summaryrefslogtreecommitdiff
path: root/security/gnupg2/distinfo
AgeCommit message (Collapse)AuthorFilesLines
2019-12-09gnupg2: updated to 2.2.19adam1-5/+5
Noteworthy changes in version 2.2.19: * gpg: Fix double free when decrypting for hidden recipients. Regression in 2.2.18. * gpg: Use auto-key-locate for encryption even for mail addressed given with angle brackets. * gpgsm: Add special case for certain expired intermediate certificates.
2019-11-27Update to 2.2.18ryoon1-5/+5
Changelog: Noteworthy changes in version 2.2.18 (2019-11-25) ------------------------------------------------- * gpg: Changed the way keys are detected on a smartcards; this allows the use of non-OpenPGP cards. In the case of a not very likely regression the new option --use-only-openpgp-card is available. [#4681] * gpg: The commands --full-gen-key and --quick-gen-key now allow direct key generation from supported cards. [#4681] * gpg: Prepare against chosen-prefix SHA-1 collisions in key signatures. This change removes all SHA-1 based key signature newer than 2019-01-19 from the web-of-trust. Note that this includes all key signature created with dsa1024 keys. The new option --allow-weak-key-signatues can be used to override the new and safer behaviour. [#4755,CVE-2019-14855] * gpg: Improve performance for import of large keyblocks. [#4592] * gpg: Implement a keybox compression run. [#4644] * gpg: Show warnings from dirmngr about redirect and certificate problems (details require --verbose as usual). * gpg: Allow to pass the empty string for the passphrase if the '--passphase=' syntax is used. [#4633] * gpg: Fix printing of the KDF object attributes. * gpg: Avoid surprises with --locate-external-key and certain --auto-key-locate settings. [#4662] * gpg: Improve selection of best matching key. [#4713] * gpg: Delete key binding signature when deletring a subkey. [#4665,#4457] * gpg: Fix a potential loss of key sigantures during import with self-sigs-only active. [#4628] * gpg: Silence "marked as ultimately trusted" diagnostics if option --quiet is used. [#4634] * gpg: Silence some diagnostics during in key listsing even with option --verbose. [#4627] * gpg, gpgsm: Change parsing of agent's pkdecrypt results. [#4652] * gpgsm: Support AES-256 keys. * gpgsm: Fix a bug in triggering a keybox compression run if --faked-system-time is used. * dirmngr: System CA certificates are no longer used for the SKS pool if GNUTLS instead of NTBTLS is used as TLS library. [#4594] * dirmngr: On Windows detect usability of IPv4 and IPv6 interfaces to avoid long timeouts. [#4165] * scd: Fix BWI value for APDU level transfers to make Gemalto Ezio Shield and Trustica Cryptoucan work. [#4654,#4566] * wkd: gpg-wks-client --install-key now installs the required policy file.
2019-07-10gnupg2: updated to 2.2.17adam1-5/+5
Noteworthy changes in version 2.2.17: * gpg: Ignore all key-signatures received from keyservers. This change is required to mitigate a DoS due to keys flooded with faked key-signatures. The old behaviour can be achieved by adding keyserver-options no-self-sigs-only,no-import-clean to your gpg.conf. * gpg: If an imported keyblocks is too large to be stored in the keybox (pubring.kbx) do not error out but fallback to an import using the options "self-sigs-only,import-clean". * gpg: New command --locate-external-key which can be used to refresh keys from the Web Key Directory or via other methods configured with --auto-key-locate. * gpg: New import option "self-sigs-only". * gpg: In --auto-key-retrieve prefer WKD over keyservers. * dirmngr: Support the "openpgpkey" subdomain feature from draft-koch-openpgp-webkey-service-07. * dirmngr: Add an exception for the "openpgpkey" subdomain to the CSRF protection. * dirmngr: Fix endless loop due to http errors 503 and 504. * dirmngr: Fix TLS bug during redirection of HKP requests. * gpgconf: Fix a race condition when killing components.
