Page MenuHome GnuPG

DebianUmbrella
ActivePublic

Recent Activity

Tue, Feb 24

m.eik closed T8122: Instruction to install https://repos.gnupg.org/deb/gnupg/trixie/ fail in 1st variant because of keybox use (Error: Failed to parse keyring "/usr/share/keyrings/gnupg-keyring.gpg") as Resolved.

i have added this note to the template, currently updating the repos with new packages:

Tue, Feb 24, 3:36 PM · Bug Report, Debian
werner assigned T8122: Instruction to install https://repos.gnupg.org/deb/gnupg/trixie/ fail in 1st variant because of keybox use (Error: Failed to parse keyring "/usr/share/keyrings/gnupg-keyring.gpg") to m.eik.
Tue, Feb 24, 2:11 PM · Bug Report, Debian
werner triaged T8122: Instruction to install https://repos.gnupg.org/deb/gnupg/trixie/ fail in 1st variant because of keybox use (Error: Failed to parse keyring "/usr/share/keyrings/gnupg-keyring.gpg") as Low priority.
Tue, Feb 24, 2:10 PM · Bug Report, Debian
bernhard added a comment to T8122: Instruction to install https://repos.gnupg.org/deb/gnupg/trixie/ fail in 1st variant because of keybox use (Error: Failed to parse keyring "/usr/share/keyrings/gnupg-keyring.gpg").

IIRC, support for the keybox fomat was added on Debian's request with 2.1.7 in 2015 to gpgv. In fact gpgv was written on Debian's request (1.0.4 from fall 2000).

Tue, Feb 24, 10:57 AM · Bug Report, Debian
bernhard renamed T8122: Instruction to install https://repos.gnupg.org/deb/gnupg/trixie/ fail in 1st variant because of keybox use (Error: Failed to parse keyring "/usr/share/keyrings/gnupg-keyring.gpg") from Instruction to install https://repos.gnupg.org/deb/gnupg/trixie/ fail for sqv Error: Failed to parse keyring "/usr/share/keyrings/gnupg-keyring.gpg" to Instruction to install https://repos.gnupg.org/deb/gnupg/trixie/ fail in 1st variant because of keybox use (Error: Failed to parse keyring "/usr/share/keyrings/gnupg-keyring.gpg").
Tue, Feb 24, 10:30 AM · Bug Report, Debian
werner added a comment to T8122: Instruction to install https://repos.gnupg.org/deb/gnupg/trixie/ fail in 1st variant because of keybox use (Error: Failed to parse keyring "/usr/share/keyrings/gnupg-keyring.gpg").

IIRC, support for the keybox fomat was added on Debian's request with 2.1.7 in 2015 to gpgv. In fact gpgv was written on Debian's request (1.0.4 from fall 2000).

Tue, Feb 24, 10:06 AM · Bug Report, Debian
bernhard added a comment to T8122: Instruction to install https://repos.gnupg.org/deb/gnupg/trixie/ fail in 1st variant because of keybox use (Error: Failed to parse keyring "/usr/share/keyrings/gnupg-keyring.gpg").

I guess you need to report this to Debian

Tue, Feb 24, 10:00 AM · Bug Report, Debian

Mon, Feb 23

bernhard added a comment to T8122: Instruction to install https://repos.gnupg.org/deb/gnupg/trixie/ fail in 1st variant because of keybox use (Error: Failed to parse keyring "/usr/share/keyrings/gnupg-keyring.gpg").

I guess you need to report this to Debian as their new sqv tools seems to be broken.

Mon, Feb 23, 5:53 PM · Bug Report, Debian
werner added projects to T8122: Instruction to install https://repos.gnupg.org/deb/gnupg/trixie/ fail in 1st variant because of keybox use (Error: Failed to parse keyring "/usr/share/keyrings/gnupg-keyring.gpg"): Debian, Bug Report.
Mon, Feb 23, 4:07 PM · Bug Report, Debian

Apr 14 2025

werner triaged T7603: gpgv has unnecessary dependency on libassuan and NPth as Low priority.
Apr 14 2025, 9:24 AM · Debian, Feature Request, gpgv

Sep 2 2024

ikloecker closed T7281: Build error with python3-setuptools 73.0.1 as Resolved.

Fixed.

