Page MenuHome GnuPG
Feed All Stories

Jul 3 2019

werner added a comment to T4590: dirmngr does not perform WKD advanced lookup.

Oh dear, that happens if one is always on master. I simply forgot to cherry pick the change from master back in November.
Two commits, though.

Jul 3 2019, 3:45 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
werner committed rG2c6d94702a67: dirmngr: Fix previous commit (authored by werner).
dirmngr: Fix previous commit
Jul 3 2019, 3:44 PM
werner committed rG458973f502b9: dirmngr: Support the new WKD draft with the openpgpkey subdomain. (authored by werner).
dirmngr: Support the new WKD draft with the openpgpkey subdomain.
Jul 3 2019, 3:43 PM
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

my initial scenario is where an adversarial keystore floods a certificate right up to (but within) the 5MiB boundary, so that the user has stored it in the keyring already. Then, the user encounters the certificate again, with revocation attached.

Jul 3 2019, 2:53 PM · Bug Report, gnupg (gpg22)
dkg added a comment to T4603: dirmngr WKD redirection changes paths.

@werner, thanks for the pointer to the report, that's certainly useful. And i'm happy that organizations like SektionEins are doing GnuPG audits and publishing their results regardless of who paid for them.

Jul 3 2019, 2:48 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
historic_bruno added a comment to T4597: Support GCM modes for ntbtls..
Jul 3 2019, 2:22 PM · Restricted Project, Feature Request, ntbtls
dkg added a comment to T4604: gpg 2.2 fails to download keys from a keyserver.

@jaymzh, I agree with @werner that without more information, this bug report isn't particularly actionable.

Jul 3 2019, 1:27 PM · Bug Report
werner changed the status of T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx` from Testing to Open.

I don't think so. The fallback mechnanism will still work and remove everything but valid self-signatures. This gives enough space to write the keyblock with the new revocation certificates. I am not sure about designated revokers in this case.

Jul 3 2019, 9:59 AM · Bug Report, gnupg (gpg22)
werner added a comment to T4603: dirmngr WKD redirection changes paths.

See https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html for details. In short they fear that companies using IP based security for internal services can be attacked via redirect request and in particular becuase that can happen in the background without the user noticing. I am not concerned but we had long lasting discussions also with protonmail about this and the result was that we need to have this protection. We do not know who requested and paid for the audit from SektionEins and they won't tell us.

Jul 3 2019, 9:44 AM · gnupg (gpg22), wkd, dirmngr, Bug Report
werner closed T4604: gpg 2.2 fails to download keys from a keyserver as Invalid.

I do not understand your problem: The keyserver does not carry or is willing to send you the requested key. Note that keyservers are for a year now under heady DoS attack and only a few are remaining. I will close this report, please re-open if you figure that it might be a bug in GnuPG.

Jul 3 2019, 9:37 AM · Bug Report
gniibe committed rT7b2c4d9dd50b: Support GCM. (authored by gniibe).
Support GCM.
Jul 3 2019, 8:11 AM
jaymzh updated the task description for T4604: gpg 2.2 fails to download keys from a keyserver.
Jul 3 2019, 7:13 AM · Bug Report
jaymzh renamed T4604: gpg 2.2 fails to download keys from a keyserver from gpg 2.2 fails to create a new keybox properly to gpg 2.2 fails to download keys from a keyserver.
Jul 3 2019, 7:11 AM · Bug Report
jaymzh created T4604: gpg 2.2 fails to download keys from a keyserver.
Jul 3 2019, 7:08 AM · Bug Report
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

as a separate variant: if the attacker floods the certificate with bogus self-signatures -- that is, certifications that have an issuer fingerprint or issuer key id subpacket, whether hashed or unhashed -- will that make it impossible to import any of them?

Jul 3 2019, 6:48 AM · Bug Report, gnupg (gpg22)
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

Thanks for working on this fallback, Werner.

Jul 3 2019, 12:09 AM · Bug Report, gnupg (gpg22)

Jul 2 2019

JW-D added a comment to T4517: de-mail and GPG with Smart Card no decryption.

Thanks, this is excellent news! I´ll check it, if the new Mailvelope version is available and I´ll let you know about the outcome. If the new version is released, let me know!

