Page MenuHome GnuPG
Feed All Stories

Oct 20 2022

raysatiro created T6254: Warn in --recv-keys verbose output that no keys have been imported.
Oct 20 2022, 9:56 PM · gnupg24, Keyserver, Bug Report
Jakuje added a comment to T6039: FIPS: Allow salt=NULL (or shorter salt) for HKDF.

In regards to this issue, we were also notified that the MD API using gcry_md_setkey() can be used to calculate HMACs and it does not have the needed input key length limitation. From the discussion here I read that we would like to keep the internal usage still available so my proposal would be to to add similar check as in gcry_mac_setkey() into the above function. Together with the revert, it is available in the following merge request:

Oct 20 2022, 6:33 PM · backport, libgcrypt, FIPS
werner committed rGed62b74a175e: gpgsm: Create ECC certificates with AKI and SKI by default. (authored by werner).
gpgsm: Create ECC certificates with AKI and SKI by default.
Oct 20 2022, 5:34 PM
werner committed rG9f1181e1a7ed: gpgsm: Print the key types as standard key algorithm strings. (authored by werner).
gpgsm: Print the key types as standard key algorithm strings.
Oct 20 2022, 5:34 PM
werner committed rG5ae2632002c0: gpgsm: Support decryption of ECDH data (authored by werner).
gpgsm: Support decryption of ECDH data
Oct 20 2022, 5:34 PM
werner committed rG8b2c55d3c5da: gpgsm: Remove restriction of key generation (only RSA). (authored by gniibe).
gpgsm: Remove restriction of key generation (only RSA).
Oct 20 2022, 5:34 PM
werner committed rG37a853d808f0: gpgsm: Support key generation with ECC. (authored by gniibe).
gpgsm: Support key generation with ECC.
Oct 20 2022, 5:34 PM
werner added a parent task for T6252: Support ECC for Netkey cards also in 2.2: T6253: GpgSM: Backport ECC support to 2.2.
Oct 20 2022, 2:33 PM · gnupg (gpg22), scd, Restricted Project
werner added a subtask for T6253: GpgSM: Backport ECC support to 2.2: T6252: Support ECC for Netkey cards also in 2.2.
Oct 20 2022, 2:33 PM · gnupg22 (gnupg-2.2.42), Restricted Project, Feature Request, S/MIME
werner triaged T6253: GpgSM: Backport ECC support to 2.2 as High priority.
Oct 20 2022, 2:32 PM · gnupg22 (gnupg-2.2.42), Restricted Project, Feature Request, S/MIME
werner changed the status of T6252: Support ECC for Netkey cards also in 2.2, a subtask of T4938: Support Signature Card V2.0 (NKS15), from Open to Testing.
Oct 20 2022, 2:12 PM · eIDAS, scd, Feature Request, S/MIME
werner changed the status of T6252: Support ECC for Netkey cards also in 2.2 from Open to Testing.
Oct 20 2022, 2:12 PM · gnupg (gpg22), scd, Restricted Project
werner added a parent task for T6252: Support ECC for Netkey cards also in 2.2: T4938: Support Signature Card V2.0 (NKS15).
Oct 20 2022, 2:11 PM · gnupg (gpg22), scd, Restricted Project
werner added a subtask for T4938: Support Signature Card V2.0 (NKS15): T6252: Support ECC for Netkey cards also in 2.2.
Oct 20 2022, 2:11 PM · eIDAS, scd, Feature Request, S/MIME
werner added a comment to T6249: gpgrt: spawn functions.

without this list we don't have an option to keep file descriptors open; its not just stderr but for example log files and descriptors which pare passed by other meands than libassuan functions.