Sep 2 2024, 3:48 PM · Debian, gpgme, Bug Report
werner added a project to T7281: Build error with python3-setuptools 73.0.1: Debian.
Sep 2 2024, 1:39 PM · Debian, gpgme, Bug Report

Oct 23 2023

jukivili closed T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY as Resolved.
Oct 23 2023, 6:56 PM · Debian, libgcrypt, Bug Report

Jul 24 2023

ebo moved T5231: Debian: Get recent GnuPG stable into bullseye from Restricted Project Column to Restricted Project Column on the Restricted Project board.
Jul 24 2023, 2:13 PM · Debian, Restricted Project

Apr 23 2023

jukivili added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

Here's fix for mode specific setkey clearing error code:

Apr 23 2023, 2:38 PM · Debian, libgcrypt, Bug Report

Apr 21 2023

werner added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

There is still a buglet because in some modes the weak key error can be swallowed by other errors. A fix would be something like:

Apr 21 2023, 9:09 AM · Debian, libgcrypt, Bug Report
gniibe added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

@jukivili Yes, please go ahead for both branches. Thank you.

Apr 21 2023, 5:06 AM · Debian, libgcrypt, Bug Report

Apr 20 2023

jukivili added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

About error code. You need to use gcry_err_code(error_code) to get the GPG_ERR_WEAK_KEY value.

Apr 20 2023, 6:22 PM · Debian, libgcrypt, Bug Report

Apr 17 2023

Wolff17 added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

Ok sorry, my bad, I have to use DES Keying option 2 to have 45 de ae ae e1 f4 6a 29, problem solved.

Apr 17 2023, 3:02 PM · Debian, libgcrypt, Bug Report
werner added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

Reading the commit rC5beadf201312: Add gcry_cipher_ctl command to allow weak keys in testing use-cases,
The test code in basic.c assumes that it is an application responsibility to confirm&ignore GPG_ERR_WEAK_KEY error when using GCRYCTL_SET_ALLOW_WEAK_KEY.

Apr 17 2023, 1:25 PM · Debian, libgcrypt, Bug Report
Wolff17 added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

Thank you for you responses! :)

Apr 17 2023, 9:50 AM · Debian, libgcrypt, Bug Report
jukivili added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

I'll add documentation about GCRYCTL_SET_ALLOW_WEAK_KEY which was missing from be original commit.

Apr 17 2023, 8:36 AM · Debian, libgcrypt, Bug Report
jukivili added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

tests/basic now actually fail because setkey not returning GPG_ERR_WEAK_KEY for weak keys with GCRYCTL_SET_ALLOW_WEAK_KEY.

Apr 17 2023, 8:34 AM · Debian, libgcrypt, Bug Report
jukivili added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

That's right. With GCRYCTL_SET_ALLOW_WEAK_KEY, setkey still returns GPG_ERR_WEAK_KEY when weak key is detected. However, cipher handle can still be used as if setkey succeeded.

Apr 17 2023, 8:31 AM · Debian, libgcrypt, Bug Report
gniibe added a comment to T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.

Reading the commit rC5beadf201312: Add gcry_cipher_ctl command to allow weak keys in testing use-cases,
The test code in basic.c assumes that it is an application responsibility to confirm&ignore GPG_ERR_WEAK_KEY error when using GCRYCTL_SET_ALLOW_WEAK_KEY.

Apr 17 2023, 2:50 AM · Debian, libgcrypt, Bug Report

Apr 16 2023

werner triaged T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY as Low priority.

Thanks for the report. Fix is easy. I only wonder why you want to use a weak DES key.

Apr 16 2023, 8:31 PM · Debian, libgcrypt, Bug Report

Apr 14 2023

Wolff17 created T6451: libgcrypt | gcry_cipher_setkey: 3DES-CBC key returns GPG_ERR_WEAK even with GCRYCTL_SET_ALLOW_WEAK_KEY.
Apr 14 2023, 6:17 PM · Debian, libgcrypt, Bug Report

Apr 13 2023

gniibe closed T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt as Resolved.

Fixed in 1.10.2.

Apr 13 2023, 3:13 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Apr 3 2023

Wolff17 added a comment to T6435: libgcrypt | gcry_mpi_ec_mul return a truncated point coordinate.

