In T5436#146148, @ikloecker wrote:It's not clear whether you are talking about PIN caching related to signing operations or decryption operations.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed All Stories
All Stories
All Stories
May 17 2021
May 17 2021
jukivili committed rC14bb6d4ea0dc: cipher: Fix memory leaks for EdDSA. (authored by Tianjia Zhang <tianjia.zhang@linux.alibaba.com>).
cipher: Fix memory leaks for EdDSA.
jukivili committed rCa1f5d87ed49b: Always include <config.h> in cipher assembly codes (authored by H.J. Lu <hjl.tools@gmail.com>).
Always include <config.h> in cipher assembly codes
• werner committed rG6dfae2f402a7: gpg: Use a more descriptive prompt for symmetric decryption. (authored by • werner).
gpg: Use a more descriptive prompt for symmetric decryption.
• werner committed rGc9859967c0d8: po: In German always use "Passwort" instead of "Passphrase". (authored by • werner).
po: In German always use "Passwort" instead of "Passphrase".
• werner committed rG6f31acac767f: sm: Support decryption of password based encryption (pwri) (authored by • werner).
sm: Support decryption of password based encryption (pwri)
• werner committed rG50ea1b67e826: sm: Ask for the password for password based decryption (pwri) (authored by • werner).
sm: Ask for the password for password based decryption (pwri)
• werner committed rG03f83bcda5d1: gpg: Use a more descriptive prompt for symmetric decryption. (authored by • werner).
gpg: Use a more descriptive prompt for symmetric decryption.
• werner added a comment to rGcc5aa68b6310: scd:p15: Fix last commit and improve D-TRUST detection..
I fully agree. That was actually my itention - not sure why the coded ended up as it is.
• werner committed rGeeb65d3bbd7d: sm: Ask for the password for password based decryption (pwri) (authored by • werner).
sm: Ask for the password for password based decryption (pwri)
• werner committed rG1406f551f1e0: dirmngr: LDAP search by a mailbox now ignores revoked keys. (authored by • werner).
dirmngr: LDAP search by a mailbox now ignores revoked keys.
• werner committed rGb6f8cd7eef4b: dirmngr: LDAP search by a mailbox now ignores revoked keys. (authored by • werner).
dirmngr: LDAP search by a mailbox now ignores revoked keys.
• ikloecker added inline comments to rGcc5aa68b6310: scd:p15: Fix last commit and improve D-TRUST detection..
Just got around to testing this on Linux, and I can confirm the same behavior: decryption PIN caching works on 2.2 and doesn't work on 2.3.
Laurent Montel <montel@kde.org> committed rLIBKLEO03b1e46cf71d: GIT_SILENT: use Qt:: everywhere (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: use Qt:: everywhere
• werner triaged T5438: gpgme_op_keylist_from_data_start ignores GPGME_KEYLIST_MODE_SIGS as High priority.
Due to tax issues, we can't accept a donation as return on service. However, we will fix bugs anyway if possible,
lbogdan renamed T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations from gpg-agent 2.3.1: PIN caching not working to gpg-agent 2.3.1: PIN caching not working for decrypt operations.
@znull You can also fix the detection issue by building with ./configure --disable-ccid-driver, in which case you won't need the disable-ccid setting anymore.
@ikloecker Sorry for not being clear, I was not aware different operations have different behaviors in regard to entering / caching the PIN.
• ikloecker moved T4876: Generic smartcard widget for PKCS# 15 and other apps from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ikloecker added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.
It's not clear whether you are talking about PIN caching related to signing operations or decryption operations.
l10n daemon script <scripty@kde.org> committed rLIBKLEO873d6a57b1ec: SVN_SILENT made messages (.desktop file) - always resolve ours (authored by l10n daemon script <scripty@kde.org>).
SVN_SILENT made messages (.desktop file) - always resolve ours
May 16 2021
May 16 2021
• werner committed rDcd41c57d9cfb: ids: draft-koch-openpgp-webkey-service-12.txt (authored by • werner).
ids: draft-koch-openpgp-webkey-service-12.txt
l10n daemon script <scripty@kde.org> committed rLIBKLEO21d594d71ea2: SVN_SILENT made messages (.desktop file) - always resolve ours (authored by l10n daemon script <scripty@kde.org>).
SVN_SILENT made messages (.desktop file) - always resolve ours
May 15 2021
May 15 2021
I just wanted to chime in that I've had exactly the same experience as @lbogdan: gnupg 2.3 stopped recognizing my yubikey entirely on MacOS until the T5415 workaround (disable-ccid). After that, pin caching was broken until I applied his patch to call-scd.c:548, which makes it work as before. Without these two changes the experience with gnupg 2.3 is degraded relative to 2.2.
Laurent Montel <montel@kde.org> committed rLIBKLEOa37895dfaec3: GIT_SILENT: prepare 5.17.2 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.17.2
Laurent Montel <montel@kde.org> committed rKLEOPATRAa6e3d5d1c7f6: GIT_SILENT: prepare 5.17.2 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.17.2
Laurent Montel <montel@kde.org> committed rKLEOPATRAfd3f9437b5c0: Allow to install doc/po file (authored by Laurent Montel <montel@kde.org>).
Allow to install doc/po file
May 14 2021
May 14 2021
• werner committed rG02029f9eab87: sm: Support decryption of password based encryption (pwri) (authored by • werner).
sm: Support decryption of password based encryption (pwri)
So I did a bit more reading on smartcard PIN caching, and took a better look at the debug logging of gnupg 2.2, and learned that, indeed, the PIN is cached by the card and not by any one gnupg component.
• ikloecker committed rLIBKLEO5de2f7ac770c: Always include the default key in the list of keys to chose from (authored by • ikloecker).
Always include the default key in the list of keys to chose from
• gniibe committed rG58b330e935b9: scd: Remove wrong assertion and add protection to PCSC.COUNT. (authored by • gniibe).
scd: Remove wrong assertion and add protection to PCSC.COUNT.
build: Fix detecting pthread library.
May 13 2021
May 13 2021
Laurent Montel <montel@kde.org> committed rLIBKLEO5a4930065beb: GIT_SILENT: prepare 5.17.2 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.17.2
Laurent Montel <montel@kde.org> committed rKLEOPATRA17d9a4b767f3: GIT_SILENT: prepare 5.17.2 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.17.2
• gniibe added a comment to T5437: PC/SC change: monitoring card status changes (possibly also for new reader).
I am testing with rGccfb5e0a7dc6: scd: Use SCardStatus for pcsc_get_status. on GNU/Linux.
• gniibe renamed T5437: PC/SC change: monitoring card status changes (possibly also for new reader) from PC/SC change monitoring card status changes (possibly also for new reader) to PC/SC change: monitoring card status changes (possibly also for new reader).
• gniibe triaged T5437: PC/SC change: monitoring card status changes (possibly also for new reader) as Wishlist priority.
May 12 2021
May 12 2021
Yes, I already linked to T5415, but that breaks YubiKey completely, and I fixed it with disable-ccid.
• werner edited projects for T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations, added: gnupg (gpg23), MacOS; removed gpgagent.
The pincache is actually not what you think it is. It is only used to allow switching between different application on a Yubikey which reqieres a new VERIFY command after switching back to the first application the card. What you feel as caching is the state of the card, which usually keeps its verification state until the card is powered down.
• ikloecker moved T5245: Kleopatra: Add support for trust signatures / trusted introducer from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ikloecker changed the status of T5245: Kleopatra: Add support for trust signatures / trusted introducer from Open to Testing.
• ikloecker closed T5429: Kleopatra: Display information about trust signatures, a subtask of T5245: Kleopatra: Add support for trust signatures / trusted introducer, as Resolved.
• ikloecker moved T5429: Kleopatra: Display information about trust signatures from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ikloecker committed rKLEOPATRA01f8c6af6a30: Fix warning: & has lower precedence than ==; == will be evaluated first (authored by • ikloecker).
Fix warning: & has lower precedence than ==; == will be evaluated first
• ikloecker committed rKLEOPATRA7d49a67a3f4a: Show information about trusted introducers in certificate details (authored by • ikloecker).
Show information about trusted introducers in certificate details
• ikloecker committed rKLEOPATRA99ec41cb1656: GIT_SILENT: Fix indentation (authored by • ikloecker).
GIT_SILENT: Fix indentation
• ikloecker committed rKLEOPATRA4cdcf5def6eb: Remove separate certificatedetailswidget.ui (authored by • ikloecker).
Remove separate certificatedetailswidget.ui
• ikloecker committed rKLEOPATRA80a9c0d039ee: Use std::unique_ptr for pimpl (authored by • ikloecker).
Use std::unique_ptr for pimpl
• ikloecker committed rKLEOPATRAef6c06f010fa: GIT_SILENT: Fix debug message (authored by • ikloecker).
GIT_SILENT: Fix debug message
• ikloecker committed rKLEOPATRA40013fb8477d: Hide Tags column if tag support is not enabled (authored by • ikloecker).
Hide Tags column if tag support is not enabled
• ikloecker committed rKLEOPATRA00c7c920c5bd: Move CertificateDetailsDialog to *.h/*.cpp of its own (authored by • ikloecker).
Move CertificateDetailsDialog to *.h/*.cpp of its own
• ikloecker committed rKLEOPATRAd47a5a266cf1: Modernize code and sort includes (authored by • ikloecker).
Modernize code and sort includes
• ikloecker committed rLIBKLEO28d8291f6ba9: Add information about trust signatures to UserIDListModel (authored by • ikloecker).
Add information about trust signatures to UserIDListModel
Bump library version
GIT_SILENT: Reorder includes
Modernize code
• ikloecker committed rLIBKLEO628ea4b79991: Always add the Tags column to the model (authored by • ikloecker).
Always add the Tags column to the model
Add enum for model columns
• ikloecker committed rLIBKLEO27cd0e8e450a: Use std::unique_ptr for mRootItem (authored by • ikloecker).
Use std::unique_ptr for mRootItem
• ikloecker committed rLIBKLEOf25dcd53ddc2: Enforce QT_NO_CAST_FROM_ASCII (authored by • ikloecker).
Enforce QT_NO_CAST_FROM_ASCII
lbogdan updated the task description for T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.
core: Make sure to stay ABI compatible.
core: Allow for older compilers.
• werner committed rG310b064f5271: agent: Use SHA-256 for SSH fingerprint by default (authored by • werner).
agent: Use SHA-256 for SSH fingerprint by default
Frankly, I am pretty sure that the new base64 encoding of the fingerprint leads to less diligent comparison of the fingerprint by the user. I don't understand why they did not used a truncated hex output or zBase32 .
Laurent Montel <montel@kde.org> committed rLIBKLEO234be2025ff1: Fix clazy warning (authored by Laurent Montel <montel@kde.org>).
Fix clazy warning
May 11 2021
May 11 2021
• werner triaged T5432: GPA - Crypto Backend Configurator ignores screen zoom factor and partially falls off screen as Low priority.
Thanks for using GPA. Unfortunately, I have to tell you that GPA development has been stopped and I can't say whether we will fix that bug any time soon. Please consider to switch to Kleopatra which is the standard key manager included in gpg4win.
• ikloecker committed rKLEOPATRAddf99af924cd: Exclude key to certify from possible certification keys (authored by • ikloecker).
Exclude key to certify from possible certification keys
• werner committed rG965bb0693c0d: A few minor code cleanups and typo fixes. (authored by • werner).
A few minor code cleanups and typo fixes.
FWIW, we can and should run our test suite under valgrind from time to time
• gniibe changed the status of T5430: "free(): invalid pointer" from --clearsign from Open to Testing.
Sorry, it's my fault.
Fixed in rGac731dbbbd21: gpg: Fix allocation for EXTRAHASH..
gpg: Fix allocation for EXTRAHASH.
Laurent Montel <montel@kde.org> committed rKLEOPATRA1becdd7d7819: We can buid against 5.14 without deprecated method (authored by Laurent Montel <montel@kde.org>).
We can buid against 5.14 without deprecated method
On Windows, smartcard is also used by logon/logout and certificates handling. Those may be related.
• gniibe added a comment to D531: Keep holding READER_LOCK_TABLE and make clear distinction among close/releasing_PCSC_context/nullify_rdrname.
Please note that we don't use lock in apdu_dev_list_start/finish any more.
Use of lock is narrowed, only within apdu_open_reader function.
• gniibe committed rG32baa9acfb15: scd: Serialize READER_TABLE access for PC/SC. (authored by • gniibe).
scd: Serialize READER_TABLE access for PC/SC.
May 10 2021
May 10 2021
(I disabled the account of this boor)
(I disabled this boor and restored the state)
• ikloecker committed rKLEOPATRA3fcfe9ead9d6: Prefill the trust signature domain (authored by • ikloecker).
Prefill the trust signature domain
• ikloecker committed rKLEOPATRAdb59674bda1b: Allow certifying a key as trusted introducer for a domain (authored by • ikloecker).
Allow certifying a key as trusted introducer for a domain
• ikloecker committed rKLEOPATRA3af53c4fc238: Modernize and clean up a bit (authored by • ikloecker).
Modernize and clean up a bit
• ikloecker committed rKLEOPATRA2cb7c1e23304: Add info button explaining the "Certify as trusted introducer" option (authored by • ikloecker).
Add info button explaining the "Certify as trusted introducer" option
• ikloecker committed rKLEOPATRA5bee1e13eaed: Remove typedefs obsoleted by auto (authored by • ikloecker).
Remove typedefs obsoleted by auto
• ikloecker committed rKLEOPATRAf2e5d1fe98c1: Refactor CertifyWidget and CertifyCertificateDialog (authored by • ikloecker).
Refactor CertifyWidget and CertifyCertificateDialog