Page MenuHome GnuPG

Bug ReportBugs
ActivePublic

Members

  • This project does not have any members.
  • View All

Recent Activity

Today

vitusb created T7544: Kleopatra (gnupg, gpgsm) hang on key-creation when x.509 certs are in keystore.
Wed, Feb 26, 12:36 PM · gnupg22 (gnupg-2.2.46), kleopatra, Bug Report

Yesterday

gniibe added a comment to T7519: libgcrypt: (EC)DSA signature generation should be constant-time.

One more change for _gcry_dsa_gen_k in rC54caef02afa9: cipher:(EC)DSA: Simply use mpi_clear_highbit in _gcry_dsa_gen_k.

Tue, Feb 25, 3:47 AM · libgcrypt, Bug Report
gniibe added a comment to T7519: libgcrypt: (EC)DSA signature generation should be constant-time.

One more change for mpi_invm in rCc1da86e45a6e: mpi: Avoid normalizing MPI in _gcry_mpi_invm.

Tue, Feb 25, 3:25 AM · libgcrypt, Bug Report

Mon, Feb 24

werner closed T7508: GPGME gpgme_pubkey_algo_string Returns "unknown" for RSA Keys as Resolved.
Mon, Feb 24, 10:37 AM · gpgme, Bug Report

Sat, Feb 22

dkg created T7539: validating an OpenPGP `Signed Message` with a text-mode signature and binary-mode literal data packet.
Sat, Feb 22, 3:03 PM · Not A Bug, gnupg
dkg added a comment to T7527: Keyring/keybox denial of service.

Thank you @werner ! I can confirm that the patches that have landed on STABLE-BRANCH-2-4 do clear up the DoS i was seeing for signature verification.

Sat, Feb 22, 3:08 AM · OpenPGP, gnupg, Bug Report

Fri, Feb 21

dkg added a comment to T7106: Trailing newline trouble in clearsigned message generation and verification.

The patch below fixes the master branch to be compliant with the standards for CSF message generation and verification.

Fri, Feb 21, 8:00 PM · Not A Bug, gnupg
fmg closed T7537: WKD key import denied due to false dirmngr caching as Resolved.

New Situation
Once I started testing in logging mode the problem had gone away already. There were some hints to HTTPS certificate issues, but nothing really to blame. Neither with nor without logging the problem could be reproduced after two days of questioning me.

Fri, Feb 21, 5:05 PM · dirmngr, wkd, Bug Report
werner closed T7527: Keyring/keybox denial of service as Resolved.

Also fixed for 2.4

Fri, Feb 21, 12:24 PM · OpenPGP, gnupg, Bug Report
werner lowered the priority of T7527: Keyring/keybox denial of service from High to Normal.

This has been fixed in master with rG48978ccb4e:

Fri, Feb 21, 12:18 PM · OpenPGP, gnupg, Bug Report
werner added a comment to T4834: gpgme library calls gpg with --list-trust-path.

Finally removed with gpgme 2.0

Fri, Feb 21, 10:57 AM · gpgme, Bug Report
werner closed T7294: keyboxd: Possible race conditions (and clean up), a subtask of T7224: Kleopatra: broken in Testversion beta-41, as Resolved.
Fri, Feb 21, 9:15 AM · Bug Report, kleopatra, Restricted Project
werner closed T7294: keyboxd: Possible race conditions (and clean up) as Resolved.

Closed after the release of 2.5.4

Fri, Feb 21, 9:15 AM · keyboxd, Bug Report, kleopatra, Restricted Project
werner triaged T7492: gpgconf failed to kill all gpgagent daemons on windows as Normal priority.
Fri, Feb 21, 9:11 AM · Windows, gnupg, Bug Report
werner added a comment to T7492: gpgconf failed to kill all gpgagent daemons on windows.

Right when you use a different homedir you also need to pass --homedir to gpgconf or set GNUPGHOME before invoking gpgconf. If you call gpgconf via GPGME the --homedir option is passed; afaics we don't have a kill option gpgme.

Fri, Feb 21, 9:09 AM · Windows, gnupg, Bug Report
werner triaged T7536: Key import dialog should come into foreground when import was triggered by file association as Normal priority.

This even happens with native Windows applications thus normal priority. Users need to watch the taskbar for blinking items.

Fri, Feb 21, 9:04 AM · UI, Bug Report, gpg4win
werner triaged T7537: WKD key import denied due to false dirmngr caching as Normal priority.

The caching works on the base of the requested domain, that is example.org and not openpgpkey.example.org - thus it should not make a difference when you change your setup. There is an initial test for a cached domain status before the resolving process starts. If you want to look yourself: gnupg/dirmngr/server.c:cmd_wkd_get() and domainfo.c.

Fri, Feb 21, 9:00 AM · dirmngr, wkd, Bug Report
fmg added a comment to T7537: WKD key import denied due to false dirmngr caching.

Reproducibility
The problem cannot be confirmed generic on domain level. I can reproduce the effect with keys shipped from my domain, i.e. email addresses @shimps.de, but the issue vanishes when I try to reproduce it with email addresses @gnupg.org as e.g. Werner's address.

Fri, Feb 21, 12:08 AM · dirmngr, wkd, Bug Report

Thu, Feb 20

fmg created T7537: WKD key import denied due to false dirmngr caching.
Thu, Feb 20, 3:29 PM · dirmngr, wkd, Bug Report
werner edited projects for T7527: Keyring/keybox denial of service, added: OpenPGP; removed keyboxd.

Well, the different outcome depends on the order of the certificates or the string comparision in keyboxd. So it is not a keyboxd vs. pubring.kbx thing.

Thu, Feb 20, 9:30 AM · OpenPGP, gnupg, Bug Report
werner added a comment to T7527: Keyring/keybox denial of service.

Okay, I can reproduce it when not using keyboxd.

Thu, Feb 20, 8:15 AM · OpenPGP, gnupg, Bug Report

Wed, Feb 19

ikloecker added a comment to T7536: Key import dialog should come into foreground when import was triggered by file association.

This is very similar to T5780 except that it concerns a different operation and thus a different window. The fix is likely the same as for T5780.

Wed, Feb 19, 1:26 PM · UI, Bug Report, gpg4win
werner added a comment to T7535: Kleopatra: "Decrypt/Verify all files in folder" doesn't work.

I can't remember that we ever had support this. It is also not easy to come up with the good way to present the status for all files in a folder. We would need to define a format similar to what sha1sum uses: A list of file with they signature file or so. Note that kleopatra has support for running sha256sum in such a way.

Wed, Feb 19, 12:05 PM · Feature Request, kleopatra
werner added a comment to T7527: Keyring/keybox denial of service.

Sorry. I can't reproduce this. Neither with master nor with the 2.4 repo version.

Wed, Feb 19, 11:27 AM · OpenPGP, gnupg, Bug Report
TobiasFella added a comment to T7535: Kleopatra: "Decrypt/Verify all files in folder" doesn't work.

We don't have this exact action on windows, but the normal "Decrypt & Verify" action shows up for folders there (and doesn't work either).

Wed, Feb 19, 11:26 AM · Feature Request, kleopatra
uwi updated the task description for T7536: Key import dialog should come into foreground when import was triggered by file association.
Wed, Feb 19, 9:22 AM · UI, Bug Report, gpg4win
uwi updated the task description for T7536: Key import dialog should come into foreground when import was triggered by file association.
Wed, Feb 19, 9:20 AM · UI, Bug Report, gpg4win
uwi created T7536: Key import dialog should come into foreground when import was triggered by file association.
Wed, Feb 19, 9:19 AM · UI, Bug Report, gpg4win
gniibe changed the status of T7519: libgcrypt: (EC)DSA signature generation should be constant-time from Open to Testing.

All changes are pushed to master.

Wed, Feb 19, 5:36 AM · libgcrypt, Bug Report

Tue, Feb 18

dkg added a comment to T7527: Keyring/keybox denial of service.

the reproducer is:

Tue, Feb 18, 10:42 PM · OpenPGP, gnupg, Bug Report
dkg reopened T7527: Keyring/keybox denial of service as "Open".

I don't think this is fixed. With this patch in place, if i import blocker.cert first, and then import distsigkey.gpg, it looks to me like i still can't verify signatures made from any of the GnuPG signing keys.

Tue, Feb 18, 10:40 PM · OpenPGP, gnupg, Bug Report
ikloecker created T7535: Kleopatra: "Decrypt/Verify all files in folder" doesn't work.
Tue, Feb 18, 7:18 PM · Feature Request, kleopatra

Fri, Feb 14

gniibe added a comment to T7519: libgcrypt: (EC)DSA signature generation should be constant-time.

Use of mpi_cmp is now being fixed, by providing _gcry_mpih_cmp_lli function.
Along with that, we need to fix use of mpi_cmp_ui, since it's skips earlier depending its limbs.

diff --git a/cipher/dsa-common.c b/cipher/dsa-common.c
index 170dce12..e010e182 100644
--- a/cipher/dsa-common.c
+++ b/cipher/dsa-common.c
@@ -25,6 +25,7 @@
Fri, Feb 14, 1:32 AM · libgcrypt, Bug Report

Thu, Feb 13

dkg added a comment to T7106: Trailing newline trouble in clearsigned message generation and verification.

Just a note that i've tested this and --clearsign appears to be problematic for 2.4.7 as well as 2.2.40.

Thu, Feb 13, 11:41 PM · Not A Bug, gnupg
TobiasFella triaged T7532: Kleopatra fails to decrypt/extract archives located at very long file paths as Normal priority.
Thu, Feb 13, 4:24 PM · vsd33, gpd5x, Bug Report, kleopatra
werner triaged T7531: `--assert-pubkey-algo` does not behave as documented as Low priority.
Thu, Feb 13, 8:50 AM · gpgv, Bug Report

Wed, Feb 12

dkg added a comment to T7531: `--assert-pubkey-algo` does not behave as documented.

a demonstration:

Wed, Feb 12, 11:02 PM · gpgv, Bug Report
dkg created T7531: `--assert-pubkey-algo` does not behave as documented.
Wed, Feb 12, 10:53 PM · gpgv, Bug Report
werner closed T7071: gpg: Support of No CRC in ASCII armor as Resolved.
Wed, Feb 12, 12:04 PM · gnupg, Bug Report
werner closed T7527: Keyring/keybox denial of service as Resolved.
Wed, Feb 12, 12:03 PM · OpenPGP, gnupg, Bug Report
werner moved T7065: pinentry 1.3.0 ships desktop file with icons, but does not install them from Backlog to Done on the pinentry board.
Wed, Feb 12, 11:17 AM · pinentry, Bug Report
werner moved T7522: pinentry started with invalid DBUS_SESSION_BUS_ADDRESS when invoked by gpg running in flatpak container from Backlog to Done on the pinentry board.
Wed, Feb 12, 11:17 AM · Linux, pinentry, gpgagent, Bug Report
werner closed T7522: pinentry started with invalid DBUS_SESSION_BUS_ADDRESS when invoked by gpg running in flatpak container as Resolved.
Wed, Feb 12, 11:16 AM · Linux, pinentry, gpgagent, Bug Report
werner added a comment to T7522: pinentry started with invalid DBUS_SESSION_BUS_ADDRESS when invoked by gpg running in flatpak container.

Here we go:

Wed, Feb 12, 11:15 AM · Linux, pinentry, gpgagent, Bug Report
werner closed T7520: gnupg.7.html should not ship with nroff-formatted manpages as Resolved.

Thanks.

Wed, Feb 12, 9:53 AM · Bug Report
werner added a comment to T7522: pinentry started with invalid DBUS_SESSION_BUS_ADDRESS when invoked by gpg running in flatpak container.

Alright, my above putenv option won't work because it modifies the session environment and thus needs to be run for each gpg-agent session (connection). Adding a putenv_startrup option would help here but this way each connection could chnage the environment - also not good. In the end a way to modify the used environment variables, as you suggested, is a better way.

Wed, Feb 12, 9:12 AM · Linux, pinentry, gpgagent, Bug Report

Tue, Feb 11

samoverton added a comment to T7522: pinentry started with invalid DBUS_SESSION_BUS_ADDRESS when invoked by gpg running in flatpak container.

Yes, the workaround is to use a pinentry wrapper script that sets the value back to the correct one and then invokes the real pinentry.

Tue, Feb 11, 4:52 PM · Linux, pinentry, gpgagent, Bug Report
werner changed the status of T7527: Keyring/keybox denial of service from Open to Testing.

The actual cause here was that right before storing the imported key we need to decide whether to insert or update a keyblock. For this we need to lookup the key in our database and the lookup function does the usual thing by looking at any fingerprint. This is wrong: Here we need to lookup only by primary fingerprint. This is what the above patches do.

Tue, Feb 11, 2:57 PM · OpenPGP, gnupg, Bug Report
werner triaged T7527: Keyring/keybox denial of service as High priority.

That is not a new issue. We have the very same issue since ever. However, without keyboxd you had random results depending on the order of the keys in the keyring.

Tue, Feb 11, 9:09 AM · OpenPGP, gnupg, Bug Report

Mon, Feb 10

dkg added a comment to T7527: Keyring/keybox denial of service.

To be clear about what's going on here, blocker.cert has simply adopted the primary keys of each certificate found in /usr/share/gnupg/distsigkey.gpg -- i think GnuPG requires each component key in its keystore to have a unique fingerprint across all component keys in the keystore. so when one certificate claims those fingerprints as subkeys, any certificate that has a primary key with a matching fingerprint gets rejected with doesn't match our copy.

Mon, Feb 10, 10:49 PM · OpenPGP, gnupg, Bug Report