Page MenuHome GnuPG

dkg (Daniel Kahn Gillmor)
User

Projects

User Details

User Since
Mar 27 2017, 4:49 PM (417 w, 19 h)
Availability
Available

Recent Activity

Fri, Mar 14

dkg added a comment to T7570: `gpg --trust-model always --verify` produces incongruous warning "Using untrusted key!".

This seems to be the case on 2.2.46 as well, fwiw. i don't think it's new in 2.4.7.

Fri, Mar 14, 8:07 PM · Not A Bug, gnupg
dkg created T7570: `gpg --trust-model always --verify` produces incongruous warning "Using untrusted key!".
Fri, Mar 14, 8:04 PM · Not A Bug, gnupg
dkg added a comment to T7569: `gpgconf --homedir $x --kill keyboxd` doesn't appear to terminate a running keyboxd.

similarly, gpgconf --homedir /tmp/gg --kill all does not terminate keyboxd, despite the fact that gpgconf(1) says:

Fri, Mar 14, 7:27 PM · gnupg, keyboxd, Bug Report
dkg created T7569: `gpgconf --homedir $x --kill keyboxd` doesn't appear to terminate a running keyboxd.
Fri, Mar 14, 7:24 PM · gnupg, keyboxd, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

I've offered https://github.com/bestpractical/gnupg-interface/pull/16 to GnuPG::Interface, and am testing it out in debian unstable.

Fri, Mar 14, 12:33 AM · gnupg26, gnupg24, Bug Report

Thu, Mar 13

dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

I'll work on making a patch to offer a flexible test suite.

Thu, Mar 13, 6:21 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Alternately, i suppose we could ask GnuPG::Interface to drop the variant parts of that test entirely. @werner, If you have a preference for what they test, it would be good to know. I suspect your opinion would carry weight with the maintainer there.

Thu, Mar 13, 6:20 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Thanks for the fix for the double-free on --no-sig-cache, that appears to be an issue on all released gpg versions, as i can crash them directly when i --no-sig-cache.

Thu, Mar 13, 5:04 PM · gnupg26, gnupg24, Bug Report

Wed, Mar 12

dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Interestingly, from this i'm learning that the patch actually *normalizes* the output so that we see the same thing regardless of ordering. the different output based on certificate order happens only in the unpatched version.

Wed, Mar 12, 5:34 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Please test without the --import keys.pgp -- just import filtered.pgp or filtered2.pgp.

Wed, Mar 12, 5:18 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

with --no-sig-cache --check-sigs i get the following error with the patch applied:

Wed, Mar 12, 2:29 PM · gnupg26, gnupg24, Bug Report

Tue, Mar 11

dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

OK, now i really don't know what the issue is on the 2.4 branch. trying to replicate it with and without this patch, the --with-colons output of --check-sigs appears to depend on the order in which the certificates were ingested.

Tue, Mar 11, 11:05 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

hm, digging a bit further, i think the above changes have to do with third-party signatures using SHA1, *not* with expired certifiers. in 2.4.7, i see a change from % to ! for these certifications. (2.2.x, which i know is EOL) shows the difference between ? and !. I'm trying to make a simpler replicator now.

Tue, Mar 11, 9:18 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

With the patch "gpg: Fix regression for the recent malicious subkey DoS fix", there is a change in how gpg --check-sigs reports certifications from expired keys.

Tue, Mar 11, 1:02 AM · gnupg26, gnupg24, Bug Report

Fri, Mar 7

dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

it would be great to include a test in the test suite that ensures that the --status output behaves as expected in the face of expired or revoked keys.

Fri, Mar 7, 7:58 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7550: master branch fails to build without `./configure --disable-ldap`.

thanks for the fix in f29c8dba743eb7574399345ce341bbfb1f8f9bee !

Fri, Mar 7, 7:40 PM · gnupg

Wed, Mar 5

dkg added a comment to T7555: gpg --batch does not block all interactivity (e.g. prompting for passwords still happens).

whether you use --pinentry-mode=loopback or --pinentry-mode=cancel or --pinentry-mode=error, if gpg-agent has cached the password already, the decryption will work; otherwise, it will fail with an error like that describe above.

