Bugs related to gnupg's dirmngr component.
Details
Thu, Oct 31
Sep 25 2024
Sep 11 2024
Sep 9 2024
Thank you for the bug report and your patch.
Sep 8 2024
Aug 21 2024
Jun 1 2024
An update FYI
Feb 1 2024
Fixed by changing server as noted above.
Thanks for all the help @gniibe.
It should not be removed as I believe it is required to be compliant:
I'm afraid that your particular configuration would cause the problem of the negotiation.
Jan 4 2024
Note that we now have also an option instead of the workaround from 2015
Dec 11 2023
For various reasons dirmngr requires and implements a full resolver and implements that. This way all DNS queries are passed through Tor. Thus this is a feature and not a bug. The error message could be better but we can only return what SOCKS tells us.
Nov 28 2023
Sep 26 2023
Lot's of things changed in the meantime.
HKP keyservers are anyway out of fashion and thus we won't put anymore effort into his part of the code.
Lot's of changes since 2.4.
Jul 4 2023
Jun 22 2023
See for T6545 for a new request to support IDP.
Jun 15 2023
I have now disabled the rewriting in the 2.4 branch. Those who want to keep the old behaviour may add
May 3 2023
I will review the issue. A likely outcome will be to follow your suggestion but to add an option for the old behaviour to avoid further security discussions.
Apr 21 2023
Apr 19 2023
Apr 16 2023
Apr 14 2023
Apr 5 2023
Apr 3 2023
After diligently reading the code I realized that this bug has long been fixed. For reference here is the patch I wrote to extend dirmngr_ldap during my tests:
Mar 29 2023
This has been solved loooong ago.
Mar 21 2023
We need to extend dirmngr_ldap.c to take a list of attributes to return. We already have the --multi option which returns all attributes for latter filtering by the caller but the specified attr is also used and thus dirmngr's start_cacert_fetch_ldap() retruns only the requested caCertificate.
Mar 17 2023
Hello All,
Feb 27 2023
The code has meanwhile been reworked and the mentioned test server is not anymore available