• GnuPG 2.4 before Trixie freeze

    From Stephan =?ISO-8859-1?Q?Verb=FCcheln@21:1/5 to All on Tue Sep 24 14:50:02 2024
    Hello everyone

    Debian Trixie and Sid still have GnuPG 2.2.x. GnuPG 2.4.5 is available
    in Experimental.
    GnuPG 2.4.0 was released on December 20, 2022. The 2.4.x series has
    various useful new features such as TPM support.


    Is it realistic to get GnuPG 2.4 into Trixie before the freeze?

    What is missing for acceptance into unstable/testing?

    Regards
    Stephan

    -----BEGIN PGP SIGNATURE-----

    iHUEABYIAB0WIQRB1rjSpCJd8a7h6mNgNUJZCjx8YgUCZvKz5AAKCRBgNUJZCjx8 YpSIAP91t7B544pigUbIpTu9EANe3c0HdTFnlqNQnLNdCnq5oAD/XCKIDbe/f2xm /xypzR+//gzdSnQgr9azx+nZpT30Rww=
    =r5+q
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Fabio Fantoni@21:1/5 to =?UTF-8?Q?Stephan_Verb=C3=BCcheln?= on Tue Sep 24 15:10:01 2024
    To: debian-devel@lists.debian.org

    This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------JIakltE0F2sK4zQge9Xe0LkU
    Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64

    SWwgMjQvMDkvMjAyNCAxNDo0MywgU3RlcGhhbiBWZXJiw7xjaGVsbiBoYSBzY3JpdHRvOg0K PiBIZWxsbyBldmVyeW9uZQ0KPg0KPiBEZWJpYW4gVHJpeGllIGFuZCBTaWQgc3RpbGwgaGF2 ZSBHbnVQRyAyLjIueC4gR251UEcgMi40LjUgaXMgYXZhaWxhYmxlDQo+IGluIEV4cGVyaW1l bnRhbC4NCj4gR251UEcgMi40LjAgd2FzIHJlbGVhc2VkIG9uIERlY2VtYmVyIDIwLCAyMDIy LiBUaGUgMi40Lnggc2VyaWVzIGhhcw0KPiB2YXJpb3VzIHVzZWZ1bCBuZXcgZmVhdHVyZXMg c3VjaCBhcyBUUE0gc3VwcG9ydC4NCj4NCj4NCj4gSXMgaXQgcmVhbGlzdGljIHRvIGdldCBH bnVQRyAyLjQgaW50byBUcml4aWUgYmVmb3JlIHRoZSBmcmVlemU/DQo+DQo+IFdoYXQgaXMg bWlzc2luZyBmb3IgYWNjZXB0YW5jZSBpbnRvIHVuc3RhYmxlL3Rlc3Rpbmc/DQo+DQo+IFJl Z2FyZHMNCj4gU3RlcGhhbg0KDQpZb3UgY2FuIHNlYXJjaCBidWdzIHJlbGF0ZWQgdG8gMi40 IGFuZCBsb29raW5nIGludG8gdGhlbSBmb3IgcG9zc2libGUgDQppbmZvcm1hdGlvbiwgZm9y IGV4YW1wbGUgZnJvbSBhIHZlcnkgZmFzdCBsb29rIHRoaXMgc2VlbXMgb25lOg0KDQpodHRw czovL2J1Z3MuZGViaWFuLm9yZy9jZ2ktYmluL2J1Z3JlcG9ydC5jZ2k/YnVnPTEwMjI3MDIN
    Cg0K

    --------------JIakltE0F2sK4zQge9Xe0LkU--

    -----BEGIN PGP SIGNATURE-----

    wsF5BAABCAAjFiEELEHRfLe4S9D5+1GzaAZorpB/EB0FAmbyuI8FAwAAAAAACgkQaAZorpB/EB1o LQ/9EgocbYU6ZTNkwRAmhxi6wI8pclMIVF2LrhhXaqTwX1DEsSi+29V6v8l06CRoW+ZYfU0fSqgV VGbuiiuMQpIzBVDt+2zF20SoSqn0XtEL0bfSKZ8hWQilBbmYoY5fP8HCJbMB4vQd5c4ceV2pLUqO 5bOy9iYll9Oe4ooLcJu9ROri65J86oR5sTEGIQXVqITQyMFd5vyXhvjzuuYoW/URZt4MJUQCqrhJ wONLCGbwcBzzmXZRF4D+Zci66ZhoqZT4nTjSYxZaFnnRMODyz7c2MAmizCafCWt6cE+O6uCau6nR ++FnttQwt+2bICyIiqCJKtW1Wy5504S2KNXMvH7bxIug7VpusOWxwFiHKumTsXrD5X5m3+1KjVbk Vd3TGldmIVWvfumewoDM72mkTp4R6waGtcfBfTcwZ6lWNoujazqR6CReMJM8v94t43niGJOs++or T2EnhSQmA1JFytZ373HuhAm/dT+/Gmx3Hk49/A9HFcz7m3PUZYZT3srsNmv9X/xftGqUGymZHvom LrM70VvHOgeG7drnDC3sq0kRDIh37GFgGgMnWLwuXSZjjjG3fWFbAazUgVGuyWtj0ONlsQjde2o/ NkifVoXgBmuG/C8vsKK0jPwKtZxJEVFjXxCFADeShNFXgTBO+BsZAEYyU5g+RVEKVK2lBFrXCt0c HuM=
    =0U95
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stephan =?ISO-8859-1?Q?Verb=FCcheln@21:1/5 to All on Tue Nov 26 11:50:02 2024
    I tried to find a blocking bug before my question on debian-devel, but
    I could not find any bug which justifies the delay.

    Note that Ubuntu 24.04 LTS also already uses GnuPG 2.4.x, so I do not
    expect a problem with the Debian tooling base like dpkg and apt.

    Regards

    -----BEGIN PGP SIGNATURE-----

    iHUEABYKAB0WIQRB1rjSpCJd8a7h6mNgNUJZCjx8YgUCZ0WnIwAKCRBgNUJZCjx8 Yr4RAQDycGp98WoJHyZrPeUCLyKVne+3zKlLpeXjWDuBNnNJZwEAn1oJ535BqFQk Wan94mxz7HX3ifMlZBc7Kjpzd+ql3ww=
    =K6Qu
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stephan =?ISO-8859-1?Q?Verb=FCcheln@21:1/5 to All on Sat Jan 4 09:50:01 2025
    Please note that GnuPG 2.2 is also end of life now.

    https://gnupg.org/download/index.html

    Regards

    -----BEGIN PGP SIGNATURE-----

    iHUEABYKAB0WIQRB1rjSpCJd8a7h6mNgNUJZCjx8YgUCZ3j0YgAKCRBgNUJZCjx8 YnhjAQCvu9ibVZ0IsYnldS931avikoDAV3FD1AHYo2SU9Z4T0AD9G0ccfgPZQkhG Ix98LuAAbp1+sru55Bckt9G+pAD1DgI=
    =Z1YO
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Frank Guthausen@21:1/5 to verbuecheln@posteo.de on Tue Jan 7 15:00:02 2025
    On Sat, 04 Jan 2025 08:42:10 +0000
    Stephan Verbücheln <verbuecheln@posteo.de> wrote:

    Please note that GnuPG 2.2 is also end of life now.

    https://gnupg.org/download/index.html

    GnuPG 2.4.7 is in experimental[1] but neither yet in sid[2] or trixie[3]
    (where it is version 2.2.45-2 in both repositories). The trixie freeze
    timeline is not yet announced[4] but compared to bookworm[5] one might
    guess this will happen in the near future.

    Is there enough time to shift GnuPG 2.4
    into trixie until the planned summer release?

    [1] https://packages.debian.org/experimental/gnupg
    [2] https://packages.debian.org/sid/gnupg
    [3] https://packages.debian.org/trixie/gnupg
    [4] https://release.debian.org/testing/freeze_policy.html
    [5] https://release.debian.org/bookworm/freeze_policy.html

    --
    kind regards
    Frank

    -----BEGIN PGP SIGNATURE-----

    iQGzBAEBCgAdFiEE86z15c6qwvuAkhy+zDIN/uu9BloFAmd9MqsACgkQzDIN/uu9 BlrtKwwAgpmiqqcPnMlT+Q4oiymrNU47F3IQtmYyO0GAX/WlKhgP9fx9Ah7ErjkJ PIyNDl02lzJMgwIieVnnzIK4RzdI1b7bOlQCohaGVn2/eFW7yjU2mnPYoHgLkOH0 L8riuQPp2l9eW2rUDIvIAwz5vUN9uDana0Q82zooJcLlbsHftvLLxzvunaI2EVYF NVIDT81strFuY3zFwsE6UzzGm7/ZfupEeFWdO2FqW/a37hBGmKlNEvZFgsG25s8m HaIufoeOxjHRzVPP/nKsVx0olgZtYP09Ui6KeCky62jTZp31SO84tG2vu60pYubN dFtmkT9GUijfMWwQkMeYpQ4JyCmc1Iq462rsWpPegjIrb7IXEyK766A08jySdIdQ +i6ZI+hKWIYQRAfNX39Iyh/IgciZSRAoCHNiQFHKvHdrQIq0mZovkJKUp4Bvl/1K Eq9DtfJByrFErcjX1h5AcaySi3AEk6cfPh5at/eQu+HA2Rw9F4APUu7BPNB5HOI0
    GBt81Jde
    =aD1J
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Josefsson@21:1/5 to Frank Guthausen on Tue Jan 7 15:20:01 2025
    Frank Guthausen <fg.debian@shimps.de> writes:

    On Sat, 04 Jan 2025 08:42:10 +0000
    Stephan Verbcheln <verbuecheln@posteo.de> wrote:

    Please note that GnuPG 2.2 is also end of life now.

    https://gnupg.org/download/index.html

    GnuPG 2.4.7 is in experimental[1] but neither yet in sid[2] or trixie[3] (where it is version 2.2.45-2 in both repositories). The trixie freeze timeline is not yet announced[4] but compared to bookworm[5] one might
    guess this will happen in the near future.

    Is there enough time to shift GnuPG 2.4
    into trixie until the planned summer release?

    I believe this would be good, I frequently run into GnuPG bugs in the
    2.2.x branch that was fixed years ago in 2.4 and today I mostly these on
    Debian because others moved on to 2.4.x. Andreas, can you give a
    current status of pending issues for experimental->unstable upload?

    It seems there is push from the anti-GnuPG people to promote a fork
    called FreePG instead of real GnuPG, will you package that?

    https://gitlab.com/freepg/gnupg

    If so I think there would be value in having the real GnuPG as a
    separate Debian package, for those who want to use the real version.

