Page MenuHome GnuPG
Feed Advanced Search

Jul 5 2019

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

This is not just about keys.openpgp.org. It's about any keystore that implements user id redaction, for whatever reason. When you say "what they can do is accept only user ids which…" i think you mean "the userid-redacting keystores can instead redistribute user ids which …". Is that right?

Jul 5 2019, 3:07 PM · gnupg (gpg23), Feature Request

Jul 4 2019

dkg created T4613: document implementation guidance for WKD clients in draft-koch-openpgp-webkey-service.
Jul 4 2019, 11:04 PM · Documentation, wkd
dkg added a comment to T4607: enable `import-clean` by default.

@werner, i don't think there is a 64K limit either, at least not in 2.2.16. Here is 2.2.16 with an empty homedir fetching Zack's certificate here which is > 97KiB:

Jul 4 2019, 11:02 PM · Feature Request
dkg added a comment to T4604: gpg 2.2 fails to download keys from a keyserver.

Not every incoming certificate that has no user ID will lack a user ID once it is merged with the local copy of the same certificate. T4393 describes that use case, so if you're interested in receiving user-ID-lacking updates to certificates that you already have a copy of, @jaymzh, you should follow up on that ticket.

Jul 4 2019, 10:24 PM · Bug Report
dkg added a comment to T4612: Add spare space to the keybox to always allow the import of revocations..

Once a revocation is added (to any part of the certificate), perhaps all the certification packets that are clearly made obsolete by the revocation could be dropped from the certificate? That would certainly free up space to be able to import additional revocations if needed.

Jul 4 2019, 10:21 PM · gnupg24, gnupg (gpg23), Bug Report

Jul 3 2019

dkg added a comment to T4604: gpg 2.2 fails to download keys from a keyserver.

I think what you're missing is the keys.openpgp.org documentation which makes it clear that they will not distribute identity information (read: "User IDs") without an explicit confirmation by the operator of the e-mail address named in the User ID. They strip down the certificate pretty significantly before redistribution, especially if the e-mail address hasn't been confirmed directly with the operators of that server.

Jul 3 2019, 11:39 PM · Bug Report
dkg added a comment to T4608: gpgv --enable-special-filenames documentation appears to claim that it works for keyrings, but it does not.

out of curiosity, why does gpgv need the name of the file?

Jul 3 2019, 9:30 PM · gpgv, Bug Report
dkg renamed T4608: gpgv --enable-special-filenames documentation appears to claim that it works for keyrings, but it does not from gpgv --enable-special-filenames does not appear to work for keyrings passed as file descriptors to gpgv --enable-special-filenames documentation appears to claim that it works for keyrings, but it does not.
Jul 3 2019, 9:17 PM · gpgv, Bug Report
dkg added a comment to T4607: enable `import-clean` by default.

in 2.2.16, anyway, gnupg does not appear to apply import-minimal for WKD.

Jul 3 2019, 9:10 PM · Feature Request
dkg reopened T4608: gpgv --enable-special-filenames documentation appears to claim that it works for keyrings, but it does not as "Open".

In that case, you can treat this ticket as a bug in the documentation, which still needs to be resolved.

Jul 3 2019, 9:07 PM · gpgv, Bug Report
dkg created T4608: gpgv --enable-special-filenames documentation appears to claim that it works for keyrings, but it does not.
Jul 3 2019, 9:02 PM · gpgv, Bug Report
dkg added a comment to T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver.

auto-key-retrieve happens in the context of signature verification when the certificate is missing. If no signer User ID subpacket is present in the signature, then WKD simply won't work.

Jul 3 2019, 7:11 PM · gnupg (gpg22), wkd
dkg added a comment to T4607: enable `import-clean` by default.

hm, i see your point. If you could spell out what the specific regression(s) in more detail, though, that might help us to reason about their impact.

Jul 3 2019, 6:52 PM · Feature Request
dkg added a comment to T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx`.

if you want to add a separate subcommand for that, i would be happy to abandon migrate-pubring-from-classic-gpg.

Jul 3 2019, 6:16 PM · gnupg24, gnupg (gpg23), Feature Request
dkg created T4607: enable `import-clean` by default.
Jul 3 2019, 6:05 PM · Feature Request
dkg created T4605: automatically upgrade from `pubring.gpg` to `pubring.kbx`.
Jul 3 2019, 4:25 PM · gnupg24, gnupg (gpg23), Feature Request
dkg added a comment to T4603: dirmngr WKD redirection changes paths.

