|
|
|
|
Changelog for gpg2-lang-2.3.7-1.1.noarch.rpm :
* Mon Aug 08 2022 Andreas Stieger - Fix YubiKey 5 Nano support (boo#1202201), add gnupg-2.3.7-scd-openpgp-Fix-workaround-for-Yubikey-heuristics.patch * Tue Jul 12 2022 Andreas Stieger - GnuPG 2.3.7: * CVE-2022-34903: garbled status messages could trick gpgme and other parsers to accept faked status lines [boo#1201225] * A number of bug fixes to the gpg command line interface * gpgsm gained a number of new options and got some rework on the PKCS#12 parser to support DFN issues keys * The gpg agent got some added options and UI tweaks * smart card support got a number of bug fixes, and improved support for Technology Nexus cards and Yubikey * The Telesec ESIGN application is now supported * Mon May 16 2022 Marcus Meissner - added tpm support, added a new subpackage gpg2-tpm * Mon Apr 25 2022 Andreas Stieger - GnuPG 2.3.6: * Up to five times faster verification of detached signatures, doubled detached signing speed, threefold decryption speedup for large files, nearly double the AES256.OCB encryption speed * Add support for GeNUA cards * Added and improved options for crypto options, and all-around bug fixes * Wed Dec 22 2021 Andreas Stieger - GnuPG 2.3.4: * gpg: New option --min-rsa-length * gpg: New option --forbid-gen-key * gpg: New option --override-compliance-check * gpgconf: New command --show-configs * agent,dirmngr,keyboxd: New option --steal-socket * gpg: Fix printing of binary notations * gpg: Remove stale ultimately trusted keys from the trustdb * gpg: Fix indentation of --print-mds and --print-md sha512 * gpg: Emit gpg 2.2 compatible Ed25519 signature * gpgsm: Detect circular chains in --list-chain * dirmngr: Make reading resolv.conf more robust * dirmngr: Ask keyservers to provide the key fingerprints * gpgconf: Allow changing gpg\'s deprecated keyserver option * gpg-wks-server: Fix created file permissions * scd: Support longer data for ssh-agent authentication with openpgp cards * scd: Modify DEVINFO behavior to support looping forever * Silence warning about the rootdir under Unices w/o a mounted /proc file system * Fix possible build problems about missing include files * Tue Oct 12 2021 Andreas Stieger - GnuPG 2.3.3: * agent: Fix segv in GET_PASSPHRASE (regression) * dirmngr: Fix Let\'s Encrypt certificate chain validation * gpg: Change default and maximum AEAD chunk size to 4 MiB * gpg: Print a warning when importing a bad cv25519 secret key * gpg: Fix --list-packets for undecryptable AEAD packets * gpg: Verify backsigs for v5 keys correctly * keyboxd: Fix checksum computation for no UBID entry on disk * keyboxd: Fix \"invalid object\" error with cv448 keys * dirmngr: New option --ignore-cert * agent: Fix calibrate_get_time use of clock_gettime * Support a gpgconf.ctl file under Unix and use this for the regression tests * Wed Aug 25 2021 Pedro Monreal - GnuPG 2.3.2: * gpg: Allow fingerprint based lookup with --locate-external-key. * gpg: Allow decryption w/o public key but with correct card inserted. * gpg: Auto import keys specified with --trusted-keys. * gpg: Do not use import-clean for LDAP keyserver imports. * gpg: Fix mailbox based search via AKL keyserver method. * gpg: Fix memory corruption with --clearsign introduced with 2.3.1. * gpg: Use a more descriptive prompt for symmetric decryption. * gpg: Improve speed of secret key listing. * gpg: Support keygrip search with traditional keyring. * gpg: Let --fetch-key return an exit code on failure. * gpg: Emit the NO_SECKEY status again for decryption. * gpgsm: Support decryption of password based encryption (pwri). * gpgsm: Support AES-GCM decryption. * gpgsm: Let --dump-cert --show-cert also print an OpenPGP fingerprint. * gpgsm: Fix finding of issuer in use-keyboxd mode. * gpgsm: New option --ldapserver as an alias for --keyserver. * agent: Use SHA-256 for SSH fingerprint by default. * agent: Fix calling handle_pincache_put. * agent: Fix importing protected secret key. * agent: Fix a regression in agent_get_shadow_info_type. * agent: Add translatable text for Caps Lock hint. * agent: New option --pinentry-formatted-passphrase. * agent: Add