-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
PGPの秘密鍵の仕様は署名無しなんだ。
GnuPGの秘密鍵をそのままインポートすると、
PGPで公開鍵をエクスポートした時にそれが付いてきたりする。
公開鍵の署名パケットと微妙に違う場合に署名が2つ重複するので、
鍵サーバに登録するとエラーで蹴られたりして、あまりよろしくない。
もちろんGnuPGでは全く問題ない。
-----BEGIN PGP SIGNATURE-----
Version: GnuPG jis (pass:2ch)
iEYEARECAAYFAlDQTrgACgkQ5Itn0D2Jueh8nACfZb03lSfP2TZh8yMDNhb+PnXR
0ZAAoNmuupVtAYEBZVIw9eguWZulC+Ae
=c7gX
-----END PGP SIGNATURE-----
探検
PGP / gpg スレ
2012/12/18(火) 20:11:45.23
2012/12/18(火) 20:35:19.70
>>329
pass ha "2ch" desu
pass ha "2ch" desu
2012/12/20(木) 00:00:42.57
ほぉ。。。。
2012/12/20(木) 01:10:25.44
>>331
2chに書き込むときもjisで署名しないとダメ?
2chに書き込むときもjisで署名しないとダメ?
2012/12/28(金) 11:55:06.12
>>323
shift-jisとJISはどっちがいいですか?
-----BEGIN PGP MESSAGE-----
Version: JIS
qANQR1DDDQQDAwJLzHFhcMKxt2DJWs0nQCYmulD/Y/8+V/M74CfMQzZEGxr/Snlp
KIFWM/zvYRxrBZkqWVWqH0kaW5L9PjXXpTSLE7uFe9FQR0M3J43z1Swap73kqQPV
23xsiGmSmwBVm3T3Gq1FbQ==
=8eWF
-----END PGP MESSAGE-----
shift-jisとJISはどっちがいいですか?
-----BEGIN PGP MESSAGE-----
Version: JIS
qANQR1DDDQQDAwJLzHFhcMKxt2DJWs0nQCYmulD/Y/8+V/M74CfMQzZEGxr/Snlp
KIFWM/zvYRxrBZkqWVWqH0kaW5L9PjXXpTSLE7uFe9FQR0M3J43z1Swap73kqQPV
23xsiGmSmwBVm3T3Gq1FbQ==
=8eWF
-----END PGP MESSAGE-----
2012/12/28(金) 14:50:47.60
>>335
復号化するには、-----BEGIN PGP PRIVATE KEY BLOCK-----で始まる秘密鍵ブロックをgpgに導入しないといけませんが、
ブロックはgpgに導入できたんですよね?
復号化するには、-----BEGIN PGP PRIVATE KEY BLOCK-----で始まる秘密鍵ブロックをgpgに導入しないといけませんが、
ブロックはgpgに導入できたんですよね?
2012/12/28(金) 17:09:25.49
2012/12/28(金) 17:35:39.18
2012/12/28(金) 21:09:04.37
オレもrevorkはよくわかかんないけど、
>>338 有効期限無期限になら変更出来るよ
2CHのパスがはじかれたけど
ここにもこんなスレが
http://kohada.2ch.net/test/read.cgi/sec/1124748812/l50
>>338 有効期限無期限になら変更出来るよ
2CHのパスがはじかれたけど
ここにもこんなスレが
http://kohada.2ch.net/test/read.cgi/sec/1124748812/l50
2013/01/12(土) 17:26:02.81
鍵の有効期限の変更はexpireで
秘密鍵の有効期限変えるにはkey 1で副鍵指定してからexpireで変更
秘密鍵の有効期限変えるにはkey 1で副鍵指定してからexpireで変更
341名無しさん@お腹いっぱい。
2013/03/20(水) 17:19:15.80 _
|O\
| \ キリキリ
∧|∧ \ キリキリ
ググゥ>(;⌒ヽ \
∪ | (~)
∪∪ γ´⌒`ヽ
) ) {i:i:i:i:i:i:i:i:}
( ( ( ´・ω・)、
(O ⌒ )O
⊂_)∪
|O\
| \ キリキリ
∧|∧ \ キリキリ
ググゥ>(;⌒ヽ \
∪ | (~)
∪∪ γ´⌒`ヽ
) ) {i:i:i:i:i:i:i:i:}
( ( ( ´・ω・)、
(O ⌒ )O
⊂_)∪
2013/06/15(土) 11:07:38.51
UNIXではないのでスレ違いかもしれませんが質問させて下さい。
Win7,64bitでGnuPG v1.4.13、手違いでいつも使っている鍵を削除してしまったため
エクスポートしてあったファイルを読み込んだ所、以下のエラーで公開鍵しか取り
込まれませんでした。
gpg --import XXXXXXXX.asc
gpg: key XXXXXXXX: public key"aaaaa <aaaaa@aaaaa.net>" imported
gpg: key XXXXXXXX: no user ID
gpg: Total number processed: 2
gpg: imported: 1 (RSA: 1)
gpg: secret keys read: 1
秘密鍵のuidが欠ける症状の報告自体は見つかるのですが、解決方法までは
辿りつけず……ご存知の方いらっしゃいましたらお願いします。
Win7,64bitでGnuPG v1.4.13、手違いでいつも使っている鍵を削除してしまったため
エクスポートしてあったファイルを読み込んだ所、以下のエラーで公開鍵しか取り
込まれませんでした。
gpg --import XXXXXXXX.asc
gpg: key XXXXXXXX: public key"aaaaa <aaaaa@aaaaa.net>" imported
gpg: key XXXXXXXX: no user ID
gpg: Total number processed: 2
gpg: imported: 1 (RSA: 1)
gpg: secret keys read: 1
秘密鍵のuidが欠ける症状の報告自体は見つかるのですが、解決方法までは
辿りつけず……ご存知の方いらっしゃいましたらお願いします。
2013/06/16(日) 21:29:08.56
公開鍵を gpgsplit
必要なパケットである、???.user_id とその次の ???.sig を抽出
秘密鍵を gpgsplit
公開鍵から抽出した user_id と sig を挿入(secret_keyの次の位置)
copy /b でパケットを繋ぐ
必要なパケットである、???.user_id とその次の ???.sig を抽出
秘密鍵を gpgsplit
公開鍵から抽出した user_id と sig を挿入(secret_keyの次の位置)
copy /b でパケットを繋ぐ
344343
2013/06/17(月) 23:02:51.03 反応が無いな。やり方が分からんのか?
345342
2013/06/18(火) 10:37:30.35346342
2013/06/18(火) 11:10:13.77 本当に勘違いでした。
バイナリ化すれば良かったのか。ありがとうございます。
バイナリ化すれば良かったのか。ありがとうございます。
2014/08/20(水) 09:01:20.42
[Announce] GnuPG 1.4.18 released
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000347.html
[Announce] GnuPG 2.0.26 released
http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000353.html
[Announce] The sixth Beta for GnuPG 2.1 is now available for testing
http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000354.html
[Gpg4win-announce] Gpg4win 2.2.2-beta released
http://lists.wald.intevation.org/pipermail/gpg4win-announce/2014-August/000060.html
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000347.html
[Announce] GnuPG 2.0.26 released
http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000353.html
[Announce] The sixth Beta for GnuPG 2.1 is now available for testing
http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000354.html
[Gpg4win-announce] Gpg4win 2.2.2-beta released
http://lists.wald.intevation.org/pipermail/gpg4win-announce/2014-August/000060.html
348名無しさん@お腹いっぱい。
2014/08/29(金) 03:15:38.75 シマンテックに買収される前のPGP Desktopを個人で購入したのですが、
もうサポートやアップグレードは無いのでしょうか?
シマンテックのサイトに行っても完全に企業向けという感じでわけが分かりません。。
もうサポートやアップグレードは無いのでしょうか?
シマンテックのサイトに行っても完全に企業向けという感じでわけが分かりません。。
2014/08/29(金) 08:06:35.22
>>348
電話かメールで問い合わせてみたら。
電話かメールで問い合わせてみたら。
2014/08/30(土) 13:37:04.39
Xpまでなら6.5.8で全然問題ないんだけどね。
GnuPGの方に鞍替えが今後考えると色々良いのかも。
にしてもなぜ一時期あれ程流行始めるかの様に見えた
PGP/GnuPGがこうも廃れて死またのだろう?
S/MIMEは生き残れているというのに・・・。
やはり「覗ける/覗けない」の差が命運を分けたのだろうか?
GnuPGの方に鞍替えが今後考えると色々良いのかも。
にしてもなぜ一時期あれ程流行始めるかの様に見えた
PGP/GnuPGがこうも廃れて死またのだろう?
S/MIMEは生き残れているというのに・・・。
やはり「覗ける/覗けない」の差が命運を分けたのだろうか?
2014/08/30(土) 16:16:15.42
個人で言えばプライバシーの概念が無い世代が通信機器を使うようになった
2014/08/31(日) 03:04:25.58
>>350
GMailが長年「PGPに対応しない」という態度を示すことで
PGPを兵糧攻めで殺すことに成功したってのがあるな
メールの中身をスキャンできないことは死活問題のようだし
S/MIMEも含め署名についても冷淡なのはさすがに謎だがな
smime.p7sを添付ファイルとしてしか扱わないとか
GMail以外のWebメールもGoogleに右ならえで暗号署名未対応だったのも謎
そんなこんなしてるうちにGoogleがこんなことやるしほんとみんな考えてることわからん
ttp://internet.watch.impress.co.jp/docs/news/20140604_651655.html
GMailが長年「PGPに対応しない」という態度を示すことで
PGPを兵糧攻めで殺すことに成功したってのがあるな
メールの中身をスキャンできないことは死活問題のようだし
S/MIMEも含め署名についても冷淡なのはさすがに謎だがな
smime.p7sを添付ファイルとしてしか扱わないとか
GMail以外のWebメールもGoogleに右ならえで暗号署名未対応だったのも謎
そんなこんなしてるうちにGoogleがこんなことやるしほんとみんな考えてることわからん
ttp://internet.watch.impress.co.jp/docs/news/20140604_651655.html
2014/08/31(日) 13:23:43.50
ブラウザベースで非ASCIIのOpenPGPなメールを扱うのは難しいんだけどうまくやれてるのかね?
インラインでの暗号化をUTF-8決め打ちで扱ってたFireGPGという黒歴史もあるし
インラインでの暗号化をUTF-8決め打ちで扱ってたFireGPGという黒歴史もあるし
354名無しさん@お腹いっぱい。
2014/09/01(月) 08:10:47.39 ___ _
ヽo,´-'─ 、 ♪
r, "~~~~"ヽ
i. ,'ノレノレ!レ〉 ☆ 日本のカクブソウは絶対に必須です ☆
__ '!从.゚ ヮ゚ノル 総務省の『憲法改正国民投票法』のURLです。
ゝン〈(つY_i(つ http://www.soumu.go.jp/senkyo/kokumin_touhyou/index.html
`,.く,§_,_,ゝ,
~i_ンイノ
ヽo,´-'─ 、 ♪
r, "~~~~"ヽ
i. ,'ノレノレ!レ〉 ☆ 日本のカクブソウは絶対に必須です ☆
__ '!从.゚ ヮ゚ノル 総務省の『憲法改正国民投票法』のURLです。
ゝン〈(つY_i(つ http://www.soumu.go.jp/senkyo/kokumin_touhyou/index.html
`,.く,§_,_,ゝ,
~i_ンイノ
2014/09/01(月) 21:21:13.97
まぁ、そんな時代でもプロバメール&電八(or秀メール)で
使える相手にゃガシガシつかっとるけど、マジでオナヌーだなw
ただ、ファイル暗号化だけは手放せないわ>>PGP/GnuPG
使える相手にゃガシガシつかっとるけど、マジでオナヌーだなw
ただ、ファイル暗号化だけは手放せないわ>>PGP/GnuPG
2014/09/04(木) 22:08:12.98
[Gpg4win-announce] Gpg4win 2.2.2 released
http://lists.wald.intevation.org/pipermail/gpg4win-announce/2014-September/000061.html
http://lists.wald.intevation.org/pipermail/gpg4win-announce/2014-September/000061.html
2014/09/06(土) 00:10:47.23
あれ、Gpg4win-Light2.2.2のGnuPGがアナウンスだと2.0.26だけど、
実際には2.0.22のままじゃね?w
実際には2.0.22のままじゃね?w
2014/09/06(土) 00:35:08.51
> gpg2 --version
gpg (GnuPG) 2.0.26 (Gpg4win 2.2.2)
libgcrypt 1.6.1
Copyright (C) 2013 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later
<http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Home: ********
サポートしているアルゴリズム:
公開鍵: RSA, ELG, DSA
暗号方式: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
CAMELLIA128, CAMELLIA192, CAMELLIA256
ハッシュ: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
圧縮: 無圧縮, ZIP, ZLIB, BZIP2
gpg (GnuPG) 2.0.26 (Gpg4win 2.2.2)
libgcrypt 1.6.1
Copyright (C) 2013 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later
<http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Home: ********
サポートしているアルゴリズム:
公開鍵: RSA, ELG, DSA
暗号方式: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
CAMELLIA128, CAMELLIA192, CAMELLIA256
ハッシュ: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
圧縮: 無圧縮, ZIP, ZLIB, BZIP2
2014/09/06(土) 00:42:17.45
同じことやったら(Gpg4win 2.2.1)って出たよw
アンインストール ⇒ 再起動 ⇒ Gpg4win-Light2.2.2をインストールってやったのに
俺環だスマンw
アンインストール ⇒ 再起動 ⇒ Gpg4win-Light2.2.2をインストールってやったのに
俺環だスマンw
2014/09/06(土) 01:27:39.23
>>359
∧∧
ヽ(・ω・)/ ズコー
\(.\ ノ
、ハ,,、  ̄
 ̄
∧∧
ヽ(・ω・)/ ズコー
\(.\ ノ
、ハ,,、  ̄
 ̄
2014/11/07(金) 01:16:55.93
GnuPG 2.1.0出た
まだ開発版扱いだけど
[Announce] GnuPG 2.1.0 "modern" released
http://lists.gnupg.org/pipermail/gnupg-announce/2014q4/000358.html
まだ開発版扱いだけど
[Announce] GnuPG 2.1.0 "modern" released
http://lists.gnupg.org/pipermail/gnupg-announce/2014q4/000358.html
362名無しさん@お腹いっぱい。
2015/06/30(火) 05:28:17.10 GnuPG modern 2.1.5 をインストールしましたが、
鍵を作ろうと $ gpg2 --full-gen-key したところ、
agpg: can't connect to the agent: IPC connect 呼び出しに失敗しました
gpg: agent_genkey failed: エージェントが動いていません
鍵の生成に失敗しました: エージェントが動いていません
とエラーが出て失敗します。どうしたらいいでしょうか。
鍵を作ろうと $ gpg2 --full-gen-key したところ、
agpg: can't connect to the agent: IPC connect 呼び出しに失敗しました
gpg: agent_genkey failed: エージェントが動いていません
鍵の生成に失敗しました: エージェントが動いていません
とエラーが出て失敗します。どうしたらいいでしょうか。
363362
2015/06/30(火) 05:42:08.81 書き忘れました。環境は Debian 8.1 です。
364362
2015/06/30(火) 07:08:03.15 GUI から libnpth0-1.0-1 (64 bit) の Debian のパッケージを入れ、
ftp://ftp.gnupg.org/gcrypt/pinentry/pinentry-0.9.4.tar.bz2
から Pinentry 0.9.4 を入れてから、
$ gpg-connect-agent /bye
してから
$ gpg2 --full-gen-key
したら鍵を作ることができました。お騒がせしました。
ftp://ftp.gnupg.org/gcrypt/pinentry/pinentry-0.9.4.tar.bz2
から Pinentry 0.9.4 を入れてから、
$ gpg-connect-agent /bye
してから
$ gpg2 --full-gen-key
したら鍵を作ることができました。お騒がせしました。
2015/07/12(日) 11:58:08.70
PCとスマホで同じメールアカウントを使って署名又は暗号化する際に秘密鍵を両端末で共有して良いでしょうか?
