- User Since
- Mar 27 2017, 4:48 PM (94 w, 2 d)
News for 1.34:
Mon, Jan 14
These are hooks so that co-operative thread libraries (like ntph) are able to yield control to the system's thread's implementation.
- Bookkeeping tax things, the loss for 2018 will be a minor, probably less than 10k.
- Mail backlog
- New emergency cleanup handler in gpgrt so that even an assert in gnupg will be able to shutdown the secmem. Right now only asserts in Libgcrypt are protected this way.
- Mail backlog
Fri, Jan 11
Your home is under /dev/ - really? Please run
Thu, Jan 10
Set to high because it breaks a build.
Wed, Jan 9
In another project in the early 2000ies we had a lawyer from one of those Königsallee lawfirsm as partner. IIRC the estimated cost for a word trademark in the EU, US, and JP was in the range of 10k for just a couple of years.
I don't know why @BenM closed this bug given that he mentioned that the qt part is yet not solved.
Tue, Jan 8
Mon, Jan 7
Version of gpa and best also of gpgme? The latest gpa releases show that in the About dialog.
The installed version of gpg is also of inetrest. In a shell enter "gpg --version".
Sat, Jan 5
Right. We won't change that though. Sorry.
Fri, Jan 4
Thu, Jan 3
Wed, Jan 2
Mon, Dec 31
Please never ever define NDEBUG. This is a severe misfeature of the assert macro.
Fri, Dec 28
Fri, Dec 21
Thanks. The mail is a standard, non-crypto mail with one attachment. That attachment is a TNEF file which has according to ytnef(1) just one file. That file has the name gpgolPGP.dat and contains a clearsigned message.
Is it possible that you upload or send me a copy of such a mail (wk gnupg.org)? ZIP or tar the eml file and send it in an encrypted mail to me to make sure it won't be modified on the transport.
Thu, Dec 20
Wed, Dec 19
I think we should stick with the syscall for Linux.
FWIW, the canonical way to make sure that gpg-agent has been started is to run
Tue, Dec 18
Dec 17 2018
A list of SHA-1 fingerprints for the valid certificates. With our without colons.
- GnuPG 2.2.12 released
- Meeting with RK for the Verein
I had to look it up in the code and man page too ;-)
With GCRYCTL_AUTO_EXPAND_SECMEM we won't anymore run out of secure memory. This has even silent been backported to 1.8.x (using the numerical value of that constant) and is for long an option of gpg-agent. Thus closing.
Closing, given that we implemented a general solution; see the parent task.
I have seen no responses on your two mails to the ML and given th athere is no concrete protocol bug, I close this issue. If you can show a concrete bug please re-open this issue again.
I don't think that this is a good solution for a problem we could solve much easier but fear to do that due to kind of crypto politics.
Dec 15 2018
Dec 14 2018
The usual reasons for corruptions of binary data are FTP transfers in text mode; or opening a file with a Windows editor.
Interesting idea but it does not help against attacks because all root CA are considered equal (virtually cross-signed). Thus a single not checked root CA allows to subvert all certificates.