In T5167#139966, @gbschenkel wrote:I have another yubikey neo but its clean. Can it help it?
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed All Stories
All Stories
All Stories
Dec 9 2020
Dec 9 2020
I have another yubikey neo but its clean. Can it help it?
In T5167#139964, @gbschenkel wrote:Changing modes will I lose/change my OTP and FIDO codes?
Dec 8 2020
Dec 8 2020
Changing modes will I lose/change my OTP and FIDO codes?
I would add "Provide a verbose message of why the key cannot be imported".
Denisov23 created T5171: Wish: in GPA add other types of keys such as Kleopatra in the S1 Public space.
Laurent Montel <montel@kde.org> committed rKLEOPATRAea773eb9e02d: operator+/- is disabled for QFlags in qt6 (authored by Laurent Montel <montel@kde.org>).
operator+/- is disabled for QFlags in qt6
• gniibe renamed T5167: GnuPG 2.25 still have problems related to Yubikey NEO. from GnuPG 2.25 still have problems related to Yubikey. to GnuPG 2.25 still have problems related to Yubikey NEO..
Following device (a bit older than yours, I guess) works well:
DBG: ccid-driver: idVendor: 1050 idProduct: 0112 bcdDevice: 0334
When I configure it to OTP+FIDO+CCID, it also works for me, it is:
DBG: ccid-driver: idVendor: 1050 idProduct: 0116 bcdDevice: 0334
scd:yubikey: Fix support of Yubikey NEO.
• gniibe committed rGeda3c688fc2e: agent: Allow decryption with card but no file. (authored by • gniibe).
agent: Allow decryption with card but no file.
• gniibe committed rG9beab36dfa39: agent: Clean up the API of agent_pkdecrypt. (authored by • gniibe).
agent: Clean up the API of agent_pkdecrypt.
• gniibe changed the status of T5166: gpg --quick-gen-key userid card fails on first run resp. for unknown key, a subtask of T5125: Kleopatra: Generate OpenPGP public key for OpenPGP card key, from Open to Testing.
• gniibe changed the status of T5166: gpg --quick-gen-key userid card fails on first run resp. for unknown key from Open to Testing.
Pushed the change by Ingo.
• gniibe added a comment to T5166: gpg --quick-gen-key userid card fails on first run resp. for unknown key.
I finally recognize this change: rG638526d37fee: agent: Allow signing with card key even without a stub key..
I should have seen this yesterday.
• gniibe committed rGcbb0e069f55b: agent: Allow pksign operation with card but no file. (authored by • gniibe).
agent: Allow pksign operation with card but no file.
Thanks a lot.
Let me explain the situation.
Dec 7 2020
Dec 7 2020
Although the output of --list-packets should not be parsed and is subject to change with each versions we know that ppl do it anyway and things start to break.
Sorry, no. Although the output of --list-packets should not be parsed and is subject to change with each versions we know that ppl do it anyway and things start to break. Even when we added lines starting with the usual comment sign (#) to indicate the offset of the packet, we received quite some bug reports. Thus such chnages will only be done when they are really needed. For all other the rule is still: Use the source, Luke.
Change encryption to work on OOM
Add helper for utf8 tmp name
Add OOM SaveAs helper
Thank you! And for what it's worth, I think your version,
• ikloecker closed T5141: GnuPG: Make quick-gen-key work for keys on PIV cards, a subtask of T5128: Kleopatra: Generate OpenPGP public key for NetKey card key, as Resolved.
• ikloecker closed T5141: GnuPG: Make quick-gen-key work for keys on PIV cards, a subtask of T5126: Kleopatra: Generate OpenPGP public key for PIV card key, as Resolved.
• ikloecker committed rG255d33d65126: gpg: Make quick-gen-key with algo "card" work for keys without keytime (authored by • ikloecker).
gpg: Make quick-gen-key with algo "card" work for keys without keytime
Hi, I changed the PIN, killed the gpg-agent and scdaemon, edited the scdaemon.conf to include your instruction, after, I run the following commands:
• ikloecker added a comment to T5166: gpg --quick-gen-key userid card fails on first run resp. for unknown key.
In T5166#139903, @ikloecker wrote:Maybe the line (pksign.c:328)
algo = get_pk_algo_from_key (s_skey);should be moved to the start of the else-branch (pksign.c:484):
• ikloecker added a comment to T5166: gpg --quick-gen-key userid card fails on first run resp. for unknown key.
Maybe the line (pksign.c:328)
algo = get_pk_algo_from_key (s_skey);
should be moved to the start of the else-branch (pksign.c:484):
else
{
/* No smartcard, but a private key (in S_SKEY). */• ikloecker added a comment to T5166: gpg --quick-gen-key userid card fails on first run resp. for unknown key.
