Page MenuHome GnuPG
Feed All Stories

Wed, Jun 11

TobiasFella committed rKLEOPATRA842668be3e9c: Use RSAKeySizes and PGPKeyType again (authored by TobiasFella).
Use RSAKeySizes and PGPKeyType again
Wed, Jun 11, 3:19 PM
ikloecker changed the status of T7678: Kleopatra: revoked UIDs should not be offered for signing and they should be labeled consistently from Open to Testing.

Parts of the changes made for T7183: Kleopatra: Reduce certificates offered in Sign/Enyrypt dialog have been reverted. The drop downs for selecting the signing key and the "encrypt to self" key now offer the primary user IDs of usable keys again (instead of all user IDs of usable keys) and there's no button to open a certificate selection dialog anymore.

Wed, Jun 11, 2:47 PM · vsd33, Bug Report, kleopatra
ikloecker committed rKLEOPATRA548dab68e089: Revert change of selection of own keys to selection of own user IDs (authored by ikloecker).
Revert change of selection of own keys to selection of own user IDs
Wed, Jun 11, 2:38 PM
TobiasFella committed rLIBKLEO8c15d5d837a8: Use RSAKeySizes and PGPKeyType again (authored by TobiasFella).
Use RSAKeySizes and PGPKeyType again
Wed, Jun 11, 2:20 PM
TobiasFella committed rLIBKLEO49cfdf7e3397: Use RSAKeySizes and PGPKeyType again (authored by TobiasFella).
Use RSAKeySizes and PGPKeyType again
Wed, Jun 11, 2:19 PM
TobiasFella committed rLIBKLEO1612060d4ff5: Use RSAKeySizes and PGPKeyType again (authored by TobiasFella).
Use RSAKeySizes and PGPKeyType again
Wed, Jun 11, 2:19 PM
werner triaged T7677: Duplicate --with-gnu-ld Entries in libgpg-error 1.55 configure Help Output as Wishlist priority.

I looked at it but we probably need to rework/update the entire libtool stuff which has a high regression risk. Thus I give this bug a low priority because it is not a functional bug.

Wed, Jun 11, 2:18 PM · gpgrt, Bug Report
werner triaged T7679: Key remains unsigned while Kleopatra has high CPU usage; key is signed after restarting Kleopatra as Normal priority.

Just to be clear: You originally installed it as a portable applications and then you also installed a new version in the standard way?

Wed, Jun 11, 2:14 PM · kleopatra, Bug Report, gpg4win
werner reopened T7680: Double clicking on attachment will open attachment multiple times as "Testing".
Wed, Jun 11, 2:11 PM · gpgol2
ebo added a project to T7680: Double clicking on attachment will open attachment multiple times: gpgol2.
Wed, Jun 11, 1:54 PM · gpgol2
CarlSchwan committed rWf53fafa4df91: mimetreeparser: Avoid opening multiple times the same attachement (authored by CarlSchwan).
mimetreeparser: Avoid opening multiple times the same attachement
Wed, Jun 11, 12:31 PM
CarlSchwan triaged T7681: Pinning of the viewer sometimes doesn't work as Normal priority.
Wed, Jun 11, 12:29 PM · gpgol2
CarlSchwan closed T7680: Double clicking on attachment will open attachment multiple times as Resolved.
Wed, Jun 11, 12:26 PM · gpgol2
ebo triaged T7678: Kleopatra: revoked UIDs should not be offered for signing and they should be labeled consistently as High priority.
Wed, Jun 11, 12:24 PM · vsd33, Bug Report, kleopatra
CarlSchwan committed rMTPa1ea51ae5391: Remove debug output (authored by CarlSchwan).
Remove debug output
Wed, Jun 11, 11:57 AM
CarlSchwan committed rMTPcaab6e890c17: Remove debug output (authored by CarlSchwan).
Remove debug output
Wed, Jun 11, 11:56 AM
CarlSchwan committed rMTP107c872d8e1c: Connect only once to attachment list double click event (authored by CarlSchwan).
Connect only once to attachment list double click event
Wed, Jun 11, 11:55 AM
CarlSchwan committed rMTP89afa6ddba6b: Connect only once to attachment list double click event (authored by CarlSchwan).
Connect only once to attachment list double click event
Wed, Jun 11, 11:55 AM
ikloecker added a comment to T6623: Kleopatra hangs "Loading certificate cache" on Windows 10.