    /Simon

    [1] https://packages.debian.org/experimental/gnupg
    [2] https://packages.debian.org/sid/gnupg
    [3] https://packages.debian.org/trixie/gnupg
    [4] https://release.debian.org/testing/freeze_policy.html
    [5] https://release.debian.org/bookworm/freeze_policy.html

    --=-=-Content-Type: application/pgp-signature; name="signature.asc"

    -----BEGIN PGP SIGNATURE-----

    iQNoBAEWCAMQFiEEo8ychwudMQq61M8vUXIrCP5HRaIFAmd9NzsUHHNpbW9uQGpv c2Vmc3Nvbi5vcmfCHCYAmDMEXJLOtBYJKwYBBAHaRw8BAQdACIcrZIvhrxDBkK9f V+QlTmXxo2naObDuGtw58YaxlOu0JVNpbW9uIEpvc2Vmc3NvbiA8c2ltb25Aam9z ZWZzc29uLm9yZz6IlgQTFggAPgIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgBYh BLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgIBQkLehFUAAoJENc89jjFPAa+CboA +wUa06RD5e5VTCxvSWtPS75Wq2qBeYGZnf0jvUMxa2n4AP4xkUeAPPnNuMsTm2fs FCDIGaEM2Yn6Vb2huzzT1Fw/BLgzBFySz4EWCSsGAQQB2kcPAQEHQOxTCIOaeXAx I2hIX4HK9bQTpNVei708oNr1Klm8qCGKiPUEGBYIACYCGwIWIQSx0r0Tdb7LeEz0 +MTXPPY4xTwGvgUCZf2IKwUJC3oQqgCBdiAEGRYIAB0WIQSjzJyHC50xCrrUzy9R cisI/kdFogUCXJLPgQAKCRBRcisI/kdFoqdMAQCgH45aseZgIrwKOvUOA9QfsmeE 8GZHYNuFHmM9FEQS6AD6A4x5aYvoY6lo98pgtw2HPDhmcCXFItjXCrV4A0GmJA4J ENc89jjFPAa+GcYA/26YQY05bLtnXiIjTiAzrGQrRXxTHPA8Av7TDFHvIetWAP9s HSoU8OfTwmTiEnGwLlsV7QJclZg3YNz/Ypcp9TqQBrg4BFySz2oSCisGAQQBl1UB BQEBB0AxlRumDW6nZY7A+VCfek9VpEx6PJmdJyYPt3lNHMd6HAMBCAeIfgQYFggA JgIbDBYhBLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgwBQkLehDGAAoJENc89jjF PAa+phoA/jrDqIrl/55vUMBhIQv+TP635d2iCTEnyFmbUcP9+gh6APoDsXalVd2c OGxQtSC+TF8PkZMn1TLkJKAjVxr+xx40AgAKCRBRcisI/kdFohvBAQC43FRh9UQ7 FLEqmIJa6wfoX4+sSAxrRY1O2fIyK1XIlwEAhUn9o+egU3xf9SjHEwgXEXUFS25o 8KBpCItqMrYchQQ=M44B
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andreas Metzler@21:1/5 to simon@josefsson.org on Tue Jan 7 19:10:02 2025
    On 2025-01-07 Simon Josefsson <simon@josefsson.org> wrote:
    [...]

    I believe this would be good, I frequently run into GnuPG bugs in the
    2.2.x branch that was fixed years ago in 2.4 and today I mostly these on Debian because others moved on to 2.4.x. Andreas, can you give a
    current status of pending issues for experimental->unstable upload?

    Hello,
    ... guessing I might be the Andreas in question ...

    Afaik there is no /known/ blocker except for the libgnupg-interface-perl
    test error #1088155.

    Should we move to 2.4? 2.4 is not a LTS release and will also EOL in
    trixie' soon (2026-06-30).

    2.6 will be the next LTS release. It has not yet been declared stable
    and definitly is an implementation of librepgpg instead of the RFC
    blessed version.

    cu Andreas

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stephan =?ISO-8859-1?Q?Verb=FCcheln@21:1/5 to All on Tue Jan 7 19:40:01 2025
    Current Ubuntu 24.04 LTS also uses GnuPG 2.4 and probably has a similar
    set of patches.

    Regards

    -----BEGIN PGP SIGNATURE-----

    iHUEABYKAB0WIQRB1rjSpCJd8a7h6mNgNUJZCjx8YgUCZ31ygQAKCRBgNUJZCjx8 YgENAQDGBkEJOiZbs8EZGE+NyhoCurPdUB3yR3JXxrihJXfI2wD/RF/v4n4jWQeH BdWgM6z8wCvHcY32tji+Sc8yXvnXYww=
    =X0Dv
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Josefsson@21:1/5 to Andreas Metzler on Tue Jan 7 21:00:01 2025
    Andreas Metzler <ametzler@bebt.de> writes:

    On 2025-01-07 Simon Josefsson <simon@josefsson.org> wrote:
    [...]

    I believe this would be good, I frequently run into GnuPG bugs in the
    2.2.x branch that was fixed years ago in 2.4 and today I mostly these on
    Debian because others moved on to 2.4.x. Andreas, can you give a
    current status of pending issues for experimental->unstable upload?

    Hello,
    ... guessing I might be the Andreas in question ...

    Afaik there is no /known/ blocker except for the libgnupg-interface-perl
    test error #1088155.

    Thanks -- that is good to know!

    Should we move to 2.4? 2.4 is not a LTS release and will also EOL in
    trixie' soon (2026-06-30).

    It seems 2.4 is the latest stable branch since 2021, so it looks better
    than shipping a branch created in 2014-11-06 that had EOL at 2024-12-31.

    /Simon

    2.6 will be the next LTS release. It has not yet been declared stable
    and definitly is an implementation of librepgpg instead of the RFC
    blessed version.

    cu Andreas



    --=-=-Content-Type: application/pgp-signature; name="signature.asc"

    -----BEGIN PGP SIGNATURE-----

    iQNoBAEWCAMQFiEEo8ychwudMQq61M8vUXIrCP5HRaIFAmd9hkAUHHNpbW9uQGpv c2Vmc3Nvbi5vcmfCHCYAmDMEXJLOtBYJKwYBBAHaRw8BAQdACIcrZIvhrxDBkK9f V+QlTmXxo2naObDuGtw58YaxlOu0JVNpbW9uIEpvc2Vmc3NvbiA8c2ltb25Aam9z ZWZzc29uLm9yZz6IlgQTFggAPgIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgBYh BLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgIBQkLehFUAAoJENc89jjFPAa+CboA +wUa06RD5e5VTCxvSWtPS75Wq2qBeYGZnf0jvUMxa2n4AP4xkUeAPPnNuMsTm2fs FCDIGaEM2Yn6Vb2huzzT1Fw/BLgzBFySz4EWCSsGAQQB2kcPAQEHQOxTCIOaeXAx I2hIX4HK9bQTpNVei708oNr1Klm8qCGKiPUEGBYIACYCGwIWIQSx0r0Tdb7LeEz0 +MTXPPY4xTwGvgUCZf2IKwUJC3oQqgCBdiAEGRYIAB0WIQSjzJyHC50xCrrUzy9R cisI/kdFogUCXJLPgQAKCRBRcisI/kdFoqdMAQCgH45aseZgIrwKOvUOA9QfsmeE 8GZHYNuFHmM9FEQS6AD6A4x5aYvoY6lo98pgtw2HPDhmcCXFItjXCrV4A0GmJA4J ENc89jjFPAa+GcYA/26YQY05bLtnXiIjTiAzrGQrRXxTHPA8Av7TDFHvIetWAP9s HSoU8OfTwmTiEnGwLlsV7QJclZg3YNz/Ypcp9TqQBrg4BFySz2oSCisGAQQBl1UB BQEBB0AxlRumDW6nZY7A+VCfek9VpEx6PJmdJyYPt3lNHMd6HAMBCAeIfgQYFggA JgIbDBYhBLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgwBQkLehDGAAoJENc89jjF PAa+phoA/jrDqIrl/55vUMBhIQv+TP635d2iCTEnyFmbUcP9+gh6APoDsXalVd2c OGxQtSC+TF8PkZMn1TLkJKAjVxr+xx40AgAKCRBRcisI/kdFovtSAP4+cJNQeCod XwQKxZgeNA7OnKcpIsSgDMwxUj2kg9r1vQD/Ti3dB0Oc9liK3sKvLOg4YJj21AQs uDdgBlZP3iZKlQg=v2pk
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jonathan McDowell@21:1/5 to Andreas Metzler on Wed Jan 8 11:00:01 2025
    On Tue, Jan 07, 2025 at 07:01:51PM +0100, Andreas Metzler wrote:
    On 2025-01-07 Simon Josefsson <simon@josefsson.org> wrote:
    [...]

    I believe this would be good, I frequently run into GnuPG bugs in the
    2.2.x branch that was fixed years ago in 2.4 and today I mostly these on Debian because others moved on to 2.4.x. Andreas, can you give a
    current status of pending issues for experimental->unstable upload?

    Hello,
    ... guessing I might be the Andreas in question ...

    Afaik there is no /known/ blocker except for the libgnupg-interface-perl
    test error #1088155.

    Should we move to 2.4? 2.4 is not a LTS release and will also EOL in
    trixie' soon (2026-06-30).

    I haven't been fully following the GnuPG situation, but did the
    situation where 2.4 would generate v4 keys that weren't fully compatible
    with the wider ecosystem get solved? Is the patch RedHat et al are
    carrying sufficient for that?

    J.

    --
    Revd Jonathan McDowell, ULC | Covered in paint and high as a kite.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andreas Metzler@21:1/5 to noodles@earth.li on Wed Jan 8 18:50:01 2025
    On 2025-01-08 Jonathan McDowell <noodles@earth.li> wrote:
    On Tue, Jan 07, 2025 at 07:01:51PM +0100, Andreas Metzler wrote:
    [...]

    Should we move to 2.4? 2.4 is not a LTS release and will also EOL in
    trixie' soon (2026-06-30).

    I haven't been fully following the GnuPG situation, but did the
    situation where 2.4 would generate v4 keys that weren't fully compatible
    with the wider ecosystem get solved? Is the patch RedHat et al are
    carrying sufficient for that?

    Hello,

    I asked about gnupg2-revert-rfc4880bis.patch on the Debian gnupg list, it
    is not sufficient and not really to the point, https://alioth-lists.debian.net/pipermail/pkg-gnupg-maint/2024-February/009217.html

    We have used these two patches instead https://salsa.debian.org/debian/gnupg2/-/blob/debian/experimental/debian/patches/update-defaults/gpg-Do-not-set-OCB-key-preference.diff
    https://salsa.debian.org/debian/gnupg2/-/blob/debian/experimental/debian/patches/update-defaults/gpg-encrypt-disrespect-OCB-key-preference.diff
    which are needed for 2.2.x nowadays, too.

    cu Andreas
    --
    `What a good friend you are to him, Dr. Maturin. His other friends are
    so grateful to you.'
    `I sew his ears on from time to time, sure'

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Daniel Kahn Gillmor@21:1/5 to Simon Josefsson on Thu Jan 9 00:10:01 2025
    Thanks for this discussion, all--

    On Tue 2025-01-07 15:16:27 +0100, Simon Josefsson wrote:
    I believe this would be good, I frequently run into GnuPG bugs in the
    2.2.x branch that was fixed years ago in 2.4

    Can you identify some of those bugs? It would be good to be clear about
    what 2.2 is lacking.

    For example, if you're talking about [easypg-deadlock], that was a bug introduced on both GnuPG branches at once, and (during GnuPG's stated maintenance window for 2.2) deliberately left unfixed on the 2.2 branch.

    [easypg-deadlock] https://bugs.debian.org/1071552 a.k.a. https://dev.gnupg.org/T6481

    Andreas, can you give a current status of pending issues for experimental->unstable upload?

    Andreas has done great work packaging the 2.4 branch and preparing it
    for consideration in Debian. As he wrote elsewhere in this thread, 2.4
    isn't likely to be supported through the lifetime of trixie either ☹

    Aside from GnuPG's ongoing architectural challenges, the thing i
    personally most want to avoid for Debian would be contributing to the
    schism where longstanding users of OpenPGP are suddenly migrated to
    non-OpenPGP artifacts that other OpenPGP implementations can't or won't support. GnuPG seems to be going their own way there, despite
    documented problems with some of their chosen cryptographic constructs
    like [v5-v3-signature-aliases] and [encryption-key-separation].

    [v5-v3-signature-aliases] https://gitlab.com/openpgp-wg/rfc4880bis/-/issues/130 [encryption-key-separation] https://gitlab.com/openpgp-wg/rfc4880bis/-/merge_requests/101

    It seems there is push from the anti-GnuPG people to promote a fork
    called FreePG instead of real GnuPG, will you package that?

    https://gitlab.com/freepg/gnupg

    All the relevant 2.2 patches in the FreePG repository are already in
    Debian's unstable branch, and in most cases we have been shipping them
    for years to address user needs that upstream GnuPG declines to
    acknowledge or support. I've uploaded 2.2.46 today with our patches
    renamed to match the names and annotations of this cross-distro effort.

    I'm gradually trying to push other pieces of our divergence into the
    FreePG patchset so that other distributions that want to keep shipping
    GnuPG can arrive at a common and functional baseline. This gives us opportunities to get feedback from other distros as well. In the ideal
    case, of course, we'd eliminate all our divergence from upstream, but
    that would depend on upstream being interested in working with the use
    cases and concerns that our users have.