Your quick support solve my problem, I am thanking you :)
Bye bye

Apr 3 2023, 10:25 AM · Debian, libgcrypt, Bug Report
werner closed T6435: libgcrypt | gcry_mpi_ec_mul return a truncated point coordinate as Resolved.

I added a remark to the print function. Thanks for the suggestion.

Apr 3 2023, 10:22 AM · Debian, libgcrypt, Bug Report
Wolff17 added a comment to T6435: libgcrypt | gcry_mpi_ec_mul return a truncated point coordinate.

You are right, w.y should be "00039E2C9AEC146C5799651C42691A3E35E291B6BC45FF079DDA3E70E709BF33".

Apr 3 2023, 9:39 AM · Debian, libgcrypt, Bug Report
werner added a comment to T6435: libgcrypt | gcry_mpi_ec_mul return a truncated point coordinate.

Can you please share the expected result with us? Note that Libgcrypt strips leading zeroes except when it is required to keep the value positive.

Apr 3 2023, 9:30 AM · Debian, libgcrypt, Bug Report
Wolff17 created T6435: libgcrypt | gcry_mpi_ec_mul return a truncated point coordinate.
Apr 3 2023, 9:24 AM · Debian, libgcrypt, Bug Report

Mar 8 2023

gniibe moved T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt from Backlog to Next on the FIPS board.
Mar 8 2023, 2:39 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
gniibe changed the status of T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt from Open to Testing.

Thank you.
Applied to both (master and 1.10).

Mar 8 2023, 2:39 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Mar 6 2023

tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Right, thanks for the review! Updated patches below.

Mar 6 2023, 5:11 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Actually, the same issue is in the mac case, which I missed on first couple of reviews:

-  enum gcry_mac_algos alg = va_arg (arg_ptr, enum gcry_cipher_algos);
+  enum gcry_mac_algos alg = va_arg (arg_ptr, enum gcry_mac_algos);
Mar 6 2023, 5:01 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Going through the code once more, there is one typo to be fixed:

+_gcry_fips_indicator_md (va_list arg_ptr)
+{
+  enum gcry_md_algos alg = va_arg (arg_ptr, enum gcry_cipher_algos);

should say

+_gcry_fips_indicator_md (va_list arg_ptr)
+{
+  enum gcry_md_algos alg = va_arg (arg_ptr, enum gcry_md_algos);

otherwise ack.

Mar 6 2023, 4:46 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Mar 1 2023

Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

We came to the same conclusion -- the SHAKE digests are not usable for sign/verify operations the way how it is implemented now. But it would be more clear if we would have explicit allow-list.

Mar 1 2023, 7:57 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

After consulting with our certs lab and studying the code I think SHAKE should not be a problem for now. All of the _gcry_digest_spec_shakeXXX seem to neither have an mdlen nor a read() function. pk_sign and pk_verify seem to both call md_read() which should fail because of the missing read function, kdf checks _gcry_md_get_algo_dlen() which should also disallow SHAKE.

Mar 1 2023, 12:55 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Feb 27 2023

tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Good catch. A similar problem might arise with SHA384 according to section D.R which states

Feb 27 2023, 3:15 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

One potential pitfall here is that SHAKE-128 and SHAKE-256 must not be available for use in signature operations. That's because https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf section C.C disallows the use of SHAKE in higher-level algorithms:

Feb 27 2023, 3:01 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

These look good to me.

Feb 27 2023, 1:45 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Right, we have received the same feedback from our cert lab but I haven't found time to update the bug yet. Here are the updated patches:

Feb 27 2023, 12:19 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

This marks GCRY_MD_CRC32, GCRY_MD_CRC24_RFC2440 and GCRY_MD_CRC32_RFC1510 as approved.

Feb 27 2023, 11:44 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Feb 16 2023

werner triaged T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt as Low priority.
Feb 16 2023, 11:43 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
tobhe created T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.
Feb 16 2023, 3:41 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

May 27 2022

sergi added a watcher for Debian: sergi.
May 27 2022, 10:04 PM
srgblnchtrn removed a watcher for Debian: srgblnchtrn.
May 27 2022, 10:04 PM

Aug 13 2021

werner changed the edit policy for Debian.
Aug 13 2021, 3:56 PM