I started Process Monitor only after Kleopatra hang so that I cannot find out which process started gpg-connect-agent.

Wed, Jun 11, 11:52 AM · kleopatra
werner added a comment to T6623: Kleopatra hangs "Loading certificate cache" on Windows 10.

Can you figure out who started gpg-connect-agent? Note that it is also used by gpgconf to reload, kill, or launch daemons.

Wed, Jun 11, 11:47 AM · kleopatra
ebo added a comment to T7678: Kleopatra: revoked UIDs should not be offered for signing and they should be labeled consistently.

And mind that the wording "This certificate is revoked" is wrong in any case, only the user ID is revoked, not the public key.

Wed, Jun 11, 11:43 AM · vsd33, Bug Report, kleopatra
werner added a comment to T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token.

I stumbled into this problems myself yesterday. Time for a new release.

Wed, Jun 11, 11:24 AM · gnupg26, Bug Report
ebo renamed T7678: Kleopatra: revoked UIDs should not be offered for signing and they should be labeled consistently from Kleopatra: revoked UIDs should not be offered for encryption and they should be labeled consistently to Kleopatra: revoked UIDs should not be offered for signing and they should be labeled consistently.
Wed, Jun 11, 11:12 AM · vsd33, Bug Report, kleopatra
uwi created T7679: Key remains unsigned while Kleopatra has high CPU usage; key is signed after restarting Kleopatra.
Wed, Jun 11, 10:57 AM · kleopatra, Bug Report, gpg4win
ikloecker added a comment to T6623: Kleopatra hangs "Loading certificate cache" on Windows 10.

Log files for above deadlock

Wed, Jun 11, 10:53 AM · kleopatra
ikloecker added a comment to T6623: Kleopatra hangs "Loading certificate cache" on Windows 10.

I just had another hang.

Wed, Jun 11, 10:42 AM · kleopatra
ebo updated the task description for T7678: Kleopatra: revoked UIDs should not be offered for signing and they should be labeled consistently.
Wed, Jun 11, 9:45 AM · vsd33, Bug Report, kleopatra
l10n daemon script <scripty@kde.org> committed rMTP1b3a4b8243f9: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Wed, Jun 11, 5:30 AM
l10n daemon script <scripty@kde.org> committed rKLEOPATRAf17403c4724b: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Wed, Jun 11, 5:29 AM
l10n daemon script <scripty@kde.org> committed rMTP3313e8a73d7c: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Wed, Jun 11, 3:47 AM
l10n daemon script <scripty@kde.org> committed rKLEOPATRAf268983c6751: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Wed, Jun 11, 3:46 AM
Albert Astals Cid <aacid@kde.org> added a reverting change for rKLEOPATRA938ea4956a78: Disable flatpak until it starts working again: rKLEOPATRA51c6fc02c4c0: Revert "Disable flatpak until it starts working again".
Wed, Jun 11, 12:05 AM
Albert Astals Cid <aacid@kde.org> committed rKLEOPATRA51c6fc02c4c0: Revert "Disable flatpak until it starts working again" (authored by Albert Astals Cid <aacid@kde.org>).
Revert "Disable flatpak until it starts working again"
Wed, Jun 11, 12:05 AM
Albert Astals Cid <aacid@kde.org> committed rKLEOPATRA938ea4956a78: Disable flatpak until it starts working again (authored by Albert Astals Cid <aacid@kde.org>).
Disable flatpak until it starts working again
Wed, Jun 11, 12:05 AM
Albert Astals Cid <aacid@kde.org> committed rKLEOPATRA53a123be93d1: Disable flatpak until it starts working again (authored by Albert Astals Cid <aacid@kde.org>).
Disable flatpak until it starts working again
Wed, Jun 11, 12:05 AM