I think you're suggesting accepting *any* path if the hostname of the proposed redirection matches openpgpkey.example.org when querying the WKD direct URL for an @example.org address. That would also be a fine solution from my point of view.

Jul 3 2019, 4:13 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

my initial scenario is where an adversarial keystore floods a certificate right up to (but within) the 5MiB boundary, so that the user has stored it in the keyring already. Then, the user encounters the certificate again, with revocation attached.

Jul 3 2019, 2:53 PM · Bug Report, gnupg (gpg22)
dkg added a comment to T4603: dirmngr WKD redirection changes paths.

@werner, thanks for the pointer to the report, that's certainly useful. And i'm happy that organizations like SektionEins are doing GnuPG audits and publishing their results regardless of who paid for them.

Jul 3 2019, 2:48 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
dkg added a comment to T4604: gpg 2.2 fails to download keys from a keyserver.

@jaymzh, I agree with @werner that without more information, this bug report isn't particularly actionable.

Jul 3 2019, 1:27 PM · Bug Report
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

as a separate variant: if the attacker floods the certificate with bogus self-signatures -- that is, certifications that have an issuer fingerprint or issuer key id subpacket, whether hashed or unhashed -- will that make it impossible to import any of them?

Jul 3 2019, 6:48 AM · Bug Report, gnupg (gpg22)
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

Thanks for working on this fallback, Werner.

Jul 3 2019, 12:09 AM · Bug Report, gnupg (gpg22)

Jul 2 2019

dkg added a comment to T4603: dirmngr WKD redirection changes paths.

Thanks for the pointer, @werner. Certainly we want T4590 fixed.

Jul 2 2019, 5:37 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
dkg updated the task description for T4603: dirmngr WKD redirection changes paths.
Jul 2 2019, 3:44 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
dkg created T4603: dirmngr WKD redirection changes paths.
Jul 2 2019, 3:43 PM · gnupg (gpg22), wkd, dirmngr, Bug Report

Jul 1 2019

dkg updated the task description for T4601: gpg --quiet --quick-sign-key is not quiet.
Jul 1 2019, 9:50 PM · gnupg24, gnupg (gpg23), Bug Report
dkg created T4601: gpg --quiet --quick-sign-key is not quiet.
Jul 1 2019, 9:50 PM · gnupg24, gnupg (gpg23), Bug Report
dkg updated subscribers of T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

I should add that i don't really care whose fault it is if the software is broken by some downstream. if it harms any users, and we can fix it, we should fix it, especially if the fix is easy.

Jul 1 2019, 9:13 PM · gnupg (gpg22), Bug Report, dirmngr
dkg added a comment to T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

We're writing free software, which we know that people use and modify downstream. if we know that the software has a particular sharp edge that people who are modifying it are likely to cut themselves on, we have two options:

Jul 1 2019, 9:03 PM · gnupg (gpg22), Bug Report, dirmngr
dkg reopened T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net` as "Open".

If the default keyserver is not hkps.pool.sks-keyservers.net, then @kristianf's CA certificate has no business certifying it.

Jul 1 2019, 6:31 PM · gnupg (gpg22), Bug Report, dirmngr
dkg added a comment to T4588: gpg-agent should guess pinentry's full path (using $PATH) if `pinentry-program` does not supply a full path.

So this is a defense against an adversary capable of creating a pinentry-wrapper somewhere in $PATH, but not capable of modifying gpg-agent.conf? It sounds to me like this is a defense against a very unusually-constrained attacker, at the expense of regular, common bug reports and user confusion.

Jul 1 2019, 6:24 PM · gnupg24, gpgagent
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

thanks for working on this @werner. rG2e349bb61737 is definitely not useful for me. If i am going to tell anyone "hey, do this weird thing differently in order to fetch my key", i will tell them "pull it from https://dkg.fifthhorseman.net/dkg-openpgp.key". I will never tell anyone to use import-self-sigs-only.

Jul 1 2019, 6:20 PM · Bug Report, gnupg (gpg22)
dkg created T4599: remap `--search` to `--locate-keys` (with warning).
Jul 1 2019, 6:16 PM · gnupg (gpg23), dirmngr

Jun 30 2019

dkg added a project to T4594: dirmngr appears to unilaterally import system CAs: Bug Report.
Jun 30 2019, 7:27 PM · Bug Report, dirmngr, gnupg (gpg22)
dkg added a comment to T4594: dirmngr appears to unilaterally import system CAs.