    The FreePG project's visibility is also attracting attention from some
    other downstreams of GnuPG that have distinct fixes that they've been
    carrying that i hadn't been aware of, and we might end up adopting some
    of their changes too.

    If Andreas is interested, i'm happy to do the same alignment with the
    FreePG patchset on the debian packaging for 2.4 (the debian/experimental branch) too, to gather the same sort of cross-distro consensus.

    If so I think there would be value in having the real GnuPG as a
    separate Debian package, for those who want to use the real version.

    Which of the patches in FreePG do you think are harmful for debian
    users? As someone who has contributed years of labor into making sure
    GnuPG provides a functional (if not quite as usable or robust as i would
    like) interface to OpenPGP users on debian and derived distros, our
    divergence from GnuPG upstream is a carefully curated set that tries to
    address the most significant problems that upstream has declined to
    accept.

    So far, the FreePG patches seem to align pretty closely with that vision
    (and where they don't align we can either skip them completely, or
    propose improvements in the FreePG project just as we would with any
    reasonable upstream).

    It doesn't seem like normal practice to ask other debian maintainer
    teams that are carrying patches requested by users but dismissed by
    upstream to ship "the real version" of the upstream codebase. Is there
    a reason that GnuPG needs such a process?

    I welcome review and critique of the packaging for this tricky package,
    which is pretty deeply embedded in Debian (though getting less so, as
    apt no longer requires it and we have many other OpenPGP implementations available today). I'd be even more delighted with offers of active co-maintenance beyond the work that Andreas and i have been doing.

    Regards,

    --dkg

    --=-=-Content-Type: application/pgp-signature; name="signature.asc"

    -----BEGIN PGP SIGNATURE-----

    wr0EARYKAG8Fgmd/AyEJEHctFh41zUuBRxQAAAAAAB4AIHNhbHRAbm90YXRpb25z LnNlcXVvaWEtcGdwLm9yZyNeej9ETrg4NsqDckmRl1Y4CioBDqxrln4xp8rzvMOP FiEEdLwExD2GCEvoZywGdy0WHjXNS4EAAOtiAP0Vqd2qkaz/K5SfOO2xS2t8AEmo 5DWV3/k7x+5j5P8myAEAiUvxoeQNAwc949wa0//HH+nkxmPEJ6wWglMtta+emgMG5o
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stephan =?ISO-8859-1?Q?Verb=FCcheln@21:1/5 to All on Thu Jan 9 08:00:01 2025
    GnuPG 2.4 was released in 2022, long before the LibrePGP schism. It is generally not clear to me how the divergence from upstream is a reason
    to favor 2.2 over 2.4, except that patches have to be ported (once?).

    I also do not understand what is wrong/lacking with the already patched versions in Experimental and Ubuntu.

    https://packages.debian.org/experimental/gnupg

    https://packages.ubuntu.com/noble/gnupg https://packages.ubuntu.com/oracular/gnupg

    Regards
    Stephan

    -----BEGIN PGP SIGNATURE-----

    iHUEABYKAB0WIQRB1rjSpCJd8a7h6mNgNUJZCjx8YgUCZ39y6AAKCRBgNUJZCjx8 Yh+nAQCQTBbsvi1o7m24f5QSXiMfoHv6YAud892bmFz1A6KbNQD+N5zACukX4vpp ZEhOhLZQg8kh1dqQ2gBTwfaCbkNRxQk=
    =zCUJ
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Daniel Kahn Gillmor@21:1/5 to All on Fri Jan 10 00:30:01 2025
    On Thu 2025-01-09 07:55:36 +0100, Stephan Verbücheln wrote:
    GnuPG 2.4 was released in 2022, long before the LibrePGP schism. It is generally not clear to me how the divergence from upstream is a reason
    to favor 2.2 over 2.4, except that patches have to be ported (once?).

    sadly, 2.4 was released at a time when the LibrePGP schism was on the
    horizon, and it was clear that GnuPG was going to go ahead and publish
    whatever it wanted to do, rather than aligning with the rest of the
    OpenPGP ecosystem.

    This means it was producing "OpenPGP" artifacts that hadn't been
    confirmed as interoperable by other implementations, or even had a
    reasonable amount of cryptographic review (see the links in my previous
    mail in this thread).

    For example, OpenPGP certificates produced by earlier versions of 2.4
    and imported into Thunderbird advertised non-standardized encryption
    mechanisms that Thunderbird didn't support, which led to unreadable
    mails for those users.

    That's why we delayed bringing 2.4 into debian, so that our users
    wouldn't get locked into non-standard or suboptimal cryptographic
    mechanisms.

    I also do not understand what is wrong/lacking with the already patched versions in Experimental and Ubuntu.

    https://packages.debian.org/experimental/gnupg

    I can't speak to the versions in Ubuntu, but the work in experimental
    helps us to understand exactly what we would be getting into if we were
    to switch, in terms of emitting non-standardized or non-interoperable
    formats. I agree that we should try to minimize risk there, and moving
    to some stabilized version of 2.4 might be a good thing, given
    upstream's increased attention to 2.4 compared to 2.2. If we can do
    that safely, we will, but there's review work to be done to make sure it
    really is sensible.

    One of the nice things about FreePG is that we can share the load of
    work toward safety and interoperability and robustness with other
    downstream users of GnuPG who have the same concerns.

    Regards,

    --dkg

    --=-=-Content-Type: application/pgp-signature; name="signature.asc"

    -----BEGIN PGP SIGNATURE-----

    wr0EARYKAG8FgmeAW78JEHctFh41zUuBRxQAAAAAAB4AIHNhbHRAbm90YXRpb25z LnNlcXVvaWEtcGdwLm9yZ4/vFqH5U3OXxxfsgNWFf0XhPNH+wXzDcQ1XWAgmgwm9 FiEEdLwExD2GCEvoZywGdy0WHjXNS4EAAIPIAP96rPbe6LpatGY7czdmA/gAQ974 7Z4nVg57szkl0XLFvgD9HcCzl9ICrATMg1o21hQ8Ht1qtTKyGrgs82pp42N1Ugc=Flqm
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Frank Guthausen@21:1/5 to Daniel Kahn Gillmor on Fri Jan 10 09:30:01 2025
    On Thu, 09 Jan 2025 18:29:02 -0500
    Daniel Kahn Gillmor <dkg@debian.org> wrote:
    On Thu 2025-01-09 07:55:36 +0100, Stephan Verbücheln wrote:
    GnuPG 2.4 was released in 2022, long before the LibrePGP schism. It
    is generally not clear to me how the divergence from upstream is a
    reason to favor 2.2 over 2.4, except that patches have to be ported (once?).

    sadly, 2.4 was released at a time when the LibrePGP schism was on the horizon,

    I reconstructed the following timeline:

    Debian bullseye hard freeze[1]: 2021-03-12
    According to Upstream[2], GnuPG 2.4 birth: 2021-04-07 (maybe as devel)
    Debian bullseye full freeze[1]: 2021-07-17
    First package (2.4.0) in experimental[3]: 2022-12-25
    Debian bookworm hard freeze[4]: 2023-03-12
    Debian bookworm full freeze[4]: 2023-05-24
    Ubuntu 24.04 LTS (Noble Numbat) release[5]: 2024-04
    RNP LibrePGP support[6]: 2024-07-22
    OpenPGP RFC 9580 release[7]: 2024-07-31

    For example, OpenPGP certificates produced by earlier versions of 2.4
    and imported into Thunderbird advertised non-standardized encryption mechanisms that Thunderbird didn't support, which led to unreadable
    mails for those users.

    Is this still a problem with GnuPG 2.4.7? Can this be adjusted by
    changing default configuration in the Debian package? Does it need
    a code patch?

    Thunderbird seems to use the RNP[8] crypto library which supports
    a cooperative workflow with GnuPG via LibrePGP. Are there patches
    to remove this behaviour in Debian?

    That's why we delayed bringing 2.4 into debian, so that our users
    wouldn't get locked into non-standard or suboptimal cryptographic
    mechanisms.

    Still having GnuPG 2.2 in Debian is similarly suboptimal. At
    the moment users are locked into using a software version tree
    which started 2014-11-06 which is more than a decade ago.


    [1] https://release.debian.org/bullseye/freeze_policy.html
    [2] https://gnupg.org/download/index.html
    [3] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022702
    [4] https://release.debian.org/bookworm/freeze_policy.html
    [5] https://ubuntu.com/about/release-cycle
    [6] https://www.rnpgp.org/blog/2024-07-22-rnp-and-librepgp/
    [7] https://datatracker.ietf.org/doc/rfc9580/
    [8] https://www.rnpgp.org/


    --
    kind regards
    Frank

    -----BEGIN PGP SIGNATURE-----

    iQGzBAEBCgAdFiEE86z15c6qwvuAkhy+zDIN/uu9BloFAmeA2MQACgkQzDIN/uu9 BlrAUAv/dpy236i7s194NOspMNRIyBGa8C8UDTlWH4KsNE3eRdsEBIOvEJHJjsR4 lqlgl07HZ1TAMw8zkkI/J2AIT1O/H7c0G+Y5NFF818PzA7+s7uIF3mnLyQpSC4dp fjBEwhKzotLqm61rz6lUhn3eHbffynDrhGeastUBRpiVh/pKl8GLPFp6zAhHTnLM gy1u+PrQtCwbFSpGdeHrX2N7in1ElYqkelBEyIlMDFjKXkFCC8lRlcGgaL30q5ai U8lmLyuBVBzic+Smo1LTsytqTl40IZUN7dIu6kLGawb44VeLv3fYCMXanOEPp9lZ 4e535+DojZY56VfL3CP+RUt5c/c+v2EBokAerZjwqx13jTNuW/CDHnd42N9obVbK v0x9o7vvQyDEztQ66L6NWNdkMrT8e5c39rgwu51rpnWxEj/p7q1FRt3xeLlDKECY 5BzLgmBKLA2Q1lkIsxSNLqLFrfYqvLb+1sv9B5iDY1YDWVNfKnnLyXM76vjHr+Cx
    gMFKk0Q7
    =GuDi
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Julian Andres Klode@21:1/5 to All on Fri Jan 10 20:10:02 2025
    On Thu, Jan 09, 2025 at 07:55:36AM +0100, Stephan Verbcheln wrote:
    GnuPG 2.4 was released in 2022, long before the LibrePGP schism. It is generally not clear to me how the divergence from upstream is a reason
    to favor 2.2 over 2.4, except that patches have to be ported (once?).