Tue, Jun 10

ebo created T7678: Kleopatra: revoked UIDs should not be offered for signing and they should be labeled consistently.
Tue, Jun 10, 4:43 PM · vsd33, Bug Report, kleopatra
TobiasFella committed rLIBKLEO40792d62153d: Use RSAKeySizes and PGPKeyType again (authored by TobiasFella).
Use RSAKeySizes and PGPKeyType again
Tue, Jun 10, 3:58 PM
TobiasFella committed rKLEOPATRAb33cf45186cb: Use RSAKeySizes and PGPKeyType again (authored by TobiasFella).
Use RSAKeySizes and PGPKeyType again
Tue, Jun 10, 3:48 PM
TobiasFella committed rLIBKLEOa4f6d81076d7: Remove new logic (authored by TobiasFella).
Remove new logic
Tue, Jun 10, 3:44 PM
TobiasFella committed rLIBKLEOcd37cf42a4cd: Use RSAKeySizes and PGPKeyType again (authored by TobiasFella).
Use RSAKeySizes and PGPKeyType again
Tue, Jun 10, 3:36 PM
TobiasFella committed rLIBKLEOccbc1e534dda: Use RSAKeySizes and PGPKeyType again (authored by TobiasFella).
Use RSAKeySizes and PGPKeyType again
Tue, Jun 10, 12:42 PM
mlaurent committed rLIBKLEOe296580e3ca9: GIT_SILENT: time to increase version (authored by mlaurent).
GIT_SILENT: time to increase version
Tue, Jun 10, 8:20 AM
mlaurent committed rMTP897ebdb86b25: GIT_SILENT: time to increase version (authored by mlaurent).
GIT_SILENT: time to increase version
Tue, Jun 10, 8:17 AM
mlaurent committed rKLEOPATRAc4b34fe90ce7: GIT_SILENT: time to increase version (authored by mlaurent).
GIT_SILENT: time to increase version
Tue, Jun 10, 8:16 AM
l10n daemon script <scripty@kde.org> committed rMTP9b30530a4a24: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Tue, Jun 10, 3:47 AM

Mon, Jun 9

l10n daemon script <scripty@kde.org> committed rKLEOPATRAd0a370772a06: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Mon, Jun 9, 5:20 AM
l10n daemon script <scripty@kde.org> committed rKLEOPATRA62e4ef79a896: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Mon, Jun 9, 3:44 AM

Sun, Jun 8

Paul Schwabauer <pschwabauer@intevation.de> committed rGPGMEPY66e8a5e43d04: build: Fix `make sdist` (authored by Paul Schwabauer <pschwabauer@intevation.de>).
build: Fix `make sdist`
Sun, Jun 8, 10:53 AM

Sat, Jun 7

mlaurent committed rMTP1537b0fec27a: GIT_SILENT: prepare 25.04.3 (authored by mlaurent).
GIT_SILENT: prepare 25.04.3
Sat, Jun 7, 8:58 AM
mlaurent committed rKLEOPATRA56d5d77bf131: GIT_SILENT: prepare 25.04.3 (authored by mlaurent).
GIT_SILENT: prepare 25.04.3
Sat, Jun 7, 8:57 AM