checkpin inquiry for pinentry. * agent: New option --check-sym-passphrase-pattern. * agent: Use the sysconfdir for a pattern file. * agent: Make QT_QPA_PLATFORMTHEME=qt5ct work for the pinentry. * dirmngr: LDAP search by a mailbox now ignores revoked keys. * dirmngr: For KS_SEARCH return the fingerprint also with LDAP. * dirmngr: Allow for non-URL specified ldap keyservers. * dirmngr: New option --ldapserver. * dirmngr: Fix regression in KS_GET for mail address pattern. * card: New option --shadow for the list command. * tests: Make sure the built keyboxd is used. * scd: Fix computing shared secrets for 512 bit curves. * scd: Fix unblock PIN by a Reset Code with KDF. * scd: Fix PC/SC removed card problem. * scd: Recover the partial match for PORTSTR for PC/SC. * scd: Make sure to release the PC/SC context. * scd: Fix zero-byte handling in ECC. * scd: Fix serial number detection for Yubikey 5. * scd: Add basic support for AET JCOP cards. * scd: Detect external interference when --pcsc-shared is in use. * scd: Fix access to the list of cards. * gpgconf: Do not list a disabled tpm2d. * gpgconf: Make runtime changes with different homedir work. * keyboxd: Fix searching for exact mail adddress. * keyboxd: Fix searching with multiple patterns. * tools: Extend gpg-check-pattern. * wkd: Fix client issue with leading or trailing spaces in user-ids. * Pass XDG_SESSION_TYPE and QT_QPA_PLATFORM envvars to Pinentry. * Change the default keyserver to keyserver.ubuntu.com. This is a temporary change due to the shutdown of the SKS keyserver pools. * Fri Jun 11 2021 Pedro Monreal - GnuPG 2.3.1: * The new configuration file common.conf is now used to enable the use of the key database daemon with \"use-keyboxd\". Using this option in gpg.conf and gpgsm.conf is supported for a transitional period. See doc/example/common.conf for more. * gpg: Force version 5 key creation for ed448 and cv448 algorithms. * gpg: By default do not use the self-sigs-only option when importing from an LDAP keyserver. * gpg: Lookup a missing public key of the active card via LDAP. * gpgsm: New command --show-certs. * scd: Fix CCID driver for SCM SPR332/SPR532. * scd: Further improvements for PKCS#15 cards. * New configure option --with-tss to allow the selection of the TSS library.- Rebase patches: * gnupg-add_legacy_FIPS_mode_option.patch * gnupg-allow-import-of-previously-known-keys-even-without-UIDs.patch * gnupg-dont-fail-with-seahorse-agent.patch * gnupg-set_umask_before_open_outfile.patch * Fri Jun 11 2021 Andreas Stieger - GnuPG 2.3.0: * A new experimental key database daemon is provided. To enable it put \"use-keyboxd\" into gpg.conf and gpgsm.conf. Keys are stored in a SQLite database and make key lookup much faster. * New tool gpg-card as a flexible frontend for all types of supported smartcards. * New option --chuid for gpg, gpgsm, gpgconf, gpg-card, and gpg-connect-agent. * The gpg-wks-client tool is now installed under bin; a wrapper for its old location at libexec is also installed. * tpm2d: New daemon to physically bind keys to the local machine. * gpg: Switch to ed25519/cv25519 as default public key algorithms. * gpg: Verification results now depend on the --sender option and the signer\'s UID subpacket. * gpg: Do not use any 64-bit block size cipher algorithm for encryption. Use AES as last resort cipher preference instead of 3DES. This can be reverted using --allow-old-cipher-algos. * gpg: Support AEAD encryption mode using OCB or EAX. * gpg: Support v5 keys and signatures. * gpg: Support curve X448 (ed448, cv448). * gpg: Allow use of group names in key listings. * gpg: New option --full-timestrings to print date and time. * gpg: New option --force-sign-key. * gpg: New option --no-auto-trust-new-key. * gpg: The legacy key discovery method PKA is no longer supported. The command --print-pka-records and the PKA related import and export options have been removed. * gpg: Support export of Ed448 Secure Shell keys. * gpgsm: Add basic ECC support. * gpgsm: Support creation of EdDSA certificates. [#4888] * agent: Allow the use of \"Label:\" in a key file to customize the pinentry prompt. * agent: Support