2019-06-02gnupg2: updated to 2.2.16adam1-5/+5
Noteworthy changes in version 2.2.16: * gpg,gpgsm: Fix deadlock on Windows due to a keybox sharing violation. * gpg: Allow deletion of subkeys with --delete-key. This finally makes the bang-suffix work as expected for that command. * gpg: Replace SHA-1 by SHA-256 in self-signatures when updating them with --quick-set-expire or --quick-set-primary-uid. * gpg: Improve the photo image viewer selection. * gpg: Fix decryption with --use-embedded-filename. * gpg: Remove hints on using the --keyserver option. * gpg: Fix export of certain secret keys with comments. * gpg: Reject too long user-ids in --quick-gen-key. * gpg: Fix a double free in the best key selection code. * gpg: Fix the key generation dialog for switching back from EdDSA to ECDSA. * gpg: Use AES-192 with SHA-384 to comply with RFC-6637. * gpg: Use only the addrspec from the Signer's UID subpacket to mitigate a problem with another implementation. * gpg: Skip invalid packets during a keyring listing and sync diagnostics with the output. * gpgsm: Avoid confusing diagnostic when signing with the default key. * agent: Do not delete any secret key in --dry-run mode. * agent: Fix failures on 64 bit big-endian boxes related to URIs in a keyfile. * agent: Stop scdaemon after a reload with disable-scdaemon newly configured. * dirmngr: Improve caching algorithm for WKD domains. * dirmngr: Support other hash algorithms than SHA-1 for OCSP. * gpgconf: Make --homedir work for --launch. * gpgconf: Before --launch check for a valid config file. * wkd: Do not import more than 5 keys from one WKD address. * wkd: Accept keys which are stored in armored format in the directory. * The installer for Windows now comes with signed binaries.
2019-04-01gnupg2: updated to 2.2.15adam1-6/+5
Noteworthy changes in version 2.2.15: * sm: Fix --logger-fd and --status-fd on Windows for non-standard file descriptors. * sm: Allow decryption even if expired keys are configured. * agent: Change command KEYINFO to print ssh fingerprints with other hash algos. * dirmngr: Fix build problems on Solaris due to the use of reserved symbol names. * wkd: New commands --print-wkd-hash and --print-wkd-url for gpg-wks-client.
2019-03-27gnupg2: Fix build.jperkin1-1/+2
2019-03-20gnupg2: updated to 2.2.14adam1-5/+5
Noteworthy changes in version 2.2.14: * gpg: Allow import of PGP desktop exported secret keys. Also avoid importing secret keys if the secret keyblock is not valid. * gpg: Do not error out on version 5 keys in the local keyring. * gpg: Make invalid primary key algo obvious in key listings. * sm: Do not mark a certificate in a key listing as de-vs compliant if its use for a signature will not be possible. * sm: Fix certificate creation with key on card. * sm: Create rsa3072 bit certificates by default. * sm: Print Yubikey attestation extensions with --dump-cert. * agent: Fix cancellation handling for scdaemon. * agent: Support --mode=ssh option for CLEAR_PASSPHRASE. * scd: Fix flushing of the CA-FPR DOs in app-openpgp. * scd: Avoid a conflict error with the "undefined" app. * dirmngr: Add CSRF protection exception for protonmail. * dirmngr: Fix build problems with gcc 9 in libdns. * gpgconf: New option --show-socket for use wity --launch. * gpgtar: Make option -C work for archive creation.
2019-02-13gnupg2: updated to 2.2.13adam1-5/+5
Noteworthy changes in version 2.2.13: * gpg: Implement key lookup via keygrip (using the & prefix). * gpg: Allow generating Ed25519 key from existing key. * gpg: Emit an ERROR status line if no key was found with -k. * gpg: Stop early when trying to create a primary Elgamal key. * gpgsm: Print the card's key algorithms along with their keygrips in interactive key generation. * agent: Clear bogus pinentry cache in the error case. * scd: Support "acknowledge button" feature. * scd: Fix for USB INTERRUPT transfer. * wks: Do no use compression for the the encrypted challenge and response
2018-12-20gnupg2: updated to 2.2.12adam1-5/+5
Noteworthy changes in version 2.2.12: * tools: New commands --install-key and --remove-key for gpg-wks-client. This allows to prepare a Web Key Directory on a local file system for later upload to a web server. * gpg: New --list-option "show-only-fpr-mbox". This makes the use of the new gpg-wks-client --install-key command easier on Windows. * gpg: Improve processing speed when --skip-verify is used. * gpg: Fix a bug where a LF was accidentally written to the console. * gpg: --card-status now shwos whether a card has the new KDF feature enabled. * agent: New runtime option --s2k-calibration=MSEC. New configure option --with-agent-s2k-calibration=MSEC. * dirmngr: Try another keyserver from the pool on receiving a 502, 503, or 504 error. * dirmngr: Avoid possible CSRF attacks via http redirects. A HTTP query will not anymore follow a 3xx redirect unless the Location header gives the same host. If the host is different only the host and port is taken from the Location header and the original path and query parts are kept. * dirmngr: New command FLUSHCRL to flush all CRLS from disk and memory. * New simplified Chinese translation (zh_CN).
