aiui, the point here is to have the user "service" get triggered somehow (through pam's pam_systemd.so's session module?) before ssh goes ahead and forms the socket. is that right? If the pre-launch mechanism is pam, is there a reason to do it as a systemd user service? That won't work for systems that have pam but don't have systemd, whereas a pam module that creates these will work.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed All Stories
All Stories
All Stories
Apr 25 2022
Apr 25 2022
is there any update ? I having the same Issue here on Windows 11 Pro, Outlook Version 2203 (Microsoft 365) 64bit
agent: Not writing password into file.
• werner committed rG86d84464ae11: gpg: Avoid NULL ptr access due to corrupted packets. (authored by • werner).
gpg: Avoid NULL ptr access due to corrupted packets.
• werner committed rGf6caf5b17366: gpg: Avoid NULL ptr access due to corrupted packets. (authored by • werner).
gpg: Avoid NULL ptr access due to corrupted packets.
• ikloecker triaged T5945: Kleopatra: Recipient input briefly shows error until lookup is completed as Normal priority.
• ikloecker triaged T5944: Kleopatra: Recipient input is confused about secondary user IDs as Normal priority.
JoeDoe1000 added a comment to T5926: GPGOL - Leere Nachricht kann nicht signiert werden (empty message email can't be signed or encrypted).
Any idea? Any update?
• ikloecker updated the task description for T5944: Kleopatra: Recipient input is confused about secondary user IDs.
• ikloecker closed T5943: gpg: Report details about failed symmetric decrypt with ERROR status as Resolved.
Works together with the changes for T5939: Kleopatra: Better error for wrong password in symmetric decryption. Tested with symmetric encrypted file and with symmetric+pk encrypted file.
• ikloecker committed rM512f11b458d8: qt: Rely on the bad passphrase error reported by gpg (authored by • ikloecker).
qt: Rely on the bad passphrase error reported by gpg
• ikloecker committed rMe21c3b559dfb: core: Return BAD_PASSPHRASE error code on symmetric decryption. (authored by • ikloecker).
core: Return BAD_PASSPHRASE error code on symmetric decryption.
• ikloecker changed the status of T5939: Kleopatra: Better error for wrong password in symmetric decryption from Open to Testing.
• werner added projects to T5821: gpgsm "certificate not found" error handling should use gpg_err_code() instead of -1: gnupg (gpg23), Restricted Project.
• werner committed rGbeb79f2705ad: sm: Use gpg_err_code() instead of -1 (authored by • tmzullinger).
sm: Use gpg_err_code() instead of -1
Deprecate the --supervised options.
• werner added a comment to T5821: gpgsm "certificate not found" error handling should use gpg_err_code() instead of -1.
Thanks. Will go into 2.3.6
Please contact the Debian developers for any systemd/gnupg issues. We don't suggest the use of the --supervised option because it causes more problems than it claims to solve.
• werner added a project to T5943: gpg: Report details about failed symmetric decrypt with ERROR status: Restricted Project.
• werner edited projects for T5943: gpg: Report details about failed symmetric decrypt with ERROR status, added: gpgme, gnupg; removed gnupg (gpg23).
• werner committed rG0f8623d518d4: gpg: Emit an ERROR status as hint for a bad passphrase. (authored by • werner).
gpg: Emit an ERROR status as hint for a bad passphrase.
• werner committed rGf021ecd57624: gpg: Emit an ERROR status as hint for a bad passphrase. (authored by • werner).
gpg: Emit an ERROR status as hint for a bad passphrase.
• gniibe committed rG2fc91e15c6be: common:iobuf: Exclude cases with IOBUF_INPUT_TEMP/IOBUF_OUTPUT_TEMP. (authored by • gniibe).
common:iobuf: Exclude cases with IOBUF_INPUT_TEMP/IOBUF_OUTPUT_TEMP.
I pushed the change above. I also pushed another change with IOBUF_INPUT_TEMP.
• werner added a comment to T5939: Kleopatra: Better error for wrong password in symmetric decryption.
In this case it works, because the error messages are not translatable.
• gniibe added a comment to T5935: scd: SSH emulation of gpg-agent doesn't work well with sntrup761x25519-sha512@openssh.com.
Sorry, I was confused. For RSA-4096, data is hashed by gpg-agent and hashed data is signed by a card.
• ikloecker triaged T5943: gpg: Report details about failed symmetric decrypt with ERROR status as Normal priority.
• ikloecker changed the status of T5939: Kleopatra: Better error for wrong password in symmetric decryption from Testing to Open.
In T5939#157259, @werner wrote:You should not use log messages because they are subject to change and they are translated. Let us return an ERROR status instead.
• werner added a comment to T5935: scd: SSH emulation of gpg-agent doesn't work well with sntrup761x25519-sha512@openssh.com.
We are using rsa-4096 on smartcard for quite some time; so I wonder what's the problem here. Is that that we don't use our Assuan hack for large key material with OpenPGP.3?
• gniibe added a comment to T5935: scd: SSH emulation of gpg-agent doesn't work well with sntrup761x25519-sha512@openssh.com.
There is another case: RSA-4096 key. scdaemon rejects data by Invalid value. Unfortunately, there is no fix for this, as it's really too large. Even if scdaemon allows larger data, the card implementation rejects, when it conforms to PKCS #1 standard (data should not be larger than 40% of the modulus).