ssh-agent extensions for environment variables. With a patched version of OpenSSH this avoids the need for the \"updatestartuptty\" kludge. * scd: Improve support for multiple card readers and tokens. * scd: Support PIV cards. * scd: Support for Rohde&Schwarz Cybersecurity cards. * scd: Support Telesec Signature Cards v2.0 * scd: Support multiple application on certain smartcard. * scd: New option --application-priority. * scd: New option --pcsc-shared; see man page for important notes. * dirmngr: Support a gpgNtds parameter in LDAP keyserver URLs. * The symcryptrun tool, a wrapper for the now obsolete external Chiasmus tool, has been removed. * Full Unicode support for the command line.- dropped legacy commands: gpg-zip * Wed Apr 07 2021 Andreas Stieger - Remove the \"files-are-digests\" option from the openSUSE package. This feature was not upstream and only used in the OBS signing daemon. The recommended upstream feature for separating the data to be signed from the private keys is gpg agent forwarding, available from 2.1. Drop gnupg-2.2.8-files-are-digests.patch * Tue Jan 12 2021 Andreas Stieger - GnuPG 2.2.27: * gpgconf: Fix case with neither local nor global gpg.conf * gpgconf: Fix description of two new options- includes changes from 2.2.26: * gpg: New AKL method \"ntds\" * gpg: Fix --trusted-key with fingerprint arg * scd: Fix writing of ECC keys to an OpenPGP card * scd: Make an USB error fix specific to SPR532 readers * dirmngr: With new LDAP keyservers store the new attributes. Never store the useless pgpSignerID. Fix a long standing bug storing some keys on an ldap server. * dirmngr: Support the new Active Direcory LDAP schema for keyservers * dirmngr: Allow LDAP OpenPGP searches via fingerprint * dirmngr: Do not block other threads during keyserver LDAP calls * Support global configuration files * Fix the iconv fallback handling to UTF-8 * Mon Nov 23 2020 Andreas Stieger - GnuPG 2.2.25: * scd: Fix regression in 2.2.24 requiring gpg --card-status before signing or decrypting * gpgsm: Using Libksba 1.5.0 signatures with a rarely used combination of attributes can now be verified * Tue Nov 17 2020 Andreas Stieger - GnuPG 2.2.24: * gpg: New command --quick-revoke-sig * gpg: Do not use weak digest algos if selected by recipient preference during sign+encrypt * gpg: Switch to AES256 for symmetric encryption in de-vs mode * gpg: Silence weak digest warnings with --quiet * gpg: Print new status line CANCELED_BY_USER for a cancel during symmetric encryption * gpg: Fix the encrypt+sign hash algo preference selection for ECDSA. This is in particular needed for keys created from existing smartcard based keys * agent: Fix secret key import of GnuPG 2.3 generated Ed25519 keys * agent: Keep some permissions of private-keys-v1.d * dirmngr: Align sks-keyservers.netCA.pem use between ntbtls and gnutls builds * dirmngr: Fix the pool keyserver case for a single host in the pool * scd: Fix the use case of verify_chv2 by CHECKPIN * scd: Various improvements to the ccid-driver * scd: Minor fixes for Yubikey * gpgconf: New option --show-versions * i18n: Complete overhaul and completion of the Italian translation * Thu Sep 03 2020 Andreas Stieger - GnuPG 2.2.23: * gpg: fix AHEAD preference list overflow boo#1176034 / CVE-2020-25125 * gpg: fix possible segv in the key cleaning code * gpgsm: fix a minor RFC2253 parser gub * scdaemon: Fix a PIN verify failure on certain OpenPGP card implementations * Tue Sep 01 2020 Andreas Stieger - GnuPG 2.2.22: * gpg: Change the default key algorithm to rsa3072 * gpg: Add regular expression support for Trust Signatures on all platforms * gpg: Ignore --personal-digest-prefs for ECDSA keys * gpgsm: Make rsaPSS a de-vs compliant scheme * gpgsm: Show also the SHA256 fingerprint in key listings * gpgsm: Do not require a default keyring for --gpgconf-list * gpg-agent: Default to extended key format and record the creation time of keys Add new option --disable-extended-key-format * gpg-agent: Support the WAYLAND_DISPLAY envvar * gpg-agent: Allow using --gpgconf-list even if HOME does not exist * gpg-agent: Make the Pinentry work even if the envvar TERM is