Page MenuHome GnuPG
Feed Advanced Search

Nov 2 2022

Valodim added a comment to rG4583f4fe2e11: gpg: Merge --rfc4880bis features into --gnupg.

Hey Werner,

Nov 2 2022, 10:10 AM

Aug 24 2022

Valodim reopened T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired as "Open".

I'll reopen this ticket here, since the underlying issue is not quite resolved yet as @dkg helpfully outlined above.

Aug 24 2022, 9:41 AMworkaround, gnupg, Keyserver, Bug Report

Aug 22 2022

Valodim added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

In that case, it's a bug in gnupg and there's nothing I can further do from my side 馃し

Aug 22 2022, 10:52 PMworkaround, gnupg, Keyserver, Bug Report
Valodim added a comment to T6142: On Windows, gpg 2.3.7 thinks the certificates of major keyservers have expired.

It seems we were still providing the expired DST certificate, which led to an additional yet invalid trust path, which gnupg didn't consider "valid" overall. Mainstream TLS implementations are more lenient here which masked the issue for a bit.

Aug 22 2022, 5:42 PMworkaround, gnupg, Keyserver, Bug Report

Jun 24 2022

Valodim added a comment to T6040: Allow embedding preferred keyserver URL in signatures.

I suppose you're right, we might have crossed that bridge a while ago. Simple availability of certificate- or even signature-specific keyserver URIs just make the risks of honor-keyserver-url more obvious than before.

Jun 24 2022, 2:16 PMgnupg24, Feature Request, Keyserver
Valodim added a comment to T6040: Allow embedding preferred keyserver URL in signatures.

This is a reasonable feature, however it should be noted that this implies a fairly large metadata leak: You are essentially adding a URI to signatures that will be pinged on signature verification.

Jun 24 2022, 12:31 PMgnupg24, Feature Request, Keyserver

Mar 30 2022

Valodim added a comment to T5813: Locating Keys via WKD with gpg4win fails with unknown error..

Independently of that, it seems that gpg4win doesn't work with at least one widely deployed webserver in its default configuration, specifically Caddy, so this fix is well appreciated.

Mar 30 2022, 11:41 PMwkd, gpg4win, Bug Report
Valodim added a comment to T5813: Locating Keys via WKD with gpg4win fails with unknown error..

Oof. That hinges on the certificate, guess we'll need to renew the bunch of them. I reconfigured, might take a while for all pages but ciphers should now be:

Mar 30 2022, 4:53 PMwkd, gpg4win, Bug Report
Valodim added a comment to T5813: Locating Keys via WKD with gpg4win fails with unknown error..

I captured some logs server-side, and I do see this error:

Mar 30 2022, 12:27 PMwkd, gpg4win, Bug Report

Mar 18 2022

Valodim added a watcher for Keyserver: Valodim.
Mar 18 2022, 12:28 PM

Mar 12 2022

Valodim added a comment to T5813: Locating Keys via WKD with gpg4win fails with unknown error..

@mieth sorry for the delay. meanwhile I adjusted the ciphersuite of the WKD gateway to include an AES-CBC suite. would be interested if it works now on the setup you tested before.

Mar 12 2022, 2:27 PMwkd, gpg4win, Bug Report

Mar 10 2022

Valodim added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

Gook luck on Solaris with this suggestion ;-)

Mar 10 2022, 12:27 PMFeature Request, Keyserver, dirmngr
Valodim added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

For the record, the typical response to "it doesn't work" support requests for keys.o.o still comes down to killall dirmngr.

Mar 10 2022, 10:57 AMFeature Request, Keyserver, dirmngr

Feb 3 2022

Valodim added a comment to T5813: Locating Keys via WKD with gpg4win fails with unknown error..

Might be an issue with matching ciphersuites? There was a problem with this before when GnuPG didn't support AES-GCM yet (https://dev.gnupg.org/T4597). That was added in 2020, maybe it's not rolled out far enough yet?

Feb 3 2022, 11:59 AMwkd, gpg4win, Bug Report

Jun 21 2021

Valodim added a comment to T4163: hkps://hkps.pool.sks-keyservers.net has to many bad servers to be a good default.

The sks pool is now officially gone.

Jun 21 2021, 11:50 PMgnupg, Keyserver

Jan 28 2021

Valodim added a comment to T4163: hkps://hkps.pool.sks-keyservers.net has to many bad servers to be a good default.

The last server of the HKPS pool dropped off for several hours yesterday, during which hkps.pool.sks-keyservers.net could not be resolved.