2018-11-07gnupg2: updated to 2.2.11adam1-5/+5
Noteworthy changes in version 2.2.11: * gpgsm: Fix CRL loading when intermediate certicates are not yet trusted. * gpgsm: Fix an error message about the digest algo. * gpg: Fix a wrong warning due to new sign usage check introduced with 2.2.9. * gpg: Print the "data source" even for an unsuccessful keyserver query. * gpg: Do not store the TOFU trust model in the trustdb. This allows to enable or disable a TOFO model without triggering a trustdb rebuild. * scd: Fix cases of "Bad PIN" after using "forcesig". * agent: Fix possible hang in the ssh handler. * dirmngr: Tack the unmodified mail address to a WKD request. See commit a2bd4a64e5b057f291a60a9499f881dd47745e2f for details. * dirmngr: Tweak diagnostic about missing LDAP server file. * dirmngr: In verbose mode print the OCSP responder id. * dirmngr: Fix parsing of the LDAP port. * wks: Add option --directory/-C to the server. Always build the server on Unix systems. * wks: Add option --with-colons to the client. Support sites which use the policy file instead of the submission-address file. * Fix EBADF when gpg et al. are called by broken CGI scripts. * Fix some minor memory leaks and bugs.
2018-09-05Update to 2.2.10ryoon1-5/+5
Changelog: Noteworthy changes in version 2.2.10 (2018-08-30) ------------------------------------------------- gpg: Refresh expired keys originating from the WKD. [#2917] gpg: Use a 256 KiB limit for a WKD imported key. gpg: New option --known-notation. [#4060] scd: Add support for the Trustica Cryptoucan reader. agent: Speed up starting during on-demand launching. [#3490] dirmngr: Validate SRV records in WKD queries.
2018-07-16Update to 2.2.9ryoon1-5/+5
Changelog: Noteworthy changes in version 2.2.9 (2018-07-12) ------------------------------------------------ * dirmngr: Fix recursive resolver mode and other bugs in the libdns code. [#3374,#3803,#3610] * dirmngr: When using libgpg-error 1.32 or later a GnuPG build with NTBTLS support (e.g. the standard Windows installer) does not anymore block for dozens of seconds before returning data. * gpg: Fix bug in --show-keys which actually imported revocation certificates. [#4017] * gpg: Ignore too long user-ID and comment packets. [#4022] * gpg: Fix crash due to bad German translation. Improved printf format compile time check. * gpg: Handle missing ISSUER sub packet gracefully in the presence of the new ISSUER_FPR. [#4046] * gpg: Allow decryption using several passphrases in most cases. [#3795,#4050] * gpg: Command --show-keys now enables the list options show-unusable-uids, show-unusable-subkeys, show-notations and show-policy-urls by default. * gpg: Command --show-keys now prints revocation certificates. [#4018] * gpg: Add revocation reason to the "rev" and "rvs" records of the option --with-colons. [#1173] * gpg: Export option export-clean does now remove certain expired subkeys; export-minimal removes all expired subkeys. [#3622] * gpg: New "usage" property for the drop-subkey filters. [#4019] Release-info: https://dev.gnupg.org/T4036 See-also: gnupg-announce/2018q3/000427.html
2018-06-09gnupg2: Update security/gnupg to 2.2.8leot1-5/+5
Changes: Noteworthy changes in version 2.2.8 (2018-06-08) ------------------------------------------------ * gpg: Decryption of messages not using the MDC mode will now lead to a hard failure even if a legacy cipher algorithm was used. The option --ignore-mdc-error can be used to turn this failure into a warning. Take care: Never use that option unconditionally or without a prior warning. * gpg: The MDC encryption mode is now always used regardless of the cipher algorithm or any preferences. For testing --rfc2440 can be used to create a message without an MDC. * gpg: Sanitize the diagnostic output of the original file name in verbose mode. [#4012, CVE-2018-12020] * gpg: Detect suspicious multiple plaintext packets in a more reliable way. [#4000] * gpg: Fix the duplicate key signature detection code. [#3994] * gpg: The options --no-mdc-warn, --force-mdc, --no-force-mdc, --disable-mdc and --no-disable-mdc have no more effect. * agent: Add DBUS_SESSION_BUS_ADDRESS and a few other envvars to the list of startup environment variables. [#3947]
