Sebastian,
Am Mittwoch 16 Juli 2025 12:34:34 schrieb Sebastian Wagner via Gnupg-users:
> Their work only consisted of development, not the uploading of packages
> to PyPI.
the plan of Paul and me is to upload a current version of the GPGME Python
bindungs to PyPI again. We have added Lucas Hoff
Hi,
congratulations on the new release!
(Just did the Fediverse news:
https://mstdn.social/@GnuPG/114618339067357870
)
Am Montag 02 Juni 2025 18:10:17 schrieb Werner Koch:
> This release is another one in a series of public
> testing releases eventually leading to a new stable version 2.7.
..
Hi Dennis,
Am Montag 26 Mai 2025 17:14:40 schrieb Dennis Clarke via Gnupg-users:
> I have tried repeatedly with emails to the "-request" address wherein I
> always get _two_ replies which request that I confirm the request to
> unsubscribe. I reply to both of them with only the single line that ha
Am Sonntag 20 April 2025 08:51:44 schrieb aslamK:
> The issue is therefore not with `gnu --verify`, but with the connection
> to `log-socket`:
> ===
> can't connect to '
> socket:///home/user/.gnupg/log-socket
> ': Connection refused
> ===
Check your configuration, e.g. ~/.gnupg/gpg.conf
mine has
Hello Uwe,
using gnupg 2.2.40-1.1 on Debian GNU/Linux
I can confirm the behaviour you are seeing.
rm -r ~/tmp/dot.gnupg/
GNUPGHOME=~/tmp/dot.gnupg/ bash
gpg --locate-external-keys \
mkorpersh...@baylibre.com u.kleine-koe...@baylibre.com
gpg --list-options show-unusable-uids--list-keys
gpg --lis
Am Dienstag 25 März 2025 15:11:07 schrieb Bernhard Reiter via Gnupg-users:
> omeone assigned a low/medium CVE number for this vulnerability:
To clarify, I wrote
While by common definitions, this defect is a software vulnerability, the low
CVSSv3 (2.7 by Redhat) shows that it is not someth
Am Freitag 07 März 2025 15:21:21 schrieb Werner Koch via Gnupg-users:
> * gpg: Fix a verification DoS due to a malicious subkey in the
> keyring. [T7527]
Someone assigned a low/medium CVE number for this vulnerability:
https://nvd.nist.gov/vuln/detail/CVE-2025-30258
As 2.4 stable has go
Am Sonntag 23 März 2025 18:07:31 schrieb Frank Guthausen:
> The keyserver concept is broken since there were some
> attacks in the past, and there are GDPR issues, too.
I consider the concept still valid.
For key discovery and a fall back for revoking keys.
Only the web of trust part has become u
Jacob,
Am Freitag 03 Januar 2025 02:31:43 schrieb Jacob Bachmeyer via Gnupg-users:
> I have been looking for hard numbers for the applicability of Shor's
> algorithm to RSA for a long time.
take a look at
Quantum-safe cryptography – fundamentals, current developments and
recommendations, BSI
Am Mittwoch 19 Februar 2025 19:15:40 schrieb andrewg via Gnupg-users:
> On 2025-02-19 15:59, Bernhard Reiter via Gnupg-users wrote:
> > there is a new online checker by Freddie Leeman
> >
> > https://webkeydirectory.com
>
> I believe this was first announced in 2019:
Hi,
there is a new online checker by Freddie Leeman
https://webkeydirectory.com
The source code is not public and in a test I've found out that
the SHOULD content-type is indicated in red, but I've also learned
that my policy file had a defect. So it is useful. :)
As long as your email addres
Hi,
started in May 2023, our GnuPG Mastodon account
has reached 1000 Followers!
https://mstdn.social/@GnuPG
\o/ :)
To give some perspective on this number: Because there is no algorithm
to fill in what a users sees and you cannot "buy" a placement
there, a follower in the fediverse is more l
Frank,
Am Freitag 10 Januar 2025 13:00:34 schrieb Frank Guthausen:
> Updated to GnuPG 2.5.3 (released yesterday 2025-01-09)
> from the ``GnuPG (devel with libs)'' sources.
