Page MenuHome GnuPG
Feed Advanced Search

Aug 10 2019

dkg added a comment to T4618: DANE OpenPGP certificate retrieval does not verify DNSSEC signatures.

WKD and DANE/OPENPGPKEY offer rather distinct properties. I'd be hard-pressed to say that one is "better" than the other without understanding the threat model and concerns of the evaluator:

Aug 10 2019, 4:24 AM · dns, dirmngr

Aug 3 2019

dkg created T4668: `gpgconf --launch gpg-agent` tells me to run `gpgconf --check-options gpg-agent`, but the latter command gives me no information.
Aug 3 2019, 7:30 PM · gnupg (gpg22), Bug Report
dkg created T4667: "gpg: deleting secret key failed: No pinentry" when in --batch mode with --pinentry=loopback.
Aug 3 2019, 7:15 PM · gnupg24, gnupg (gpg23), Bug Report
dkg added a comment to T4666: gpg --delete-secret-keys: excessive and unclear prompting, surprising outcomes.

I also observe that the text in the GUI prompts is remarkably unclear on its own. setting aside the grammar, punctuation, and wording, the prompts don't expose the usage flags set for the secret keys, which is possibly the only detail that a user with a single OpenPGP certificate would care about: "am i deleting my signing-capable subkey or my decryption-capable subkey?"

Aug 3 2019, 7:10 PM · gnupg24, gnupg (gpg23), Bug Report
dkg created T4666: gpg --delete-secret-keys: excessive and unclear prompting, surprising outcomes.
Aug 3 2019, 7:05 PM · gnupg24, gnupg (gpg23), Bug Report
dkg created T4665: gpg --delete-key of subkey leaves dangling subkey binding signature.
Aug 3 2019, 5:12 PM · gnupg (gpg22), Bug Report

Jul 31 2019

dkg created T4662: --locate-external-keys does not interact well with --no-auto-key-locate.
Jul 31 2019, 7:31 PM · gnupg (gpg22), Bug Report
dkg reopened T4661: gpg-agent "getinfo cmd_has_option" is frequently wrong as "Open".

Please update the documentation for the function in that case.

Jul 31 2019, 4:49 PM · Documentation, gpgagent
dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

Please see my explanation on gnupg-devel about why the trailing NUL is a source of pain and difficulty for would-be adopters.

Jul 31 2019, 4:45 PM · gnupg, Bug Report

Jul 29 2019

dkg created T4661: gpg-agent "getinfo cmd_has_option" is frequently wrong.
Jul 29 2019, 8:54 PM · Documentation, gpgagent

Jul 27 2019

dkg added a comment to T4658: Fix a dangling pointer in pinentry's qt/main.cpp.

I've just uploaded pinentry 1.1.0-3 to debian unstable with this fix in it.

Jul 27 2019, 6:07 AM · pinentry, Bug Report
dkg added a comment to T4658: Fix a dangling pointer in pinentry's qt/main.cpp.

@aheinecke thanks for the heads-up. i'll pull this in.

Jul 27 2019, 1:16 AM · pinentry, Bug Report

Jul 25 2019

dkg added a comment to rGfdd1567743cc: gpg,gpgsm: Handle pkdecrypt responses with or without NUL terminators.

@aheinecke

Due to socket forwarding we can have different versions of gpg-agent and gpg / gpgsm because they are on different machines and afaik we try to support it.

Jul 25 2019, 2:54 PM
dkg added a comment to rGfdd1567743cc: gpg,gpgsm: Handle pkdecrypt responses with or without NUL terminators.

fwiw, if the old gcrypt actually returned a radically different API, it should have a larger SONAME across that change, and NEED_LIBGCRYPT_VERSION should reflect a source version that forces it past that SONAME. I don't know what version of libgcrypt behaved differently -- is there a reference for that?

Jul 25 2019, 2:45 PM
dkg added a comment to rGfdd1567743cc: gpg,gpgsm: Handle pkdecrypt responses with or without NUL terminators.

I don't think there's a problem to have a long explanatory message in the main repository, as i think it makes it easier to understand, and space is not an issue.