    I also do not understand what is wrong/lacking with the already patched versions in Experimental and Ubuntu.

    https://packages.debian.org/experimental/gnupg

    https://packages.ubuntu.com/noble/gnupg https://packages.ubuntu.com/oracular/gnupg

    This is being tracked in

    https://bugs.launchpad.net/ubuntu/+source/gnupg2/+bug/2090995

    and you can see we picked more patches in plucky to align with
    the broader ecosystem to revert the dangerous changes in default
    generation of rfc4880bis keys.
    --
    debian developer - deb.li/jak | jak-linux.org - free software dev
    ubuntu core developer i speak de, en

    -----BEGIN PGP SIGNATURE-----

    wsG7BAABCgBvBYJngW7RCRBvpFjdHbA/cUcUAAAAAAAeACBzYWx0QG5vdGF0aW9u cy5zZXF1b2lhLXBncC5vcmfkGYlxBD5A+Ff78eJeXW9YRlkZnVRny0yIHCdT00mR 7xYhBE+1iKhMLd55p0x3h2+kWN0dsD9xAADRpQ//ejtC8ZSxY5yLK57pPkH3iDbr XwGdaljDrn+PldWewGOmPS/NsBCCjY6aU63Jbm0anVVZ5WLEP3Wdb6epvsa14Uvt Q7Hu+6iYVDWkWDD28cK91z9U9qBNdfMedPKU7XGfJv+aY2xaVVXWhehNDKOZTpbs cNMvp9XZrJjmtqU9HLuyaMcmIiKxRQybvupb5n0/M/jdA1i6hbEfPmTgsezJjxKf Ut21hr6DNY5A4Ha/oQFOVGGN/X0ocNDCRYxn+DONFahu3mXJm+UX0qbOQ+J8zhD6 d4a/pWDrpOYaTuGIM3C4A6F4Drqp1F+6m0xJ7P4hRh0A3epL+ZomXV7Z14iLGExB 6ry2sCdpBGmMtf5RyrT9XP9mbDBuTg+ZzK54A/1MS7clSB+FoUz/cur7SCdl4e+Q f+jUs9ukEYvSPAQpMWEgV77MpS5dfOyfQy21mvDE/+p9XXr0SvZ1e52r+M6DLRcE w3NI6gI94wf2y6X+Nyavi7kf4WfAq3Thamlfzak4Mx9UBBfMld3OsfcCedlV9lYd p1q+iVf4nzRLTCGirg8gQysV7YGN5J5hACCHt/Ci/b4BVjkC7Japr4Xvq/NscU7X g5VjnlpmvQxnNlYeISSxAvCgs7UGQiKEn6wWMgli70XyBQhppXBbiGF3V0
  • From Andreas Metzler@21:1/5 to fg.debian@shimps.de on Fri Jan 10 19:40:01 2025
    On 2025-01-10 Frank Guthausen <fg.debian@shimps.de> wrote:
    [...]
    I reconstructed the following timeline:

    Debian bullseye hard freeze[1]: 2021-03-12
    According to Upstream[2], GnuPG 2.4 birth: 2021-04-07 (maybe as devel)

    Definitely -devel https://lists.gnupg.org/pipermail/gnupg-announce/2021q2/000458.html
    2.4.0 was released more than 18 months later in December 2022 https://lists.gnupg.org/pipermail/gnupg-announce/2022q4/000477.html

    Debian bullseye full freeze[1]: 2021-07-17
    First package (2.4.0) in experimental[3]: 2022-12-25
    Debian bookworm hard freeze[4]: 2023-03-12
    Debian bookworm full freeze[4]: 2023-05-24
    Ubuntu 24.04 LTS (Noble Numbat) release[5]: 2024-04
    RNP LibrePGP support[6]: 2024-07-22
    OpenPGP RFC 9580 release[7]: 2024-07-31

    For example, OpenPGP certificates produced by earlier versions of 2.4
    and imported into Thunderbird advertised non-standardized encryption mechanisms that Thunderbird didn't support, which led to unreadable
    mails for those users.

    Is this still a problem with GnuPG 2.4.7? Can this be adjusted by
    changing default configuration in the Debian package? Does it need
    a code patch?

    Patch. This is about AEAD OCB.

    Thunderbird seems to use the RNP[8] crypto library which supports
    a cooperative workflow with GnuPG via LibrePGP. Are there patches
    to remove this behaviour in Debian?
    [...]

    I do not know the current status, but afaik thunderbird (not Debian
    specific) configures rnp, version 128 release notes said:
    | Disabled support for LibrePGP v5 AEAD/OCB decryption

    cu Andreas
    --
    `What a good friend you are to him, Dr. Maturin. His other friends are
    so grateful to you.'
    `I sew his ears on from time to time, sure'

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Josefsson@21:1/5 to Daniel Kahn Gillmor on Mon Jan 13 11:10:01 2025
    Daniel Kahn Gillmor <dkg@debian.org> writes:

    Thanks for this discussion, all--

    On Tue 2025-01-07 15:16:27 +0100, Simon Josefsson wrote:
    I believe this would be good, I frequently run into GnuPG bugs in the
    2.2.x branch that was fixed years ago in 2.4

    Can you identify some of those bugs? It would be good to be clear about
    what 2.2 is lacking.

    I actually meant missing features. From my recollection it was features related to support for some subset of combinations of 25519, gpgsm,
    smartcards and the gpg/ssh agent. Things didn't work in GnuPG 2.2 but
    was fixed years ago in 2.4.

    /Simon

    -----BEGIN PGP SIGNATURE-----

    iQNoBAEWCAMQFiEEo8ychwudMQq61M8vUXIrCP5HRaIFAmeE4poUHHNpbW9uQGpv c2Vmc3Nvbi5vcmfCHCYAmDMEXJLOtBYJKwYBBAHaRw8BAQdACIcrZIvhrxDBkK9f V+QlTmXxo2naObDuGtw58YaxlOu0JVNpbW9uIEpvc2Vmc3NvbiA8c2ltb25Aam9z ZWZzc29uLm9yZz6IlgQTFggAPgIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgBYh BLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgIBQkLehFUAAoJENc89jjFPAa+CboA +wUa06RD5e5VTCxvSWtPS75Wq2qBeYGZnf0jvUMxa2n4AP4xkUeAPPnNuMsTm2fs FCDIGaEM2Yn6Vb2huzzT1Fw/BLgzBFySz4EWCSsGAQQB2kcPAQEHQOxTCIOaeXAx I2hIX4HK9bQTpNVei708oNr1Klm8qCGKiPUEGBYIACYCGwIWIQSx0r0Tdb7LeEz0 +MTXPPY4xTwGvgUCZf2IKwUJC3oQqgCBdiAEGRYIAB0WIQSjzJyHC50xCrrUzy9R cisI/kdFogUCXJLPgQAKCRBRcisI/kdFoqdMAQCgH45aseZgIrwKOvUOA9QfsmeE 8GZHYNuFHmM9FEQS6AD6A4x5aYvoY6lo98pgtw2HPDhmcCXFItjXCrV4A0GmJA4J ENc89jjFPAa+GcYA/26YQY05bLtnXiIjTiAzrGQrRXxTHPA8Av7TDFHvIetWAP9s HSoU8OfTwmTiEnGwLlsV7QJclZg3YNz/Ypcp9TqQBrg4BFySz2oSCisGAQQBl1UB BQEBB0AxlRumDW6nZY7A+VCfek9VpEx6PJmdJyYPt3lNHMd6HAMBCAeIfgQYFggA JgIbDBYhBLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgwBQkLehDGAAoJENc89jjF PAa+phoA/jrDqIrl/55vUMBhIQv+TP635d2iCTEnyFmbUcP9+gh6APoDsXalVd2c OGxQtSC+TF8PkZMn1TLkJKAjVxr+xx40AgAKCRBRcisI/kdFogcpAQDEz2er6PQ0 0MZoEllqWVxOiRNgt/qH6qZa1l70BlyTBAD/UlfjAjBKDenQoHAToBfVBhFc8jaE zH+mfzausx4CsQ4=
    =VDpr
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Frank Guthausen@21:1/5 to Andreas Metzler on Mon Jan 13 11:20:01 2025
    On Fri, 10 Jan 2025 19:33:01 +0100
    Andreas Metzler <ametzler@bebt.de> wrote:
    On 2025-01-10 Frank Guthausen <fg.debian@shimps.de> wrote:

    Is this still a problem with GnuPG 2.4.7? Can this be adjusted by
    changing default configuration in the Debian package? Does it need
    a code patch?

    Patch. This is about AEAD OCB.

    Does this path exist already? Is there an overview which pathches are
    required and which are available? What are the open todos and stoppers
    to be dealt with before shifting to sid and trixie? Is there anything
    the community can do to support and speed up the workflow? Is there a
    list of tests which need to be done and could be crowdsourced?
    --
    kind regards
    Frank

    -----BEGIN PGP SIGNATURE-----

    iQGzBAEBCgAdFiEE86z15c6qwvuAkhy+zDIN/uu9BloFAmeE6B8ACgkQzDIN/uu9 BloJiQv/Z1/TcgrKxfllGRI93yTaH0MMj0Uwa8bqV+a+UdUCeygRO4WdFPwwxq60 TbuwGBtOBGPXJEzzR8r+hiTD9oPsswjr9fLOS4sqCCxWKu/6GpAD5Q8FOH3quVNn WXdJcFsqXBYHFncfT3JfMxyAfy/E+Ol9p3DxOOa1tTPZp2tqLI6XTO5zwYNhJSiL c2YINLhRe1tSayLXvX8koep1dx5QZMyb8HMiG0TC9PLhgWmz0pR697ooOm81p/zx Sgmh4HPDLxlflySKwCo8lli3x8Pv0WVH8RIdua2JnAGauqfNWnAC4Ii0Lb/sA4Jn 3WVXHEFyIGGcdiy/uROgOQjuMSBkFDKnxA4FeAs9T/DukAPAaul/mYnLn/b4H2KG lvejzASCIwqtzfD1fVBkFnXaiM7bKp4K7PEwcvUUACfFuIAsnstocvR9vznYuEBy Dh+QUSDC+BcJuxR9bsEWH/ZnIviALzkiXIZQfGhk3Y+4JqNffAqU2ICKHM1zmYB+
    wzK5/qXO
    =yWyZ
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Josefsson@21:1/5 to Daniel Kahn Gillmor on Mon Jan 13 11:20:01 2025
    Daniel Kahn Gillmor <dkg@debian.org> writes:

    Aside from GnuPG's ongoing architectural challenges, the thing i
    personally most want to avoid for Debian would be contributing to the
    schism where longstanding users of OpenPGP are suddenly migrated to non-OpenPGP artifacts that other OpenPGP implementations can't or won't support. GnuPG seems to be going their own way there, despite
    documented problems with some of their chosen cryptographic constructs
    like [v5-v3-signature-aliases] and [encryption-key-separation].

    [v5-v3-signature-aliases] https://gitlab.com/openpgp-wg/rfc4880bis/-/issues/130
    [encryption-key-separation] https://gitlab.com/openpgp-wg/rfc4880bis/-/merge_requests/101

    I don't think that is a neutral way of expressing the situation. The
    situation seems to be that there are two set of implementations that
    have chosen to not interoperate with the other set. Where to cast the
    blame depends on which perspective you take. Reversely, the first implementations to support a superset of approaches is likely to be seen
    as a constructive force in this mess.

    It seems there is push from the anti-GnuPG people to promote a fork
    called FreePG instead of real GnuPG, will you package that?

    https://gitlab.com/freepg/gnupg

    All the relevant 2.2 patches in the FreePG repository are already in
    Debian's unstable branch, and in most cases we have been shipping them
    for years to address user needs that upstream GnuPG declines to
    acknowledge or support. I've uploaded 2.2.46 today with our patches
    renamed to match the names and annotations of this cross-distro effort.

    I'm gradually trying to push other pieces of our divergence into the
    FreePG patchset so that other distributions that want to keep shipping
    GnuPG can arrive at a common and functional baseline. This gives us opportunities to get feedback from other distros as well. In the ideal
    case, of course, we'd eliminate all our divergence from upstream, but
    that would depend on upstream being interested in working with the use
    cases and concerns that our users have.

    The FreePG project's visibility is also attracting attention from some
    other downstreams of GnuPG that have distinct fixes that they've been carrying that i hadn't been aware of, and we might end up adopting some
    of their changes too.

    If Andreas is interested, i'm happy to do the same alignment with the
    FreePG patchset on the debian packaging for 2.4 (the debian/experimental branch) too, to gather the same sort of cross-distro consensus.

    If so I think there would be value in having the real GnuPG as a
    separate Debian package, for those who want to use the real version.

    Which of the patches in FreePG do you think are harmful for debian
    users?

    Let's reverse it: Which of the patches in FreePG do you think are useful
    for Debian users?

    Who is behind FreePG? The group is created by pseduonyms with no
    earlier contributions:

    https://gitlab.com/groups/freepg/-/group_members

    Do we want to trust the GnuPG author on what GnuPG should be?

    Or do we want to trust 'Hooty McOwlface' with no earlier publicly
    recorded community contributions?

    As someone who has contributed years of labor into making sure GnuPG
    provides a functional (if not quite as usable or robust as i would
    like) interface to OpenPGP users on debian and derived distros, our divergence from GnuPG upstream is a carefully curated set that tries
    to address the most significant problems that upstream has declined to accept.

    So far, the FreePG patches seem to align pretty closely with that vision
    (and where they don't align we can either skip them completely, or
    propose improvements in the FreePG project just as we would with any reasonable upstream).

    It doesn't seem like normal practice to ask other debian maintainer
    teams that are carrying patches requested by users but dismissed by
    upstream to ship "the real version" of the upstream codebase. Is there
    a reason that GnuPG needs such a process?