set to the empty string * scdaemon: Add a workaround for Gnuk tokens <= 2.15 which wrongly incremented the error counter when using the \"verify\" command of \"gpg --edit-key\" with only the signature key being present * dirmngr: Better handle systems with disabled IPv6 * gpgpslit: Install tool. It was not installed in the past to avoid conflicts with the version installed by GnuPG 1.4 * gpgtar: Make --files-from and --null work as documented- drop gnupg-gpgme-t-encrypt-sym.patch, upstream * Tue Jul 14 2020 Pedro Monreal Gonzalez - Fix regression in latest gpg2 that makes gpgme fail to build [bsc#1174007]- Add gnupg-gpgme-t-encrypt-sym.patch * Thu Jul 09 2020 Andreas Stieger - GnuPG 2.2.21: * gpg: Improve symmetric decryption speed by about 25% * gpg: Support decryption of AEAD encrypted data packets * gpg: Add option --no-include-key-block * gpg: Allow for extra padding in ECDH * gpg: Only a single pinentry is shown for symmetric encryption if the pinentry supports this * gpg: Print a note if no keys are given to --delete-key * gpg,gpgsm: The ridiculous passphrase quality bar is not anymore shown * gpgsm: Certificates without a CRL distribution point are now considered valid without looking up a CRL. The new option - -enable-issuer-based-crl-check can be used to revert to the former behaviour * gpgsm: Support rsaPSS signature verification * gpgsm: Unless CRL checking is disabled lookup a missing issuer certificate using the certificate\'s authorityInfoAccess * gpgsm: Print the certificate\'s serial number also in decimal notation * gpgsm: Fix possible NULL-deref in messages of --gen-key * scd: Support the CardOS 5 based D-Trust Card 3.1 * dirmngr: Allow http URLs with \"LOOKUP --url\" * wkd: Take name of sendmail from configure. Fixes an OpenBSD specific bug * Thu Apr 30 2020 Pedro Monreal Gonzalez - Fix gpgme and gpgme-qt builds on gpg2 2.2.20 update [bsc#1170811]- Refresh patches: * gnupg-2.2.8-files-are-digests.patch * gnupg-add_legacy_FIPS_mode_option.patch * Fri Mar 20 2020 Andreas Stieger - GnuPG 2.2.20: * Protect the error counter against overflow to guarantee that the tools can\'t be tricked into returning success after an error * gpg: Make really sure that --verify-files always returns an error * gpg: Fix key listing --with-secret if a pattern is given * gpg: Fix detection of certain keys used as default-key * gpg: Fix default-key selection when a card is available * gpg: Fix key expiration and key usage for keys created with a creation date of zero * gpgsm: Fix import of some CR,LF terminated certificates * gpg: New options --include-key-block and --auto-key-import to allow encrypted replies after an initial signed message * gpg: Allow the use of a fingerprint with --trusted-key * gpg: New property \"fpr\" for use by --export-filter * scdaemon: Disable the pinpad if a KDF DO is used * dirmngr: Improve finding OCSP certificates- drop gpg2-gcc10-build-fno-common.patch, upstream * Fri Mar 13 2020 Fabian Vogt - Split dirmngr into a subpackage to avoid a hard dependency of gpg2 on libgnutls * Wed Feb 19 2020 Pedro Monreal Gonzalez - Fix build with GCC-10: [bsc#1160394] * Always use EXTERN_UNLESS_MAIN_MODULE pattern * In GCC-10, the default option -fcommon will change to -fno-common- Add gpg2-gcc10-build-fno-common.patch * Fri Jan 10 2020 Pedro Monreal Gonzalez - Accept key updates even without UIDs [bsc#1143158]- Add patches: * gnupg-allow-import-of-previously-known-keys-even-without-UIDs.patch * gnupg-accept_subkeys_with_a_good_revocation_but_no_self-sig_during_import.patch * gnupg-add-test-cases-for-import-without-uid.patch * Sat Dec 07 2019 Andreas Stieger - update to 2.2.19: * gpg: Fix double free when decrypting for hidden recipients * gpg: Use auto-key-locate for encryption even for mail addressed given with angle brackets * gpgsm: Add special case for certain expired intermediate certificates * Wed Nov 27 2019 Pedro Monreal Gonzalez - Update to 2.2.18 [bsc#1157900, CVE-2019-14855] * gpg: Changed the way keys are detected on a smartcards; this allows the use of non-OpenPGP cards. In the case of a not very likely regression the new option --use-only-openpgp-card