Wed, Mar 5, 8:29 PM · Documentation, gnupg
dkg added a comment to T7555: gpg --batch does not block all interactivity (e.g. prompting for passwords still happens).

here's an example of no prompting at all using --pinentry-mode=loopback:

Wed, Mar 5, 8:23 PM · Documentation, gnupg
dkg created T7555: gpg --batch does not block all interactivity (e.g. prompting for passwords still happens).
Wed, Mar 5, 8:22 PM · Documentation, gnupg
dkg added a comment to T7539: validating an OpenPGP `Signed Message` with a text-mode signature and binary-mode literal data packet.

Here is a patch against master which normalizes line-endings when verifying text signatures over binary literal data packets

Wed, Mar 5, 6:05 AM · Not A Bug, gnupg
dkg created T7550: master branch fails to build without `./configure --disable-ldap`.
Wed, Mar 5, 2:25 AM · gnupg

Fri, Feb 28

dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

This is also causing problems with ostree, see https://bugs.debian.org/1098951 and https://github.com/ostreedev/ostree/issues/3386

Fri, Feb 28, 8:22 PM · gnupg26, gnupg24, Bug Report

Thu, Feb 27

dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

The same effect seems to be happening on signatures made from expired keys.

Thu, Feb 27, 10:44 PM · gnupg26, gnupg24, Bug Report
dkg renamed T7547: signatures from revoked or expired keys show up as missing keys from signatures from revoked keys show up as missing keys to signatures from revoked or expired keys show up as missing keys.
Thu, Feb 27, 10:36 PM · gnupg26, gnupg24, Bug Report
dkg created T7547: signatures from revoked or expired keys show up as missing keys.
Thu, Feb 27, 6:54 PM · gnupg26, gnupg24, Bug Report

Feb 22 2025

dkg created T7539: validating an OpenPGP `Signed Message` with a text-mode signature and binary-mode literal data packet.
Feb 22 2025, 3:03 PM · Not A Bug, gnupg
dkg added a comment to T7527: Keyring/keybox denial of service.

Thank you @werner ! I can confirm that the patches that have landed on STABLE-BRANCH-2-4 do clear up the DoS i was seeing for signature verification.

Feb 22 2025, 3:08 AM · OpenPGP, gnupg, Bug Report

Feb 21 2025

dkg added a comment to T7106: Trailing newline trouble in clearsigned message generation and verification.

The patch below fixes the master branch to be compliant with the standards for CSF message generation and verification.

Feb 21 2025, 8:00 PM · Not A Bug, gnupg

Feb 18 2025

dkg added a comment to T7527: Keyring/keybox denial of service.

the reproducer is:

Feb 18 2025, 10:42 PM · OpenPGP, gnupg, Bug Report
dkg reopened T7527: Keyring/keybox denial of service as "Open".

I don't think this is fixed. With this patch in place, if i import blocker.cert first, and then import distsigkey.gpg, it looks to me like i still can't verify signatures made from any of the GnuPG signing keys.

Feb 18 2025, 10:40 PM · OpenPGP, gnupg, Bug Report

Feb 13 2025

dkg added a comment to T7106: Trailing newline trouble in clearsigned message generation and verification.

Just a note that i've tested this and --clearsign appears to be problematic for 2.4.7 as well as 2.2.40.

Feb 13 2025, 11:41 PM · Not A Bug, gnupg

Feb 12 2025

dkg added a comment to T7531: `--assert-pubkey-algo` does not behave as documented.

a demonstration:

Feb 12 2025, 11:02 PM · gpgv, Bug Report
dkg created T7531: `--assert-pubkey-algo` does not behave as documented.
Feb 12 2025, 10:53 PM · gpgv, Bug Report
dkg added a comment to T7265: When "use_keyboxd" is configured --keyring option is ignored?.

I was referring to your comment earlier in this very issue:

Feb 12 2025, 10:02 PM · keyboxd, gnupg, FAQ, Support

Feb 11 2025

dkg added a comment to T7265: When "use_keyboxd" is configured --keyring option is ignored?.

I'm not going to keep re-opening a ticket that you keep closing. So i'm just going to state here what i believe to be the upstream intent is. If you think this is wrong, i'd love a clarification. I believe that "deprecated" means that the GnuPG project believes that an option or configuration choice should not be used, and will eventually go away.

Feb 11 2025, 4:14 PM · keyboxd, gnupg, FAQ, Support

Feb 10 2025

dkg added a comment to T7527: Keyring/keybox denial of service.

To be clear about what's going on here, blocker.cert has simply adopted the primary keys of each certificate found in /usr/share/gnupg/distsigkey.gpg -- i think GnuPG requires each component key in its keystore to have a unique fingerprint across all component keys in the keystore. so when one certificate claims those fingerprints as subkeys, any certificate that has a primary key with a matching fingerprint gets rejected with doesn't match our copy.

