Bug#1058572: [pkg-gnupg-maint] Bug#1058572: Bug#1058572: gnupg2.4: fail to initialize homedir and generate key due to keyboxd

2023-12-14 Thread Werner Koch
Hi! On Fri, 15 Dec 2023 09:22, NIIBE Yutaka said: > is created. Note that keyboxd just works with systemd by socket > activation. Why do you think so. keyboxd is started on demand by gpg or gpgsm. There is no --supervised option as we still have for dirmngr and gpg-agent. In case Debian

Bug#1053531: [pkg-gnupg-maint] Bug#1053531: gnupg/gpg-agent/pinentry: timeout

2023-10-08 Thread Werner Koch
Hi Thorsten, > distracted by being asked a question, and it had terminated the > pinentry and agent, asking me for a password on stderr/tty without > pinentry, but as soon as I went to type it there, it ended up with: The second one is the usual ssh prompt in a failed ssh-agent. > IMHO the

Bug#1022702: [pkg-gnupg-maint] Bug#1022702: I volunteer to maintain GnuPG and friends in the long-term

2023-07-27 Thread Werner Koch
Hi! On Thu, 27 Jul 2023 15:24, NIIBE Yutaka said: > - ... and default keyserver choice: > debian/patches/Use-hkps-keys.openpgp.org-as-the-default-keyserver.patch FWIW, if you need to change the default, the proper location is /etc/gnupg/dirmngr.conf and not a source code patch. > - And for

Bug#980838: [pkg-gnupg-maint] Bug#980838: scdaemon

2022-02-01 Thread Werner Koch
On Mon, 31 Jan 2022 09:52, Christian Weiske said: > Jan 30 07:39:51 dojo systemd[1076614]: gpgconf: Fehler bei Ausführung > von `/usr/lib/gnupg/scdaemon': wahrscheinlich nicht installiert Put disable-scdaemon into gpg-agent.conf Salam-Shalom, Werner -- Die Gedanken sind frei.

Bug#949761: [pkg-gnupg-maint] Bug#949761: gpgconf: make socketdir configurable to users

2021-12-21 Thread Werner Koch
On Tue, 21 Dec 2021 15:17, NIIBE Yutaka said: >> gpg2 and gpg-agent (used by gnupg (1.x) as well) now uses >> GPG_AGENT_INFO=/run/user/2339/gnupg/S.gpg-agent:0:1 but >> the directory /run/user/2339 is removed on logout by elogind >> even if processes are still running. > > I happened to find a

Bug#1001331: [pkg-gnupg-maint] Bug#1001331: gpg: Provide interface to inspect (detached) signatures

2021-12-13 Thread Werner Koch
Hi! > I cannot stop using as I do not know of a publicly supported interface > to inspect a (detached) signature to get its issuer fingerprint or > keyid. You can do this: gpg --verify --status-fd 1 x.asc /dev/null 2>/dev/null \ | awk '$1=="[GNUPG:]" && $2=="BADSIG" { print $3}' which

Bug#985158: [pkg-gnupg-maint] Bug#985158: Bug#985158: Bug#985158: gpg: No longer reads .gnupg/options

2021-03-14 Thread Werner Koch
On Sun, 14 Mar 2021 14:32, Christoph Biedl said: > Point is, the legacy file ~/.gnupg/options is still being used in > surprisingly many applications, also in documentation: Then please file a bug against such documentation. And maybe even against any application which read the option filre

Bug#985158: [pkg-gnupg-maint] Bug#985158: gpg: No longer reads .gnupg/options

2021-03-14 Thread Werner Koch
On Sat, 13 Mar 2021 20:40, Kurt Roeckx said: > It seems that the config file ~/.gnupg/options is no longer read, > and it's now reading (among others) ~/.gnupg/gpg.conf Oops. I totally forgot about this this legacy file. The reason for this is that we switched to a new option parser which also

Bug#980768: [pkg-gnupg-maint] Bug#980768: gnupg2: reduce Build-Depends

2021-01-22 Thread Werner Koch
> * libcurl4-gnutls-dev is unused. While curl is mentioned in source >comments and checked for in configure, it is never actually used. You mean GnuPG's configure? I can't find it. It was tested for in GnuPG 1 and 2.0 but not anymore since 2.1. I am just a curious upstream.

Bug#979412: [pkg-gnupg-maint] Bug#979412: pinentry: "--lc-type" in manapges is typo for "--lc-ctype"

2021-01-06 Thread Werner Koch
FWIW, that was fixed 11 years ago in upstream (commit 971962116fba3769d8260b5016f93c6f9ebf083f) -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.

Bug#978630: [pkg-gnupg-maint] Bug#978630: Bug#978630: gnupg: --check-sigs trusts weak digest alg if weak digest was trusted when importing key

2020-12-29 Thread Werner Koch
It gets cached if it has been checked. There are some pre-conditions for this for example the existance of the corresponding public key.

