From wk at gnupg.org Tue Jul 27 08:53:01 2004 From: wk at gnupg.org (Werner Koch) Date: Wed Feb 23 12:43:35 2005 Subject: [Announce] GnuPG 1.2.5 released Message-ID: Hello! We are pleased to announce the availability of a new stable GnuPG release: Version 1.2.5 The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication and data storage. It is a complete and free replacement of PGP and can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. This is mainly a bug fix release; for details see the "What's New" section below. Getting the Software ==================== Please follow the instructions found at http://www.gnupg.org/download/ or read on: GnuPG 1.2.5 may be downloaded from one of the GnuPG mirror sites or direct from ftp://ftp.gnupg.org/gcrypt . The list of mirrors can be found at http://www.gnupg.org/mirrors.html . Note, that GnuPG is not available at ftp.gnu.org. On the mirrors you should find the following files in the *gnupg* directory: gnupg-1.2.5.tar.bz2 (2430k) gnupg-1.2.5.tar.bz2.sig GnuPG source compressed using BZIP2 and OpenPGP signature. gnupg-1.2.5.tar.gz (3559k) gnupg-1.2.5.tar.gz.sig GnuPG source compressed using GZIP and OpenPGP signature. gnupg-1.2.4-1.2.5.diff.gz (979k) A patch file to upgrade a 1.2.4 GnuPG source. This file is signed; you have to use GnuPG > 0.9.5 to verify the signature. GnuPG has a feature to allow clear signed patch files which can still be processed by the patch utility. Select one of them. To shorten the download time, you probably want to get the BZIP2 compressed file. Please try another mirror if exceptional your mirror is not yet up to date. In the *binary* directory, you should find these files: gnupg-w32cli-1.2.5.zip (1468k) gnupg-w32cli-1.2.5.zip.sig GnuPG compiled for Microsoft Windows and OpenPGP signature. Note that this is a command line version and comes without a graphical installer tool. You have to use an UNZIP utility to extract the files and install them manually. The included file README.W32 has further instructions. Checking the Integrity ====================== In order to check that the version of GnuPG which you are going to install is an original and unmodified one, you can do it in one of the following ways: * If you already have a trusted version of GnuPG installed, you can simply check the supplied signature. For example to check the signature of the file gnupg-1.2.4.tar.bz2 you would use this command: gpg --verify gnupg-1.2.5.tar.bz2.sig This checks whether the signature file matches the source file. You should see a message indicating that the signature is good and made by that signing key. Make sure that you have the right key, either by checking the fingerprint of that key with other sources or by checking that the key has been signed by a trustworthy other key. Note, that you can retrieve the signing key using "finger wk 'at' g10code.com" or "dd9jn 'at' gnu.org" or using the keyservers. I recently prolonged the expiration date; thus you might need a fresh copy of that key. Never use a GnuPG version you just downloaded to check the integrity of the source - use an existing GnuPG installation! * If you are not able to use an old version of GnuPG, you have to verify the MD5 checksum. Assuming you downloaded the file gnupg-1.2.5.tar.bz2, you would run the md5sum command like this: md5sum gnupg-1.2.5.tar.bz2 and check that the output matches the first line from the following list: 9109ff94f7a502acd915a6e61d28d98a gnupg-1.2.5.tar.gz e4991e46fde52b216410ef0f485b4217 gnupg-1.2.5.tar.bz2 d591cb58a7bc81d4e5572260ba2cd595 gnupg-1.2.4-1.2.5.diff.gz 3d93d73942117c4c0182cb15e01de70f gnupg-w32cli-1.2.5.zip Upgrade Information =================== If you are upgrading from a version prior to 1.0.7, you should run the script tools/convert-from-106 once. Please note also that due to a bug in versions prior to 1.0.6 it may not be possible to downgrade to such versions unless you apply the patch http://www.gnupg.org/developer/gpg-woody-fix.txt . If you have any problems, please see the FAQ and the mailing list archive at http://lists.gnupg.org. Please direct questions to the gnupg-users@gnupg.org mailing list. What's New =========== Here is a list of major user visible changes since 1.2.4: * New --ask-cert-level/--no-ask-cert-level option to turn on and off the prompt for signature level when signing a key. Defaults to on. * New --min-cert-level option to disregard key signatures that are under a specified level. Defaults to 1 (i.e. don't disregard anything). * New --max-output option to limit the amount of plaintext output generated by GnuPG. This option can be used by programs which call GnuPG to process messages that may result in plaintext larger than the calling program is prepared to handle. This is sometimes called a "Decompression Bomb". * New --list-config command for frontends and other programs that call GnuPG. See doc/DETAILS for the specifics of this. * New --gpgconf-list command for internal use by the gpgconf utility from gnupg 1.9.x. * Some performance improvements with large keyrings. See --enable-key-cache=SIZE in the README file for details. * Some portability fixes for the OpenBSD/i386, HPPA, and AIX platforms. * Simplified Chinese translation. Internationalization ==================== GnuPG comes with support for 28 languages: American English Indonesian (id) Bela-Russian (be)[*] Italian (it) Catalan (ca)[*] Japanese (ja)[*] Czech (cs) Polish (pl) Danish (da)[*] Brazilian Portuguese (pt_BR)[*] Dutch (nl) Portuguese (pt)[*] Esperanto (eo)[*] Romanian (ro) Estonian (et) Russian (ru) Finnish (fi) Slovak (sk) French (fr) Spanish (es) Galician (gl)[*] Swedish (sv)[*] German (de) Traditional Chinese (zh_TW)[*] Greek (el) Simplified Chinese (zh_CN) Hungarian (hu) Turkish (tr) Languages marked with [*] were not updated for this release and you may notice untranslated messages. Many thanks to the translators for their ongoing support of GnuPG. Future Directions ================= GnuPG 1.2.x is the current stable branch and won't undergo any serious changes. We will just fix bugs and add compatibility fixes as required. GnuPG 1.3.x is the version were we do most new stuff and it will lead to the next stable version 1.4 not too far away. GnuPG 1.9.x is next generation GnuPG. This version merged the code From the Aegypten project and thus it includes the gpg-agent, a smartcard daemon and gpg's S/MIME cousin gpgsm. The design is different to the previous versions and we may not support all ancient systems - thus POSIX compatibility will be an absolute requirement for supported platforms. 1.9 is based on an somewhat older 1.3 code and will peacefully coexist with other GnuPG versions. Happy Hacking, The GnuPG Team (David, Stefan, Timo and Werner) -- Werner Koch The GnuPG Experts http://g10code.com Free Software Foundation Europe http://fsfeurope.org From wk at gnupg.org Tue Jul 27 09:42:37 2004 From: wk at gnupg.org (Werner Koch) Date: Wed Feb 23 12:43:35 2005 Subject: [Announce] GnuPG 1.2.5 released Message-ID: <871xixkiaa.fsf@wheatstone.g10code.de> [reposted due to the Mailman garbled signature] Hello! We are pleased to announce the availability of a new stable GnuPG release: Version 1.2.5 The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication and data storage. It is a complete and free replacement of PGP and can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. This is mainly a bug fix release; for details see the "What's New" section below. Getting the Software ==================== Please follow the instructions found at http://www.gnupg.org/download/ or read on: GnuPG 1.2.5 may be downloaded from one of the GnuPG mirror sites or direct from ftp://ftp.gnupg.org/gcrypt . The list of mirrors can be found at http://www.gnupg.org/mirrors.html . Note, that GnuPG is not available at ftp.gnu.org. On the mirrors you should find the following files in the *gnupg* directory: gnupg-1.2.5.tar.bz2 (2430k) gnupg-1.2.5.tar.bz2.sig GnuPG source compressed using BZIP2 and OpenPGP signature. gnupg-1.2.5.tar.gz (3559k) gnupg-1.2.5.tar.gz.sig GnuPG source compressed using GZIP and OpenPGP signature. gnupg-1.2.4-1.2.5.diff.gz (979k) A patch file to upgrade a 1.2.4 GnuPG source. This file is signed; you have to use GnuPG > 0.9.5 to verify the signature. GnuPG has a feature to allow clear signed patch files which can still be processed by the patch utility. Select one of them. To shorten the download time, you probably want to get the BZIP2 compressed file. Please try another mirror if exceptional your mirror is not yet up to date. In the *binary* directory, you should find these files: gnupg-w32cli-1.2.5.zip (1468k) gnupg-w32cli-1.2.5.zip.sig GnuPG compiled for Microsoft Windows and OpenPGP signature. Note that this is a command line version and comes without a graphical installer tool. You have to use an UNZIP utility to extract the files and install them manually. The included file README.W32 has further instructions. Checking the Integrity ====================== In order to check that the version of GnuPG which you are going to install is an original and unmodified one, you can do it in one of the following ways: * If you already have a trusted version of GnuPG installed, you can simply check the supplied signature. For example to check the signature of the file gnupg-1.2.4.tar.bz2 you would use this command: gpg --verify gnupg-1.2.5.tar.bz2.sig This checks whether the signature file matches the source file. You should see a message indicating that the signature is good and made by that signing key. Make sure that you have the right key, either by checking the fingerprint of that key with other sources or by checking that the key has been signed by a trustworthy other key. Note, that you can retrieve the signing key using "finger wk 'at' g10code.com" or "dd9jn 'at' gnu.org" or using the keyservers. I recently prolonged the expiration date; thus you might need a fresh copy of that key. Never use a GnuPG version you just downloaded to check the integrity of the source - use an existing GnuPG installation! * If you are not able to use an old version of GnuPG, you have to verify the MD5 checksum. Assuming you downloaded the file gnupg-1.2.5.tar.bz2, you would run the md5sum command like this: md5sum gnupg-1.2.5.tar.bz2 and check that the output matches the first line from the following list: 9109ff94f7a502acd915a6e61d28d98a gnupg-1.2.5.tar.gz e4991e46fde52b216410ef0f485b4217 gnupg-1.2.5.tar.bz2 d591cb58a7bc81d4e5572260ba2cd595 gnupg-1.2.4-1.2.5.diff.gz 3d93d73942117c4c0182cb15e01de70f gnupg-w32cli-1.2.5.zip Upgrade Information =================== If you are upgrading from a version prior to 1.0.7, you should run the script tools/convert-from-106 once. Please note also that due to a bug in versions prior to 1.0.6 it may not be possible to downgrade to such versions unless you apply the patch http://www.gnupg.org/developer/gpg-woody-fix.txt . If you have any problems, please see the FAQ and the mailing list archive at http://lists.gnupg.org. Please direct questions to the gnupg-users@gnupg.org mailing list. What's New =========== Here is a list of major user visible changes since 1.2.4: * New --ask-cert-level/--no-ask-cert-level option to turn on and off the prompt for signature level when signing a key. Defaults to on. * New --min-cert-level option to disregard key signatures that are under a specified level. Defaults to 1 (i.e. don't disregard anything). * New --max-output option to limit the amount of plaintext output generated by GnuPG. This option can be used by programs which call GnuPG to process messages that may result in plaintext larger than the calling program is prepared to handle. This is sometimes called a "Decompression Bomb". * New --list-config command for frontends and other programs that call GnuPG. See doc/DETAILS for the specifics of this. * New --gpgconf-list command for internal use by the gpgconf utility from gnupg 1.9.x. * Some performance improvements with large keyrings. See --enable-key-cache=SIZE in the README file for details. * Some portability fixes for the OpenBSD/i386, HPPA, and AIX platforms. * Simplified Chinese translation. Internationalization ==================== GnuPG comes with support for 28 languages: American English Indonesian (id) Bela-Russian (be)[*] Italian (it) Catalan (ca)[*] Japanese (ja)[*] Czech (cs) Polish (pl) Danish (da)[*] Brazilian Portuguese (pt_BR)[*] Dutch (nl) Portuguese (pt)[*] Esperanto (eo)[*] Romanian (ro) Estonian (et) Russian (ru) Finnish (fi) Slovak (sk) French (fr) Spanish (es) Galician (gl)[*] Swedish (sv)[*] German (de) Traditional Chinese (zh_TW)[*] Greek (el) Simplified Chinese (zh_CN) Hungarian (hu) Turkish (tr) Languages marked with [*] were not updated for this release and you may notice untranslated messages. Many thanks to the translators for their ongoing support of GnuPG. Future Directions ================= GnuPG 1.2.x is the current stable branch and won't undergo any serious changes. We will just fix bugs and add compatibility fixes as required. GnuPG 1.3.x is the version were we do most new stuff and it will lead to the next stable version 1.4 not too far away. GnuPG 1.9.x is next generation GnuPG. This version merged the code From the Aegypten project and thus it includes the gpg-agent, a smartcard daemon and gpg's S/MIME cousin gpgsm. The design is different to the previous versions and we may not support all ancient systems - thus POSIX compatibility will be an absolute requirement for supported platforms. 1.9 is based on an somewhat older 1.3 code and will peacefully coexist with other GnuPG versions. Happy Hacking, The GnuPG Team (David, Stefan, Timo and Werner) -- Werner Koch The GnuPG Experts http://g10code.com Free Software Foundation Europe http://fsfeurope.org From wk at gnupg.org Tue Jul 27 19:44:14 2004 From: wk at gnupg.org (Werner Koch) Date: Wed Feb 23 12:43:35 2005 Subject: [Announce] gnupg 1.2.5 build instruction update Message-ID: <877jspfiq9.fsf@wheatstone.g10code.de> Uv, qhr gb n ceboyrz jvgu gur trggrkg vafgnyyngvba ba gur ohvyq znpuvar n yvggyr naablvat oht jvyy qvfgheo gur ohvyq cebprff bs TahCT 1.2.5 jura qbvat gur "znxr vafgnyy": ../../fpevcgf/zxvafgnyyqvef: ../../fpevcgf/zxvafgnyyqvef: Ab fhpu svyr be qverpgbel znxr[1]: *** [vafgnyy-qngn-lrf] Reebe 127 Gurer vf n fvzcyr jbexnebhaq ubjrire: Vafgrnq bs "znxr vafgnyy" hfr znxr vafgnyy zxvafgnyyqvef=`cjq`/fpevcgf/zxvafgnyyqvef naq vg fubhyq jbex nf rkcrpgrq. Nygubhtu V nyjnlf cercner qvfgevohgvbaf hfvat "znxr qvfgpurpx", V boivbhfyl sbetbg gb qb n znahny vafgnyy gb qrgrpg aba-ICNGU eryngrq ohvyq ceboyrzf. Fbzrbar fubhyq unir abgvprq naq ercbegrq guvf oht jvgu gur ynfg eryrnfr pnaqvqngr, juvpu va snpg jnf nyfb nssrpgrq ol vg. Unccl Unpxvat, Jreare -- Jreare Xbpu Gur TahCT Rkcregf uggc://t10pbqr.pbz Serr Fbsgjner Sbhaqngvba Rhebcr uggc://sfsrhebcr.bet From wk at gnupg.org Tue Jul 27 19:55:06 2004 From: wk at gnupg.org (Werner Koch) Date: Wed Feb 23 12:43:35 2005 Subject: [Announce] GnuPG 1.2.5 build instruction update Message-ID: <873c3dfi85.fsf@wheatstone.g10code.de> [Okay, its not my day. I accidently hit C-c r right before sending the mail.] Hi, due to a problem with the gettext installation on the build machine a little annoying bug will disturb the build process of GnuPG 1.2.5 when doing the "make install": ../../scripts/mkinstalldirs: ../../scripts/mkinstalldirs: No such file or directory make[1]: *** [install-data-yes] Error 127 There is a simple workaround however: Instead of "make install" use make install mkinstalldirs=`pwd`/scripts/mkinstalldirs and it should work as expected. Although I always prepare distributions using "make distcheck", I obviously forgot to do a manual install to detect non-VPATH related build problems. Someone should have noticed and reported this bug with the last release candidate, which in fact was also affected by it. Salve Gnus, Werner -- Werner Koch The GnuPG Experts http://g10code.com Free Software Foundation Europe http://fsfeurope.org From wk at gnupg.org Fri Aug 6 16:02:56 2004 From: wk at gnupg.org (wk@gnupg.org) Date: Wed Feb 23 12:43:35 2005 Subject: [Announce] Re: document Message-ID: Please read the document. From wk at gnupg.org Fri Aug 6 18:27:32 2004 From: wk at gnupg.org (Werner Koch) Date: Wed Feb 23 12:43:35 2005 Subject: [Announce] Re: document In-Reply-To: (wk@gnupg.org's message of "Fri, 6 Aug 2004 16:02:56 +0200") References: Message-ID: <87llgs44gb.fsf@wheatstone.g10code.de> Hi! Sorry, that this spam slipped through to the announce list. Please do not send any more comments like "what document". It should be pretty clear that this is spam with a faked address of mine: Received: from localhost ([127.0.0.1] helo=trithemius.gnupg.org) by trithemius.gnupg.org with esmtp (Exim 3.35 #1 (Debian)) id 1Bt5HZ-0005SW-00; Fri, 06 Aug 2004 16:01:17 +0200 That's Mailman sending the message to the local MTA Received: from kerckhoffs.g10code.com ([217.69.77.222]) by trithemius.gnupg.org with esmtp (Exim 3.35 #1 (Debian)) id 1Bt5HR-0005SL-00 for ; Fri, 06 Aug 2004 16:01:09 +0200 Here the local MTA has received it from the MX host to be forwarded to Mailman. Received: from ppp-62-10-15-147.dialup.tiscali.it ([62.10.15.147] helo=gnupg.org) by kerckhoffs.g10code.com with esmtp (Exim 3.35 #1 (Debian)) id 1Bt5HD-0008SE-00 for ; Fri, 06 Aug 2004 16:01:00 +0200 and that is the original spam post from some dialup network to the MX host. From: wk@gnupg.org Well, my address is pretty well known and as such a good faked address. Do not answer to spam or virii mail, this is more evil than the spam itself because it is harder to filter out. Thanks, Werner From wk at gnupg.org Thu Aug 26 12:07:34 2004 From: wk at gnupg.org (Werner Koch) Date: Wed Feb 23 12:43:35 2005 Subject: [Announce] GnuPG 1.2.6 released Message-ID: <87hdqq9pqx.fsf@wheatstone.g10code.de> Hello! We are pleased to announce the availability of a new stable GnuPG release: Version 1.2.6 The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication and data storage. It is a complete and free replacement of PGP and can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. This is mainly a bug fix release. In particular it fixes the installation problem of 1.2.5; for details see the "What's New" section below. Getting the Software ==================== Please follow the instructions found at http://www.gnupg.org/download/ or read on: GnuPG 1.2.6 may be downloaded from one of the GnuPG mirror sites or direct from ftp://ftp.gnupg.org/gcrypt . The list of mirrors can be found at http://www.gnupg.org/mirrors.html . Note, that GnuPG is not available at ftp.gnu.org. On the mirrors you should find the following files in the *gnupg* directory: gnupg-1.2.6.tar.bz2 (2490k) gnupg-1.2.6.tar.bz2.sig GnuPG source compressed using BZIP2 and OpenPGP signature. gnupg-1.2.6.tar.gz (3608k) gnupg-1.2.6.tar.gz.sig GnuPG source compressed using GZIP and OpenPGP signature. gnupg-1.2.5-1.2.6.diff.gz (305k) A patch file to upgrade a 1.2.5 GnuPG source. Select one of them. To shorten the download time, you probably want to get the BZIP2 compressed file. Please try another mirror if exceptional your mirror is not yet up to date. Note that there is no binary version for Windows because the fixed bugs are not relevant on Windows. Checking the Integrity ====================== In order to check that the version of GnuPG which you are going to install is an original and unmodified one, you can do it in one of the following ways: * If you already have a trusted version of GnuPG installed, you can simply check the supplied signature. For example to check the signature of the file gnupg-1.2.6.tar.bz2 you would use this command: gpg --verify gnupg-1.2.6.tar.bz2.sig This checks whether the signature file matches the source file. You should see a message indicating that the signature is good and made by that signing key. Make sure that you have the right key, either by checking the fingerprint of that key with other sources or by checking that the key has been signed by a trustworthy other key. Note, that you can retrieve the signing key using "finger wk 'at' g10code.com" or "finger dd9jn 'at' gnu.org" or using the keyservers. I recently prolonged the expiration date; thus you might need a fresh copy of that key. Never use a GnuPG version you just downloaded to check the integrity of the source - use an existing GnuPG installation! * If you are not able to use an old version of GnuPG, you have to verify the MD5 checksum. Assuming you downloaded the file gnupg-1.2.6.tar.bz2, you would run the md5sum command like this: md5sum gnupg-1.2.6.tar.bz2 and check that the output matches the first line from the following list: b1890f5dfacd2ba7ab15448c5ff08a4e gnupg-1.2.6.tar.bz2 56b10a6f444fff2565f4d960a11b2206 gnupg-1.2.6.tar.gz 3d5199fd729e2cf254a267c6935eeeaf gnupg-1.2.5-1.2.6.diff.gz Upgrade Information =================== If you are upgrading from a version prior to 1.0.7, you should run the script tools/convert-from-106 once. Please note also that due to a bug in versions prior to 1.0.6 it may not be possible to downgrade to such versions unless you apply the patch http://www.gnupg.org/developer/gpg-woody-fix.txt . If you have any problems, please see the FAQ and the mailing list archive at http://lists.gnupg.org. Please direct questions to the gnupg-users@gnupg.org mailing list. What's New =========== Here is a list of major user visible changes since 1.2.6: * Updated the included gettext. This also fixes the installation problem from 1.2.5 * Fixed a race condition possibly leading to deleted keys. Internationalization ==================== GnuPG comes with support for 28 languages: American English Indonesian (id) Bela-Russian (be)[*] Italian (it) Catalan (ca) Japanese (ja)[*] Czech (cs) Polish (pl) Danish (da)[*] Brazilian Portuguese (pt_BR)[*] Dutch (nl) Portuguese (pt)[*] Esperanto (eo)[*] Romanian (ro) Estonian (et) Russian (ru) Finnish (fi) Slovak (sk) French (fr) Spanish (es) Galician (gl)[*] Swedish (sv)[*] German (de) Traditional Chinese (zh_TW)[*] Greek (el) Simplified Chinese (zh_CN) Hungarian (hu) Turkish (tr) Languages marked with [*] were not updated for this release and you may notice untranslated messages. Many thanks to the translators for their ongoing support of GnuPG. Future Directions ================= GnuPG 1.2.x is the current stable branch and won't undergo any serious changes. We will just fix bugs and add compatibility fixes as required. GnuPG 1.3.x is the version were we do most new stuff and it will lead to the next stable version 1.4 not too far away. GnuPG 1.9.x is next generation GnuPG. This version merged the code From marcus.brinkmann at ruhr-uni-bochum.de Thu Sep 30 18:07:54 2004 From: marcus.brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 23 12:43:35 2005 Subject: [Announce] GPGME 1.0.0 released Message-ID: <87d603agf9.wl@ulysses.g10code.de> We are pleased to announce version 1.0.0 of GnuPG Made Easy, a library designed to make access to GnuPG easier for applications. It may be found in the file (about 791 KB compressed) ftp://ftp.gnupg.org/gcrypt/gpgme/gpgme-1.0.0.tar.gz The following files are also available: ftp://ftp.gnupg.org/gcrypt/gpgme/gpgme-1.0.0.tar.gz.sig ftp://ftp.gnupg.org/gcrypt/alpha/gpgme/gpgme-0.9.0-1.0.0.diff.gz It should soon appear on the mirrors listed at: http://www.gnupg.org/mirrors.html Bug reports and requests for assistance should be sent to: gnupg-devel@gnupg.org The md5sum checksums for this distibution are 6b6847d1fb58ee3ac613019a44a58a0e gpgme-0.9.0-1.0.0.diff.gz 1abf7accd905c435da567d0852c080af gpgme-1.0.0.tar.gz f489a46c0047a11e6563821fb22504e3 gpgme-1.0.0.tar.gz.sig Noteworthy changes in version 1.0.0 (2004-09-30) ------------------------------------------------ * Version 1.0.0! We are proud to present you with a thoroughly tested and stable version of the GPGME library. A big Thank You! to all the people who made this possible. The development will be branched into a stable 1.x.y series and the head. * The gpgme.m4 macro supports checking the API version. Just prepend it to the required version string, separated by a colon. For example, this release has the version "1:1.0.0". The last release to which this version is (mostly) ABI compatible is "1:0.4.2", which is the default required version. Marcus Brinkmann mb@g10code.de