Jul 2 2019, 8:27 PM · Bug Report, gpg4win
Valodim added a comment to T4597: Support GCM modes for ntbtls..

Done. Hopefully this works now :)

Jul 2 2019, 5:39 PM · Restricted Project, Feature Request, ntbtls
dkg added a comment to T4603: dirmngr WKD redirection changes paths.

Thanks for the pointer, @werner. Certainly we want T4590 fixed.

Jul 2 2019, 5:37 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
mkrambach added a comment to T4517: de-mail and GPG with Smart Card no decryption.

This seems to be the same issue as the one opened in mailvelope. https://github.com/mailvelope/mailvelope/issues/679.

Jul 2 2019, 4:47 PM · Bug Report, gpg4win
werner added a comment to T4597: Support GCM modes for ntbtls..

Anything using CBC mode - ECC is just fine.

Jul 2 2019, 4:19 PM · Restricted Project, Feature Request, ntbtls
werner added a comment to T4603: dirmngr WKD redirection changes paths.

We need to rewrite the Location to avoid a CSRF attack. See fa1b1eaa4241ff3f0634c8bdf8591cbc7c464144

Jul 2 2019, 4:18 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
Valodim added a comment to T4597: Support GCM modes for ntbtls..

Which is a bad idea because CBC is still a very common cipher mode.

Jul 2 2019, 4:02 PM · Restricted Project, Feature Request, ntbtls
kloczek added a comment to T4602: 2.2.16: test suite fails.

I cannot do that because all listed above packages are my own products.
Fedora is not execution test suites in more than 90% of all packages so they are not aware of most of the issues exposed by test suites.
Please focus on possible causes of above tests.
I'm opened on any suggestions to make additional diagnostics.

Jul 2 2019, 4:02 PM · Fedora, gnupg, Bug Report
dkg updated the task description for T4603: dirmngr WKD redirection changes paths.
Jul 2 2019, 3:44 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
dkg created T4603: dirmngr WKD redirection changes paths.
Jul 2 2019, 3:43 PM · gnupg (gpg22), wkd, dirmngr, Bug Report
werner triaged T4602: 2.2.16: test suite fails as Low priority.

Thanks. You may want to ask on the mailing list gnupg-users to see whether someone else has had problems building on rawhide. Right now we do not have the time for individual support and thus I unfortunately need to prioritize this bug report down.

Jul 2 2019, 3:43 PM · Fedora, gnupg, Bug Report
aheinecke added a comment to T4596: GpgOL: S/MIME Mails with invalid CRL's are not detected as signed when forwarding.

This issues is not really about the CRL's. GpgOL should not activate the EFail protection if a CRL check fails. That is the issue here.

Jul 2 2019, 3:35 PM · gpg4win, gpgol
kloczek added a comment to T4602: 2.2.16: test suite fails.
[tkloczko@barrel SPECS]$ uname -a
Linux barrel 5.1.5-300.fc30.x86_64 #1 SMP Sat May 25 18:00:11 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
[tkloczko@barrel SPECS]$ rpm -q libassuan-devel libcurl-devel libgcrypt-devel libgpg-error-devel libksba-devel libusb-devel npth-devel openldap-devel pcsc-lite-libs gnutls-devel sqlite-devel
libassuan-devel-2.5.3-2.1.fc31.x86_64
libcurl-devel-7.65.1-2.fc31.x86_64
libgcrypt-devel-1.8.4-4.1.fc31.x86_64
libgpg-error-devel-1.36-2.fc31.x86_64
libksba-devel-1.3.5-10.1.fc31.x86_64
libusb-devel-0.1.5-14.fc30.x86_64
npth-devel-1.6-3.fc31.x86_64
openldap-devel-2.4.47-2.2.fc31.x86_64
pcsc-lite-libs-1.8.25-2.1.fc31.x86_64
gnutls-devel-3.6.8-2.fc31.x86_64
sqlite-devel-3.28.0-2.fc31.x86_64

Still about half of the packages are from Fedora rawhide but rest are mine.
Just checked and the test suite fails exactly the same way even started without palatalisation.

Jul 2 2019, 3:11 PM · Fedora, gnupg, Bug Report
werner added a comment to T4596: GpgOL: S/MIME Mails with invalid CRL's are not detected as signed when forwarding.