    I welcome review and critique of the packaging for this tricky package,
    which is pretty deeply embedded in Debian (though getting less so, as
    apt no longer requires it and we have many other OpenPGP implementations available today). I'd be even more delighted with offers of active co-maintenance beyond the work that Andreas and i have been doing.

    I've offered help, but my impression has been that it not giving up on
    the schism thing has been more important than getting Debian to ship
    upstream code to users and let people decide what they want to use.

    Sometimes it is better to let other make decisions rather than to make decisions for others.

    /Simon

    -----BEGIN PGP SIGNATURE-----

    iQNoBAEWCAMQFiEEo8ychwudMQq61M8vUXIrCP5HRaIFAmeE5gsUHHNpbW9uQGpv c2Vmc3Nvbi5vcmfCHCYAmDMEXJLOtBYJKwYBBAHaRw8BAQdACIcrZIvhrxDBkK9f V+QlTmXxo2naObDuGtw58YaxlOu0JVNpbW9uIEpvc2Vmc3NvbiA8c2ltb25Aam9z ZWZzc29uLm9yZz6IlgQTFggAPgIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgBYh BLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgIBQkLehFUAAoJENc89jjFPAa+CboA +wUa06RD5e5VTCxvSWtPS75Wq2qBeYGZnf0jvUMxa2n4AP4xkUeAPPnNuMsTm2fs FCDIGaEM2Yn6Vb2huzzT1Fw/BLgzBFySz4EWCSsGAQQB2kcPAQEHQOxTCIOaeXAx I2hIX4HK9bQTpNVei708oNr1Klm8qCGKiPUEGBYIACYCGwIWIQSx0r0Tdb7LeEz0 +MTXPPY4xTwGvgUCZf2IKwUJC3oQqgCBdiAEGRYIAB0WIQSjzJyHC50xCrrUzy9R cisI/kdFogUCXJLPgQAKCRBRcisI/kdFoqdMAQCgH45aseZgIrwKOvUOA9QfsmeE 8GZHYNuFHmM9FEQS6AD6A4x5aYvoY6lo98pgtw2HPDhmcCXFItjXCrV4A0GmJA4J ENc89jjFPAa+GcYA/26YQY05bLtnXiIjTiAzrGQrRXxTHPA8Av7TDFHvIetWAP9s HSoU8OfTwmTiEnGwLlsV7QJclZg3YNz/Ypcp9TqQBrg4BFySz2oSCisGAQQBl1UB BQEBB0AxlRumDW6nZY7A+VCfek9VpEx6PJmdJyYPt3lNHMd6HAMBCAeIfgQYFggA JgIbDBYhBLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgwBQkLehDGAAoJENc89jjF PAa+phoA/jrDqIrl/55vUMBhIQv+TP635d2iCTEnyFmbUcP9+gh6APoDsXalVd2c OGxQtSC+TF8PkZMn1TLkJKAjVxr+xx40AgAKCRBRcisI/kdFooY3APoDLNCjAlZY ggcPScthbk5L4f7Q7l37FgvLOXDJz9h3gQEA5iQmp6RkP1Ea1iGC5WrcJIIvhb26 hmPhAqBdV75Ihgw=
    =p9ar
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jonathan McDowell@21:1/5 to Simon Josefsson on Mon Jan 13 12:10:02 2025
    On Mon, Jan 13, 2025 at 11:08:11AM +0100, Simon Josefsson wrote:
    Daniel Kahn Gillmor <dkg@debian.org> writes:
    I welcome review and critique of the packaging for this tricky package, which is pretty deeply embedded in Debian (though getting less so, as
    apt no longer requires it and we have many other OpenPGP implementations available today). I'd be even more delighted with offers of active co-maintenance beyond the work that Andreas and i have been doing.

    I've offered help, but my impression has been that it not giving up on
    the schism thing has been more important than getting Debian to ship
    upstream code to users and let people decide what they want to use.

    Sometimes it is better to let other make decisions rather than to make decisions for others.

    I agree, but in this instance given the reliance we have upon GnuPG
    throughout the Debian ecosystem I believe it's important we ensure that
    the default configuration of what we ship is compatible with OpenPGP.
    Power users can feel free to play with OpenPGP v6 / LibrePGP
    enhancements, but for the vast majority of folk sticking to RFC
    compliant v4 is going to make the most sense.

    Given what I've seen in this thread though it sounds like the
    appropriate patches have been worked out and it might be feasible to get
    2.4 into unstable?

    J.

    --
    101 things you can't have too much of : 31 - Hot showers.

    -----BEGIN PGP SIGNATURE-----

    iHUEARYKAB0WIQSAYP1ALvrBQa1odmMPwJuF4mk8PAUCZ4TzNwAKCRAPwJuF4mk8 PF/IAP9YtPk96YVfkGXfwfg6/AJN+8i8y0AItcuzKxzmveawXwD/d2FopNtm8qNU DLxJezQrhR7cPCus1YTpDXEr4vj6SwA=
    =60NV
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stephan =?ISO-8859-1?Q?Verb=FCcheln@21:1/5 to All on Mon Jan 13 12:10:02 2025
    Since GnuPG 2.4 probably does not have any features removed (compared
    to 2.2), is there anything other to do than patching the defaults for
    new keys?

    Debian has patches regarding GnuPG key defaults anyway, e.g. RSA key
    size of 3072.

    Regards

    -----BEGIN PGP SIGNATURE-----

    iHUEABYKAB0WIQRB1rjSpCJd8a7h6mNgNUJZCjx8YgUCZ4T0MgAKCRBgNUJZCjx8 Yss5AP9EOJfdfsovwQtE+F71NEFKaCU2qmb8tofyNQFNkWWKbwEA+uSDG6lIAhjN CcRXshMFy9FLlQwGCMOoZhurM9LrgQM=
    =qSic
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Sune Vuorela@21:1/5 to Simon Josefsson on Mon Jan 13 14:30:01 2025
    On 2025-01-13, Simon Josefsson <simon@josefsson.org> wrote:
    the way you want. This is even more true considering that the people
    who are patching GnuPG seems to be the same people who are working on replacing GnuPG with Seqoia.

    Not only that, but some of these people were also in the standardization workgroup knowingly forcing the schism by wanting, what GnuPG upstream describes as, 'useless complexity' (my wording, not theirs).

    /Sune

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Josefsson@21:1/5 to Jonathan McDowell on Mon Jan 13 14:20:01 2025
    Jonathan McDowell <noodles@earth.li> writes:

    On Mon, Jan 13, 2025 at 11:08:11AM +0100, Simon Josefsson wrote:
    Daniel Kahn Gillmor <dkg@debian.org> writes:
    I welcome review and critique of the packaging for this tricky package,
    which is pretty deeply embedded in Debian (though getting less so, as
    apt no longer requires it and we have many other OpenPGP implementations >> > available today). I'd be even more delighted with offers of active
    co-maintenance beyond the work that Andreas and i have been doing.

    I've offered help, but my impression has been that it not giving up on
    the schism thing has been more important than getting Debian to ship
    upstream code to users and let people decide what they want to use.

    Sometimes it is better to let other make decisions rather than to make
    decisions for others.

    I agree, but in this instance given the reliance we have upon GnuPG throughout the Debian ecosystem I believe it's important we ensure that
    the default configuration of what we ship is compatible with OpenPGP.
    Power users can feel free to play with OpenPGP v6 / LibrePGP
    enhancements, but for the vast majority of folk sticking to RFC
    compliant v4 is going to make the most sense.

    I understand this concern, but I believe there is a strong bias for
    Debian developers to care about our own use-cases a lot which may not be particulary relevant outside the scope of Debian-internal development.

    I believe it would be perfectly fine to ship verbatim upstream unpatched
    GnuPG 2.4 and work out any Debian-specific quirks and requirements we
    have and put quirks into tools that are external to GnuPG itself.

    If there are requirements on how to use GnuPG for interacting with
    Debian, please just document them rather than patching GnuPG to behave
    the way you want. This is even more true considering that the people
    who are patching GnuPG seems to be the same people who are working on
    replacing GnuPG with Seqoia.

    /Simon

    --=-=-Content-Type: application/pgp-signature; name="signature.asc"

    -----BEGIN PGP SIGNATURE-----

    iQNoBAEWCAMQFiEEo8ychwudMQq61M8vUXIrCP5HRaIFAmeFD0AUHHNpbW9uQGpv c2Vmc3Nvbi5vcmfCHCYAmDMEXJLOtBYJKwYBBAHaRw8BAQdACIcrZIvhrxDBkK9f V+QlTmXxo2naObDuGtw58YaxlOu0JVNpbW9uIEpvc2Vmc3NvbiA8c2ltb25Aam9z ZWZzc29uLm9yZz6IlgQTFggAPgIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgBYh BLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgIBQkLehFUAAoJENc89jjFPAa+CboA +wUa06RD5e5VTCxvSWtPS75Wq2qBeYGZnf0jvUMxa2n4AP4xkUeAPPnNuMsTm2fs FCDIGaEM2Yn6Vb2huzzT1Fw/BLgzBFySz4EWCSsGAQQB2kcPAQEHQOxTCIOaeXAx I2hIX4HK9bQTpNVei708oNr1Klm8qCGKiPUEGBYIACYCGwIWIQSx0r0Tdb7LeEz0 +MTXPPY4xTwGvgUCZf2IKwUJC3oQqgCBdiAEGRYIAB0WIQSjzJyHC50xCrrUzy9R cisI/kdFogUCXJLPgQAKCRBRcisI/kdFoqdMAQCgH45aseZgIrwKOvUOA9QfsmeE 8GZHYNuFHmM9FEQS6AD6A4x5aYvoY6lo98pgtw2HPDhmcCXFItjXCrV4A0GmJA4J ENc89jjFPAa+GcYA/26YQY05bLtnXiIjTiAzrGQrRXxTHPA8Av7TDFHvIetWAP9s HSoU8OfTwmTiEnGwLlsV7QJclZg3YNz/Ypcp9TqQBrg4BFySz2oSCisGAQQBl1UB BQEBB0AxlRumDW6nZY7A+VCfek9VpEx6PJmdJyYPt3lNHMd6HAMBCAeIfgQYFggA JgIbDBYhBLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgwBQkLehDGAAoJENc89jjF PAa+phoA/jrDqIrl/55vUMBhIQv+TP635d2iCTEnyFmbUcP9+gh6APoDsXalVd2c OGxQtSC+TF8PkZMn1TLkJKAjVxr+xx40AgAKCRBRcisI/kdFoo03AQDrrmrlSz0j kOChBVSuJ4NMeWS0WUld5NqcH5w9jsO1JQEAuWQEOwk4y2dsG5Qj4j6RTTD36hwe 5RkaEz1WmHB8PAM=STS6
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Daniel Kahn Gillmor@21:1/5 to Simon Josefsson on Mon Jan 13 14:50:01 2025
    On Mon 2025-01-13 10:53:30 +0100, Simon Josefsson wrote:
    I actually meant missing features. From my recollection it was features related to support for some subset of combinations of 25519, gpgsm, smartcards and the gpg/ssh agent. Things didn't work in GnuPG 2.2 but
    was fixed years ago in 2.4.

    If you could identify the specific missing feature, i'd love to try to
    figure out what's going on there (with either 2.2 or 2.4). A bug report
    would be particularly useful. Thanks!

    --dkg

    -----BEGIN PGP SIGNATURE-----

    wr0EARYKAG8FgmeFFE0JEHctFh41zUuBRxQAAAAAAB4AIHNhbHRAbm90YXRpb25z LnNlcXVvaWEtcGdwLm9yZ72AV5C/UHJ846sbXaOVhkUT8e3pnCxatRXUfDS5AcYp FiEEdLwExD2GCEvoZywGdy0WHjXNS4EAAMu8AP9462FHWAixCe+thnWpgCx3Z9b4 O8l3k1kca+mGtQDkeQEAvqxCEaJAj4auWv5XQfIsUfe5zEsEgZzbA42Ovua5Bg8=
    =NnPS
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Luca Boccassi@21:1/5 to Daniel Kahn Gillmor on Mon Jan 13 14:50:01 2025
    On Wed, 8 Jan 2025 at 23:08, Daniel Kahn Gillmor <dkg@debian.org> wrote:

    Thanks for this discussion, all--

    On Tue 2025-01-07 15:16:27 +0100, Simon Josefsson wrote:
    I believe this would be good, I frequently run into GnuPG bugs in the
    2.2.x branch that was fixed years ago in 2.4

    Can you identify some of those bugs? It would be good to be clear about
    what 2.2 is lacking.

    There's one issue that I have experience of, that is fixed with 2.4
    and doesn't work with 2.2: using a Yubikey that has _both_ pgp keys
    and x509 certs, and trying to use both. With 2.2 it's a constant fight
    between scdaemon and opensc, and you have to constantly manually
    restart, switch configs, etc.
    With 2.4, I can instruct scdaemon to ignore the piv slots, and opensc
    to ignore the gpg slots, and both to accept shared access, and things
    _mostly_ work smoothly, only requiring an occasional restart of pcscd,
    every few days or so. I found no way to make this setup work with 2.2.
    Just my 2c.

    For reference, scdaemon.conf:

    pcsc-driver /usr/lib/x86_64-linux-gnu/libpcsclite.so
    pcsc-shared
    disable-ccid
    disable-application piv

    opensc.conf:

    app default {
    card_atr <your:series:of:numbers> {
    atrmask = "FF:FF:FF:FF:FF:FF:FF:FF:FF:FF:FF:FF:FF:FF:FF:00:00";
    name = "Yubikey Neo";
    # Select the PKI applet to use ("PIV-II" or "openpgp")
    driver = "PIV-II";
    # Recover from other applications accessing a different applet
    flags = "keep_alive";
    }
    }

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Josefsson@21:1/5 to Daniel Kahn Gillmor on Mon Jan 13 15:00:01 2025
    Daniel Kahn Gillmor <dkg@debian.org> writes:

    On Mon 2025-01-13 10:53:30 +0100, Simon Josefsson wrote:
    I actually meant missing features. From my recollection it was features
    related to support for some subset of combinations of 25519, gpgsm,
    smartcards and the gpg/ssh agent. Things didn't work in GnuPG 2.2 but
    was fixed years ago in 2.4.

    If you could identify the specific missing feature, i'd love to try to
    figure out what's going on there (with either 2.2 or 2.4). A bug report would be particularly useful. Thanks!

    I found one of them:

    https://dev.gnupg.org/T5931

    I didn't test if more recent GnuPG 2.2.x contain a fix for this. From
    the bug log it doesn't look that way. This happens for all my SSH
    connections to modern systems, when I work from Debian-based machines
    and have forgotten to update GnuPG to 2.4.x or apply the workaround that weakens my security.

    I don't think gpgsm supports creating Ed25519 certificates using
    hardware tokens in GnuPG 2.2.x? That works in 2.4.x. I must admit
    again I did not re-check the most recent 2.2.x series.

    /Simon

    -----BEGIN PGP SIGNATURE-----

    iQNoBAEWCAMQFiEEo8ychwudMQq61M8vUXIrCP5HRaIFAmeFGUMUHHNpbW9uQGpv c2Vmc3Nvbi5vcmfCHCYAmDMEXJLOtBYJKwYBBAHaRw8BAQdACIcrZIvhrxDBkK9f V+QlTmXxo2naObDuGtw58YaxlOu0JVNpbW9uIEpvc2Vmc3NvbiA8c2ltb25Aam9z ZWZzc29uLm9yZz6IlgQTFggAPgIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgBYh BLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgIBQkLehFUAAoJENc89jjFPAa+CboA +wUa06RD5e5VTCxvSWtPS75Wq2qBeYGZnf0jvUMxa2n4AP4xkUeAPPnNuMsTm2fs FCDIGaEM2Yn6Vb2huzzT1Fw/BLgzBFySz4EWCSsGAQQB2kcPAQEHQOxTCIOaeXAx I2hIX4HK9bQTpNVei708oNr1Klm8qCGKiPUEGBYIACYCGwIWIQSx0r0Tdb7LeEz0 +MTXPPY4xTwGvgUCZf2IKwUJC3oQqgCBdiAEGRYIAB0WIQSjzJyHC50xCrrUzy9R cisI/kdFogUCXJLPgQAKCRBRcisI/kdFoqdMAQCgH45aseZgIrwKOvUOA9QfsmeE 8GZHYNuFHmM9FEQS6AD6A4x5aYvoY6lo98pgtw2HPDhmcCXFItjXCrV4A0GmJA4J ENc89jjFPAa+GcYA/26YQY05bLtnXiIjTiAzrGQrRXxTHPA8Av7TDFHvIetWAP9s HSoU8OfTwmTiEnGwLlsV7QJclZg3YNz/Ypcp9TqQBrg4BFySz2oSCisGAQQBl1UB BQEBB0AxlRumDW6nZY7A+VCfek9VpEx6PJmdJyYPt3lNHMd6HAMBCAeIfgQYFggA JgIbDBYhBLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgwBQkLehDGAAoJENc89jjF PAa+phoA/jrDqIrl/55vUMBhIQv+TP635d2iCTEnyFmbUcP9+gh6APoDsXalVd2c OGxQtSC+TF8PkZMn1TLkJKAjVxr+xx40AgAKCRBRcisI/kdFoqo0AQD0Xkk325oH 74LZYEEpbRSPvs3dpSndHPVvxOTX8NPUkAEAyt4hJ656F9JkOpa8tkVUHS26P1nU ga0w58PkQ7qXpws=
    =qlQN
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stephan =?ISO-8859-1?Q?Verb=FCcheln@21:1/5 to All on Mon Jan 13 15:20:01 2025
    One of the prominently announced features of the 2.3/2.4 branches was multi-smartcard support and support for TPM 2.0 key wrapping.

    Regards

    -----BEGIN PGP SIGNATURE-----

    iHUEABYKAB0WIQRB1rjSpCJd8a7h6mNgNUJZCjx8YgUCZ4Ue5gAKCRBgNUJZCjx8 Ys3aAQCQjKdV+okI5AE7QAFpmFyu6kUbLHtdRB4cSbdgyVe90gEApPpIeLTe2cGE lNpaXamTdd0xE0/P8XQ1HYwtOITC4wg=
    =bvBy
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andreas Metzler@21:1/5 to simon@josefsson.org on Mon Jan 13 18:50:01 2025
    On 2025-01-13 Simon Josefsson <simon@josefsson.org> wrote:
    Jonathan McDowell <noodles@earth.li> writes:
    [...]
    I agree, but in this instance given the reliance we have upon GnuPG throughout the Debian ecosystem I believe it's important we ensure that
    the default configuration of what we ship is compatible with OpenPGP.
    Power users can feel free to play with OpenPGP v6 / LibrePGP
    enhancements, but for the vast majority of folk sticking to RFC
    compliant v4 is going to make the most sense.

    I understand this concern, but I believe there is a strong bias for
    Debian developers to care about our own use-cases a lot which may not be particulary relevant outside the scope of Debian-internal development.

    I believe it would be perfectly fine to ship verbatim upstream unpatched GnuPG 2.4 and work out any Debian-specific quirks and requirements we
    have and put quirks into tools that are external to GnuPG itself.
    [...]

    Hello,

    I think the bit of information that is missing here is that Debian is
    *not* the odd man out for shipping patched versions of gnupg. Take a
    look at https://repology.org/project/gnupg/packages yourself. Everybody
    is trying to protect their users by trying to patch out librepgp-specific behavior by default.

    cu Andreas
    --
    `What a good friend you are to him, Dr. Maturin. His other friends are
    so grateful to you.'
    `I sew his ears on from time to time, sure'

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jonathan McDowell@21:1/5 to Simon Josefsson on Tue Jan 14 10:00:01 2025
    On Mon, Jan 13, 2025 at 02:04:00PM +0100, Simon Josefsson wrote:
    Jonathan McDowell <noodles@earth.li> writes:
    On Mon, Jan 13, 2025 at 11:08:11AM +0100, Simon Josefsson wrote:
    Daniel Kahn Gillmor <dkg@debian.org> writes:
    I welcome review and critique of the packaging for this tricky package, >> > which is pretty deeply embedded in Debian (though getting less so, as
    apt no longer requires it and we have many other OpenPGP implementations >> > available today). I'd be even more delighted with offers of active
    co-maintenance beyond the work that Andreas and i have been doing.

    I've offered help, but my impression has been that it not giving up on
    the schism thing has been more important than getting Debian to ship
    upstream code to users and let people decide what they want to use.

    Sometimes it is better to let other make decisions rather than to make
    decisions for others.

    I agree, but in this instance given the reliance we have upon GnuPG throughout the Debian ecosystem I believe it's important we ensure that
    the default configuration of what we ship is compatible with OpenPGP.
    Power users can feel free to play with OpenPGP v6 / LibrePGP
    enhancements, but for the vast majority of folk sticking to RFC
    compliant v4 is going to make the most sense.

    I understand this concern, but I believe there is a strong bias for
    Debian developers to care about our own use-cases a lot which may not be particulary relevant outside the scope of Debian-internal development.

    I believe it would be perfectly fine to ship verbatim upstream unpatched GnuPG 2.4 and work out any Debian-specific quirks and requirements we
    have and put quirks into tools that are external to GnuPG itself.

    I don't agree. For trixie I would like us to ship a GnuPG which _by
    default_ does not emit LibrePGP packets. I'm fully in favour of that
    ability being available to folk who chose to explicitly enable it, but I
    don't think it's a responsible default for us to ship.

    It's a simple fact that the OpenPGP ecosystem, including GnuPG, is
    complicated for folk who are not devoting significant time to
    understanding it all. We've seen that previously in terms of having to
    write documentation about how to generate keys with secure settings, or
    explain why we've made certain decisions that deviate from what an
    out-of-the box config would give. We're not an outlier in patching GnuPG
    to provide OpenPGP v4 defaults.

    (This email written wearing no hats, but definitely informed by the fact
    I'm part of keyring-maint.)

    J.

    --
    "I'm a paranoid agnostic. I doubt the existence of God, but I'm sure
    there is some force, somewhere, working against me." -- Marc Maron

    -----BEGIN PGP SIGNATURE-----

    iHUEARYKAB0WIQSAYP1ALvrBQa1odmMPwJuF4mk8PAUCZ4Yl6QAKCRAPwJuF4mk8 PCeoAP4wDbXBD6bZux52nmOkoUTyXocx0e1ch+T+T98+4IPj+AEAnvZEO3mg9Bgx +7dojVpah9pIoP+vDD+39yfepOGAYwg=
    =NF7O
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew Gallagher@21:1/5 to simon@joseffson.org on Tue Jan 14 11:50:02 2025
    Simon Joseffson <simon@joseffson.org <mailto:simon@joseffson.org>> wrote:

    It seems there is push from the anti-GnuPG people to promote a fork called FreePG instead of real GnuPG, will you package that?

    https://gitlab.com/freepg/gnupg

    FreePG is not an anti-GnuPG project, if anything it’s trying to keep GnuPG on Linux alive as long as possible, so as not to force users into a disruptive sudden migration to other tools. It is also very deliberately not a fork, but rather a set of
    discrete patches that are already being applied by multiple downstreams, some dating back years.

    Who is behind FreePG?

    Me, mostly. I wrote the CI tooling that runs FreePG, and dkg has been helping to review and de-lint the patches against upstream, in consultation with other downstreams.

    Or do we want to trust 'Hooty McOwlface' with no earlier publicly recorded community contributions?

    Some clarity about Hooty is overdue. It is a machine account controlled by a Docker container that currently runs on my laptop, primarily because there are some automation tasks (such as mangling branch histories) that are not currently easy to do in the
    GitLab CI. I have commented on tickets using Hooty’s name in the past, but I’m trying to avoid it these days to avoid giving the impression that Hooty has an opinion.

    At some point I may decide to walk away from the project, in which case I can hand Hooty over to someone else as a functioning unit.