Jul 25 2019, 2:40 PM
dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

I've just broken out my changes into two commits, one that makes gpg and gpgsm more robust. That should be applicable without any risk.

Jul 25 2019, 1:59 AM · gnupg, Bug Report
dkg committed rGfdd1567743cc: gpg,gpgsm: Handle pkdecrypt responses with or without NUL terminators (authored by dkg).
gpg,gpgsm: Handle pkdecrypt responses with or without NUL terminators
Jul 25 2019, 1:57 AM
dkg committed rGefffd9907b75: agent: Do not place a trailing NUL byte on S-expressions (authored by dkg).
agent: Do not place a trailing NUL byte on S-expressions
Jul 25 2019, 1:57 AM

Jul 24 2019

dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

I've just posted rGb84feb0c82eb to the dkg-fix-T4652 branch, which solves the failure problems by making agent_pkdecrypt and gpgsm_agent_pkdecrypt more robust.

Jul 24 2019, 6:24 AM · gnupg, Bug Report
dkg committed rGb84feb0c82eb: agent: Do not place a trailing NUL byte on S-expression (authored by dkg).
agent: Do not place a trailing NUL byte on S-expression
Jul 24 2019, 6:23 AM

Jul 23 2019

dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

fwiw, this patch appears to cause gpgsm to fail its test suite:

Jul 23 2019, 6:46 PM · gnupg, Bug Report
dkg committed rG1ae16838660a: agent: Do not place a trailing NUL byte on S-expression (authored by dkg).
agent: Do not place a trailing NUL byte on S-expression
Jul 23 2019, 5:48 PM
dkg updated the task description for T4652: avoid unnecessary trailing NUL byte in S-expressions.
Jul 23 2019, 5:46 PM · gnupg, Bug Report
dkg renamed T4647: "gpg.exe -se" fails when run programmatically, but does not fail when run from the command line from Issue with gpg.exe to "gpg.exe -se" fails when run programmatically, but does not fail when run from the command line.
Jul 23 2019, 5:43 PM · Info Needed, gpg4win, Bug Report
dkg committed rG804ca2dba258: agent: Do not place a trailing NUL byte on S-expression (authored by dkg).
agent: Do not place a trailing NUL byte on S-expression
Jul 23 2019, 5:41 PM
dkg added a comment to T4652: avoid unnecessary trailing NUL byte in S-expressions.

I've just pushed rG1ae16838660a to the dkg-fix-T4652 branch (i just adjusted it the commit message to include the GnuPG-bug-id)

Jul 23 2019, 5:40 PM · gnupg, Bug Report
dkg created T4652: avoid unnecessary trailing NUL byte in S-expressions.
Jul 23 2019, 5:37 PM · gnupg, Bug Report
dkg added a comment to T4647: "gpg.exe -se" fails when run programmatically, but does not fail when run from the command line.

This report doesn't contain enough information to be able to tell you why the command is failing within your program, but not failing outside of it.

Jul 23 2019, 5:16 AM · Info Needed, gpg4win, Bug Report

Jul 20 2019

dkg committed rG6ca2289a9d9c: dirmngr: Don't add system CAs for SKS HKPS pool. (authored by gniibe).
dirmngr: Don't add system CAs for SKS HKPS pool.
Jul 20 2019, 8:21 PM
dkg committed rG9e12829299c7: gpg: Fix keyring retrieval. (authored by gniibe).
gpg: Fix keyring retrieval.
Jul 20 2019, 8:21 PM
dkg committed rGf56d60f43bcc: gpg: Improve import slowness. (authored by gniibe).
gpg: Improve import slowness.
Jul 20 2019, 8:21 PM
dkg committed rGca820eda3248: fix spelling (authored by dkg).
fix spelling
Jul 20 2019, 8:21 PM
dkg committed rGab76d6483741: gpg: drop import-clean from default keyserver import options (authored by dkg).
gpg: drop import-clean from default keyserver import options
Jul 20 2019, 8:21 PM
dkg committed rG253024a536a3: Use hkps://keys.openpgp.org as the default keyserver (authored by dkg).
Use hkps://keys.openpgp.org as the default keyserver
Jul 20 2019, 8:21 PM
dkg committed rG4c9bfbe23877: Make gpg-zip use tar from $PATH (authored by dkg).
Make gpg-zip use tar from $PATH
Jul 20 2019, 8:21 PM
dkg committed rGe70841404d72: gpg: allow import of previously known keys, even without UIDs (authored by Valodim).
gpg: allow import of previously known keys, even without UIDs
Jul 20 2019, 8:21 PM
dkg committed rGb2605ad61451: gpg: accept subkeys with a good revocation but no self-sig during import (authored by Valodim).
gpg: accept subkeys with a good revocation but no self-sig during import
Jul 20 2019, 8:21 PM
dkg committed rG2627cd5e54ab: tests: add test cases for import without uid (authored by Valodim).
tests: add test cases for import without uid
Jul 20 2019, 8:21 PM
dkg committed rG263a07f04d13: dirmngr: Only use SKS pool CA for SKS pool (authored by dkg).
dirmngr: Only use SKS pool CA for SKS pool
Jul 20 2019, 8:21 PM
dkg committed rGa446c4db9574: gpg: Default to SHA-512 for all signature types on RSA keys. (authored by dkg).
gpg: Default to SHA-512 for all signature types on RSA keys.
Jul 20 2019, 8:21 PM
dkg committed rG7576681260e6: gpg: Prefer SHA-512 and SHA-384 in personal-digest-preferences. (authored by dkg).
gpg: Prefer SHA-512 and SHA-384 in personal-digest-preferences.
Jul 20 2019, 8:21 PM
dkg committed rGf7c787285335: gpg: default to AES-256. (authored by dkg).
gpg: default to AES-256.
Jul 20 2019, 8:21 PM
dkg committed rG9420c525db20: gpg: default to 3072-bit RSA keys. (authored by dkg).
gpg: default to 3072-bit RSA keys.
Jul 20 2019, 8:21 PM
dkg committed rGd369f30f319f: agent: Allow threads to interrupt main select loop with SIGCONT. (authored by dkg).
agent: Allow threads to interrupt main select loop with SIGCONT.
Jul 20 2019, 8:21 PM
dkg committed rGb76dacf10dd3: agent: Avoid scheduled checks on socket when inotify is working. (authored by dkg).
agent: Avoid scheduled checks on socket when inotify is working.
Jul 20 2019, 8:21 PM
dkg committed rGe7e570809146: agent: Avoid tight timer tick when possible. (authored by dkg).
agent: Avoid tight timer tick when possible.
Jul 20 2019, 8:21 PM
dkg committed rG38ab07d34464: dirmngr: Avoid automatically checking upstream swdb. (authored by dkg).
dirmngr: Avoid automatically checking upstream swdb.
Jul 20 2019, 8:21 PM
dkg committed rG758212d3b25e: agent: Create framework of scheduled timers. (authored by dkg).
agent: Create framework of scheduled timers.
Jul 20 2019, 8:21 PM
dkg committed rG4e63d9c07c43: dirmngr: Avoid need for hkp housekeeping. (authored by dkg).
dirmngr: Avoid need for hkp housekeeping.
Jul 20 2019, 8:21 PM
dkg committed rG337ae2374e79: Avoid simple memory dumps via ptrace (authored by dkg).
Avoid simple memory dumps via ptrace
Jul 20 2019, 8:21 PM
dkg committed rG24507b15672d: dirmngr: hkp: Avoid potential race condition when some hosts die. (authored by dkg).
dirmngr: hkp: Avoid potential race condition when some hosts die.
Jul 20 2019, 8:21 PM
dkg added a comment to T4393: GnuPG should always accept key updates even if the update does not contain UIDs.

@werner wrote:

Other tasks in master are right now more important.

Jul 20 2019, 1:39 AM · gnupg (gpg23), Feature Request

Jul 18 2019

dkg committed rE732855a48370: build: Use {CFLAGS,CPPFLAGS, LDFLAGS}_FOR_BUILD for helper programs (authored by dkg).
build: Use {CFLAGS,CPPFLAGS, LDFLAGS}_FOR_BUILD for helper programs
Jul 18 2019, 5:49 PM
dkg added a comment to T4643: gpgrt: enable the environment to set compiler and linker flags for helper tools.

