Page MenuHome GnuPG

gnupg26Project
ActivePublic

Members

  • This project does not have any members.
  • View All

Watchers

  • This project does not have any watchers.
  • View All

Details

Description

This is the current development version of GnuPG.

Recent Activity

Wed, May 28

werner moved T7663: Certificated signed using SHA-1 isn't trusted, but needs --force-sign-key to re-sign. from Backlog to QA on the gnupg26 board.
Wed, May 28, 10:47 AM · gnupg24, gnupg26, Feature Request

Tue, May 27

gniibe added a comment to T7649: gnupg: Use KEM interface for encryption/decryption.

Another possible change will be use of KEM interface for gpgsm.
Not high priority, but for long term code maintenance.

Tue, May 27, 3:38 AM · gnupg26

Mon, May 26

werner edited projects for T7663: Certificated signed using SHA-1 isn't trusted, but needs --force-sign-key to re-sign., added: Feature Request, gnupg26, gnupg24; removed Bug Report.
Mon, May 26, 6:08 PM · gnupg24, gnupg26, Feature Request
gniibe added a parent task for T5964: gnupg should use the KDFs implemented in libgcrypt: T7649: gnupg: Use KEM interface for encryption/decryption.
Mon, May 26, 6:34 AM · gnupg26, FIPS, Feature Request
gniibe added a subtask for T7649: gnupg: Use KEM interface for encryption/decryption: T5964: gnupg should use the KDFs implemented in libgcrypt.
Mon, May 26, 6:34 AM · gnupg26
gniibe added a parent task for T7014: agent: Enhancement of PKDECRYPT for KEM interface: T7649: gnupg: Use KEM interface for encryption/decryption.
Mon, May 26, 6:33 AM · gnupg26, gpgagent, Feature Request
gniibe added a subtask for T7649: gnupg: Use KEM interface for encryption/decryption: T7014: agent: Enhancement of PKDECRYPT for KEM interface.
Mon, May 26, 6:33 AM · gnupg26
gniibe changed the status of T5964: gnupg should use the KDFs implemented in libgcrypt from Open to Testing.

Done by T7649: gnupg: Use KEM interface for encryption/decryption

Mon, May 26, 6:32 AM · gnupg26, FIPS, Feature Request

Sat, May 24

collinfunk added a comment to T7649: gnupg: Use KEM interface for encryption/decryption.

@werner I think these changes caused an ASAN failure that I reported in T7664. I think it would be good to get that sorted before a release.

Sat, May 24, 9:13 PM · gnupg26

Fri, May 23

werner closed T7506: GnuPG: Error when adding ECDSA subkey in batch mode with quick-add-key "Wrong key usage" as Resolved.
Fri, May 23, 11:59 AM · gnupg26, gnupg24, Bug Report
gniibe added a comment to T7649: gnupg: Use KEM interface for encryption/decryption.

Clean up finished by rG681d75404300: gpg,agent: Clean up around using ECC KEM.
Tested by make check and decrypting tests/openpgp/samplemsgs/pqc-sample-*.enc.asc.

Fri, May 23, 10:27 AM · gnupg26
gniibe closed T7457: gpg --full-gen-key doesn't show list of keys on card (regression) as Resolved.
Fri, May 23, 10:18 AM · gnupg26, gnupg24, Bug Report

Thu, May 22

werner added a comment to T7649: gnupg: Use KEM interface for encryption/decryption.

FYI: I'd like to get a new release out after these changes.

Thu, May 22, 10:35 AM · gnupg26
gniibe changed the status of T7649: gnupg: Use KEM interface for encryption/decryption from Open to Testing.

Pushed all changes needed. Actually, agent side too.
Clean up will be done.

Thu, May 22, 8:05 AM · gnupg26

Mon, May 19

gniibe renamed T7649: gnupg: Use KEM interface for encryption/decryption from gnupg: Use KEM interface for decryption to gnupg: Use KEM interface for encryption/decryption.
Mon, May 19, 2:35 AM · gnupg26

Wed, May 14

werner triaged T7653: Fix gpg's passwd for Kyber with the ecc part on a card as Normal priority.
Wed, May 14, 10:05 AM · Bug Report, gnupg26

Tue, May 13

werner added a project to T7649: gnupg: Use KEM interface for encryption/decryption: gnupg26.
Tue, May 13, 3:24 PM · gnupg26
werner closed T6941: gpgsm/dirmngr: support for end-entity certificates with an empty "Subject DN" as Resolved.

