Your message dated Sat, 22 Dec 2007 07:47:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#428635: fixed in gnupg2 2.0.8-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package: gnupg2
Version: 2.0.4-1
Severity: important

Hello,

Gnupg2 gives out the following error as it tries to create dsa2 keys,
that is keys with size larger than 1024 bits, even though the
enable-dsa2 was already put in $HOME/.gnupg/gpg.conf.

I know that while it is generally not advised to have dsa keys larger
than 1024 bits since they are not universally acceptable, however, it
is an option that can be enabled, and therefore should work as expected.

gpg (GnuPG) 2.0.4; Copyright (C) 2007 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.

Please select what kind of key you want:
   (1) DSA and Elgamal (default)
   (2) DSA (sign only)
   (5) RSA (sign only)
Your selection? 1
DSA keys may be between 1024 and 3072 bits long.
What keysize do you want? (1024) 3072
Requested keysize is 3072 bits
ELG keys may be between 1024 and 4096 bits long.
What keysize do you want? (2048) 4096
Requested keysize is 4096 bits
Please specify how long the key should be valid.
         0 = key does not expire
      <n>  = key expires in n days
      <n>w = key expires in n weeks
      <n>m = key expires in n months
      <n>y = key expires in n years
Key is valid for? (0) 0
Key does not expire at all
Is this correct? (y/N) y

You need a user ID to identify your key; the software constructs the
user ID
from the Real Name, Comment and Email Address in this form:
    "Heinrich Heine (Der Dichter) <[EMAIL PROTECTED]>"

Real name: woaosoaoososas
Email address: [EMAIL PROTECTED]
Comment:
You selected this USER-ID:
    "woaosoaoososas <[EMAIL PROTECTED]>"

Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O
You need a Passphrase to protect your secret key.

We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: WARNING: some OpenPGP programs can't handle a DSA key with this
digest size
gpg2: dsa.c:187: generate: Assertion `nbits >= 512 && nbits <= 1024'
failed.

Aborted


Thanks,
Huy


- --- System information. ---
Architecture: i386
Kernel: Linux 2.6.20

Debian Release: lenny/sid
990 unstable ftp.de.debian.org
500 testing security.debian.org
500 testing ftp.de.debian.org
500 stable security.debian.org
1 experimental ftp.de.debian.org

- --- Package information. ---
Depends (Version) | Installed
===============================-+-==============
libbz2-1.0 | 1.0.3-7
libc6 (>= 2.5-5) | 2.5-10
libgcrypt11 (>= 1.2.2) | 1.2.4-2
libgpg-error0 (>= 1.4) | 1.4-2
libksba8 (>= 1.0.0) | 1.0.1-2
libldap2 (>= 2.1.17-1) | 2.1.30-13.4
libreadline5 (>= 5.2) | 5.2-3
zlib1g (>= 1:1.2.1) | 1:1.2.3-15


- --
Key ID = 0xE024A6F3
Key fingerprint = C9A1 2E1E 1E10 6514 2E7D  8934 08C6 B43F E024 A6F3


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4 (GNU/Linux)
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=MZof
-----END PGP SIGNATURE-----



--- End Message ---
--- Begin Message ---
Source: gnupg2
Source-Version: 2.0.8-1

We believe that the bug you reported is fixed in the latest version of
gnupg2, which is due to be installed in the Debian FTP archive:

gnupg-agent_2.0.8-1_amd64.deb
  to pool/main/g/gnupg2/gnupg-agent_2.0.8-1_amd64.deb
gnupg2_2.0.8-1.diff.gz
  to pool/main/g/gnupg2/gnupg2_2.0.8-1.diff.gz
gnupg2_2.0.8-1.dsc
  to pool/main/g/gnupg2/gnupg2_2.0.8-1.dsc
gnupg2_2.0.8-1_amd64.deb
  to pool/main/g/gnupg2/gnupg2_2.0.8-1_amd64.deb
gnupg2_2.0.8.orig.tar.gz
  to pool/main/g/gnupg2/gnupg2_2.0.8.orig.tar.gz
gpgsm_2.0.8-1_amd64.deb
  to pool/main/g/gnupg2/gpgsm_2.0.8-1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Eric Dorland <[EMAIL PROTECTED]> (supplier of updated gnupg2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat, 22 Dec 2007 02:06:42 -0500
Source: gnupg2
Binary: gnupg2 gpgsm gnupg-agent
Architecture: source amd64
Version: 2.0.8-1
Distribution: unstable
Urgency: low
Maintainer: Eric Dorland <[EMAIL PROTECTED]>
Changed-By: Eric Dorland <[EMAIL PROTECTED]>
Description: 
 gnupg-agent - GNU privacy guard - password agent
 gnupg2     - GNU privacy guard - a free PGP replacement
 gpgsm      - GNU privacy guard - S/MIME version
Closes: 428635 456467
Changes: 
 gnupg2 (2.0.8-1) unstable; urgency=low
 .
   * New upstream release. (Closes: #428635)
   * debian/watch: Use passive ftp, ftp.gnupg.org doesn't seem happy
     otherwise. (Closes: #456467)
   * debian/control:
     - Requires libassuan >= 1.0.4 now.
     - Remove the XS- prefix from the Vcs-* headers.
     - Add Homepage header.
     - Upgrade Standards-Version to 3.7.3.0.
     - Make gnupg2 optional rather than extra.
     - Remove unnecessary conflict on suidmanager.
Files: 
 21ec723181f07b781936ecc5065239a0 970 utils optional gnupg2_2.0.8-1.dsc
 3d87a0e8fe7d1ed9b10fa94a022feab8 5118599 utils optional 
gnupg2_2.0.8.orig.tar.gz
 fc237256d900b07962b2c2a8d78f9f9b 38106 utils optional gnupg2_2.0.8-1.diff.gz
 56fb52777a92cf6a24f40d0e45155ba8 309254 utils optional 
gnupg-agent_2.0.8-1_amd64.deb
 ee36a6993cc4037f849dc8ae0cde19ad 451976 utils optional gpgsm_2.0.8-1_amd64.deb
 20d335d0e82e8bad6b0e2b265a8ae978 2120960 utils optional 
gnupg2_2.0.8-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHbL2gYemOzxbZcMYRAn22AJ92SHZ0ZWShmgVKpbEXIMlL7L87iwCeK4DL
NQXHrkiKF83F3L6zQfAeeCM=
=PHBy
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to