The problem is that in agent_pksign_do() the algo is read from s_skey (pksign.c:328), but s_skey is NULL because agent_key_from_file() fails to find a local KEYGRIP.key file in private-keys-v1.d. The code then reads the public key from the card (or a stub file), but it fails to set algo from s_pkey. The following patch fixes this:
• aheinecke committed rO5e513aa0c108: Switch some data debugging statements to log_debug (authored by • aheinecke).
Switch some data debugging statements to log_debug
• ikloecker added a comment to T5166: gpg --quick-gen-key userid card fails on first run resp. for unknown key.
In T5166#139883, @gniibe wrote:I think that the semantics of gpg --quick-gen-key <KEY> card (currently) assumes keys are available on card.
IIUC, it is for some specific (very special) use case to specify same key creation time to the key on card.
I don't know well about this use case.Anyway, because of this, (currently) the first run results undefined behavior.
It would be good if it just means "creating key(s) on card".
Thank you for the information.
In the log, the driver detects removal of card wrongly.
That's the cause of this problem.
In T5167#139880, @gniibe wrote:Please show us the output of gpg --card-status, and your configuration if you have something special. Are you using Yubikey also for gpg's signing, or is it only for SSH?
• gniibe committed rE9ee011259f81: build: Use AC_CHECK_TOOL to detect objdump for cross build. (authored by • gniibe).
build: Use AC_CHECK_TOOL to detect objdump for cross build.
Thank you. I'm going to apply it, modifying a bit.
• gniibe added a comment to T5166: gpg --quick-gen-key userid card fails on first run resp. for unknown key.
I think that the semantics of gpg --quick-gen-key <KEY> card (currently) assumes keys are available on card.
IIUC, it is for some specific (very special) use case to specify same key creation time to the key on card.
I don't know well about this use case.
Please show us the output of gpg --card-status, and your configuration if you have something special. Are you using Yubikey also for gpg's signing, or is it only for SSH?
• gniibe changed the status of T5163: Cannot import NIST-P521 key to OpenPGP v3.3 smart card from Open to Testing.
Backported.
• gniibe committed rG5a03bf61304d: scd:openpgp: Fix writing ECC key to card. (authored by • gniibe).
scd:openpgp: Fix writing ECC key to card.
• gniibe committed rG1cd615afe301: gpg,card: Allow no version information of Yubikey. (authored by • gniibe).
gpg,card: Allow no version information of Yubikey.
We need another patch, because there are two places for gpg --card-edit and gpg-card to check OpenPGPcard's version number if it's >= 2 or not.
Dec 6 2020
Dec 6 2020
Thank you very much
• werner added projects to T5167: GnuPG 2.25 still have problems related to Yubikey NEO.: scd, ssh, yubikey, gnupg (gpg22).
There is no caching for smardcard PINs. Once a key (or group of keys) on a hard has been used (i.e. PIN entered). that key can be used as long as the card has not been reset or powered-down. No rule without exception: Some cards may require that a PIN entry is required for each crypto operation. For example the OpenPGP card (which is implemented on a Yubikey) does this for the signing key but not for the authentication (ssh) key. To disable this for the signing key you use the "forcesig" command of gpg --card-edit.
Select your key in the certificate view, click right, select "Backup Secret keys ...", store to a file. Then copy that file in a secure why (USB stick etc) to the new box, import it there.
gbschenkel updated the task description for T5167: GnuPG 2.25 still have problems related to Yubikey NEO..
Dec 4 2020
Dec 4 2020
• ikloecker committed rLIBKLEO97526165da68: Merge branch 'work/static-analysis' into 'master' (authored by • ikloecker).
Merge branch 'work/static-analysis' into 'master'
• ikloecker committed rLIBKLEO553098647741: Run linux build job also on manually triggered pipeline (authored by • ikloecker).
Run linux build job also on manually triggered pipeline
OK, then we'll have to live with --disable-asm until the next major version is released, or switch to gcc.
msi: Allo dashes in custom names
Valodim added a comment to T4163: hkps://hkps.pool.sks-keyservers.net has to many bad servers to be a good default.
Perhaps of interest for this issue: the HKPS pool has consisted of only a single server for a couple of months now.
And I also did a backport to 2.2 :-) See rGa028f24136a062f55408a5fec84c6d31201b2143
• werner committed rGa028f24136a0: Backport of the new option parser from 2.3 (authored by • werner).
Backport of the new option parser from 2.3
We should not do this.
• ikloecker closed T5130: Kleopatra: Generating OpenPGP keys on Yubikey (with PIV enabled) fails with "General error" as Resolved.
In T5130#139220, @ikloecker wrote:Re-opening. Now trying to generate new keys fails with a "Wrong card" error.