Fri, Jun 6

Paul Schwabauer <pschwabauer@intevation.de> committed rGPGMEPYc2795140e546: Fix uninstall on Debian based systems (authored by Paul Schwabauer <pschwabauer@intevation.de>).
Fix uninstall on Debian based systems
Fri, Jun 6, 9:16 PM
Paul Schwabauer <pschwabauer@intevation.de> committed rGPGMEPYe4afe19f2fe3: Add missing files to uninstall target (authored by Paul Schwabauer <pschwabauer@intevation.de>).
Add missing files to uninstall target
Fri, Jun 6, 8:47 PM
mlaurent committed rKLEOPATRAd1d83c07b9dd: GIT_SILENT: indent json file (authored by mlaurent).
GIT_SILENT: indent json file
Fri, Jun 6, 8:06 PM
mlaurent committed rMTP5044d06338a5: GIT_SILENT: indent json file (authored by mlaurent).
GIT_SILENT: indent json file
Fri, Jun 6, 8:04 PM
Paul Schwabauer <pschwabauer@intevation.de> committed rGPGMEPY26f99b47a7bf: Add missing files to uninstall target (authored by Paul Schwabauer <pschwabauer@intevation.de>).
Add missing files to uninstall target
Fri, Jun 6, 8:01 PM
mlaurent committed rLIBKLEOb49a14feefaf: GIT_SILENT: indent json file (authored by mlaurent).
GIT_SILENT: indent json file
Fri, Jun 6, 8:00 PM
CarlSchwan committed rOJ57033608a879: Cross link doc/security with doc/communication (authored by CarlSchwan).
Cross link doc/security with doc/communication
Fri, Jun 6, 1:33 PM
CarlSchwan committed rOJ27692b2a2302: Remove doc/architecture.odp (authored by CarlSchwan).
Remove doc/architecture.odp
Fri, Jun 6, 1:33 PM
CarlSchwan committed rOJebf856ae5cca: Add verification dialog to confirm that native client is authorized (authored by CarlSchwan).
Add verification dialog to confirm that native client is authorized
Fri, Jun 6, 1:22 PM
CarlSchwan committed rOJc2c95a95f62d: Update technical documentation (authored by CarlSchwan).
Update technical documentation
Fri, Jun 6, 1:22 PM
CarlSchwan committed rOJ5bceaa34d26d: Remove serverstate and draftcontroller.h (authored by CarlSchwan).
Remove serverstate and draftcontroller.h
Fri, Jun 6, 1:22 PM
gouttegd added a comment to T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token.

Once again, thank you for your reactivity @gniibe !

Fri, Jun 6, 11:00 AM · gnupg26, Bug Report
gniibe changed the status of T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token from Open to Testing.
Fri, Jun 6, 7:27 AM · gnupg26, Bug Report
gniibe added a comment to T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token.

My test coverage was not good (even if I daily use Curve25519 on Gnuk Token).
Your analysis is correct.

Fri, Jun 6, 7:18 AM · gnupg26, Bug Report
gniibe committed rGfde915af1cf4: agent: Fix for the prefix 0x40 in the point representation. (authored by gniibe).
agent: Fix for the prefix 0x40 in the point representation.
Fri, Jun 6, 7:16 AM
mlaurent committed rMTP55fa94a5e91d: GIT_SILENT: prepare 25.04.3 (authored by mlaurent).
GIT_SILENT: prepare 25.04.3
Fri, Jun 6, 7:09 AM
gniibe triaged T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token as High priority.
Fri, Jun 6, 7:00 AM · gnupg26, Bug Report
gniibe claimed T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token.
Fri, Jun 6, 7:00 AM · gnupg26, Bug Report
mlaurent committed rLIBKLEOdb7a895313e4: GIT_SILENT: prepare 25.04.3 (authored by mlaurent).
GIT_SILENT: prepare 25.04.3
Fri, Jun 6, 6:58 AM

Thu, Jun 5

philiperm added a watcher for gpa: philiperm.
Thu, Jun 5, 8:45 PM
philiperm added a watcher for gnupg: philiperm.
Thu, Jun 5, 8:45 PM
philiperm added a watcher for gpg4win: philiperm.
Thu, Jun 5, 8:44 PM
philiperm added a watcher for kleopatra: philiperm.
Thu, Jun 5, 8:17 PM
gouttegd added a project to T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token: gnupg26.
Thu, Jun 5, 7:49 PM · gnupg26, Bug Report
Saturneric created T7677: Duplicate --with-gnu-ld Entries in libgpg-error 1.55 configure Help Output.
Thu, Jun 5, 5:22 PM · gpgrt, Bug Report
jap added a comment to T7675: a user-id with just an email address (and not a display name) has no angle brackets surrounding the email address.