To be clear, this would allow the least competent CA in the system root trust anchor list to certify an arbitrary server as a member of hkps.pool.sks-keyservers.net. So it is in some sense a security vulnerability -- it allows for a bypass of the correct authority.

Jun 30 2019, 7:26 PM · Bug Report, dirmngr, gnupg (gpg22)
dkg committed rG1c9cc97e9d47: dirmngr: Only use SKS pool CA for SKS pool (authored by dkg).
dirmngr: Only use SKS pool CA for SKS pool
Jun 30 2019, 6:15 PM
dkg created T4594: dirmngr appears to unilaterally import system CAs.
Jun 30 2019, 6:14 PM · Bug Report, dirmngr, gnupg (gpg22)
dkg added a comment to T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

I've just pushed 1c9cc97e9d47d73763810dcb4a36b6cdf31a2254 to the branch dkg-fix-T4593

Jun 30 2019, 6:12 PM · gnupg (gpg22), Bug Report, dirmngr
dkg updated the task description for T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.
Jun 30 2019, 6:09 PM · gnupg (gpg22), Bug Report, dirmngr
dkg created T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.
Jun 30 2019, 6:09 PM · gnupg (gpg22), Bug Report, dirmngr

Jun 29 2019

dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

Note also that some keyservers like keys.openpgp.org will distribute only verified self-sigs (including revocations and subkey updates) without distributing the floodable third-party certifications. We can and should distinguish "updates-only" keyservers from discovery-by-address mecahnisms.

Jun 29 2019, 12:53 AM · Bug Report, gnupg (gpg22)

Jun 28 2019

dkg added a comment to T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.

Just importing a ~666KiB certificate when this monster certificate is in the keyring consumes over 10m of CPU time:

Jun 28 2019, 11:15 PM · gnupg (gpg23), Bug Report
dkg added a comment to T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.

Verifying a git tag from the "clean" version of this certificate takes ~225ms of CPU time. Verifying the same git tag from a keyring that contains the flooded version of the certificate takes ~145s. This is factor of more than 600×. Any automated git tag verification system can probably be DoSed by this behavior.

Jun 28 2019, 8:23 PM · gnupg (gpg23), Bug Report
dkg added a comment to T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.

I didn't mean to suggest that switching to sqlite was the only way to fix this, but if it is a promising way to fix it, that would be great. I'm sure there are other ways.

Jun 28 2019, 2:47 PM · gnupg (gpg23), Bug Report
dkg added a comment to T4590: dirmngr does not perform WKD advanced lookup.

I recognize that adding network activity to the test suite can be complicated (not all test suites are run with functional network access), but if it is possible to have a unit test or something (that doesn't do network access, but just looks at what the dirmngr *would* have tried somehow?), that would be great. Thanks for looking into this!

Jun 28 2019, 2:39 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

i'm aware of the filters you're using, but they are not a principled response to this kind of certificate flooding attack. An attacker who wants to be really abusive can easily create certifications that bypass any import-filter gpg is capable of.

Jun 28 2019, 2:32 PM · Bug Report, gnupg (gpg22)
dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

sorry to keep pinging this, but given the ongoing flooding attacks (e.g. T4591) and how SKS and similar keyservers are unable to safely transmit flooded certificates, i think this kind of fix is urgent if we expect gpg to be able to retrieve revocations safely. What's the status here?

Jun 28 2019, 10:05 AM · gnupg (gpg23), Feature Request
dkg added a comment to T3972: 100% CPU usage endles loop of gpg --list-keys.

Please see T4592 where i've reported this particular performance concern in more detail, including profiling data.

Jun 28 2019, 9:09 AM · gnupg (gpg22)
dkg added a comment to T3972: 100% CPU usage endles loop of gpg --list-keys.