We need to know the issuers of the CRLs under question.

Jul 2 2019, 10:01 AM · gpg4win, gpgol
werner added a comment to T4596: GpgOL: S/MIME Mails with invalid CRL's are not detected as signed when forwarding.

See also T4538 which we can only fix in 2.2 after we have checked that this does not break the VS-NfD approval.

Jul 2 2019, 10:01 AM · gpg4win, gpgol
werner changed the status of T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx` from Open to Testing.

Also pushed to 2.2. Right now I can't see what else can be done, so I change the status to testing.

Jul 2 2019, 9:35 AM · Bug Report, gnupg (gpg22)
werner added a comment to T4602: 2.2.16: test suite fails.

Please share with us the OS used, the versions of the libtaries used and other configuration information.
Also please run again using "make check" without any extra options.

Jul 2 2019, 9:32 AM · Fedora, gnupg, Bug Report
werner committed rGa1f2f38dfb2b: gpg: Fallback to import with self-sigs-only on too large keyblocks. (authored by werner).
gpg: Fallback to import with self-sigs-only on too large keyblocks.
Jul 2 2019, 9:28 AM
kloczek created T4602: 2.2.16: test suite fails.
Jul 2 2019, 9:00 AM · Fedora, gnupg, Bug Report
MathisW added a comment to T4572: Kleopatra unable to import public key.

Kleopatra was already using this keyserver at the time i took the screenshots, which is why i opened the ticket since it was working in the command line.

Jul 2 2019, 7:11 AM · kleopatra, Bug Report, gpg4win

Jul 1 2019

werner triaged T4598: curses: dialog broken with wide characters as Normal priority.
Jul 1 2019, 9:59 PM · pinentry
werner triaged T4601: gpg --quiet --quick-sign-key is not quiet as Normal priority.
Jul 1 2019, 9:58 PM · gnupg24, gnupg (gpg23), Bug Report
werner committed rG3a403ab04eeb: gpg: Fallback to import with self-sigs-only on too large keyblocks. (authored by werner).
gpg: Fallback to import with self-sigs-only on too large keyblocks.
Jul 1 2019, 9:57 PM
dkg updated the task description for T4601: gpg --quiet --quick-sign-key is not quiet.
Jul 1 2019, 9:50 PM · gnupg24, gnupg (gpg23), Bug Report
dkg created T4601: gpg --quiet --quick-sign-key is not quiet.
Jul 1 2019, 9:50 PM · gnupg24, gnupg (gpg23), Bug Report
werner triaged T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx` as High priority.
Jul 1 2019, 9:44 PM · Bug Report, gnupg (gpg22)
werner added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

I implemented that in master. The first output is from an update of your key and the second from an insert of a new key.

Jul 1 2019, 9:44 PM · Bug Report, gnupg (gpg22)
werner triaged T4588: gpg-agent should guess pinentry's full path (using $PATH) if `pinentry-program` does not supply a full path as Normal priority.
Jul 1 2019, 9:34 PM · gnupg24, gpgagent
werner added a comment to T4588: gpg-agent should guess pinentry's full path (using $PATH) if `pinentry-program` does not supply a full path.

As I said we do this with all GnuPG components. Pinentry is a bit of exception because it is an external package.
I have also had bug reports which later turned out that a wrong pinentry was used; I prefer to know eactly which pinentry is used. Regarding your concrete problem I suggested to add a note with the full name of the pinentry or to change the error message to something better understandable.

Jul 1 2019, 9:34 PM · gnupg24, gpgagent
werner removed a project from T4573: Files encrypted on another platform using password based encryption (-c) intermittently fail to decrypt on Kleopatra: kleopatra.

That won't be easy to debug unless we have intermediate debug values from the generating implementation. That IBM Encryption Facility looks partly similar in the command line options to gpg so I wonder whether it will be possible to get some debug output. @mrdave19: we can continue by private mail in case that is helpful for you (wk at g10code com)

Jul 1 2019, 9:29 PM · gnupg (gpg22), Bug Report
werner triaged T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net` as Low priority.
Jul 1 2019, 9:18 PM · gnupg (gpg22), Bug Report, dirmngr
dkg updated subscribers of T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

I should add that i don't really care whose fault it is if the software is broken by some downstream. if it harms any users, and we can fix it, we should fix it, especially if the fix is easy.