2018-05-04gnupg2: updated to 2.2.7adam1-5/+5
changes in version 2.2.7: * gpg: New option --no-symkey-cache to disable the passphrase cache for symmetrical en- and decryption. * gpg: The ERRSIG status now prints the fingerprint if that is part of the signature. * gpg: Relax emitting of FAILURE status lines * gpg: Add a status flag to "sig" lines printed with --list-sigs. * gpg: Fix "Too many open files" when using --multifile. * ssh: Return an error for unknown ssh-agent flags. * dirmngr: Fix a regression since 2.1.16 which caused corrupted CRL caches under Windows. * dirmngr: Fix a CNAME problem with pools and TLS. Also use a fixed mapping of keys.gnupg.net to sks-keyservers.net. * dirmngr: Try resurrecting dead hosts earlier (from 3 to 1.5 hours). * dirmngr: Fallback to CRL if no default OCSP responder is configured. * dirmngr: Implement CRL fetching via https. Here a redirection to http is explictly allowed. * dirmngr: Make LDAP searching and CRL fetching work under Windows. This stopped working with 2.1. * agent,dirmngr: New sub-command "getenv" for "getinfo" to ease debugging.
2018-04-12gnupg2: updated to 2.2.6adam1-5/+5
Noteworthy changes in version 2.2.6: * gpg,gpgsm: New option --request-origin to pretend requests coming from a browser or a remote site. * gpg: Fix race condition on trustdb.gpg updates due to too early released lock. * gpg: Emit FAILURE status lines in almost all cases. * gpg: Implement --dry-run for --passwd to make checking a key's passphrase straightforward. * gpg: Make sure to only accept a certification capable key for key signatures. * gpg: Better user interaction in --card-edit for the factory-reset sub-command. * gpg: Improve changing key attributes in --card-edit by adding an explicit "key-attr" sub-command. * gpg: Print the keygrips in the --card-status. * scd: Support KDF DO setup. * scd: Fix some issues with PC/SC on Windows. * scd: Fix suspend/resume handling in the CCID driver. * agent: Evict cached passphrases also via a timer. * agent: Use separate passphrase caches depending on the request origin. * ssh: Support signature flags. * dirmngr: Handle failures related to missing IPv6 support gracefully. * Fix corner cases related to specified home directory with drive letter on Windows. * Allow the use of UNC directory names as homedir.
2018-02-26gnupg2: updated to 2.2.5adam1-5/+5
version 2.2.5: * gpg: Allow the use of the "cv25519" and "ed25519" short names in addition to the canonical curve names in --batch --gen-key. * gpg: Make sure to print all secret keys with option --list-only and --decrypt. * gpg: Fix the use of future-default with --quick-add-key for signing keys. * gpg: Select a secret key by checking availability under gpg-agent. * gpg: Fix reversed prompt texts for --only-sign-text-ids. * gpg,gpgsm: Fix detection of bogus keybox blobs on 32 bit systems. * gpgsm: Fix regression since 2.1 in --export-secret-key-raw which got $d mod (q-1)$ wrong. Note that most tools automatically fixup that parameter anyway. * ssh: Fix a regression in getting the client'd PID on *BSD and macOS. * scd: Support the KDF Data Object of the OpenPGP card 3.3. * scd: Fix a regression in the internal CCID driver for certain card readers. * scd: Fix a problem on NetBSD killing scdaemon on gpg-agent shutdown. * dirmngr: Improve returned error description on failure of DNS resolving. * wks: Implement command --install-key for gpg-wks-server. * Add option STATIC=1 to the Speedo build system to allow a build with statically linked versions of the core GnuPG libraries. Also use --enable-wks-tools by default by Speedo builds for Unix.