I've just pushed rE732855a483709345a5c0f49504f45cb8da3f883a to dkg-fix-T4643 in the gpg-error git repository. I don't know why it is not yet visible here.

Jul 18 2019, 5:31 PM · gpgrt, Feature Request
dkg created T4643: gpgrt: enable the environment to set compiler and linker flags for helper tools.
Jul 18 2019, 5:21 PM · gpgrt, Feature Request
dkg added a comment to rA98d7c7ea3f37: build: Use {CFLAGS,CPPFLAGS,LDFLAGS}_FOR_BUILD for helper programs..

CC_FOR_BUILD is defined in configure.ac as build system C compiler, not build system C compiler and flags.

Jul 18 2019, 4:35 PM
dkg added a comment to T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned.

I'm aware of you releasing an RC for comments, and i apologize for not catching this particular case earlier. As you know from T4607, i was even advocating for it. i didn't understand the full implications of the "import-then-clean" approach at the time, and was thinking it would only apply to the incoming material, not the stored material.

Jul 18 2019, 4:26 PM · Keyserver, gnupg (gpg22), Bug Report
dkg committed rA45f01593d4ce: pass through {CFLAGS,CPPFLAGS,LDFLAGS}_FOR_BUILD when creating helper programs (authored by dkg).
pass through {CFLAGS,CPPFLAGS,LDFLAGS}_FOR_BUILD when creating helper programs
Jul 18 2019, 12:57 AM
dkg added a comment to T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned.

i've merged a variant of rGbe99eec2b105eb5f8e3759147ae351dcc40560ad into the GnuPG packaging in debian unstable as of version 2.2.17-3 to avoid the risks of data loss and signature verification failures. I'll revert it if i see the concern addressed upstream.

Jul 18 2019, 12:17 AM · Keyserver, gnupg (gpg22), Bug Report

Jul 17 2019

dkg added a comment to T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.

@gniibe, thank you for backporting this to STABLE-BRANCH-2-2!

Jul 17 2019, 10:25 PM · gnupg (gpg23), Bug Report
dkg added a comment to T4641: Libassuan: enable the environment to set compiler and linker flags for helper tools.

I don't know why dkg-fix-T4641 is not showing up here on the assuan git repo.

Jul 17 2019, 9:11 PM · Restricted Project, libassuan, Feature Request
dkg added a comment to T4641: Libassuan: enable the environment to set compiler and linker flags for helper tools.

I've just pushed rA45f01593d4ce794ae3562359aee2ff80c97e368e to the dkg-fix-T4641 branch that resolves this.

Jul 17 2019, 7:31 PM · Restricted Project, libassuan, Feature Request
dkg created T4641: Libassuan: enable the environment to set compiler and linker flags for helper tools.
Jul 17 2019, 7:29 PM · Restricted Project, libassuan, Feature Request
dkg added a comment to T4632: Make it easier to cross-compile gpg-error.

Thanks for the feedback. I'll go ahead and close any tickets that come in via debian that expect to be able to cross compile without having at least once had a native compiler on the platform to generate the appropriate lock-obj-pub-*.h.

Jul 17 2019, 7:05 PM · gpgrt, Feature Request
dkg created T4635: ship gpgscm and necessary *.scm files from gpgrt.
Jul 17 2019, 2:12 AM · Tests, gpgrt, Feature Request
dkg added a comment to T3389: canonical OpenPGP certificate export.

@stm it kind of is a last-resort already, given that it's only in the event where the signature creation dates are equal, but sure, i wouldn't mind adjusting the proposal to say that (sigs) means "sort by date, then issuer, then binary content" -- but what do we think "sort by issuer" means?

Jul 17 2019, 1:28 AM · gnupg, Feature Request
dkg created T4634: "gpg --quiet --quick-gen-key" is not quiet: emits "key $FPR marked as ultimately trusted" to stderr..
Jul 17 2019, 1:01 AM · gnupg (gpg22), Bug Report
dkg added a comment to T4601: gpg --quiet --quick-sign-key is not quiet.

does the removal of the gpg22 tag mean that it will not be possible to rely on colon-delimited output for the gpg 2.2 series?