Jul 1 2019, 9:13 PM · gnupg (gpg22), Bug Report, dirmngr
dkg added a comment to T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

We're writing free software, which we know that people use and modify downstream. if we know that the software has a particular sharp edge that people who are modifying it are likely to cut themselves on, we have two options:

Jul 1 2019, 9:03 PM · gnupg (gpg22), Bug Report, dirmngr
werner added a comment to T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

Come on, if someone changes the software and breaks it, it is their's fault ant not ours. The whole thing on which keyserver and certificate to use as been discussed ad nausea in the past. Given all the problems with the keyservers I do not see a reason to change it right away to a state we had before. Keyserver code is pretty hard to test and has thus always been prone to regressions.

Jul 1 2019, 8:05 PM · gnupg (gpg22), Bug Report, dirmngr
werner triaged T4600: dirmngr enters a loop when the keyserver returns 503 error as High priority.

(See T4175 why this changed in 2.2.12.)

Jul 1 2019, 8:00 PM · gnupg (gpg22), dirmngr, Bug Report
werner added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

Even if you can't use it the option is still useful to avoid other kinds of DoS. As written in the comments it is not a full solution but it helps to side-step issues with key-signature. In particular for sites which do not have a need for them.
BTW, revocation certificates are still merged with the new option.

Jul 1 2019, 7:54 PM · Bug Report, gnupg (gpg22)
werner claimed T4599: remap `--search` to `--locate-keys` (with warning).
Jul 1 2019, 7:31 PM · gnupg (gpg23), dirmngr
allpond added a comment to T4581: Kleopatra stuck in loading the certificate cache.

Hello,

I have no idea – I’m not familiar with cmd.exe – Do you have step by step instructions on how to do this?

Many thanks,

Chris Baillon
Digital Marketing Manager

Mainline Tel: +44 (0)1895 813 000
Fax: +44 (0)1895 200 541
E: chris.baillon@allpondsolutions.co.uk<mailto:chris.baillon@allpondsolutions.co.uk>
[cid:image013.jpg@01D48584.F61733C0]
[cid:image014.jpg@01D48584.F61733C0]https://www.facebook.com/allpond/[cid:image015.jpg@01D48584.F61733C0]https://www.instagram.com/allpondsolutions/

[cid:image016.jpg@01D48584.F61733C0]
[cid:image017.jpg@01D48584.F61733C0]https://www.facebook.com/allpetsolutions/[cid:image018.jpg@01D48584.F61733C0]https://www.instagram.com/allpetsolutions/

W: www.allpondsolutions.co.ukhttp://www.allpondsolutions.co.uk/

W: www.allpetsolutions.co.ukhttp://www.allpetsolutions.co.uk/

All Pet Solutions Ltd is a company registered in England and Wales.
Unit 203| Riverside Way | Uxbridge| UB8 2YF


Please consider the environment before printing this e-mail.


This email, including attachments may be privileged, confidential and is intended exclusively for the addressee. The views expressed may not be official policy, but the personal views of the originator. If you have received this email in error please notify the sender and delete it from your system. Emails are not secure and may contain viruses. No liability can be accepted for viruses that might be transferred by this email or any attachment.

All Pet Solutions Ltd. Registered office: 22 Wycombe End, Beaconsfield, Buckinghamshire, England, HP9 1NB. Registered in England and Wales. Registered No. 05678076

From: aheinecke (Andre Heinecke) <noreply@dev.gnupg.org>
Sent: 01 July 2019 07:44
To: Chris Baillon <Chris.Baillon@allpondsolutions.co.uk>
Subject: [Task] [Claimed] T4581: Kleopatra stuck in loading the certificate cache

aheinecke triaged this task as "Normal" priority.
aheinecke claimed this task.
aheinecke added a comment.

Hi,

can you please open the console (cmd.exe) and do a "gpg -K" and "gpgsm -K"

do these commands list all your secret keys or do they hang?

Also please try killing the process "gpg-agent.exe" through the Task manager and try to open Kleopatra again.