Feb 10 2025, 10:49 PM · OpenPGP, gnupg, Bug Report
dkg created T7527: Keyring/keybox denial of service.
Feb 10 2025, 10:31 PM · OpenPGP, gnupg, Bug Report
dkg reopened T7265: When "use_keyboxd" is configured --keyring option is ignored? as "Open".

I understand you as saying you won't fix the fact that the warning is not emitted during initial homedir setup. I'm not sure why that scenario is not worthy of a warning when a post-setup scenario is, but okay.

Feb 10 2025, 10:26 PM · keyboxd, gnupg, FAQ, Support
dkg created T7526: gpg --assert-signer is ambiguous about what it does if a filename looks like a fingerprint.
Feb 10 2025, 9:19 PM · Support, gnupg
dkg updated the task description for T7521: `gpg --use-keyboxd` always emits an incomprehensible warning.
Feb 10 2025, 7:02 PM · keyboxd, gnupg, Bug Report
dkg added a comment to T7521: `gpg --use-keyboxd` always emits an incomprehensible warning.

thanks for correcting that, @ikloecker. i've corrected the initial report.

Feb 10 2025, 7:01 PM · keyboxd, gnupg, Bug Report
dkg updated the task description for T7521: `gpg --use-keyboxd` always emits an incomprehensible warning.
Feb 10 2025, 7:00 PM · keyboxd, gnupg, Bug Report
dkg added a comment to T7523: keyboxd is active when idle (unnecessary power draw).

I'm glad that inotify is already in use, that's a reasonable thing on the Linux platform.

Feb 10 2025, 3:07 PM · Feature Request, gnupg

Feb 9 2025

dkg added a comment to T7518: `gpg --gpgconf-list` reports some data from the config file or command line, and other data that is about compiled in defaults.

If you say so, i won't press this. I will just leave this ticket with an observation that even for someone who reads the source code this is not intelligible. At the top of gpgconf_list in g10/gpg.c, the comment says:

Feb 9 2025, 5:59 AM · Not A Bug, gnupg, Bug Report
dkg renamed T7523: keyboxd is active when idle (unnecessary power draw) from keyboxd is remarkably active when idle (unnecessary power draw) to keyboxd is active when idle (unnecessary power draw).
Feb 9 2025, 5:42 AM · Feature Request, gnupg
dkg created T7523: keyboxd is active when idle (unnecessary power draw).
Feb 9 2025, 4:46 AM · Feature Request, gnupg

Feb 8 2025

dkg created T7521: `gpg --use-keyboxd` always emits an incomprehensible warning.
Feb 8 2025, 4:43 PM · keyboxd, gnupg, Bug Report
dkg reopened T7265: When "use_keyboxd" is configured --keyring option is ignored? as "Open".

This warning doesn't seem to be complete; no such warning is produced on the first run of gpg. For example (with no ~/.gnupg):

Feb 8 2025, 4:08 PM · keyboxd, gnupg, FAQ, Support
dkg created T7520: gnupg.7.html should not ship with nroff-formatted manpages.
Feb 8 2025, 5:58 AM · Bug Report

Feb 6 2025

dkg added a comment to T7518: `gpg --gpgconf-list` reports some data from the config file or command line, and other data that is about compiled in defaults.

in combination with this patch it should be easy to modify gpgconf_list() (in g10/gpg,c) to emit compliance from the settings/cli options.

Feb 6 2025, 9:48 PM · Not A Bug, gnupg, Bug Report
dkg created T7518: `gpg --gpgconf-list` reports some data from the config file or command line, and other data that is about compiled in defaults.
Feb 6 2025, 7:21 PM · Not A Bug, gnupg, Bug Report
dkg added a comment to T7511: `gpg --compliance=rfc4880 --quick-gen-key` produces a key that is not compatible with RFC 4880.

Please see the 5-patch series posted on gnupg-devel for a fix for this.

Feb 6 2025, 3:32 PM · gnupg, Bug Report
dkg added a comment to T7511: `gpg --compliance=rfc4880 --quick-gen-key` produces a key that is not compatible with RFC 4880.

Maybe we have a different understanding of what "backward compatibility" means. if someone needs backward compatibility to communicate with someone using an RFC 4880 client, then surely they don't want to use a pubkey algorithm that isn't specified in RFC 4880, right?

