Page MenuHome GnuPG

UbuntuUmbrella
ActivePublic

Watchers

  • This project does not have any watchers.
  • View All

Recent Activity

Nov 2 2023

ciudadex added a comment to T6783: Import secret keys created in Kleopatra with Windows 11 to Ubuntu.

thanks for your reply
gpg -K
gpg: enabled debug flags: memstat
/home/usernet/.gnupg/pubring.kbx
uid [ absoluta ]
uid [ absoluta ]
ssb cv25519 2022-02-13 [E]
gpg -h
gpg (GnuPG) 2.2.4
libgcrypt 1.8.1
Copyright (C) 2017 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later https://gnu.org/licenses/gpl.html
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Nov 2 2023, 6:59 PM · Ubuntu, gnupg, Support
werner triaged T6783: Import secret keys created in Kleopatra with Windows 11 to Ubuntu as Normal priority.

It is a bit hard for us to decipher the Spanish diagnostics. Before we can try to help you please update to a deent version of gpg and libgcrypt. At least the version for Ubuntu is way too old; Libgcrypt is 5 years old, the current version of the lTS branch is 1.8.10. GnuPG is also 10 years old and in the mean time we have fixed several critical bugs; the current version of this legacy branch is 2.2.41! Note that Ubuntu might have fixed some bugs despit ethe version number - we just can't know.

Nov 2 2023, 8:33 AM · Ubuntu, gnupg, Support

Apr 13 2023

gniibe closed T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt as Resolved.

Fixed in 1.10.2.

Apr 13 2023, 3:13 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Mar 8 2023

gniibe moved T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt from Backlog to Next on the FIPS board.
Mar 8 2023, 2:39 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
gniibe changed the status of T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt from Open to Testing.

Thank you.
Applied to both (master and 1.10).

Mar 8 2023, 2:39 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Mar 6 2023

tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Right, thanks for the review! Updated patches below.

Mar 6 2023, 5:11 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Actually, the same issue is in the mac case, which I missed on first couple of reviews:

-  enum gcry_mac_algos alg = va_arg (arg_ptr, enum gcry_cipher_algos);
+  enum gcry_mac_algos alg = va_arg (arg_ptr, enum gcry_mac_algos);
Mar 6 2023, 5:01 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Going through the code once more, there is one typo to be fixed:

+_gcry_fips_indicator_md (va_list arg_ptr)
+{
+  enum gcry_md_algos alg = va_arg (arg_ptr, enum gcry_cipher_algos);

should say

+_gcry_fips_indicator_md (va_list arg_ptr)
+{
+  enum gcry_md_algos alg = va_arg (arg_ptr, enum gcry_md_algos);

otherwise ack.

Mar 6 2023, 4:46 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Mar 1 2023

Jakuje added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

We came to the same conclusion -- the SHAKE digests are not usable for sign/verify operations the way how it is implemented now. But it would be more clear if we would have explicit allow-list.

Mar 1 2023, 7:57 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

After consulting with our certs lab and studying the code I think SHAKE should not be a problem for now. All of the _gcry_digest_spec_shakeXXX seem to neither have an mdlen nor a read() function. pk_sign and pk_verify seem to both call md_read() which should fail because of the missing read function, kdf checks _gcry_md_get_algo_dlen() which should also disallow SHAKE.

Mar 1 2023, 12:55 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Feb 27 2023

tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Good catch. A similar problem might arise with SHA384 according to section D.R which states

Feb 27 2023, 3:15 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

One potential pitfall here is that SHAKE-128 and SHAKE-256 must not be available for use in signature operations. That's because https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf section C.C disallows the use of SHAKE in higher-level algorithms:

Feb 27 2023, 3:01 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

These look good to me.

Feb 27 2023, 1:45 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
tobhe added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

Right, we have received the same feedback from our cert lab but I haven't found time to update the bug yet. Here are the updated patches:

Feb 27 2023, 12:19 PM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
neverpanic added a comment to T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.

This marks GCRY_MD_CRC32, GCRY_MD_CRC24_RFC2440 and GCRY_MD_CRC32_RFC1510 as approved.

Feb 27 2023, 11:44 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Feb 16 2023

werner triaged T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt as Low priority.
Feb 16 2023, 11:43 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS
tobhe created T6376: FIPS 140-3: add explicit indicators for md and mac to unblock MD5 in apt.
Feb 16 2023, 3:41 AM · libgcrypt, Feature Request, Ubuntu, Debian, FIPS

Sep 27 2022

tobhe added a member for Ubuntu: tobhe.
Sep 27 2022, 1:38 AM

Feb 12 2021

werner closed T5259: Release Libgcrypt 1.9.1, a subtask of T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial, as Resolved.
Feb 12 2021, 12:34 PM · Ubuntu, Bug Report, libgcrypt

Jan 29 2021

werner closed T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial as Resolved.
Jan 29 2021, 11:27 AM · Ubuntu, Bug Report, libgcrypt
werner changed the status of T5259: Release Libgcrypt 1.9.1, a subtask of T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial, from Open to Testing.
Jan 29 2021, 11:25 AM · Ubuntu, Bug Report, libgcrypt
werner added a subtask for T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial: T5259: Release Libgcrypt 1.9.1.
Jan 29 2021, 10:21 AM · Ubuntu, Bug Report, libgcrypt
werner removed a parent task for T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial: T5259: Release Libgcrypt 1.9.1.
Jan 29 2021, 10:20 AM · Ubuntu, Bug Report, libgcrypt
gniibe added a parent task for T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial: T5259: Release Libgcrypt 1.9.1.
Jan 29 2021, 1:04 AM · Ubuntu, Bug Report, libgcrypt

Jan 28 2021

syscomet added a comment to T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial.

Patch lets it build on xenial for me, thank you.

Jan 28 2021, 11:00 PM · Ubuntu, Bug Report, libgcrypt
jukivili added a comment to T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial.

Patch for this bug is available here, "attachment-0001.bin": https://lists.gnupg.org/pipermail/gcrypt-devel/2021-January/005079.html

Jan 28 2021, 7:50 PM · Ubuntu, Bug Report, libgcrypt
syscomet added a comment to T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial.

I committed the partial result docker container, so I can restart it for investigation. So:

Jan 28 2021, 7:42 PM · Ubuntu, Bug Report, libgcrypt
jukivili added a comment to T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial.

I tested xenial with gcc-5.3 (xenial distro repo) and gcc-5.4 (xenial-updates distro repo) and libgcrypt 1.9.0 from git repo and from tarball. I did not get any errors.

Jan 28 2021, 7:56 AM · Ubuntu, Bug Report, libgcrypt
werner created T5271: libgcrypt 1.9.0 compilation fails on Ubuntu xenial.
Jan 28 2021, 7:30 AM · Ubuntu, Bug Report, libgcrypt

Dec 11 2018

werner closed T1166: Connecting once-per-key for keys with keyserver preference vs server violate reconnection limit as Wontfix.
Dec 11 2018, 12:39 PM · Ubuntu, gnupg, Feature Request

Sep 21 2017

werner closed T3247: SIGILL in prepare_macpads() at md.c:681 as Resolved.

Closing due to compiler error.

Sep 21 2017, 3:39 PM · clang, Ubuntu, libgcrypt, Bug Report

Jul 6 2017

jukivili added a comment to T3247: SIGILL in prepare_macpads() at md.c:681.

I did some experimenting and clang SIGILL does not trigger with commonly used, but non-conforming, variable-length object with "struct hack", as below:

Jul 6 2017, 1:22 PM · clang, Ubuntu, libgcrypt, Bug Report

Jul 5 2017

werner added a comment to T3247: SIGILL in prepare_macpads() at md.c:681.

With an integer overflow.

Jul 5 2017, 3:23 PM · clang, Ubuntu, libgcrypt, Bug Report
marcus added a comment to T3247: SIGILL in prepare_macpads() at md.c:681.

This is a standard dynamic sized array:

Jul 5 2017, 3:05 PM · clang, Ubuntu, libgcrypt, Bug Report
werner added a comment to T3247: SIGILL in prepare_macpads() at md.c:681.

Sorry, this is a standard C feature and the only way to have dynamic sized arrays. CLANG simply does not get this pattern right. Grep for pgut001's very comments on such ill behaving compilers (including gcc).

Jul 5 2017, 2:59 PM · clang, Ubuntu, libgcrypt, Bug Report
marcus added a comment to T3247: SIGILL in prepare_macpads() at md.c:681.

At a meta level, I really think that writing more conservative code that enables compilers to do a better job checking for safety is a good idea. The tricks we do with structs are premature optimization from a time when compilers were dumb as a doornail.

Jul 5 2017, 2:56 PM · clang, Ubuntu, libgcrypt, Bug Report
marcus added a comment to T3247: SIGILL in prepare_macpads() at md.c:681.

Maybe casting to a void* helps to disable the check in the compiler.

Jul 5 2017, 2:52 PM · clang, Ubuntu, libgcrypt, Bug Report
gniibe added a comment to T3247: SIGILL in prepare_macpads() at md.c:681.

I can replicate the issue on my system.
It is not the line 681, actually.

Jul 5 2017, 4:07 AM · clang, Ubuntu, libgcrypt, Bug Report

Jul 4 2017

gniibe claimed T3247: SIGILL in prepare_macpads() at md.c:681.

I think that the problem is in your usage with your tool. Please have a look at md_open function in cipher/md.c.
This bug is not the one in libgcrypt, but in the compiler.

Jul 4 2017, 6:27 AM · clang, Ubuntu, libgcrypt, Bug Report
gniibe closed T3246: md5.c:119:3: runtime error: unsigned integer overflow: 2612846078 + 3614090360 cannot be represented in type 'unsigned int' as Invalid.

Same argument can apply to MD5. See T3249: sha256.c:265:3: runtime error: unsigned integer overflow: 4084723048 + 1633837952 cannot be represented in type 'unsigned int' of SHA2.

Jul 4 2017, 5:10 AM · clang, Ubuntu, libgcrypt, Bug Report
gniibe closed T3250: random-csprng.c:1070:16: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'size_t' (aka 'unsigned long') as Invalid.

See T3245: cipher-gcm-intel-pclmul.c:418:17: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'size_t' (aka 'unsigned long').

Jul 4 2017, 5:08 AM · clang, Ubuntu, libgcrypt, Bug Report
gniibe closed T3245: cipher-gcm-intel-pclmul.c:418:17: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'size_t' (aka 'unsigned long') as Invalid.

See T3248: mpiutil.c:501:37: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'unsigned long' for unsigned integer overflow.

Jul 4 2017, 5:06 AM · clang, Ubuntu, libgcrypt, Bug Report
gniibe closed T3248: mpiutil.c:501:37: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'unsigned long' as Invalid.

It is intentionally used.
And in the C programming language, it is defined that unsigned integer never overflows (it is computed as modulo 2).

Jul 4 2017, 4:58 AM · clang, Ubuntu, libgcrypt, Bug Report
gniibe closed T3251: sha512.c:342:25: runtime error: unsigned integer overflow: 17296268247117069635 + 2271443192277056827 cannot be represented in type 'unsigned long' as Invalid.

See T3249: sha256.c:265:3: runtime error: unsigned integer overflow: 4084723048 + 1633837952 cannot be represented in type 'unsigned int'.

Jul 4 2017, 4:54 AM · clang, Ubuntu, libgcrypt, Bug Report
geeknik created T3251: sha512.c:342:25: runtime error: unsigned integer overflow: 17296268247117069635 + 2271443192277056827 cannot be represented in type 'unsigned long'.
Jul 4 2017, 3:11 AM · clang, Ubuntu, libgcrypt, Bug Report
geeknik created T3250: random-csprng.c:1070:16: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'size_t' (aka 'unsigned long').
Jul 4 2017, 3:11 AM · clang, Ubuntu, libgcrypt, Bug Report
geeknik created T3248: mpiutil.c:501:37: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'unsigned long'.
Jul 4 2017, 3:11 AM · clang, Ubuntu, libgcrypt, Bug Report
geeknik created T3247: SIGILL in prepare_macpads() at md.c:681.
Jul 4 2017, 3:11 AM · clang, Ubuntu, libgcrypt, Bug Report
geeknik created T3246: md5.c:119:3: runtime error: unsigned integer overflow: 2612846078 + 3614090360 cannot be represented in type 'unsigned int'.
Jul 4 2017, 3:11 AM · clang, Ubuntu, libgcrypt, Bug Report
geeknik created T3245: cipher-gcm-intel-pclmul.c:418:17: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'size_t' (aka 'unsigned long').
Jul 4 2017, 3:10 AM · clang, Ubuntu, libgcrypt, Bug Report