Jul 17 2019, 12:56 AM · gnupg24, gnupg (gpg23), Bug Report
dkg created T4633: gpg argument "--passphrase=" yields 'missing argument for option "--passphrase="'.
Jul 17 2019, 12:53 AM · Restricted Project, gnupg (gpg22), Bug Report

Jul 16 2019

dkg created T4632: Make it easier to cross-compile gpg-error.
Jul 16 2019, 11:18 PM · gpgrt, Feature Request
dkg added a comment to T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

Just a note that we're now shipping this patch in debian unstable. It would be great if it was merged upstream.

Jul 16 2019, 8:08 PM · gnupg (gpg22), Bug Report, dirmngr
dkg added a comment to T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned.

that pseudocode is strange to me -- it looks like you have (two) duplicate calls to clean_key (imported_keyblock) (though maybe i just don't know what .... means in this pseudocode).

Jul 16 2019, 6:36 PM · Keyserver, gnupg (gpg22), Bug Report

Jul 15 2019

dkg committed rGbe99eec2b105: gpg: drop import-clean from default keyserver import options (authored by dkg).
gpg: drop import-clean from default keyserver import options
Jul 15 2019, 10:36 PM
dkg added a comment to T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned.

I think dropping import-clean from the default keyserver options is the right way to go. It is not clear what additional benefit import-clean provides given that we are already using self-sigs-only. And the idea of non-additive behavior to the local keyring when pulling from a keyserver is a deeply surprising change for multiple users i've talked to.

Jul 15 2019, 10:35 PM · Keyserver, gnupg (gpg22), Bug Report
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

The fact that import-clean modifies already-held certifications makes me think it is inappropriate to have as the default for keyserver access (see T4628 for more details).

Jul 15 2019, 7:34 PM · Bug Report, gnupg (gpg22)
dkg added a comment to T4607: enable `import-clean` by default.

Due to T4628, i no longer think that import-clean is a good idea by default.

Jul 15 2019, 7:29 PM · Feature Request
dkg created T4628: new import-clean default for keys from keyservers modifies the local keyring when anything is returned.
Jul 15 2019, 7:09 PM · Keyserver, gnupg (gpg22), Bug Report
dkg created T4627: "gpg --verbose --list-secret-keys" prints a lot of warning messages unrelated to secret keys.
Jul 15 2019, 5:17 PM · gnupg (gpg22), Bug Report
dkg added a comment to T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.

I am proposing to backport rG33c17a8008c3ba3bb740069f9f97c7467f156b54 and rGa7a043e82555a9da984c6fb01bfec4990d904690 to STABLE-BRANCH-2-2 as they represent a significant performance improvement in several specific use cases and appear to have no downsides.

Jul 15 2019, 5:07 PM · gnupg (gpg23), Bug Report
dkg added a comment to T4615: gpg.exe very slow.

If you're on a platform that has awk available (any GNU/Linux and macOS should provide it), you can scan for the largest OpenPGP certificate in your keyring with an awk script i posted over at https://dev.gnupg.org/T3972#127356

Jul 15 2019, 4:57 PM · Bug Report, gpg4win
dkg created T4624: libassuan-config and libassuan.pc both put -lws2_32 before -lgpg-error, which fails during static linking.
Jul 15 2019, 6:36 AM · Restricted Project, Windows, libassuan, Bug Report
dkg updated the task description for T4623: pkg-config for mingw needs to emit -lws2_32.
Jul 15 2019, 6:01 AM · Restricted Project, Windows, gpgrt, Bug Report
dkg created T4623: pkg-config for mingw needs to emit -lws2_32.
Jul 15 2019, 5:47 AM · Restricted Project, Windows, gpgrt, Bug Report
dkg added a comment to T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.

@gniibe, the documentation (at least on the stable branch) says that --fast-import is just a synonym for --import. is that incorrect?