Thanks for elaborating and the reference to rfc2440 - I now understand where that stray mail (between [RFC2822] and name-addr) in rfc4880 comes from...
Anyway, I'll treat it as if it says RFC 2822 mailbox and will treat angle brackets with bare addresses as optional.

Thu, Jun 5, 4:21 PM · OpenPGP, Documentation
m <meik.michalke@gnupg.com> committed rOJcc1dadac534e: Restructured doc/communication.md and added some markdown (authored by m <meik.michalke@gnupg.com>).
Restructured doc/communication.md and added some markdown
Thu, Jun 5, 3:45 PM
CarlSchwan committed rOJ4a63c42a4409: Fix extracting file name from attachment (authored by CarlSchwan).
Fix extracting file name from attachment
Thu, Jun 5, 3:36 PM
werner committed rOJb0cd7c3e89ff: Extend the documentation to describe the involved components (authored by werner).
Extend the documentation to describe the involved components
Thu, Jun 5, 3:10 PM
ikloecker added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

In Kleopatra we explicitly trigger a re-reading of the smart card after each operation involving a smart card to ensure that Kleopatra doesn't show wrong information. There's so much that can go wrong with physical smart cards that this is the only way to make sure you don't tell the user lies. I think gpg --edit-card also re-reads the smart card after each operation.

Thu, Jun 5, 2:57 PM · gnupg, Bug Report
ikloecker removed a project from T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated): gpgme.

There is no bug in the contexts and there's nothing to document anywhere. If anything then it's a bug in gpg's generate command or a more general issue (in gpg-agent) with keeping track of the storage location of private keys as I have already explained in T7620#200613. I'm removing the gpgme tag because there's nothing wrong in gpgme and there's nothing we can do in gpgme. It needs to be addressed in gnupg.

Thu, Jun 5, 2:45 PM · gnupg, Bug Report
CarlSchwan committed rOJ582cfed2cfc4: Add documentation for the communication (authored by CarlSchwan).
Add documentation for the communication
Thu, Jun 5, 2:29 PM
CarlSchwan committed rOJ1673c9c12c49: Reuse sendMessageToNative/WebClient (authored by CarlSchwan).
Reuse sendMessageToNative/WebClient
Thu, Jun 5, 2:29 PM
CarlSchwan committed rOJ598b4a37c861: web: Use generic action also to open composer (authored by CarlSchwan).
web: Use generic action also to open composer
Thu, Jun 5, 2:29 PM
CarlSchwan committed rOJeedaae5aae97: Update security doc (authored by CarlSchwan).
Update security doc
Thu, Jun 5, 2:29 PM
CarlSchwan committed rOJc9c41a472198: Forward message to client then there is only one available (authored by CarlSchwan).
Forward message to client then there is only one available
Thu, Jun 5, 1:20 PM
Saturneric added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

In practice, calling gpgme_get_key() will often pick up most changes because GPGME asks the underlying GPG agent daemon, which may re-read the keyring. That gives the impression that a long-lived context automatically reflects live updates. However, as aheinecke noted, some updates can still go unnoticed in a single gpgme_ctx_t, so it isn’t a strictly frozen snapshot nor a perfectly live view—behaviors are mixed.

Thu, Jun 5, 12:33 PM · gnupg, Bug Report
Saturneric added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

Maybe we should make the documentation clearer about context key reuse. But the context is specifically designed to cache information about a key, so as to avoid memory overhead. I learned early on that its best for each new operation to use a new context. A context is basically an instance of gpg or gpgsm. So you start one process, ask it for a keylist, keep the process running, start another process, modify the key database, and then ask the first process again about his worldview. Either the first process is a bit confused because it has read data and then that data changed (what happens here) or it has no idea about the change since it was efficient and only read the database once. But here in this example you should be able to reproduce this also by making any other modifications to the key, adding other subkeys, userids etc. That GPGME even notices the secret key is more of a side effect of how the programming works because the GPGME gpg process will ask the gpg-agent (so a third process).