• gniibe committed rG2848fe4c84e5: scd: Fix hard-coded constant for RSA auth. (authored by • gniibe).
scd: Fix hard-coded constant for RSA auth.
Thank you for the bug report.
• gniibe renamed T5941: gnupg 2.3.5 hangs on key import from gnupg 1.3.5 hangs on key import to gnupg 2.3.5 hangs on key import.
Apr 24 2022
Apr 24 2022
Carlo Vanini <silhusk@gmail.com> committed rKLEOPATRA19be93f095a4: File name extension can be longer than 3 character (authored by Carlo Vanini <silhusk@gmail.com>).
File name extension can be longer than 3 character
• werner added a comment to T5939: Kleopatra: Better error for wrong password in symmetric decryption.
You should not use log messages because they are subject to change and they are translated. Let us return an ERROR status instead.
Laurent Montel <montel@kde.org> committed rLIBKLEO7447a1b7ce68: GIT_SILENT: prepare 5.20.1 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.20.1
Laurent Montel <montel@kde.org> committed rKLEOPATRAb3161638fbfc: GIT_SILENT: prepare 5.20.1 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.20.1
Apr 23 2022
Apr 23 2022
Apr 22 2022
Apr 22 2022
Laurent Montel <montel@kde.org> committed rLIBKLEOb33b73518168: GIT_SILENT: prepare 5.20.1 (authored by Laurent Montel <montel@kde.org>).
GIT_SILENT: prepare 5.20.1
• werner triaged T5936: gpg: Support specifiying user ID to revoke as UID hash for --quick-revoke-uid as High priority.
Should also go into 2.2
• werner accepted D552: gpg: Support specifiying user ID to revoke as UID hash for --quick-revoke-uid.
The rest of the code looks fine.
• ikloecker committed rMd8e5871dca94: qt: Report better error if decryption failed because of bad passphrase (authored by • ikloecker).
qt: Report better error if decryption failed because of bad passphrase
• ikloecker committed rM321c8a0254f4: cpp: Allow changing the error of a result (authored by • ikloecker).
cpp: Allow changing the error of a result
• ikloecker changed the status of T5939: Kleopatra: Better error for wrong password in symmetric decryption from Open to Testing.
I have added the check for a possibly wrong symmetric password to QGpgMEDecryptVerifyJob because it relies on logging messages emitted by gpg which are not part of gpg's status API.
• ikloecker moved T5939: Kleopatra: Better error for wrong password in symmetric decryption from Restricted Project Column to Restricted Project Column on the Restricted Project board.
• ikloecker added a comment to T5939: Kleopatra: Better error for wrong password in symmetric decryption.
The error
gpg: decryption failed: Bad session key
is only logged if the sanity check "algo given in decrypted session key is a valid OpenPGP algo" passes even though a wrong password was given (which happens with a chance of 11:256). If the sanity check detects a bad algo then gpg logs
gpg: decryption of the symmetrically encrypted session key failed: Checksum error
If AEAD is used, then other logging will happen.
• aheinecke triaged T5939: Kleopatra: Better error for wrong password in symmetric decryption as Normal priority.
Minor fix in gpg4win.mk.in
doc: Update READMEs
Allow authenticode signing using a card.
• ikloecker committed rKLEOPATRA670728a271d2: Share generally useful helpers (authored by • ikloecker).
Share generally useful helpers
Update NEWS for todays release
Bump 4.x Version to 4.0.1
Update kde-l10n and kleopatra
• aheinecke committed rW8655444076b6: Grammar and spelling fixes for NEWS (authored by • aheinecke).
Grammar and spelling fixes for NEWS
Add GpgEX NEWS entry
Update to GnuPG 2.3.5
I tend to avoid such changes to keep the translations valid. But for master this is okay.
gpg: Fix line end in error message
Bump version to 3.1.22
• aheinecke committed rKLEOPATRA81879ec97eb9: Fix display of non compliance after decrypt (authored by • aheinecke).
Fix display of non compliance after decrypt
The links for the Windows installer as given in the mail was wrong. The corrected links are
• gniibe added a project to T5935: scd: SSH emulation of gpg-agent doesn't work well with sntrup761x25519-sha512@openssh.com: Restricted Project.
• gniibe closed T5538: gpg-agent's keytocard cmd should use a better default creation time. as Resolved.
• gniibe closed T5758: scd: loop forever with reader_port, when open_pcsc_reader failed as Resolved.
• gniibe closed T5884: dotlock is not perfect (errornously remove .lock as stale lockfile) as Resolved.
• gniibe closed T5884: dotlock is not perfect (errornously remove .lock as stale lockfile), a subtask of T5109: Initial socket connection to server, as Resolved.
• gniibe added projects to T5917: gpg-agent: Not writing password into file: Restricted Project, gpgagent, Bug Report.
agent: Not writing password into file.
• gniibe committed rGe8fb8e2b3e66: scd: Don't inhibit SSH authentication for larger data if it can. (authored by • gniibe).
scd: Don't inhibit SSH authentication for larger data if it can.
• gniibe added a comment to T5935: scd: SSH emulation of gpg-agent doesn't work well with sntrup761x25519-sha512@openssh.com.
I confirmed that the patch above works with newer Gnuk (>= 1.2.16).
Apr 21 2022
Apr 21 2022
swdb: GnuPG 2.3.5
• werner set External Link to https://lists.gnupg.org/pipermail/gnupg-announce/2022q2/000472.html on T5743: Release GnuPG 2.3.5.
Release 2.3.5
Post release updates