    This is even more true considering that the people who are patching GnuPG seems to be the same people who are working on replacing GnuPG with Seqoia.

    If you mean dkg, he’s been doing thankless work for years now trying to keep the OpenPGP ecosystem together, including by wrangling downstream packaging for *multiple* projects. The Sequoia project has never been involved in FreePG, and they most
    likely found out about it the same way everyone else here did. FreePG is an orthogonal project and is not intended to either help or impede adoption of Sequoia - the target userbase is people who can not, or do not wish to, migrate away from GnuPG (yet?),
    but also don’t wish to become incompatible with mainstream OpenPGP.

    A


    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEKR55odxVrielLu+DXB7EBNWQZikFAmeGPuEACgkQXB7EBNWQ ZikYPxAAgYYhW2Dy6sxXwdH19OVY4jn7zs03xq6Y8VdzbguULwllu1m+nHqu1PxY AgsnoSOTTwMw2jT+yIL0haSvAX6kDZzymzn1jctoO9gHG2Uc8zTGAjTN6tkkasfU ZsCWZUh5V/Y9qjJ1MCeO0UASWbsDAf8J7E6NfuJmw6xk9rvpvPiZ5zgJcJlFlPHX AldeE60CPpCglTXg2R1qPcKf59svtyAoHaGF2uUluFEoJ+EM0gSWNv3XChP60opk 7elkQe6XTXYxVWVHdpGZXF8SOSIv/dQJhvjqbtho9/NtigKhyrXwpazbD9BfAqCD D+xA2lCvx8Mo5N0ns5GAJwErNOtc7ghF9R4TzkYL8tI9YkHfFf9hHu3VgtVtaiGP Zn84/f5VXchjW/YPcPdFxQDFZ7+2ov+wn6k2+Sah9wpJ5oJmkK2D19nzaS7469C3 b/rrlVV8DvMpvdKvFVGeEakA1VOwMOx8rUsfc8m0L06jgF4qILQYVqDWOYyi7w1J u3kEuVkMe5fpHSu/Nyi2lEpEKDTbJ4E/4OhhSk7VUotwdKaezN8iBMODvrABNQvI NqGy8OE4qbU/VK50HoZri9thb/mQ+tIcjEqRyAw/Ou/GaAQL91naVTWwak5FCiNC 2cmwQBaXDiwDeVddiLY9PsAX3N1Sk5G+9NycELbmnSSgjDDkfdQ=
    =0rwj
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Josefsson@21:1/5 to Andrew Gallagher on Tue Jan 14 14:40:01 2025
    Thank you for clarifying a bit about who is behind FreePG!

    Andrew Gallagher <andrewg@andrewg.com> writes:

    Simon Joseffson <simon@joseffson.org <mailto:simon@joseffson.org>> wrote:

    It seems there is push from the anti-GnuPG people to promote a fork
    called FreePG instead of real GnuPG, will you package that?

    https://gitlab.com/freepg/gnupg

    FreePG is not an anti-GnuPG project, if anything it’s trying to keep
    GnuPG on Linux alive as long as possible, so as not to force users
    into a disruptive sudden migration to other tools. It is also very deliberately not a fork, but rather a set of discrete patches that are already being applied by multiple downstreams, some dating back years.

    So the FreePG set of patches results in a GnuPG fork by all meanings
    except, apparently, by name.

    If you take a piece of freely licensed software and make modifications
    that goes beyond simple build fixes, I would call that a fork.

    https://en.wikipedia.org/wiki/Fork_(software_development)

    If the justification for those modifications are disagreement with
    upstream about how GnuPG should behave with regard to the wire protocol,
    it becomes even more clear to me that we are talking about a fork.

    We've seen this before, like LibreSSL or OpenSSL, or EGCS vs GCC or
    Iceweasel vs Firefox. Each example is somewhat different, but they are
    useful for comparison.

    It is fine to disagree with a project, and chose to use or work on
    something else.

    I don't think it is a good idea to use the powers that comes by being a
    package maintainer or distribution to force changes of how some piece of software is supposed to work by patching it without changing its name.

    Doing so mis-represent the upstream project, and confuses users.

    What is GnuPG? Upstreams GnuPG or Debian's GnuPG or Fedora's GnuPG or
    Hooty's GnuPG? This situation is bad both for Debian and GnuPG, and to
    the wider PGP eco-system.

    If there is commitment to provide long-term support for FreePG, how
    about uploading that as a separate package in Debian?

    And also please upload verbatim upstream GnuPG separately. This allows
    user choice.

    Right now there are claims that we shouldn't use GnuPG 2.4.x because it
    is EOL before trixie EOL and the two alternatives that are proposed
    instead is to continue use GnuPG 2.2.x or the FreePG fork that also lack long-term commitment EOL date for support.

    /Simon

    --=-=-Content-Type: application/pgp-signature; name="signature.asc"

    -----BEGIN PGP SIGNATURE-----

    iQNoBAEWCAMQFiEEo8ychwudMQq61M8vUXIrCP5HRaIFAmeGZkcUHHNpbW9uQGpv c2Vmc3Nvbi5vcmfCHCYAmDMEXJLOtBYJKwYBBAHaRw8BAQdACIcrZIvhrxDBkK9f V+QlTmXxo2naObDuGtw58YaxlOu0JVNpbW9uIEpvc2Vmc3NvbiA8c2ltb25Aam9z ZWZzc29uLm9yZz6IlgQTFggAPgIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgBYh BLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgIBQkLehFUAAoJENc89jjFPAa+CboA +wUa06RD5e5VTCxvSWtPS75Wq2qBeYGZnf0jvUMxa2n4AP4xkUeAPPnNuMsTm2fs FCDIGaEM2Yn6Vb2huzzT1Fw/BLgzBFySz4EWCSsGAQQB2kcPAQEHQOxTCIOaeXAx I2hIX4HK9bQTpNVei708oNr1Klm8qCGKiPUEGBYIACYCGwIWIQSx0r0Tdb7LeEz0 +MTXPPY4xTwGvgUCZf2IKwUJC3oQqgCBdiAEGRYIAB0WIQSjzJyHC50xCrrUzy9R cisI/kdFogUCXJLPgQAKCRBRcisI/kdFoqdMAQCgH45aseZgIrwKOvUOA9QfsmeE 8GZHYNuFHmM9FEQS6AD6A4x5aYvoY6lo98pgtw2HPDhmcCXFItjXCrV4A0GmJA4J ENc89jjFPAa+GcYA/26YQY05bLtnXiIjTiAzrGQrRXxTHPA8Av7TDFHvIetWAP9s HSoU8OfTwmTiEnGwLlsV7QJclZg3YNz/Ypcp9TqQBrg4BFySz2oSCisGAQQBl1UB BQEBB0AxlRumDW6nZY7A+VCfek9VpEx6PJmdJyYPt3lNHMd6HAMBCAeIfgQYFggA JgIbDBYhBLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgwBQkLehDGAAoJENc89jjF PAa+phoA/jrDqIrl/55vUMBhIQv+TP635d2iCTEnyFmbUcP9+gh6APoDsXalVd2c OGxQtSC+TF8PkZMn1TLkJKAjVxr+xx40AgAKCRBRcisI/kdFonJPAP9fPErDBVNv KoBnVoRnmOxtHdA9rppdTTFOGJ6F9nZXVQEA4jMFLADPIgMgIKFp3HjssgJJmnxg b+OLhAHr6x3qZAQ=SnfX
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marco d'Itri@21:1/5 to Simon Josefsson on Tue Jan 14 16:40:01 2025
    On Jan 14, Simon Josefsson <simon@josefsson.org> wrote:

    I don't think it is a good idea to use the powers that comes by being a package maintainer or distribution to force changes of how some piece of software is supposed to work by patching it without changing its name.
    We have been doing this since Debian exists, so I think that you will
    have to express a much more articulate argument than "I don't think it
    is a good idea".

    And also please upload verbatim upstream GnuPG separately. This allows
    user choice.
    Why don't YOU do it, if you really care so much?
    As a project we have no moral or technical obligations to provide
    choices that we do not personally care about.

    --
    ciao,
    Marco

    -----BEGIN PGP SIGNATURE-----

    iHUEABYIAB0WIQQnKUXNg20437dCfobLPsM64d7XgQUCZ4aEFwAKCRDLPsM64d7X gWFsAP0UskmPVfJ7qH9d7lFkPmgCAGfg8KfUgskywA7Q4A89OgD+NDYSWCYU43ME OlreddaoZNPKcUGV7FFDmvu2l41moQI=
    =iy97
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From andrewg@21:1/5 to Simon Joseffson on Tue Jan 14 17:50:02 2025
    Simon Joseffson <simon@joseffson.org> wrote:
    If the justification for those modifications are disagreement with
    upstream about how GnuPG should behave with regard to the wire
    protocol, it becomes even more clear to me that we are talking about a
    fork.

    The disagreements are not so much about which wire formats should be
    supported, just which ones should be generated by default. Patching over upstream defaults is common practice for most Linux distros.

    What is GnuPG? Upstreams GnuPG or Debian's GnuPG or Fedora's GnuPG or Hooty's GnuPG? This situation is bad both for Debian and GnuPG, and to
    the wider PGP eco-system.

    I’m sympathetic in principle, however the current status in practice is
    that we already have “Debian’s GnuPG, “Fedora’s GnuPG” etc, and the immediate goal of FreePG is to reduce this number, so that users who
    install one distribution’s GnuPG can be reasonably confident that it
    will behave the same as another distribution’s. If it was practical to
    ship unmodified, or barely modified, upstream then distributions would
    already be doing it, and FreePG would not exist.

    I do realise that this sounds like a “now we have 14 competing
    standards” scenario, but there are enough distros seriously considering alignment with FreePG that I believe the effort is useful on balance.

    If there is commitment to provide long-term support for FreePG, how
    about uploading that as a separate package in Debian?

    To be clear, FreePG requires no more support than the various distros
    are already providing for their existing patch sets, and FreePG has no
    support staff other than those downstream packagers who are already
    providing that support on a voluntary basis. However, we hope that
    having a single set of patches will allow distro packagers to share that support burden.

    And also please upload verbatim upstream GnuPG separately. This allows
    user choice.

    I agree that users should be empowered, however providing multiple
    install packages may not be the most sustainable way of doing so. It may
    be that the same outcome can be achieved through configuration options
    rather than separate binaries.

    —-
    Andrew Gallagher

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marco d'Itri@21:1/5 to Simon Josefsson on Tue Jan 14 18:30:01 2025
    On Jan 14, Simon Josefsson <simon@josefsson.org> wrote:

    Do you have earlier examples of Debian modifying upstream's desired wire crypto-sensitive protocol in the way like what is being done for GnuPG?
    Maybe there are some older OpenSSH or OpenSSL patches like that.
    Like the Kerberos patch for OpenSSH?

    --
    ciao,
    Marco

    -----BEGIN PGP SIGNATURE-----

    iHUEABYIAB0WIQQnKUXNg20437dCfobLPsM64d7XgQUCZ4ac3AAKCRDLPsM64d7X gXUFAP9FsuV1+TwO0W9d+KKBAJe4SIZ13HDr9xWDBf3oQuVAnQD/Z5m4tvhPcPmh S8CvZYrqhhwdN8s1i31VR+EGYoqFeQY=
    =/ls9
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Josefsson@21:1/5 to Marco d'Itri on Tue Jan 14 18:20:01 2025
    Marco d'Itri <md@Linux.IT> writes:

    On Jan 14, Simon Josefsson <simon@josefsson.org> wrote:

    I don't think it is a good idea to use the powers that comes by being a
    package maintainer or distribution to force changes of how some piece of
    software is supposed to work by patching it without changing its name.
    We have been doing this since Debian exists, so I think that you will
    have to express a much more articulate argument than "I don't think it
    is a good idea".

    Do you have earlier examples of Debian modifying upstream's desired wire crypto-sensitive protocol in the way like what is being done for GnuPG?
    Maybe there are some older OpenSSH or OpenSSL patches like that.

    And also please upload verbatim upstream GnuPG separately. This allows
    user choice.
    Why don't YOU do it, if you really care so much?
    As a project we have no moral or technical obligations to provide
    choices that we do not personally care about.