Bug#978630: [pkg-gnupg-maint] Bug#978630: gnupg: --check-sigs trusts weak digest alg if weak digest was trusted when importing key

2020-12-29 Thread Werner Koch
Hi! gpg caches key signature verification results. Use --no-sig-cache to disable this cache. Shalom-Salam, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. signature.asc Description: PGP signature

Bug#977909: [pkg-gnupg-maint] Bug#977909: Bug#977909: gnupg: `--trust-model always` doesn't trust keys

2020-12-23 Thread Werner Koch
On Tue, 22 Dec 2020 22:41, Ansgar said: > The warning is incorrect as GnuPG was told that the key is trusted. The warning is there for a reasons and it will not be changed. >> I am not sure what python3-gpg is. > > The official Python bindings for GPGME. Sorry, I did not knew Debian's package

Bug#977909: [pkg-gnupg-maint] Bug#977909: gnupg: `--trust-model always` doesn't trust keys

2020-12-22 Thread Werner Koch
> The output then contains: > > | gpg: WARNING: Using untrusted key! Look here: if (opt.trust_model == TM_ALWAYS) { if (!opt.quiet) log_info(_("WARNING: Using untrusted key!\n")); It is just a warning - use --quiet to silence this warning. > If I try to use python3-gpg to

Bug#951025: [pkg-gnupg-maint] Bug#951025: gnupg: GPG tries to get passphrase from wrong place

2020-02-09 Thread Werner Koch
> my passphrase on my desktop XFCE session. However, I am not at that > computer, so I cannot provide it with a passphrase. After having logged into the other box with ssh -X, run in that ssh session: gpg-connect-agent updatestartuptty /bye This tells gpg-agent on which DISPLAY or tty it

Bug#945279: [pkg-gnupg-maint] Bug#945279: gpg-wks-client: --install-key does not create policy file

2019-11-22 Thread Werner Koch
On Fri, 22 Nov 2019 11:36, Hans-Christoph Steiner said: > It should create a zero length file, as recommended in the draft: "it > is sufficient if that file has a zero length". Good idea. Tracked upstream as https://dev.gnupg.org/T4753 Shalom-Salam, Werner -- Die Gedanken sind frei.

Bug#944914: [pkg-gnupg-maint] Bug#944914: libgpgme11: Buffer overflow while using claws-mail

2019-11-19 Thread Werner Koch
On Tue, 19 Nov 2019 14:50, Bernhard Übelacker said: > Maybe it is of some help, following seem to be locations with the > missing symbols: > ... > #8 0xb6441a7a in __fdelt_chk (d=194142480) at fdelt_chk.c:25 > #9 0xb27e5281 in () at libgpgme.so.11, in _gpgme_io_select at This is the

Bug#942127: [pkg-gnupg-maint] Bug#942127: bugs in the FILTER EXPRESSIONS section of the gpg man page

2019-10-12 Thread Werner Koch
On Thu, 10 Oct 2019 18:42, Steve McIntyre said: > Looks like a simple cut and paste / completion error. Now fixed upstream. Thanks for reporting. Shalom-Salam, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. signature.asc Description: PGP signature

Bug#939508: [pkg-gnupg-maint] Bug#939508: scdaemon: scdaemon does not share access with pcscd used by opensc

2019-09-05 Thread Werner Koch
On Thu, 5 Sep 2019 13:05, robert.grizz...@quoininc.com said: > I am attempting to use both the gpg and PIV functionaity of a Yubikey 5 > device, but scdaemon takes exclusive access. This is the intended behavior FWIW: GnuPG master has dedicated support for Yubikeys and since today allows

Bug#931339: [pkg-gnupg-maint] Bug#931339: gnupg: Change default keyserver?

2019-07-03 Thread Werner Koch
On Tue, 2 Jul 2019 15:55, guil...@debian.org said: > According to the dirmngr(8) man page, the default built-in server is > «hkps://hkps.pool.sks-keyservers.net». Given the recent attacks, and Not from upstream. We have a default keyserver because that is (or better was) a pool of keyservers

Bug#931340: dirmngr goes into endless loop if keyserver responses with http error 503

2019-07-03 Thread Werner Koch
Hi, this bug was reported on Monday as https://dev.gnupg.org/T4600 Salam-Shalom, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. signature.asc Description: PGP signature

Bug#923204: [pkg-gnupg-maint] Bug#923204: gpg-agent has a false dependency on libpam-systemd

2019-02-25 Thread Werner Koch
On Sun, 24 Feb 2019 16:56, joshud...@gmail.com said: > gpg-agent --server or directly from .profile (ssh sessions) by > gpg-agent --daemon. FWIW, actually gpg-agent is started on-demand from all tools requiring it. To explicitly start it "gpgconf --launch agent" can and should be used.

Bug#914395: [pkg-gnupg-maint] Bug#914395: dirmngr log

2018-11-25 Thread Werner Koch
On Sun, 25 Nov 2018 22:22, csm...@debian.org said: > It seems it needs the SRV record and fails wrong without it. > Checking on the same system looking up that SRV record I get the > expected NXDOMAIN error. That seems to be a Debian specific problem; with a dirmngr started by the gpg command, I

Bug#914395: [pkg-gnupg-maint] Bug#914395: Acknowledgement (gpg recv-key fails with no route to host)

2018-11-23 Thread Werner Koch
On Fri, 23 Nov 2018 00:23, csm...@debian.org said: > It appears dirmngr tries to lookup a SRV record and that's the no route to > host error. Please put this into ~/.gnupg/dirmngr.conf --8<---cut here---start->8--- log-file /whatever verbose debug

Bug#913614: [pkg-gnupg-maint] Bug#913614: Bug#913614: gnupg2 fails with "cannot open '/dev/tty': No such device or address"

2018-11-14 Thread Werner Koch
On Tue, 13 Nov 2018 16:19, tia...@debian.org said: > Even for something that shouldn't have a reason to prompt, like > "--recv-keys" with a full fingerprint? You are right, this should not be needed. I recall that we recently fixed a similar case where we accidentally printed to the tty. In

Bug#913614: [pkg-gnupg-maint] Bug#913614: gnupg2 fails with "cannot open '/dev/tty': No such device or address"

2018-11-13 Thread Werner Koch
On Tue, 13 Nov 2018 14:18, be...@debian.org said: > Passing "--no-tty" to gpg works around this issue. For any script use you should anyway use --batch which disables the use of the tty as a side-effect. Shalom-Salam, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.