Regards,
Andre

TASK DETAIL
https://dev.gnupg.org/T4581

EMAIL PREFERENCES
https://dev.gnupg.org/settings/panel/emailpreferences/

To: aheinecke

Cc: aheinecke, allpond, Neurone, Rafixmod, Fox, ccharabaruk, gp_ast

This is an automated email from the GnuPG development hub. If you have registered in the past at https://bugs.gnupg.org/ your account was migrated automatically. You can visit https://dev.gnupg.org/ to set a new password and update your email preferences.

Jul 1 2019, 6:32 PM · gpg4win, kleopatra, Bug Report
dkg reopened T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net` as "Open".

If the default keyserver is not hkps.pool.sks-keyservers.net, then @kristianf's CA certificate has no business certifying it.

Jul 1 2019, 6:31 PM · gnupg (gpg22), Bug Report, dirmngr
mrdave19 added a comment to T4573: Files encrypted on another platform using password based encryption (-c) intermittently fail to decrypt on Kleopatra.

Welcome back from vacation!
@aheinecke Yes I am 1000% sure the passphrase is "dave" without the quotes.
These are the commands I use for the encrypt using the IBM Encryption Facility:

-o '/home/suimgwy/_july1.pbe' \
-s2k-cipher-name AES_256 -s2k-digest-name SHA256 -s2k-mode 3 \
-s2k-passphrase dave \
-t ISO-8859-1 \
-use-mdc \
-c '/home/suimgwy/_input.txt'
<<<

Jul 1 2019, 6:31 PM · gnupg (gpg22), Bug Report
dkg added a comment to T4588: gpg-agent should guess pinentry's full path (using $PATH) if `pinentry-program` does not supply a full path.

So this is a defense against an adversary capable of creating a pinentry-wrapper somewhere in $PATH, but not capable of modifying gpg-agent.conf? It sounds to me like this is a defense against a very unusually-constrained attacker, at the expense of regular, common bug reports and user confusion.

Jul 1 2019, 6:24 PM · gnupg24, gpgagent
dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

thanks for working on this @werner. rG2e349bb61737 is definitely not useful for me. If i am going to tell anyone "hey, do this weird thing differently in order to fetch my key", i will tell them "pull it from https://dkg.fifthhorseman.net/dkg-openpgp.key". I will never tell anyone to use import-self-sigs-only.

Jul 1 2019, 6:20 PM · Bug Report, gnupg (gpg22)
t8m created T4600: dirmngr enters a loop when the keyserver returns 503 error.
Jul 1 2019, 6:20 PM · gnupg (gpg22), dirmngr, Bug Report
dkg created T4599: remap `--search` to `--locate-keys` (with warning).
Jul 1 2019, 6:16 PM · gnupg (gpg23), dirmngr
werner renamed T4597: Support GCM modes for ntbtls. from TLS handshake failed: Fatal alert message received (hkps://keys.openpgp.org, Windows, GPG4Win 3.1.9, NTBTLS 0.1.2) to Support GCM modes for ntbtls..
Jul 1 2019, 5:48 PM · Restricted Project, Feature Request, ntbtls
werner triaged T4597: Support GCM modes for ntbtls. as Normal priority.

They can't agree on a common ciphersuite. The reason is that the server does not support any CBC mode. Which is a bad idea because CBC is still a very common cipher mode.

Jul 1 2019, 5:46 PM · Restricted Project, Feature Request, ntbtls
t8m added a comment to T1333: GPGSM rejects OCSP responder cert without keyUsage.

Ping?

Jul 1 2019, 5:40 PM · Bug Report, gnupg
werner added a comment to T3321: Make it possible to combine GpgMEpp and QGpgme with MSVC compiled binaries.

Okay, so the open task is to build gpgme with MSVC in a way that different libnames are used and that we can distribute them along our standard DLLs? Given the easy we can now ssh into Windows there won't be a need to Wine things.

Jul 1 2019, 3:38 PM · Feature Request, gpgme
werner committed rGadb120e663fc: gpg: New import and keyserver option "self-sigs-only" (authored by werner).
gpg: New import and keyserver option "self-sigs-only"
Jul 1 2019, 3:32 PM
werner committed rG15a425a1dfe6: gpg: Make read_block in import.c more flexible. (authored by werner).
gpg: Make read_block in import.c more flexible.
Jul 1 2019, 3:32 PM
chyen added a comment to T4598: curses: dialog broken with wide characters.

Well in my browser (Firefox) the dialogs are not rendered correctly. Here are the two dialogs in the terminal:

Jul 1 2019, 3:30 PM · pinentry
werner added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

That is probably not what you want but at least it allows to import your key

Jul 1 2019, 3:30 PM · Bug Report, gnupg (gpg22)
chyen created T4598: curses: dialog broken with wide characters in the S1 Public space.
Jul 1 2019, 3:23 PM · pinentry
werner committed rG2e349bb61737: gpg: New import and keyserver option "self-sigs-only" (authored by werner).
gpg: New import and keyserver option "self-sigs-only"
Jul 1 2019, 3:17 PM
werner committed rG894b72d796c8: gpg: Make read_block in import.c more flexible. (authored by werner).
gpg: Make read_block in import.c more flexible.
Jul 1 2019, 3:17 PM
historic_bruno created T4597: Support GCM modes for ntbtls. in the S1 Public space.
Jul 1 2019, 3:03 PM · Restricted Project, Feature Request, ntbtls
aheinecke added a comment to T3321: Make it possible to combine GpgMEpp and QGpgme with MSVC compiled binaries.

One issue with this is that Qt Webengine (chrome) cannot be built with mingw. Fixing that would be a major project.

Jul 1 2019, 2:54 PM · Feature Request, gpgme
aheinecke added a comment to T3321: Make it possible to combine GpgMEpp and QGpgme with MSVC compiled binaries.

High priority and half a year no action....

Jul 1 2019, 2:48 PM · Feature Request, gpgme
aheinecke triaged T4573: Files encrypted on another platform using password based encryption (-c) intermittently fail to decrypt on Kleopatra as Normal priority.

back from vacation so apologies for the delay. @werner This is reproducible on the command line without Kleopatra. So maybe something for you our Gniibe to look into?

Jul 1 2019, 2:29 PM · gnupg (gpg22), Bug Report
aheinecke created T4596: GpgOL: S/MIME Mails with invalid CRL's are not detected as signed when forwarding.
Jul 1 2019, 1:49 PM · gpg4win, gpgol
werner removed a project from T4588: gpg-agent should guess pinentry's full path (using $PATH) if `pinentry-program` does not supply a full path: Bug Report.

GnuPG invokes its components always with their absolute file name. We want to mitigate attacks where malware creates a pinentry wrapper somewhere in an improper set PATH.

Jul 1 2019, 10:02 AM · gnupg24, gpgagent
werner added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

I have mentioned it several times in the past that I would like to see the search by user id feature be removed from keyservers so that there is less incentive to use them as a perpetual and searchable database for maybe illegitimate data.

Jul 1 2019, 9:56 AM · Bug Report, gnupg (gpg22)
werner closed T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net` as Wontfix.

I see no need for this.

Jul 1 2019, 9:50 AM · gnupg (gpg22), Bug Report, dirmngr
aheinecke created T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver.
Jul 1 2019, 9:13 AM · gnupg (gpg22), wkd
aheinecke triaged T4572: Kleopatra unable to import public key as Normal priority.

Keyserver issues are always hard to analyze because the state of the servers and which server you get is always a factor.

Jul 1 2019, 8:53 AM · kleopatra, Bug Report, gpg4win
aheinecke added a comment to T4571: Outlook sometimes crashes when activating encrypted mail with (partial) non-encrypted appendix.

Sorry for the delay, I was on my summer vacation ;-)

Jul 1 2019, 8:48 AM · gpgol, Bug Report, gpg4win
aheinecke reassigned T4395: Kleopatra: Missing error handling when changing expiry from aheinecke to werner.

Werner: I'm assigning this to you. Because the underlying reason is a missing status from gpg. I think we should add that for 2.3 as any new status line tends to break things.

Jul 1 2019, 8:45 AM · gpa, gnupg, gpgme, gpg4win, kleopatra
aheinecke claimed T4581: Kleopatra stuck in loading the certificate cache.

can you please open the console (cmd.exe) and do a "gpg -K" and "gpgsm -K"

Jul 1 2019, 8:44 AM · gpg4win, kleopatra, Bug Report
aheinecke added a comment to T3537: GpgOL - Outlook shows empty email body for encrypted email.

@joaociocca Can you please try to update to Gpg4win-3.1.9 and try again.