2017-12-21gnupg2: updated to 2.2.4adam1-5/+5
Noteworthy changes in version 2.2.4: * gpg: Change default preferences to prefer SHA512. * gpg: Print a warning when more than 150 MiB are encrypted using a cipher with 64 bit block size. * gpg: Print a warning if the MDC feature has not been used for a message. * gpg: Fix regular expression of domain addresses in trust signatures. * agent: New option --auto-expand-secmem to help with high numbers of concurrent connections. Requires libgcrypt 1.8.2 for having an effect. * dirmngr: Cache responses of WKD queries. * gpgconf: Add option --status-fd. * wks: Add commands --check and --remove-key to gpg-wks-server. * Increase the backlog parameter of the daemons to 64 and add option --listen-backlog. * New configure option --enable-run-gnupg-user-socket to first try a socket directory which is not removed by systemd at session end.
2017-11-24gnupg2: updated to 2.2.3adam1-5/+5
changes in version 2.2.3: * gpgsm: Fix initial keybox creation on Windows. * dirmngr: Fix crash in case of a CRL loading error. * Fix the name of the Windows registry key. * gpgtar: Fix wrong behaviour of --set-filename. * gpg: Silence AKL retrieval messages. * agent: Use clock or clock_gettime for calibration. * agent: Improve robustness of the shutdown pending state.
2017-11-09gnupg2: updated to 2.2.2adam1-5/+5
changes in version 2.2.2: * gpg: Avoid duplicate key imports by concurrently running gpg processes. * gpg: Fix creating on-disk subkey with on-card primary key. * gpg: Fix validity retrieval for multiple keyrings. * gpg: Fix --dry-run and import option show-only for secret keys. * gpg: Print "sec" or "sbb" for secret keys with import option import-show. * gpg: Make import less verbose. * gpg: Add alias "Key-Grip" for parameter "Keygrip" and new parameter "Subkey-Grip" to unattended key generation. * gpg: Improve "factory-reset" command for OpenPGP cards. * gpg: Ease switching Gnuk tokens into ECC mode by using the magic keysize value 25519. * gpgsm: Fix --with-colon listing in crt records for fields > 12. * gpgsm: Do not expect X.509 keyids to be unique. * agent: Fix stucked Pinentry when using --max-passphrase-days. * agent: New option --s2k-count. * dirmngr: Do not follow https-to-http redirects. * dirmngr: Reduce default LDAP timeout from 100 to 15 seconds. * gpgconf: Ignore non-installed components for commands --apply-profile and --apply-defaults. * Add configure option --enable-werror.
2017-09-30gnupg2: update to 2.2.1adam1-5/+5
version 2.2.1: * gpg: Fix formatting of the user id in batch mode key generation if only "name-email" is given. * gpgv: Fix annoying "not suitable for" warnings. * wks: Convey only the newest user id to the provider. This is the case if different names are used with the same addr-spec. * wks: Create a complying user id for provider policy mailbox-only. * wks: Add workaround for posteo.de. * scd: Fix the use of large ECC keys with an OpenPGP card. * dirmngr: Use system provided root certificates if no specific HKP certificates are configured. If build with GNUTLS, this was already the case.
2017-08-29Updated gnupg2 to 2.2.0.wiz1-6/+5
Noteworthy changes in version 2.2.0 (2017-08-28) ------------------------------------------------ This is the new long term stable branch. This branch will only see bug fixes and no new features. * gpg: Reverted change in 2.1.23 so that --no-auto-key-retrieve is again the default. * Fixed a few minor bugs.