    I am hoping that the 'gnupg2' package could be altered towards that
    goal, and that some sort of compromise with the GnuPG Debian maintainers
    can be reached that providing a LibrePGP-compliant GnuPG in Debian is acceptable. I still have hope that this could happen. But you are
    right, it helps to do homework first.

    I've filed an ITP for a 'gnupg24' source package, to allow more
    substantiated discussion to proceed.

    https://bugs.debian.org/1093026

    I've set up the following repository, forking gnupg2's current Salsa git debian/experimental repository, with the intent of minimizing it into
    shipping a LibrePGP-compatible set of 'gpg' tools.

    https://salsa.debian.org/debian/gnupg-24

    I would prefer if this was team-maintained with the existing GnuPG
    maintainers since they are the experts on GnuPG in Debian.

    /Simon

    --=-=-Content-Type: application/pgp-signature; name="signature.asc"

    -----BEGIN PGP SIGNATURE-----

    iQNoBAEWCAMQFiEEo8ychwudMQq61M8vUXIrCP5HRaIFAmeGmn8UHHNpbW9uQGpv c2Vmc3Nvbi5vcmfCHCYAmDMEXJLOtBYJKwYBBAHaRw8BAQdACIcrZIvhrxDBkK9f V+QlTmXxo2naObDuGtw58YaxlOu0JVNpbW9uIEpvc2Vmc3NvbiA8c2ltb25Aam9z ZWZzc29uLm9yZz6IlgQTFggAPgIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgBYh BLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgIBQkLehFUAAoJENc89jjFPAa+CboA +wUa06RD5e5VTCxvSWtPS75Wq2qBeYGZnf0jvUMxa2n4AP4xkUeAPPnNuMsTm2fs FCDIGaEM2Yn6Vb2huzzT1Fw/BLgzBFySz4EWCSsGAQQB2kcPAQEHQOxTCIOaeXAx I2hIX4HK9bQTpNVei708oNr1Klm8qCGKiPUEGBYIACYCGwIWIQSx0r0Tdb7LeEz0 +MTXPPY4xTwGvgUCZf2IKwUJC3oQqgCBdiAEGRYIAB0WIQSjzJyHC50xCrrUzy9R cisI/kdFogUCXJLPgQAKCRBRcisI/kdFoqdMAQCgH45aseZgIrwKOvUOA9QfsmeE 8GZHYNuFHmM9FEQS6AD6A4x5aYvoY6lo98pgtw2HPDhmcCXFItjXCrV4A0GmJA4J ENc89jjFPAa+GcYA/26YQY05bLtnXiIjTiAzrGQrRXxTHPA8Av7TDFHvIetWAP9s HSoU8OfTwmTiEnGwLlsV7QJclZg3YNz/Ypcp9TqQBrg4BFySz2oSCisGAQQBl1UB BQEBB0AxlRumDW6nZY7A+VCfek9VpEx6PJmdJyYPt3lNHMd6HAMBCAeIfgQYFggA JgIbDBYhBLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgwBQkLehDGAAoJENc89jjF PAa+phoA/jrDqIrl/55vUMBhIQv+TP635d2iCTEnyFmbUcP9+gh6APoDsXalVd2c OGxQtSC+TF8PkZMn1TLkJKAjVxr+xx40AgAKCRBRcisI/kdFop6hAP46lp+cuzAp RkNXe/M1oCZO30CHxjghMA2ni0bIBt7NngEAgvpYOiQa0PhhlUDGOxynn8Ntsur+ YfNoixE0LJjwpwE=1KTN
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Simon Josefsson@21:1/5 to Marco d'Itri on Tue Jan 14 18:40:01 2025
    Marco d'Itri <md@linux.it> writes:

    On Jan 14, Simon Josefsson <simon@josefsson.org> wrote:

    Do you have earlier examples of Debian modifying upstream's desired wire
    crypto-sensitive protocol in the way like what is being done for GnuPG?
    Maybe there are some older OpenSSH or OpenSSL patches like that.
    Like the Kerberos patch for OpenSSH?

    Yes, that may be a good example of why doing distribution-specific
    custom patching of crypto code is a bad idea.

    /Simon

    -----BEGIN PGP SIGNATURE-----

    iQNoBAEWCAMQFiEEo8ychwudMQq61M8vUXIrCP5HRaIFAmeGnvUUHHNpbW9uQGpv c2Vmc3Nvbi5vcmfCHCYAmDMEXJLOtBYJKwYBBAHaRw8BAQdACIcrZIvhrxDBkK9f V+QlTmXxo2naObDuGtw58YaxlOu0JVNpbW9uIEpvc2Vmc3NvbiA8c2ltb25Aam9z ZWZzc29uLm9yZz6IlgQTFggAPgIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgBYh BLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgIBQkLehFUAAoJENc89jjFPAa+CboA +wUa06RD5e5VTCxvSWtPS75Wq2qBeYGZnf0jvUMxa2n4AP4xkUeAPPnNuMsTm2fs FCDIGaEM2Yn6Vb2huzzT1Fw/BLgzBFySz4EWCSsGAQQB2kcPAQEHQOxTCIOaeXAx I2hIX4HK9bQTpNVei708oNr1Klm8qCGKiPUEGBYIACYCGwIWIQSx0r0Tdb7LeEz0 +MTXPPY4xTwGvgUCZf2IKwUJC3oQqgCBdiAEGRYIAB0WIQSjzJyHC50xCrrUzy9R cisI/kdFogUCXJLPgQAKCRBRcisI/kdFoqdMAQCgH45aseZgIrwKOvUOA9QfsmeE 8GZHYNuFHmM9FEQS6AD6A4x5aYvoY6lo98pgtw2HPDhmcCXFItjXCrV4A0GmJA4J ENc89jjFPAa+GcYA/26YQY05bLtnXiIjTiAzrGQrRXxTHPA8Av7TDFHvIetWAP9s HSoU8OfTwmTiEnGwLlsV7QJclZg3YNz/Ypcp9TqQBrg4BFySz2oSCisGAQQBl1UB BQEBB0AxlRumDW6nZY7A+VCfek9VpEx6PJmdJyYPt3lNHMd6HAMBCAeIfgQYFggA JgIbDBYhBLHSvRN1vst4TPT4xNc89jjFPAa+BQJl/YgwBQkLehDGAAoJENc89jjF PAa+phoA/jrDqIrl/55vUMBhIQv+TP635d2iCTEnyFmbUcP9+gh6APoDsXalVd2c OGxQtSC+TF8PkZMn1TLkJKAjVxr+xx40AgAKCRBRcisI/kdFooEtAQDaOfydZfgP +mS5HkcJic3Ncm5Gjt0CKbiGEzEzPY97hgD/SQShffe79eMgXHK3qUXBfNAosixs 973/Kaawx6yQhQk=
    =3AhH
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew Gallagher@21:1/5 to Simon Josefsson on Tue Jan 14 21:50:01 2025
    On Tue, Jan 14, 2025 at 06:10:22PM +0100, Simon Josefsson wrote:

    Do you have earlier examples of Debian modifying upstream's desired wire crypto-sensitive protocol in the way like what is being done for GnuPG?
    Maybe there are some older OpenSSH or OpenSSL patches like that.

    To reiterate, FreePG does not modify the cryptographic core of GnuPG, or its wire protocols, merely the preferences and defaults.

    I am hoping that the 'gnupg2' package could be altered towards that
    goal, and that some sort of compromise with the GnuPG Debian maintainers
    can be reached that providing a LibrePGP-compliant GnuPG in Debian is acceptable.

    What is the criterion for LibrePGP compliance in your view? Is the ability to read and write LibrePGP wire formats not sufficient?

    I would encourage readers to check the patch list at [1] and the discussion at [2].

    --
    Andrew Gallagher http://andrewg.com/ andrewg@andrewg.com

    [1] https://gitlab.com/freepg/gnupg/-/tree/main/STABLE-BRANCH-2-4-freepg
    [2] https://gitlab.com/freepg/gnupg/-/issues/1

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Frank Guthausen@21:1/5 to Andreas Metzler on Fri Jan 17 21:00:01 2025
    On Tue, 7 Jan 2025 19:01:51 +0100
    Andreas Metzler <ametzler@bebt.de> wrote:

    Afaik there is no /known/ blocker except for the
    libgnupg-interface-perl test error #1088155.

    According to bug report[1] there are failed subtests in 2.4.6 but these
    are not specified. What causes this failures and what needs to be done
    to resolv the bug? Is the situation unchanged with 2.4.7? Is there a
    patch missing? Configuration issue? Is this a bug in the test suite
    itself?

    [1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088155

    --
    kind regards
    Frank

    -----BEGIN PGP SIGNATURE-----

    iQGzBAEBCgAdFiEE86z15c6qwvuAkhy+zDIN/uu9BloFAmeKtQIACgkQzDIN/uu9 BlpwOwv+PcnT1Go29GTzpbOkNSHXI+OADcnn2BFht6YeDblPJmhfRP/pd59DC9cM K/bMxr3xIhqErfY1HU4u1M97SmQ5VExtPFOs2PqYfQbrvD6ydHOu2CmYtncSsWdG klLbrbVyLvlC98zhyZuZ3P+/Fbt6AqFtqJGRbkInP2p0XETkCZGwvquLa9PL9drB GVqpGPzPyhBzAfNr9PBMixGc3yE4ZwDzXAbSHxIKDf0rXT3TKoVxNQOr+a2gFJeO Fo8kcEFXsm8UFjC3DH9dwwIUKFJJ+/h1Gw/mF5SFYQsO0TmVMXowE84X+wGWlHfK GlhTxZni42Y+pfe4QT2p2vl8F1oOH0SKPgq+pBbK5mR4ThF7kJkb3id51hntMfXm A8wCd+8YAPSlFNLnna3dnatqhlc1JIEUzR0z30h3+DbNQFgqQXXXjnnO8Cq+gQ5R 8DddOnZjGJagzY7aHZwDxfkf/mKgnHZSNHjIvaMpxF9GEjokilJjVxFXQgUMlIBB
    7W5dimVM
    =vftF
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andreas Metzler@21:1/5 to fg.debian@shimps.de on Sat Jan 18 06:40:01 2025
    On 2025-01-17 Frank Guthausen <fg.debian@shimps.de> wrote:
    On Tue, 7 Jan 2025 19:01:51 +0100
    Andreas Metzler <ametzler@bebt.de> wrote:

    Afaik there is no /known/ blocker except for the
    libgnupg-interface-perl test error #1088155.

    According to bug report[1] there are failed subtests in 2.4.6 but these
    are not specified. What causes this failures and what needs to be done
    to resolv the bug? Is the situation unchanged with 2.4.7? Is there a
    patch missing? Configuration issue? Is this a bug in the test suite
    itself?

    [1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088155

    Hello Frank,

    I am sure you are trying to be helpful but to me this just comes across
    as nagging. There is a perfectly fine, easily reproducible bug report.
    If you are not sure whether it is reproducible with 2.4.7 just try it
    yourself and document it in the bug-report.

    cu Andreas
    --
    `What a good friend you are to him, Dr. Maturin. His other friends are
    so grateful to you.'
    `I sew his ears on from time to time, sure'

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stephan =?ISO-8859-1?Q?Verb=FCcheln@21:1/5 to All on Fri Apr 11 19:10:01 2025
    GnuPG 2.4 has landed in Sid.

    I am already happily using GnuPG with TPM support (from experimental)
    for several months now without problems, including for signing
    automated backups with a machine-bound key. This will probably be
    available for everyone in Trixie.

    Thanks to everyone involved for making this possible!

    Regards

    -----BEGIN PGP SIGNATURE-----

    iHUEABYKAB0WIQRB1rjSpCJd8a7h6mNgNUJZCjx8YgUCZ/lL0wAKCRBgNUJZCjx8 YtbnAP4hBZGsGh463y0HP8Ei8bF+mLx4fexizXXd8Oj6P0JjAgEAj/XNeJYEDqcW y2oJ5rAImUIKHk8sFYpd5HmLTdlZBgI=
    =utRB
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)