Jul 1 2019, 8:35 AM · gpgol, Bug Report, gpg4win
gniibe committed rG526714806da4: tools: gpgconf: Killing order is children-first. (authored by gniibe).
tools: gpgconf: Killing order is children-first.
Jul 1 2019, 6:14 AM
gniibe changed the status of T4577: extended-key-format test of openpgp/decrypt-unwrap-verify.scm fails on sparc64 and x32 from Open to Testing.
Jul 1 2019, 6:14 AM · gpgagent, gnupg, Bug Report
gniibe committed rG7c877f942a34: tools: gpgconf: Killing order is children-first. (authored by gniibe).
tools: gpgconf: Killing order is children-first.
Jul 1 2019, 6:13 AM

Jun 30 2019

dkg added a project to T4594: dirmngr appears to unilaterally import system CAs: Bug Report.
Jun 30 2019, 7:27 PM · Bug Report, dirmngr, gnupg (gpg22)
dkg added a comment to T4594: dirmngr appears to unilaterally import system CAs.

To be clear, this would allow the least competent CA in the system root trust anchor list to certify an arbitrary server as a member of hkps.pool.sks-keyservers.net. So it is in some sense a security vulnerability -- it allows for a bypass of the correct authority.

Jun 30 2019, 7:26 PM · Bug Report, dirmngr, gnupg (gpg22)
dkg committed rG1c9cc97e9d47: dirmngr: Only use SKS pool CA for SKS pool (authored by dkg).
dirmngr: Only use SKS pool CA for SKS pool
Jun 30 2019, 6:15 PM
dkg created T4594: dirmngr appears to unilaterally import system CAs.
Jun 30 2019, 6:14 PM · Bug Report, dirmngr, gnupg (gpg22)
dkg added a comment to T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.

I've just pushed 1c9cc97e9d47d73763810dcb4a36b6cdf31a2254 to the branch dkg-fix-T4593

Jun 30 2019, 6:12 PM · gnupg (gpg22), Bug Report, dirmngr
dkg updated the task description for T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.
Jun 30 2019, 6:09 PM · gnupg (gpg22), Bug Report, dirmngr
dkg created T4593: dirmngr should not apply Kristian's CA when fetching from a keyserver that is not `hkps.pool.sks-keyservers.net`.
Jun 30 2019, 6:09 PM · gnupg (gpg22), Bug Report, dirmngr

Jun 29 2019

dkg added a comment to T4591: gpg drops flooded certificates entirely if the certficate is too large, and gpg is using `pubring.kbx`.

Note also that some keyservers like keys.openpgp.org will distribute only verified self-sigs (including revocations and subkey updates) without distributing the floodable third-party certifications. We can and should distinguish "updates-only" keyservers from discovery-by-address mecahnisms.

Jun 29 2019, 12:53 AM · Bug Report, gnupg (gpg22)

Jun 28 2019

dkg added a comment to T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.

Just importing a ~666KiB certificate when this monster certificate is in the keyring consumes over 10m of CPU time:

Jun 28 2019, 11:15 PM · gnupg (gpg23), Bug Report
dkg added a comment to T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.

Verifying a git tag from the "clean" version of this certificate takes ~225ms of CPU time. Verifying the same git tag from a keyring that contains the flooded version of the certificate takes ~145s. This is factor of more than 600×. Any automated git tag verification system can probably be DoSed by this behavior.

Jun 28 2019, 8:23 PM · gnupg (gpg23), Bug Report
dkg added a comment to T4592: gpg takes > 30s to list the keys from a 17MiB `pubring.gpg` that contains a single certificate.

I didn't mean to suggest that switching to sqlite was the only way to fix this, but if it is a promising way to fix it, that would be great. I'm sure there are other ways.

Jun 28 2019, 2:47 PM · gnupg (gpg23), Bug Report
dkg added a comment to T4590: dirmngr does not perform WKD advanced lookup.

I recognize that adding network activity to the test suite can be complicated (not all test suites are run with functional network access), but if it is possible to have a unit test or something (that doesn't do network access, but just looks at what the dirmngr *would* have tried somehow?), that would be great. Thanks for looking into this!

Jun 28 2019, 2:39 PM · gnupg (gpg22), wkd, dirmngr, Bug Report