thanks for offering that build.
https://blog.shimps.org/blogpost296-GnuPG-Upstream-packaged-in-Debian-style
Bernhard
--
h
Hello,
there have been three questions lately by US institutions similar to
https://forum.gnupg.org/t/bureaucracy-policy-documentation/5949/2
asking for "terms and conditions" for Gpg4win or suggesting
individual ones. Or asking for "privacy terms" and a
self-assessment following VPAT
for an "A
Hi Patrick,
Am Freitag 07 Juni 2024 12:25:58 schrieb Patrick F. Marques via Gnupg-users:
> I believe there is a “tiny” typo in this page
> https://www.gnupg.org/gph/en/manual/x334.html
> I believe it should be “their key” instead of “they key”
thanks for reporting!
> Also, according to https://
Am Donnerstag 20 Juni 2024 11:20:14 schrieb Marco Moock:
> My cert itself creates the problem, the separate CA intermediate
> cert can be imported properly.
I've figured and included the lines for additional context only. :)
--
https://intevation.de/~bernhard +49 541 33 508 3-3
Intevation GmbH
Hi Marco, hi Werner,
Am Dienstag 18 Juni 2024 08:44:00 schrieb Bernhard Reiter via Gnupg-users:
> > I can send you mine if you would like to test.
>
> At least I can try to import it and see what my version says.
did a test with Gpg4win, which print a different error message:
gpg (
Am Montag 17 Juni 2024 19:27:35 schrieb Marco Moock:
> Am 17.06.2024 um 17:14:07 Uhr schrieb Bernhard Reiter via Gnupg-users:
> > does Sectigo offer a public certificate somewhere which could
> > possibly be imported for a test?
> I can send you mine if you would like to test.
Hello,
Am Mittwoch 12 Juni 2024 21:37:11 schrieb Marco Moock:
> I got an S/MIME certificate from Sectigo, which I would like to use
> with gpgsm/Kleopatra.
does Sectigo offer a public certificate somewhere which could possibly be
imported for a test?
The message
gpgsm: unknown digest algorith
Am Mittwoch 21 Februar 2024 17:16:57 schrieb Werner Koch via Gnupg-users:
> On Wed, 21 Feb 2024 15:52, Philip Colmer said:
> > that works. The wiki (https://wiki.gnupg.org/WKDHosting) says to use
> > gpg --homedir "$(mktemp -d)" --verbose --locate-keys
> > your.em...@example.org ... and this doesn'
Am Donnerstag 15 Februar 2024 15:35:11 schrieb Werner Koch via Gnupg-users:
> On Thu, 15 Feb 2024 11:48, Bernhard Reiter said:
> > But it does not get the current version of the pubkey in some
> > circumstances.
>
> Example? I am not zware of it.
Testing with
2.4.4 and 2.2.34
gpg --locate-exter
Am Donnerstag 15 Februar 2024 10:45:53 schrieb Werner Koch:
> The following will get his pubkey by WKD on the command line:
> > gpg --locate-keys --auto-key-locate clear,nodefault,wkd w...@gnupg.org
>
> FWIW,
>
> gpg --locate-external-key w...@gnupg.org
>
> is much easier that the abvove lon
Am Dienstag 13 Februar 2024 15:50:55 schrieb mlist_e9e869bc--- via
Gnupg-users:
> Is wk at gnupg.org the private email I can send the public key to you?
Yes, that is one of Werner's pubkeys.
The following will get his pubkey by WKD on the command line:
gpg --locate-keys --auto-key-locate clear
Hi Witchy,
Am Samstag 03 Februar 2024 15:35:20 schrieb witchy via Gnupg-users:
> I am trying to install npth which is needed to build gpg.
> I noticed that the npth signature data has expired.
that is okay, if you downloaded stuff from
https://www.gnupg.org/download/index.html
nPth1.
24 matches
Mail list logo