現在PC側にしか鍵がないのですが、スマホの新しい鍵をジェネレートしてスマホの公開鍵をPCで添付して送った方が良いでしょうか?
現在PC側にしか鍵がないのですが、スマホの新しい鍵をジェネレートしてスマホの公開鍵をPCで添付して送った方が良いでしょうか?
2015/07/13(月) 09:12:39.42
共有してもいいけど自己責任で。
スマホ紛失したら鍵をrevokeする覚悟があればいいんじゃないかな。
スマホ紛失したら鍵をrevokeする覚悟があればいいんじゃないかな。
2015/07/22(水) 19:37:44.08
2015/12/08(火) 04:41:53.40
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
さぁ最先端の楕円曲線暗号に鞍替えしよう
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2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=HWKQ
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
Comment:UTF-8N
iF4EARMIAAYFAlZl2GIACgkQecSBfhPp7gM+YQD/XaIpsutbZwXLOmDSHdE47Vy7
VPtS8Cz6bngH6MZmitEA/3v0h1mPCctyWNm+J+BVX7aJW0DFQye9v15EnWLw2pDf
=8o7d
-----END PGP SIGNATURE-----
Hash: SHA256
さぁ最先端の楕円曲線暗号に鞍替えしよう
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2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=HWKQ
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
Comment:UTF-8N
iF4EARMIAAYFAlZl2GIACgkQecSBfhPp7gM+YQD/XaIpsutbZwXLOmDSHdE47Vy7
VPtS8Cz6bngH6MZmitEA/3v0h1mPCctyWNm+J+BVX7aJW0DFQye9v15EnWLw2pDf
=8o7d
-----END PGP SIGNATURE-----
369名無しさん@お腹いっぱい。
2016/04/12(火) 22:03:46.43 >>198
遅レスだが、signify(1)
遅レスだが、signify(1)
370名無しさん@お腹いっぱい。
2016/04/26(火) 06:34:05.57 GnuPG1.4.20をWindows7sp1(64bit)のCygwinで使っています。
ひとつの鍵にふたつのメールアドレスを登録し、鍵サーバーに登録しました。
今ひとつのメールアドレスを登録解除したいと思い、
gpg --edit-keyしてから
revuid 解除したいメールアドレス
と操作しても「ユーザIDを少なくともひとつ選択してください。」
と表示されて解除できません。どうしたらいいでしょうか。
ひとつの鍵にふたつのメールアドレスを登録し、鍵サーバーに登録しました。
今ひとつのメールアドレスを登録解除したいと思い、
gpg --edit-keyしてから
revuid 解除したいメールアドレス
と操作しても「ユーザIDを少なくともひとつ選択してください。」
と表示されて解除できません。どうしたらいいでしょうか。
2016/11/09(水) 16:18:59.70
>>370
uidというコマンドを使ってユーザーIDを指定するんだよ
uidというコマンドを使ってユーザーIDを指定するんだよ
372370
2016/11/17(木) 07:55:41.18 登録解除をしないことにしたので、また機会が訪れたら試してみたいと思います。ありがとうございました。
2016/12/22(木) 21:21:55.59
暗号化しようとするファイル名にカタカナのソがあると
暗号化に失敗してしまうのですが回避策はありませんか?
コマンドは
gpg -c --batch --passphrase-fd 0 --cipher-algo AES256 --compress-algo none D:\あいうえおソabcde <D:\PassWord.txt
でエラー内容は
gpg: 「D:\\あいうえおソ\abcde」が開けません: No error
gpg: 「D:\\あいうえおソ\abcde」の共通鍵暗号に失敗しました: System error w/o errno
ソの次の文字が\だったり"だったりして失敗します。複合する場合も同じです。
ソを変えると成功するのでコマンドの構文ミスではないです。
環境は
Windows7Pro64bit
gpg (GnuPG) 2.0.30 (Gpg4win 2.3.3)
libgcrypt 1.6.6
Copyright (C) 2015 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Home: C:/Users/********/AppData/Roaming/gnupg
サポートしているアルゴリズム:
公開鍵: RSA, RSA, RSA, ELG, DSA
暗号方式: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
CAMELLIA128, CAMELLIA192, CAMELLIA256
ハッシュ: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
圧縮: 無圧縮, ZIP, ZLIB, BZIP2
暗号化に失敗してしまうのですが回避策はありませんか?
コマンドは
gpg -c --batch --passphrase-fd 0 --cipher-algo AES256 --compress-algo none D:\あいうえおソabcde <D:\PassWord.txt
でエラー内容は
gpg: 「D:\\あいうえおソ\abcde」が開けません: No error
gpg: 「D:\\あいうえおソ\abcde」の共通鍵暗号に失敗しました: System error w/o errno
ソの次の文字が\だったり"だったりして失敗します。複合する場合も同じです。
ソを変えると成功するのでコマンドの構文ミスではないです。
環境は
Windows7Pro64bit
gpg (GnuPG) 2.0.30 (Gpg4win 2.3.3)
libgcrypt 1.6.6
Copyright (C) 2015 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Home: C:/Users/********/AppData/Roaming/gnupg
サポートしているアルゴリズム:
公開鍵: RSA, RSA, RSA, ELG, DSA
暗号方式: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
CAMELLIA128, CAMELLIA192, CAMELLIA256
ハッシュ: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
圧縮: 無圧縮, ZIP, ZLIB, BZIP2
2016/12/22(木) 22:25:23.53
回避策なら一時ファイルにコピーして暗号化すれば
2016/12/22(木) 23:53:35.28
一時ファイルにコピー
とは具体的にどういったことをするのでしょうか?
とは具体的にどういったことをするのでしょうか?
2017/03/01(水) 13:50:52.31
Google Online Security Blog: E2EMail research project has left the nest
https://security.googleblog.com/2017/02/e2email-research-project-has-left-nest_24.html
https://security.googleblog.com/2017/02/e2email-research-project-has-left-nest_24.html
2017/03/02(木) 11:05:54.86
GnuPG 2.1.19 released
378名無しさん@お腹いっぱい。
2017/03/16(木) 19:55:28.42 以下コマンドにて共通鍵方式で暗号化した text.txt.asc の復号化には、パスワードさえ知っていれば公開鍵秘密鍵は不要
という考えで合ってる?
$ gpg2 -a -c text.txt
という考えで合ってる?
$ gpg2 -a -c text.txt
2017/03/16(木) 21:46:25.53
うん合ってる
しかしテキストならテキストモードで暗号化したほうが良い
gpg -cat text.txt
でもこれ復号化すると最後の行の改行コードが消えるんだけど
仕様なんですかねぇ
しかしテキストならテキストモードで暗号化したほうが良い
gpg -cat text.txt
でもこれ復号化すると最後の行の改行コードが消えるんだけど
仕様なんですかねぇ
2017/03/17(金) 19:48:34.82
その共通鍵方式って暗号の強度とかバージョン間の互換性とかはどんなものなの?
ドキュメント見てみたけどわかんなかった
ドキュメント見てみたけどわかんなかった
2017/04/05(水) 07:15:30.38
GnuPG 2.1.20 released
382名無しさん@お腹いっぱい。
2017/06/12(月) 00:44:07.13 【暗号化メール】 AndroidでPGP 【OpenKeychain】
http://egg.2ch.net/test/read.cgi/android/1497195712/
http://egg.2ch.net/test/read.cgi/android/1497195712/
383名無しさん@お腹いっぱい。
2017/06/13(火) 02:10:34.69 ↓のスレで聞いてるのですが、誰も人いないのでこっちでお願いします。
AndroidのOpenPGPアプリOpenKeyChainで
「インターネットへ接続」、英語版だと”upload key to keyserver”をオフにするのってどうやるんですか?
なんかチェック外そうとしても外れないんだけど
【暗号化メール】 AndroidでPGP 【OpenKeychain】
http://egg.2ch.net/test/read.cgi/android/1497195712/
AndroidのOpenPGPアプリOpenKeyChainで
「インターネットへ接続」、英語版だと”upload key to keyserver”をオフにするのってどうやるんですか?
なんかチェック外そうとしても外れないんだけど
【暗号化メール】 AndroidでPGP 【OpenKeychain】
http://egg.2ch.net/test/read.cgi/android/1497195712/
2017/06/13(火) 08:25:06.99
板違い
2017/06/14(水) 08:47:35.60
Androidのアプリの仕様なんて知らんよ
2017/06/29(木) 02:02:00.78
1.4と2が共存できなくなってる
1.4ヲ消したらECC鍵のインポートや削除出来るようになった
1.4ヲ消したらECC鍵のインポートや削除出来るようになった
2017/10/24(火) 10:05:33.97
>>379
テキストモードと通常モードの違いって何?
それと昔に作った1024bitの秘密鍵が使えなくなってた
v2だったら仕えたんだけどv1.4のアップデートの際に短すぎる鍵は使えなくなったりしたの?
テキストモードと通常モードの違いって何?
それと昔に作った1024bitの秘密鍵が使えなくなってた
v2だったら仕えたんだけどv1.4のアップデートの際に短すぎる鍵は使えなくなったりしたの?
