- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Oct 16 2024
The only thing that's a bit ugly is that there's no checkbox in front of "Encrypt for others" because it's mostly superfluous/redundant to the presence or absence of "other" certificates.
I'm wondering if/how we can get rid of the checkbox before "Encrypt for me". Do we even need to distinguish between "for me" and "for others"? It has always felt wrong to me that we have completely different UI for selecting my single (!) key and multiple other keys. What if I want to encrypt to two keys of me? Makes no sense to enter my second key under "Encrypt for others". What if somebody always wants to encrypt everything to two of their keys, e.g. because they use different keys on different devices? But that also applies to the file encryption dialog so maybe that's a different discussion.
In T5957#192598, @ebo wrote:But what I don't understand is: why do we need the buttons? For other encryption actions in Kleo you can choose from all available keys, regardless of their protocol.
I confirm the fix. Using gnupg master the unit test ran 544 times without any failures or suspiciously long run time.
I played a bit with the right pane to make it less wide. Here is how it looks (still WIP)
My last comment makes things look more complicated than they are.
I'd have no objections against making it less prominent.
Instead of the "Protocol" label we could then maybe add a tooltip/info to the buttons with something like "the protocol to be used".
I know, tooltips are not popular with you ;-)
Okay, then we keep the protocol radio buttons for now, but I guess there's no reason not to make it less prominent. I would even argue that the label "Protocol:" isn't really helpful and could be removed.
In T5957#192566, @CarlSchwan wrote:Does the notepad really need to support S/MIME? People might want to use inline PGP with Kleopatra, but S/MIME???
Agree
Autoconf archive has AX_TLS: https://www.gnu.org/software/autoconf-archive/ax_tls.html
Also, AX_GCC_VAR_ATTRIBUTE(tls_model) could be used: https://www.gnu.org/software/autoconf-archive/ax_gcc_var_attribute.html
Good catch, @ikloecker !
I located the bug in GnuPG, and the fix is: rG71840b57f486: common: Fix a race condition in creating socketdir.
Oct 15 2024
In the second case, gpg emits a FAILURE gpg-exit 33554433 status at the end. I think this makes gpgme consider the operation failed. I think this is a bug in gpg because gpg does not emit a FAILURE status if a wrong symmetric passphrase is entered.
In the first case, gpg emits a CANCELED_BY_USER status. This makes gpgme abort the operation. We may have to wait/watch for BEGIN_DECRYPTION / END_DECRYPTION.
Does the notepad really need to support S/MIME? People might want to use inline PGP with Kleopatra, but S/MIME???
When looking at Carl's first MR I had a few ideas/thoughts:
- Does the notepad really need to support S/MIME? People might want to use inline PGP with Kleopatra, but S/MIME???
- I wondering whether we should move the checkboxes to the group box titles and get rid of the group boxes and instead use KSeparators to separate the different sections, i.e.
[ ] Prove authenticity (sign) Sign as: ------------------------------ [ ] Encrypt Encrypt for me: Encrypt for others: ------------------------------ [ ] Encrypt with password Anyone ... ------------------------------ [Sign and Encrypt]
I found one reason for the intermittently failing concurrent initial keylisting. gpgsm sometimes uses the wrong socket file to (try to) connect to gpg-agent.
I don't think gpg/gpgsm tell gpgme "the keyblock used for decryption". They simply log all public keys used for encryption via STATUS_ENC_TO in the order the packets appear in the encrypted file.
I'm still seeing the same problems both with current master and 2.2
There is no such concept of a primary keyblock for a subkey. Using the same subkey for several primary keys is non frequent but nevertheless seen use-case. Thus this behaviour is not ADSK specific. I would suggest to first search the keyblock used for decryption to get the name of another subkey - only if that is not found search the keyring for that subkey and thus the primary key and its user id.
FWIW, the cache has not been implemented in 2.4 (which will be used for the next gpg4win) and thus there is no need for a fix there.
Was fixed last Thursday with commit rG69a8aefa5bf77136b77383b94e34ba784c1cce89 for 2.2 and will soon make it to master.
Oct 14 2024
In T7334#192524, @werner wrote:For a subkey the user id of its primary should always been show.
Summarizing out-of-band discussion (please correct where i remember things wrong):
It is not of the recipient's business to know which certificate also uses a subkey. For all the user needs to know that it is a subkey which belongs to a primary key. In this regard this is not different from a shared encryption subkey as used by many sites for role addresses. For a subkey the user id of its primary should always been show.
In case of an unknown encryption subkey we could check if it's the ADSK of a known recipient and then display something like
Unknown ADSK for "Some key with ADSK <with-adsk@example.net>"
instead of
unknown recipient
Thinking about this some more, I don't think we can anything different from what's done in my patch:
Both subkeys belong to Alice from gpg's point of view
What is wrong in your opinion?
I can reproduce this with gnupg 2.2.45-beta27 (STABLE-BRANCH-2-2 69a8aefa) on openSUSE Tumbleweed.
We have this data already. The problem on kleopatra's side is that in the key cache, we add the ADSK subkey for each key that has it as an ADSK, causing a somewhat broken index and ultimately the problem seen here.
Is this R-flag part of the status logging, i.e. do we need to add handling for this in gpgme?