2016-04-13Update gnupg2 to 2.0.30.wiz1-6/+5
Noteworthy changes in version 2.0.30 (2016-03-31) ------------------------------------------------- * gpg: Avoid too early timeout during key generation with 2.1 cards. * agent: Fixed printing of ssh fingerprints for 384 bit ECDSA keys. * agent: Fixed an alignment bug related to the passphrase confirmation. * scdaemon: Fixed a "conflicting usage" bug. * scdaemon: Fixed usb card reader removal problem on Windows 8 and later. * Fixed a problem on AIX due to peculiarity with RLIMIT_NOFILE. * Updated the Japanese and Dutch translations. * Fixed a few other bugs.
2015-11-04Add SHA512 digests for distfiles for security categoryagc1-1/+2
Problems found locating distfiles: Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz Package libidea: missing distfile libidea-0.8.2b.tar.gz Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2 Package uvscan: missing distfile vlp4510e.tar.Z Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail.
2015-09-09Update security/gnupg2 to 2.0.29.wiz1-8/+5
While here, clean up patches. They looked pretty cargo-culty to me and were not commented. File a bug report for one of the remaining ones and link to it from comment. Changes in 2.0.29: Noteworthy changes in version 2.0.29 (2015-09-08) ------------------------------------------------- * gpg: Print a PGP-2 fingerprint again instead of a row of "0". * gpg: Fixed a race condition from multiple several "gpg --verify". * gpg: Print FAILURE status lines to help GPGME. * gpgsm: Fixed a regression in CSR generation. * scdaemon: Fixed problems with some pinpads. * Fixed a few other bugs.
2015-06-03Update to 2.0.28:wiz1-4/+4
Noteworthy changes in version 2.0.28 (2015-06-02) ------------------------------------------------- * agent: Added support for an external password manager. * gpg: New command --list-gcrypt-config. * gpg: Issue NEWSIG status lines during signature verification. * gpgsm: The default hash algo for a CSR is now SHA-256 and the default encryption algo is AES-128. * scdaemon: Allow PC/SC reader selection by partial name match. * gpgtar: Fix extracting files with a size of a multiple of 512. * Fixed several other bugs. * Libgcrypt 1.5 is now required.
2015-02-21Update to 2.0.27:wiz1-4/+4
Noteworthy changes in version 2.0.27 (2015-02-18) ------------------------------------------------- * gpg: Detect faulty use of --verify on detached signatures. * gpg: New import option "keep-ownertrust". * gpg: Uses SHA-256 for all signature types also on RSA keys. * gpg: Added support for algo names when generating keys using the --command-fd method. * gpg: Unless --allow-weak-digest-algos is used the insecure MD5 based fingerprints are shown as all zeroe * gpg: Fixed DoS based on bogus and overlong key packets. * gpg: Better error reporting for keyserver problems. * Fixed several bugs related to bogus keyrings and improved some other code.
2015-01-15Fix executable name in gpgkey2ssh tool.wiz1-1/+2
From ISIHARA Takanori in PR 49576. Bump PKGREVISION.
2014-08-16Update to 2.0.26:wiz1-4/+4
Noteworthy changes in version 2.0.26 (2014-08-12) ------------------------------------------------- * gpg: Fix a regression in 2.0.24 if a subkey id is given to --recv-keys et al. * gpg: Cap attribute packets at 16MB. * gpgsm: Auto-create the ".gnupg" home directory in the same way gpg does. * scdaemon: Allow for certificates > 1024 when using PC/SC.
2014-07-22Update to 2.0.25. Rename gpgsm option to gnupg2-gpgsm.wiz1-4/+4
Noteworthy changes in version 2.0.25 (2014-06-30) ------------------------------------------------- * gpg: Fix a regression in 2.0.24 if more than one keyid is given to --recv-keys et al. * gpg: Cap RSA and Elgamal keysize at 4096 bit also for unattended key generation. * gpgsm: Fix a DISPLAY related problem with --export-secret-key-p12. * scdaemon: Support reader Gemalto IDBridge CT30.