Meanwhile we have some support for an empty subject but gpgsm still prints an error notice. See the T7171 for more.

Tue, May 13, 3:00 PM · gnupg26, S/MIME, Feature Request
werner added a parent task for T6941: gpgsm/dirmngr: support for end-entity certificates with an empty "Subject DN": T7171: Allow for empty Subject in X.509.
Tue, May 13, 2:58 PM · gnupg26, S/MIME, Feature Request
gniibe closed T6512: keyboxd with data pipe as Resolved.
Tue, May 13, 3:07 AM · gnupg26, Bug Report

Fri, May 9

gniibe added a comment to T6681: agent: Clean up main loop and better cache handling of expiration (was: Adding agent_timer API for monitoring something and passphrase cache).

(2) Update the documentation of default-cache-ttl zero value disabling caching.

Fri, May 9, 10:02 AM · keyboxd, gpgagent, gnupg26
werner renamed T7645: Kleopatra: Encoding errors in signature verification audit log (timestamps) from Kleopatra: Encoding errors in signature verification audit log to Kleopatra: Encoding errors in signature verification audit log (timestamps).
Fri, May 9, 9:26 AM · gnupg26, gpd5x, Bug Report
werner triaged T7645: Kleopatra: Encoding errors in signature verification audit log (timestamps) as Low priority.

I think we have another report on this in the tracker. The problem is indeed the ugly Windows time functions to print a string. Let me only remeber that untile a few years, Windows had the opinion that Germany is the the Westeuropäische Zeit, i.e. Portugal or the UK.

Fri, May 9, 9:25 AM · gnupg26, gpd5x, Bug Report
gniibe added a comment to T6681: agent: Clean up main loop and better cache handling of expiration (was: Adding agent_timer API for monitoring something and passphrase cache).

I am going to do:
(1) Recover old behavior with max-cache-ttl = 0
(2) Update the documentation of default-cache-ttl zero value disabling caching.

Fri, May 9, 4:37 AM · keyboxd, gpgagent, gnupg26

Thu, May 8

werner closed T7547: signatures from revoked or expired keys show up as missing keys as Resolved.
Thu, May 8, 3:29 PM · gnupg26, gnupg24, Bug Report
werner added a comment to T6681: agent: Clean up main loop and better cache handling of expiration (was: Adding agent_timer API for monitoring something and passphrase cache).

I can't see any documentation that a value of 0 disables the cache. The user might have used some undefined behaviour. For example in the old code we did a housecleaning when we were idle but the new code uses a timer and another thread for flushing the cache. We could open a feature request to entire disable the cache but I bet that we will get a lot of new bug reports because users will then need to enter their passphrase too often for one operation.

Thu, May 8, 9:14 AM · keyboxd, gpgagent, gnupg26
gniibe added a comment to T6681: agent: Clean up main loop and better cache handling of expiration (was: Adding agent_timer API for monitoring something and passphrase cache).

It's not my intention. I didn't know the feature of disabling caching by max-cache-ttl to 0.
Well, it's a regression if a user intends so.

Thu, May 8, 4:00 AM · keyboxd, gpgagent, gnupg26

Wed, May 7

werner added a comment to T6681: agent: Clean up main loop and better cache handling of expiration (was: Adding agent_timer API for monitoring something and passphrase cache).

Lucas Mülling commented yesterday on gnupg-devel:

Wed, May 7, 11:40 AM · keyboxd, gpgagent, gnupg26

Fri, May 2

bernhard added a comment to T6234: Implement access to smartcards via a generic pkcs#11 interface.

A brief update: This feature has not made it onto the roadmap of specific things to implement so far.

Fri, May 2, 3:51 PM · Restricted Project, gnupg26, Feature Request, scd

Apr 22 2025

werner triaged T7618: gpgsm: Allow selecting keys by SHA2 fpr as Normal priority.

BTW, fingerprints for X.509 are not well defined because you get a different one when changing the *unsigned" attributes. Not a common case but one should be aware of it.