• ikloecker committed rLIBKLEOdc837292248b: Merge branch 'work/static-analysis' into 'master' (authored by • ikloecker).
Merge branch 'work/static-analysis' into 'master'
• ikloecker committed rLIBKLEOb770d27c6e1d: Enable static analysis jobs on Gitlab CI (authored by • ikloecker).
Enable static analysis jobs on Gitlab CI
• gniibe added a comment to T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)).
In T2291#139821, @lopter wrote:if I am running master, it is now possible to have a setup where the same encryption key is shared by and usable from multiple smart cards?
• ikloecker committed rLIBKLEOcdd5273572f0: Merge branch 'work/static-analysis' into 'master' (authored by • ikloecker).
Merge branch 'work/static-analysis' into 'master'
lopter added a comment to T2291: Smartcard interaction improvement (was: Shadowed private key design (for smartcard)).
Thank you for all the work! Does it mean that, if I am running master, it is now possible to have a setup where the same encryption key is shared by and usable from multiple smart cards?
Laurent Montel <montel@kde.org> committed rKLEOPATRAece361bd62e6: Remove unused includes (authored by Laurent Montel <montel@kde.org>).
Remove unused includes
Laurent Montel <montel@kde.org> committed rLIBKLEO372edd4e2210: Remove unused include (authored by Laurent Montel <montel@kde.org>).
Remove unused include
Dec 3 2020
Dec 3 2020
jukivili committed rC2065720b5b06: tests/basic: check 32-bit and 64-bit overflow for CTR and ChaCha20 (authored by jukivili).
tests/basic: check 32-bit and 64-bit overflow for CTR and ChaCha20
jukivili committed rC1a83df98b198: Prevent link-time optimization from inlining __gcry_burn_stack (authored by jukivili).
Prevent link-time optimization from inlining __gcry_burn_stack
jukivili committed rCed45eac3b721: chacha20-ppc: fix 32-bit counter overflow handling (authored by jukivili).
chacha20-ppc: fix 32-bit counter overflow handling
AArch64 clang support was added to 'master' on 2018-03-28. One would need to backport commits 8ee38806245ca8452051b1a245f44082323f37f6...9b58e4a03ba3aeff7bae3f40da706977870c9649 to 1.8 branch.
• ikloecker committed rKLEOPATRA4307edd79033: Add helper for serialization of parameters for key generation (authored by • ikloecker).
Add helper for serialization of parameters for key generation
• ikloecker committed rKLEOPATRA99dc007770c5: Add widget/dialog for entering certificate details (authored by • ikloecker).
Add widget/dialog for entering certificate details
In T5157#139622, @gniibe wrote:ARM64 has been only tested on platforms which support ELF.
While it doesn't looks good (using AMD64 even if it's ARM64), I think this patch should be applied:
diff --git a/cipher/asm-common-aarch64.h b/cipher/asm-common-aarch64.h ...
• aheinecke committed rOe3b0e1159788: Fix multipart/encrypted and signed preview (authored by • aheinecke).
Fix multipart/encrypted and signed preview
Add mssing initializer
For the record, Thomas from mailvelope confirmed by signed mail that this is the correct id.
I think that T5150 was also not fixed completely.
scd:nks: Fix caching keygrip (more).
I found a bug which resulted "Not Found <SCD>" when "SCD KEYINFO" is used with "--data" or "--".
It is fixed in rG54b88ae46062: scd: Fix KEYINFO command with --data option..
• gniibe committed rG54b88ae46062: scd: Fix KEYINFO command with --data option. (authored by • gniibe).
scd: Fix KEYINFO command with --data option.
• gniibe edited projects for T5163: Cannot import NIST-P521 key to OpenPGP v3.3 smart card, added: gnupg, backport; removed gnupg (gpg22).
Fixed in master. I will backport to 2.2.
• gniibe committed rGa25c99b156ca: scd:openpgp: Fix writing ECC key to card. (authored by • gniibe).
scd:openpgp: Fix writing ECC key to card.
I was wrong. Patch is being updated...
python: Fix key_export*.
• gniibe committed rC16e855d49ca2: tests: Put a work around to tests/random for macOS. (authored by • gniibe).
tests: Put a work around to tests/random for macOS.
• gniibe committed rC9769b40b54cf: tests: Put a work around to tests/random for macOS. (authored by • gniibe).
tests: Put a work around to tests/random for macOS.
Thanks. Fixed in rM7a4fe82a017b: python: Fix key_export*..
• gniibe triaged T5159: make check fails for libgcrypt on Apple Silicon / ARM Mac as Normal priority.
• gniibe changed the status of T5159: make check fails for libgcrypt on Apple Silicon / ARM Mac from Open to Testing.