Oct 20 2022, 1:52 PM · gnupg, libassuan, gpgrt
werner committed rG1e69676981ac: scd:nks: Don't flag the ESIGN keypair EF as encryption capable. (authored by werner).
scd:nks: Don't flag the ESIGN keypair EF as encryption capable.
Oct 20 2022, 12:23 PM
werner committed rGf24904ee3540: scd:nks: Some code cleanup. (authored by werner).
scd:nks: Some code cleanup.
Oct 20 2022, 12:23 PM
werner committed rG5cd25f4ca485: scd:nks: Support the Telesec ESIGN application. (authored by werner).
scd:nks: Support the Telesec ESIGN application.
Oct 20 2022, 12:23 PM
werner committed rGb19958278931: scd:nks: Return USAGE information for KEYINFO command. (authored by gniibe).
scd:nks: Return USAGE information for KEYINFO command.
Oct 20 2022, 12:23 PM
werner committed rG8bccd95b38f2: scd:nks: Add support for signing plain SHA-2 digests. (authored by ikloecker).
scd:nks: Add support for signing plain SHA-2 digests.
Oct 20 2022, 12:23 PM
werner committed rG77b008d1e74b: scd:nks: Handle APP_READKEY_FLAG_INFO. (authored by werner).
scd:nks: Handle APP_READKEY_FLAG_INFO.
Oct 20 2022, 12:23 PM
werner committed rG3c1acb7b9fa4: scd:nks: Support READKEY with keygrip and for "NKS-IDLM" keyref. (authored by gniibe).
scd:nks: Support READKEY with keygrip and for "NKS-IDLM" keyref.
Oct 20 2022, 12:23 PM
werner committed rG1f2823e0beee: scd:nks: Add support of KEYGRIP for do_readcert. (authored by gniibe).
scd:nks: Add support of KEYGRIP for do_readcert.
Oct 20 2022, 12:23 PM
werner committed rG0979ae349131: scd:nks: Factor out pubkey retrieval from keygrip handling. (authored by gniibe).
scd:nks: Factor out pubkey retrieval from keygrip handling.
Oct 20 2022, 12:23 PM
werner committed rGea7234d2f591: scd:nks: Factor out iteration over filelist. (authored by gniibe).
scd:nks: Factor out iteration over filelist.
Oct 20 2022, 12:23 PM
werner committed rGc9eb4c063231: scd:nks: Fix caching keygrip (more). (authored by gniibe).
scd:nks: Fix caching keygrip (more).
Oct 20 2022, 12:23 PM
werner committed rGcf5f6896f810: scd:nks: Minor additions to the basic IDLM application support. (authored by werner).
scd:nks: Minor additions to the basic IDLM application support.
Oct 20 2022, 12:23 PM
werner committed rGf1bd7369a754: scd,nks: Fix caching keygrip. (authored by gniibe).
scd,nks: Fix caching keygrip.
Oct 20 2022, 12:23 PM
werner committed rGc1c3331cf965: scd:nks: Emit the algo string with KEYPAIRINFO (authored by werner).
scd:nks: Emit the algo string with KEYPAIRINFO
Oct 20 2022, 12:23 PM
werner committed rGc99870f790c6: scd:nks: Fix certificate read problem with TCOS signature card v2. (authored by werner).
scd:nks: Fix certificate read problem with TCOS signature card v2.
Oct 20 2022, 12:23 PM
werner committed rGfe698586b5d4: scd:nks: Implement writecert for the Signature card v2. (authored by werner).
scd:nks: Implement writecert for the Signature card v2.
Oct 20 2022, 12:23 PM
werner committed rG60ba61e78ea3: scd:nks: Add framework to support IDKey cards. (authored by werner).
scd:nks: Add framework to support IDKey cards.
Oct 20 2022, 12:23 PM
werner committed rGa974d8aefab1: scd:nks: Fix remaining tries warning in --reset mode. (authored by werner).
scd:nks: Fix remaining tries warning in --reset mode.
Oct 20 2022, 12:23 PM
werner committed rGbbef2d17902b: scd:nks: Support decryption using ECDH. (authored by werner).
scd:nks: Support decryption using ECDH.
Oct 20 2022, 12:23 PM
werner committed rGa83281176c2b: scd:nks: Get the PIN prompts right for the Signature Card (authored by werner).
scd:nks: Get the PIN prompts right for the Signature Card
Oct 20 2022, 12:23 PM
werner committed rGf5e0469d6e74: scd:nks: Add do_with_keygrip and implement a cache. (authored by werner).
scd:nks: Add do_with_keygrip and implement a cache.
Oct 20 2022, 12:23 PM
werner committed rG471e610fcd63: scd:nks: Allow retrieving certificates from a Signature Card v.20 (authored by werner).
scd:nks: Allow retrieving certificates from a Signature Card v.20
Oct 20 2022, 12:23 PM
jrg.sichermann added a comment to T6251: Invalid ID in GpgOL while sending myself a signed and encrypted message.