Thu, Jun 5, 12:14 PM · gnupg, Bug Report
Saturneric added a comment to T7673: Release GPGME 2.0.0.

We will keep the 1.24 branch for bug fixing. Do you really have a problem with gpgme 2.0? Ist that due to factoring out the c++ and qt bindings? That was actually a long standing request from the KDE community so that they can use their cmake stuff.

Thu, Jun 5, 11:50 AM · Release Info, gpgme
werner added a comment to T7673: Release GPGME 2.0.0.

We will keep the 1.24 branch for bug fixing. Do you really have a problem with gpgme 2.0? Ist that due to factoring out the c++ and qt bindings? That was actually a long standing request from the KDE community so that they can use their cmake stuff.

Thu, Jun 5, 11:37 AM · Release Info, gpgme
werner committed rWb9587aa45a8a: Again update gpgoljs (authored by werner).
Again update gpgoljs
Thu, Jun 5, 11:21 AM
werner committed rD16150a3d07dd: Rename the legacy gnupgdesk to gpd and add a vsd entry (authored by werner).
Rename the legacy gnupgdesk to gpd and add a vsd entry
Thu, Jun 5, 10:43 AM
werner added a comment to T7656: Kleopatra: Wrong update suggestion from 5.0.0 to 4.4.0.

I updated the version database. We now have entries for "gpg4win", "gpd", and "vsd"

Thu, Jun 5, 10:43 AM · Bug Report, gpd5x, kleopatra
Saturneric added a comment to T7673: Release GPGME 2.0.0.

I want to know whether gpgme v1 will still be supported? Or it will be abandoned from now on.

Thu, Jun 5, 10:37 AM · Release Info, gpgme
werner closed T7675: a user-id with just an email address (and not a display name) has no angle brackets surrounding the email address as Resolved.

I see, I had rfc2440 in mind which says:

By convention, it includes  an RFC 822 mail name, but there are no restrictions on its content.

thus 4880 refined it a bit. But in practice it is not the same because it is utf8 and not punycode or whatever. let's close this bug because they way it is used will work with all mail clients.

Thu, Jun 5, 10:17 AM · OpenPGP, Documentation
werner committed rWecb08a109cdb: download.sh: Print the actually downloaded files. (authored by werner).
download.sh: Print the actually downloaded files.
Thu, Jun 5, 10:10 AM
ikloecker added a comment to T7675: a user-id with just an email address (and not a display name) has no angle brackets surrounding the email address.

Let's have a look at the section of RFC4880 linked by the reporter:

A User ID packet consists of UTF-8 text that is intended to represent
the name and email address of the key holder.  By convention, it
includes an RFC 2822 [RFC2822] mail name-addr, but there are no
restrictions on its content.  [...]
Thu, Jun 5, 10:09 AM · OpenPGP, Documentation
werner added a comment to T7675: a user-id with just an email address (and not a display name) has no angle brackets surrounding the email address.

Let's have a look at the spec (rfc2822 3.4):

address         =       mailbox / group
Thu, Jun 5, 9:38 AM · OpenPGP, Documentation
gniibe added a comment to rGeb7d5d4d8507: scd: Fix detecting digest OID in the message to be signed..

OK, fixed in rG27e6622322b5: scd: Take care of possible buffer overflow in do_auth.

Thu, Jun 5, 3:25 AM
gniibe committed rG27e6622322b5: scd: Take care of possible buffer overflow in do_auth. (authored by gniibe).
scd: Take care of possible buffer overflow in do_auth.
Thu, Jun 5, 3:25 AM