For folks who encounter this problem in the future, i recommend that you first check whether you have a pubring.gpg instead of (or in addition to) your pubring.kbx. If you do have pubring.gpg, you should be able to run the pipeline to the awk script described above with just the pubring directly, which omits the time-consuming gpg --export step above. so i think that would look like:

Jun 28 2019, 9:02 AM · gnupg (gpg22)
dkg created T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.
Jun 28 2019, 8:54 AM · gnupg (gpg23), Bug Report
dkg added a project to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`: Bug Report.
Jun 28 2019, 8:33 AM · Bug Report, gnupg (gpg22)
dkg added a comment to T3972: 100% CPU usage endles loop of gpg --list-keys.

wow, 46MiB, that's even worse than mine. :( thanks for sharing the update, @jackalope. I'm glad you've worked around it for now, but sadly this kind of certificate flooding could happen at any time if you're using the SKS keyserver network :(

Jun 28 2019, 8:30 AM · gnupg (gpg22)
dkg updated the task description for T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.
Jun 28 2019, 8:18 AM · Bug Report, gnupg (gpg22)
dkg created T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.
Jun 28 2019, 8:15 AM · Bug Report, gnupg (gpg22)
dkg created T4590: dirmngr does not perform WKD advanced lookup.
Jun 28 2019, 6:29 AM · gnupg (gpg22), wkd, dirmngr, Bug Report
dkg added a comment to T3972: 100% CPU usage endles loop of gpg --list-keys.

That's a great question, @jackalope. I found this in a different misbehaving keyring recently by basically deleting keys by hand until only one was left. surprise, it was mine (ugh)! But that process is pretty slow and manual and tedious. Let me see if i can do better.

Jun 28 2019, 1:19 AM · gnupg (gpg22)

Jun 27 2019

dkg added a comment to T3972: 100% CPU usage endles loop of gpg --list-keys.

@jackalope, the place where the output is hanging is likely due to output buffering (i have been able to replicate the same problem, and the output hangs at intervals of 8192 octets). So while it is giving you a clue about where the hang is, it's not a very precise clue.

Jun 27 2019, 11:03 PM · gnupg (gpg22)
dkg added a comment to T4587: pinentry-gnome3 grabs input (is system modal) despite`--no-global-grab` or `OPTION no-grab`.

Thanks for the feedback, @werner. I think I understand the reasons that we've gotten to this place -- but that doesn't mean i think it's ok to stay here. In this bug report, i'm pointing out that the documentation and the feedback/error reporting is misleading, which leads to difficulty in debugging. We need to do something about it.

Jun 27 2019, 6:20 PM · gpgagent, pinentry
dkg created T4588: gpg-agent should guess pinentry's full path (using $PATH) if `pinentry-program` does not supply a full path.
Jun 27 2019, 5:35 PM · gnupg24, gpgagent

Jun 26 2019

dkg added a comment to T4587: pinentry-gnome3 grabs input (is system modal) despite`--no-global-grab` or `OPTION no-grab`.

I note that this is likely happening because we are using gcr's system-modal prompter. I haven't looked into whether it's even possible to use gcr in a non-system-modal way, but i'd welcome pointers.

Jun 26 2019, 8:00 PM · gpgagent, pinentry
dkg created T4587: pinentry-gnome3 grabs input (is system modal) despite`--no-global-grab` or `OPTION no-grab`.
Jun 26 2019, 7:58 PM · gpgagent, pinentry

Jun 25 2019

dkg created T4584: --quick-sign-key offers no way to override a current certification.
Jun 25 2019, 5:52 PM · Restricted Project, gnupg (gpg22), Feature Request
dkg added a comment to T4582: gpgconf homedir confusion.

i think this might be a duplicate of T4496

Jun 25 2019, 5:22 PM · Duplicate, Bug Report
dkg added a comment to T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

I'm unlikely to put a windows-specific patch into the debian source, as
i have no good way of testing it, and it wouldn't affect any binary that
we ship.

Jun 25 2019, 2:57 AM · gpgagent, gnupg, Bug Report

Jun 24 2019

dkg updated subscribers of T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

Hm, T4521 suggests that the two different cases should not be treated differently. If you think that they *should* cause distinct behavior, please do mention it over there!

Jun 24 2019, 2:24 AM · gpgagent, gnupg, Bug Report
dkg committed rGd7d1ff45574e: spelling: Fix "synchronize" (authored by dkg).
spelling: Fix "synchronize"
Jun 24 2019, 2:21 AM
dkg committed rG520f5d70e412: spelling: Fix "synchronize" (authored by dkg).
spelling: Fix "synchronize"
Jun 24 2019, 2:20 AM

Jun 21 2019

dkg added a comment to T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.

@gniibe, thanks for the diagnosis! I agree that restarting or shutting down the backends should be done in the reverse order as a simple workaround.

Jun 21 2019, 6:24 PM · gpgagent, gnupg, Bug Report

Jun 19 2019

dkg added a comment to T3464: successful decryption with session key reports failure if public key is unknown.

without feedback, i have no idea what you want to do here as upstream. I believe this issue has identified a specific failing use case, and it has a patch that fixes the problem. if there's a problem, please let me know what it is. If there's no problem, please consider merging.

Jun 19 2019, 11:21 PM · gpgme, Bug Report
dkg added a comment to T4578: python3 gpg module should offer an "encrypt" function that takes an email.message.EmailMessage and returns a new one.

I note that "the best" seems like it might be a pretty subjective thing. The standard GnuPG framing asks about the validity of keys for the User ID in question. Perhaps the caller could indicate whether they want to require full validity for each key to make this key selection more strict.

Jun 19 2019, 7:22 PM · gpgme, Python, Feature Request
dkg added a comment to T4578: python3 gpg module should offer an "encrypt" function that takes an email.message.EmailMessage and returns a new one.

The function would do something like:

  • from msg, extract all e-mail addresses from to, cc, bcc fields
  • find "the best" keys that match these addresses, storing them in keylist
  • copy msg to tmp, remove bcc header from tmp
  • wrap armored output of gpg.Context.encrypt(bytes(tmp), recipients=keylist) in the necessary RFC 3156 cladding, copying most headers from msg (maybe stubbing out the subject), producing an email.message.EmailMessage object.
Jun 19 2019, 7:19 PM · gpgme, Python, Feature Request
dkg added a comment to T4566: dirmngr fails with HTTP 302 redirection to hkps.

Any word on this? i've pushed a fix for this into debian experimental as a part of 2.2.16-2, but i am concerned that there's no adoption from upstream. If there's a reason that this is the wrong fix, please do let me know!

Jun 19 2019, 7:06 PM · gnupg (gpg22), dirmngr, Bug Report
dkg created T4578: python3 gpg module should offer an "encrypt" function that takes an email.message.EmailMessage and returns a new one.
Jun 19 2019, 6:59 PM · gpgme, Python, Feature Request
dkg created T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32.
Jun 19 2019, 3:54 PM · gpgagent, gnupg, Bug Report

Jun 18 2019

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

we now have a DCO from @Valodim

Jun 18 2019, 2:05 PM · gnupg (gpg23), Feature Request
dkg added a comment to T4512: gpg's --keyserver option should be more robustly deprecated.

If we only need it for backward compatibility, then the configuration in gpg.conf should *not* be overriding the preferred, forward-looking form of the configuration (in dirmngr.conf). If it is low priority to fix this, then there will be a generation of GnuPG users and toolchains which deliberately configure the value in gpg.conf instead of dirmngr.conf because they'll know that's the more robust way to do it.

Jun 18 2019, 2:56 AM · gnupg24, gnupg (gpg23), Documentation, Keyserver, Bug Report

Jun 16 2019

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

@werner, My usual approach for private branches is to prefix with dkg/, but (a) playfair rejects branch names with a /, and (b) i'm not the author of these patches, and i didn't want to claim credit that doesn't belong to me.

Jun 16 2019, 5:40 PM · gnupg (gpg23), Feature Request

Jun 14 2019

dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

I've pushed @Valodim's proposed patches to the fix-4393 branch in our git repo. they look good to me, and i think they should be merged to master.

Jun 14 2019, 6:08 PM · gnupg (gpg23), Feature Request
dkg committed rGf361141a4436: gpg: accept subkeys with a good revocation but no self-sig during import (authored by Valodim).
gpg: accept subkeys with a good revocation but no self-sig during import
Jun 14 2019, 6:08 PM
dkg committed rG4c40bfa90bda: tests: add test cases for import without uid (authored by Valodim).
tests: add test cases for import without uid
Jun 14 2019, 6:08 PM
dkg committed rGa1db83d8a330: gpg: allow import of previously known keys, even without UIDs (authored by Valodim).
gpg: allow import of previously known keys, even without UIDs
Jun 14 2019, 6:08 PM
dkg committed rG41d3b5df272f: gpg: accept subkeys with a good revocation but no self-sig during import (authored by Valodim).
gpg: accept subkeys with a good revocation but no self-sig during import
Jun 14 2019, 6:06 PM
dkg committed rGc86ae73950e7: gpg: allow import of previously known keys, even without UIDs (authored by Valodim).
gpg: allow import of previously known keys, even without UIDs
Jun 14 2019, 6:06 PM
dkg committed rGbfff05eea9a5: tests: add test cases for import without uid (authored by Valodim).
tests: add test cases for import without uid
Jun 14 2019, 6:06 PM
dkg committed rGcb302d66b932: gpg: allow import of previously known keys, even without UIDs (authored by Valodim).
gpg: allow import of previously known keys, even without UIDs
Jun 14 2019, 5:53 PM
dkg committed rG4565b67fa2a4: gpg: accept subkeys with a good revocation but no self-sig during import (authored by Valodim).
gpg: accept subkeys with a good revocation but no self-sig during import
Jun 14 2019, 5:53 PM
dkg committed rGe8b91282f85f: tests: add test cases for import without uid (authored by Valodim).
tests: add test cases for import without uid
Jun 14 2019, 5:53 PM
dkg committed rG6e46862abd2c: fix up 6562de7475b21cd03c7b1a83a591fa563c589f5b (authored by dkg).
fix up 6562de7475b21cd03c7b1a83a591fa563c589f5b
Jun 14 2019, 5:53 PM
dkg added a comment to rM7d0a979c07d2: python: Fix regression in t-decrypt-verify test..

I think this commit should be reverted -- if the test fails we should figure out why and fix it, because the logic of the test is correct.

Jun 14 2019, 1:02 PM
dkg added a comment to rMbd2d282e572b: python/tests: try to decrypt and verify new test data.

It also passes for me with python 2.7.16 (debian package 2.7.16-2).

Jun 14 2019, 12:05 PM
dkg added a comment to rMbd2d282e572b: python/tests: try to decrypt and verify new test data.

i think you mean t-decrypt-verify.py, right? That seems to indicate a problem on the targeted system that we ought to fix, rather than just commenting out the test. t-decrypt-verify.py passes for me when i test it with python 3.7.3 (debian python 3.7.3-1). what version of python are you testing with?

Jun 14 2019, 11:58 AM
dkg added a comment to rMbd2d282e572b: python/tests: try to decrypt and verify new test data.

Sorry for the truncated commit. the sentence should have been:

Jun 14 2019, 11:49 AM

Jun 11 2019

dkg added a comment to T4566: dirmngr fails with HTTP 302 redirection to hkps.

@gouttegd good catch!

Jun 11 2019, 9:41 AM · gnupg (gpg22), dirmngr, Bug Report
dkg committed rG6562de7475b2: doc/gpgsm: explain what "policy-file" refers to. (authored by dkg).
doc/gpgsm: explain what "policy-file" refers to.
Jun 11 2019, 9:41 AM
dkg committed rGd4dc1ee403c5: dirmngr: fix handling of HTTPS redirections during HKP (authored by dkg).
dirmngr: fix handling of HTTPS redirections during HKP
Jun 11 2019, 9:41 AM

Jun 8 2019

dkg added a comment to T4566: dirmngr fails with HTTP 302 redirection to hkps.

fwiw, the bug looks like it's in send_request in ks-engine-hkp.c, which re-uses the http_session object without re-initializing its tls_session member.

Jun 8 2019, 4:16 PM · gnupg (gpg22), dirmngr, Bug Report
dkg updated subscribers of T4566: dirmngr fails with HTTP 302 redirection to hkps.

thanks for the triage, @werner!

Jun 8 2019, 2:20 PM · gnupg (gpg22), dirmngr, Bug Report
dkg created T4566: dirmngr fails with HTTP 302 redirection to hkps.
Jun 8 2019, 6:53 AM · gnupg (gpg22), dirmngr, Bug Report
dkg reopened T4512: gpg's --keyserver option should be more robustly deprecated as "Open".

thanks for fixing that error message, @werner. As @Valodim points out in discusson about hagrid, a gpg.conf keyserver option (deprecated according to the documentation) overrides the dirmngr.conf keyserver option (not deprecated according to the documentation.

Jun 8 2019, 5:29 AM · gnupg24, gnupg (gpg23), Documentation, Keyserver, Bug Report

Jun 7 2019

dkg created T4564: gpgconf --change-options prints warning about dirmngr_ldapservers.conf when GNUPGHOME is set.
Jun 7 2019, 10:28 PM · gnupg, Bug Report