Page MenuHome GnuPG

Not A BugCommunication
ActivePublic

Members

  • This project does not have any members.
  • View All

Watchers

  • This project does not have any watchers.
  • View All

Recent Activity

Tue, May 6

dkg added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

To avoid further noise on this ticket, i've done as requested and posted to gnupg-devel : (https://lists.gnupg.org/pipermail/gnupg-devel/2025-May/035875.html

Tue, May 6, 10:26 PM · Not A Bug, gnupg

Mon, May 5

werner added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

For the records:

Mon, May 5, 9:24 AM · Not A Bug, gnupg
werner added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

A bug tracker shall never be used for discussion because the audience is not as expected. Only very few people follow a certain bug but several hundreds are following discussion on gnupg-devel@. That is basic hacker knowledge.

Mon, May 5, 9:14 AM · Not A Bug, gnupg

Sun, May 4

heiko added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

I am surprised that you don't want to use the issue tracker for issues.
GnuPG's trust calculations are quite clearly broken, by any metric. There's nothing to discuss here.

Sun, May 4, 8:13 PM · Not A Bug, gnupg
werner closed T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate as Resolved.

Heiko, I told you already in T7106 that it is not a good idea to re-open a ticket. If you really want to discuss stuff, take that to a mailing list.

Sun, May 4, 8:06 PM · Not A Bug, gnupg
heiko reopened T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate as "Open".

I see two interesting angles from which to think about this Web of Trust calculation:

Sun, May 4, 1:26 PM · Not A Bug, gnupg

Fri, May 2

werner closed T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate as Resolved.

> I'm not sure i understand why "the latest" should be preferred.

Fri, May 2, 10:26 AM · Not A Bug, gnupg
dkg added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

A bit more experimentation shows the same behavior, even if Alice's tsig of Bill is full, not marginal, and even if all signatures are made in the same second, which is the finest resolution that OpenPGP objects can report.

Fri, May 2, 12:48 AM · Not A Bug, gnupg
dkg added a comment to T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate.

Interesting analysis, thanks for the sleuthing! I'm not sure i understand why "the latest" should be preferred. For example, in the graph made in this example, which part of the graph is the "latest"? Since the path from Alice to Carol is two hops long at least, it's conceivable that one path (A→Bob→C) has both "the latest" tsig *and* "the earliest" tsig, if the other path (A→Bill→C) happens to have been made between the other two tsigs.

Fri, May 2, 12:15 AM · Not A Bug, gnupg

Tue, Apr 29

werner edited projects for T7611: WoT: adding a marginal trustsig reduces the validity of a downstream certificate, added: Not A Bug; removed Bug Report.

I also spend some time with this and the problem is described by this comment in trustdb.c:

Tue, Apr 29, 1:13 PM · Not A Bug, gnupg

Mon, Apr 28

werner changed the status of T7106: Trailing newline trouble in clearsigned message generation and verification from Wontfix to Resolved.

No, it is not a bug and I beg you not to change the status again. Don't start the same trouble here as some of you guys did with the IETF WG!

Mon, Apr 28, 5:19 PM · Not A Bug, gnupg
heiko changed the status of T7106: Trailing newline trouble in clearsigned message generation and verification from Resolved to Wontfix.
Mon, Apr 28, 3:08 PM · Not A Bug, gnupg
heiko added a comment to T7106: Trailing newline trouble in clearsigned message generation and verification.

Err, I don't see why I would "need to test" anything further.

Mon, Apr 28, 2:45 PM · Not A Bug, gnupg
werner closed T7106: Trailing newline trouble in clearsigned message generation and verification as Resolved.

This is just one build of PGP and you would need to test all versions on Windows, macOS and Unix. You also need to test against all versions of GnuPG since 1998 (when we started with interop tests). We won't change this in GnuPG and risk regression. If you have a problem with that go and add a fix to your tool - name it bug compatibility or whatever. And please do not re-open this bug.

Mon, Apr 28, 2:20 PM · Not A Bug, gnupg
heiko reopened T7106: Trailing newline trouble in clearsigned message generation and verification as "Open".
Mon, Apr 28, 12:05 PM · Not A Bug, gnupg
heiko added a comment to T7106: Trailing newline trouble in clearsigned message generation and verification.

This has been implemented and tested to be compatible with PGP - a looong time ago. iirc this was discussed around 1999 but might be only by private mail between the PGP hackers and me. Thus any change now might break PGP - which is still widely used (although mostly for encryption).

Mon, Apr 28, 12:04 PM · Not A Bug, gnupg

Apr 8 2025

werner closed T7598: Avoiding keyboxd by default as Wontfix.

We suggest the use of the keyboxd for a reason. The use of multiple keyrings has always been a problem and has been kept on demand from a couple of people. Eventually things change and for a new installation the use of the keyboxd is the suggested way to run GnuPG. Support for pubring.gpg and even pubring.kbx may eventually be removed - not now or in the next year but it may happen. You have been warned ;-)

Apr 8 2025, 8:34 PM · Not A Bug, gnupg24 (gnupg-2.4.5), keyboxd

Mar 21 2025

werner triaged T7577: GnuPG could not work when TCP congestion provider is set to BBR2 in Windows as Normal priority.

Indeed, GnuPG's IPC uses TCP connections from 127.0.0.1 to 127.0.0.1 taking the destination port (and a cookie) from a file. We can't change that easily to the new Unix socket implementation Windows recently introduced. I hope there is a way to exclude localhost->localhost from congestion control.

Mar 21 2025, 8:43 PM · Support, Not A Bug, gnupg, Bug Report

Mar 20 2025

alexk added a project to T4278: Signed mails not visible in Exchange web interface (owa): Not A Bug.
Mar 20 2025, 11:54 AM · Not A Bug, gpgol, Bug Report, gpg4win

Mar 17 2025

werner closed T7570: `gpg --trust-model always --verify` produces incongruous warning "Using untrusted key!" as Resolved.

This has always been the case. git blame shows for check_signatures_trust:

Mar 17 2025, 9:39 AM · Not A Bug, gnupg

Mar 5 2025

dkg added a comment to T7539: validating an OpenPGP `Signed Message` with a text-mode signature and binary-mode literal data packet.

Here is a patch against master which normalizes line-endings when verifying text signatures over binary literal data packets

Mar 5 2025, 6:05 AM · Not A Bug, gnupg

Feb 24 2025

werner closed T7539: validating an OpenPGP `Signed Message` with a text-mode signature and binary-mode literal data packet as Resolved.

I don't see a bug here and any change in this domain disks a regression with existing data. BTW, the mode byte was not even part of the signed data before signature version 5.

Feb 24 2025, 9:56 AM · Not A Bug, gnupg
werner closed T7106: Trailing newline trouble in clearsigned message generation and verification as Resolved.

My comment from a year ago still holds true; you may want to fix your testing framework and re-openig this bug iff you can show that there will be no regression with PGP 7 and later.

Feb 24 2025, 9:51 AM · Not A Bug, gnupg

Feb 9 2025

dkg added a comment to T7518: `gpg --gpgconf-list` reports some data from the config file or command line, and other data that is about compiled in defaults.

If you say so, i won't press this. I will just leave this ticket with an observation that even for someone who reads the source code this is not intelligible. At the top of gpgconf_list in g10/gpg.c, the comment says:

Feb 9 2025, 5:59 AM · Not A Bug, gnupg, Bug Report

Feb 7 2025

werner closed T7518: `gpg --gpgconf-list` reports some data from the config file or command line, and other data that is about compiled in defaults as Resolved.
Feb 7 2025, 10:09 AM · Not A Bug, gnupg, Bug Report

Dec 19 2024

bitigchi closed T7454: Kleopatra: GnuPG System settings’ translations are not pulled as Invalid.

Installing language-pack-tr-base fixed the issue. Closing. Sorry for the noise.

Dec 19 2024, 6:35 PM · Not A Bug, gnupg, Bug Report

Dec 18 2024

werner reopened T7454: Kleopatra: GnuPG System settings’ translations are not pulled as "Open".
Dec 18 2024, 5:25 PM · Not A Bug, gnupg, Bug Report
bitigchi added a comment to T7454: Kleopatra: GnuPG System settings’ translations are not pulled.

Actually not a bug: In my tests I forgot to unset LANGUAGES and LANG before calling gpg.

LANGUAGE= LANG= LC_MESSAGES=de_DE gpg

Thus this should work. But it did only work when I used

LANGUAGE= LANG= LC_MESSAGES=de_DE.UTF8 gpg

Thus the whole thing is related to the configuration of locale.alias and on whether LANGUAGE is set in the environment (for me it is set to en_US:en

Dec 18 2024, 5:21 PM · Not A Bug, gnupg, Bug Report
werner closed T7454: Kleopatra: GnuPG System settings’ translations are not pulled as Resolved.

Actually not a bug: In my tests I forgot to unset LANGUAGES and LANG before calling gpg.

Dec 18 2024, 3:28 PM · Not A Bug, gnupg, Bug Report

Dec 2 2024

gniibe closed T7426: Retain binary representation of key for import->export (in particular, Ed25519 signature), a subtask of T7403: GnuPG 2.4.6 rewrites Ed25519 MPIs into non-compliant MPI form , as Resolved.
Dec 2 2024, 5:49 AM · Not A Bug, gnupg24, Bug Report

Nov 25 2024

werner changed the status of T7426: Retain binary representation of key for import->export (in particular, Ed25519 signature), a subtask of T7403: GnuPG 2.4.6 rewrites Ed25519 MPIs into non-compliant MPI form , from Open to Testing.
Nov 25 2024, 11:13 AM · Not A Bug, gnupg24, Bug Report
gniibe added a subtask for T7403: GnuPG 2.4.6 rewrites Ed25519 MPIs into non-compliant MPI form : T7426: Retain binary representation of key for import->export (in particular, Ed25519 signature).
Nov 25 2024, 10:21 AM · Not A Bug, gnupg24, Bug Report
gniibe added a comment to T7403: GnuPG 2.4.6 rewrites Ed25519 MPIs into non-compliant MPI form .

For this ticket, I reviewed the code around my SOS changes.
Because I'd like to focus the point of retaining binary representation when doing import->export,
I created another thicket: T7426

Nov 25 2024, 10:21 AM · Not A Bug, gnupg24, Bug Report

Nov 20 2024

dkg added a comment to T7403: GnuPG 2.4.6 rewrites Ed25519 MPIs into non-compliant MPI form .

thanks for the clarification. i was not objecting to the workflow, i was trying to understand so that i can interact with the bug tracker appropriately. I was unaware of the difference between "milestones" and other project tags. I'll try to get that right in the future.

Nov 20 2024, 3:52 PM · Not A Bug, gnupg24, Bug Report
werner triaged T7403: GnuPG 2.4.6 rewrites Ed25519 MPIs into non-compliant MPI form as Low priority.
Nov 20 2024, 9:02 AM · Not A Bug, gnupg24, Bug Report
werner added projects to T7403: GnuPG 2.4.6 rewrites Ed25519 MPIs into non-compliant MPI form : gnupg24, Not A Bug.

Please do not add milestone tags.

Nov 20 2024, 9:02 AM · Not A Bug, gnupg24, Bug Report

Sep 25 2024

werner edited projects for T6820: SCD: Invalid ID when decrypting with brainpool key , added: gnupg, Not A Bug; removed Restricted Project, gnupg22.
Sep 25 2024, 4:20 PM · Not A Bug, gnupg

Jun 25 2024

werner closed T7176: write_status_text_and_buffer fails to escape some non-printable characters as Resolved.

Reading the original bug report it is clear that this is not a gpg bug but a problem in the Python code. This should only be read as utf-8 if the NOTATION_FLAGS line indicated that this is human readable.

Jun 25 2024, 9:12 AM · Support, gnupg, Not A Bug

May 30 2024

dkg added a comment to T7137: unreliable RSA decryption.

It seems too late to reject on import, given that people might already have such a secret key in their ~/.gnupg/private-keys-v1.d/ They might have had it for years without knowing it, because the failure is so intermittent. They might just think that they did something wrong, and when they try again it works. It would be great to be more robust than that.

May 30 2024, 11:28 PM · OpenPGP, Not A Bug, gnupg
werner added a comment to T7137: unreliable RSA decryption.

In more than 25 years of OpenPGP we only had a few new implementations which got it wrong. I see no need to fix it here - maybe import could indeed reject such a key, though.

May 30 2024, 12:50 PM · OpenPGP, Not A Bug, gnupg

May 29 2024

dkg added a comment to T7137: unreliable RSA decryption.

Maybe there's a 4th possible option that's better than the three i identified?

May 29 2024, 9:14 PM · OpenPGP, Not A Bug, gnupg
dkg added a comment to T7137: unreliable RSA decryption.

So i see a range of ways that any OpenPGP software could deal with this:

May 29 2024, 9:13 PM · OpenPGP, Not A Bug, gnupg
werner closed T7137: unreliable RSA decryption as Resolved.

I can replicate that and it works if you disable the use of the CRT. Looking at the key:

pkey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
 pkey[1]: 010001
 skey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
 skey[3]: F57D9F597750967DF272D9AC661DDC212D7C5CA4C6E91573A80756281351CDC3A2532B155D9251029F89A0A0807DF2BD177DC30FC6A847E07738B55606DF032ADAD8361E0AFEE9C0CF7D566793834977FAAE9C4B87132B94F665EFF463777CDE7EB89113FA3AAC194B6F2D30C40BE7C0DDE36A5855277C1E4D0204FC4C737BCB
 skey[4]: C4B135296B8F4390B953DDA84249FC8467CFF81FC715D1B5F3E01FCC8DC770813630AEA93982F2004705C4D272E07A10B1882AC5C09A45E88B14A1446B4C639B549420CE3BF90947E6E86503E426A8FDAC4C5CFC2809F5F0A1647ED5EE2457C054A40AA1F0666B28B2C970BE2093AE7B095A688B2D713CA8885826F23AFB37D9
 skey[5]: 0790A8E260C6CADC353FB3961D798EFD4F15F96752DA20B86841334C38861743DD7A1FEB2B750D0864F5901BE541B6C8FB63649B18FDC4A32A1233EF90872DCD35704A4B4063DB62752CF6A7FD00F086C6B1042A2B0CB6FB36B7D5269671DACF55242A838E60D514BA868354910CEB1C41FB9A43BF932B5036A6EFE35236FFC7
May 29 2024, 9:40 AM · OpenPGP, Not A Bug, gnupg

Apr 16 2024

matheusmoreira added a comment to T5783: All s2k hardenings silently ignored when exporting private keys.

What is the current status of this issue?

Apr 16 2024, 2:46 PM · Not A Bug, gpgagent, OpenPGP, gpg4win, gnupg

Mar 11 2024

werner closed T7038: gpg --recv-key return code is 0 as Wontfix.

It could have been discussed whether this makes sense. However, we can't change it anymore because it would change the behaviour. Consider a cron job which looks into a directory with keyids and imports them from a keyserver. It is totally fine if the script returns success if no keys are available.

Mar 11 2024, 1:03 PM · Not A Bug, gnupg, Bug Report

Mar 4 2024

Zymlex added a comment to T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent.

In case if someone finds it through a search:

Mar 4 2024, 9:51 PM · Not A Bug, workaround, gnupg24, Windows, ssh

Feb 21 2024

werner reopened T6729: scdaemon 'Operation not supported by device' on macOS unless racing for first (?) read on boot as "Open".

The solution seems to be a newer libccid version. If that is the case we may want to include the fix also in our own ccid driver.

Feb 21 2024, 2:45 PM · Feature Request, Not A Bug, gnupg, scd, MacOS
ncts added a comment to T6729: scdaemon 'Operation not supported by device' on macOS unless racing for first (?) read on boot.

Got this from my card vendor. Sonoma had a buggy CCID driver; compile one yourself and the bug's gone: https://forums.developer.apple.com/forums/thread/732091?answerId=768462022#768462022

Feb 21 2024, 11:05 AM · Feature Request, Not A Bug, gnupg, scd, MacOS

Jan 5 2024

werner moved T3883: Add Win32-OpenSSH support to gpg-agent's ssh-agent from Backlog to done on the gnupg24 board.
Jan 5 2024, 12:04 PM · Not A Bug, workaround, gnupg24, Windows, ssh

Dec 11 2023

werner closed T6850: dirmngr fails `gpg --recv-key` in very non-obious way if local TOR node in SafeSocks mode is running as Wontfix.

For various reasons dirmngr requires and implements a full resolver and implements that. This way all DNS queries are passed through Tor. Thus this is a feature and not a bug. The error message could be better but we can only return what SOCKS tells us.

Dec 11 2023, 8:37 AM · gnupg, Tor, Not A Bug, dirmngr