is available. [#4681] * gpg: The commands --full-gen-key and --quick-gen-key now allow direct key generation from supported cards. [#4681] * gpg: Prepare against chosen-prefix SHA-1 collisions in key signatures. This change removes all SHA-1 based key signature newer than 2019-01-19 from the web-of-trust. Note that this includes all key signature created with dsa1024 keys. The new option --allow-weak-key-signatues can be used to override the new and safer behaviour. [#4755,CVE-2019-14855] * gpg: Improve performance for import of large keyblocks. [#4592] * gpg: Implement a keybox compression run. [#4644] * gpg: Show warnings from dirmngr about redirect and certificate problems (details require --verbose as usual). * gpg: Allow to pass the empty string for the passphrase if the \'--passphase=\' syntax is used. [#4633] * gpg: Fix printing of the KDF object attributes. * gpg: Avoid surprises with --locate-external-key and certain - -auto-key-locate settings. [#4662] * gpg: Improve selection of best matching key. [#4713] * gpg: Delete key binding signature when deletring a subkey. [#4665,#4457] * gpg: Fix a potential loss of key sigantures during import with self-sigs-only active. [#4628] * gpg: Silence \"marked as ultimately trusted\" diagnostics if option --quiet is used. [#4634] * gpg: Silence some diagnostics during in key listsing even with option --verbose. [#4627] * gpg, gpgsm: Change parsing of agent\'s pkdecrypt results. [#4652] * gpgsm: Support AES-256 keys. * gpgsm: Fix a bug in triggering a keybox compression run if - -faked-system-time is used. * dirmngr: System CA certificates are no longer used for the SKS pool if GNUTLS instead of NTBTLS is used as TLS library. [#4594] * dirmngr: On Windows detect usability of IPv4 and IPv6 interfaces to avoid long timeouts. [#4165] * scd: Fix BWI value for APDU level transfers to make Gemalto Ezio Shield and Trustica Cryptoucan work. [#4654,#4566] * wkd: gpg-wks-client --install-key now installs the required policy file.- Rebase patches: * gnupg-2.2.8-files-are-digests.patch * gnupg-add_legacy_FIPS_mode_option.patch * Thu Sep 19 2019 Ludwig Nussel - Do not recommend lang package. The lang package already has a supplements. * Thu Jul 11 2019 Pedro Monreal Gonzalez - Update to 2.2.17 [bsc#1141093] * gpg: Do not try the import fallback if the options are already used. * gpg: Fix regression in option \"self-sigs-only\". * gpg: With --auto-key-retrieve prefer WKD over keyservers. * gpg: Add \"self-sigs-only\" and \"import-clean\" to the keyserver options. * gpg: Avoid printing false AKL error message. * gpg: New command --locate-external-key. * gpg: Make the get_pubkey_byname interface easier to understand. * gpg: Fallback to import with self-sigs-only on too large keyblocks. * gpg: New import and keyserver option \"self-sigs-only\" * gpg: Make read_block in import.c more flexible. * dirmngr: fix handling of HTTPS redirections during HKP. * dirmngr: Avoid endless loop in case of HTTP error 503. * dirmngr: Do not rewrite the redirection for the \"openpgpkey\" subdomain. * dirmngr: Support the new WKD draft with the openpgpkey subdomain. * wkd: Change client/server limit back to 64 KiB. * tools: gpgconf: Killing order is children-first. * Return better error code for some getinfo IPC commands. * po: Update Russian translation. * Wed Jun 19 2019 Jason Sikes - Fix secure memory being disabled before fips checks in libgcrypt [boo#1137307] * Added gnupg-2.2.16-secmem.patch * Thu May 30 2019 Pedro Monreal Gonzalez - Update to 2.2.16 * gpg: Fixed i18n markup of some strings. * gpg: Allow deletion of subkeys with --delete-[secret-]key. * gpg: Do not bail on an invalid packet in the local keyring. * gpg: Do not allow creation of user ids larger than our parser allows. * gpg: Do not delete any keys if --dry-run is passed. * gpg: Fix using --decrypt along with --use-embedded-filename. * gpg: Improve the photo image viewer selection. * gpg: enable OpenPGP export of cleartext keys with comments. * gpg: Do not print a hint to use the deprecated --keyserver option. * gpg: Change update_keysig_packet to replace SHA-1 by SHA-256. * gpg: Use