Feb 6 2025, 3:21 PM · gnupg, Bug Report

Feb 5 2025

dkg added a comment to T7516: `gpg --compliance=rfc4880 --quick-add-key $fpr rsa sign` fails unnecessarily with "third-party key signatures using the SHA1 algorithm are rejected".

Patch sent to gnupg-devel. I think this can be applied to the 2.4 series as well.

Feb 5 2025, 9:55 PM · gnupg, Bug Report
dkg created T7516: `gpg --compliance=rfc4880 --quick-add-key $fpr rsa sign` fails unnecessarily with "third-party key signatures using the SHA1 algorithm are rejected".
Feb 5 2025, 8:51 PM · gnupg, Bug Report

Feb 4 2025

dkg added a comment to T7511: `gpg --compliance=rfc4880 --quick-gen-key` produces a key that is not compatible with RFC 4880.

i see two forms of an initial resolution here: one is to have set_compliance_option always explicitly set opt.def_newkey_algo. The other is to check opt.compliance in get_default_pubkey_algo.

Feb 4 2025, 11:57 PM · gnupg, Bug Report
dkg created T7511: `gpg --compliance=rfc4880 --quick-gen-key` produces a key that is not compatible with RFC 4880.
Feb 4 2025, 6:53 PM · gnupg, Bug Report
dkg added a comment to T7501: policy compliance options collide incompatibly without warning.

Thanks for the followup. As a downstream maintainer, it would help me a lot to know why this won't be fixed for 2.4. Do you forsee a specific problem with it? Does the subtle change in semantics of previously unspecified combinations/permutations of options represent something you're trying to avoid on the stable release channel? Are there bugs that users should be worried about?

Feb 4 2025, 6:12 PM · gnupg26, Bug Report
dkg added a comment to T7501: policy compliance options collide incompatibly without warning.

please prefer the patch here over the one on the mailing list. my followups to the mailing list are not going through due to some kind of intermittent IPv4/IPv6 deliverability issue. Sorry for the confusion.

Feb 4 2025, 8:29 AM · gnupg26, Bug Report
dkg added a comment to T7501: policy compliance options collide incompatibly without warning.

Thanks for the fix, @werner ! Here's a comparable patch for the 2.4 branch as well, but without the change to de-vs as i think the comment in rGc2ff47d5bcd2953fc2095ef2242af2c7e9cd4420 indicated that you only wanted to rebase de-vs to --gnupg in the 2.5.x series.

Feb 4 2025, 5:54 AM · gnupg26, Bug Report

Jan 31 2025

dkg added a comment to T7501: policy compliance options collide incompatibly without warning.

Here's all of the above patches squashed into a single patch:

.

Jan 31 2025, 7:16 PM · gnupg26, Bug Report
dkg added a comment to T7501: policy compliance options collide incompatibly without warning.

attached here is a series of 4 patches that reinforce that the last --compliance policy option (or equivalent option, like --rfc4880 or --gnupg) supercedes any earlier one.

Jan 31 2025, 7:01 PM · gnupg26, Bug Report
dkg reopened T7501: policy compliance options collide incompatibly without warning as "Open".

sorry for the confusion in the initial report -- the policy compliance option is of course --compliance, and not --policy, and i just miswrote it in one line of the description above. I've corrected it now, and all the rest of the report is still as it was.

Jan 31 2025, 3:35 PM · gnupg26, Bug Report
dkg updated the task description for T7501: policy compliance options collide incompatibly without warning.
Jan 31 2025, 3:34 PM · gnupg26, Bug Report
dkg created T7501: policy compliance options collide incompatibly without warning.
Jan 31 2025, 7:16 AM · gnupg26, Bug Report

Jan 29 2025

dkg created T7494: tpm2daemon tests cannot run in parallel (swtpm collides TCP ports).
Jan 29 2025, 12:29 AM · TPM, Bug Report

Jan 27 2025

dkg committed rGPGMEPPfa41beab1af0: doc: use https:// for www.gnu.org (authored by dkg).
doc: use https:// for www.gnu.org
Jan 27 2025, 10:39 AM
dkg committed rGPGMEPP652b8f364544: spelling: fix misspellings (authored by dkg).
spelling: fix misspellings
Jan 27 2025, 10:39 AM

Jan 9 2025

dkg added a comment to T7314: Release GnuPG 2.2.46.

i see the tag has been published now, thanks! Given that this is an ELTS release, I'm assuming that the lack of a gnupg-2.2.46.tar.bz2 file on https://gnupg.org/ftp/gcrypt/gnupg/ is deliberate.

Jan 9 2025, 5:12 PM · gnupg22 (gnupg-2.2.46), Release Info
dkg added a comment to T7479: minor spelling fixes.

glad it was useful!

Jan 9 2025, 4:49 PM · Bug Report

Jan 8 2025

dkg created T7479: minor spelling fixes.
Jan 8 2025, 4:16 PM · Bug Report
dkg added a comment to T7314: Release GnuPG 2.2.46.

will you tag 2.2.46 in git as well? it appears to be on rG7e48331afb611a2b39e5ae74b8806b84e54db924 but i don't see any tags.

Jan 8 2025, 1:37 AM · gnupg22 (gnupg-2.2.46), Release Info

Jan 7 2025

dkg added a project to T7478: _gpg_close_all_fds hangs on nwer Linux systems in a simple chroot w/o /proc/self/fd: gnupg.
Jan 7 2025, 11:44 PM · Linux, gnupg, gpgrt, Bug Report
dkg updated subscribers of T7478: _gpg_close_all_fds hangs on nwer Linux systems in a simple chroot w/o /proc/self/fd.

Hm, this might also be relevant in GnuPG's codebase in common/exechelp-posix.c, which contains a copy of the same code (licensed differently).

Jan 7 2025, 11:44 PM · Linux, gnupg, gpgrt, Bug Report
dkg created T7478: _gpg_close_all_fds hangs on nwer Linux systems in a simple chroot w/o /proc/self/fd.
Jan 7 2025, 11:01 PM · Linux, gnupg, gpgrt, Bug Report

Nov 26 2024

dkg updated the task description for T7106: Trailing newline trouble in clearsigned message generation and verification.
Nov 26 2024, 11:24 PM · Not A Bug, gnupg

Nov 20 2024

dkg added a comment to T7403: GnuPG 2.4.6 rewrites Ed25519 MPIs into non-compliant MPI form .

thanks for the clarification. i was not objecting to the workflow, i was trying to understand so that i can interact with the bug tracker appropriately. I was unaware of the difference between "milestones" and other project tags. I'll try to get that right in the future.

Nov 20 2024, 3:52 PM · Not A Bug, gnupg24, Bug Report

Nov 19 2024

dkg added a project to T7403: GnuPG 2.4.6 rewrites Ed25519 MPIs into non-compliant MPI form : gnupg24 (gnupg-2.4.5).

@ebo i'm not sure i understand why you removed the gnupg24 (gnupg-2.4.5) project label. the report indicates that GnuPG 2.4.6 at least (other versions untested, but i didn't see a gnupg24 (gnupg-2.4.6) label in this system) produces MPI artifacts for EdDSA/Ed25519 signatures that are non-compliant with all the known specifications. the 2.2 series appears to retain compatible MPI formats.

Nov 19 2024, 10:29 PM · Not A Bug, gnupg24, Bug Report

Nov 18 2024

dkg added a comment to T7403: GnuPG 2.4.6 rewrites Ed25519 MPIs into non-compliant MPI form .

after a bit more testing, it looks to me like 2.2.45 will revise the signature packet to use 0x00ed as the MPI header for r, if it receives input from 2.4.6. And 2.4.6 will revise the signature packet to use 0x0100 as the MPI header for r. So the same OpenPGP self-sig will change shape each time it is passed back and forth between the different versions.

Nov 18 2024, 10:55 PM · Not A Bug, gnupg24, Bug Report
dkg created T7403: GnuPG 2.4.6 rewrites Ed25519 MPIs into non-compliant MPI form .
Nov 18 2024, 10:32 PM · Not A Bug, gnupg24, Bug Report

Jul 25 2024

dkg added a comment to T7209: gpgv(1) manpage is ambiguous about argument list.

Interesting. i'm also not sure this is a good feature. I also still don't think the gpgv man page explains this clearly, but if you don't want to clarify it, i won't bother re-opening this issue.

Jul 25 2024, 11:23 PM · Documentation, gpgv
dkg reopened T7209: gpgv(1) manpage is ambiguous about argument list as "Open".