2017/10/24(火) 10:55:25.40
2017/11/05(日) 04:22:48.12
>>381
いつの間にか 2.2.1 になってたのね
いつの間にか 2.2.1 になってたのね
391名無しさん@お腹いっぱい。
2017/12/29(金) 07:35:47.65 誰でも簡単にパソコン1台で稼げる方法など
参考までに、
⇒ 『宮本のゴウリエセレレ』 というブログで見ることができるらしいです。
グーグル検索⇒『宮本のゴウリエセレレ』
EGU60NARBN
参考までに、
⇒ 『宮本のゴウリエセレレ』 というブログで見ることができるらしいです。
グーグル検索⇒『宮本のゴウリエセレレ』
EGU60NARBN
392名無しさん@お腹いっぱい。
2018/05/22(火) 06:15:22.71 知り合いから教えてもらったパソコン一台でお金持ちになれるやり方
時間がある方はみてもいいかもしれません
グーグルで検索するといいかも『ネットで稼ぐ方法 モニアレフヌノ』
S8RJT
時間がある方はみてもいいかもしれません
グーグルで検索するといいかも『ネットで稼ぐ方法 モニアレフヌノ』
S8RJT
2018/06/24(日) 03:08:23.09
GnuPG 1.4.23
394名無しさん@お腹いっぱい。
2019/03/15(金) 13:19:43.97 公開キー・サーバー、pgp.mit.eduに接続できない。
メンテ中にしては長いなあ。
メンテ中にしては長いなあ。
2019/03/16(土) 00:29:08.70
mitはいつも混んでいる印象
自分は wwwkeys.eu.pgp.net とか使うことがあるな
自分は wwwkeys.eu.pgp.net とか使うことがあるな
396名無しさん@お腹いっぱい。
2019/03/17(日) 19:49:56.61 >>395
教えてくださって有り難うございます。
教えてくださって有り難うございます。
2019/03/17(日) 20:15:45.46
pgpキーサーバって連携してるんじゃね
どれでも動いてる奴を使えばよいと思うけど
どれでも動いてる奴を使えばよいと思うけど
2019/03/20(水) 00:54:29.65
2019/03/25(月) 07:42:26.16
GnuPG 2.2.14 出てた
400名無しさん@お腹いっぱい。
2019/04/21(日) 03:06:19.79 てst
2019/05/30(木) 15:19:58.39
サーバはpool.sks-keyservers.netが一番よさげやね
2019/05/30(木) 22:31:15.60
GnuPG 2.2.16
2019/07/11(木) 13:58:39.71
GnuPG 2.2.17
2019/07/12(金) 13:12:06.13
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
もはやSKS Keyserverはだめだ
代替はWKDらしい
https://wiki.gnupg.org/WKD
もはやSKS Keyserverはだめだ
代替はWKDらしい
https://wiki.gnupg.org/WKD
2019/07/17(水) 19:25:52.60
-----BEGIN PGP MESSAGE-----
Charset: Shift-JIS
Comment: スレの10
jA0ECQMCiz4mvjdp555g0kIBsl5K7laZYgVs+9ZHkAXAo5Q/bQSxGJOrfat7xZ0s
266BmX+3DWa86FS9t6LgFEkBuupj1A+InTGM1tuThmgnpQ8=
=19l5
-----END PGP MESSAGE-----
Charset: Shift-JIS
Comment: スレの10
jA0ECQMCiz4mvjdp555g0kIBsl5K7laZYgVs+9ZHkAXAo5Q/bQSxGJOrfat7xZ0s
266BmX+3DWa86FS9t6LgFEkBuupj1A+InTGM1tuThmgnpQ8=
=19l5
-----END PGP MESSAGE-----
2019/07/18(木) 06:40:28.48
パスが分からん
2019/07/27(土) 02:02:02.54
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
>>406
このスレッドURLで10桁といったら・・・
-----BEGIN PGP SIGNATURE-----
Charset: UTF-8
Comment: http://shingetu.0g0.jp:8000/thread.cgi/PGP%E3%81%A7%E3%82%84%E3%82%8A%E3%81%A8%E3%82%8A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=C1TX
-----END PGP SIGNATURE-----
Hash: SHA256
>>406
このスレッドURLで10桁といったら・・・
-----BEGIN PGP SIGNATURE-----
Charset: UTF-8
Comment: http://shingetu.0g0.jp:8000/thread.cgi/PGP%E3%81%A7%E3%82%84%E3%82%8A%E3%81%A8%E3%82%8A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=C1TX
-----END PGP SIGNATURE-----
2019/08/05(月) 22:49:44.42
-----BEGIN PGP MESSAGE-----
Charset: UTF-8N
jA0EBwMCZyCB5voLGIBg0lABbqLLd6/CikHwMsorG7MjP6C2NPYRLiC8kMsdW1K3
ab6/utlXfth8z0QvSz7jEKsL7jvq3UH6uwE2tha/Q/xg64qfRP8QTnMkMaAj0Zwv
ew==
=ID1O
-----END PGP MESSAGE-----
Charset: UTF-8N
jA0EBwMCZyCB5voLGIBg0lABbqLLd6/CikHwMsorG7MjP6C2NPYRLiC8kMsdW1K3
ab6/utlXfth8z0QvSz7jEKsL7jvq3UH6uwE2tha/Q/xg64qfRP8QTnMkMaAj0Zwv
ew==
=ID1O
-----END PGP MESSAGE-----
2019/08/05(月) 23:16:49.85
数年前に見たエドワード・スノーデンの動画でgpgが出てたな
スノーデンが、NSAは20桁のパスを解析出来るとか言ってたが
本当かねえ
スノーデンが、NSAは20桁のパスを解析出来るとか言ってたが
本当かねえ
2019/08/06(火) 23:25:25.12
411名無しさん@お腹いっぱい。
2019/08/07(水) 01:48:21.75 >>409
>gpgが出てたな
>スノーデンが、NSAは20桁のパスを解析出来る
それってここでいう解読予算1兆円(国家レベル)のやつじゃないと出来ないでしょ?
https://sehermitage.web.fc2.com/crypto/safety.html
1024ビットのRSA暗号で予算10億円(企業レベル)でも
今後10年間買得不能らしいよ
https://www.dit.co.jp/service/security/report/03.html
https://japan.norton.com/brute-force-attack-9215
>gpgが出てたな
>スノーデンが、NSAは20桁のパスを解析出来る
それってここでいう解読予算1兆円(国家レベル)のやつじゃないと出来ないでしょ?
https://sehermitage.web.fc2.com/crypto/safety.html
1024ビットのRSA暗号で予算10億円(企業レベル)でも
今後10年間買得不能らしいよ
https://www.dit.co.jp/service/security/report/03.html
https://japan.norton.com/brute-force-attack-9215
412名無しさん@お腹いっぱい。
2019/08/07(水) 01:49:20.74 NSAって解読予算に1兆円も使えないだろ、知らんけど
まあ、予想以上に解読されるんだろうけど
てか、バックドアだろうな
まあ、予想以上に解読されるんだろうけど
てか、バックドアだろうな
413名無しさん@お腹いっぱい。
2019/08/11(日) 13:21:50.37 >>412
アメリカぐらいの規模なら一兆円ぐらい準備できるだろ。
アメリカぐらいの規模なら一兆円ぐらい準備できるだろ。
2019/08/11(日) 22:59:39.43
一兆円の予算を都合し、暗号を解読したN.S.A.の報告書に、こう書いてあった
解読結果「ぬるぽ」
追伸
他の暗号データの解読には別途一兆円が必要です
解読結果「ぬるぽ」
追伸
他の暗号データの解読には別途一兆円が必要です
415名無しさん@お腹いっぱい。
2019/09/03(火) 16:01:29.09 なんでGnuPGって--no-use-agentオプションなくなったの?
GUIで使いたくないのだが
これだとなんかセキリティ的にやばいでしょ?
echo 【復号化パスフレーズ】| gpg --passphrase-fd 0 --decrypt --batch --no-secmem-warning 【復号化したいgpgファイル】
https://qiita.com/hanamiche/items/f2b666f6bfacb561999a
GUIで使いたくないのだが
これだとなんかセキリティ的にやばいでしょ?
echo 【復号化パスフレーズ】| gpg --passphrase-fd 0 --decrypt --batch --no-secmem-warning 【復号化したいgpgファイル】
https://qiita.com/hanamiche/items/f2b666f6bfacb561999a
2019/09/04(水) 06:33:17.82
GUIを強要するためになくした
2019/09/04(水) 10:54:44.64
gpg-agentが本体でgpgコマンドはフロントエンドになったからじゃない?
パスフレーズを端末から入れたいだけならpinentry-curses使えばいいんじゃないかな
パスフレーズを端末から入れたいだけならpinentry-curses使えばいいんじゃないかな
418名無しさん@お腹いっぱい。
2019/09/04(水) 12:28:59.63 >>416-417
>pinentry-curses
こんなのあったんだ
あとで試してみます
あと、AndroidのTermuxでgnugp使ってるのだが、
/home/~/.gnupg/gpg-agent.confがないよ
パスフレーズのキャッシュの削除時間ってどこでいじるの?
>pinentry-curses
こんなのあったんだ
あとで試してみます
あと、AndroidのTermuxでgnugp使ってるのだが、
/home/~/.gnupg/gpg-agent.confがないよ
パスフレーズのキャッシュの削除時間ってどこでいじるの?
419名無しさん@お腹いっぱい。
2019/09/04(水) 21:27:40.77 Ubuntuの/home/username/.gnupg/gpg-agent.conf
をTermuxの.gnugpフォルダに入れたら
普通にキャッシュ時間0になって毎回パスフレーズ求めるようになったのだけど、
ファイル追加したことでどっかセキリティ上やばいとこないよね?
をTermuxの.gnugpフォルダに入れたら
普通にキャッシュ時間0になって毎回パスフレーズ求めるようになったのだけど、
ファイル追加したことでどっかセキリティ上やばいとこないよね?
420名無しさん@お腹いっぱい。
2019/09/04(水) 22:00:59.612019/09/05(木) 11:00:58.36
422名無しさん@お腹いっぱい。
2019/09/05(木) 13:38:24.03423名無しさん@お腹いっぱい。
2019/09/05(木) 22:13:35.49 ちょっと話しずれてすまんのだが、ファイル・フォルダを
gpg使ってAES256で暗号化するのと(共通鍵で)
openssl使ってAES256で暗号化するのって強度の違い出る?
openssLコマンドの方が、-saltオプションあるから解読への耐久力上がるの?
$ gpg --cipher-algo AES256 --output hoge.txt.gpg --symmetric hoge.txt
$ openssl enc -e -aes-256-cbc -salt -in hoge.txt -out hoge.txt.aes256
*-saltオプションを付与することで,より強固な暗号化を実現することが出来ます.
これにより,Rainbow-Tableと呼ばれる暗号文(正しくはハッシュ値)と
平文(暗号化されていない文書)の対応表を利用した解読への耐性を得られます.
https://www.storange.jp/2014/11/openssl.html
gpg使ってAES256で暗号化するのと(共通鍵で)
openssl使ってAES256で暗号化するのって強度の違い出る?
openssLコマンドの方が、-saltオプションあるから解読への耐久力上がるの?
$ gpg --cipher-algo AES256 --output hoge.txt.gpg --symmetric hoge.txt
$ openssl enc -e -aes-256-cbc -salt -in hoge.txt -out hoge.txt.aes256
*-saltオプションを付与することで,より強固な暗号化を実現することが出来ます.
これにより,Rainbow-Tableと呼ばれる暗号文(正しくはハッシュ値)と
平文(暗号化されていない文書)の対応表を利用した解読への耐性を得られます.
https://www.storange.jp/2014/11/openssl.html
2019/09/06(金) 07:38:22.04
>>423
pgpdump hoge.txt.gpg で見ると普通に Salt が有るようだが?
Old: Symmetric-Key Encrypted Session Key Packet(tag 3)(13 bytes)
New version(4)
Sym alg - AES with 256-bit key(sym 9)
Iterated and salted string-to-key(s2k 3):
Hash alg - SHA1(hash 2)
Salt - 3c 24 21 1d 0c 63 a3 af
Count - 65536(coded count 96)
New: Symmetrically Encrypted and MDC Packet(tag 18)(70 bytes)
Ver 1
Encrypted data [sym alg is specified in sym-key encrypted session key]
(plain text + MDC SHA1(20 bytes))
pgpdump hoge.txt.gpg で見ると普通に Salt が有るようだが?
Old: Symmetric-Key Encrypted Session Key Packet(tag 3)(13 bytes)
New version(4)
Sym alg - AES with 256-bit key(sym 9)
Iterated and salted string-to-key(s2k 3):
Hash alg - SHA1(hash 2)
Salt - 3c 24 21 1d 0c 63 a3 af
Count - 65536(coded count 96)
New: Symmetrically Encrypted and MDC Packet(tag 18)(70 bytes)
Ver 1
Encrypted data [sym alg is specified in sym-key encrypted session key]
(plain text + MDC SHA1(20 bytes))
2019/09/06(金) 09:19:45.80
GPGで電子署名をして、公開鍵の情報を入れない方式で暗号化
匿名性抜群
匿名性抜群
2019/09/06(金) 11:44:51.31
>>422
gpgじゃなくてgpg-agentの方だよ
gpg-agent --pinentry-program /usr/bin/pinentry-curses
基本常駐なので一度動いてるやつのpinentry-programを変えたいという
場合はgpg-agent.confを書き換えてgpg-connect-agentでreloadするしかない
gpgじゃなくてgpg-agentの方だよ
gpg-agent --pinentry-program /usr/bin/pinentry-curses
基本常駐なので一度動いてるやつのpinentry-programを変えたいという
場合はgpg-agent.confを書き換えてgpg-connect-agentでreloadするしかない
2019/09/25(水) 12:43:53.53
gpg-agent の利用を強制しとけば、盗み易いもんな。
どこかの巨大企業の差し金か?
どこかの巨大企業の差し金か?
2019/09/25(水) 12:47:41.53
2019/09/25(水) 12:48:22.99
gpg / gpg2 を使わない方がいいな
430名無しさん@お腹いっぱい。
2019/09/26(木) 01:33:43.69 俺のgpg-agent.confは、こうなってるけど大丈夫なんでしょうねえ?
default-cache-ttl 0
max-cache-ttl 0
pinentry-program /usr/bin/pinentry-curses
(Pinentryは、↑にしてたけど、
ThunderbirdのEnigmailがGUIの方要求するので
今は#してGUIの方使ってる)
#外してpinentry-curses使いたいけど、Thunderbirdで暗号化使えないのがなあ
default-cache-ttl 0
max-cache-ttl 0
pinentry-program /usr/bin/pinentry-curses
(Pinentryは、↑にしてたけど、
ThunderbirdのEnigmailがGUIの方要求するので
今は#してGUIの方使ってる)
#外してpinentry-curses使いたいけど、Thunderbirdで暗号化使えないのがなあ
2019/10/25(金) 14:20:43.78
OBSD 方面で、 LibrePG とか作ってくれないかな…
2019/11/29(金) 06:41:25.51
身分証と自分の公開鍵を役所に持っていったら、役所の署名を自分の公開鍵に付けてくれるサービスとかして欲しいな
公開鍵の信用も高まるし、色々な手続きも電子的にやれるようになる
公開鍵の信用も高まるし、色々な手続きも電子的にやれるようになる
2019/11/29(金) 19:14:20.13
電子署名の認証業務は、法律が根拠で地方自治体がやってるよ。
2020/02/28(金) 09:00:22.61
pgp.nic.ad.jp のサーバはダメだな
Werner Koch のキーが古い
2ヶ月前の自己署名が無い
Werner Koch のキーが古い
2ヶ月前の自己署名が無い
2020/02/28(金) 12:01:23.50
いやもうpgp public keyserverが破綻しかけてるんで…
ショートハッシュ衝突させた鍵登録されまくりですよ
ショートハッシュ衝突させた鍵登録されまくりですよ
2020/02/28(金) 12:36:04.70
mitのやつもダメ?
2020/02/28(金) 13:15:03.00
MITのは流石に署名付きだった。ハッシュ衝突はやばいな。
俺は20年前に思ったんだが、こんなデータ追加しかできないシステムで、
将来絶対に破綻するだろうってな。みんな分かってたのに放置してただろ。
これは国民年金より先に破綻しそうだな。
ところでこれはいいよな。
https://keys.openpgp.org/
いちいち import-minimal しなくてすむ。
俺は20年前に思ったんだが、こんなデータ追加しかできないシステムで、
将来絶対に破綻するだろうってな。みんな分かってたのに放置してただろ。
これは国民年金より先に破綻しそうだな。
ところでこれはいいよな。
https://keys.openpgp.org/
いちいち import-minimal しなくてすむ。
2020/02/29(土) 17:21:43.75
2020/10/12(月) 13:14:18.25
機密情報を共有する5カ国協定、いわゆる「ファイブアイズ」の参加国(米国、英国、カナダ、オーストラリア、ニュージーランド)が、日本およびインドの政府代表と連名で声明を発表した。テクノロジー企業に向けて、エンドツーエンドの暗号化された通信に法執行機関がアクセスすることを可能にする解決策の開発を要請している。
この声明は、暗号にバックドアを設けることをテクノロジー企業に同意させようとする、ファイブアイズの最新の取り組みだ。
各国の政府関係者はこれまでと同様、テクノロジー企業が製品にエンドツーエンド暗号化(E2EE)を組み込むことで犯罪捜査が困難になったと主張している。
7カ国の政府代表は、現在の主要なテクノロジープラットフォームでサポートされているE2EEの仕組みのために、法執行機関が犯罪組織を捜査できないばかりか、テクノロジープラットフォーム各社も、一般市民を守るためのサービス利用規約を守らせることができずにいると主張している。
声明では、「暗号化技術の特定の実装」によって、法執行機関の捜査に問題が生じているとしている。テクノロジープラットフォーム各社も一部の通信内容にアクセスできず、捜査当局に必要なデータを提供できないからだ。
これにより、犯罪活動にとって安全な避難場所の確保を許し、「性的に搾取されている児童など、われわれの社会の中でも特に弱い立場の人々」を危険にさらしてしまうという。
7カ国はテクノロジー業界と協力し、ユーザーが引き続き安全で暗号化された通信を利用できるだけでなく、法執行機関とテクノロジー企業も犯罪活動を取り締まれる解決策を開発するよう尽力していくとした。
暗号化されたインスタントメッセージアプリだけではなく、「デバイスの暗号化、カスタム暗号化アプリ、統合プラットフォーム全体の暗号化」も対象となるという。
2018年には、オーストラリアが主要な民主主義国家の中で初めて「反暗号化法」を導入した。同様の取り組みは米国や欧州でもあったが、そこまで成功しなかった。主な理由は、テクノロジー企業や非営利団体、一般市民からの反発だ。
しかし、西側の政府が機密情報の収集能力で中国と対等になろうとする中、オーストラリアと同様の対応を求める圧力が近年高まっている。
https://japan.cnet.com/article/35160775/
この声明は、暗号にバックドアを設けることをテクノロジー企業に同意させようとする、ファイブアイズの最新の取り組みだ。
各国の政府関係者はこれまでと同様、テクノロジー企業が製品にエンドツーエンド暗号化(E2EE)を組み込むことで犯罪捜査が困難になったと主張している。
7カ国の政府代表は、現在の主要なテクノロジープラットフォームでサポートされているE2EEの仕組みのために、法執行機関が犯罪組織を捜査できないばかりか、テクノロジープラットフォーム各社も、一般市民を守るためのサービス利用規約を守らせることができずにいると主張している。
声明では、「暗号化技術の特定の実装」によって、法執行機関の捜査に問題が生じているとしている。テクノロジープラットフォーム各社も一部の通信内容にアクセスできず、捜査当局に必要なデータを提供できないからだ。
これにより、犯罪活動にとって安全な避難場所の確保を許し、「性的に搾取されている児童など、われわれの社会の中でも特に弱い立場の人々」を危険にさらしてしまうという。
7カ国はテクノロジー業界と協力し、ユーザーが引き続き安全で暗号化された通信を利用できるだけでなく、法執行機関とテクノロジー企業も犯罪活動を取り締まれる解決策を開発するよう尽力していくとした。
暗号化されたインスタントメッセージアプリだけではなく、「デバイスの暗号化、カスタム暗号化アプリ、統合プラットフォーム全体の暗号化」も対象となるという。
2018年には、オーストラリアが主要な民主主義国家の中で初めて「反暗号化法」を導入した。同様の取り組みは米国や欧州でもあったが、そこまで成功しなかった。主な理由は、テクノロジー企業や非営利団体、一般市民からの反発だ。
しかし、西側の政府が機密情報の収集能力で中国と対等になろうとする中、オーストラリアと同様の対応を求める圧力が近年高まっている。
https://japan.cnet.com/article/35160775/
2021/03/21(日) 12:53:12.66
おいぽまいら!
LINEがやらかしたぞ!
ここも誰に見られているか分からない
みんな、自分の公開鍵を晒せ!
共通鍵を暗号化して晒すから、それで暗号化して書き込め!
LINEがやらかしたぞ!
ここも誰に見られているか分からない
みんな、自分の公開鍵を晒せ!
共通鍵を暗号化して晒すから、それで暗号化して書き込め!
2021/03/21(日) 15:04:26.69
昔チャンコロキーでやったなあ
2021/03/27(土) 11:20:24.15
ペーパーに戻すのが安全ってことになりそうで嫌だWww
2021/04/09(金) 11:26:39.35
[Announce] GnuPG 2.3.0 released
https://lists.gnupg.org/pipermail/gnupg-announce/2021q2/000458.html
GnuPGの次期メジャーアップデートである2.4系列の開発版にあたる2.3系列の初版、2.3.0がリリース
・鍵データベースにSQLiteを採用(既定では無効、実験的)
・公開鍵の既定アルゴリズムをed25519/cv25519に変更
・X448 (ed448/cv448) に対応
・バージョン5鍵、署名に対応
https://lists.gnupg.org/pipermail/gnupg-announce/2021q2/000458.html
GnuPGの次期メジャーアップデートである2.4系列の開発版にあたる2.3系列の初版、2.3.0がリリース
・鍵データベースにSQLiteを採用(既定では無効、実験的)
・公開鍵の既定アルゴリズムをed25519/cv25519に変更
・X448 (ed448/cv448) に対応
・バージョン5鍵、署名に対応
2021/04/09(金) 11:30:48.27
現行の2.2系列は2024年12月31日でサポート終了の予定
Libgcrypt 1.8系列も同じ
Libgcrypt 1.8系列も同じ
2021/05/12(水) 05:14:27.61
「古い」ものを新しくしたから優れているとは限らないからなぁ…
グーグルがはびこってから「新しいもの」にはイビツな何かを感じる
グーグルがはびこってから「新しいもの」にはイビツな何かを感じる
2021/05/12(水) 05:35:47.08
djbはガチだから
2021/05/12(水) 11:00:22.36
>>445
ん?ネトウヨか?
ん?ネトウヨか?
2021/07/05(月) 14:36:40.70
2.2.29リリース
* Change the default keyserver to keyserver.ubuntu.com. This is a
temporary change due to the shutdown of the SKS keyserver pools.
[47c4e3e00a]
pool.sks-keyservers.netがGDPRに関連して死亡してることに対して、暫定的に既定の鍵サーバーをubuntuのに切り替えたとのこと
* Change the default keyserver to keyserver.ubuntu.com. This is a
temporary change due to the shutdown of the SKS keyserver pools.
[47c4e3e00a]
pool.sks-keyservers.netがGDPRに関連して死亡してることに対して、暫定的に既定の鍵サーバーをubuntuのに切り替えたとのこと
2021/08/28(土) 16:51:44.13
GnuPG 2.3.2 & 2.2.30
2021/09/02(木) 13:27:32.83
2.3.2を導入してるディストリってある?
2021/09/17(金) 10:57:06.90
GnuPG 2.2.31
2021/10/07(木) 16:23:27.80
2.2.32
Let's Encryptの証明書を使ってる鍵サーバー、WKDに接続できない問題を修正
Noteworthy changes in version 2.2.32 (2021-10-06)
=================================================
* dirmngr: Fix Let's Encrypt certificate chain validation. [T5639]
(See https://dev/gnupg.org/T5639)
* dirmngr: New option --ignore-cert. [323a20399d]
* gpg: Fix --list-packets for AEAD packets with unknown key. [T5584]
Let's Encryptの証明書を使ってる鍵サーバー、WKDに接続できない問題を修正
Noteworthy changes in version 2.2.32 (2021-10-06)
=================================================
* dirmngr: Fix Let's Encrypt certificate chain validation. [T5639]
(See https://dev/gnupg.org/T5639)
* dirmngr: New option --ignore-cert. [323a20399d]
* gpg: Fix --list-packets for AEAD packets with unknown key. [T5584]
2021/10/13(水) 08:13:42.53
2.3.3
2.2.32と同じくLet's Encryptの証明書周りの問題などを修正
Noteworthy changes in version 2.3.3 (2021-10-12)
===============================================
* agent: Fix segv in GET_PASSPHRASE (regression). [#5577]
* dirmngr: Fix Let's Encrypt certificate chain validation. [#5639]
* gpg: Change default and maximum AEAD chunk size to 4 MiB. [ad3dabc9fb]
* gpg: Print a warning when importing a bad cv25519 secret key. [#5464]
* gpg: Fix --list-packets for undecryptable AEAD packets. [#5584]
* gpg: Verify backsigs for v5 keys correctly. [#5628]
* keyboxd: Fix checksum computation for no UBID entry on disk. [#5573]
* keyboxd: Fix "invalid object" error with cv448 keys. [#5609]
* dirmngr: New option --ignore-cert. [4b3e9a44b5]
* agent: Fix calibrate_get_time use of clock_gettime. [#5623]
* Silence process spawning diagnostics on Windows. [f2b01025c3]
* Support a gpgconf.ctl file under Unix and use this for the regression tests. [#5999]
* The Windows installer now also installs the new keyboxd. (Put "use-keyboxd" into common.conf to use a fast SQLite database instead of the pubring.kbx file.)
2.2.32と同じくLet's Encryptの証明書周りの問題などを修正
Noteworthy changes in version 2.3.3 (2021-10-12)
===============================================
* agent: Fix segv in GET_PASSPHRASE (regression). [#5577]
* dirmngr: Fix Let's Encrypt certificate chain validation. [#5639]
* gpg: Change default and maximum AEAD chunk size to 4 MiB. [ad3dabc9fb]
* gpg: Print a warning when importing a bad cv25519 secret key. [#5464]
* gpg: Fix --list-packets for undecryptable AEAD packets. [#5584]
* gpg: Verify backsigs for v5 keys correctly. [#5628]
* keyboxd: Fix checksum computation for no UBID entry on disk. [#5573]
* keyboxd: Fix "invalid object" error with cv448 keys. [#5609]
* dirmngr: New option --ignore-cert. [4b3e9a44b5]
* agent: Fix calibrate_get_time use of clock_gettime. [#5623]
* Silence process spawning diagnostics on Windows. [f2b01025c3]
* Support a gpgconf.ctl file under Unix and use this for the regression tests. [#5999]
* The Windows installer now also installs the new keyboxd. (Put "use-keyboxd" into common.conf to use a fast SQLite database instead of the pubring.kbx file.)
2021/11/24(水) 08:28:45.52
2.2.33
バグ修正と大規模利用向けのオプション追加
Noteworthy changes in version 2.2.33 (2021-11-23)
=================================================
* gpg: New option --min-rsa-length. [rG6ee01c1d26]
* gpg: New option --forbid-gen-key. [rG985fb25c46]
* gpg: New option --override-compliance-check. [T5655]
* gpgconf: New command --show-configs. [rG8fe3f57643]
* agent,dirmngr: New option --steal-socket. [rG6507c6ab10]
* scd: Improve the selection of the default PC/SC reader. [T5644]
* gpg: Fix printing of binary notations. [T5667]
* gpg: Remove stale ultimately trusted keys from the trustdb. [T5685]
* gpgsm: Detect circular chains in --list-chain. [rGc9343bec83]
* gpgconf: Create the local option file even if the global file exists. [T5650]
* dirmngr: Make reading resolv.conf more robust. [T5657]
* gpg-wks-server: Fix created file permissions. [rGf54feb4470]
* scd: Support longer data for ssh-agent authentication with openpgp cards. [T5682]
* Support gpgconf.ctl for NetBSD and Solaris. [T5656,T5671]
* Silence "Garbled console data" warning under Windows in most cases.
* Silence warning about the rootdir under Unices w/o a mounted /proc file system.
* Fix possible build problems about missing include files. [T5592]
* i18n: Replace the term "PIN-Cache" by "Passswort-Cache" in the German translation. [rgf453d52e53]
* i18n: Update the Russian translation.
バグ修正と大規模利用向けのオプション追加
Noteworthy changes in version 2.2.33 (2021-11-23)
=================================================
* gpg: New option --min-rsa-length. [rG6ee01c1d26]
* gpg: New option --forbid-gen-key. [rG985fb25c46]
* gpg: New option --override-compliance-check. [T5655]
* gpgconf: New command --show-configs. [rG8fe3f57643]
* agent,dirmngr: New option --steal-socket. [rG6507c6ab10]
* scd: Improve the selection of the default PC/SC reader. [T5644]
* gpg: Fix printing of binary notations. [T5667]
* gpg: Remove stale ultimately trusted keys from the trustdb. [T5685]
* gpgsm: Detect circular chains in --list-chain. [rGc9343bec83]
* gpgconf: Create the local option file even if the global file exists. [T5650]
* dirmngr: Make reading resolv.conf more robust. [T5657]
* gpg-wks-server: Fix created file permissions. [rGf54feb4470]
* scd: Support longer data for ssh-agent authentication with openpgp cards. [T5682]
* Support gpgconf.ctl for NetBSD and Solaris. [T5656,T5671]
* Silence "Garbled console data" warning under Windows in most cases.
* Silence warning about the rootdir under Unices w/o a mounted /proc file system.
* Fix possible build problems about missing include files. [T5592]
* i18n: Replace the term "PIN-Cache" by "Passswort-Cache" in the German translation. [rgf453d52e53]
* i18n: Update the Russian translation.
2021/12/22(水) 08:18:33.20
2.3.4
Noteworthy changes in version 2.3.4 (2021-12-20)
================================================
* gpg: New option --min-rsa-length. [rG5f39db70c0]
* gpg: New option --forbid-gen-key. [rGc397ba3ac0]
* gpg: New option --override-compliance-check. [T5655]
* gpgconf: New command --show-configs. [rGa0fb78ee0f]
* agent,dirmngr,keyboxd: New option --steal-socket. [rGb0079ab39d,rGdd708f60d5]
* gpg: Fix printing of binary notations. [T5667]
* gpg: Remove stale ultimately trusted keys from the trustdb. [T5685,T5742]
* gpg: Fix indentation of --print-mds and --print-md sha512. [T5679]
* gpg: Emit gpg 2.2 compatible Ed25519 signature. [T5331]
* gpgsm: Detect circular chains in --list-chain. [rG74c5b35062]
* dirmngr: Make reading resolv.conf more robust. [T5657]
* dirmngr: Ask keyservers to provide the key fingerprints. [T5741]
* gpgconf: Allow changing gpg's deprecated keyserver option. [T5462]
* gpg-wks-server: Fix created file permissions. [rG60be00b033]
* scd: Support longer data for ssh-agent authentication with openpgp cards. [T5682]
* scd: Modify DEVINFO behavior to support looping forever. [T5359]
* Support gpgconf.ctl for NetBSD and Solaris. [T5656,T5671]
* Silence "Garbled console data" warning under Windows in most cases. [rGe293da3b21]
* Silence warning about the rootdir under Unices w/o a mounted /proc file system. [T5656]
* Fix possible build problems about missing include files. [T5592]
Release-info: https://dev.gnupg.org/T5654
Noteworthy changes in version 2.3.4 (2021-12-20)
================================================
* gpg: New option --min-rsa-length. [rG5f39db70c0]
* gpg: New option --forbid-gen-key. [rGc397ba3ac0]
* gpg: New option --override-compliance-check. [T5655]
* gpgconf: New command --show-configs. [rGa0fb78ee0f]
* agent,dirmngr,keyboxd: New option --steal-socket. [rGb0079ab39d,rGdd708f60d5]
* gpg: Fix printing of binary notations. [T5667]
* gpg: Remove stale ultimately trusted keys from the trustdb. [T5685,T5742]
* gpg: Fix indentation of --print-mds and --print-md sha512. [T5679]
* gpg: Emit gpg 2.2 compatible Ed25519 signature. [T5331]
* gpgsm: Detect circular chains in --list-chain. [rG74c5b35062]
* dirmngr: Make reading resolv.conf more robust. [T5657]
* dirmngr: Ask keyservers to provide the key fingerprints. [T5741]
* gpgconf: Allow changing gpg's deprecated keyserver option. [T5462]
* gpg-wks-server: Fix created file permissions. [rG60be00b033]
* scd: Support longer data for ssh-agent authentication with openpgp cards. [T5682]
* scd: Modify DEVINFO behavior to support looping forever. [T5359]
* Support gpgconf.ctl for NetBSD and Solaris. [T5656,T5671]
* Silence "Garbled console data" warning under Windows in most cases. [rGe293da3b21]
* Silence warning about the rootdir under Unices w/o a mounted /proc file system. [T5656]
* Fix possible build problems about missing include files. [T5592]
Release-info: https://dev.gnupg.org/T5654
2021/12/22(水) 08:20:25.01
Gpg4win 4.0.0 リリース
https://files.gpg4win.org/README-4.0.0.en.txt
> GnuPG: 2.3.4
> Kleopatra: 3.1.20
> GPA: 0.10.0
> GpgOL: 2.5.1
> GpgEX: 1.0.8
> Kompendium DE: 4.0.1
> Compendium EN: 3.0.0
3.1.6まではGnuPG 2.2系列だったのが4.0.0からは2.3系列にアップグレードされてるので注意
https://files.gpg4win.org/README-4.0.0.en.txt
> GnuPG: 2.3.4
> Kleopatra: 3.1.20
> GPA: 0.10.0
> GpgOL: 2.5.1
> GpgEX: 1.0.8
> Kompendium DE: 4.0.1
> Compendium EN: 3.0.0
3.1.6まではGnuPG 2.2系列だったのが4.0.0からは2.3系列にアップグレードされてるので注意
2021/12/25(土) 21:34:50.82
https://www.gnupg.org/donate/index.html
> Fortunately, and this is still not common with free software, we have now established a way of financing the development while keeping all our software free and freely available for everyone.
>
> Our model is similar to the way RedHat manages RHEL and Fedora: Except for the actual binary of the MSI installer for Windows and client specific configuration files, all the software is available under the GNU GPL and other Open Source licenses. Thus customers may even build and distribute their own version of the software as long as they do not use our trademark GnuPG VS-DesktopR.
>
> Those with SEPA donations, please cancel them and redirect your funds to other projects which are more in need of financial support. The donations done via Stripe or PayPal have already been canceled.
>
> All you supporters greatly helped us to keep GnuPG alive and to finally setup a sustainable development model. Stay tuned for a somewhat longer writeup on this.
RHELとFedoraの関係と同じようなモデルで(GnuPG VS-DesktopとGnuPG)、寄付に頼らずに開発のための資金を得ることができるようになった
ライセンスは今まで通りGPLおよびその他のオープンソースライセンス(MSIインストーラーとクライアント設定ファイルを除く)
定期寄付を設定してる人はキャンセルして、もっと支援を必要としている他のプロジェクトに振り替えてほしい。StripeとPayPalでの寄付はキャンセル済み
> Fortunately, and this is still not common with free software, we have now established a way of financing the development while keeping all our software free and freely available for everyone.
>
> Our model is similar to the way RedHat manages RHEL and Fedora: Except for the actual binary of the MSI installer for Windows and client specific configuration files, all the software is available under the GNU GPL and other Open Source licenses. Thus customers may even build and distribute their own version of the software as long as they do not use our trademark GnuPG VS-DesktopR.
>
> Those with SEPA donations, please cancel them and redirect your funds to other projects which are more in need of financial support. The donations done via Stripe or PayPal have already been canceled.
>
> All you supporters greatly helped us to keep GnuPG alive and to finally setup a sustainable development model. Stay tuned for a somewhat longer writeup on this.
RHELとFedoraの関係と同じようなモデルで(GnuPG VS-DesktopとGnuPG)、寄付に頼らずに開発のための資金を得ることができるようになった
ライセンスは今まで通りGPLおよびその他のオープンソースライセンス(MSIインストーラーとクライアント設定ファイルを除く)
定期寄付を設定してる人はキャンセルして、もっと支援を必要としている他のプロジェクトに振り替えてほしい。StripeとPayPalでの寄付はキャンセル済み
2022/01/08(土) 15:21:15.80
A New Future for GnuPG
https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html
GnuPGの新しい未来(非公式日本語訳)
https://hidekis.notion.site/GnuPG-ab4490fce1c24f6bb8cf0799b494406a
https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html
GnuPGの新しい未来(非公式日本語訳)
https://hidekis.notion.site/GnuPG-ab4490fce1c24f6bb8cf0799b494406a
459名無しさん@お腹いっぱい。
2022/01/30(日) 22:04:45.89 単純に、誰にも紐づかないキーペアを作成して、文書ファイルを暗号/複合化したいのだけど、
1. 誰にも紐づかないキーペアを作成できない?
2. 文書ファイルを暗号/複合化の際、キーファイルを指定できない?
ように思えるけれど、そういうもの?
1. 誰にも紐づかないキーペアを作成できない?
2. 文書ファイルを暗号/複合化の際、キーファイルを指定できない?
ように思えるけれど、そういうもの?
2022/02/08(火) 10:22:07.52
2.2.34 (LTS)
Noteworthy changes in version 2.2.34
====================================
* gpgconf: Backport the improved option reading and writing code from 2.3. [rG7a3a1ef370,T4788]
* gpgconf: Do not list ignored options and mark forced options as read-only. [T5732]
* gpgconf: Correctly show registry entries with --show-configs. [T5724]
* gpgconf: Add command aliases -L, -K, and -R. [rGf16c535eee]
* gpgconf: Tweak the use of the ldapserver option. [T5801]
* gpgconf: Make "--launch gpg-agent" work again. [rG5a7ed6dd8f]
* gpg: Accept Ed25519 private keys in modernized encoding. [T5120]
* gpg: Fix adding the list of ultimate trusted keys. [T5742]
* gpgsm: New option --ignore-cert-with-oid. [rGbcf446b70c]
* dirmngr: Avoid initial delay on the first keyserver access in presence of --no-use-tor. [rGdde88897e2]
* scdaemon: Also prefer Yubikeys if no reader port is given. [rG38c666ec3f]
* agent: Make missing strings translatable and update German and Japanese translations. [T4777]
* ssh: Fix adding an ed25519 key with a zero length comment. [T5794]
* gpgtar: Create and handle extended headers to support long file names. [T5754]
* Fix the creation of socket directories under Windows for non-ascii account names. [rG7d1215cb9c]
* Improve the registry HKCU->HKLM fallback. [rG96db487a4d]
* Prettify the --help output of most commands.
Release-info: https://dev.gnupg.org/T5703
Noteworthy changes in version 2.2.34
====================================
* gpgconf: Backport the improved option reading and writing code from 2.3. [rG7a3a1ef370,T4788]
* gpgconf: Do not list ignored options and mark forced options as read-only. [T5732]
* gpgconf: Correctly show registry entries with --show-configs. [T5724]
* gpgconf: Add command aliases -L, -K, and -R. [rGf16c535eee]
* gpgconf: Tweak the use of the ldapserver option. [T5801]
* gpgconf: Make "--launch gpg-agent" work again. [rG5a7ed6dd8f]
* gpg: Accept Ed25519 private keys in modernized encoding. [T5120]
* gpg: Fix adding the list of ultimate trusted keys. [T5742]
* gpgsm: New option --ignore-cert-with-oid. [rGbcf446b70c]
* dirmngr: Avoid initial delay on the first keyserver access in presence of --no-use-tor. [rGdde88897e2]
* scdaemon: Also prefer Yubikeys if no reader port is given. [rG38c666ec3f]
* agent: Make missing strings translatable and update German and Japanese translations. [T4777]
* ssh: Fix adding an ed25519 key with a zero length comment. [T5794]
* gpgtar: Create and handle extended headers to support long file names. [T5754]
* Fix the creation of socket directories under Windows for non-ascii account names. [rG7d1215cb9c]
* Improve the registry HKCU->HKLM fallback. [rG96db487a4d]
* Prettify the --help output of most commands.
Release-info: https://dev.gnupg.org/T5703
461名無しさん@お腹いっぱい。
2022/02/12(土) 11:16:26.59 お前ら和歌山県出身の下村拓郎様(35歳独身、元自衛隊)をご存知か、この方は将来素晴しい人物になるから覚えておいて損はないぞ
462名無しさん@お腹いっぱい。
2022/02/22(火) 15:21:16.55 762oの幅のあすなろう鉄道
463名無しさん@お腹いっぱい。
2022/03/27(日) 21:01:20.14 2.3.3にしたんだけど、日本語なのは最初だけで二回目の操作から英語になってしまう
コマンドプロンプトで表示される言語が英語になるみたいでdirとかの操作でも表示が英語になる
一旦exitで閉じて再度起動すれば一度だけ日本語になるんだけど、ずっと日本語のままの表示にするにはどうしたらいいの?
コマンドプロンプトで表示される言語が英語になるみたいでdirとかの操作でも表示が英語になる
一旦exitで閉じて再度起動すれば一度だけ日本語になるんだけど、ずっと日本語のままの表示にするにはどうしたらいいの?
464463
2022/03/29(火) 01:05:56.99 英語になる問題はgpgを使うとコマンドプロンプトのchcpが65001に勝手に設定されるからだ
chcpを932に設定すればいいけど日本語に配慮したバージョンおなしゃす
もしくはUTFでも日本語表示にマイクロソフトがして
chcpを932に設定すればいいけど日本語に配慮したバージョンおなしゃす
もしくはUTFでも日本語表示にマイクロソフトがして
2022/03/29(火) 14:44:39.98
chcp 65001した後にコマンドプロンプトの左上をクリックしてUTF8でも日本語を表示できるフォントを選べば日本語表示できたような気がする。
でもcode pageが931になっている前提で日本語を表示するプログラムを実行すると文字化けするかも。
でもcode pageが931になっている前提で日本語を表示するプログラムを実行すると文字化けするかも。
466名無しさん@お腹いっぱい。
2022/03/30(水) 13:31:03.20 >>465
すべてのフォントを試しても無理だった
WindowsにはLinuxでいう所の「LANG=ja_JP.UTF8」が無いとの事
https://answers.microsoft.com/ja-jp/windows/forum/all/%E3%82%B3%E3%83%9E%E3%83%B3%E3%83%89%E3%83%97/9d529901-b9c1-4cd6-8293-90473fac23c8
GPG側がShift_JISに配慮は難しそうだから、可能性があるのはWindowsかな
遅かったにしてもUTFに対応したし、日本語対応のOSは作ってるし
すべてのフォントを試しても無理だった
WindowsにはLinuxでいう所の「LANG=ja_JP.UTF8」が無いとの事
https://answers.microsoft.com/ja-jp/windows/forum/all/%E3%82%B3%E3%83%9E%E3%83%B3%E3%83%89%E3%83%97/9d529901-b9c1-4cd6-8293-90473fac23c8
GPG側がShift_JISに配慮は難しそうだから、可能性があるのはWindowsかな
遅かったにしてもUTFに対応したし、日本語対応のOSは作ってるし
2022/04/22(金) 10:00:24.99
GnuPG 2.3.5
Noteworthy changes in version 2.3.5 (2022-04-21)
================================================
* gpg: Up to five times faster verification of detached signatures. Doubled detached signing speed. [T5826,rG4e27b9defc,rGf8943ce098]
* gpg: Threefold decryption speedup for large files. [T5820,rGab177eed51]
* gpg: Nearly double the AES256.OCB encryption speed. [rG99e2c178c7]
* gpg: Removed EAX from the preference list. [rG253fcb9777]
* gpg: Allow --dearmor to decode all kinds of armor files. [rG34ea19aff9]
* gpg: Remove restrictions for the name part of a user-id. [rG8945f1aedf]
* gpg: Allow decryption of symmetric encrypted data even for non-compliant cipher. [rG8631d4cfe2]
* gpg,gpgsm: New option --require-compliance. [rGee013c5350]
* gpgsm: New option --ignore-cert-with-oid. [rGe23dc755fa]
* gpgtar: Create and handle extended headers to support long file names. [T5754]
* gpgtar: Support file names longer than MAX_PATH on Windows. [rG70b738f93f]
* gpgtar: Use a pipe for decryption and thus avoid memory exhaustion. [rGe5ef5e3b91]
* gpgtar: New option --with-log. [rGed53d41b4c]
* agent: New flag "qual" for the trustlist.txt. [rG7c8c606061]
* scdaemon: Add support for GeNUA cards. [rG0dcc249852]
* scdaemon: Add --challenge-response option to PK_AUTH for OpenPGP cards. [T5862]
* dirmngr: Support the use of ECDSA for CRLs and OCSP. [rGde87c8e1ea,rG890e9849b5]
* dirmngr: Map all gnupg.net addresses to the Ubuntu keyserver. [T5751]
* ssh: Return a faked response for the new session-bind extension. [T5931]
* gpgconf: Add command aliases -L -K -R. [rGec4a1cffb8]
* gpg: Request keygrip of key to add via command interface. [T5771]
* gpg: Print Yubikey version correctly. [T5787]
* gpg: Always use version >= 4 to generate key signature. [T5809]
* gpg: Fix generating AEAD packet. [T5853]
Noteworthy changes in version 2.3.5 (2022-04-21)
================================================
* gpg: Up to five times faster verification of detached signatures. Doubled detached signing speed. [T5826,rG4e27b9defc,rGf8943ce098]
* gpg: Threefold decryption speedup for large files. [T5820,rGab177eed51]
* gpg: Nearly double the AES256.OCB encryption speed. [rG99e2c178c7]
* gpg: Removed EAX from the preference list. [rG253fcb9777]
* gpg: Allow --dearmor to decode all kinds of armor files. [rG34ea19aff9]
* gpg: Remove restrictions for the name part of a user-id. [rG8945f1aedf]
* gpg: Allow decryption of symmetric encrypted data even for non-compliant cipher. [rG8631d4cfe2]
* gpg,gpgsm: New option --require-compliance. [rGee013c5350]
* gpgsm: New option --ignore-cert-with-oid. [rGe23dc755fa]
* gpgtar: Create and handle extended headers to support long file names. [T5754]
* gpgtar: Support file names longer than MAX_PATH on Windows. [rG70b738f93f]
* gpgtar: Use a pipe for decryption and thus avoid memory exhaustion. [rGe5ef5e3b91]
* gpgtar: New option --with-log. [rGed53d41b4c]
* agent: New flag "qual" for the trustlist.txt. [rG7c8c606061]
* scdaemon: Add support for GeNUA cards. [rG0dcc249852]
* scdaemon: Add --challenge-response option to PK_AUTH for OpenPGP cards. [T5862]
* dirmngr: Support the use of ECDSA for CRLs and OCSP. [rGde87c8e1ea,rG890e9849b5]
* dirmngr: Map all gnupg.net addresses to the Ubuntu keyserver. [T5751]
* ssh: Return a faked response for the new session-bind extension. [T5931]
* gpgconf: Add command aliases -L -K -R. [rGec4a1cffb8]
* gpg: Request keygrip of key to add via command interface. [T5771]
* gpg: Print Yubikey version correctly. [T5787]
* gpg: Always use version >= 4 to generate key signature. [T5809]
* gpg: Fix generating AEAD packet. [T5853]
2022/04/22(金) 10:00:44.55
* gpg: Fix version on symmetric encrypted AEAD files if the force option is used. [T5856]
* gpg: Fix adding the list of ultimate trusted keys. [T5742]
* gpgsm: Fix parsing of certain PKCS#12 files. [T5793]
* gpgsm: Print diagnostic about CRL problems due to Tor mode. [rG137e59a6a5]
* agent: Use "Created:" field for creation time. [T5538]
* scdaemon Fix error handling for a PC/SC reader selected with reader-port. [T5758]
* scdaemon: Fix DEVINFO with no --watch. [rGc6dd9ff929]
* scdaemon: Fix socket resource leak on Windwos. [T5029]
* scdaemon: Use extended mode for pkcs#15 already for rsa2048. [rG597253ca17]
* scdaemon: Enhance PASSWD command to accept KEYGRIP optionally. [T5862]
* scdaemon: Fix memory leak in ccid-driver. [rG8ac92f0e80]
* tpm: Always use hexgrip when storing a key password. [rGaf2fbd9b01]
* dirmngr: Make WKD lookups work for resolvers not handling SRV records. [T4729]
* dirmngr: Avoid initial delay on the first keyserver access in presence of --no-use-tor. [rG57d546674d]
* dirmngr: Workaround for a certain broken LDAP URL. [rG90caa7ad59]
* dirmngr: Escape more characters in WKD requests. [T5902]
* dirmngr: Suppress error message on trial reading as PEM format. [T5531]
* gpgconf: Fix component table when not building without TPM support. [T5701]
* gpgconf: Silence warnings from parsing the option files. [T5874]
* gpgconf: Do not list ignored options and mark forced options as read-only. [rG42785d7c8a]
* gpgconf: Tweak the use of the ldapserver option. [T5801]
* ssh: Fix adding an ed25519 key with a zero length comment. [T5794]
* kbx: Fix searching for FPR20 in version 2 blob. [T5888]
* Fix early homedir creation. [T5895]
* Improve removing of stale lockfiles under Unix. [T5884]
Release-info: https://dev.gnupg.org/T5743
* gpg: Fix adding the list of ultimate trusted keys. [T5742]
* gpgsm: Fix parsing of certain PKCS#12 files. [T5793]
* gpgsm: Print diagnostic about CRL problems due to Tor mode. [rG137e59a6a5]
* agent: Use "Created:" field for creation time. [T5538]
* scdaemon Fix error handling for a PC/SC reader selected with reader-port. [T5758]
* scdaemon: Fix DEVINFO with no --watch. [rGc6dd9ff929]
* scdaemon: Fix socket resource leak on Windwos. [T5029]
* scdaemon: Use extended mode for pkcs#15 already for rsa2048. [rG597253ca17]
* scdaemon: Enhance PASSWD command to accept KEYGRIP optionally. [T5862]
* scdaemon: Fix memory leak in ccid-driver. [rG8ac92f0e80]
* tpm: Always use hexgrip when storing a key password. [rGaf2fbd9b01]
* dirmngr: Make WKD lookups work for resolvers not handling SRV records. [T4729]
* dirmngr: Avoid initial delay on the first keyserver access in presence of --no-use-tor. [rG57d546674d]
* dirmngr: Workaround for a certain broken LDAP URL. [rG90caa7ad59]
* dirmngr: Escape more characters in WKD requests. [T5902]
* dirmngr: Suppress error message on trial reading as PEM format. [T5531]
* gpgconf: Fix component table when not building without TPM support. [T5701]
* gpgconf: Silence warnings from parsing the option files. [T5874]
* gpgconf: Do not list ignored options and mark forced options as read-only. [rG42785d7c8a]
* gpgconf: Tweak the use of the ldapserver option. [T5801]
* ssh: Fix adding an ed25519 key with a zero length comment. [T5794]
* kbx: Fix searching for FPR20 in version 2 blob. [T5888]
* Fix early homedir creation. [T5895]
* Improve removing of stale lockfiles under Unix. [T5884]
Release-info: https://dev.gnupg.org/T5743
2022/04/26(火) 05:18:35.77
GnuPG 2.3.6
2.3.5でのレグレッションの修正など
Noteworthy changes in version 2.3.6
===================================
* gpg: Fix regression in 2.3.5 importing longer keys. [T5941]
* gpg: Emit an ERROR status as hint for a bad passphrase. [T5943]
* gpg: Avoid NULL-ptr access due to corrupted packets. [T5940]
* gpgsm: Improve the "Certificate not found" error message. [T5821]
* agent: Pass pattern directly to gpg-check-pattern. [rGe529c54fe3]
* scd: Fix hard-coded constant for RSA authentication key OpenPGP.3. [rG2848fe4c84]
Release-info: https://dev.gnupg.org/T5937
2.3.5でのレグレッションの修正など
Noteworthy changes in version 2.3.6
===================================
* gpg: Fix regression in 2.3.5 importing longer keys. [T5941]
* gpg: Emit an ERROR status as hint for a bad passphrase. [T5943]
* gpg: Avoid NULL-ptr access due to corrupted packets. [T5940]
* gpgsm: Improve the "Certificate not found" error message. [T5821]
* agent: Pass pattern directly to gpg-check-pattern. [rGe529c54fe3]
* scd: Fix hard-coded constant for RSA authentication key OpenPGP.3. [rG2848fe4c84]
Release-info: https://dev.gnupg.org/T5937
2022/04/27(水) 08:13:21.50
Gpg4win 4.0.2
> GnuPG 2.3.6
> Kleopatra 3.1.22
> GPA 0.10.0
> GpgOL 2.5.3
> GpgEX 1.0.9
> Kompendium (de) 4.0.1
> Compendium (en) 3.0.0
https://lists.wald.intevation.org/pipermail/gpg4win-announce/2022/000095.html
> Highlights in Gpg4win Version 4.0.2 (2022-04-25)
> -------------------------------------------
> * GnuPG: Major performance improvements for encryption, verification and signing. Most noticeable when GnuPG is used directly on the command line.