Jul 15 2019, 4:26 AM · gnupg (gpg23), Bug Report

Jul 14 2019

dkg added a project to T4617: Odd behavior for HTTP(S) scheme in --keyserver config: Documentation.
Jul 14 2019, 6:49 PM · Documentation, Keyserver, dirmngr

Jul 12 2019

dkg added a comment to T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.

with @gniibe's patches applied, i profiled the --import, since that is where the largest CPU cost remains. I tried two different times:

Jul 12 2019, 2:56 PM · gnupg (gpg23), Bug Report
dkg added a comment to T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.

i also checked the CPU time for git tag -v, whether @gniibe's patches were applied or not.

Jul 12 2019, 6:21 AM · gnupg (gpg23), Bug Report
dkg added a comment to T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.

fwiw, i tried gpg --import on the ascii-armored version of my C4BC2DDB38CCE96485EBE9C2F20691179038E5C6 OpenPGP certificate (22895014 octets, 54614 certifications), followed by gpg --list-keys and gpg --export | wc. I was comparing 2.2.17-1 (from the debian package in unstable) with the exact same source, just with @gniibe's two patches rG33c17a8008c3 and rGa7a043e82555 applied as well. I did this with GNUPGHOME set to an otherwise empty directory, where i had done touch pubring.gpg to avoid the keybox format. (the two runs did not share a GNUPGHOME).

Jul 12 2019, 6:11 AM · gnupg (gpg23), Bug Report
dkg committed rGd10bb027e481: doc: fix spelling (authored by dkg).
doc: fix spelling
Jul 12 2019, 3:29 AM

Jul 10 2019

dkg added a comment to T4618: DANE OpenPGP certificate retrieval does not verify DNSSEC signatures.

I agree, many currently-shipped DNS client library implementations do not provide DNSSEC validity checks.

Jul 10 2019, 9:44 PM · dns, dirmngr
dkg created T4618: DANE OpenPGP certificate retrieval does not verify DNSSEC signatures.
Jul 10 2019, 6:48 PM · dns, dirmngr
dkg added projects to T4617: Odd behavior for HTTP(S) scheme in --keyserver config: dirmngr, Keyserver.
Jul 10 2019, 6:11 PM · Documentation, Keyserver, dirmngr
dkg added a comment to T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.

(i think that rG33c17a8008c3ba3bb740069f9f97c7467f156b54 is also relevant, though it was not tagged with this ticket)

Jul 10 2019, 6:10 PM · gnupg (gpg23), Bug Report
dkg added a comment to T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.

@gniibe -- thank you very much for tracking down these O(N^2) operations and cleaning them up. I will profile the effect of those changes and report my findings.

Jul 10 2019, 6:09 PM · gnupg (gpg23), Bug Report
dkg added a comment to T4617: Odd behavior for HTTP(S) scheme in --keyserver config.

aiui, a keyserver scheme of https:// implies that the specific URL is to be queried directly, not using any of the HKPS URL path patterns.

Jul 10 2019, 5:03 PM · Documentation, Keyserver, dirmngr

Jul 8 2019

dkg added a comment to T4276: Context.decrypt() throws an error if *any* signature is bad.

yes, python2.7 and python3.7

Jul 8 2019, 5:55 PM · gpgme, Python, Bug Report
dkg reopened T4276: Context.decrypt() throws an error if *any* signature is bad as "Open".

rM7d0a979c07d2 disabled the test for this. @werner says:

Jul 8 2019, 4:38 AM · gpgme, Python, Bug Report

Jul 5 2019

dkg added a comment to T4607: enable `import-clean` by default.

This is especially relevant if you are not going to implement the fallback to import-clean that was proposed in T4591.

Jul 5 2019, 5:58 PM · Feature Request
dkg added a comment to T4607: enable `import-clean` by default.

I see that you have lowered the WKD limit to 64KiB with 6396f8d115f21ae15571b683e9ac9d1d7e3f44f4 -- i think this is a mistake, as reasonable certificates can be several times that size (e.g. zack's cleaned certificate, mentioned above). I'd prefer a limit of 256KiB.

Jul 5 2019, 5:56 PM · Feature Request
dkg added a comment to T3464: successful decryption with session key reports failure if public key is unknown.

why is this fix not relevant for the 2.2 stable branch? I've had no feedback on this proposed patch.

Jul 5 2019, 5:51 PM · gpgme, Bug Report