2014-06-24Update to 2.0.24, security fix:wiz1-4/+4
Noteworthy changes in version 2.0.24 (2014-06-24) ------------------------------------------------- * gpg: Avoid DoS due to garbled compressed data packets. * gpg: Screen keyserver responses to avoid importing unwanted keys from rogue servers. * gpg: The validity of user ids is now shown by default. To revert this add "list-options no-show-uid-validity" to gpg.conf. * gpg: Print more specific reason codes with the INV_RECP status. * gpg: Allow loading of a cert only key to an OpenPGP card. * gpg-agent: Make ssh support for ECDSA keys work with Libgcrypt 1.6. Noteworthy changes in version 2.0.23 (2014-06-03) ------------------------------------------------- * gpg: Reject signatures made using the MD5 hash algorithm unless the new option --allow-weak-digest-algos or --pgp2 are given. * gpg: Do not create a trustdb file if --trust-model=always is used. * gpg: Only the major version number is by default included in the armored output. * gpg: Print a warning if the Gnome-Keyring-Daemon intercepts the communication with the gpg-agent. * gpg: The format of the fallback key listing ("gpg KEYFILE") is now more aligned to the regular key listing ("gpg -k"). * gpg: The option--show-session-key prints its output now before the decryption of the bulk message starts. * gpg: New %U expando for the photo viewer. * gpgsm: Improved handling of re-issued CA certificates. * scdaemon: Various fixes for pinpad equipped card readers. * Minor bug fixes.
2013-10-05Update to 2.0.22:wiz1-4/+4
Noteworthy changes in version 2.0.22 (2013-10-04) ------------------------------------------------- * Fixed possible infinite recursion in the compressed packet parser. [CVE-2013-4402] * Improved support for some card readers. * Prepared building with the forthcoming Libgcrypt 1.6. * Protect against rogue keyservers sending secret keys.
2013-09-02Update to 2.0.21:wiz1-5/+4
Noteworthy changes in version 2.0.21 (2013-08-19) ------------------------------------------------- * gpg-agent: By default the users are now asked via the Pinentry whether they trust an X.509 root key. To prohibit interactive marking of such keys, the new option --no-allow-mark-trusted may be used. * gpg-agent: The command KEYINFO has options to add info from sshcontrol. * The included ssh agent does now support ECDSA keys. * The new option --enable-putty-support allows gpg-agent to act on Windows as a Pageant replacement with full smartcard support. * Support installation as portable application under Windows.
2013-05-29Update to 2.0.20:wiz1-4/+4
Noteworthy changes in version 2.0.20 (2013-05-10) ------------------------------------------------- * Decryption using smartcards keys > 3072 bit does now work. * New meta option ignore-invalid-option to allow using the same option file by other GnuPG versions. * gpg: The hash algorithm is now printed for sig records in key listings. * gpg: Skip invalid keyblock packets during import to avoid a DoS. * gpg: Correctly handle ports from DNS SRV records. * keyserver: Improve use of SRV records * gpg-agent: Avoid tty corruption when killing pinentry. * scdaemon: Improve detection of card insertion and removal. * scdaemon: Rename option --disable-keypad to --disable-pinpad. * scdaemon: Better support for CCID readers. Now, the internal CCID driver supports readers without the auto configuration feature. * scdaemon: Add pinpad input for PC/SC, if your reader has pinpad and it supports variable length PIN input, and you specify --enable-pinpad-varlen option. * scdaemon: New option --enable-pinpad-varlen. * scdaemon: Install into libexecdir to avoid accidental execution from the command line. * Support building using w64-mingw32. * Assorted bug fixes.
2013-01-15add patch from upstream to fix possible keyring corruptiondrochner1-1/+2
on import of corrupted keys (CVE-2012-6085), bump PKGREV from "Bug Hunting" per PR pkg/47442
2012-04-17update to 2.0.19drochner1-6/+4
changes: -cmd line UI improvements -Ukrainian translation
2011-09-12fix configure check for libcurl, from John Marshall on the gnupg-develdrochner1-1/+2
mailing list bump PKGREV
2011-08-11Changes 2.0.18:adam1-4/+4
* Bug fix for newer versions of Libgcrypt. * Support the SSH confirm flag and show SSH fingerprints in ssh related pinentries. * Improved dirmngr/gpgsm interaction for OCSP. * Allow generation of card keys up to 4096 bit.
2011-05-05Fix buildling with Clangadam1-3/+2
2011-01-20Changes 2.0.17:adam1-9/+8
* Allow more hash algorithms with the OpenPGP v2 card. * The gpg-agent now tests for a new gpg-agent.conf on a HUP. * Fixed output of "gpgconf --check-options". * Fixed a bug where Scdaemon sends a signal to Gpg-agent running in non-daemon mode. * Fixed TTY management for pinentries and session variable update problem.