> * Kleopatra: Besides accessibility improvements there are many new features regarding revocation. It is now possible to change the primary User ID.
> * GpgOL: Bug fixes for improved stability. One random crash after decryption / verification has been fixed.
なお、4.0.1はリリースされていない
> GnuPG 2.3.6
> Kleopatra 3.1.22
> GPA 0.10.0
> GpgOL 2.5.3
> GpgEX 1.0.9
> Kompendium (de) 4.0.1
> Compendium (en) 3.0.0
https://lists.wald.intevation.org/pipermail/gpg4win-announce/2022/000095.html
> Highlights in Gpg4win Version 4.0.2 (2022-04-25)
> -------------------------------------------
> * GnuPG: Major performance improvements for encryption, verification and signing. Most noticeable when GnuPG is used directly on the command line.
> * Kleopatra: Besides accessibility improvements there are many new features regarding revocation. It is now possible to change the primary User ID.
> * GpgOL: Bug fixes for improved stability. One random crash after decryption / verification has been fixed.
なお、4.0.1はリリースされていない
2022/04/27(水) 08:15:19.71
あれ?Gpg4win 4.0.2インストーラーのsigファイルが404 Not Foundになる…
2022/07/07(木) 08:39:46.47
GnuPG 2.2.36
Noteworthy changes in version 2.2.36 (2022-07-06)
-------------------------------------------------
* g10: Fix possibly garbled status messages in NOTATION_DATA. This bug could trick GPGME and other parsers to accept faked status lines. [T6027, CVE-2022-34903]
* gpg: Handle leading zeroes in Ed25519 private keys and reverse change regarding Ed25519 SOS encoding as introduced with 2.2.34. [T5120]
* gpg: Allow Unicode file names for iobuf_cancel under Windows.
* gpgsm: Improve pkcs#12 import. [T6037,T5793,T4921,T4757]
* scd,p15: Fix reading certificates w/o length info.
* scd,p15: Improve the displayed S/N for Technology Nexus cards.
* scd,openpgp: Add workaround for ECC attribute on Yubikey. [T5963]
* scd: Fix use of SCardListReaders for PC/SC. [T5979]
* gpgconf: New short options -X and -V.
* Make sure to always set CONFIDENTIAL flag in Assuan. [T5977]
2.3系列も近日中にアップデートが行われる予定
Noteworthy changes in version 2.2.36 (2022-07-06)
-------------------------------------------------
* g10: Fix possibly garbled status messages in NOTATION_DATA. This bug could trick GPGME and other parsers to accept faked status lines. [T6027, CVE-2022-34903]
* gpg: Handle leading zeroes in Ed25519 private keys and reverse change regarding Ed25519 SOS encoding as introduced with 2.2.34. [T5120]
* gpg: Allow Unicode file names for iobuf_cancel under Windows.
* gpgsm: Improve pkcs#12 import. [T6037,T5793,T4921,T4757]
* scd,p15: Fix reading certificates w/o length info.
* scd,p15: Improve the displayed S/N for Technology Nexus cards.
* scd,openpgp: Add workaround for ECC attribute on Yubikey. [T5963]
* scd: Fix use of SCardListReaders for PC/SC. [T5979]
* gpgconf: New short options -X and -V.
* Make sure to always set CONFIDENTIAL flag in Assuan. [T5977]
2.3系列も近日中にアップデートが行われる予定
2022/07/11(月) 23:14:13.10
GnuPG 2.3.7
Noteworthy changes in version 2.3.7 (2022-07-11)
------------------------------------------------
* gpg: Fix possibly garbled status messages in NOTATION_DATA. This bug could trick GPGME and other parsers to accept faked status lines. [T6027, CVE-2022-34903]
* gpg: Look up user ID to revoke by UID hash. [T5936]
* gpg: Setup the 'usage' filter property for export. [rG7aabd94b81]
* gpg,w32: Allow Unicode filenames for iobuf_cancel. [rG4ee2009083]
* gpg: Fix reading AEAD preference. [T6019]
* gpgsm: New option --compatibility-flags. [rGf0b373cec9]
* gpgsm: Rework the PKCS#12 parser to support DFN issued keys. [T6037]
* agent: New option --no-user-trustlist and --sys-trustlist-name. [T5990]
* agent: Pop up dialog window for confirmation, when specified so. [T5099]
* agent: Show "Label:" field of private key when prompt the insertion. [T5986]
* agent: Handle USAGE information in KEYINFO. [rG295a6a7591]
* agent,ssh: Make not-inserted OpenPGP.3 keys available for SSH. [T5996]
* agent,ssh: Support "Use-for-ssh" flag in private key. [T5985]
* agent: New field "Prompt" to prevent asking card key insertion. [T5987]
* agent: Support --format=ssh option for READKEY. [T6012]
* agent: Add KEYATTR command. [T5988]
* agent: Flush before calling ftruncate. [T6035]
* agent: Do not consider --min-passphrase-len for the magic wand. [rGae2f1f0785]
* kbx: Fix a race condition which results no status report. [T5948]
* scd:openpgp: Fix a segv for cards supporting unknown curves. [T5963]
* scd:p15: Fix reading certificates without length info.
* scd:p15: Improve the displayed S/N for Technology Nexus cards.
* scd:openpgp: Add workaround for ECC attribute on Yubikey. [T5963]
* scd,piv: Fix status report of KEYPAIRINFO. [rG64c8786105]
* scd:nks: Support the Telesec ESIGN application. [T5219, T4938]
* scd: Fix use of SCardListReaders for PC/SC. [T5979]
* scd: Support automatic card selection for READCERT with keygrip. [T6003]
* scd: Support specifying keygrip for learn command. [T6002]
* dirmngr: Fix for Windows when build against GNUTLS. [T5899]
* gpg-connect-agent: Add --unbuffered option.
* gpg-connect-agent: Add a way to cancel an INQUIRE. [T6010]
* gpgconf: New short options -V and -X
Noteworthy changes in version 2.3.7 (2022-07-11)
------------------------------------------------
* gpg: Fix possibly garbled status messages in NOTATION_DATA. This bug could trick GPGME and other parsers to accept faked status lines. [T6027, CVE-2022-34903]
* gpg: Look up user ID to revoke by UID hash. [T5936]
* gpg: Setup the 'usage' filter property for export. [rG7aabd94b81]
* gpg,w32: Allow Unicode filenames for iobuf_cancel. [rG4ee2009083]
* gpg: Fix reading AEAD preference. [T6019]
* gpgsm: New option --compatibility-flags. [rGf0b373cec9]
* gpgsm: Rework the PKCS#12 parser to support DFN issued keys. [T6037]
* agent: New option --no-user-trustlist and --sys-trustlist-name. [T5990]
* agent: Pop up dialog window for confirmation, when specified so. [T5099]
* agent: Show "Label:" field of private key when prompt the insertion. [T5986]
* agent: Handle USAGE information in KEYINFO. [rG295a6a7591]
* agent,ssh: Make not-inserted OpenPGP.3 keys available for SSH. [T5996]
* agent,ssh: Support "Use-for-ssh" flag in private key. [T5985]
* agent: New field "Prompt" to prevent asking card key insertion. [T5987]
* agent: Support --format=ssh option for READKEY. [T6012]
* agent: Add KEYATTR command. [T5988]
* agent: Flush before calling ftruncate. [T6035]
* agent: Do not consider --min-passphrase-len for the magic wand. [rGae2f1f0785]
* kbx: Fix a race condition which results no status report. [T5948]
* scd:openpgp: Fix a segv for cards supporting unknown curves. [T5963]
* scd:p15: Fix reading certificates without length info.
* scd:p15: Improve the displayed S/N for Technology Nexus cards.
* scd:openpgp: Add workaround for ECC attribute on Yubikey. [T5963]
* scd,piv: Fix status report of KEYPAIRINFO. [rG64c8786105]
* scd:nks: Support the Telesec ESIGN application. [T5219, T4938]
* scd: Fix use of SCardListReaders for PC/SC. [T5979]
* scd: Support automatic card selection for READCERT with keygrip. [T6003]
* scd: Support specifying keygrip for learn command. [T6002]
* dirmngr: Fix for Windows when build against GNUTLS. [T5899]
* gpg-connect-agent: Add --unbuffered option.
* gpg-connect-agent: Add a way to cancel an INQUIRE. [T6010]
* gpgconf: New short options -V and -X
2022/07/13(水) 04:42:40.45
Gpg4win 4.0.3
Highlights in Gpg4win Version 4.0.3 (2022-07-12)
-------------------------------------------
* GnuPG: Security update to 2.3.7 to fix CVE-2022-34903.
Highlights in Gpg4win Version 4.0.3 (2022-07-12)
-------------------------------------------
* GnuPG: Security update to 2.3.7 to fix CVE-2022-34903.
2022/08/21(日) 05:55:35.84
なんか変 > gpgme 1.18.0
2022/09/09(金) 01:53:54.45
GnuPG 2.2.37
Noteworthy changes in version 2.2.37 (2022-08-24)
* gpg: In de-vs mode use SHA-256 instead of SHA-1 as implicit preference. [T6043]
* gpg: Actually show symmetric+pubkey encrypted data as de-vs compliant. Add extra compliance checks for symkey_enc packets. [T6119]
* gpg: Request keygrip of key to be added via command-fd interface. [T5771]
* gpg: Look up user ID to revoke by UID hash. [T5936]
* gpg: Fix wrong error message for "keytocard". [T6122]
* gpg: --card-status shows the application type for non-openpgp cards again. [rG8e393e2592]
* gpg: The options --auto-key-import and --include-key-block are again listed by gpgconf. [T6138]
* gpgsm: New option --compatibility-flags. [rG77b6896f7a]
* agent: New options --no-user-trustlist and --sys-trustlist-name. [T5990]
* agent: Track and update the Display-S/N of cards so that the "please insert card" prompt may now show more information. Use "gpg --card-status" to update stored card meta data. [T6135]
* scd:openpgp: Fix problem with ECC algorithm attributes on Yubikeys. [rG225c66f13b87]
* scd:openpgp: Fix problem with Yubikey 5.4 firmware. [T6070]
* dirmngr: Ask keyservers to provide the key fingerprints. [T5741]
* ssh: Allow authentication as used by OpenSSH's PQ crypto support. [T5935]
* wkd: Fix path traversal attack in gpg-wks-server. Add the mail address to the pending request data. [rGc1489ca0e1, T6098]
* gpgconf: Improve registry dumping. [rG6bc9592318]
* Silence warnings from AllowSetForegroundWindow. [rG6583abedf3]
Noteworthy changes in version 2.2.37 (2022-08-24)
* gpg: In de-vs mode use SHA-256 instead of SHA-1 as implicit preference. [T6043]
* gpg: Actually show symmetric+pubkey encrypted data as de-vs compliant. Add extra compliance checks for symkey_enc packets. [T6119]
* gpg: Request keygrip of key to be added via command-fd interface. [T5771]
* gpg: Look up user ID to revoke by UID hash. [T5936]
* gpg: Fix wrong error message for "keytocard". [T6122]
* gpg: --card-status shows the application type for non-openpgp cards again. [rG8e393e2592]
* gpg: The options --auto-key-import and --include-key-block are again listed by gpgconf. [T6138]
* gpgsm: New option --compatibility-flags. [rG77b6896f7a]
* agent: New options --no-user-trustlist and --sys-trustlist-name. [T5990]
* agent: Track and update the Display-S/N of cards so that the "please insert card" prompt may now show more information. Use "gpg --card-status" to update stored card meta data. [T6135]
* scd:openpgp: Fix problem with ECC algorithm attributes on Yubikeys. [rG225c66f13b87]
* scd:openpgp: Fix problem with Yubikey 5.4 firmware. [T6070]
* dirmngr: Ask keyservers to provide the key fingerprints. [T5741]
* ssh: Allow authentication as used by OpenSSH's PQ crypto support. [T5935]
* wkd: Fix path traversal attack in gpg-wks-server. Add the mail address to the pending request data. [rGc1489ca0e1, T6098]
* gpgconf: Improve registry dumping. [rG6bc9592318]
* Silence warnings from AllowSetForegroundWindow. [rG6583abedf3]
2022/09/09(金) 01:54:39.07
GnuPG 2.2.38
Noteworthy changes in version 2.2.38 (2022-09-01)
* gpg: Fix an encoding problem under Windows in the printed timezone. [T5073]
* gpg: Make --require-compliance work for sign+encrypt. [T6174]
* gpg: Emit a FAILURE status for --require-compliance errors. [rGe05fb5ca37]
* dirmngr: Avoid caching expired certificates. [T6142]
Noteworthy changes in version 2.2.38 (2022-09-01)
* gpg: Fix an encoding problem under Windows in the printed timezone. [T5073]
* gpg: Make --require-compliance work for sign+encrypt. [T6174]
* gpg: Emit a FAILURE status for --require-compliance errors. [rGe05fb5ca37]
* dirmngr: Avoid caching expired certificates. [T6142]
2022/09/09(金) 01:55:11.37
GnuPG 2.2.39
Noteworthy changes in version 2.2.39 (2022-09-02)
* agent: Fix regression in 2.2.37 related to non-extended format private keys. [T6176]
Noteworthy changes in version 2.2.39 (2022-09-02)
* agent: Fix regression in 2.2.37 related to non-extended format private keys. [T6176]
479名無しさん@お腹いっぱい。
2022/10/16(日) 19:23:48.43 gpgの2.3以上ってYubikey動かないバグあるのか?
