And --keyserver-options check-cert is removed from new gpg versions (((
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Dec 22 2021
@werner can you show me tutorial for proper bug submit? I think it is a bug and gpg client on Windows does not support valid LetsEncrypt certificates on keyserver. It does not work with any keys server . Tested few public keyservers as well. ((
(q)gpgme now tries to detect a failed import caused by a bad passphrase and emits a bad passphrase error in this case. Kleopatra then shows a "Bad passphrase" error instead of an "Invalid object" error.
We decided to notify the user if the keyserver doesn't return fingerprints. The fingerprints are needed by Kleopatra as unique identifier for keys. Trying to make key lookup work without fingerprints isn't useful.
Please see https://gnupg.org
Dec 21 2021
FWIW, We have a similar mechanism for the secure memory
That is a security feature of WIndows. We can't do much about it except for bad hacks. Checkout Kleopatra to see how you can improve this.
We talked today about the renaming the current "linux" entropy module to "oldlinux" would make sense.
Ok, I'll add.
@alexnadtoka, did you do what Werner wrote in T5639#150626?
Recently, I have encountered many problems in adapting the graphical interface interaction between Yubikey and gnupg. I am thinking about why some settings need to be manually added to some additional settings. I found that there are many such solutions on the Internet. Is there any way that scdaemon can automatically recognize these situations and add appropriate settings.
Things are not that easy. I actually introduced a bug in 2.3.4. Here is a comment from my working copy:
@werner Thank you for the answer. Please advise mailing list address.
For support please use the mailing list and not the bug tracker.
Seen. @jukivili can you please add it to the AUTHORS file?
GNUpg version 2.3.4 was installed but did not help
Is there a way to ignore SSL check during connection? This might work. We have internal server for our users only.
Guys I am facing similar issue but my Lets ecnrypt certificates are all ok. What is the problem with my gpg4win client? When connecting to openpgp server it says certificate is expired. Anybody can help me?
Dec 20 2021
We can even remove the hexfingerrprint call. Will go into 2.3.4. Thanks.
It would be easier to educate gpgme about the 11.
So, this is the patch. Note that this is for master.
diff --git a/g10/keygen.c b/g10/keygen.c index 7f15027a2..a452ab6d6 100644 --- a/g10/keygen.c +++ b/g10/keygen.c @@ -5619,7 +5619,7 @@ do_generate_keypair (ctrl_t ctrl, struct para_data_s *para, pk = find_kbnode (pub_root, PKT_PUBLIC_KEY)->pkt->pkt.public_key;
Actually, the "11" at the end of the "ERROR" status line means "bad passphrase". But I think gpgme ignores this status line.
Okay. gpgsm even logs "gpgsm: possibly bad passphrase given" internally.
Because, as a user, what do you do if you see "invalid object" you think that something is wrong with your data instead of trying to type the passphrase again.
As I understand it after the p12 decryption the output is just tried to be imported. With the wrong passphrase this is just garbage and can lead to different errors.
gpgsm 2.3.4 sends the result:
S ERROR import.parsep12 11 S IMPORT_RES 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ERR 50331713 Invalid object <GpgSM>
With Kleopatra 3.1.20.220370+git20211216T120053~68b4545e (22.03.70) using GnuPG 2.3.4-beta24 and Libgcrypt 1.9.4-beta152 I get the error message Invalid object when I import only berta-enc.p12 and enter a wrong password. I'll have to check with GnuPG 2.2.33.
I've uploaded my testcerts to: https://heinecke.or.at/div/testzertifikate.tar.gz.gpg
That KeyListJob returns keys which have fingerprint NULL is caused by keyservers returning just key IDs instead of fingerprints. The change for T5741: dirmngr does not ask keyservers for fingerprints should fix this. Still keyservers are only guaranteed to return key IDs, so we cannot assume that keys returned by KeyListJob have fingerprints.