PS
The problem is also active, if I send an encryptet (not signed) message to myself.
If I get mails from other people, wich are encryptet using smime and the same certtificate and signed by the sender, there is no problem. GpgOL works fine here.

Oct 20 2022, 11:49 AM · Info Needed, S/MIME, gpgol
Jakuje added a comment to T6039: FIPS: Allow salt=NULL (or shorter salt) for HKDF.

I read the document (SP 800-131Ar2) again. I think that it would be irrelevant for PKDF2, because it's password KDF, not deriving additional keys from a Cryptographic Key.

Oct 20 2022, 11:12 AM · backport, libgcrypt, FIPS
werner triaged T6252: Support ECC for Netkey cards also in 2.2 as High priority.
Oct 20 2022, 10:56 AM · gnupg (gpg22), scd, Restricted Project
jrg.sichermann created T6251: Invalid ID in GpgOL while sending myself a signed and encrypted message.
Oct 20 2022, 9:22 AM · Info Needed, S/MIME, gpgol
gniibe committed rA61f69c73f364: experiment: New SENDFD command to implement sendfd feature. (authored by gniibe).
experiment: New SENDFD command to implement sendfd feature.
Oct 20 2022, 8:58 AM
gniibe added a comment to T6249: gpgrt: spawn functions.
  • assuan_pipe_connect and internal _assuan_spawn
Oct 20 2022, 8:13 AM · gnupg, libassuan, gpgrt
alca7raz added a comment to T6250: GPG-Agent doesn't work properly with smart cards and ed25519 keys and SSH Agent.

Are you sure you are using SSH user certificates for SSH authentication? I have trouble with SSH certificate authentication instead of public-key authentication.

Oct 20 2022, 8:07 AM · gnupg, Documentation, ssh
werner added a comment to T6238: regexp for trust signature domain restriction does not work if key only has an e-mail address.

The latter. Detecting mail addresses with regexp is anyway a kludge and we have more stringent code to detect mail addresses in a user-id.

Oct 20 2022, 7:50 AM · backport, gnupg (gpg22), Bug Report, Restricted Project
werner added a comment to T6250: GPG-Agent doesn't work properly with smart cards and ed25519 keys and SSH Agent.

I am using this many years now without any problems. Also my collegues and many other folks I know. Thus the question is how your system differs from commonly used systems.

Oct 20 2022, 7:48 AM · gnupg, Documentation, ssh
gniibe committed rE5ad97e8fa628: gpgrt_spawn_process, gpgrt_spawn_process_fd: Change the API. (authored by gniibe).
gpgrt_spawn_process, gpgrt_spawn_process_fd: Change the API.
Oct 20 2022, 7:29 AM
gniibe committed rGde01fb8131fd: agent,common,dirmngr,tests,tools: Remove spawn PREEXEC argument. (authored by gniibe).
agent,common,dirmngr,tests,tools: Remove spawn PREEXEC argument.
Oct 20 2022, 7:23 AM
alca7raz added a comment to T6250: GPG-Agent doesn't work properly with smart cards and ed25519 keys and SSH Agent.

I have tried the stable version (2.3.8). Sadly, it doesn't work. 'agent refused operation' again. And I think it may have nothing to do with OpenSSH certificates because NIST256&384&512 keys do work in this situation.

Oct 20 2022, 6:36 AM · gnupg, Documentation, ssh
l10n daemon script <scripty@kde.org> committed rLIBKLEOa4e91a066db9: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Oct 20 2022, 5:11 AM
l10n daemon script <scripty@kde.org> committed rKLEOPATRA7aa79bb2fb61: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Oct 20 2022, 5:09 AM
dkg added a comment to T6238: regexp for trust signature domain restriction does not work if key only has an e-mail address.

