[Announce] GnuPG 2.1.0 "modern" released

Ville Määttä mailing-lists at asatiifm.net
Thu Nov 6 15:14:57 CET 2014


Hi,

I can’t use speedo.mk as I get "GnuPG has already been build[sic] in-source”. I’m not going to replace 2.0 at this time so I won’t remove it. With just ‘make’ I get an error on linking libgpg-error. I happen to have versions 0.16 and 0.17 but not 0.13 under the referenced path.

[shell quote]

gcc -I/usr/local/Cellar/libgcrypt/1.6.2/include -I/usr/local/Cellar/libgpg-error/1.13/include -I/usr/local/Cellar/libassuan/2.1.2/include -I/usr/local/Cellar/libgpg-error/1.13/include -I/usr/local/Cellar/libksba/1.3.1/include -I/usr/local/Cellar/libgpg-error/1.16/include -g -O2 -Wall -Wno-pointer-sign -Wpointer-arith   -o t-sexputil t-sexputil.o libcommon.a ../gl/libgnu.a -L/usr/local/Cellar/libgcrypt/1.6.2/lib -lgcrypt -L/usr/local/Cellar/libgpg-error/1.13/lib -lgpg-error -L/usr/local/Cellar/libassuan/2.1.2/lib -lassuan -L/usr/local/Cellar/libgpg-error/1.13/lib -lgpg-error -L/usr/local/Cellar/libgpg-error/1.17/lib -lgpg-error  -liconv 
ld: warning: directory not found for option '-L/usr/local/Cellar/libgpg-error/1.13/lib'
ld: warning: directory not found for option '-L/usr/local/Cellar/libgpg-error/1.13/lib'
Undefined symbols for architecture x86_64:
  "_default_errsource", referenced from:
      _parse_ber_header in libcommon.a(libcommon_a-tlv.o)
      _parse_sexp in libcommon.a(libcommon_a-tlv.o)
ld: symbol(s) not found for architecture x86_64
clang: error: linker command failed with exit code 1 (use -v to see invocation)
make[3]: *** [t-sexputil] Error 1
make[2]: *** [all] Error 2
make[1]: *** [all-recursive] Error 1
make: *** [all] Error 2

[/shell quote]

-- 
Ville

On 6 Nov 2014, at 13:18, Nicholas Cole <nicholas.cole at gmail.com> wrote:

> Hi Werner,
> 
> Building on OS X using
> 
> make -f build-aux/speedo.mk native INSTALL_DIR=/usr/local
> 
> gets what looks like most of the way and then fails with the error
> shown below.  Am I the only person experiencing this, or are others
> hitting the same problem?
> 
> Best wishes,
> 
> N.
> 
> 
> 
> Undefined symbols for architecture x86_64:
> 
>  "_default_errsource", referenced from:
> 
>      _parse_ber_header in libcommon.a(libcommon_a-tlv.o)
> 
>      _parse_sexp in libcommon.a(libcommon_a-tlv.o)
> 
> ld: symbol(s) not found for architecture x86_64
> 
> clang: error: linker command failed with exit code 1 (use -v to see invocation)
> 
> make[5]: *** [t-sexputil] Error 1
> 
> make[5]: *** Waiting for unfinished jobs....
> 
> make[4]: *** [all] Error 2
> 
> make[3]: *** [all-recursive] Error 1
> 
> make[2]: *** [all] Error 2
> 
> make[1]: *** [/Users/nicholas/Downloads/gnupg-2.1.0/PLAY/stamps/stamp-gnupg-02-make]
> Error 2
> 
> make: *** [native] Error 2
> 
> On Thu, Nov 6, 2014 at 9:01 AM, Werner Koch <wk at gnupg.org> wrote:
>> Hello!
>> 
>> The GnuPG Project is pleased to announce the availability of a
>> new release: Version 2.1.0.
>> 
>> The GNU Privacy Guard (GnuPG) is a complete and free implementation of
>> the OpenPGP standard as defined by RFC-4880 and better known as PGP.
>> 
>> GnuPG, also known as GPG, allows to encrypt and sign data and
>> communication, features a versatile key management system as well as
>> access modules for public key directories.  GnuPG itself is a command
>> line tool with features for easy integration with other applications.
>> A wealth of frontend applications and libraries making use of GnuPG
>> are available.  Since version 2 GnuPG provides support for S/MIME and
>> Secure Shell in addition to OpenPGP.
>> 
>> GnuPG is Free Software (meaning that it respects your freedom). It can
>> be freely used, modified and distributed under the terms of the GNU
>> General Public License.
>> 
>> Three different versions of GnuPG are actively maintained:
>> 
>> - GnuPG "modern" (2.1) is the latest development with a lot of new
>>  features.  This announcement is about the first release of this
>>  version.
>> 
>> - GnuPG "stable" (2.0) is the current stable version for general use.
>>  This is what most users are currently using.
>> 
>> - GnuPG "classic" (1.4) is the old standalone version which is most
>>  suitable for older or embedded platforms.
>> 
>> You may not install "modern" (2.1) and "stable" (2.0) at the same
>> time.  However, it is possible to install "classic" (1.4) along with
>> any of the other versions.
>> 
>> 
>> What's New in GnuPG-2.1
>> =======================
>> 
>>  - The file "secring.gpg" is not anymore used to store the secret
>>    keys.  Merging of secret keys is now supported.
>> 
>>  - All support for PGP-2 keys has been removed for security reasons.
>> 
>>  - The standard key generation interface is now much leaner.  This
>>    will help a new user to quickly generate a suitable key.
>> 
>>  - Support for Elliptic Curve Cryptography (ECC) is now available.
>> 
>>  - Commands to create and sign keys from the command line without any
>>    extra prompts are now available.
>> 
>>  - The Pinentry may now show the new passphrase entry and the
>>    passphrase confirmation entry in one dialog.
>> 
>>  - There is no more need to manually start the gpg-agent.  It is now
>>    started by any part of GnuPG as needed.
>> 
>>  - Problems with importing keys with the same long key id have been
>>    addressed.
>> 
>>  - The Dirmngr is now part of GnuPG proper and also takes care of
>>    accessing keyserver.
>> 
>>  - Keyserver pools are now handled in a smarter way.
>> 
>>  - A new format for locally storing the public keys is now used.
>>    This considerable speeds up operations on large keyrings.
>> 
>>  - Revocation certificates are now created by default.
>> 
>>  - Card support has been updated, new readers and token types are
>>    supported.
>> 
>>  - The format of the key listing has been changed to better identify
>>    the properties of a key.
>> 
>>  - The gpg-agent may now be used on Windows as a Pageant replacement
>>    for Putty in the same way it is used for years on Unix as
>>    ssh-agent replacement.
>> 
>>  - Creation of X.509 certificates has been improved.  It is now also
>>    possible to export them directly in PKCS#8 and PEM format for use
>>    on TLS servers.
>> 
>> A detailed description of the changes can be found at
>> https://gnupg.org/faq/whats-new-in-2.1.html .
>> 
>> 
>> Getting the Software
>> ====================
>> 
>> Please follow the instructions found at https://gnupg.org/download/ or
>> read on:
>> 
>> GnuPG 2.1.0 may be downloaded from one of the GnuPG mirror sites or
>> direct from its primary FTP server.  The list of mirrors can be found
>> at https://gnupg.org/mirrors.html .  Note that GnuPG is not available
>> at ftp.gnu.org.
>> 
>> On ftp.gnupg.org you find these files:
>> 
>> ftp://ftp.gnupg.org/gcrypt/gnupg/gnupg-2.1.0.tar.bz2  (3039k)
>> ftp://ftp.gnupg.org/gcrypt/gnupg/gnupg-2.1.0.tar.bz2.sig
>> 
>> This is the GnuPG 2.1 source code compressed using BZIP2 and its
>> OpenPGP signature.
>> 
>> ftp://ftp.gnupg.org/gcrypt/binary/gnupg-w32-2.1.0_20141105.exe  (6225k)
>> ftp://ftp.gnupg.org/gcrypt/binary/gnupg-w32-2.1.0_20141105.exe.sig
>> 
>> This is an experimental installer for Windows including GPA as
>> graphical key manager and GpgEX as an Explorer extension.  Please
>> de-install an already installed Gpg4win version before trying this
>> installer.  This binary version has not been tested very well, thus it
>> is likely that you will run into problems.  The complete source code
>> for the software included in this installer is in the same directory;
>> use the suffix ".tar.xz" instead of ".exe".
>> 
>> Although several beta versions have been released over the course of
>> the last years, no extensive public field test has been done.  Thus it
>> is likely that bugs will show up.  Please check the mailing list
>> archives and the new wiki https://wiki.gnupg.org for latest
>> information on known problems and workaround.
>> 
>> 
>> Checking the Integrity
>> ======================
>> 
>> In order to check that the version of GnuPG which you are going to
>> install is an original and unmodified one, you can do it in one of
>> the following ways:
>> 
>> * If you already have a version of GnuPG installed, you can simply
>>   verify the supplied signature.  For example to verify the signature
>>   of the file gnupg-2.1.0.tar.bz2 you would use this command:
>> 
>>     gpg --verify gnupg-2.1.0.tar.bz2.sig
>> 
>>   This checks whether the signature file matches the source file.
>>   You should see a message indicating that the signature is good and
>>   made by one or more of the release signing keys.  Make sure that
>>   this is a valid key, either by matching the shown fingerprint
>>   against a trustworthy list of valid release signing keys or by
>>   checking that the key has been signed by trustworthy other keys.
>>   See below for information on the signing keys.
>> 
>> * If you are not able to use an existing version of GnuPG, you have
>>   to verify the SHA-1 checksum.  On Unix systems the command to do
>>   this is either "sha1sum" or "shasum".  Assuming you downloaded the
>>   file gnupg-2.1.0.tar.bz2, you would run the command like this:
>> 
>>     sha1sum gnupg-2.1.0.tar.bz2
>> 
>>   and check that the output matches the first line from the
>>   following list:
>> 
>> 2fcd0ca6889ef6cb59e3275e8411f8b7778c2f33  gnupg-2.1.0.tar.bz2
>> 9907cb6509a0e63331b27a92e25c1ef956caaf3b  gnupg-w32-2.1.0_20141105.exe
>> 28dc1365292c61fbb2bbae730d4158f425463c91  gnupg-w32-2.1.0_20141105.tar.xz
>> 
>> 
>> Release Signing Keys
>> ====================
>> 
>> To guarantee that a downloaded GnuPG version has not been tampered by
>> malicious entities we provide signature files for all tarballs and
>> binary versions.  The keys are also signed by the long term keys of
>> their respective owners.  Current releases are signed by one or more
>> of these four keys:
>> 
>>  2048R/4F25E3B6 2011-01-12
>>  Key fingerprint = D869 2123 C406 5DEA 5E0F  3AB5 249B 39D2 4F25 E3B6
>>  Werner Koch (dist sig)
>> 
>>  rsa2048/E0856959 2014-10-29
>>  Key fingerprint = 46CC 7308 65BB 5C78 EBAB  ADCF 0437 6F3E E085 6959
>>  David Shaw (GnuPG Release Signing Key) <dshaw 'at' jabberwocky.com>
>> 
>>  rsa2048/33BD3F06 2014-10-29
>>  Key fingerprint = 031E C253 6E58 0D8E A286  A9F2 2071 B08A 33BD 3F06
>>  NIIBE Yutaka (GnuPG Release Key) <gniibe 'at' fsij.org>
>> 
>>  rsa2048/7EFD60D9 2014-10-19
>>  Key fingerprint = D238 EA65 D64C 67ED 4C30  73F2 8A86 1B1C 7EFD 60D9
>>  Werner Koch (Release Signing Key)
>> 
>> You may retrieve these files from the keyservers using this command
>> 
>>  gpg --recv-keys 249B39D24F25E3B6 04376F3EE0856959 \
>>                  2071B08A33BD3F06 8A861B1C7EFD60D9
>> 
>> The keys are also available at https://gnupg.org/signature_key.html
>> and in the released GnuPG tarball in the file g10/distsigkey.gpg .
>> Note that this mail has been signed using my standard PGP key.
>> 
>> 
>> Internationalization
>> ====================
>> 
>> This new branch of GnuPG has support for 4 languages: French, German,
>> Japanese, and Ukrainian.  More translations can be expected with the
>> next point releases.
>> 
>> 
>> Documentation
>> =============
>> 
>> If you used GnuPG in the past you should read the description of
>> changes and new features at doc/whats-new-in-2.1.txt or online at
>> 
>>  https://gnupg.org/faq/whats-new-in-2.1.html
>> 
>> The file gnupg.info has the complete user manual of the system.
>> Separate man pages are included as well but they have not all the
>> details available in the manual.  It is also possible to read the
>> complete manual online in HTML format at
>> 
>>  https://gnupg.org/documentation/manuals/gnupg/
>> 
>> or in Portable Document Format at
>> 
>>  https://gnupg.org/documentation/manuals/gnupg.pdf .
>> 
>> The chapters on gpg-agent, gpg and gpgsm include information on how
>> to set up the whole thing.  You may also want search the GnuPG mailing
>> list archives or ask on the gnupg-users mailing lists for advise on
>> how to solve problems.  Many of the new features are around for
>> several years and thus enough public knowledge is already available.
>> 
>> 
>> Support
>> =======
>> 
>> Please consult the archive of the gnupg-users mailing list before
>> reporting a bug <https://gnupg.org/documentation/mailing-lists.html>.
>> We suggest to send bug reports for a new release to this list in favor
>> of filing a bug at <https://bugs.gnupg.org>.  For commercial support
>> requests we keep a list of known service companies at:
>> 
>>  https://gnupg.org/service.html
>> 
>> The driving force behind the development of GnuPG is the company of
>> its principal author, Werner Koch.  Maintenance and improvement of
>> GnuPG and related software takes up most of their resources.  To allow
>> him to continue this work he kindly asks to either purchase a support
>> contract, engage g10 Code for custom enhancements, or to donate money:
>> 
>>  https://gnupg.org/donate/
>> 
>> 
>> Thanks
>> ======
>> 
>> We have to thank all the people who helped with this release, be it
>> testing, coding, translating, suggesting, auditing, administering the
>> servers, spreading the word, and answering questions on the mailing
>> lists.  A final big Thank You goes to Hal Finney, who too early passed
>> away this year.  Hal worked on PGP and helped to make OpenPGP a great
>> standard; it has been a pleasure having worked with him.
>> 
>> 
>> --
>> Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.
>> 
>> _______________________________________________
>> Gnupg-announce mailing list
>> Gnupg-announce at gnupg.org
>> http://lists.gnupg.org/mailman/listinfo/gnupg-announce
>> _______________________________________________
>> Gnupg-users mailing list
>> Gnupg-users at gnupg.org
>> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>> 
> 
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 630 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: </pipermail/attachments/20141106/2ad6a2ab/attachment-0001.sig>


More information about the Gnupg-users mailing list