just the addrspec from the Signer\'s UID. * gpg: Accept also armored data from the WKD. * gpg: Set a limit of 5 to the number of keys imported from the WKD. * gpg: Don\'t use EdDSA algo ID for ECDSA curves. * agent: Stop scdaemon after reload when disable_scdaemon. * agent: For SSH key, don\'t put NUL-byte at the end. * agent: correct length for uri and comment on 64-bit big-endian platforms * dirmngr: Allow for other hash algorithms than SHA-1 in OCSP. * dirmngr: Improve domaininfo cache update algorithm. * dirmngr: Better error code for http status 413. * g10: Fix possible null dereference. * g10: Fix double free when locating by mbox. * g10: Fix symmetric cipher algo constant for ECDH. * sm: Avoid confusing diagnostic for the default key. * sm: Fix a warning in an es_fopencooie function. * gpgconf: Before --launch check that the config file is fine. * gpgconf: Support --homedir for --launch. * build: Update m4/iconv.m4. * doc: correct documentation for gpgconf --kill. * scd: Add dummy option --application-priority. * common: Fix AWK portability. * Thu Mar 28 2019 Karol Babioch - Update to 2.2.15 * sm: Allow decryption even if expired keys are configured. * agent: Change command KEYINFO to print ssh fingerprints with other hash algos. * dirmngr: Fix build problems on Solaris due to the use of reserved symbol names. * wkd: New commands --print-wkd-hash and --print-wkd-url for gpg-wks-client. * Tue Mar 19 2019 Karol Babioch - Update to 2.2.14: * gpg: Allow import of PGP desktop exported secret keys. Also avoid importing secret keys if the secret keyblock is not valid. * gpg: Do not error out on version 5 keys in the local keyring. * gpg: Make invalid primary key algo obvious in key listings. * sm: Do not mark a certificate in a key listing as de-vs compliant if its use for a signature will not be possible. * sm: Fix certificate creation with key on card. * sm: Create rsa3072 bit certificates by default. * sm: Print Yubikey attestation extensions with --dump-cert. * agent: Fix cancellation handling for scdaemon. * agent: Support --mode=ssh option for CLEAR_PASSPHRASE. * scd: Fix flushing of the CA-FPR DOs in app-openpgp. * scd: Avoid a conflict error with the \"undefined\" app. * dirmngr: Add CSRF protection exception for protonmail. * dirmngr: Fix build problems with gcc 9 in libdns. * gpgconf: New option --show-socket for use wity --launch. * gpgtar: Make option -C work for archive creation.- Removed patches that are included upstream by now: - 0001-libdns-Avoid-using-compound-literals.patch - 0002-libdns-Avoid-using-compound-literals-2.patch - 0003-libdns-Avoid-using-compound-literals-3.patch - 0004-libdns-Avoid-using-compound-literals-4.patch - 0005-libdns-Avoid-using-compound-literals-5.patch - 0006-libdns-Avoid-using-compound-literals-6.patch - 0007-libdns-Avoid-using-compound-literals-7.patch - 0008-libdns-Avoid-using-compound-literals-8.patch * Tue Feb 26 2019 Pedro Monreal Gonzalez - Fix build with gcc9 [bsc#1121223] * Avoid using compound literals - Upstream bug: https://dev.gnupg.org/T4367 * Added upstream patches: - 0001-libdns-Avoid-using-compound-literals.patch - 0002-libdns-Avoid-using-compound-literals-2.patch - 0003-libdns-Avoid-using-compound-literals-3.patch - 0004-libdns-Avoid-using-compound-literals-4.patch - 0005-libdns-Avoid-using-compound-literals-5.patch - 0006-libdns-Avoid-using-compound-literals-6.patch - 0007-libdns-Avoid-using-compound-literals-7.patch - 0008-libdns-Avoid-using-compound-literals-8.patch * Fri Feb 22 2019 olafAATTaepfle.de- Allow coredumps in X11 desktop sessions (bsc#1124847) gpg-agent unconditionally disables coredumps, which is not supposed to happen in the code path that does just exec(argv[]) gnupg-gpg-agent-ulimit.patch * Wed Feb 13 2019 Karol Babioch - Update to 2.2.13: * gpg: Implement key lookup via keygrip (using the & prefix). * gpg: Allow generating Ed25519 key from existing key. * gpg: Emit an ERROR status line if no key was found with -k. * gpg: Stop early when trying to create a primary Elgamal key. * gpgsm: Print the card\'s key algorithms along with their keygrips in interactive key generation. * agent: Clear bogus pinentry cache in the error case. * scd: Support \"acknowledge button\" feature. * scd: Fix for USB INTERRUPT transfer. * wks: Do no use compression for the the encrypted challenge and response. Release-info: https://dev.gnupg.org/T4290 See-also: gnupg-announce/2019q1/000434.html * Fri Dec 14 2018 atoptsoglouAATTsuse.com- Update to 2.2.12: * tools: New commands --install-key and --remove-key for gpg-wks-client. This allows to prepare a Web Key Directory on a local file system for later upload to a web server. * gpg: New --list-option \"show-only-fpr-mbox\". This makes the use of the new gpg-wks-client --install-key command easier on Windows. * gpg: Improve processing speed when --skip-verify is used. * gpg: Fix a bug where a LF was accidentally written to the console. * gpg: --card-status now shwos whether a card has the new KDF feature enabled. * agent: New runtime option --s2k-calibration=MSEC. New configure option --with-agent-s2k-calibration=MSEC. [#3399] * dirmngr: Try another keyserver from the pool on receiving a 502, 503, or 504 error. [#4175] * dirmngr: Avoid possible CSRF attacks via http redirects. A HTTP query will not anymore follow a 3xx redirect unless the Location header gives the same host. If the host is different only the host and port is taken from the Location header and the original path and query parts are kept. * dirmngr: New command FLUSHCRL to flush all CRLS from disk and memory. [#3967] * Thu Nov 08 2018 Cristian RodrÃguez - Code no longer uses libcurl, remove from buildrequires. * Tue Nov 06 2018 Karol Babioch - Update to 2.2.11: * gpgsm: Fix CRL loading when intermediate certicates are not yet trusted. * gpgsm: Fix an error message about the digest algo. * gpg: Fix a wrong warning due to new sign usage check introduced with 2.2.9. * gpg: Print the \"data source\" even for an unsuccessful keyserver query. * gpg: Do not store the TOFU trust model in the trustdb. * scd: Fix cases of \"Bad PIN\" after using \"forcesig\". * agent: Fix possible hang in the ssh handler. * dirmngr: Tack the unmodified mail address to a WKD request. * dirmngr: Tweak diagnostic about missing LDAP server file. * dirmngr: In verbose mode print the OCSP responder id. * dirmngr: Fix parsing of the LDAP port. * wks: Add option --directory/-C to the server. * wks: Add option --with-colons to the client. * Fix EBADF when gpg et al. are called by broken CGI scripts. * Fix some minor memory leaks and bugs. * Thu Oct 04 2018 Bernhard Wiedemann - Make package build reproducible (boo#1047218) * Thu Aug 30 2018 kbabiochAATTsuse.com- Update to 2.2.10: * Refresh expired keys originating from the WKD * Use a 256 KiB limit for a WKD imported key * New option --known-notation * dirmngr: Validate SRV records in WKD queries * Wed Jul 25 2018 tchvatalAATTsuse.com- Add basic udev rules for smartcards to be used with scdaemon, taken from debian: * scdaemon.udev * Fri Jul 13 2018 astiegerAATTsuse.com- GnuPG 2.2.9: * dirmngr: Fix recursive resolver mode and other bugs in the libdns code * dirmngr: When using libgpg-error 1.32 or later a GnuPG build with NTBTLS support does not anymore block for dozens of seconds before returning data. * gpg: Fix bug in --show-keys which actually imported revocation certificates * gpg: Ignore too long user-ID and comment packets * gpg: Fix crash due to bad German translation. Improved printf format compile time check. * gpg: Handle missing ISSUER sub packet gracefully in the presence of the new ISSUER_FPR * gpg: Allow decryption using several passphrases in most cases. * gpg: Command --show-keys now enables the list options show-unusable-uids, show-unusable-subkeys, show-notations and show-policy-urls by default. * gpg: Command --show-keys now prints revocation certificates. * gpg: Add revocation reason to the \"rev\" and \"rvs\" records of the option --with-colons. [#1173] * gpg: Export option export-clean does now remove certain expired subkeys; export-minimal removes all expired subkeys. * gpg: New \"usage\" property for the drop-subkey filters. * Fri Jun 08 2018 kbabiochAATTsuse.com- Update to version 2.2.8: * gpg: Decryption of messages not using the MDC mode will now lead to a hard failure even if a legacy cipher algorithm was used. The option - -ignore-mdc-error can be used to turn this failure into a warning. Take care: Never use that option unconditionally or without a prior warning. * gpg: The MDC encryption mode is now always used regardless of the cipher algorithm or any preferences. For testing --rfc2440 can be used to create a message without an MDC. * gpg: Sanitize the diagnostic output of the original file name in verbose mode (bsc#1096745, CVE-2018-12020) * gpg: Detect suspicious multiple plaintext packets in a more reliable way. * gpg: Fix the duplicate key signature detection code. * gpg: The options --no-mdc-warn, --force-mdc, --no-force-mdc, - -disable-mdc and --no-disable-mdc have no more effect. * agent: Add DBUS_SESSION_BUS_ADDRESS and a few other envvars to the list of startup environment variables.- Refresh gnupg-2.0.18-files-are-digests.patch to gnupg-2.2.8-files-are-digests.patch * Fri May 04 2018 astiegerAATTsuse.com- GnuPG 2.2.7: * gpg: New option --no-symkey-cache to disable the passphrase cache for symmetrical en- and decryption. * gpg: The ERRSIG status now prints the fingerprint if that is part of the signature * gpg: Relax emitting of FAILURE status lines * gpg: Add a status flag to \"sig\" lines printed with --list-sigs * gpg: Fix \"Too many open files\" when using --multifile * ssh: Return an error for unknown ssh-agent flags * dirmngr: Fix a CNAME problem with pools and TLS. Also use a fixed mapping of keys.gnupg.net to sks-keyservers.net * dirmngr: Try resurrecting dead hosts earlier (from 3h to 1.5h) * dirmngr: Fallback to CRL if no default OCSP responder is configured * dirmngr: Implement CRL fetching via https. Here a redirection to http is explictly allowed * agent,dirmngr: New sub-command \"getenv\" for \"getinfo\" to ease debugging * Tue Apr 10 2018 kbabiochAATTsuse.com- GnuPG 2.2.6: * gpg,gpgsm: New option --request-origin to pretend requests coming from a browser or a remote site. * gpg: Fix race condition on trustdb.gpg updates due to too early released lock. * gpg: Emit FAILURE status lines in almost all cases. * gpg: Implement --dry-run for --passwd to make checking a key\'s passphrase straightforward. * gpg: Make sure to only accept a certification capable key for key signatures. * gpg: Better user interaction in --card-edit for the factory-reset sub-command. * gpg: Improve changing key attributes in --card-edit by adding an explicit \"key-attr\" sub-command. * gpg: Print the keygrips in the --card-status. * scd: Support KDF DO setup. * scd: Fix suspend/resume handling in the CCID driver. * agent: Evict cached passphrases also via a timer. * agent: Use separate passphrase caches depending on the request origin. * ssh: Support signature flags. * dirmngr: Handle failures related to missing IPv6 support gracefully. * Allow the use of UNC directory names as homedir. [#3818]- Dropped gnupg-CVE-2018-9234.patch since it is included upstream * Thu Apr 05 2018 kbabiochAATTsuse.com- Added gnupg-CVE-2018-9234.patch: Enforce that key certification can only be done with the master key, and not a signing subkey. (bnc#1088255 CVE-2018-9234) * Sun Feb 25 2018 astiegerAATTsuse.com- GnuPG 2.2.5: * gpg: Allow the use of the \"cv25519\" and \"ed25519\" short names in addition to the canonical curve names in --batch --gen-key * gpg: Make sure to print all secret keys with option --list-only and --decrypt * gpg: Fix the use of future-default with --quick-add-key for signing keys * gpg: Select a secret key by checking availability under gpg-agent * gpg: Fix reversed prompt texts for --only-sign-text-ids * gpg,gpgsm: Fix detection of bogus keybox blobs on 32 bit systems * gpgsm: Fix regression since 2.1 in --export-secret-key-raw which got $d mod (q-1)$ wrong * scd: Support the KDF Data Object of the OpenPGP card 3.3 * scd: Fix a regression in the internal CCID driver for certain card readers * dirmngr: Improve returned error description on failure of DNS resolving * wks: Implement command --install-key for gpg-wks-server. * Thu Feb 22 2018 fvogtAATTsuse.com- Use %license (boo#1082318)
|
|
|