Bug#643341: [pkg-gnupg-maint] Bug#643341: Bug#643341: libgpg-error-dev: cross-compiling anything based on libgpg-error is painful

2018-10-16 Thread Werner Koch
On Tue, 16 Oct 2018 09:51, s...@debian.org said: > However, none of this solves co-installability in Debian: > libgpg-error-dev:amd64 and libgpg-error-dev:armhf can't be > installed at the same time, because they have different content in > /usr/bin/gpg-error-config, and that will be a problem

Bug#909693: [pkg-gnupg-maint] Bug#909693: gpgsm: seems to be dead slow when verifying pkcs7-signatures from within Sylpheed

2018-09-28 Thread Werner Koch
On Fri, 28 Sep 2018 00:57, invernom...@paranoici.org said: > It's clear that the CRL revocation check is the step that takes a long > time. Right. And it depends on the certificate issuer and how they maintain CRLs. If they release CRLs only once a week, things should be okay becuase GnuPG

Bug#909693: [pkg-gnupg-maint] Bug#909693: gpgsm: seems to be dead slow when verifying pkcs7-signatures from within Sylpheed

2018-09-27 Thread Werner Koch
On Wed, 26 Sep 2018 22:44, invernom...@paranoici.org said: > While verifying an OpenPGP signature with gpg is definitely fast, > verifying a pkcs7-signature with gpgsm is super slow. Sure that it is the verification and not the CRL or OCSP revocation check? It dependes on the issuer of the

Bug#907810: [pkg-gnupg-maint] Bug#907810: gpg --no-verbose --verify is too verbose

2018-09-03 Thread Werner Koch
On Mon, 3 Sep 2018 12:52, vinc...@vinc17.net said: > So, do you mean that it is a bug in Mutt, which doesn't filter them > out? Yes, if you don't want to see them. IIRC, tlr once used a wrapper process to invoke the actual tool. I have not used the direct invocation for 15 years. Anyway it

Bug#907810: [pkg-gnupg-maint] Bug#907810: gpg --no-verbose --verify is too verbose

2018-09-03 Thread Werner Koch
On Sun, 2 Sep 2018 15:18, vinc...@vinc17.net said: > outputs many [GNUPG:] debugging messages, partly hiding useful output. These ain't no debugging messages but the required information for any program or script to interact with gpg. You have requested them using the --status-fd option.

Bug#901498: [pkg-gnupg-maint] Bug#901498: FTBFS on stretch, needs newer libgpg-error

2018-06-14 Thread Werner Koch
pg.org/T4012 Salam-Shalom, Werner -- # Please read: Daniel Ellsberg - The Doomsday Machine # Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. From 18274db32b5dea7fe8db67043a787578c975de4d Mon Sep 17 00:00:00 2001 From: Werner Koch Date: Fri, 8 Jun 2018 22:01:10 +0200 Subject:

Bug#900247: [pkg-gnupg-maint] Bug#900247: gpg-check-pattern.1: Some formatting changes in the manual

2018-06-05 Thread Werner Koch
Hi! The man pages for gnupg are generated from texinfo source using the yat2m tool. This is part of GnuPG but we are in the progress of moving it to libgpg-error (which is a common dependency of all GnuPG stuff). Thus it would would be better to assign this bug to libgpg-error and bonus points

Bug#894983: gnupg2: CVE-2018-9234: Able to certify public keys without a certify key present when using smartcard

2018-04-06 Thread Werner Koch
On Thu, 5 Apr 2018 22:49, car...@debian.org said: > CVE-2018-9234[0]: > | GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key > | certification requires an offline master Certify key, which results in > | apparently valid certifications that occurred only with access to a > |

Bug#891931: [pkg-gnupg-maint] Bug#891931: Bug#891931: gnupg: semantic change of the package to a meta-package results in upgrade bloat

2018-03-04 Thread Werner Koch
On Sun, 4 Mar 2018 16:23, d...@fifthhorseman.net said: > the binary, "gnupg" refer to "gpg" plus the traditional "gpg-agent" and > "dirmngr", and then some complete "gnupg-all" wihch depends on You need to include at least gpgconf because this is an important tool. Not only for gpgme (which

Bug#889594: [pkg-gnupg-maint] Bug#889594: dgit started to fails its autopkgtests, with git gnupg2/2.2.4-1+

2018-02-06 Thread Werner Koch
On Mon, 5 Feb 2018 13:48, ijack...@chiark.greenend.org.uk said: > gnupg2's agent startup code is full of races. Probably, the new I have seen no such bug report yet in upstream. Please submit one but use the upstream version and not the heavily patched Debian version. First try with the the

Bug#884517: [pkg-gnupg-maint] Bug#884517: Grab option should be reverted as enabled by default

2017-12-18 Thread Werner Koch
On Sat, 16 Dec 2017 09:34, ber...@debian.org said: > passphrase by default. I didn't find any rationale behind this change. See: > https://github.com/gpg/gnupg/commit/3d78ae4d3de08398fabae5821045a3a1da6dadbe [ Please dont reference an arbirary repo mirror of gnupg. Either use the Debian repo

Bug#872368: gpgme: please adjust libgpgme11 dependency on gnupg package

2017-11-30 Thread Werner Koch
On Wed, 29 Nov 2017 23:56, d...@fifthhorseman.net said: > libgpgme provides *no functionality* whatsoever if gpg is not installed. That is not fully correct. For example in the Outlook plugin we used to use gpgme just to provide data objects with callback functionality and to connect to the

Bug#882985: [pkg-gnupg-maint] Bug#882985: gcrypt: libgcrypt should use all memory pools for all secure allocations

2017-11-28 Thread Werner Koch
On Tue, 28 Nov 2017 12:08, amul.s...@fisglobal.com said: > libgcrypt 1.8.1 contains the needed fixes and is compatile with GnuPG Actually libgcrypt 1.8.2 will contain those fixes. Right now they are only in the Git repo. I can release 1.8.2 on short notice. Salam-Shalom, Werner -- Die

Bug#872368: gpgme: please adjust libgpgme11 dependency on gnupg package

2017-11-28 Thread Werner Koch
On Tue, 28 Nov 2017 00:49, d...@fifthhorseman.net said: > The fact is, libgpgme explicitly fails in many use cases if gpg-agent or > dirmngr are not available. This partial, unpredictable failure is not It should return an error like No Agent, No Dirmngr, or No Pinentry. If not that is a bug

Bug#882736: [pkg-gnupg-maint] Bug#882736: gpg-agent: does not always use same socketdir

2017-11-27 Thread Werner Koch
On Mon, 27 Nov 2017 18:24, ans...@debian.org said: >> this is a deliberate choice by upstream. > > Yes, I saw it in the source :-/ There is a clear reason for this. In the past we had lot of troubles with too freely configurable socket names and file systems which don't support local sockets.

Bug#872368: [pkg-gnupg-maint] Bug#872368: gpgme: please adjust libgpgme11 dependency on gnupg package

2017-11-26 Thread Werner Koch
On Thu, 23 Nov 2017 13:48, linkfa...@yahoo.fr said: > Many mutt users do not do any secret key operation. I think those who > do need to create or setup a private key first - and probably put some To foster the use of end to end encryption we should get away from the need to install plugins.

Bug#876144: [pkg-gnupg-maint] Bug#876144: lists.debian.org: Request for new mailing list: pkg-gnupg-maint

2017-09-19 Thread Werner Koch
On Tue, 19 Sep 2017 00:52, d...@fifthhorseman.net said: > If other members of pkg-gnupg-maint could follow up on this bug to > state intent to participate, that would be great. The mix of Debian bugs related to gnupg and discussion on the packing or use is for me, as upstream author, not perfect

Bug#874721: [pkg-gnupg-maint] Bug#874721: gnupg: the option --debug-quick-random seems to be ignored

2017-09-09 Thread Werner Koch
> With gnupg 1.4 the corresponding option --quick-random had the desidered > effect, but since the move gnupg 2.1 this seems to be ignored, to the Your problem is that the keys are generated by gpg-agent. Thus you would need to use --debug-quick-random in gpg-agent.conf. However, this is not

Bug#874304: [pkg-gnupg-maint] Bug#874304: gpg: --refresh-keys became extremely verbose and complaining

2017-09-08 Thread Werner Koch
On Wed, 6 Sep 2017 22:21, invernom...@paranoici.org said: > In the meantime, dear Werner, is there any additional information > I could provide to help you in pinpointing the bug? No, this is pretty obvious. Although I would not call it a bug ;-) Salam-Shalom, Werner -- Die Gedanken

Bug#874304: [pkg-gnupg-maint] Bug#874304: gpg: --refresh-keys became extremely verbose and complaining

2017-09-06 Thread Werner Koch
> but I get the same ultra-lengthy output. Okay, so the issue is a different one. I did not replicate it but looked for chnages which could have introduced it. > Once again, the --no-verbose option does not seem to help, while the -q > option seems to only suppress the old (useful) output,

Bug#874304: [pkg-gnupg-maint] Bug#874304: gpg: --refresh-keys became extremely verbose and complaining

2017-09-05 Thread Werner Koch
On Mon, 4 Sep 2017 22:34, invernom...@paranoici.org said: > The output seems to be (more or less) the old output of > "gpg --refresh-keys $KEYID", combined with the output of > "gpg --check-sigs $KEYID". That is likley due to * gpg: By default try to repair keys during import. New

Bug#868550: [pkg-gnupg-maint] Bug#868550: Bug#868550: reprepro seems to provide a repro

2017-08-24 Thread Werner Koch
On Thu, 24 Aug 2017 22:08, ijack...@chiark.greenend.org.uk said: > I have a log generated by this > log-file /home/ian/things/Dgit/dgit/tests/tmp/gnupg/gnupg/AGENT.log > in gpg-agent.conf but due to an infelicitly in my arrangments all of Use log-file

Bug#867268: [pkg-gnupg-maint] Bug#867268: dirmngr: Can't set nameserver port

2017-07-06 Thread Werner Koch
On Wed, 5 Jul 2017 12:43, he...@debian.org said: > and I actually wants to make sure that gnupg is using dns over tor. FWIW, --use-tor forces the use of Tor for DNS lookups. This does not use the limited Tor features for DNS but by default uses the DNS server 8.8.8.8. If you want to use

Bug#866964: Fwd: mpi_set_secure leads to heap corruption

2017-07-04 Thread Werner Koch
On Tue, 4 Jul 2017 03:05, gni...@fsij.org said: > Yes. While the patch is right, I followed the suggestion for less > surprise. The reason why it was falsely allocated as nlimbs is likely to save on secure memory. Now that we auto-grow the secure memory this is not needed and thus this simple

Bug#835394: [pkg-gnupg-maint] Bug#835394: gnupg-agent: gpg agent refusing ssh agent work

2017-06-22 Thread Werner Koch
On Tue, 20 Jun 2017 07:09, raphael.d...@gmail.com said: > $ eval $(gpg-agent --enable-ssh-support) Please don't do that anymore. SSH_AUTH_SOCK="$(gpgconf --list-dirs agent-ssh-socket)" export SSH_AUTH_SOCK is the way to go. > automatically provides two of my keys. ssh-add -D does not seem

Bug#864788: [pkg-gnupg-maint] Bug#864788: Bug#864788: cache TTL values ignored for smartcard PINs

2017-06-15 Thread Werner Koch
On Thu, 15 Jun 2017 17:43, d...@fifthhorseman.net said: > I believe that killing gpg-agent kills scdaemon, which de-initializes > the smartcard on shutdown, which takes it out of authenticated mode. Right the smartcard is power-cycled and thus it clears all its transient state. > on whether

Bug#863221: [pkg-gnupg-maint] Bug#863221: Bug#863221: Bug#863221: dirmngr doesn't reload resolv.conf

2017-05-25 Thread Werner Koch
Okay froods, https://dev.gnupg.org/rGb5f356e9fba2d99909f8f54d7b7e6836bed87b68 Shalom-Salam, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. pgpkuq5DgyTJT.pgp Description: PGP signature

Bug#863221: [pkg-gnupg-maint] Bug#863221: Bug#863221: dirmngr doesn't reload resolv.conf

2017-05-25 Thread Werner Koch
On Wed, 24 May 2017 23:36, d...@fifthhorseman.net said: > full dirmngr flush on every network change -- in particular, that would > mean that every time we join the network, we would be more likely to > announce to the network about the various CRLs and keyservers that we're Good point. That

Bug#863221: [pkg-gnupg-maint] Bug#863221: dirmngr doesn't reload resolv.conf

2017-05-24 Thread Werner Koch
Hi! When you switch the laptop connection you should flush dirmngr anyway and thus I do not consider the need to do this just for the resolver. gpgconf --reload dirmngr in the ifup script should do that job. Note that gpgconf won't start a component on --reload or --kill if it is not yet

Bug#860745: [pkg-gnupg-maint] Bug#860745: Please suggest a fix for "server $SOMETHING is older than us" message

2017-04-28 Thread Werner Koch
On Tue, 25 Apr 2017 22:31, d...@fifthhorseman.net said: > Do you recommend terminating all per-user gpg-agent and dirmngr > instances upon package upgrade? This would be a significant change from I can't decide this. What I do if something goes wrong after an update is to look into the

Bug#860745: [pkg-gnupg-maint] Bug#860745: Please suggest a fix for "server $SOMETHING is older than us" message

2017-04-23 Thread Werner Koch
On Sun, 23 Apr 2017 11:09, enr...@debian.org said: > Technically it sounds like the right thing. I had no idea I could get > hints with --verbose, though, so I wouldn't have seen it. Isn't it the first thing with Unix tools to add -v when you wonder what is going on ;-). > Could gpg tell

Bug#860745: [pkg-gnupg-maint] Bug#860745: Please suggest a fix for "server $SOMETHING is older than us" message

2017-04-21 Thread Werner Koch
On Wed, 19 Apr 2017 18:53, d...@fifthhorseman.net said: > I wouldn't want to encourage people to restart the daemons -- i'd rather > encourage them to terminate them and let the new versions be restarted Right. > gpg: WARNING: server 'dirmngr' is older than us (2.1.17 < 2.1.18). Run >

Bug#568375: [pkg-gnupg-maint] Bug#568375: Bug#568375: gnupg-agent: does not work with `git tag -s`

2017-02-16 Thread Werner Koch
On Wed, 15 Feb 2017 20:52, d...@fifthhorseman.net said: > However, this will cause problems for people dealing with a smartcard > with a PGPv3 key on it. I doubt that you can put a PGP-2 key on an OpenPGP smartcard. We require a SHA-1 fingerprint. > hm, bummer. a configure option to keep the

Bug#568375: [pkg-gnupg-maint] Bug#568375: Bug#568375: gnupg-agent: does not work with `git tag -s`

2017-02-15 Thread Werner Koch
On Wed, 15 Feb 2017 16:23, d...@fifthhorseman.net said: > should we adjust the build of 1.4 in debian to patch out the direct > access of smartcards? if we use --disable-card-support during > ./configure will that disable use of the agent for smartcards as well, > or will it just remove the

Bug#568375: [pkg-gnupg-maint] Bug#568375: Bug#568375: gnupg-agent: does not work with `git tag -s`

2017-02-15 Thread Werner Koch
On Tue, 14 Feb 2017 00:55, d...@fifthhorseman.net said: > * gpg 1.4 expects to connect directly to the active smartcard. 2.1 >expects access to the smartcard to be mediated by the scdaemon >process. I don't know what happens if both of these systems try to >access a single

Bug#703062: [pkg-gnupg-maint] Bug#703062: please add udev rules for cardman 4040

2017-02-14 Thread Werner Koch
On Tue, 14 Feb 2017 06:47, gni...@fsij.org said: > If you still have the device, please let me know if it works. I'm I have a device but no pcmcia/pc-card slot on regular used machines. > afraid it's too old to support current version of OpenPGP card with > RSA key length >= 2048. Yep, that

Bug#854005: [pkg-gnupg-maint] Bug#854005: Bug#854005: ssh-agent no longer works

2017-02-07 Thread Werner Koch
On Mon, 6 Feb 2017 07:04, gni...@fsij.org said: > simultaneously/interchangeably on a system. scdaemon is not a system- > wide service for all smartcards, but it's specific to OpenPGP card and > it's per user service for gpg-agent. FWIW: Scdaemon supports several smartcards and certain other

Bug#854038: [pkg-gnupg-maint] Bug#854038: [gnupg] --sender option seems not to be respected when verifying

2017-02-03 Thread Werner Koch
On Fri, 3 Feb 2017 11:47, ktns...@gmail.com said: > gpg(1) reads that `--sender' option can be used to suppress some uids > printed by TOFU code when verifying messages, but the option seems to > have no effect. It does not do much right now but we have it here so that GPGME can provide it.

Bug#851707: [pkg-gnupg-maint] Bug#851707: pinentry-gtk-2 frequently fails to grab the keyboard under awesome

2017-02-03 Thread Werner Koch
mit b0e0bdeac5d40ca645afc9017778b39a26303523 Author: Werner Koch <w...@gnupg.org> Date: Wed Jan 11 18:40:17 2017 +0100 gtk2: Fix a problem with fvwm * gtk+-2/pinentry-gtk-2.c (grab_pointer): Take care of GDK_GRAB_ALREADY_GRABBED. -- Debian-bug-id: 850708 Co-authored-by

Bug#850269: [pkg-gnupg-maint] Bug#850269: gpgme1.0: FTBFS randomly (not enough entropy)

2017-02-02 Thread Werner Koch
On Tue, 24 Jan 2017 01:45, d...@fifthhorseman.net said: > to drive gpg, though. I think we do still need that test in gpgme, just > like we'd need a higher-level test for a mail user agent that was Agreed. Upstream commit a98951a * tests: Use --debug-quick-random for tests will go into

Bug#853935: [pkg-gnupg-maint] Bug#853935: rephrase: No more works with gpg2 and causes one pinentry popup per guess

2017-02-02 Thread Werner Koch
On Thu, 2 Feb 2017 11:37, a...@debian.org said: > Trying to use it on Sid or Stretch causes one pinentry window popup per > guessed try (i.e. potentially thousands). And since pinentry usually I don't know rephase but according to the description it should not use gpg to test the passphrase.

Bug#851298: [pkg-gnupg-maint] Bug#851298: 10 second delay on first ssh use (sleeps in agent_libgcrypt_progress_cb)

2017-01-16 Thread Werner Koch
On Fri, 13 Jan 2017 20:02, wea...@debian.org said: > I suspect the callback shouldn't try to sleep if the entropy is being > read from a non-blocking source, or maybe the callback shouldn't be The sleeping is done to reqlinguish control to other threads. Libgcrypt 1.7 unfortunately needs to

Bug#850708: [pkg-gnupg-maint] Bug#850708: Bug#850708: gpg: decryption failed: No secret key

2017-01-11 Thread Werner Koch
1d8770 Mon Sep 17 00:00:00 2001 From: Werner Koch <w...@gnupg.org> Date: Wed, 11 Jan 2017 18:40:17 +0100 Subject: [PATCH] gtk2: Fix a problem with fvwm * gtk+-2/pinentry-gtk-2.c (grab_pointer): Take care of GDK_GRAB_ALREADY_GRABBED. -- Debian-bug-id: 850708 Co-authored-by: Vincent L

Bug#850475: [PATCH] common: Avoid unnecessary ambiguity in argparse.

2017-01-10 Thread Werner Koch
On Tue, 10 Jan 2017 22:16, d...@fifthhorseman.net said: > If two struct ARGPARSE_OPTS share a prefix in their long_opt name, but > have the exact same short_opt and flags, they are aliases and not Smart. Please push with the usual two dashes before the free form text. Salam-Shalom, Werner

Bug#850656: [pkg-gnupg-maint] Bug#850656: gnupg-agent: Please allow config to specify fast RNG

2017-01-09 Thread Werner Koch
On Sun, 8 Jan 2017 23:32, ijack...@chiark.greenend.org.uk said: > dgit test suite. But I have to jump through hoops to do so: I end up > putting a stunt gpg program on the PATH so that I can pass > --agent-program. Obviously we had the same problem in the test suite and thus we implemented an

Bug#841143: [pkg-gnupg-maint] Bug#841143: Suspected race in gpg1 to gpg2 conversion or agent startup

2017-01-08 Thread Werner Koch
On Sun, 8 Jan 2017 18:47, ijack...@chiark.greenend.org.uk said: > follow, but I am still stumped as to get debugging output from > gpg-agent. I tried making a stunt shell script to pass --debug-all The best way to debug the system is to --8<---cut

Bug#841143: False assumptions about nPth (was: Bug#841143: Suspected race in gpg1 to gpg2 conversion or agent startup [and 1 more messages])

2017-01-08 Thread Werner Koch
On Sun, 8 Jan 2017 23:46, ijack...@chiark.greenend.org.uk said: > gpg-agent is AIUI the main program which handles key material. We > cannot afford for it to be afflicted by threading bugs. Please point out a single threading bug in gpg-agent or any other part of GnuPG. But before you point

Bug#848999: [pkg-gnupg-maint] Bug#848999: pinentry-gtk2: Fails to work, appears as gpg-agent not working

2017-01-08 Thread Werner Koch
Hi! I have no insight on why pinentry fails for you. As a workaround you may try "no-grab" in gpg-agent.conf Salam-Shalom, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. pgpUjYl93f_Mz.pgp Description: PGP signature

Bug#850475: [pkg-gnupg-maint] Bug#850475: Addition of --clear-sign alias breaks --clear

2017-01-08 Thread Werner Koch
On Fri, 6 Jan 2017 21:54, wea...@debian.org said: > So for decades "gpg --clear" has worked as shorthand for "gpg > --clearsign". Same for --edit, which is now --edit-key or --edit-card. The abbreviated commands are convenience for interactive use and not expected to be used in scripts etc.

Bug#841143: [pkg-gnupg-maint] Bug#841143: gnupg2 races and hangs

2017-01-05 Thread Werner Koch
On Thu, 5 Jan 2017 18:25, ijack...@chiark.greenend.org.uk said: > I also tried to look at the gnupg2 source code. After reading it I > was not surprised the agent startup is racy, and I was very > discouraged from trying to debug it. Is there a design document or > comment somewhere which I

Bug#849845: [pkg-gnupg-maint] Bug#849845: Bug#849845: dirmngr: Can't resolve keyserver hostname anymore

2017-01-02 Thread Werner Koch
On Mon, 2 Jan 2017 13:46, intrig...@debian.org said: > ... which is expected if querying 127.0.0.1, that doesn't support > SRV records. The question is whether we should gracefully handle this failure and return 0 records found (as done < 2.1.17)? > Jan 02 13:37:57 dirmngr[8281]: DBG: dns:

Bug#849845: [pkg-gnupg-maint] Bug#849845: dirmngr: Can't resolve keyserver hostname anymore

2017-01-02 Thread Werner Koch
Hi! The attached patch fixes this problem. Salam-Shalom, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. From b200e636ab20d2aa93d9f71f3789db5a04af0a56 Mon Sep 17 00:00:00 2001 From: Werner Koch <w...@gnupg.org> Date: Mon, 2 Jan 2017 10:00:33 +0100 Subject:

Bug#848951: [pkg-gnupg-maint] Bug#848951: gnupg: Utilize multiple cores on CPU for encryption and decryption (and compression)

2016-12-21 Thread Werner Koch
On Wed, 21 Dec 2016 17:47, witold.bary...@gmail.com said: > Everybody know CTR is easy to parallelize and easy to understand implement, CTR is a reincarnation of RC4 - bug wise. Nobody with a sane mind wants a counter mode. It is also not an AE mode and thus nothing to be used for new

Bug#848951: [pkg-gnupg-maint] Bug#848951: gnupg: Utilize multiple cores on CPU for encryption and decryption (and compression)

2016-12-21 Thread Werner Koch
On Wed, 21 Dec 2016 14:33, boyan.pen...@gmail.com said: > Is this straighforward? What changes should I make to gpg.conf to give > this a shot? You need to convince the OpenPGP WG that OCB is the way forward. The prefer other and slower modes due to patents on PCB. However, these patents are

Bug#848951: [pkg-gnupg-maint] Bug#848951: gnupg: Utilize multiple cores on CPU for encryption and decryption (and compression)

2016-12-21 Thread Werner Koch
On Wed, 21 Dec 2016 06:57, witold.bary...@gmail.com said: > Using cipher and compression algorithms that can utilize multiple cores It is not possible to parallelize encryption using the CFB mode as required by OpenPGP. In theory it would be possible to run the hashing (which is also run on the

Bug#847552: [pkg-gnupg-maint] Bug#847552: gnupg: decrypting after X pinentry is sometimes slow: around 10 seconds on a small file

2016-12-18 Thread Werner Koch
On Sun, 18 Dec 2016 19:34, vinc...@vinc17.net said: > Couldn't it cache the RNG status on disk? That is whqt random_seed is used for. However we need to get a few extra bytes. Salam-Shalom, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. pgpypmNt6hVtW.pgp

Bug#847552: [pkg-gnupg-maint] Bug#847552: gnupg: decrypting after X pinentry is sometimes slow: around 10 seconds on a small file

2016-12-18 Thread Werner Koch
On Sun, 18 Dec 2016 17:00, jspri...@debian.org said: > which led me to this patch: This is agent: Kludge to mitigate blocking calls in Libgcrypt. * agent/gpg-agent.c (agent_libgcrypt_progress_cb): Sleep for 100ms on "need_entropy". -- During key generation Libgrypt

Bug#847552: [pkg-gnupg-maint] Bug#847552: gnupg: decrypting after X pinentry is sometimes slow: around 10 seconds on a small file

2016-12-09 Thread Werner Koch
On Fri, 9 Dec 2016 13:04, vinc...@vinc17.net said: > $ gpg -d note.gpg > gpg: AES encrypted data > gpg: cancelled by user "cancelled" was unfortunately a catch-all error of pinentries. > Note: I got this error immediately, and no windows are opened. > > A few minutes later, everything was

Bug#847552: [pkg-gnupg-maint] Bug#847552: gnupg: decrypting after X pinentry is sometimes slow: around 10 seconds on a small file

2016-12-09 Thread Werner Koch
Can you please try to switch to pinentry-gtk-2 to see whether this makes a difference? Either change the symlink or put pinentry-program /usr/bin/pinentry-gtk-2 into gpg-agent.conf and gpgconf --reload gpg-agent Shalom-Salam, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein

Bug#847206: [pkg-gnupg-maint] Bug#847206: Bug#847206: gpg-agent: can't connect to the agent: File name too long

2016-12-06 Thread Werner Koch
On Tue, 6 Dec 2016 19:07, d...@fifthhorseman.net said: > You could work around it by creating a gnupg_home dir for your tests at > the top level of your build tree, and it would fit within the requisite Sandro: Assuming 2.1, you can also do this: GNUPGHOME= export GNUPGHOME gpgconf

Bug#846834: [pkg-gnupg-maint] Bug#846834: gnupg: ERRSIG rc codes are no longer correct (breaks 0install)

2016-12-03 Thread Werner Koch
bly the fastest fix. I also pushed a commit with the real fix: commit ef10c348bffc7dad19e1832bebc453755d209420 Author: Werner Koch <w...@gnupg.org> Date: Sat Dec 3 21:35:45 2016 +0100 gpg: Fix error code arg in ERRSIG status line. * g10/mainproc.c (check_sig_and_print): Use gpg

Bug#846175: [pkg-gnupg-maint] Bug#846175: gnupg-agent: Cannot use/delete ssh keys w/ empty passphrase

2016-11-29 Thread Werner Koch
On Tue, 29 Nov 2016 14:49, matth...@urlichs.de said: > When in doubt, do both? No. As I explained the key might be in use by other tools not just ssh. Tracking which key has been ssh-add'ed which has been taken from a different source would be pretty complicated. > In any case, if it's been

Bug#846175: [pkg-gnupg-maint] Bug#846175: gnupg-agent: Cannot use/delete ssh keys w/ empty passphrase

2016-11-29 Thread Werner Koch
On Tue, 29 Nov 2016 00:20, matth...@urlichs.de said: > I can't delete them; "ssh-add -d path/to/file-pub" silently fails. > So does "ssh-add -D". gpg-agent does not support this because it stores the key in its own database. As you may have noticed ss-add is only required once to tell gpg-agent

Bug#842291: [pkg-gnupg-maint] Bug#842291: notmuch processes frequently stuck in select()

2016-11-25 Thread Werner Koch
On Wed, 23 Nov 2016 18:19, d...@fifthhorseman.net said: > 0) turn off CRL updates entirely during s/mime signature verification The gpgsm option is --disable-crl-checks. > 1) do s/mime signature verification without CRL updates, but schedule > CRL checks to happen in the background for

Bug#845078: [pkg-gnupg-maint] Bug#845078: Links against libadns1 with limited security support

2016-11-21 Thread Werner Koch
On Sun, 20 Nov 2016 10:03, a...@sigxcpu.org said: > libadns1 has limited security support in Debian so I wonder if this is a > good choice for dirmngr. Please consider using another resolver by Due to the unresponsive ADNS upstream maintainer, we are evaluating other options than ADNS. We have

Bug#844117: [pkg-gnupg-maint] Bug#844117: gnupg locks up until straced

2016-11-12 Thread Werner Koch
On Sat, 12 Nov 2016 17:45, ijack...@chiark.greenend.org.uk said: > I just tried to use caff. I found that it seemed to hang, every > time. I tried debugging it with strace. Put --8<---cut here---start->8--- log-file /wherever/dirmngr.log verbose debug ipc

Bug#844084: [pkg-gnupg-maint] Bug#844084: gnupg: typo in man page

2016-11-12 Thread Werner Koch
Hi, that was already fixed in the repo by Ineiev and committed in September. Will go into 2.1.16. Thanks, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. pgpSWVoU0Icly.pgp Description: PGP signature

Bug#806940: [pkg-gnupg-maint] Bug#806940: Bug#806940: gpgv-static possible?

2016-11-10 Thread Werner Koch
On Wed, 9 Nov 2016 14:48, d...@fifthhorseman.net said: > So looking at get_pwdir in common/stringhelp.c, all of those calls are > inside the get_pwdir function, wrapped in an #ifdef HAVE_PWD_H. This > code is used for tilde(~) expansion inside do_make_filename(), which > itself is a helper

Bug#842015: [pkg-gnupg-maint] Bug#842015: Merging bugs about pinentry failing without GNOME-connected d-bus

2016-11-10 Thread Werner Koch
On Wed, 9 Nov 2016 00:41, d...@fifthhorseman.net said: > dbus-user-session is also very much in line with gpg-agent's > --standard-socket option (which is now the default): both of them have > the concept of a single session running for any given user on the > machine. In GnuPG that depends on

Bug#806940: [pkg-gnupg-maint] Bug#806940: Bug#806940: Bug#806940: gpgv-static possible?

2016-11-09 Thread Werner Koch
On Wed, 9 Nov 2016 13:43, gni...@fsij.org said: > I think that it is OK for gpgv-static not supporting tilda expansion. Agreed. Shalom-Salam, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. pgpyjV3tDXiuv.pgp Description: PGP signature

Bug#842015: [pkg-gnupg-maint] Bug#842015: Bug#842015: Bug#842015: Similar issue, no emacs

2016-11-03 Thread Werner Koch
>> It would be great to get better error messages in the hands of users. >> Anything in that direction is welcome. > > I'll look into this. Done. If you run gpg with -v you now get this: gpg: pinentry launched (pid 23496, flavor gtk2, version 0.9.8-beta32) and if the curses fallback is used

Bug#842015: [pkg-gnupg-maint] Bug#842015: Bug#842015: Similar issue, no emacs

2016-11-03 Thread Werner Koch
On Thu, 3 Nov 2016 18:51, vinc...@vinc17.net said: > The fallback to Curses is actually a bug when --no-tty is provided > as a gpg option, because this is documented as: I agree. > So, the terminal can't be used to output the prompt for the > passphrase. I suppose that applications that do not

Bug#842015: [PINENTRY PATCH] gnome3: Test if Gcr System Prompter is available at startup.

2016-11-03 Thread Werner Koch
On Thu, 3 Nov 2016 17:25, d...@fifthhorseman.net said: > Could you please also include some feedback on the actual code provided? Looks fine. I have no way to test it right now, though. > It would make the orthographic nit-pickery a little easier to stomach. > > --dkg, frustrated, and

Bug#842015: [pkg-gnupg-maint] Bug#842015: Bug#842015: Similar issue, no emacs

2016-11-03 Thread Werner Koch
On Thu, 3 Nov 2016 16:13, d...@fifthhorseman.net said: > i do not either, but i will work on a patch that provides something > approximating this approach today. Thanks. > I'm not sure why you prefer it that way. If pinentry is used as a Because the pinentry code makes assumptions on how it

  1   2   3   4   5   >