Jan 28 2021, 11:17 AMgnupg, Keyserver

Dec 4 2020

Valodim added a comment to T4163: hkps://hkps.pool.sks-keyservers.net has to many bad servers to be a good default.

Perhaps of interest for this issue: the HKPS pool has consisted of only a single server for a couple of months now.

Dec 4 2020, 1:07 PMgnupg, Keyserver

Jul 5 2020

Valodim added a comment to T4694: manage first-party attestations.

I'd be interested, is this is still on the agenda?

Jul 5 2020, 8:46 PMKeyserver, Feature Request

Mar 10 2020

Valodim added a comment to T4856: GPG: Key Exchange Put public OpenPGP key into signature.

ftr, here is the thread I had in mind but couldn't recall above. @aheinecke is that your thinking, or a more pgp/mime bound mechanism as @dkg assumed?

Mar 10 2020, 5:50 PMFeature Request, gpgol, Keyserver, gnupg
Valodim added a comment to T4856: GPG: Key Exchange Put public OpenPGP key into signature.

Werner said that it's possible in OpenPGP to also put the pubkey into the signature. (...) The nice advantage is that this will also work for files.

Mar 10 2020, 12:31 AMFeature Request, gpgol, Keyserver, gnupg

Feb 19 2020

Valodim added a comment to T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

But searching on Keyservers is also in my opinion not a common use case for Kleopatra users.

Feb 19 2020, 6:43 PMFeature Request, Keyserver, dirmngr
Valodim updated subscribers of T4513: dirmngr should try the configured keyservers anyway even if they are all dead.

I can attest to the "growing bit of popular lore": Roughly half the support requests I get to support@keys.openpgp.org boil down to an exchange of "it just doesn't work with a 'general error' message" -> "try killall dirmngr" -> "that did it". I have heard similar stories from @patrick from Enigmail users, and more than once heard people applying poweruser trickery like "I just have killall dirmngr in my resume.d".

Feb 19 2020, 11:37 AMFeature Request, Keyserver, dirmngr

Jan 20 2020

Valodim added a comment to T4817: dirmgr keys.openpgp.org:443 Address family not supported by protocol.

that does look like your host can resolve domains for ipv6 addresses, but can't actually connect to them. what does host keys.openpgp.org say? And ip a?

Jan 20 2020, 12:56 PMBug Report

Jan 19 2020

Valodim added a comment to T4817: dirmgr keys.openpgp.org:443 Address family not supported by protocol.

but keys.openpgp.org resolves only to a v4 address.

Jan 19 2020, 11:15 PMBug Report

Dec 10 2019

Valodim added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

That sounds like you might have a different issue in mind?

Dec 10 2019, 11:51 AMgnupg (gpg23), Feature Request

Nov 8 2019

Valodim added a comment to rG6701a38f8e4a: gpg: Fix a potential loss of key sigs during import with self-sigs-only..

Sorry, I don't know which source code comment you are referring to. You mention the comment at https://dev.gnupg.org/T4628#128529 as well, but neither this commit nor be99eec2b105eb5f8e3759147ae351dcc40560ad contain such comment.

Nov 8 2019, 11:13 AM

Nov 7 2019

Valodim added a comment to rG6701a38f8e4a: gpg: Fix a potential loss of key sigs during import with self-sigs-only..

I'm confused by this commit: Third-party sigs were the ones used for flooding, and those are dropped with self-sigs-only. Is the additional clean operation still necessary for the mitigation? Wouldn't it be easier to just not set the import-clean flag in the first place for the default keyserver options?

Nov 7 2019, 7:03 PM

Oct 17 2019

Valodim added a comment to T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

GnuPG ships a non-PKI certificate, specifically to authenticate hkps.pool.sks-keyservers.net. Now due to an implementation detail, this has been shown to potentially lead to authentication of other domains by this certificate, if a maintainer changes the default keyserver via the DIRMNGR_DEFAULT_KEYSERVER variable in configure.ac. Now arguably, this variable isn't exposed via ./configure, so it's not "officially" configurable - but evidently maintainers do want to change it. A trivial one-line patch was supplied to change the unintended and potentially security-problematic behavior into the (I believe) obviously intended one.

Oct 17 2019, 12:23 PMgnupg (gpg22), Bug Report, dirmngr

Jul 19 2019

Valodim added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

So, what about this? If I recall correctly, we had agreed in the call to merge this patch, at least into master?

Jul 19 2019, 4:52 PMgnupg (gpg23), Feature Request

Jul 10 2019

Valodim updated subscribers of T4617: Odd behavior for HTTP(S) scheme in --keyserver config.

Ah, that makes sense, good catch. Seems this is just an issue of documentation, then.