2010-09-02Some fixes at update to 2.0.16.obache1-2/+3
* not using autogen.sh anymore, so remove some tools from USE_TOOLS. * patch-ak does not effect anymore for above reason, add patch-ao for it. this patch is required to avoid conflict with security/gnupg. Bump PKGREVISION.
2010-09-01update to 2.0.16drochner1-12/+4
changes: -bugfixes -New command --passwd for GPG -Make use of libassuan 2.0 which is available as a DSO -The gpg-agent commands KILLAGENT and RELOADAGENT are now available on all platforms
2010-08-03add patch from upstream to fix a possible use-after-free problemdrochner1-1/+2
(CVE-2010-2547), bump PKGREVISION
2010-02-03add a patch from upstream CVS to fix a bug which could make keysdrochner1-1/+2
unusable on passphrase changes bump PKGREVISION
2010-01-15update to 2.0.14drochner1-7/+4
changes: * The default for --include-cert is now to include all certificates in the chain except for the root certificate. * Numerical values may now be used as an alternative to the debug-level keywords. * The GPGSM --audit-log feature is now more complete. * GPG now supports DNS lookups for SRV, PKA and CERT on W32. * New GPGSM option --ignore-cert-extension. * New and changed passphrases are now created with an iteration count requiring about 100ms of CPU work.
2009-12-18kill the "idea" option -- gnupg2 uses libgcrypt which used to havedrochner1-1/+2
an "idea" option, but that was removed more than a year ago when it got updated from 1.2 to 1.4 The patch was was used on gnupg2 in the "idea" case was just a four-line memory initialization fix, there is no point in LICENSE restrictions due to this, so I've pulled it in as regular patch so that it doesn't get lost for the case someone fixes idea support in libgcrypt (which isn't hard).
2009-12-16don't install the gpg-zip.1 manpage, avoids CONFLICT with gnupg1,drochner1-1/+2
noticed by OBATA Akio per mail to pkgsrc-users. This makes most sense to me since gnupg2 doesn't install a gpg-zip intentionally. Since possible clients of gpg-zip should have a dependency on gnupg1, we can't take over easily. Once we are sure that gnupg2 can fully replace gnupg1, we might consider to install eg symlinks gpg->gpg2 etc and make gnupg1 obsolete, but this needs careful testing.
2009-12-16Add checksum for idea patch.wiz1-1/+4
2009-12-15update to 2.0.13drochner1-9/+9
changes: many fixes and improvements reviewed by John R. Shannon pkgsrc notes: -since S/MIME support is the biggest difference in functionality over gnupg1, enable it per default -- my tests (with the s/mime plugin of claws-mail) worked -left the build against a private libassuan with GNU-pth support alone for now, just updated libassuan to 1.0.5. We might build pkgsrc/libassuan against pkgsrc/pth at some point, but this needs to be checked for side effects. (As this pkg doesn't export a library which might propagate the pth dependency, the possibility of pthread-pth conflicts should be limited. Other uses of libassuan need to be checked.)
2008-04-28Update to 2.0.9. Changes:shannonjr1-9/+9
* Enhanced gpg-connect-agent with a small scripting language. * New option --list-config for gpgconf. * Fixed a crash in gpgconf. * The envvars XAUTHORITY and PINENTRY_USER_DATA are now passed to the pinentry. * Fixed the auto creation of the key stub for smartcards. * Fixed a rare bug in decryption using the OpenPGP card. * Creating DSA2 keys is now possible. * New option --extra-digest-algo for gpgsm to allow verification of broken signatures. * Allow encryption with legacy Elgamal sign+encrypt keys with option --rfc2440.
2007-11-07Update to 2.0.7. This is maintenance release with a few minor enhancements.shannonjr1-11/+8
Changes: * Fixed encryption problem if duplicate certificates are in the keybox. * Add new options min-passphrase-nonalpha, check-passphrase-pattern, enforce-passphrase-constraints and max-passphrase-days to gpg-agent. * Add command --check-components to gpgconf. Gpgconf now uses the installed versions of the programs and does not anymore search via PATH for them.