@werner i'm not sure i understand what "easy to enclose them in angle brackets just for comparison" means.

Oct 20 2022, 2:48 AM · backport, gnupg (gpg22), Bug Report, Restricted Project
gniibe added a comment to T6039: FIPS: Allow salt=NULL (or shorter salt) for HKDF.

I read the document (SP 800-131Ar2) again. I think that it would be irrelevant for PKDF2, because it's password KDF, not deriving additional keys from a Cryptographic Key.

Oct 20 2022, 2:15 AM · backport, libgcrypt, FIPS

Oct 19 2022

ikloecker added inline comments to rD34eed1bd03f3: web: Fix last commit.
Oct 19 2022, 9:00 PM
werner added a comment to T6250: GPG-Agent doesn't work properly with smart cards and ed25519 keys and SSH Agent.

We do not support OpenSSH certificates but ignore such requests. However, the keys from the certificates will be imported correctly. You should use the stable version of GnuPG (2.3.8) and not the LTS version 2.,2.

Oct 19 2022, 7:36 PM · gnupg, Documentation, ssh
neverpanic added a comment to rC857e6f467d0f: kdf:pkdf2: Require longer input when FIPS mode..

This causes ACVP tests to fail, so apparently the assumption that passphrases must be at least 14 bytes was incorrect. ACVP testing tests values larger than 8 bytes. I'll try to clarify whether that's a limit we need to enforce, or just what NIST wants to test. In any case, we will probably have to revert this.

Oct 19 2022, 7:00 PM
werner committed rD34eed1bd03f3: web: Fix last commit (authored by werner).
web: Fix last commit
Oct 19 2022, 4:10 PM
alca7raz created T6250: GPG-Agent doesn't work properly with smart cards and ed25519 keys and SSH Agent.
Oct 19 2022, 3:56 PM · gnupg, Documentation, ssh
werner committed rD2ab884d58ee0: web: Add download links for GnuPG Desktop 2.3.8 (authored by werner).
web: Add download links for GnuPG Desktop 2.3.8
Oct 19 2022, 3:40 PM
werner added a comment to T6243: SMIME on Outlook not working, if GPG-Plugin installed.

This is the first report we have on such a problem despite of hundred thousands of users. "Triage" means that we need to look at a report to check its priority.

Oct 19 2022, 1:53 PM · gpgol, Bug Report
ikloecker committed rKLEOPATRAa3d6a7be6566: Defer mapping the generic algorithm IDs to specific ones (authored by ikloecker).
Defer mapping the generic algorithm IDs to specific ones
Oct 19 2022, 12:28 PM
ikloecker committed rKLEOPATRA434563868a65: Ask the smart cards for the supported algorithms (authored by ikloecker).
Ask the smart cards for the supported algorithms
Oct 19 2022, 12:28 PM
ikloecker committed rKLEOPATRA02ef04c27daf: Allow setting/retrieving supported algorithms of OpenPGP smart cards (authored by ikloecker).
Allow setting/retrieving supported algorithms of OpenPGP smart cards
Oct 19 2022, 12:28 PM
ikloecker committed rKLEOPATRAb3dcee2709ef: Add simple struct for information on algorithms (authored by ikloecker).
Add simple struct for information on algorithms
Oct 19 2022, 12:28 PM
ikloecker committed rKLEOPATRA311a86798e36: Allow (re-)generating individual keys of OpenPGP smart cards (authored by ikloecker).
Allow (re-)generating individual keys of OpenPGP smart cards
Oct 19 2022, 12:28 PM
ikloecker committed rKLEOPATRA770f60e9a685: Set supported algorithms of a few OpenPGP smart cards (authored by ikloecker).
Set supported algorithms of a few OpenPGP smart cards
Oct 19 2022, 12:28 PM
Harrypotter06 updated subscribers of T6243: SMIME on Outlook not working, if GPG-Plugin installed.