Jul 10 2019, 6:20 PMDocumentation, Keyserver, dirmngr
Valodim created T4617: Odd behavior for HTTP(S) scheme in --keyserver config in the S1 Public space.
Jul 10 2019, 4:52 PMDocumentation, Keyserver, dirmngr
Valodim added a comment to T4163: hkps://hkps.pool.sks-keyservers.net has to many bad servers to be a good default.

We should put it of the agenda od the Brussesl summit in 3 weeks. I have a few ideas what we can do in gpg.

Jul 10 2019, 4:36 PMgnupg, Keyserver

Jul 5 2019

Valodim added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

and from my understanding they are sending the self-signatures anyway.

Jul 5 2019, 3:31 PMgnupg (gpg23), Feature Request

Jul 2 2019

Valodim added a comment to T4597: Support GCM modes for ntbtls..

Done. Hopefully this works now :)

Jul 2 2019, 5:39 PMRestricted Project, Feature Request, ntbtls
Valodim added a comment to T4597: Support GCM modes for ntbtls..

Which is a bad idea because CBC is still a very common cipher mode.

Jul 2 2019, 4:02 PMRestricted Project, Feature Request, ntbtls

Jun 24 2019

Valodim added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

It's been a while, any word on this? I sent the DCO as requested. Are there any technical concerns left to address?

Jun 24 2019, 12:48 PMgnupg (gpg23), Feature Request

Jun 21 2019

Valodim added a comment to T4493: Default to HKPS, not HKP.

A possible exception here is that .onion TLDs should stick with HKP by default

Jun 21 2019, 11:16 AMdirmngr, Feature Request

May 10 2019

Valodim created T4493: Default to HKPS, not HKP.
May 10 2019, 2:13 PMdirmngr, Feature Request

Apr 5 2019

Valodim added a comment to T4448: Add "Autocrypt" key-origin.

I disagree that it's conceptionally the same, unless you also consider any key on an HTTP server to be "conceptionally the same" as WKD.

Apr 5 2019, 4:34 PMFeature Request
Valodim added a comment to T4448: Add "Autocrypt" key-origin.

Certain origins do have special treatment but in general the key origin is meta data for the frontend.

Apr 5 2019, 10:56 AMFeature Request

Apr 4 2019

Valodim added a comment to T4448: Add "Autocrypt" key-origin.

I'm a bit confused. The origin of Autocrypt keys is clearly different from keyservers ("ks"), why would they use the same value? I was aware that origin values are mapped to integers, but your description seems to imply that these integers have significant ordering in terms of trust. The documentation in the man page is a bit bare bones, but my interpretation of "key-origin" was that it simply stated the method of discovery for a key, leaving any implications of trust to the client. Is this incorrect?

Apr 4 2019, 7:23 PMFeature Request
Valodim renamed T4448: Add "Autocrypt" key-origin from Add "Autocrypt" origin to Add "Autocrypt" key-origin.
Apr 4 2019, 11:06 AMFeature Request
Valodim created T4448: Add "Autocrypt" key-origin.
Apr 4 2019, 11:05 AMFeature Request

Nov 8 2018

Valodim added a comment to T4235: GnuPG doesn't respect key flags when decrypting.

Fair enough. Let's wait and see what others think.

Nov 8 2018, 1:24 PMNot A Bug, OpenPGP, gnupg

Oct 29 2018

Valodim added a comment to T4235: GnuPG doesn't respect key flags when decrypting.

The same *cannot* be said for a subkey that is marked specifically for certification or signing, and not for decryption.

Oct 29 2018, 7:57 PMNot A Bug, OpenPGP, gnupg

Oct 27 2018

Valodim created T4235: GnuPG doesn't respect key flags when decrypting.
Oct 27 2018, 10:24 PMNot A Bug, OpenPGP, gnupg

Aug 29 2018

Valodim added a comment to T3277: decrypting data symmetrically doesn't reliably convey confidentiality property.

I'm sorry but the explanation you give does not address the original issue I described, and which dkg then clarified. The discussion about AE is tangentially related, but the issue I described relates to the gpg interface:

Aug 29 2018, 2:01 PMFeature Request, gnupg (gpg22)

Feb 1 2018

Valodim added a comment to T3766: GnuPG should reject keys that are subkeys of itself.

Sorry, I don't understand. Can you describe your use case in more detail?

Feb 1 2018, 12:47 PMgnupg (gpg22), Feature Request

Jan 31 2018

Valodim added a comment to T3766: GnuPG should reject keys that are subkeys of itself.

a key that is signed as its own subkey, in a construct where the key and subkey have the same fingerprint? what ever could be a valid use case for such a scenario?

Jan 31 2018, 8:06 PMgnupg (gpg22), Feature Request
Valodim added a comment to T3766: GnuPG should reject keys that are subkeys of itself.

uploaded the offending key for reference:

Jan 31 2018, 4:27 PMgnupg (gpg22), Feature Request
Valodim created T3766: GnuPG should reject keys that are subkeys of itself.
Jan 31 2018, 4:26 PMgnupg (gpg22), Feature Request

Nov 7 2017

Valodim added a comment to T3488: support specialized numeric9x4 format for symmetric passphrase.

Well, I gues it's complex enough to warrant strategic discussion, which can be done in this ticket :)

Nov 7 2017, 1:31 PMFeature Request
Valodim created T3488: support specialized numeric9x4 format for symmetric passphrase.
Nov 7 2017, 11:48 AMFeature Request

Jul 19 2017

Valodim added a comment to T3203: gpg chokes on empty UserId.

Hm. Could you elaborate on that? Why do you think it's dangerous?

Jul 19 2017, 5:36 PMFeature Request, gnupg (gpg22)
Valodim added a comment to T3203: gpg chokes on empty UserId.

Isn't it much nicer if we semantically convey that a key doesn't have associated user id information, compared to just listing such keys between "Andre" and "Arnold"? I'd much rather special case the empty string in the key list than an arbitrary string that may or may not have a universally obvious meaning.

Jul 19 2017, 4:22 PMFeature Request, gnupg (gpg22)
Valodim added a comment to T3203: gpg chokes on empty UserId.

I think "anonymous" user ids are a valid use case, since openpgp doesn't allow "no" user ids. Disallowing zero-length user ids will just cause implementations that intend to use anonymous user ids to use another type of "empty", like a single space character. And the effect of that will be that it's no longer trivially defined what an "anonymous" user id is for special handling, e.g. showing a localized "anonymous key" placeholder. Please don't restrict zero-length user ids.

Jul 19 2017, 11:24 AMFeature Request, gnupg (gpg22)

Jul 13 2017

Valodim renamed T3277: decrypting data symmetrically doesn't reliably convey confidentiality property from decrypting data symmetrically doesn't preserve authentication property to decrypting data symmetrically doesn't reliably convey confidentiality property.
Jul 13 2017, 7:15 PMFeature Request, gnupg (gpg22)
Valodim added a comment to T3277: decrypting data symmetrically doesn't reliably convey confidentiality property.

Well, yes, it's not general authentication like AE provides, didn't think this through entirely. However, handing encrypted data to gnupg and then not being sure if it was actually decrypted with a passphrase makes even the confidentiality property questionable.

Jul 13 2017, 6:53 PMFeature Request, gnupg (gpg22)
Valodim created T3277: decrypting data symmetrically doesn't reliably convey confidentiality property.
Jul 13 2017, 6:31 PMFeature Request, gnupg (gpg22)

Jun 23 2017

Valodim added a comment to T3203: gpg chokes on empty UserId.

seems this was fixed along the way, then. I only tested with 2.1.18.

Jun 23 2017, 7:05 PMFeature Request, gnupg (gpg22)

Jun 17 2017

Valodim added a comment to T3203: gpg chokes on empty UserId.

here's a public key version of the same key. it was available easier and should reproduce the bug just as well

Jun 17 2017, 1:17 AMFeature Request, gnupg (gpg22)

Jun 13 2017

Valodim added a comment to T3203: gpg chokes on empty UserId.

user ids with length 0 do conform with rfc4880, though

Jun 13 2017, 12:47 PMFeature Request, gnupg (gpg22)
Valodim added a comment to T3203: gpg chokes on empty UserId.

The key was created programmatically by my standard approach, which is bastardizing openkeychain unit tests. good question about the passphrase - I don't remember exactly, but I'm guessing it's either empty or "x". doesn't really matter in the context of this particular bug I guess :)

Jun 13 2017, 12:25 PMFeature Request, gnupg (gpg22)

Jun 12 2017

Valodim updated the task description for T3203: gpg chokes on empty UserId.
Jun 12 2017, 6:56 PMFeature Request, gnupg (gpg22)
Valodim added a comment to T3203: gpg chokes on empty UserId.

-----BEGIN PGP PRIVATE KEY BLOCK-----

Jun 12 2017, 6:54 PMFeature Request, gnupg (gpg22)
Valodim created T3203: gpg chokes on empty UserId.
Jun 12 2017, 6:53 PMFeature Request, gnupg (gpg22)