Thanks for this prompt fix! but they're still not aligned. with this fix, the Synopsis is:

Jul 25 2024, 1:37 AM · Documentation, gpgv

Jul 21 2024

dkg created T7209: gpgv(1) manpage is ambiguous about argument list.
Jul 21 2024, 4:52 PM · Documentation, gpgv

Jun 4 2024

dkg added a comment to T7116: minor spelling fixes.

All applied and more fun with cherry picking in the future ;-)

Jun 4 2024, 6:04 AM · gnupg, Bug Report

Jun 1 2024

dkg added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

fwiw, i've just shipped a patch to correct this change in behavior in the 2.2 branch debian. Many thanks to @gniibe , on whose work in the 2.4 branch this is based, and to @ametzler1, who did the backporting to 2.2. I've also written a test which tries to tickle this bug. It fails with unpatched 2.2.43 as emacs times out signing and encrypting mail as epg.el deadlocks with gpg.

Jun 1 2024, 3:11 AM · Emacs, gnupg, Bug Report

May 31 2024

dkg added a comment to T7116: minor spelling fixes.

that looks like it was a problem in the original text, not something i introduced. If you find anything else that needs fixing, please go ahead and fix it to! no need to wait for me.

May 31 2024, 4:57 AM · gnupg, Bug Report

May 30 2024

dkg added a comment to T7137: unreliable RSA decryption.

It seems too late to reject on import, given that people might already have such a secret key in their ~/.gnupg/private-keys-v1.d/ They might have had it for years without knowing it, because the failure is so intermittent. They might just think that they did something wrong, and when they try again it works. It would be great to be more robust than that.

May 30 2024, 11:28 PM · OpenPGP, Not A Bug, gnupg

May 29 2024

dkg added a comment to T7137: unreliable RSA decryption.

Maybe there's a 4th possible option that's better than the three i identified?

May 29 2024, 9:14 PM · OpenPGP, Not A Bug, gnupg
dkg added a comment to T7137: unreliable RSA decryption.

So i see a range of ways that any OpenPGP software could deal with this:

May 29 2024, 9:13 PM · OpenPGP, Not A Bug, gnupg

May 28 2024

dkg created T7137: unreliable RSA decryption.
May 28 2024, 10:03 PM · OpenPGP, Not A Bug, gnupg

May 27 2024

dkg added a comment to T6481: BEGIN_ENCRYPTION status output happens later in 2.4.1 (breaks Emacs's EasyPG).

Are you saying that concern about "risking a regression" is the reason to not fix this bug, which is itself a regression, and was introduced into the a point release in the current "long term support" branch?

May 27 2024, 6:21 AM · Emacs, gnupg, Bug Report

May 17 2024

dkg created T7124: unclear descriptions of `--disable-cipher-algo` and `--disable-pubkey-algo` .
May 17 2024, 1:28 AM · gnupg, Documentation, Bug Report

May 16 2024

dkg created T7123: please document --unwrap.
May 16 2024, 4:52 PM · gnupg, Documentation, Bug Report
dkg added a comment to T7120: Ship dutch translation (po/po.nl) in released tarball.

Thanks! please consider adding it to 2.2 and master as well. I suspect it's more outdated than it would be if it had been shipping in the upstream tarball.

May 16 2024, 4:05 PM · i18n, gnupg, Bug Report
dkg created T7120: Ship dutch translation (po/po.nl) in released tarball.
May 16 2024, 2:10 AM · i18n, gnupg, Bug Report

May 14 2024

dkg added a comment to T6185: `gpg2 --list-keys --with-colons > /dev/full` exits with status 0.

I note that @DemiMarie offered a patch for this over a year ago. It doesn't appear to have had any review. If it's good, maybe apply it? If it's problematic, can we identify the problem?

May 14 2024, 4:01 PM · Bug Report, gnupg

May 13 2024

dkg added a comment to T7116: minor spelling fixes.

by all means, please proofread it! thanks for the attention to detail. what was the grammar glitch?

May 13 2024, 8:56 PM · gnupg, Bug Report
dkg created T7116: minor spelling fixes.
May 13 2024, 12:16 AM · gnupg, Bug Report

Apr 26 2024

dkg added a comment to T7106: Trailing newline trouble in clearsigned message generation and verification.

I understand the desire for stable behavior, and i agree that a change here might affect verification of existing signatures (and might mean producing signatures that will be misinterpreted by older versions).

Apr 26 2024, 6:06 PM · Not A Bug, gnupg
dkg created T7106: Trailing newline trouble in clearsigned message generation and verification.
Apr 26 2024, 5:01 PM · Not A Bug, gnupg