Apr 22 2025, 9:33 AM · S/MIME, gnupg26, Feature Request

Apr 9 2025

werner changed the status of T7547: signatures from revoked or expired keys show up as missing keys from Open to Testing.
Apr 9 2025, 1:54 PM · gnupg26, gnupg24, Bug Report

Apr 2 2025

werner triaged T7593: Check the trustlist de-vs flag in the per key compliance check as High priority.
Apr 2 2025, 11:43 AM · gnupg26, vsd, Restricted Project, Feature Request

Mar 14 2025

werner moved T7457: gpg --full-gen-key doesn't show list of keys on card (regression) from Backlog to QA on the gnupg24 board.

Done

Mar 14 2025, 1:20 PM · gnupg26, gnupg24, Bug Report
ikloecker reopened T7457: gpg --full-gen-key doesn't show list of keys on card (regression) as "Open".

Re-opening because I think rGaa36f6ae8bae needs to be backported to GnuPG 2.4 (see T7568). The fix for T7309 which introduced the regression has been backported to GnuPG 2.4.

Mar 14 2025, 8:54 AM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

I've offered https://github.com/bestpractical/gnupg-interface/pull/16 to GnuPG::Interface, and am testing it out in debian unstable.

Mar 14 2025, 12:33 AM · gnupg26, gnupg24, Bug Report

Mar 13 2025

dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

I'll work on making a patch to offer a flexible test suite.

Mar 13 2025, 6:21 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Alternately, i suppose we could ask GnuPG::Interface to drop the variant parts of that test entirely. @werner, If you have a preference for what they test, it would be good to know. I suspect your opinion would carry weight with the maintainer there.

Mar 13 2025, 6:20 PM · gnupg26, gnupg24, Bug Report
werner added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Well, we also have the gpgme test suite which tests a couple of other things and for obvious reasons we need to keep this stable. Granted, sometimes we had to change the gpgme test suite as well. My personal preference would be your second choice.

Mar 13 2025, 5:51 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Thanks for the fix for the double-free on --no-sig-cache, that appears to be an issue on all released gpg versions, as i can crash them directly when i --no-sig-cache.

Mar 13 2025, 5:04 PM · gnupg26, gnupg24, Bug Report

Mar 12 2025

dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Interestingly, from this i'm learning that the patch actually *normalizes* the output so that we see the same thing regardless of ordering. the different output based on certificate order happens only in the unpatched version.

Mar 12 2025, 5:34 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Please test without the --import keys.pgp -- just import filtered.pgp or filtered2.pgp.

Mar 12 2025, 5:18 PM · gnupg26, gnupg24, Bug Report
werner added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

I can't replicate your findings here . In a test directory w/o a gpg.conf:

Mar 12 2025, 4:02 PM · gnupg26, gnupg24, Bug Report
werner added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Uihhh

Mar 12 2025, 3:35 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

with --no-sig-cache --check-sigs i get the following error with the patch applied:

Mar 12 2025, 2:29 PM · gnupg26, gnupg24, Bug Report
werner added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

Did you also tried with --no-sig-cache ? That could help to get a better insight into the reason for that difference.

Mar 12 2025, 9:27 AM · gnupg26, gnupg24, Bug Report

Mar 11 2025

dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

OK, now i really don't know what the issue is on the 2.4 branch. trying to replicate it with and without this patch, the --with-colons output of --check-sigs appears to depend on the order in which the certificates were ingested.

Mar 11 2025, 11:05 PM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

hm, digging a bit further, i think the above changes have to do with third-party signatures using SHA1, *not* with expired certifiers. in 2.4.7, i see a change from % to ! for these certifications. (2.2.x, which i know is EOL) shows the difference between ? and !. I'm trying to make a simpler replicator now.

Mar 11 2025, 9:18 PM · gnupg26, gnupg24, Bug Report
werner changed the status of T7547: signatures from revoked or expired keys show up as missing keys from Testing to Open.
Mar 11 2025, 11:00 AM · gnupg26, gnupg24, Bug Report
dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

With the patch "gpg: Fix regression for the recent malicious subkey DoS fix", there is a change in how gpg --check-sigs reports certifications from expired keys.

Mar 11 2025, 1:02 AM · gnupg26, gnupg24, Bug Report

Mar 7 2025

dkg added a comment to T7547: signatures from revoked or expired keys show up as missing keys.

it would be great to include a test in the test suite that ensures that the --status output behaves as expected in the face of expired or revoked keys.

Mar 7 2025, 7:58 PM · gnupg26, gnupg24, Bug Report