg, dirmngr, S/MIME
aheinecke added a comment to T1921: Duplicated certificates in gpgsm pubring (2.1).

This was fixed by:

http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=6619ead2cfd2abcb95b66dc70622fdeef624fb8a

using the test described in T1921 (aheinecke on Mar 10 2015, 06:13 PM / Roundup) there are no longer duplicated certificates
shown after the verify command.

Thanks!

Apr 8 2015, 4:36 PM · Bug Report, gnupg, dirmngr, S/MIME
aheinecke added a comment to T1921: Duplicated certificates in gpgsm pubring (2.1).

I can't reproduce this problem neither in our company setup nor on a vanilla debian.

I've placed the .der files in the correct directories
/var/lib/dirmngr/extra-certs and /etc/dirmngr/trusted-certs

gpgsm --import aheinecke.der

Dirmngr output shows that the LOOKUP Issuer and Intermediate -Cert are not not
found in the dirmngr cache and they are not imported into the keyring.

This is probably another bug that hid this issue in the past.

Apr 8 2015, 3:36 PM · Bug Report, gnupg, dirmngr, S/MIME

Apr 4 2015

werner added a project to T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256: Feature Request.
Apr 4 2015, 11:15 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME
werner lowered the priority of T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256 from High to Normal.
Apr 4 2015, 11:15 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME
werner removed a project from T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256: Bug Report.
Apr 4 2015, 11:15 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME

Mar 25 2015

werner added a comment to T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256.

Never mind. Just pushed the changes for the 2.0 branch.

Mar 25 2015, 10:30 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME
emanuel added a comment to T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256.

Thanks!

Is there a need to backport it to 2.0 ?

No

Mar 25 2015, 10:23 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME
werner added a comment to T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256.

Done for master (gpg21). 2.1.3 will be released in a few days.

Is there a need to backport it to 2.0 ?

Mar 25 2015, 10:18 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME
werner added a project to T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256: Restricted Project.
Mar 25 2015, 10:18 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME
emanuel updated subscribers of T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256.
Mar 25 2015, 8:37 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME
emanuel added projects to T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256: S/MIME, gnupg (gpg21), gnupg, Bug Report.
Mar 25 2015, 8:37 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME