From johanw at vulcan.xs4all.nl Mon May 1 01:33:05 2023 From: johanw at vulcan.xs4all.nl (Johan Wevers) Date: Mon, 1 May 2023 01:33:05 +0200 Subject: ADK's In-Reply-To: <20230430190142.GA155004@manas> References: <2199A4D9-31B8-48FD-AD1B-A490E381CB2A@andrewg.com> <20230430190142.GA155004@manas> Message-ID: <0f41ff95-cab2-313d-476d-cd77c153316f@vulcan.xs4all.nl> On 2023-04-30 21:01, Ineiev via Gnupg-users wrote: >> All I want is an option to ignore adk's - and it should not claim >> anything else than that. > > Can't you remove ADK subkeys from your keyring? On someone else's key? -- ir. J.C.A. Wevers PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html From jcb62281 at gmail.com Mon May 1 03:19:26 2023 From: jcb62281 at gmail.com (Jacob Bachmeyer) Date: Sun, 30 Apr 2023 20:19:26 -0500 Subject: ADK's In-Reply-To: <2de12ab8-b0a0-5c15-5c7a-ea8f241b1ec7@vulcan.xs4all.nl> References: <8409E3A7-DA83-4EAD-AD7B-E57CC24C5254@andrewg.com> <2de12ab8-b0a0-5c15-5c7a-ea8f241b1ec7@vulcan.xs4all.nl> Message-ID: <644F139E.5010009@gmail.com> Johan Wevers via Gnupg-users wrote: > On 2023-04-30 14:58, Andrew Gallagher via Gnupg-users wrote: > > [...] > >> The danger of an ?ignore ADK? option is that it gives a false sense of security. It is already possible for an employer to require escrow of the decryption subkeys of their employees - ADK actually makes this process more transparent. >> > > That might be, but it is nowhere certain that this escrow will happen, > especially if they roll out adk's. Not providing such an option might be > a case where the perfect is the enemy of the good: it might not be a > perfect solution but it can be better than the alternative. > > Besides, this is begging for GnuPG forks to arise, and if those forks > are well implemented remains to be seen. Maybe the best option here is an "--override-encryption-target KEYGRIP/SUBKEYGRIP" option, repeatable to encrypt to multiple specific subkeys of the same or different PGP keys, which is why it requires both a keygrip and a subkeygrip. This would also allow encrypting to some ADKs while ignoring others and resolve the demands for an "ignore ADK" option. ADKs seem particularly valuable to me as a solution to the "group inbox" problem that avoids actually sharing private key material: simply attach encryption subkeys for all recipients to the "group inbox" certificate. This requires publishing new certificates when the recipient list changes and discloses the recipient list to some extent, but that is the trade-off for end-to-end security in this context. Could a "--notify-ADK-encrypt" option that could be placed in the configuration file be appropriate to address user concerns about possible improper proliferation of ADKs? Should a notification that an ADK was used actually be default? After all, there are legitimate uses for ADKs, but an ADK turning up where not expected could be a strong hint that you have a bogus certificate. I would also note that, for a work email system in an environment where there is a legal or quasi-legal requirement (not uncommon in finance) to archive messages, simply dropping any incoming message not decryptable with the archive ADK as spam would be reasonable. Since the primary concern motivating message archival in this example is deterring insider trading, simply not allowing unreadable messages to be delivered accomplishes the same objective. -- Jacob From mcr at sandelman.ca Mon May 1 04:53:15 2023 From: mcr at sandelman.ca (Michael Richardson) Date: Sun, 30 Apr 2023 22:53:15 -0400 Subject: ADK's In-Reply-To: <644F139E.5010009@gmail.com> References: <8409E3A7-DA83-4EAD-AD7B-E57CC24C5254@andrewg.com> <2de12ab8-b0a0-5c15-5c7a-ea8f241b1ec7@vulcan.xs4all.nl> <644F139E.5010009@gmail.com> Message-ID: <26066.1682909595@localhost> Jacob Bachmeyer via Gnupg-users wrote: > ADKs seem particularly valuable to me as a solution to the "group inbox" > problem that avoids actually sharing private key material: simply > attach encryption subkeys for all recipients to the "group inbox" > certificate. This requires publishing new certificates when the > recipient list changes and discloses the recipient list to some extent, but > that is the trade-off for end-to-end security in this context. Could a > "--notify-ADK-encrypt" option that could be placed in the configuration file > be appropriate to address user concerns about possible improper proliferation > of ADKs? Should a notification that an ADK was used actually be default? > After all, there are legitimate uses for ADKs, but an ADK turning up where > not expected could be a strong hint that you have a bogus certificate. That would be really useful for security at example.com I'm unclear if this is a new feature (I think so), and if so what happens if the sender hasn't upgraded yet? > I would also note that, for a work email system in an environment where there > is a legal or quasi-legal requirement (not uncommon in finance) to archive > messages, simply dropping any incoming message not decryptable with the > archive ADK as spam would be reasonable. Since the primary concern > motivating message archival in this example is deterring insider trading, > simply not allowing unreadable messages to be delivered accomplishes the same > objective. Yes, reasonable. OTH, the emails investigating the insider trading by the HR people might need to avoid the ADK. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 511 bytes Desc: not available URL: From jcb62281 at gmail.com Mon May 1 05:52:10 2023 From: jcb62281 at gmail.com (Jacob Bachmeyer) Date: Sun, 30 Apr 2023 22:52:10 -0500 Subject: ADK's In-Reply-To: <26066.1682909595@localhost> References: <8409E3A7-DA83-4EAD-AD7B-E57CC24C5254@andrewg.com> <2de12ab8-b0a0-5c15-5c7a-ea8f241b1ec7@vulcan.xs4all.nl> <644F139E.5010009@gmail.com> <26066.1682909595@localhost> Message-ID: <644F376A.4050504@gmail.com> Michael Richardson wrote: > Jacob Bachmeyer via Gnupg-users wrote: > > ADKs seem particularly valuable to me as a solution to the "group inbox" > > problem that avoids actually sharing private key material: simply > > attach encryption subkeys for all recipients to the "group inbox" > > certificate. This requires publishing new certificates when the > > recipient list changes and discloses the recipient list to some extent, but > > that is the trade-off for end-to-end security in this context. Could a > > "--notify-ADK-encrypt" option that could be placed in the configuration file > > be appropriate to address user concerns about possible improper proliferation > > of ADKs? Should a notification that an ADK was used actually be default? > > After all, there are legitimate uses for ADKs, but an ADK turning up where > > not expected could be a strong hint that you have a bogus certificate. > > That would be really useful for security at example.com > That is an almost prototypical example. In that case, the "archive" key would actually be the main subkey, and the list recipients' personal keys would be attached as ADKs. Another example: suppose I have multiple hardware tokens and wish to be able to use them interchangeably, but also want maximal security with this arrangement, so have generated an encryption keypair on each token. I list all of the per-token subkeys as ADKs. In this case, the ADKs really would all be /my/ keys. Again, I would have to publish a new certificate every time my collection of live tokens changes, which may or may not leak useful information to an adversary. > I'm unclear if this is a new feature (I think so), and if so what happens if > the sender hasn't upgraded yet? > My understanding: ADKs are new and do not work without support on the sender's side. The ADK is a request to also encrypt any message to the subkey to the ADK. If the sender's software does not understand that request, it does not happen. If the sender rejects that request, either by setting an option or by patching their software to ignore the request, it does not happen. My primary reason for arguing to support some way to suppress the use of an ADK when encrypting is that, as Johan noted, this is an issue where feelings are strong enough to provoke forks, which are likely to simply rip out ADK support entirely, thus making its legitimate uses (group inboxes, multiple tokens, business-related) unreliable. > > I would also note that, for a work email system in an environment where there > > is a legal or quasi-legal requirement (not uncommon in finance) to archive > > messages, simply dropping any incoming message not decryptable with the > > archive ADK as spam would be reasonable. Since the primary concern > > motivating message archival in this example is deterring insider trading, > > simply not allowing unreadable messages to be delivered accomplishes the same > > objective. > > Yes, reasonable. > OTH, the emails investigating the insider trading by the HR people might need > to avoid the ADK. If we are talking about investigating HR malfeasance, those messages would not be going to the traders' regular inboxes in the first place. You are right that an HR ADK could be a very bad idea in this example, since it could allow HR to front-run their own employer. The expected solution would be to give the trading archives only to the audit or legal departments, and only after some period of time has passed. That still leaves potential auditor or lawyer malfeasance, but that is an existing risk such businesses already handle. -- Jacob From mlnl at mailbox.org Mon May 1 08:28:04 2023 From: mlnl at mailbox.org (mlnl) Date: Mon, 1 May 2023 08:28:04 +0200 Subject: ADK's In-Reply-To: <0f41ff95-cab2-313d-476d-cd77c153316f@vulcan.xs4all.nl> References: <2199A4D9-31B8-48FD-AD1B-A490E381CB2A@andrewg.com> <20230430190142.GA155004@manas> <0f41ff95-cab2-313d-476d-cd77c153316f@vulcan.xs4all.nl> Message-ID: <20230501082804.0bfb4516@localhost> Hi Johan, Johan Wevers via Gnupg-users wrote: >On 2023-04-30 21:01, Ineiev via Gnupg-users wrote: > >>> All I want is an option to ignore adk's - and it should not claim >>> anything else than that. >> >> Can't you remove ADK subkeys from your keyring? > >On someone else's key? > Yes. 1. identify ADK key: [R]/usage: R ("restricted encryption key") and extract adk's fingerprint 2. gpg --batch --delete-keys adkfp! after every key import or refresh. -- mlnl GPG:1FC05426F87FA623 From ineiev at gnu.org Mon May 1 13:38:51 2023 From: ineiev at gnu.org (Ineiev) Date: Mon, 1 May 2023 11:38:51 +0000 Subject: ADK's In-Reply-To: <644F376A.4050504@gmail.com> References: <8409E3A7-DA83-4EAD-AD7B-E57CC24C5254@andrewg.com> <2de12ab8-b0a0-5c15-5c7a-ea8f241b1ec7@vulcan.xs4all.nl> <644F139E.5010009@gmail.com> <26066.1682909595@localhost> <644F376A.4050504@gmail.com> Message-ID: <20230501113851.GC13977@manas> On Sun, Apr 30, 2023 at 10:52:10PM -0500, Jacob Bachmeyer via Gnupg-users wrote: > > That is an almost prototypical example. In that case, the "archive" key > would actually be the main subkey, and the list recipients' personal keys > would be attached as ADKs. > > Another example: suppose I have multiple hardware tokens and wish to be > able to use them interchangeably, but also want maximal security with this > arrangement, so have generated an encryption keypair on each token. I list > all of the per-token subkeys as ADKs. In this case, the ADKs really would > all be /my/ keys. Again, I would have to publish a new certificate every > time my collection of live tokens changes, which may or may not leak useful > information to an adversary. It looks like the feature will allow for quite unexpected (if not unintended) uses. Another potential use is: I have reasons to believe that the holder of the key 0123456789ABCDEF controls the email yu at guan.edu, but that key has no user ID with such email, and I couldn't validate any other emails in that key. when I'm writing to that email, my MUA will look for keys with user IDs that match it. now, I generate a key for yu at guan.edu locally and add 0123456789ABCDEF as an ADK (BTW, will GnuPG complain if the only encryption-capable subkey is ADK? can I make all self-signatures local in order to avoid sending the key to keyservers?) -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 488 bytes Desc: not available URL: From andrewg at andrewg.com Mon May 1 16:16:12 2023 From: andrewg at andrewg.com (Andrew Gallagher) Date: Mon, 1 May 2023 15:16:12 +0100 Subject: ADK's In-Reply-To: <20230501113851.GC13977@manas> References: <20230501113851.GC13977@manas> Message-ID: On 1 May 2023, at 12:40, Ineiev via Gnupg-users wrote: > now, I generate a key > for yu at guan.edu locally and add 0123456789ABCDEF as an ADK (BTW, > will GnuPG complain if the only encryption-capable subkey is ADK? Or you could just use an alias?? A From tmz at pobox.com Mon May 1 19:10:15 2023 From: tmz at pobox.com (Todd Zullinger) Date: Mon, 1 May 2023 13:10:15 -0400 Subject: [Announce] GnuPG 2.4.1 released In-Reply-To: <87o7n5ziax.fsf@wheatstone.g10code.de> References: <87mt2s15kn.fsf@wheatstone.g10code.de> <87o7n5ziax.fsf@wheatstone.g10code.de> Message-ID: Werner Koch via Gnupg-users wrote: > On Fri, 28 Apr 2023 11:21, Todd Zullinger said: > >> It seems neither of these files have not made it to the >> server yet: > > Sorry for that. I have used a new build machine and obviously forgot > one of the last steps. Most of the release process is scripted but the > final upload needs to be done manually (after signing, copying to the > internal archive, updating the repo, writing announcement and updating > the web page). > > Fixed after Bernhard called me at home. Sorry it interrupted your weekend. Thanks for the new release and all of your work on GnuPG and OpenPGP. :) -- Todd -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 488 bytes Desc: not available URL: From mcr at sandelman.ca Tue May 2 02:20:34 2023 From: mcr at sandelman.ca (Michael Richardson) Date: Mon, 01 May 2023 20:20:34 -0400 Subject: ADK's In-Reply-To: <644F376A.4050504@gmail.com> References: <8409E3A7-DA83-4EAD-AD7B-E57CC24C5254@andrewg.com> <2de12ab8-b0a0-5c15-5c7a-ea8f241b1ec7@vulcan.xs4all.nl> <644F139E.5010009@gmail.com> <26066.1682909595@localhost> <644F376A.4050504@gmail.com> Message-ID: <4224.1682986834@localhost> Jacob Bachmeyer wrote: >> I'm unclear if this is a new feature (I think so), and if so what happens if >> the sender hasn't upgraded yet? >> > My understanding: ADKs are new and do not work without support on the > sender's side. The ADK is a request to also encrypt any message to the > subkey to the ADK. If the sender's software does not understand that > request, it does not happen. If the sender rejects that request, either > by setting an option or by patching their software to ignore the request, it > does not happen. Does it still (by default) encrypt to the main key? > My primary reason for arguing to support some way to suppress the use of an > ADK when encrypting is that, as Johan noted, this is an issue where feelings > are strong enough to provoke forks, which are likely to simply rip out ADK > support entirely, thus making its legitimate uses (group inboxes, multiple > tokens, business-related) unreliable. I agree with this view. >> > I would also note that, for a work email system in an environment where there >> > is a legal or quasi-legal requirement (not uncommon in finance) to archive >> > messages, simply dropping any incoming message not decryptable with the >> > archive ADK as spam would be reasonable. Since the primary concern >> > motivating message archival in this example is deterring insider trading, >> > simply not allowing unreadable messages to be delivered accomplishes the same >> > objective. >> >> Yes, reasonable. >> OTH, the emails investigating the insider trading by the HR people might need >> to avoid the ADK. > If we are talking about investigating HR malfeasance, those messages would > not be going to the traders' regular inboxes in the first place. You are > right that an HR ADK could be a very bad idea in this example, since it could > allow HR to front-run their own employer. The expected solution would be to > give the trading archives only to the audit or legal departments, and only > after some period of time has passed. That still leaves potential auditor or > lawyer malfeasance, but that is an existing risk such businesses already > handle. It's the initial investigation of an irregularity where there could be a problem. There is also an issue with 2FA and password reset emails: it's something that may be a vulnerability to archive. Okay, few are encrypted today, but we can hope. Many companies with forced proxis are starting to realize that they become liable when they store banking login cookies. Anyway, I think senders need to be made mildly aware that it's occuring, and I think they should be allowed to pick a specific ADK or suppress them all in certain circumstances best decided by them. -- ] Never tell me the odds! | ipv6 mesh networks [ ] Michael Richardson, Sandelman Software Works | IoT architect [ ] mcr at sandelman.ca http://www.sandelman.ca/ | ruby on rails [ -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 511 bytes Desc: not available URL: From jcb62281 at gmail.com Tue May 2 04:43:57 2023 From: jcb62281 at gmail.com (Jacob Bachmeyer) Date: Mon, 01 May 2023 21:43:57 -0500 Subject: ADK's In-Reply-To: <4224.1682986834@localhost> References: <8409E3A7-DA83-4EAD-AD7B-E57CC24C5254@andrewg.com> <2de12ab8-b0a0-5c15-5c7a-ea8f241b1ec7@vulcan.xs4all.nl> <644F139E.5010009@gmail.com> <26066.1682909595@localhost> <644F376A.4050504@gmail.com> <4224.1682986834@localhost> Message-ID: <645078ED.8020000@gmail.com> Michael Richardson wrote: > Jacob Bachmeyer wrote: > >> I'm unclear if this is a new feature (I think so), and if so what happens if > >> the sender hasn't upgraded yet? > >> > > > My understanding: ADKs are new and do not work without support on the > > sender's side. The ADK is a request to also encrypt any message to the > > subkey to the ADK. If the sender's software does not understand that > > request, it does not happen. If the sender rejects that request, either > > by setting an option or by patching their software to ignore the request, it > > does not happen. > > Does it still (by default) encrypt to the main key? > My understanding: Yes, if ADKs are not supported, the message is encrypted only for the main key. > [...] > > >> > I would also note that, for a work email system in an environment where there > >> > is a legal or quasi-legal requirement (not uncommon in finance) to archive > >> > messages, simply dropping any incoming message not decryptable with the > >> > archive ADK as spam would be reasonable. Since the primary concern > >> > motivating message archival in this example is deterring insider trading, > >> > simply not allowing unreadable messages to be delivered accomplishes the same > >> > objective. > >> > >> Yes, reasonable. > >> OTH, the emails investigating the insider trading by the HR people might need > >> to avoid the ADK. > > > If we are talking about investigating HR malfeasance, those messages would > > not be going to the traders' regular inboxes in the first place. You are > > right that an HR ADK could be a very bad idea in this example, since it could > > allow HR to front-run their own employer. The expected solution would be to > > give the trading archives only to the audit or legal departments, and only > > after some period of time has passed. That still leaves potential auditor or > > lawyer malfeasance, but that is an existing risk such businesses already > > handle. > > It's the initial investigation of an irregularity where there could be a problem. > There is also an issue with 2FA and password reset emails: it's something > that may be a vulnerability to archive. Okay, few are encrypted today, but > we can hope. Many companies with forced proxis are starting to realize that > they become liable when they store banking login cookies. > Really, the banks should be recognizing those networks and denying logins. Perhaps corporate forced proxies should be required to insert an additional header reporting that the connection is not actually point-to-point encrypted, which banks and other sensitive services could use to reject sessions. The main problem here seems to be a work-life balance issue. People should not be conducting personal business on the company network, and, in turn, companies need to understand that personal time outside of work is /personal/ /time/ /outside/ /of/ /work/. I am not sure in which direction this first broke down, but it is the root cause of a wide variety of problems. > Anyway, I think senders need to be made mildly aware that it's occuring, and > I think they should be allowed to pick a specific ADK or suppress them all in > certain circumstances best decided by them. > I believe that is substantially what I proposed, so at least two of us agree. -- Jacob From wk at gnupg.org Tue May 2 08:34:15 2023 From: wk at gnupg.org (Werner Koch) Date: Tue, 02 May 2023 08:34:15 +0200 Subject: [Announce] GnuPG 2.4.1 released In-Reply-To: (Todd Zullinger via Gnupg-users's message of "Mon, 1 May 2023 13:10:15 -0400") References: <87mt2s15kn.fsf@wheatstone.g10code.de> <87o7n5ziax.fsf@wheatstone.g10code.de> Message-ID: <878re7z1g8.fsf@wheatstone.g10code.de> On Mon, 1 May 2023 13:10, Todd Zullinger said: > Sorry it interrupted your weekend. Thanks for the new Actually it was Friday evening and I left the office a bit earlier than usual. Salam-Shalom, Werner -- The pioneers of a warless world are the youth that refuse military service. - A. Einstein -------------- next part -------------- A non-text attachment was scrubbed... Name: openpgp-digital-signature.asc Type: application/pgp-signature Size: 227 bytes Desc: not available URL: From wk at gnupg.org Tue May 2 08:37:33 2023 From: wk at gnupg.org (Werner Koch) Date: Tue, 02 May 2023 08:37:33 +0200 Subject: ADK's In-Reply-To: <8409E3A7-DA83-4EAD-AD7B-E57CC24C5254@andrewg.com> (Andrew Gallagher via Gnupg-users's message of "Sun, 30 Apr 2023 13:58:17 +0100") References: <8409E3A7-DA83-4EAD-AD7B-E57CC24C5254@andrewg.com> Message-ID: <874jovz1aq.fsf@wheatstone.g10code.de> On Sun, 30 Apr 2023 13:58, Andrew Gallagher said: > The danger of an ?ignore ADK? option is that it gives a false sense of And not to forget the other important use case: Add an ADK for your own second device so that you are able to decrypt also on that device - without the need to keep the pimary key on that device. BTW, OpenKeychain does something very similar for many years. Shalom-Salam, Werner -- The pioneers of a warless world are the youth that refuse military service. - A. Einstein -------------- next part -------------- A non-text attachment was scrubbed... Name: openpgp-digital-signature.asc Type: application/pgp-signature Size: 227 bytes Desc: not available URL: From andrewg at andrewg.com Tue May 2 09:35:08 2023 From: andrewg at andrewg.com (Andrew Gallagher) Date: Tue, 2 May 2023 08:35:08 +0100 Subject: ADK's In-Reply-To: <4224.1682986834@localhost> References: <4224.1682986834@localhost> Message-ID: <8F05146A-0127-4C88-97B3-F6A16A0B3CF1@andrewg.com> On 2 May 2023, at 02:18, Michael Richardson wrote: > > It's the initial investigation of an irregularity where there could be a problem. These examples are becoming increasingly contrived. If you are investigating fraud by someone who can read all your company emails, don?t discuss it over company email. This is really basic stuff. > There is also an issue with 2FA and password reset emails: it's something > that may be a vulnerability to archive. Okay, few are encrypted today, but > we can hope. Password reset emails are supposed to be immune to replay attacks. > Many companies with forced proxis are starting to realize that > they become liable when they store banking login cookies. The only way that a company would end up archiving a password reset email encrypted to an ADK would be if an employee was using their work email address for password resets. If using their work email for this purpose is inadvisable, then it is inadvisable regardless of ADKs. > Anyway, I think senders need to be made mildly aware that it's occuring, and > I think they should be allowed to pick a specific ADK or suppress them all in > certain circumstances best decided by them. If I add an ADK notation to my key for legitimate reasons that I do not discuss with all my correspondents, on what basis do they decide to second guess it? How is this any different from where I store my private key, whether it is escrowed, whether it has a password etc, which are invisible to the sender and generally none of their business? If you don?t trust how I manage my key, the only reasonable recourse is to avoid using it. ADK introduces no new considerations that are not also an issue for key escrow, which happens anyway, and has several advantages over escrow, particularly transparency. If however it became common for people to disable encrypting to the ADK, it would simply encourage companies to stop using it and keep using escrow, which doesn?t prevent any of the proposed abuses. If you don?t trust your correspondent?s employer, then the only effective course of action is to not use their employer?s email address. Technical measures cannot protect you from opsec problems. A From mcr at sandelman.ca Tue May 2 17:04:33 2023 From: mcr at sandelman.ca (Michael Richardson) Date: Tue, 02 May 2023 11:04:33 -0400 Subject: ADK's In-Reply-To: <8F05146A-0127-4C88-97B3-F6A16A0B3CF1@andrewg.com> References: <4224.1682986834@localhost> <8F05146A-0127-4C88-97B3-F6A16A0B3CF1@andrewg.com> Message-ID: <32705.1683039873@localhost> Andrew Gallagher wrote: > The only way that a company would end up archiving a password reset > email encrypted to an ADK would be if an employee was using their work > email address for password resets. If using their work email for this > purpose is inadvisable, then it is inadvisable regardless of ADKs. Like you mean, an employee was using a work email for a work thing, maybe? > ADK introduces no new considerations that are not also an issue for key > escrow, which happens anyway, and has several advantages over escrow, I agree. > If you don?t trust your correspondent?s employer, then the only > effective course of action is to not use their employer?s email > address. Technical measures cannot protect you from opsec problems. I'm asking to be informed so that I can make the decision to do something else. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 511 bytes Desc: not available URL: From ineiev at gnu.org Thu May 4 07:46:26 2023 From: ineiev at gnu.org (Ineiev) Date: Thu, 4 May 2023 05:46:26 +0000 Subject: out-of-key UIDs [was: ADK's] In-Reply-To: References: <20230501113851.GC13977@manas> Message-ID: On Mon, May 01, 2023 at 03:16:12PM +0100, Andrew Gallagher wrote: > On 1 May 2023, at 12:40, Ineiev via Gnupg-users wrote: > > now, I generate a key > > for yu at guan.edu locally and add 0123456789ABCDEF as an ADK (BTW, > > will GnuPG complain if the only encryption-capable subkey is ADK? > > Or you could just use an alias?? I don't think I fully understand what you mean. $ gpg --group fnord at test.eu=BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A --list-keys fnord at test.eu gpg: error reading key: No public key $ gpg --list-keys BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A | head -n1 pub rsa2048 2014-10-21 [SC] [expires: 2024-10-17] $ gpg --version | head -n2 gpg (GnuPG) 2.2.41 libgcrypt 1.8.10 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 488 bytes Desc: not available URL: From andrewg at andrewg.com Thu May 4 10:52:54 2023 From: andrewg at andrewg.com (Andrew Gallagher) Date: Thu, 4 May 2023 09:52:54 +0100 Subject: out-of-key UIDs [was: ADK's] In-Reply-To: References: <20230501113851.GC13977@manas> Message-ID: <8F6EEFCA-59B6-491B-852A-512CF5BCDDDB@andrewg.com> On 4 May 2023, at 06:46, Ineiev wrote: > > On Mon, May 01, 2023 at 03:16:12PM +0100, Andrew Gallagher wrote: >> On 1 May 2023, at 12:40, Ineiev via Gnupg-users wrote: >>> now, I generate a key >>> for yu at guan.edu locally and add 0123456789ABCDEF as an ADK (BTW, >>> will GnuPG complain if the only encryption-capable subkey is ADK? >> >> Or you could just use an alias?? > > I don't think I fully understand what you mean. > > $ gpg --group fnord at test.eu=BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A --list-keys fnord at test.eu > gpg: error reading key: No public key > $ gpg --list-keys BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A | head -n1 > pub rsa2048 2014-10-21 [SC] [expires: 2024-10-17] > $ gpg --version | head -n2 > gpg (GnuPG) 2.2.41 > libgcrypt 1.8.10 ?list-keys doesn?t expand groups. Try this instead: andrewg at serenity % gpg --group fnord at test.eu=BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A -r fnord at test.eu -e < /etc/shells > shells.gpg gpg: 0x40F9B9601900E974: There is no assurance this key belongs to the named user sub rsa2048/0x40F9B9601900E974 2014-10-21 Ineiev (fencepost) Primary key fingerprint: BD9D 4DEE 7B2F F1CB EF2E E0C4 E0AC D3E0 CBE7 874A Subkey fingerprint: F495 D912 C380 C534 23CD 6B7C 40F9 B960 1900 E974 It is NOT certain that the key belongs to the person named in the user ID. If you *really* know what you are doing, you may answer the next question with yes. Use this key anyway? (y/N) y andrewg at serenity % gpg --list-packets shells.gpg gpg: encrypted with rsa2048 key, ID 0x40F9B9601900E974, created 2014-10-21 "Ineiev (fencepost) " gpg: problem with fast path key listing: IPC parameter error - ignored gpg: public key decryption failed: No secret key gpg: decryption failed: No secret key # off=0 ctb=85 tag=1 hlen=3 plen=268 :pubkey enc packet: version 3, algo 1, keyid 40F9B9601900E974 data: [2047 bits] # off=271 ctb=d2 tag=18 hlen=2 plen=187 new-ctb :encrypted data packet: length: 187 mdc_method: 2 andrewg at serenity % A -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 833 bytes Desc: Message signed with OpenPGP URL: From ineiev at gnu.org Thu May 4 11:43:56 2023 From: ineiev at gnu.org (Ineiev) Date: Thu, 4 May 2023 09:43:56 +0000 Subject: out-of-key UIDs [was: ADK's] In-Reply-To: <8F6EEFCA-59B6-491B-852A-512CF5BCDDDB@andrewg.com> References: <20230501113851.GC13977@manas> <8F6EEFCA-59B6-491B-852A-512CF5BCDDDB@andrewg.com> Message-ID: On Thu, May 04, 2023 at 09:52:54AM +0100, Andrew Gallagher wrote: > > $ gpg --group fnord at test.eu=BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A --list-keys fnord at test.eu > > gpg: error reading key: No public key ... > ?list-keys doesn?t expand groups. Try this instead: > > > andrewg at serenity % gpg --group fnord at test.eu=BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A -r fnord at test.eu -e < /etc/shells > shells.gpg > gpg: 0x40F9B9601900E974: There is no assurance this key belongs to the named user I tried something like this with my MUA, I believe that doesn't work: it first looks for appropriate keys, probably using --list-keys; in fact, it insists on choosing a single key when multiple ones are available. ... > It is NOT certain that the key belongs to the person named > in the user ID. If you *really* know what you are doing, > you may answer the next question with yes. > > Use this key anyway? (y/N) y This is another issue ADK might handle differently---if gpg skipped validation of the donor keys (where ADK subkeys come from), I wouldn't have to certify any UIDs in it. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 488 bytes Desc: not available URL: From andrewg at andrewg.com Thu May 4 12:01:36 2023 From: andrewg at andrewg.com (Andrew Gallagher) Date: Thu, 4 May 2023 11:01:36 +0100 Subject: out-of-key UIDs [was: ADK's] In-Reply-To: References: <20230501113851.GC13977@manas> <8F6EEFCA-59B6-491B-852A-512CF5BCDDDB@andrewg.com> Message-ID: <65178614-13F7-4852-A7A9-CDCA5B4C7450@andrewg.com> On 4 May 2023, at 10:43, Ineiev wrote: > > On Thu, May 04, 2023 at 09:52:54AM +0100, Andrew Gallagher wrote: >> >> andrewg at serenity % gpg --group fnord at test.eu=BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A -r fnord at test.eu -e < /etc/shells > shells.gpg >> gpg: 0x40F9B9601900E974: There is no assurance this key belongs to the named user > > I tried something like this with my MUA, I believe that doesn't work: > it first looks for appropriate keys, probably using --list-keys; > in fact, it insists on choosing a single key when multiple ones > are available. Which MUA is this? I know that Thunderbird doesn?t support gnupg?s groups any more, but it has an equivalent inbuilt feature that you can configure separately. A -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 833 bytes Desc: Message signed with OpenPGP URL: From wk at gnupg.org Thu May 4 13:01:20 2023 From: wk at gnupg.org (Werner Koch) Date: Thu, 04 May 2023 13:01:20 +0200 Subject: out-of-key UIDs [was: ADK's] In-Reply-To: (Ineiev via Gnupg-users's message of "Thu, 4 May 2023 09:43:56 +0000") References: <20230501113851.GC13977@manas> <8F6EEFCA-59B6-491B-852A-512CF5BCDDDB@andrewg.com> Message-ID: <87y1m4webj.fsf@wheatstone.g10code.de> On Thu, 4 May 2023 09:43, Ineiev said: > This is another issue ADK might handle differently---if gpg skipped > validation of the donor keys (where ADK subkeys come from), The ADSK shall work very similar to --encrypt-to - that is it is only used if there is already an encryption key. That is why it is named ADS(ub)K(ey) and not just ADK(ey) - the ADSK is always in your keyblock. In gnupg/g10/pkclist.c:find_and_check_key at line 921 we got the regular encryption key and add it to our list of keys. Right after that we scan that keyblock for an ADSK (i.e. PUBKEY_USAGE_RENC) and add that one too. Shalom-Salam, Werner -- The pioneers of a warless world are the youth that refuse military service. - A. Einstein -------------- next part -------------- A non-text attachment was scrubbed... Name: openpgp-digital-signature.asc Type: application/pgp-signature Size: 227 bytes Desc: not available URL: From take at kasaneiro.jp Thu May 4 15:15:18 2023 From: take at kasaneiro.jp (WATANABE Takeo) Date: Thu, 04 May 2023 22:15:18 +0900 (JST) Subject: Error when making "libgcrypt" [rndgetentropy.c ] Message-ID: <20230504.221518.1450224712191780766.take@kasaneiro.jp> Dear. GnuPG-Users. When making "libgcrypt ver1.10.2" and "libgcrypt ver1.8.10", I got the following error and the compilation could not proceed. (Output is line-breaked where appropriate.) --- libtool: compile: gcc -DHAVE_CONFIG_H -I. -I.. -I../src -I../src -I/usr/local/include -g -O2 -fno-delete-null-pointer-checks -Wall -Wcast-align -Wshadow -Wstrict-prototypes -Wformat -Wno-format-y2k -Wformat-security -W -Wextra -Wbad-function-cast -Wwrite-strings -Wdeclaration-after-statement -Wno-missing-field-initializers -Wno-sign-compare -Wpointer-arith -MT rndgetentropy.lo -MD -MP -MF .deps/rndgetentropy.Tpo -c rndgetentropy.c -fno-common -DPIC -o .libs/rndgetentropy.orndgetentropy.c:98:21: error: call to undeclared function 'getrandom'; ISO C99 and later do not support implicit function declarations [-Wimplicit-function-declaration] ret = getrandom (buffer, nbytes, GRND_RANDOM); ^ rndgetentropy.c:98:48: error: use of undeclared identifier 'GRND_RANDOM' ret = getrandom (buffer, nbytes, GRND_RANDOM); ^ 2 errors generated. make[2]: *** [rndgetentropy.lo] Error 1 make[2]: Leaving directory `/Users/take/Downloads/GnuPG/libgcrypt-1.10.2/random' make[1]: *** [all-recursive] Error 1 make[1]: Leaving directory `/Users/take/Downloads/GnuPG/libgcrypt-1.10.2' make: *** [all] Error 2 --- Unfortunately I don't know how to make this 'make' passable. I am very sorry that this is not about "GnuPG". Could you please advise me how to avoid this error? My environment is as follows. Also, ". /configure" output is attached. OS : macOS 13.3.1 (a) / Command Line Tools for Xcode 14.3 Platform : Darwin (x86_64-apple-darwin22.4.0) Sincerely yours. --- WATANABE, Takeo take at kasaneiro.jp -------------- next part -------------- checking for a BSD-compatible install... /usr/bin/install -c checking whether build environment is sane... yes checking for a thread-safe mkdir -p... build-aux/install-sh -c -d checking for gawk... no checking for mawk... no checking for nawk... no checking for awk... awk checking whether make sets $(MAKE)... yes checking whether make supports nested variables... yes checking build system type... x86_64-apple-darwin22.4.0 checking host system type... x86_64-apple-darwin22.4.0 checking whether to enable maintainer-specific portions of Makefiles... yes checking whether make supports nested variables... (cached) yes checking whether make supports the include directive... yes (GNU style) checking for gcc... gcc checking whether the C compiler works... yes checking for C compiler default output file name... a.out checking for suffix of executables... checking whether we are cross compiling... no checking for suffix of object files... o checking whether we are using the GNU C compiler... yes checking whether gcc accepts -g... yes checking for gcc option to accept ISO C89... none needed checking whether gcc understands -c and -o together... yes checking dependency style of gcc... gcc3 checking how to run the C preprocessor... gcc -E checking for grep that handles long lines and -e... /usr/bin/grep checking for egrep... /usr/bin/grep -E checking for ANSI C header files... yes checking for sys/types.h... yes checking for sys/stat.h... yes checking for stdlib.h... yes checking for string.h... yes checking for memory.h... yes checking for strings.h... yes checking for inttypes.h... yes checking for stdint.h... yes checking for unistd.h... yes checking minix/config.h usability... no checking minix/config.h presence... no checking for minix/config.h... no checking whether it is safe to define __EXTENSIONS__... yes checking whether make sets $(MAKE)... (cached) yes checking for gcc... (cached) gcc checking whether we are using the GNU C compiler... (cached) yes checking whether gcc accepts -g... (cached) yes checking for gcc option to accept ISO C89... (cached) none needed checking whether gcc understands -c and -o together... (cached) yes checking dependency style of gcc... (cached) gcc3 checking how to run the C preprocessor... gcc -E checking dependency style of gcc... gcc3 checking for library containing strerror... none required checking for gawk... (cached) awk checking how to print strings... printf checking for a sed that does not truncate output... /usr/bin/sed checking for fgrep... /usr/bin/grep -F checking for ld used by gcc... /Library/Developer/CommandLineTools/usr/bin/ld checking if the linker (/Library/Developer/CommandLineTools/usr/bin/ld) is GNU ld... no checking for BSD- or MS-compatible name lister (nm)... /usr/local/bin/nm -B checking the name lister (/usr/local/bin/nm -B) interface... BSD nm checking whether ln -s works... yes checking the maximum length of command line arguments... 786432 checking whether the shell understands some XSI constructs... yes checking whether the shell understands "+="... yes checking how to convert x86_64-apple-darwin22.4.0 file names to x86_64-apple-darwin22.4.0 format... func_convert_file_noop checking how to convert x86_64-apple-darwin22.4.0 file names to toolchain format... func_convert_file_noop checking for /Library/Developer/CommandLineTools/usr/bin/ld option to reload object files... -r checking for objdump... objdump checking how to recognize dependent libraries... pass_all checking for dlltool... no checking how to associate runtime and link libraries... printf %s\n checking for ar... ar checking for archiver @FILE support... @ checking for strip... strip checking for ranlib... ranlib checking command to parse /usr/local/bin/nm -B output from gcc object... ok checking for sysroot... no checking for mt... no checking if : is a manifest tool... no checking for dsymutil... dsymutil checking for nmedit... nmedit checking for lipo... lipo checking for otool... otool checking for otool64... no checking for -single_module linker flag... yes checking for -exported_symbols_list linker flag... yes checking for -force_load linker flag... no checking for dlfcn.h... yes checking for objdir... .libs checking if gcc supports -fno-rtti -fno-exceptions... yes checking for gcc option to produce PIC... -fno-common -DPIC checking if gcc PIC flag -fno-common -DPIC works... yes checking if gcc static flag -static works... no checking if gcc supports -c -o file.o... yes checking if gcc supports -c -o file.o... (cached) yes checking whether the gcc linker (/Library/Developer/CommandLineTools/usr/bin/ld) supports shared libraries... yes checking dynamic linker characteristics... darwin22.4.0 dyld checking how to hardcode library paths into programs... immediate checking whether stripping libraries is possible... yes checking if libtool supports shared libraries... yes checking whether to build shared libraries... yes checking whether to build static libraries... no checking for windres... no checking spawn.h usability... yes checking spawn.h presence... yes checking for spawn.h... yes checking whether byte ordering is bigendian... no checking size of unsigned short... 2 checking size of unsigned int... 4 checking size of unsigned long... 8 checking size of unsigned long long... 8 checking size of void *... 8 checking for uintptr_t... yes checking for UINT64_C... yes checking size of uint64_t... 8 checking which symmetric ciphers to include... arcfour blowfish cast5 des aes twofish serpent rfc2268 seed camellia idea salsa20 gost28147 chacha20 sm4 checking which public-key ciphers to include... dsa elgamal rsa ecc checking which message digests to include... crc gostr3411-94 md4 md5 rmd160 sha1 sha256 sha512 sha3 tiger whirlpool stribog blake2 sm3 checking which key derivation functions to include... s2k pkdf2 scrypt checking which random module to use... default checking whether use of /dev/random is requested... yes checking whether the experimental random daemon is requested... no checking whether MPI and cipher assembler modules are requested... yes checking whether memory guard is requested... no checking whether to run large data tests... no checking whether 'soft' HW feature bits are forced on... no checking whether use of capabilities is requested... no checking whether a HMAC binary check is requested... no checking whether jitter entropy support is requested... yes checking whether padlock support is requested... yes checking whether AESNI support is requested... yes checking whether SHAEXT support is requested... yes checking whether PCLMUL support is requested... yes checking whether SSE4.1 support is requested... yes checking whether DRNG support is requested... yes checking whether AVX support is requested... yes checking whether AVX2 support is requested... yes checking whether NEON support is requested... yes checking whether ARMv8 Crypto Extension support is requested... yes checking whether PPC crypto support is requested... yes checking whether a -O flag munging is requested... yes checking whether a instrumentation (-fprofile, -fsanitize) munging is requested... yes checking whether to enable AMD64 as(1) feature detection... yes checking for gpg-error-config... no checking for gpgrt-config... /usr/local/bin/gpgrt-config configure: Use gpgrt-config with /usr/local/lib as gpg-error-config checking for GPG Error - version >= 1.27... yes (1.47) checking for pthread_create in -lpthread... yes checking for library containing setsockopt... none required checking for library containing setsockopt... (cached) none required checking for unistd.h... (cached) yes checking sys/auxv.h usability... no checking sys/auxv.h presence... no checking for sys/auxv.h... no checking sys/random.h usability... yes checking sys/random.h presence... yes checking for sys/random.h... yes checking for an ANSI C-conforming const... yes checking for inline... inline checking for size_t... yes checking for pid_t... yes checking for byte... no checking for ushort... yes checking for u16... no checking for u32... no checking for u64... no checking for sys/socket.h... yes checking for socklen_t... yes checking for __builtin_bswap32... yes checking for __builtin_bswap64... yes checking for __builtin_ctz... yes checking for __builtin_ctzl... yes checking for __builtin_clz... yes checking for __builtin_clzl... yes checking for __sync_synchronize... yes checking whether the variable length arrays are supported... yes checking whether the visibility attribute is supported... no checking whether the GCC style aligned attribute is supported... yes checking whether the GCC style packed attribute is supported... yes checking whether the GCC style may_alias attribute is supported... yes checking whether 'asm' assembler keyword is supported... yes checking whether '__asm__' assembler keyword is supported... yes checking whether inline assembly memory barrier is supported... yes checking whether GCC assembler is compatible for ARM assembly implementations... no checking whether GCC assembler is compatible for ARMv8/Aarch64 assembly implementations... no checking whether GCC assembler supports for CFI directives... no checking whether GCC assembler supports for ELF directives... no checking for _ prefix in compiled symbols... yes checking architecture and mpi assembler functions... x86 checking whether compiler supports 'ms_abi' function attribute... yes checking whether compiler supports 'sysv_abi' function attribute... yes checking whether default calling convention is 'ms_abi'... no checking whether default calling convention is 'sysv_abi'... yes checking whether GCC inline assembler supports SSSE3 instructions... yes checking whether GCC inline assembler supports PCLMUL instructions... yes checking whether GCC inline assembler supports SHA Extensions instructions... yes checking whether GCC inline assembler supports SSE4.1 instructions... yes checking whether GCC inline assembler supports AVX instructions... yes checking whether GCC inline assembler supports AVX2 instructions... yes checking whether GCC inline assembler supports VAES and VPCLMUL instructions... yes checking whether GCC inline assembler supports BMI2 instructions... yes checking whether GCC assembler handles division correctly... no checking whether GCC assembler handles division correctly with "-Wa,--divide"... no checking whether GCC assembler is compatible for amd64 assembly implementations... no checking whether GCC assembler is compatible for Intel syntax assembly implementations... no checking whether compiler is configured for ARMv6 or newer architecture... n/a checking whether GCC inline assembler supports NEON instructions... n/a checking whether GCC inline assembler supports AArch32 Crypto Extension instructions... n/a checking whether GCC inline assembler supports AArch64 NEON instructions... n/a checking whether GCC inline assembler supports AArch64 Crypto Extension instructions... n/a checking whether compiler supports PowerPC AltiVec/VSX intrinsics... n/a checking whether GCC inline assembler supports PowerPC AltiVec/VSX/crypto instructions... n/a checking whether GCC inline assembler supports PowerISA 3.00 instructions... n/a checking whether GCC inline assembler supports zSeries instructions... n/a checking whether GCC inline assembler supports zSeries vector instructions... n/a checking for vprintf... yes checking for _doprnt... no checking for stpcpy... yes checking for strcasecmp... yes checking for strtoul... yes checking for memmove... yes checking for stricmp... no checking for atexit... yes checking for raise... yes checking for strerror... yes checking for rand... yes checking for mmap... yes checking for getpagesize... yes checking for sysconf... yes checking for waitpid... yes checking for wait4... yes checking for gettimeofday... yes checking for getrusage... yes checking for gethrtime... no checking for clock_gettime... yes checking for syslog... yes checking for syscall... yes checking for fcntl... yes checking for ftruncate... yes checking for flockfile... yes checking for getauxval... no checking for elf_aux_info... no checking for explicit_bzero... no checking for explicit_memset... no checking for getentropy... yes checking for mlock... yes checking for sysconf... (cached) yes checking for getpagesize... (cached) yes checking whether mlock is broken... no checking for getpid... yes checking for clock... yes checking for random device... yes configure: checking for cc features checking if gcc supports -fno-delete-null-pointer-checks... yes checking if gcc supports -Wno-missing-field-initializers... yes checking if gcc supports -Wpointer-arith... yes checking whether non excutable stack support is requested... yes checking whether assembler supports --noexecstack option... no checking that generated files are newer than configure... done configure: creating ./config.status config.status: creating Makefile config.status: creating m4/Makefile config.status: creating compat/Makefile config.status: creating mpi/Makefile config.status: creating cipher/Makefile config.status: creating random/Makefile config.status: creating doc/Makefile config.status: creating src/Makefile config.status: creating src/gcrypt.h config.status: creating src/libgcrypt-config config.status: creating src/libgcrypt.pc config.status: creating src/versioninfo.rc config.status: creating tests/Makefile config.status: creating tests/hashtest-256g config.status: creating tests/basic-disable-all-hwf config.status: creating config.h config.status: linking mpi/amd64/mpih-add1.S to mpi/mpih-add1-asm.S config.status: linking mpi/amd64/mpih-sub1.S to mpi/mpih-sub1-asm.S config.status: linking mpi/amd64/mpih-mul1.S to mpi/mpih-mul1-asm.S config.status: linking mpi/amd64/mpih-mul2.S to mpi/mpih-mul2-asm.S config.status: linking mpi/amd64/mpih-mul3.S to mpi/mpih-mul3-asm.S config.status: linking mpi/amd64/mpih-lshift.S to mpi/mpih-lshift-asm.S config.status: linking mpi/amd64/mpih-rshift.S to mpi/mpih-rshift-asm.S config.status: linking mpi/amd64/mpi-asm-defs.h to mpi/mpi-asm-defs.h config.status: executing depfiles commands config.status: executing libtool commands config.status: executing gcrypt-conf commands Libgcrypt v1.10.2 has been configured as follows: Platform: Darwin (x86_64-apple-darwin22.4.0) Hardware detection module: libgcrypt_la-hwf-x86 Enabled cipher algorithms: arcfour blowfish cast5 des aes twofish serpent rfc2268 seed camellia idea salsa20 gost28147 chacha20 sm4 Enabled digest algorithms: crc gostr3411-94 md4 md5 rmd160 sha1 sha256 sha512 sha3 tiger whirlpool stribog blake2 sm3 Enabled kdf algorithms: s2k pkdf2 scrypt Enabled pubkey algorithms: dsa elgamal rsa ecc Random number generator: default Try using jitter entropy: yes Using linux capabilities: no FIPS module version: Try using Padlock crypto: yes Try using AES-NI crypto: yes Try using Intel SHAEXT: yes Try using Intel PCLMUL: yes Try using Intel SSE4.1: yes Try using DRNG (RDRAND): yes Try using Intel AVX: yes Try using Intel AVX2: yes Try using ARM NEON: n/a Try using ARMv8 crypto: n/a Try using PPC crypto: n/a From take at kasaneiro.jp Thu May 4 17:31:53 2023 From: take at kasaneiro.jp (WATANABE Takeo) Date: Fri, 05 May 2023 00:31:53 +0900 (JST) Subject: About Problem of Error when making "libgcrypt" [rndgetentropy.c ] Message-ID: <20230505.003153.1079694876199004300.take@kasaneiro.jp> Dear. GnuPG-Users ML members When making "libgcrypt ver1.10.2" and "libgcrypt ver1.8.10", I got the following problem of error and the compilation could not proceed. (Output is line-breaked where appropriate.) --- libtool: compile: gcc -DHAVE_CONFIG_H -I. -I.. -I../src -I../src -I/usr/local/include -g -O2 -fno-delete-null-pointer-checks -Wall -Wcast-align -Wshadow -Wstrict-prototypes -Wformat -Wno-format-y2k -Wformat-security -W -Wextra -Wbad-function-cast -Wwrite-strings -Wdeclaration-after-statement -Wno-missing-field-initializers -Wno-sign-compare -Wpointer-arith -MT rndgetentropy.lo -MD -MP -MF .deps/rndgetentropy.Tpo -c rndgetentropy.c -fno-common -DPIC -o .libs/rndgetentropy.orndgetentropy.c:98:21: error: call to undeclared function 'getrandom'; ISO C99 and later do not support implicit function declarations [-Wimplicit-function-declaration] ret = getrandom (buffer, nbytes, GRND_RANDOM); ^ rndgetentropy.c:98:48: error: use of undeclared identifier 'GRND_RANDOM' ret = getrandom (buffer, nbytes, GRND_RANDOM); ^ 2 errors generated. make[2]: *** [rndgetentropy.lo] Error 1 make[2]: Leaving directory `/Users/take/Downloads/GnuPG/libgcrypt-1.10.2/random' make[1]: *** [all-recursive] Error 1 make[1]: Leaving directory `/Users/take/Downloads/GnuPG/libgcrypt-1.10.2' make: *** [all] Error 2 --- Unfortunately I don't know how to make this 'make' passable. Could you please advise how to bypass this error? My environment is as follows. Also, ". /configure" output is attached. OS : macOS 13.3.1 (a) / Command Line Tools for Xcode 14.3 Platform : Darwin (x86_64-apple-darwin22.4.0) Sincerely yours. --- WATANABE, Takeo take at kasaneiro.jp C -------------- next part -------------- checking for a BSD-compatible install... /usr/bin/install -c checking whether build environment is sane... yes checking for a thread-safe mkdir -p... build-aux/install-sh -c -d checking for gawk... no checking for mawk... no checking for nawk... no checking for awk... awk checking whether make sets $(MAKE)... yes checking whether make supports nested variables... yes checking build system type... x86_64-apple-darwin22.4.0 checking host system type... x86_64-apple-darwin22.4.0 checking whether to enable maintainer-specific portions of Makefiles... yes checking whether make supports nested variables... (cached) yes checking whether make supports the include directive... yes (GNU style) checking for gcc... gcc checking whether the C compiler works... yes checking for C compiler default output file name... a.out checking for suffix of executables... checking whether we are cross compiling... no checking for suffix of object files... o checking whether we are using the GNU C compiler... yes checking whether gcc accepts -g... yes checking for gcc option to accept ISO C89... none needed checking whether gcc understands -c and -o together... yes checking dependency style of gcc... gcc3 checking how to run the C preprocessor... gcc -E checking for grep that handles long lines and -e... /usr/bin/grep checking for egrep... /usr/bin/grep -E checking for ANSI C header files... yes checking for sys/types.h... yes checking for sys/stat.h... yes checking for stdlib.h... yes checking for string.h... yes checking for memory.h... yes checking for strings.h... yes checking for inttypes.h... yes checking for stdint.h... yes checking for unistd.h... yes checking minix/config.h usability... no checking minix/config.h presence... no checking for minix/config.h... no checking whether it is safe to define __EXTENSIONS__... yes checking whether make sets $(MAKE)... (cached) yes checking for gcc... (cached) gcc checking whether we are using the GNU C compiler... (cached) yes checking whether gcc accepts -g... (cached) yes checking for gcc option to accept ISO C89... (cached) none needed checking whether gcc understands -c and -o together... (cached) yes checking dependency style of gcc... (cached) gcc3 checking how to run the C preprocessor... gcc -E checking dependency style of gcc... gcc3 checking for library containing strerror... none required checking for gawk... (cached) awk checking how to print strings... printf checking for a sed that does not truncate output... /usr/bin/sed checking for fgrep... /usr/bin/grep -F checking for ld used by gcc... /Library/Developer/CommandLineTools/usr/bin/ld checking if the linker (/Library/Developer/CommandLineTools/usr/bin/ld) is GNU ld... no checking for BSD- or MS-compatible name lister (nm)... /usr/local/bin/nm -B checking the name lister (/usr/local/bin/nm -B) interface... BSD nm checking whether ln -s works... yes checking the maximum length of command line arguments... 786432 checking whether the shell understands some XSI constructs... yes checking whether the shell understands "+="... yes checking how to convert x86_64-apple-darwin22.4.0 file names to x86_64-apple-darwin22.4.0 format... func_convert_file_noop checking how to convert x86_64-apple-darwin22.4.0 file names to toolchain format... func_convert_file_noop checking for /Library/Developer/CommandLineTools/usr/bin/ld option to reload object files... -r checking for objdump... objdump checking how to recognize dependent libraries... pass_all checking for dlltool... no checking how to associate runtime and link libraries... printf %s\n checking for ar... ar checking for archiver @FILE support... @ checking for strip... strip checking for ranlib... ranlib checking command to parse /usr/local/bin/nm -B output from gcc object... ok checking for sysroot... no checking for mt... no checking if : is a manifest tool... no checking for dsymutil... dsymutil checking for nmedit... nmedit checking for lipo... lipo checking for otool... otool checking for otool64... no checking for -single_module linker flag... yes checking for -exported_symbols_list linker flag... yes checking for -force_load linker flag... no checking for dlfcn.h... yes checking for objdir... .libs checking if gcc supports -fno-rtti -fno-exceptions... yes checking for gcc option to produce PIC... -fno-common -DPIC checking if gcc PIC flag -fno-common -DPIC works... yes checking if gcc static flag -static works... no checking if gcc supports -c -o file.o... yes checking if gcc supports -c -o file.o... (cached) yes checking whether the gcc linker (/Library/Developer/CommandLineTools/usr/bin/ld) supports shared libraries... yes checking dynamic linker characteristics... darwin22.4.0 dyld checking how to hardcode library paths into programs... immediate checking whether stripping libraries is possible... yes checking if libtool supports shared libraries... yes checking whether to build shared libraries... yes checking whether to build static libraries... no checking for windres... no checking spawn.h usability... yes checking spawn.h presence... yes checking for spawn.h... yes checking whether byte ordering is bigendian... no checking size of unsigned short... 2 checking size of unsigned int... 4 checking size of unsigned long... 8 checking size of unsigned long long... 8 checking size of void *... 8 checking for uintptr_t... yes checking for UINT64_C... yes checking size of uint64_t... 8 checking which symmetric ciphers to include... arcfour blowfish cast5 des aes twofish serpent rfc2268 seed camellia idea salsa20 gost28147 chacha20 sm4 checking which public-key ciphers to include... dsa elgamal rsa ecc checking which message digests to include... crc gostr3411-94 md4 md5 rmd160 sha1 sha256 sha512 sha3 tiger whirlpool stribog blake2 sm3 checking which key derivation functions to include... s2k pkdf2 scrypt checking which random module to use... default checking whether use of /dev/random is requested... yes checking whether the experimental random daemon is requested... no checking whether MPI and cipher assembler modules are requested... yes checking whether memory guard is requested... no checking whether to run large data tests... no checking whether 'soft' HW feature bits are forced on... no checking whether use of capabilities is requested... no checking whether a HMAC binary check is requested... no checking whether jitter entropy support is requested... yes checking whether padlock support is requested... yes checking whether AESNI support is requested... yes checking whether SHAEXT support is requested... yes checking whether PCLMUL support is requested... yes checking whether SSE4.1 support is requested... yes checking whether DRNG support is requested... yes checking whether AVX support is requested... yes checking whether AVX2 support is requested... yes checking whether NEON support is requested... yes checking whether ARMv8 Crypto Extension support is requested... yes checking whether PPC crypto support is requested... yes checking whether a -O flag munging is requested... yes checking whether a instrumentation (-fprofile, -fsanitize) munging is requested... yes checking whether to enable AMD64 as(1) feature detection... yes checking for gpg-error-config... no checking for gpgrt-config... /usr/local/bin/gpgrt-config configure: Use gpgrt-config with /usr/local/lib as gpg-error-config checking for GPG Error - version >= 1.27... yes (1.47) checking for pthread_create in -lpthread... yes checking for library containing setsockopt... none required checking for library containing setsockopt... (cached) none required checking for unistd.h... (cached) yes checking sys/auxv.h usability... no checking sys/auxv.h presence... no checking for sys/auxv.h... no checking sys/random.h usability... yes checking sys/random.h presence... yes checking for sys/random.h... yes checking for an ANSI C-conforming const... yes checking for inline... inline checking for size_t... yes checking for pid_t... yes checking for byte... no checking for ushort... yes checking for u16... no checking for u32... no checking for u64... no checking for sys/socket.h... yes checking for socklen_t... yes checking for __builtin_bswap32... yes checking for __builtin_bswap64... yes checking for __builtin_ctz... yes checking for __builtin_ctzl... yes checking for __builtin_clz... yes checking for __builtin_clzl... yes checking for __sync_synchronize... yes checking whether the variable length arrays are supported... yes checking whether the visibility attribute is supported... no checking whether the GCC style aligned attribute is supported... yes checking whether the GCC style packed attribute is supported... yes checking whether the GCC style may_alias attribute is supported... yes checking whether 'asm' assembler keyword is supported... yes checking whether '__asm__' assembler keyword is supported... yes checking whether inline assembly memory barrier is supported... yes checking whether GCC assembler is compatible for ARM assembly implementations... no checking whether GCC assembler is compatible for ARMv8/Aarch64 assembly implementations... no checking whether GCC assembler supports for CFI directives... no checking whether GCC assembler supports for ELF directives... no checking for _ prefix in compiled symbols... yes checking architecture and mpi assembler functions... x86 checking whether compiler supports 'ms_abi' function attribute... yes checking whether compiler supports 'sysv_abi' function attribute... yes checking whether default calling convention is 'ms_abi'... no checking whether default calling convention is 'sysv_abi'... yes checking whether GCC inline assembler supports SSSE3 instructions... yes checking whether GCC inline assembler supports PCLMUL instructions... yes checking whether GCC inline assembler supports SHA Extensions instructions... yes checking whether GCC inline assembler supports SSE4.1 instructions... yes checking whether GCC inline assembler supports AVX instructions... yes checking whether GCC inline assembler supports AVX2 instructions... yes checking whether GCC inline assembler supports VAES and VPCLMUL instructions... yes checking whether GCC inline assembler supports BMI2 instructions... yes checking whether GCC assembler handles division correctly... no checking whether GCC assembler handles division correctly with "-Wa,--divide"... no checking whether GCC assembler is compatible for amd64 assembly implementations... no checking whether GCC assembler is compatible for Intel syntax assembly implementations... no checking whether compiler is configured for ARMv6 or newer architecture... n/a checking whether GCC inline assembler supports NEON instructions... n/a checking whether GCC inline assembler supports AArch32 Crypto Extension instructions... n/a checking whether GCC inline assembler supports AArch64 NEON instructions... n/a checking whether GCC inline assembler supports AArch64 Crypto Extension instructions... n/a checking whether compiler supports PowerPC AltiVec/VSX intrinsics... n/a checking whether GCC inline assembler supports PowerPC AltiVec/VSX/crypto instructions... n/a checking whether GCC inline assembler supports PowerISA 3.00 instructions... n/a checking whether GCC inline assembler supports zSeries instructions... n/a checking whether GCC inline assembler supports zSeries vector instructions... n/a checking for vprintf... yes checking for _doprnt... no checking for stpcpy... yes checking for strcasecmp... yes checking for strtoul... yes checking for memmove... yes checking for stricmp... no checking for atexit... yes checking for raise... yes checking for strerror... yes checking for rand... yes checking for mmap... yes checking for getpagesize... yes checking for sysconf... yes checking for waitpid... yes checking for wait4... yes checking for gettimeofday... yes checking for getrusage... yes checking for gethrtime... no checking for clock_gettime... yes checking for syslog... yes checking for syscall... yes checking for fcntl... yes checking for ftruncate... yes checking for flockfile... yes checking for getauxval... no checking for elf_aux_info... no checking for explicit_bzero... no checking for explicit_memset... no checking for getentropy... yes checking for mlock... yes checking for sysconf... (cached) yes checking for getpagesize... (cached) yes checking whether mlock is broken... no checking for getpid... yes checking for clock... yes checking for random device... yes configure: checking for cc features checking if gcc supports -fno-delete-null-pointer-checks... yes checking if gcc supports -Wno-missing-field-initializers... yes checking if gcc supports -Wpointer-arith... yes checking whether non excutable stack support is requested... yes checking whether assembler supports --noexecstack option... no checking that generated files are newer than configure... done configure: creating ./config.status config.status: creating Makefile config.status: creating m4/Makefile config.status: creating compat/Makefile config.status: creating mpi/Makefile config.status: creating cipher/Makefile config.status: creating random/Makefile config.status: creating doc/Makefile config.status: creating src/Makefile config.status: creating src/gcrypt.h config.status: creating src/libgcrypt-config config.status: creating src/libgcrypt.pc config.status: creating src/versioninfo.rc config.status: creating tests/Makefile config.status: creating tests/hashtest-256g config.status: creating tests/basic-disable-all-hwf config.status: creating config.h config.status: linking mpi/amd64/mpih-add1.S to mpi/mpih-add1-asm.S config.status: linking mpi/amd64/mpih-sub1.S to mpi/mpih-sub1-asm.S config.status: linking mpi/amd64/mpih-mul1.S to mpi/mpih-mul1-asm.S config.status: linking mpi/amd64/mpih-mul2.S to mpi/mpih-mul2-asm.S config.status: linking mpi/amd64/mpih-mul3.S to mpi/mpih-mul3-asm.S config.status: linking mpi/amd64/mpih-lshift.S to mpi/mpih-lshift-asm.S config.status: linking mpi/amd64/mpih-rshift.S to mpi/mpih-rshift-asm.S config.status: linking mpi/amd64/mpi-asm-defs.h to mpi/mpi-asm-defs.h config.status: executing depfiles commands config.status: executing libtool commands config.status: executing gcrypt-conf commands Libgcrypt v1.10.2 has been configured as follows: Platform: Darwin (x86_64-apple-darwin22.4.0) Hardware detection module: libgcrypt_la-hwf-x86 Enabled cipher algorithms: arcfour blowfish cast5 des aes twofish serpent rfc2268 seed camellia idea salsa20 gost28147 chacha20 sm4 Enabled digest algorithms: crc gostr3411-94 md4 md5 rmd160 sha1 sha256 sha512 sha3 tiger whirlpool stribog blake2 sm3 Enabled kdf algorithms: s2k pkdf2 scrypt Enabled pubkey algorithms: dsa elgamal rsa ecc Random number generator: default Try using jitter entropy: yes Using linux capabilities: no FIPS module version: Try using Padlock crypto: yes Try using AES-NI crypto: yes Try using Intel SHAEXT: yes Try using Intel PCLMUL: yes Try using Intel SSE4.1: yes Try using DRNG (RDRAND): yes Try using Intel AVX: yes Try using Intel AVX2: yes Try using ARM NEON: n/a Try using ARMv8 crypto: n/a Try using PPC crypto: n/a From wk at gnupg.org Fri May 5 10:45:52 2023 From: wk at gnupg.org (Werner Koch) Date: Fri, 05 May 2023 10:45:52 +0200 Subject: Error when making "libgcrypt" [rndgetentropy.c ] In-Reply-To: <20230504.221518.1450224712191780766.take@kasaneiro.jp> (WATANABE Takeo's message of "Thu, 04 May 2023 22:15:18 +0900 (JST)") References: <20230504.221518.1450224712191780766.take@kasaneiro.jp> Message-ID: <87ednvw4hr.fsf@wheatstone.g10code.de> Hi! > rndgetentropy.c:98:48: error: use of undeclared identifier 'GRND_RANDOM' > ret = getrandom (buffer, nbytes, GRND_RANDOM); > OS : macOS 13.3.1 (a) / Command Line Tools for Xcode 14.3 > Platform : Darwin (x86_64-apple-darwin22.4.0) There is a glitch in 1.10 which affects macOS. Please see https://dev.gnupg.org/T6442 which has a patch. It should also be possible to use ./configure --enable-random=linux which uses the old /dev/random entrop gatherer. Shalom-Salam, Werner -- The pioneers of a warless world are the youth that refuse military service. - A. Einstein -------------- next part -------------- A non-text attachment was scrubbed... Name: openpgp-digital-signature.asc Type: application/pgp-signature Size: 227 bytes Desc: not available URL: From ineiev at gnu.org Fri May 5 18:55:24 2023 From: ineiev at gnu.org (Ineiev) Date: Fri, 5 May 2023 16:55:24 +0000 Subject: out-of-key UIDs [was: ADK's] In-Reply-To: <65178614-13F7-4852-A7A9-CDCA5B4C7450@andrewg.com> References: <20230501113851.GC13977@manas> <8F6EEFCA-59B6-491B-852A-512CF5BCDDDB@andrewg.com> <65178614-13F7-4852-A7A9-CDCA5B4C7450@andrewg.com> Message-ID: <20230505165524.GB5453@manas> On Thu, May 04, 2023 at 11:01:36AM +0100, Andrew Gallagher wrote: > > I tried something like this with my MUA, I believe that doesn't work: > > it first looks for appropriate keys, probably using --list-keys; > > in fact, it insists on choosing a single key when multiple ones > > are available. > > Which MUA is this? Mutt. From andrewg at andrewg.com Fri May 5 19:05:47 2023 From: andrewg at andrewg.com (Andrew Gallagher) Date: Fri, 5 May 2023 18:05:47 +0100 Subject: out-of-key UIDs [was: ADK's] In-Reply-To: <20230505165524.GB5453@manas> References: <20230501113851.GC13977@manas> <8F6EEFCA-59B6-491B-852A-512CF5BCDDDB@andrewg.com> <65178614-13F7-4852-A7A9-CDCA5B4C7450@andrewg.com> <20230505165524.GB5453@manas> Message-ID: <0116BD62-48FE-4171-9491-81CD4DF25F05@andrewg.com> On 5 May 2023, at 17:55, Ineiev wrote: > > On Thu, May 04, 2023 at 11:01:36AM +0100, Andrew Gallagher wrote: >>> I tried something like this with my MUA, I believe that doesn't work: >>> it first looks for appropriate keys, probably using --list-keys; >>> in fact, it insists on choosing a single key when multiple ones >>> are available. >> >> Which MUA is this? > > Mutt. Ah, I see this has been raised before as a missing feature in [neo]mutt: https://github.com/neomutt/neomutt/issues/404 A -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 833 bytes Desc: Message signed with OpenPGP URL: From take at kasaneiro.jp Sun May 7 03:17:37 2023 From: take at kasaneiro.jp (WATANABE Takeo) Date: Sun, 07 May 2023 10:17:37 +0900 (JST) Subject: Error when making "libgcrypt" [rndgetentropy.c ] In-Reply-To: <87ednvw4hr.fsf@wheatstone.g10code.de> References: <20230504.221518.1450224712191780766.take@kasaneiro.jp> <87ednvw4hr.fsf@wheatstone.g10code.de> Message-ID: <20230507.101737.2032287572084591303.take@kasaneiro.jp> Hi. on Fri, 05 May 2023 10:45:52 +0200 Werner Koch wrote: >> rndgetentropy.c:98:48: error: use of undeclared identifier 'GRND_RANDOM' >> ret = getrandom (buffer, nbytes, GRND_RANDOM); > >> OS : macOS 13.3.1 (a) / Command Line Tools for Xcode 14.3 >> Platform : Darwin (x86_64-apple-darwin22.4.0) > > There is a glitch in 1.10 which affects macOS. Please see > > https://dev.gnupg.org/T6442 > > which has a patch. It should also be possible to use > > ./configure --enable-random=linux > > which uses the old /dev/random entrop gatherer. I applied the three patches listed on the indicated webpage, and make went through without any problems. Thank you very much for your help. Sincerely yours --- WATANABE, Takeo take at kasaneiro.jp From dimxrss at gmail.com Tue May 9 16:48:31 2023 From: dimxrss at gmail.com (Dim Xr) Date: Tue, 9 May 2023 17:48:31 +0300 Subject: GPGME question about ciphertext and plaintext sizes Message-ID: Hello all, I'm currently working on a userspace block device driver. I want to add encryption on it, and that's how I came across GPGME. My question is: is there a way to encrypt a plaintext and get a ciphertext of **exactly** the same size? Is there any way to have FPE (Format Preserving Encryption) via GPGME? >From my research so far, it doesn't seem to exist one. Even symmetric algorithms are using metadata on the ciphertext so the size is always bigger than the corresponding plaintext. All suggestions are welcome! Thanks. -------------- next part -------------- An HTML attachment was scrubbed... URL: From wk at gnupg.org Wed May 10 12:59:07 2023 From: wk at gnupg.org (Werner Koch) Date: Wed, 10 May 2023 12:59:07 +0200 Subject: GPGME question about ciphertext and plaintext sizes In-Reply-To: (Dim Xr via Gnupg-users's message of "Tue, 9 May 2023 17:48:31 +0300") References: Message-ID: <87ednotptw.fsf@wheatstone.g10code.de> On Tue, 9 May 2023 17:48, Dim Xr said: > same size? Is there any way to have FPE (Format Preserving Encryption) via > GPGME? No. GPGME uses the OpenPGP and S/MIME protocols (gpg and gpgsm) and is not suitable for your task. You need to use a low level crypto library for that (e.g. Libgcrypt) and decide which algorithm, mode and additional information you use. For example it is possible to create an IV or nonce from the block number but there are many security pitfalls. You may want to read some papers about crypto file systems and look at implementations for Linux and *BSD. In GnuPG we have a disk encryption tools (g13) but that takes only care of encrypting the actual symmetric encryption key. Everything else is left to dmcrypt. Shalom-Salam, Werner -- The pioneers of a warless world are the youth that refuse military service. - A. Einstein -------------- next part -------------- A non-text attachment was scrubbed... Name: openpgp-digital-signature.asc Type: application/pgp-signature Size: 227 bytes Desc: not available URL: From dimxrss at gmail.com Wed May 10 13:43:46 2023 From: dimxrss at gmail.com (Dim Xr) Date: Wed, 10 May 2023 14:43:46 +0300 Subject: GPGME question about ciphertext and plaintext sizes In-Reply-To: <87ednotptw.fsf@wheatstone.g10code.de> References: <87ednotptw.fsf@wheatstone.g10code.de> Message-ID: Thank you Werner. You need to use a low level crypto library > for that (e.g. Libgcrypt) and decide which algorithm, mode and > additional information you use. > OK I'll check it out. Searching on the mailing list responses I came across with Libgcrypt again, but I've read that it is quite low-level library so you have to be some kind of guru to use it. :-) I'm far from a security expert, that's why I needed a more higher level solution for this. But definitely I'll give it a shot. Do you know if OpenSSL is suitable for this task? Dim. -------------- next part -------------- An HTML attachment was scrubbed... URL: From guillermo13325 at gmail.com Fri May 12 22:08:04 2023 From: guillermo13325 at gmail.com (Guillermo Montoya Naranjo) Date: Fri, 12 May 2023 15:08:04 -0500 Subject: "gpg: no valid OpenPGP data found" error when importing public key from sks Message-ID: Good afternoon, I have an sks server installed, which synchronizes with kleopatra, I create a pair of openPGPG keys, which I then publish to the sks server and it does it successfully, but when I execute the search option, it throws me the following error, as shown in the image gpg: no valid OpenPGP data found gpg: Total amount processed: 0 I have installed Gpg4win 4.1.0 and a sks 1.1.6 server -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Screenshot_1.png Type: image/png Size: 7963 bytes Desc: not available URL: From andrewg at andrewg.com Sun May 14 14:41:47 2023 From: andrewg at andrewg.com (Andrew Gallagher) Date: Sun, 14 May 2023 13:41:47 +0100 Subject: "gpg: no valid OpenPGP data found" error when importing public key from sks In-Reply-To: References: Message-ID: <9E6B4D58-9263-4982-98AC-59D20D8CAEE4@andrewg.com> Hi, Guillermo. You don?t say what sort of keys these are. V4? V5? Elliptic curve? Some recent kinds of keys may not be compatible with SKS. Have you compared with hockeypuck to see if it serves them any differently? Thanks, Andrew. > On 12 May 2023, at 21:08, Guillermo Montoya Naranjo via Gnupg-users wrote: > > Good afternoon, I have an sks server installed, which synchronizes with kleopatra, I create a pair of openPGPG keys, which I then publish to the sks server and it does it successfully, but when I execute the search option, it throws me the following error, as shown in the image > > gpg: no valid OpenPGP data found > gpg: Total amount processed: 0 > I have installed Gpg4win 4.1.0 and a sks 1.1.6 server > _______________________________________________ > Gnupg-users mailing list > Gnupg-users at gnupg.org > https://lists.gnupg.org/mailman/listinfo/gnupg-users -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 833 bytes Desc: Message signed with OpenPGP URL: From wk at gnupg.org Mon May 15 15:10:35 2023 From: wk at gnupg.org (Werner Koch) Date: Mon, 15 May 2023 15:10:35 +0200 Subject: GPGME question about ciphertext and plaintext sizes In-Reply-To: (Dim Xr via Gnupg-users's message of "Wed, 10 May 2023 14:43:46 +0300") References: <87ednotptw.fsf@wheatstone.g10code.de> Message-ID: <87fs7xsptg.fsf@wheatstone.g10code.de> On Wed, 10 May 2023 14:43, Dim Xr said: > I'm far from a security expert, that's why I needed a more > higher level solution for this. But definitely I'll give it a shot. Use DMCrypt under Linux or Veracrypt etc. Disk encryption is a complicated matter and you definitley should have some experience in this area. > Do you know if OpenSSL is suitable for this task? The same as Libgcrypt is. Shalom-Salam, Werner -- The pioneers of a warless world are the youth that refuse military service. - A. Einstein -------------- next part -------------- A non-text attachment was scrubbed... Name: openpgp-digital-signature.asc Type: application/pgp-signature Size: 227 bytes Desc: not available URL: From lists at lrose.de Tue May 16 01:19:28 2023 From: lists at lrose.de (LuKaRo) Date: Tue, 16 May 2023 01:19:28 +0200 Subject: GPG agent returns subset of keys for SSH Message-ID: <808145a1-5858-b327-efdb-8620b3fd1d42@lrose.de> Hi, I want to use gpg-agent to authenticate to an SSH server via key. This has previously worked on this machine when I was using a Nitrokey, now I imported the key that was on the Nitrokey locally from a backup, and SSH authentication no longer works. ssh -vvvv server lists these interesting messages: debug3: ssh_get_authentication_socket_path: path '/run/user/1000/gnupg/S.gpg-agent.ssh' debug2: get_agent_identities: ssh_agent_bind_hostkey: agent refused operation debug1: get_agent_identities: ssh_fetch_identitylist: agent contains no identities However, gpg --list-secret-keys shows this: sec?? rsa4096 2020-04-07 [SC] ????? 94B238AAE6682E5063896F2B7920D03B7AA7CD7B uid?????????? [ultimate] Lu Ro (New general key) ssb?? rsa4096 2020-04-07 [E] ssb?? rsa4096 2020-04-07 [A] So the authenticate subkey is indeed present. I executed ssh-add without arguments, and two keys were added from my .ssh directory. Now ssh -vvvv shows this: debug3: ssh_get_authentication_socket_path: path '/run/user/1000/gnupg/S.gpg-agent.ssh' debug2: get_agent_identities: ssh_agent_bind_hostkey: agent refused operation debug1: get_agent_identities: agent returned 2 keys So communication with the gpg-agent seems to work as well. Any ideas what could be the issue? Thanks in advance, lukaro From lists at lrose.de Tue May 16 01:22:19 2023 From: lists at lrose.de (LuKaRo) Date: Tue, 16 May 2023 01:22:19 +0200 Subject: Fwd: GPG agent returns subset of keys for SSH In-Reply-To: <808145a1-5858-b327-efdb-8620b3fd1d42@lrose.de> References: <808145a1-5858-b327-efdb-8620b3fd1d42@lrose.de> Message-ID: <3803bede-b26f-5ea7-f89d-6ce74c1cbe14@lrose.de> Hi, I want to use gpg-agent to authenticate to an SSH server via key. This has previously worked on this machine when I was using a Nitrokey, now I imported the key that was on the Nitrokey locally from a backup, and SSH authentication no longer works. ssh -vvvv server lists these interesting messages: debug3: ssh_get_authentication_socket_path: path '/run/user/1000/gnupg/S.gpg-agent.ssh' debug2: get_agent_identities: ssh_agent_bind_hostkey: agent refused operation debug1: get_agent_identities: ssh_fetch_identitylist: agent contains no identities However, gpg --list-secret-keys shows this: sec?? rsa4096 2020-04-07 [SC] ????? 94B238AAE6682E5063896F2B7920D03B7AA7CD7B uid?????????? [ultimate] Lu Ro (New general key) ssb?? rsa4096 2020-04-07 [E] ssb?? rsa4096 2020-04-07 [A] So the authenticate subkey is indeed present. I executed ssh-add without arguments, and two keys were added from my .ssh directory. Now ssh -vvvv shows this: debug3: ssh_get_authentication_socket_path: path '/run/user/1000/gnupg/S.gpg-agent.ssh' debug2: get_agent_identities: ssh_agent_bind_hostkey: agent refused operation debug1: get_agent_identities: agent returned 2 keys So communication with the gpg-agent seems to work as well. Any ideas what could be the issue? Thanks in advance, lukaro From wk at gnupg.org Tue May 16 16:45:44 2023 From: wk at gnupg.org (Werner Koch) Date: Tue, 16 May 2023 16:45:44 +0200 Subject: GPG agent returns subset of keys for SSH In-Reply-To: <808145a1-5858-b327-efdb-8620b3fd1d42@lrose.de> (LuKaRo's message of "Tue, 16 May 2023 01:19:28 +0200") References: <808145a1-5858-b327-efdb-8620b3fd1d42@lrose.de> Message-ID: <87cz30qqqv.fsf@wheatstone.g10code.de> On Tue, 16 May 2023 01:19, LuKaRo said: > '/run/user/1000/gnupg/S.gpg-agent.ssh' > debug2: get_agent_identities: ssh_agent_bind_hostkey: agent refused > operation You should log the other side of the things: Put log-file /whatever/you/want verbose debug ipc into ~/.gnupg/gpg-agent.conf and "gpgconf --kill gpg-agent". If you are not yet running 2.4 (or the older 2.3) you should definitely do so. Salam-Shalom, Werner -- The pioneers of a warless world are the youth that refuse military service. - A. Einstein -------------- next part -------------- A non-text attachment was scrubbed... Name: openpgp-digital-signature.asc Type: application/pgp-signature Size: 227 bytes Desc: not available URL: From mike at mdsresource.net Sat May 20 18:20:42 2023 From: mike at mdsresource.net (Mike Schleif) Date: Sat, 20 May 2023 11:20:42 -0500 Subject: Finally moving from 2.0.22 to 2.2.x or higher Message-ID: What do we need to know about using our existing keyring, and copious CLIs, that we use to encrypt, decrypt and administer our legacy GPG? As previously posted, we are on Centos 7.9.2009, which only supports GPG v2.0.x. Until we upgrade Centos later this year, I've been reviewing suggestions on how to upgrade to 2.2.17 and higher, which we're about to undertake. How can we "import" our existing keyring into newer GPG? What else do we need to know, and prepare for, for our production use? Please, advise. Thank you. ~ Mike -------------- next part -------------- An HTML attachment was scrubbed... URL: From rirelan at gmail.com Sat May 20 02:38:15 2023 From: rirelan at gmail.com (Robert Irelan) Date: Fri, 19 May 2023 17:38:15 -0700 Subject: epg-encrypt-string in Emacs seems to be incompatible with GnuPG 2.4.1 on macOS, 2.4.0 works Message-ID: I'm not sure what info will be most useful for debugging this, but the `epg-encrypt-string` function seems not to work with GnuPG 2.4.1 on macOS, while GnuPG 2.4.0 works (both on x86_64, macOS 13.3.1, Macports used to install both). This is the command line that seems to hang with 2.4.1: ``` /opt/local/bin/gpg2 --no-tty --status-fd 1 --yes --enable-progress-filter --command-fd 0 --output /var/folders/gc/73c5zcp918z9dssx8k1sybh00000gn/T/epg-output2zVC4K --pinentry-mode ask --decrypt -- /var/folders/gc/73c5zcp918z9dssx8k1sybh00000gn/T/epg-inputMnF1UG ``` No settings in common.conf, gpg-agent.conf, or gpg.conf seem to affect this hanging command. Let me know what info I can provide to help debug this further -- Robert Irelan rirelan at gmail.com From wk at gnupg.org Mon May 22 09:56:12 2023 From: wk at gnupg.org (Werner Koch) Date: Mon, 22 May 2023 09:56:12 +0200 Subject: epg-encrypt-string in Emacs seems to be incompatible with GnuPG 2.4.1 on macOS, 2.4.0 works In-Reply-To: (Robert Irelan via Gnupg-users's message of "Fri, 19 May 2023 17:38:15 -0700") References: Message-ID: <87ilckol43.fsf@wheatstone.g10code.de> Hi! On Fri, 19 May 2023 17:38, Robert Irelan said: > This is the command line that seems to hang with 2.4.1: > > ``` > /opt/local/bin/gpg2 --no-tty --status-fd 1 --yes > --enable-progress-filter --command-fd 0 --output > /var/folders/gc/73c5zcp918z9dssx8k1sybh00000gn/T/epg-output2zVC4K > --pinentry-mode ask --decrypt -- > /var/folders/gc/73c5zcp918z9dssx8k1sybh00000gn/T/epg-inputMnF1UG > ``` Here are two places which do not look correct: (defun epg-wait-for-completion (context) "Wait until the `epg-gpg-program' process completes." (while (eq (process-status (epg-context-process context)) 'run) (accept-process-output (epg-context-process context) 1)) ;; This line is needed to run the process-filter right now. (sleep-for 0.1) Sleeping for 100ms looks like an error prone hack. (defun epg-start-decrypt (context cipher) [...] ;; `gpgsm' does not read passphrase from stdin, so waiting is not needed. (unless (eq (epg-context-protocol context) 'CMS) (epg-wait-for-status context '("BEGIN_DECRYPTION")))) It is quite possible that BEGIN_DECRYPTION is emitted after the request for a pinentry. It does not look right to wait for it. I have not looked into the EasyPG code for many years despite that I am using it every day. The use of --command-fd w/o a state machine (or is there one for decrypt?) to handle the requests is not a good idea;; using --batch would be better. Please also see https://dev.gnupg.org/T6481 which is about a very similar problem. Salam-Shalom, Werner -- The pioneers of a warless world are the youth that refuse military service. - A. Einstein -------------- next part -------------- A non-text attachment was scrubbed... Name: openpgp-digital-signature.asc Type: application/pgp-signature Size: 227 bytes Desc: not available URL: From robin at nitrokey.com Tue May 23 09:58:28 2023 From: robin at nitrokey.com (Robin Krahl | Nitrokey) Date: Tue, 23 May 2023 09:58:28 +0200 Subject: Adding one ADSK to multiple keys Message-ID: Hi, I want to setup one backup key as an ADSK for multiple keys. After adding the ADSK to the first key, further attempts to add the same ADSK to other keys fail with the error message: gpg: key "44883766ABE65F20453E6FC046D03490A60D7131" not found: Wrong key usage gpg: Did you specify the fingerprint of a subkey? My guess is that the fingerprint is resolved to the ADSK of the first key with key usage R instead of the original subkey with key usage SEAR. If I delete the key with the first ADSK and try to add the ADSK to a second key, gpg can no longer find the original subkey: gpg: key "44883766ABE65F20453E6FC046D03490A60D7131" not found: No public key How can I configure the same subkey as an ADSK for multiple other keys? Regards, Robin Full log: $ gpg --list-keys --with-subkey-fingerprint [keyboxd] --------- pub rsa2048 2023-05-23 [SCEAR] 0D040E3B31CD2165952E0B2D2630CA1F4CFEC737 uid [ultimate] Employee 2 (Department A) sub rsa2048 2023-05-23 [SEAR] A1EE8DAA2FFA67B2963CF9A44C27B306EF295300 pub rsa2048 2023-05-23 [SCEAR] 41CED1E71F2F05362BE79793EEAEB08CFA452DAE uid [ultimate] Employee 1 (Department A) sub rsa2048 2023-05-23 [SEAR] 55810101E92C4C4ED311BCA94C3578A761AEB703 pub rsa2048 2023-05-23 [SCEAR] 6DF5F1752B66B225853F107AA5D29205F3B6E803 uid [ultimate] Manager (Department A) sub rsa2048 2023-05-23 [SEAR] 44883766ABE65F20453E6FC046D03490A60D7131 $ gpg --quick-add-adsk 41CED1E71F2F05362BE79793EEAEB08CFA452DAE 44883766ABE65F20453E6FC046D03490A60D7131 $ gpg --quick-add-adsk 0D040E3B31CD2165952E0B2D2630CA1F4CFEC737 44883766ABE65F20453E6FC046D03490A60D7131 gpg: key "44883766ABE65F20453E6FC046D03490A60D7131" not found: Wrong key usage gpg: Did you specify the fingerprint of a subkey? $ gpg --list-keys --with-subkey-fingerprint [keyboxd] --------- pub rsa2048 2023-05-23 [SCEAR] 0D040E3B31CD2165952E0B2D2630CA1F4CFEC737 uid [ultimate] Employee 2 (Department A) sub rsa2048 2023-05-23 [SEAR] A1EE8DAA2FFA67B2963CF9A44C27B306EF295300 pub rsa2048 2023-05-23 [SCEAR] 41CED1E71F2F05362BE79793EEAEB08CFA452DAE uid [ultimate] Employee 1 (Department A) sub rsa2048 2023-05-23 [SEAR] 55810101E92C4C4ED311BCA94C3578A761AEB703 sub rsa2048 2023-05-23 [R] 44883766ABE65F20453E6FC046D03490A60D7131 pub rsa2048 2023-05-23 [SCEAR] 6DF5F1752B66B225853F107AA5D29205F3B6E803 uid [ultimate] Manager (Department A) sub rsa2048 2023-05-23 [SEAR] 44883766ABE65F20453E6FC046D03490A60D7131 $ gpg --delete-secret-key 41CED1E71F2F05362BE79793EEAEB08CFA452DAE $ gpg --delete-key 41CED1E71F2F05362BE79793EEAEB08CFA452DAE $ gpg --list-keys --with-subkey-fingerprint gpg: checking the trustdb gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 2 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 2u [keyboxd] --------- pub rsa2048 2023-05-23 [SCEAR] 0D040E3B31CD2165952E0B2D2630CA1F4CFEC737 uid [ultimate] Employee 2 (Department A) sub rsa2048 2023-05-23 [SEAR] A1EE8DAA2FFA67B2963CF9A44C27B306EF295300 pub rsa2048 2023-05-23 [SCEAR] 6DF5F1752B66B225853F107AA5D29205F3B6E803 uid [ultimate] Manager (Department A) sub rsa2048 2023-05-23 [SEAR] 44883766ABE65F20453E6FC046D03490A60D7131 $ gpg --quick-add-adsk 0D040E3B31CD2165952E0B2D2630CA1F4CFEC737 44883766ABE65F20453E6FC046D03490A60D7131 gpg: key "44883766ABE65F20453E6FC046D03490A60D7131" not found: No public key $ gpg --version gpg (GnuPG) 2.4.1 libgcrypt 1.10.2 Copyright (C) 2023 g10 Code GmbH License GNU GPL-3.0-or-later This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Home: /root/.gnupg Supported algorithms: Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH, CAMELLIA128, CAMELLIA192, CAMELLIA256 Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224 Compression: Uncompressed, ZIP, ZLIB, BZIP2 -------------- next part -------------- A non-text attachment was scrubbed... Name: OpenPGP_0x34F47D2F044B8F17.asc Type: application/pgp-keys Size: 1002 bytes Desc: OpenPGP public key URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: OpenPGP_signature Type: application/pgp-signature Size: 228 bytes Desc: OpenPGP digital signature URL: From wk at gnupg.org Tue May 23 15:19:23 2023 From: wk at gnupg.org (Werner Koch) Date: Tue, 23 May 2023 15:19:23 +0200 Subject: Adding one ADSK to multiple keys In-Reply-To: (Robin Krahl's message of "Tue, 23 May 2023 09:58:28 +0200") References: Message-ID: <87h6s3mbhg.fsf@wheatstone.g10code.de> Hi! thanks for the report. > My guess is that the fingerprint is resolved to the ADSK of the first > key with key usage R instead of the original subkey with key usage Sounds right. Depends on the structure of the keyring. Need to develop a fix. See https://dev.gnupg.org/T6504 Shalom-Salam, Werner -- The pioneers of a warless world are the youth that refuse military service. - A. Einstein -------------- next part -------------- A non-text attachment was scrubbed... Name: openpgp-digital-signature.asc Type: application/pgp-signature Size: 227 bytes Desc: not available URL: From wk at gnupg.org Tue May 23 15:25:53 2023 From: wk at gnupg.org (Werner Koch) Date: Tue, 23 May 2023 15:25:53 +0200 Subject: Finally moving from 2.0.22 to 2.2.x or higher In-Reply-To: (Mike Schleif's message of "Sat, 20 May 2023 11:20:42 -0500") References: Message-ID: <87bkibmb6m.fsf@wheatstone.g10code.de> On Sat, 20 May 2023 11:20, Mike Schleif said: > How can we "import" our existing keyring into newer GPG? You actually don't need to do anything. gpg auto-migrates the private keys. If everything works then for you, you may delete the secring.gpg which is not anymore used (but better take a backup). Your private keys will then be in private-keys-v1.d/ and a file ~/gnupg/.gnupg-v21-migrated shows thathe migration was successful. Shalom-Salam, Werner -- The pioneers of a warless world are the youth that refuse military service. - A. Einstein -------------- next part -------------- A non-text attachment was scrubbed... Name: openpgp-digital-signature.asc Type: application/pgp-signature Size: 227 bytes Desc: not available URL: From bernhard at intevation.de Thu May 25 18:23:37 2023 From: bernhard at intevation.de (Bernhard Reiter) Date: Thu, 25 May 2023 18:23:37 +0200 Subject: Mastodon account(s), server search In-Reply-To: <202212011742.56784.bernhard@intevation.de> References: <202212011742.56784.bernhard@intevation.de> Message-ID: <202305251823.44850.bernhard@intevation.de> Hello, Am Donnerstag 01 Dezember 2022 17:42:47 schrieb Bernhard Reiter: > seems to be a good time to start an official Mastodon account > for GnuPG and related topics like Gpg4win and OpenPGP. this plan was frozen first by the future OpenPGP standards (see gnupg-devel@ from the 26th on). secondly by me being unable to work for several weeks > At least for announcements and some interaction as the interest > is growing for this decentral platform. I'm picking it up again and assume ongoing interest. == Server selection details > initial rough requirements: > * located in Europe (preferred, because many GnuPG / Gpg4win people know the legal environment in the EU better) > * can be volunteeringly paid for > * some volume / track record to expect a good administration > * a moderation and contents policy that allows for respectful > exchange, but is liberal in that commercial Free Software > topics (and broad other topics) are allowed as well. > * (optional) Free Software and privacy friendly organisation Found more: * can take the potential load (https://twitter.com/gnupg as 20k followers) * (optional) Tor network access * German any English? The latter is a question if we should make two account, one for Englisch and one for German. There are quite a lot of German speaking Gpg4win and GnuPG users, it probably is the second largest group after English. Thanks again for the server suggestions, my current ranking is: 1. https://mstdn.social 35k account Has everything, strong point: Tor access. Weak point: no advertising I've asked, and it is okay to write about professional Free Software products as long as it does not flood the public timeline. 2. infosec.exchange 18k Servers rented in Germany, Responsible Person in the US. No Tor. No FS preferance. Strong point: Infosec community (and moderators from that topic) 3. fosstodon.org 16k No Tor. weak point: English post only. All are suitable servers and we could migrate of course. Maybe I'm looking for a server which is a little bit smaller as a forth alternative. (I've gave https://pleroma.social servers a brief look, but I haven't found a good match. ;) ) Best Regards Bernhard -- https://intevation.de/~bernhard ? +49 541 33 508 3-3 Intevation GmbH, Osnabr?ck, DE; Amtsgericht Osnabr?ck, HRB 18998 Gesch?ftsf?hrer Frank Koormann, Bernhard Reiter -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 659 bytes Desc: This is a digitally signed message part. URL: From hfollmann at itcfollmann.com Thu May 25 19:15:19 2023 From: hfollmann at itcfollmann.com (Henning Follmann) Date: Thu, 25 May 2023 13:15:19 -0400 Subject: Mastodon account(s), server search In-Reply-To: <202305251823.44850.bernhard@intevation.de> References: <202212011742.56784.bernhard@intevation.de> <202305251823.44850.bernhard@intevation.de> Message-ID: On Thu, May 25, 2023 at 06:23:37PM +0200, Bernhard Reiter wrote: > Hello, > > Am Donnerstag 01 Dezember 2022 17:42:47 schrieb Bernhard Reiter: > > seems to be a good time to start an official Mastodon account > > for GnuPG and related topics like Gpg4win and OpenPGP. > > this plan was frozen > first by the future OpenPGP standards (see gnupg-devel@ from the 26th on). > secondly by me being unable to work for several weeks > > > At least for announcements and some interaction as the interest > > is growing for this decentral platform. > > I'm picking it up again and assume ongoing interest. > > == Server selection details > > > > initial rough requirements: > > * located in Europe > (preferred, because many GnuPG / Gpg4win people > know the legal environment in the EU better) > > * can be volunteeringly paid for > > * some volume / track record to expect a good administration > > * a moderation and contents policy that allows for respectful > > exchange, but is liberal in that commercial Free Software > > topics (and broad other topics) are allowed as well. > > * (optional) Free Software and privacy friendly organisation > > Found more: > * can take the potential load (https://twitter.com/gnupg as 20k followers) > * (optional) Tor network access > * German any English? > > The latter is a question if we should make two account, one for Englisch and > one for German. There are quite a lot of German speaking Gpg4win and GnuPG > users, it probably is the second largest group after English. > > Thanks again for the server suggestions, my current ranking is: > 1. https://mstdn.social 35k account > Has everything, strong point: Tor access. > Weak point: no advertising > I've asked, and it is okay to write about professional > Free Software products as long as it does not flood the public timeline. > > 2. infosec.exchange 18k > Servers rented in Germany, Responsible Person in the US. No Tor. > No FS preferance. > Strong point: Infosec community (and moderators from that topic) > > 3. fosstodon.org 16k > No Tor. > weak point: English post only. > Well there was also the initial thought of spinning "our own" instance. I still hold the gnupg.social dns registration and I am still willing to pay for it and keeping it current. I also would chip in time as a assistant administrator. Though I have to say I do not have any experience in running a mastodon instance. -H > _______________________________________________ > Gnupg-users mailing list > Gnupg-users at gnupg.org > https://lists.gnupg.org/mailman/listinfo/gnupg-users -- Henning Follmann | hfollmann at itcfollmann.com From bernhard at intevation.de Fri May 26 14:09:29 2023 From: bernhard at intevation.de (Bernhard Reiter) Date: Fri, 26 May 2023 14:09:29 +0200 Subject: Mastodon account: running a server? In-Reply-To: References: <202212011742.56784.bernhard@intevation.de> <202305251823.44850.bernhard@intevation.de> Message-ID: <202305261409.30413.bernhard@intevation.de> Hi Henning, Am Donnerstag 25 Mai 2023 19:15:19 schrieb Henning Follmann: > Well there was also the initial thought of spinning "our own" instance. yes, I did not mention it, because I've answered it back then: The limitation are administration and moderation time. For this to work out, at least one more person would need to step up. My idea is that most GnuPG developers will rather improve something specific for GnuPG (or the Free Soft ecosystem around it) than running a fedivese server. > I still hold the gnupg.social dns registration and I am still willing > to pay for it and keeping it current. > I also would chip in time as a assistant administrator. Though I have to > say I do not have any experience in running a mastodon instance. Thanks for both offers! If someone else comes up and wants to run the server, it may become a viable option. (Though I don't know how GnuPG devs think about using the official name.) If this is considered, why not run a Pleroma backend or one of this line. Best Regards Bernhard -- https://intevation.de/~bernhard ? +49 541 33 508 3-3 Intevation GmbH, Osnabr?ck, DE; Amtsgericht Osnabr?ck, HRB 18998 Gesch?ftsf?hrer Frank Koormann, Bernhard Reiter -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 659 bytes Desc: This is a digitally signed message part. URL: From wk at gnupg.org Wed May 31 08:46:22 2023 From: wk at gnupg.org (Werner Koch) Date: Wed, 31 May 2023 08:46:22 +0200 Subject: [Announce] GnuPG 2.4.2 released Message-ID: <87ttvthubl.fsf@wheatstone.g10code.de> Hello! We are pleased to announce the availability of a new stable GnuPG release: version 2.4.2. This version fixes some minor bugs and improves the performance on Windows. See below for details. What is GnuPG ============= The GNU Privacy Guard (GnuPG, GPG) is a complete and free implementation of the OpenPGP and S/MIME standards. GnuPG allows to encrypt and sign data and communication, features a versatile key management system as well as access modules for public key directories. GnuPG itself is a command line tool with features for easy integration with other applications. The separate library GPGME provides a uniform API to use the GnuPG engine by software written in common programming languages. A wealth of frontend applications and libraries making use of GnuPG are available. As an universal crypto engine GnuPG provides support for S/MIME and Secure Shell in addition to OpenPGP. GnuPG is Free Software (meaning that it respects your freedom). It can be freely used, modified and distributed under the terms of the GNU General Public License. Three different series of GnuPG are actively maintained: - Version 2.4 is the current stable version with a lot of new features compared to 2.2 series. This announcement is about the latest release of this series. - Version 2.2 is our LTS (long term support) version and guaranteed to be maintained at least until the end of 2024. Only a small subset of features from 2.4 has been back-ported to this series. See https://gnupg.org/download/index.html#end-of-life - Version 1.4 is only maintained to allow decryption of very old data which is, for security reasons, not anymore possible with other GnuPG versions. Please use 1.4 only for this purpose. Noteworthy changes in version 2.4.2 =================================== * gpg: Print a warning if no more encryption subkeys are left over after changing the expiration date. [rGef2c3d50fa] * gpg: Fix searching for the ADSK key when adding an ADSK. [T6504] * gpgsm: Speed up key listings on Windows. [rG08ff55bd44] * gpgsm: Reduce the number of "failed to open policy file" diagnostics. [rG68613a6a9d] * agent: Make updating of private key files more robust and track display S/N. [T6135] * keyboxd: Avoid longish delays on Windows when listing keys. [rG6944aefa3c] * gpgtar: Emit extra status lines to help GPGME. [T6497] * w32: Avoid using the VirtualStore. [T6403] Release-info: https://dev.gnupg.org/T6506 Getting the Software ==================== Please follow the instructions found at or read on: GnuPG may be downloaded from one of the GnuPG mirror sites or direct from its primary FTP server. The list of mirrors can be found at . Note that GnuPG is not available at ftp.gnu.org. The GnuPG source code compressed using BZIP2 and its OpenPGP signature are available here: https://gnupg.org/ftp/gcrypt/gnupg/gnupg-2.4.2.tar.bz2 (7174k) https://gnupg.org/ftp/gcrypt/gnupg/gnupg-2.4.2.tar.bz2.sig An installer for Windows without any graphical frontend except for a very minimal Pinentry tool is available here: https://gnupg.org/ftp/gcrypt/binary/gnupg-w32-2.4.2_20230530.exe (5317k) https://gnupg.org/ftp/gcrypt/binary/gnupg-w32-2.4.2_20230530.exe.sig The source used to build this Windows installer can be found in the same directory with a ".tar.xz" suffix. A new release of Gpg4win including this version of GnuPG will soon be announced. Checking the Integrity ====================== In order to check that the version of GnuPG which you are going to install is an original and unmodified one, you can do it in one of the following ways: * If you already have a version of GnuPG installed, you can simply verify the supplied signature. For example to verify the signature of the file gnupg-2.4.2.tar.bz2 you would use this command: gpg --verify gnupg-2.4.2.tar.bz2.sig gnupg-2.4.2.tar.bz2 This checks whether the signature file matches the source file. You should see a message indicating that the signature is good and made by one or more of the release signing keys. Make sure that this is a valid key, either by matching the shown fingerprint against a trustworthy list of valid release signing keys or by checking that the key has been signed by trustworthy other keys. See the end of this mail for information on the signing keys. * If you are not able to use an existing version of GnuPG, you have to verify the SHA-1 checksum. On Unix systems the command to do this is either "sha1sum" or "shasum". Assuming you downloaded the file gnupg-2.4.2.tar.bz2, you run the command like this: sha1sum gnupg-2.4.2.tar.bz2 and check that the output matches the next line: 3efd495a94dc81fd0ea8788bef6c69d1f13cedd7 gnupg-2.4.2.tar.bz2 1b3da52d4467ed013a951f962f6851a674967278 gnupg-w32-2.4.2_20230530.tar.xz 227358fe08c0f8d3484b11f57dbfdfa6830757ec gnupg-w32-2.4.2_20230530.exe Internationalization ==================== This version of GnuPG has support for 26 languages with Chinese (traditional and simplified), Czech, French, German, Italian, Japanese, Norwegian, Polish, Russian, Turkish, and Ukrainian being almost completely translated. Documentation and Support ========================= The file gnupg.info has the complete reference manual of the system. Separate man pages are included as well but they miss some of the details available only in the manual. The manual is also available online at https://gnupg.org/documentation/manuals/gnupg/ or can be downloaded as PDF at https://gnupg.org/documentation/manuals/gnupg.pdf You may also want to search the GnuPG mailing list archives or ask on the gnupg-users mailing list for advise on how to solve problems. Most of the new features are around for several years and thus enough public experience is available. https://wiki.gnupg.org has user contributed information around GnuPG and relate software. In case of build problems specific to this release please first check https://dev.gnupg.org/T6506 for updated information. Please consult the archive of the gnupg-users mailing list before reporting a bug: https://gnupg.org/documentation/mailing-lists.html. We suggest to send bug reports for a new release to this list in favor of filing a bug at https://bugs.gnupg.org. If you need commercial support go to https://gnupg.com or https://gnupg.org/service.html. If you are a developer and you need a certain feature for your project, please do not hesitate to bring it to the gnupg-devel mailing list for discussion. Job Opportunity =============== We are looking for an experienced technical person for the g10 Code office in Erkrath. Your duties would be help with system administration and to extend our technical support team. Although we are running completely on free software, most of our customers are running Windows; thus experience with Windows management will be of advantage as well as a reasonable proficiency in German. If you are interested in a full time employment please contact us my mail. Thanks ====== Since 2001 maintenance and development of GnuPG is done by g10 Code GmbH and has mostly been financed by donations. Several full-time employed developers and contractors are working exclusively on GnuPG and closely related software like Libgcrypt, GPGME, Kleopatra and Gpg4win. Fortunately, and this is still not common with free software, we have established a way of financing the development while keeping all our software free and freely available for everyone. Our model is similar to the way RedHat manages RHEL and Fedora: Except for the actual binary of the MSI installer for Windows and client specific configuration files, all the software is available under the GNU GPL and other Open Source licenses. Thus customers may even build and distribute their own version of the software as long as they do not use our trademarks GnuPG Desktop? or GnuPG VS-Desktop?. We like to thank all the nice people who are helping the GnuPG project, be it testing, coding, translating, suggesting, auditing, administering the servers, spreading the word, answering questions on the mailing lists, or helped with donations. *Thank you all* Your GnuPG hackers p.s. This is an announcement only mailing list. Please send replies only to the gnupg-users at gnupg.org mailing list. List of Release Signing Keys: To guarantee that a downloaded GnuPG version has not been tampered by malicious entities we provide signature files for all tarballs and binary versions. The keys are also signed by the long term keys of their respective owners. Current releases are signed by one or more of these four keys: rsa3072 2017-03-17 [expires: 2027-03-15] 5B80 C575 4298 F0CB 55D8 ED6A BCEF 7E29 4B09 2E28 Andre Heinecke (Release Signing Key) ed25519 2020-08-24 [expires: 2030-06-30] 6DAA 6E64 A76D 2840 571B 4902 5288 97B8 2640 3ADA Werner Koch (dist signing 2020) ed25519 2021-05-19 [expires: 2027-04-04] AC8E 115B F73E 2D8D 47FA 9908 E98E 9B2D 19C6 C8BD Niibe Yutaka (GnuPG Release Key) brainpoolP256r1 2021-10-15 [expires: 2029-12-31] 02F3 8DFF 731F F97C B039 A1DA 549E 695E 905B A208 GnuPG.com (Release Signing Key 2021) The keys are available at https://gnupg.org/signature_key.html and in any recently released GnuPG tarball in the file g10/distsigkey.gpg . Note that this mail has been signed by a different key. -- Arguing that you don't care about the right to privacy because you have nothing to hide is no different from saying you don't care about free speech because you have nothing to say. - Edward Snowden -------------- next part -------------- A non-text attachment was scrubbed... Name: openpgp-digital-signature.asc Type: application/pgp-signature Size: 227 bytes Desc: not available URL: -------------- next part -------------- _______________________________________________ Gnupg-announce mailing list Gnupg-announce at gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-announce From bernhard at intevation.de Wed May 31 15:23:19 2023 From: bernhard at intevation.de (Bernhard Reiter) Date: Wed, 31 May 2023 15:23:19 +0200 Subject: @GnuPG@mstdn.social (was: Mastodon account(s), server search) In-Reply-To: References: <202212011742.56784.bernhard@intevation.de> <202305251823.44850.bernhard@intevation.de> Message-ID: <202305311523.45247.bernhard@intevation.de> Am Donnerstag 25 Mai 2023 19:15:19 schrieb Henning Follmann: > > Thanks again for the server suggestions, my current ranking is: > > ? 1. https://mstdn.social 35k account Here we go: https://mstdn.social/@GnuPG already linked from gpg4win.org. With avatar image and link from gnupg.org in the making. > > ? ? ?Has everything, strong point: Tor access. > > ? ? ?Weak point: no advertising > > ? ? ?I've asked, and it is okay to write about professional > > ? ? ?Free Software products as long as it does not flood the public > > timeline. Best Regards Bernhard -- https://intevation.de/~bernhard ? +49 541 33 508 3-3 Intevation GmbH, Osnabr?ck, DE; Amtsgericht Osnabr?ck, HRB 18998 Gesch?ftsf?hrer Frank Koormann, Bernhard Reiter -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 659 bytes Desc: This is a digitally signed message part. URL: From bernhard at intevation.de Wed May 31 16:55:05 2023 From: bernhard at intevation.de (Bernhard Reiter) Date: Wed, 31 May 2023 16:55:05 +0200 Subject: get OpenPGP pubkeys authenticated using German personal ID Message-ID: <202305311655.13811.bernhard@intevation.de> https://pgp.governikus.de/?lang=EN """ Governikus provides the online service for authenticating your OpenPGP key on behalf of the German Federal Office for Information Security (BSI). This online service compares the name read from your ID card, your electronic residence permit or eID card for citizens of the European Union with the name specified in your OpenPGP key. If the names match, your public key is electronically signed by Governikus, confirming the match. """ interesting, kind of cool. Obviously they cannot authenticate the email address so once I have a common name, we get collisions? Bernhard -- https://intevation.de/~bernhard ? +49 541 33 508 3-3 Intevation GmbH, Osnabr?ck, DE; Amtsgericht Osnabr?ck, HRB 18998 Gesch?ftsf?hrer Frank Koormann, Bernhard Reiter -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 659 bytes Desc: This is a digitally signed message part. URL: