- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Aug 18 2023
I think that fixes the biggest issue here as long as kleo is not just killed it should save the current configuration state. Maybe we should add it in some more places explicitly, too where many things are stored in the config, like with the certifydialog?
😂 Skandal! Ein BUG!: "Möchten Sie die Installation ohne Administrator-Rechte fortfahren?" und Sie sagen "Nein". Ja dann brechen wir ab weil sie eben *nicht* fortfahren wollen.
Hi @gniibe - thanks for your fix.
Backport to VSD, as leaving out WKD is a bug.
result from meeting:
This could have something to do with our changes to g4wihelp.c to adapt to the new plugin API.
You can install Gpg4win without admin rights. It requests "Highest available" rights by default to be installed into the protected Program Files (x86) folder. When you are not in the Administrators group It will install into your home directory much like firefox does. Any maybe if you don't want to leave a footprint installing Gpg4win on the System (without admin rights) where you don't have admin rights is kind of beside the point. You either leave a footprint by the installation or you could just use the installed Gpg4win there.
Pushed the fix for SIGINT handling of pinentry-tty and pinentry-curses by: rPa6f63fe37dbf: tty,curses: Upon SIGINT, let pinentry exit gracefully.
This fix should improve the situation.
Thank you for the report.
I found a bug in pinentry-curses and pinentry-tty for handling SIGINT. I am going to fix this.
Pushed the change to:
- libgpg-error
- libassuan master
- libgcrypt master
- ntbtls
- npth
- libksba
- gpgme
- scute
Aug 17 2023
Regarding PIN, they should be set first.
- A temporary Admin / User PIN is be generated and stored in gpg-agent.
- Then the keys are created as mentioned above.
- The user is asked to set a new PIN and Admin PIN for the card.
- Optionally set a RESET CODE
For generate new keys we see four use cases
- Create card and backup card. -> Creates at least two cards with the same keys. Keys might be stored in ram: TODO: Add subtask
- Full backup of all keys - Allows for copied cards at a later time.
- Only backup encryption Key. - There is a backup of the encryption key on the computer.
- No backup - Keys will be generated on the card.
Yes, gpgtar emits a SUCCESS status. gpgme should probably check for this.
[For bug reports please don't refer to some other site - at least a brief but useful description should always be included]
Yes i think we need something like that, maybe shorter like this message is (VS-NfD compliant) encrypted and this message was (VS-NfD compliant) signed by "user.name@foo.bar" as a single line each, with "Details" available. And then in details show some more information like who the message was also encrypted to, ideally with the user ids when we have the keys in the keyring already and not the fingerprints of the keys. Or maybe just a status indication icon like we have in GpgOL which provides more information when you click it or as a tooltip. At the very least we need to make sure that this cannot be faked by e.g. HTML Mails :) so it needs to be removed a bit from the actual mail body.
This is how this looks in the qml viewer, in the qtwidget viewer there is no support for this yet. Do you want something similar for the qtwidget view?
Sorry, I only now noticed that you used the --export-secret-ssh-key. Unfortunately commit
rGafe5fcda52e88438c7a7278117b2e03f510a9c1c states in the comment:
"Due to time constraints the code is not yet ready." Let's turn this into a feature request.
I mostly used ed25519 keys and thus I do the avove command pretty often without problems. Can you please add
-v --debug lookup
to the command line show us the log (send privately to my standard mail address (wk@gnu...) if you feel that data is too sensitive for the public).
I would like it if we could show the result list widgets above or below the message contents in the message viewer. Maybe shortened to a single line and then you can expand it to see the details.
Thank you! Closed by https://github.com/gpg/npth/commit/bd356d82394447b51b2505756094d6475e160a4b
Aug 16 2023
The sign/encrypt archive jobs now also take care of removing the output file if the operation was canceled or failed.
A bit related: T6656 when I look at the web interface of an account that uses GpgOL I see these files everywhere. And they should then also be handled by kleopatra but for that they need some file extension that I can link to kleopatra.