@werner , why set to "needs triage"? At this moment plugin must be disabled if customer read crypted SMIME E-Mails. So it is critical. disable checkbox "SMIME" will not work correct. Enable "SMIME" will only encrypt as Text, but some E-Mails have HTML.
We have this issue on all systems (Windows 10 and Windows 11)

Oct 19 2022, 12:21 PM · gpgol, Bug Report
werner raised the priority of T6243: SMIME on Outlook not working, if GPG-Plugin installed from High to Needs Triage.
Oct 19 2022, 12:09 PM · gpgol, Bug Report
gniibe added a comment to T6248: FIPS compliant RSA OAEP encryption.

Please note that: libgcrypt offers ECDH functionality by gcry_pk_encrypt/gcry_pk_decrypt to construct OpenPGP public-key encryption/decryption.

Oct 19 2022, 9:05 AM · libgcrypt, FIPS, Feature Request
werner triaged T6248: FIPS compliant RSA OAEP encryption as Normal priority.

So, this is only for OAEP but not for ECDH? FWIW, GnUPG uses OAEP only for S/MIME.

Oct 19 2022, 7:54 AM · libgcrypt, FIPS, Feature Request
gniibe committed rE494886acb0bf: spawn: Update changes from gnupg. (authored by gniibe).
spawn: Update changes from gnupg.
Oct 19 2022, 7:25 AM
gniibe committed rCb77e7a225bc4: tests: Use proper format string for size_t (authored by Jakuje).
tests: Use proper format string for size_t
Oct 19 2022, 7:17 AM
gniibe committed rC4e7941587c95: cipher: Do not run RSA encryption selftest by default (authored by Jakuje).
cipher: Do not run RSA encryption selftest by default
Oct 19 2022, 7:17 AM
gniibe added a reverting change for rCf736f3c70182: tests: Expect the RSA PKCS #1.5 encryption to fail in FIPS mode: rC7468cdfc8b6a: Revert "tests: Expect the RSA PKCS #1.5 encryption to fail in FIPS mode".
Oct 19 2022, 7:17 AM
gniibe committed rC7468cdfc8b6a: Revert "tests: Expect the RSA PKCS #1.5 encryption to fail in FIPS mode" (authored by Jakuje).
Revert "tests: Expect the RSA PKCS #1.5 encryption to fail in FIPS mode"
Oct 19 2022, 7:17 AM
gniibe committed rCe83280b36be3: Revert "Do not allow PKCS #1.5 padding for encryption in FIPS" (authored by Jakuje).
Revert "Do not allow PKCS #1.5 padding for encryption in FIPS"
Oct 19 2022, 7:17 AM
gniibe added a reverting change for rCc7709f7b2384: Do not allow PKCS #1.5 padding for encryption in FIPS: rCe83280b36be3: Revert "Do not allow PKCS #1.5 padding for encryption in FIPS".
Oct 19 2022, 7:17 AM
gniibe committed rC9d56af04dce0: Revert "tests: Expect the OEAP tests to fail in FIPS mode." (authored by Jakuje).
Revert "tests: Expect the OEAP tests to fail in FIPS mode."
Oct 19 2022, 7:17 AM
gniibe added a reverting change for rC249ca431ef88: tests: Expect the OEAP tests to fail in FIPS mode.: rC9d56af04dce0: Revert "tests: Expect the OEAP tests to fail in FIPS mode.".
Oct 19 2022, 7:17 AM
gniibe committed rCc5de9e77fb33: fips: Fix fips indicator function. (authored by Jakuje).
fips: Fix fips indicator function.
Oct 19 2022, 7:17 AM
gniibe added a reverting change for rCe552e37983da: fips: Disable RSA-OAEP padding in FIPS mode.: rCa7b5cab05f6a: Revert "fips: Disable RSA-OAEP padding in FIPS mode.".
Oct 19 2022, 7:17 AM
gniibe committed rCa7b5cab05f6a: Revert "fips: Disable RSA-OAEP padding in FIPS mode." (authored by Jakuje).
Revert "fips: Disable RSA-OAEP padding in FIPS mode."
Oct 19 2022, 7:17 AM
gniibe committed rC05cb8355d3e6: fips: Mark gcry_pk_encrypt/decrypt function non-approved. (authored by Jakuje).
fips: Mark gcry_pk_encrypt/decrypt function non-approved.
Oct 19 2022, 7:17 AM
l10n daemon script <scripty@kde.org> committed rLIBKLEO58d94892b1d6: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Oct 19 2022, 4:07 AM
l10n daemon script <scripty@kde.org> committed rKLEOPATRA9f72d2d76e9b: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Oct 19 2022, 4:05 AM
gniibe changed the status of T6244: GnuPG: GnuPG 2.2.40 LTS FTBFS against new Libgpg-error 1.46 from Open to Testing.
Oct 19 2022, 3:21 AM · Windows, gnupg (gpg22), Bug Report
gniibe changed the status of T6239: gnugp 2.3.8 fails to build with --disable-ldap from Open to Testing.
Oct 19 2022, 3:20 AM · gnupg, Bug Report
gniibe added a comment to T6242: libgcrypt: optimize ECB? (as it may be used to estimate library crypto performance).

It's not that needed, in my opinion, as nobody actually uses ECB itself (in real use case). But I understand the point of (possibly, students') benchmarking.

Oct 19 2022, 3:19 AM · libgcrypt, Feature Request
gniibe triaged T6249: gpgrt: spawn functions as Normal priority.
Oct 19 2022, 3:12 AM · gnupg, libassuan, gpgrt

Oct 18 2022

werner added a comment to T6228: TOFU data are not updated when creating an encrypted message.

FWIW: I am not anymore very convinced of our tofu code. it leaks too many information because it tracks and stored all signature verification. The model is further way too complicated and the SQL used will eventually lead to a resource problem. Maybe doing Tofu stuff in the frontend is a better idea and get rid of all the history processing which works only for fresh mails and not for data verification.

Oct 18 2022, 5:55 PM · gpgme, TOFU
ikloecker added a comment to T6228: TOFU data are not updated when creating an encrypted message.

Yes it is set to tofu+pgp. Is it now possible to change the trust-model on context based?

Oct 18 2022, 2:41 PM · gpgme, TOFU
hefee added a comment to T6228: TOFU data are not updated when creating an encrypted message.

Thanks for the report, since you are using it on the command line and it works I assume that trust-model is set to tofu+pgp? Because in the Test code there is no context flag for tofu+pgp trust model.

Oct 18 2022, 1:52 PM · gpgme, TOFU
Jakuje created T6248: FIPS compliant RSA OAEP encryption.
Oct 18 2022, 11:57 AM · libgcrypt, FIPS, Feature Request
aheinecke triaged T6228: TOFU data are not updated when creating an encrypted message as Normal priority.

Thanks for the report, since you are using it on the command line and it works I assume that trust-model is set to tofu+pgp? Because in the Test code there is no context flag for tofu+pgp trust model.

Oct 18 2022, 11:52 AM · gpgme, TOFU
aheinecke merged T6247: Cannot create protable version into T6246: Gpg4win: Mkportable only allow portable installer with installed features.
Oct 18 2022, 11:47 AM · Installer, gpg4win
aheinecke merged task T6247: Cannot create protable version into T6246: Gpg4win: Mkportable only allow portable installer with installed features.
Oct 18 2022, 11:47 AM · gpg4win, Bug Report
aheinecke added a comment to T6247: Cannot create protable version.

I tend to close this as a duplicate.

Oct 18 2022, 11:47 AM · gpg4win, Bug Report
cklassen created T6247: Cannot create protable version.
Oct 18 2022, 11:43 AM · gpg4win, Bug Report
gniibe committed rXf21d98756952: build: Remove --with-*-prefix. (authored by gniibe).
build: Remove --with-*-prefix.
Oct 18 2022, 11:21 AM
gniibe committed rX18b78e2f473b: build: Update gpg-error.m4 and libassuan.m4. (authored by gniibe).
build: Update gpg-error.m4 and libassuan.m4.
Oct 18 2022, 11:21 AM