gpgアップデートしたらYubikey認識しなくなったんやが
gpgアップデートしたらYubikey認識しなくなったんやが
2022/10/17(月) 21:57:19.12
セキュリティアップデート
共有ライブラリであるLibksbaに脆弱性
影響があるのは
- Libksba 1.6.1 以前を利用するほとんどのソフトウェア
- Gpg4win 2.0.0 から 4.0.3
- GnuPG VS-Desktop 3.1.16 から 3.1.24
- GnuPG installers for Windows 2.3.0 から 2.3.7
- GnuPG LTS installers for Windows 2.1.0 から 2.2.39
対処法
Linux, Unix, macOS:Libksbaを1.6.2に更新
Windows
- Gpgwin 4.0.4 以降に更新
- GnuPG VS-Desktop 3.1.25 以降に更新
- GnuPG installer for Windows 2.3.8 に更新
- GnuPG LTS installer for Windows 2.2.40 に更新
共有ライブラリであるLibksbaに脆弱性
影響があるのは
- Libksba 1.6.1 以前を利用するほとんどのソフトウェア
- Gpg4win 2.0.0 から 4.0.3
- GnuPG VS-Desktop 3.1.16 から 3.1.24
- GnuPG installers for Windows 2.3.0 から 2.3.7
- GnuPG LTS installers for Windows 2.1.0 から 2.2.39
対処法
Linux, Unix, macOS:Libksbaを1.6.2に更新
Windows
- Gpgwin 4.0.4 以降に更新
- GnuPG VS-Desktop 3.1.25 以降に更新
- GnuPG installer for Windows 2.3.8 に更新
- GnuPG LTS installer for Windows 2.2.40 に更新
481名無しさん@お腹いっぱい。
2022/11/26(土) 18:52:37.122022/12/20(火) 20:24:24.09
GnuPG 2.4.0
祝25周年!
Noteworthy changes in version 2.4.0
===================================
* The key database daemon is now a fully supported feature. Keys are stored in a SQLite database to make key lookups much faster. Enable it by adding "use-keyboxd" o common.conf. See also the README file.
* gpg: New command --quick-update-pref. [rGd40d23b233]
* gpg: New list-options show-pref and show-pref-verbose. [rG811cfa34cb]
* gpg: New option --list-filter to restrict key listings like gpg -k --list-filter 'select=revoked-f && sub/algostr=ed25519' [rG1324dc3490]
* gpg: New --export-filter export-revocs. [rGc985b52e71]
* gpg: Also import stray revocation certificates. [rG7aaedfb107]
* gpg: Add a notation to encryption subkeys in de-vs mode. [T6279]
* gpg: Improve signature verification speed by a factor of more than four. Double detached signing speed. [T5826]
* gpg: Allow only OCB for AEAD encryption. [rG5a2cef801d]
* gpg: Fix trusted introducer for mbox only user-ids. [T6238]
* gpg: Report an error via status-fd for receiving a key from the agent. [T5151]
* gpg: Make --require-compliance work without the --status-fd option. [rG2aacd843ad]
* gpg: Fix verification of cleartext signatures with overlong lines. [T6272]
* agent: Fix import of protected OpenPGP v5 keys. [T6294]
* gpgsm: Change the default cipher algorithm from AES128 to AES256. Also announce support for this in signatures. [rG2d8ac55d26]
* gpgsm: Always use the chain validation model if the root-CA requests this. [rG7fa1d3cc82]
* gpgsm: Print OCSP revocation date and reason in cert listings. [rGb6abaed2b5]
* agent: Support Win32-OpenSSH emulation by gpg-agent. [T3883]
* scd: Support the Telesec Signature Card v2.0. [T6252]
* scd: Redact --debug cardio output of a VERIFY APDU. [T5085]
* scd: Skip deleted pkcs#15 records in CARDOS 5. [rG061efac03f]
* dirmngr: Fix build with no LDAP support. [T6239]
* dirmngr: Fix verification of ECDSA signed CRLs. [rG868dabb402]
* wkd: New option --add-revocs for gpg-wks-client. [rGc3f9f2d497]
* wkd: Ignore expired user-ids in gpg-wks-client. [T6292]
* card: New commands "gpg" and "gpgsm". [rG9c4691c73e]
Release-info: https://dev.gnupg.org/T6303
祝25周年!
Noteworthy changes in version 2.4.0
===================================
* The key database daemon is now a fully supported feature. Keys are stored in a SQLite database to make key lookups much faster. Enable it by adding "use-keyboxd" o common.conf. See also the README file.
* gpg: New command --quick-update-pref. [rGd40d23b233]
* gpg: New list-options show-pref and show-pref-verbose. [rG811cfa34cb]
* gpg: New option --list-filter to restrict key listings like gpg -k --list-filter 'select=revoked-f && sub/algostr=ed25519' [rG1324dc3490]
* gpg: New --export-filter export-revocs. [rGc985b52e71]
* gpg: Also import stray revocation certificates. [rG7aaedfb107]
* gpg: Add a notation to encryption subkeys in de-vs mode. [T6279]
* gpg: Improve signature verification speed by a factor of more than four. Double detached signing speed. [T5826]
* gpg: Allow only OCB for AEAD encryption. [rG5a2cef801d]
* gpg: Fix trusted introducer for mbox only user-ids. [T6238]
* gpg: Report an error via status-fd for receiving a key from the agent. [T5151]
* gpg: Make --require-compliance work without the --status-fd option. [rG2aacd843ad]
* gpg: Fix verification of cleartext signatures with overlong lines. [T6272]
* agent: Fix import of protected OpenPGP v5 keys. [T6294]
* gpgsm: Change the default cipher algorithm from AES128 to AES256. Also announce support for this in signatures. [rG2d8ac55d26]
* gpgsm: Always use the chain validation model if the root-CA requests this. [rG7fa1d3cc82]
* gpgsm: Print OCSP revocation date and reason in cert listings. [rGb6abaed2b5]
* agent: Support Win32-OpenSSH emulation by gpg-agent. [T3883]
* scd: Support the Telesec Signature Card v2.0. [T6252]
* scd: Redact --debug cardio output of a VERIFY APDU. [T5085]
* scd: Skip deleted pkcs#15 records in CARDOS 5. [rG061efac03f]
* dirmngr: Fix build with no LDAP support. [T6239]
* dirmngr: Fix verification of ECDSA signed CRLs. [rG868dabb402]
* wkd: New option --add-revocs for gpg-wks-client. [rGc3f9f2d497]
* wkd: Ignore expired user-ids in gpg-wks-client. [T6292]
* card: New commands "gpg" and "gpgsm". [rG9c4691c73e]
Release-info: https://dev.gnupg.org/T6303
2022/12/20(火) 20:25:57.15
Gpg4win 4.1.0
Version 4.1.0 released 2022-12-20
GPA: So long, and thanks for all the fish. To reduce maintenance and overall quality of Gpg4win we have decided to retire GPA. Over the last decade Kleopatra has made large improvements in quality and is very well maintained and the focus of our development. [rW3f7ed3834f]
GnuPG: Improve signature verification speed by a factor of more than four. Double detached signing speed. [T5826]
GnuPG: Import stray revocation certificates to improve WKD usability.
GnuPG: New option --add-revocs for gpg-wks-client. [rG2f4492f3be]
GnuPG: Ignore expired user-ids in gpg-wks-client. [T6292]
GnuPG: Support the Telesec Signature Card v2.0 in OpenPGP. [T6252]
GnuPG: For the new AEAD Format we now only allow the fast OCB mode. The EAX mode may still be used for decryption. [rG5a2cef801d]
Kleopatra: Support the import of non-standard conforming UTF-16 encoded text files with certificates. [T6298]
Kleopatra: New Option to delete the locally stored secret key after a transfer to a smart card. [T5836]
Kleopatra: Improve the display of keys in the group edit dialog. [T6295]
Kleopatra: Simplify changing the owner trust of keys. [T6148]
Kleopatra: Allow selecting ECC with supported curves when generating new keys for smart cards. [T4429]
GnuPG: Update the X.509/CMS library Libksba to version 1.6.3 to fix a security problem in the CRL signature parser. [T6230]
GnuPG: Fix trusted introducer for mbox only user-ids. [T6238]
GpgOL: IMAP access to encrypted mails works again. [T6203]
Kleopatra: Don't report success if the key signing job was canceled. [T6305]
Kleopatra: Report failed imports immediately when receiving the result. [T6302]
Kleopatra: Do not offer invalid S/MIME certificates for signing or encryption. [T6216]
Kleopatra: Don't ask user to certify an imported expired or revoked OpenPGP key. [T6155]
Kleopatra: Do not crash when closing details widget while certificate dump is shown. [T6180]
Kleopatra: Improve usability and accessibility of the notepad operations. [T6188]
GnuPG: 2.4.0
Kleopatra: 3.1.26
GpgOL: 2.5.6
GpgEX: 1.0.9
Kompendium DE: 4.0.1
Compendium EN: 3.0.0
Version 4.1.0 released 2022-12-20
GPA: So long, and thanks for all the fish. To reduce maintenance and overall quality of Gpg4win we have decided to retire GPA. Over the last decade Kleopatra has made large improvements in quality and is very well maintained and the focus of our development. [rW3f7ed3834f]
GnuPG: Improve signature verification speed by a factor of more than four. Double detached signing speed. [T5826]
GnuPG: Import stray revocation certificates to improve WKD usability.
GnuPG: New option --add-revocs for gpg-wks-client. [rG2f4492f3be]
GnuPG: Ignore expired user-ids in gpg-wks-client. [T6292]
GnuPG: Support the Telesec Signature Card v2.0 in OpenPGP. [T6252]
GnuPG: For the new AEAD Format we now only allow the fast OCB mode. The EAX mode may still be used for decryption. [rG5a2cef801d]
Kleopatra: Support the import of non-standard conforming UTF-16 encoded text files with certificates. [T6298]
Kleopatra: New Option to delete the locally stored secret key after a transfer to a smart card. [T5836]
Kleopatra: Improve the display of keys in the group edit dialog. [T6295]
Kleopatra: Simplify changing the owner trust of keys. [T6148]
Kleopatra: Allow selecting ECC with supported curves when generating new keys for smart cards. [T4429]
GnuPG: Update the X.509/CMS library Libksba to version 1.6.3 to fix a security problem in the CRL signature parser. [T6230]
GnuPG: Fix trusted introducer for mbox only user-ids. [T6238]
GpgOL: IMAP access to encrypted mails works again. [T6203]
Kleopatra: Don't report success if the key signing job was canceled. [T6305]
Kleopatra: Report failed imports immediately when receiving the result. [T6302]
Kleopatra: Do not offer invalid S/MIME certificates for signing or encryption. [T6216]
Kleopatra: Don't ask user to certify an imported expired or revoked OpenPGP key. [T6155]
Kleopatra: Do not crash when closing details widget while certificate dump is shown. [T6180]
Kleopatra: Improve usability and accessibility of the notepad operations. [T6188]
GnuPG: 2.4.0
Kleopatra: 3.1.26
GpgOL: 2.5.6
GpgEX: 1.0.9
Kompendium DE: 4.0.1
Compendium EN: 3.0.0
2022/12/20(火) 20:33:52.34
GnuPG 2.2系も2.2.41がリリースされてる
2022/12/20(火) 20:46:37.27
** Key database daemon
Since version 2.3.0 it is possible to store the keys in an SQLite
database instead of the keyring.kbx file. This is in particular
useful for large keyrings or if many instances of gpg and gpgsm may
run concurrently. This is implemented using another daemon process,
the "keyboxd". To enable the use of the keyboxd put the option
"use-keyboxd" into the configuration file ~/.gnupg/common.conf or the
global /etc/gnupg/common.conf. See also doc/examples/common.conf.
Only public keys and X.509 certificates are managed by the keyboxd;
private keys are still stored as separate files.
Note that there is no automatic migration; if the use-keyboxd option
is enabled keys are not taken from pubring.kbx. To migrate existing
keys to the keyboxd do this:
1. Disable the keyboxd (remove use-keyboxd from common.conf)
2. Export all public keys
gpg --export --export-options backup > allkeys.gpg
gpgsm --export --armor > allcerts.gpg
3. Enable the keyboxd (add use-keyboxd to common.conf)
4. Import all public keys
gpg --import --import-options restore < allkeys.gpg
gpgsm --import < allcerts.crt
Since version 2.3.0 it is possible to store the keys in an SQLite
database instead of the keyring.kbx file. This is in particular
useful for large keyrings or if many instances of gpg and gpgsm may
run concurrently. This is implemented using another daemon process,
the "keyboxd". To enable the use of the keyboxd put the option
"use-keyboxd" into the configuration file ~/.gnupg/common.conf or the
global /etc/gnupg/common.conf. See also doc/examples/common.conf.
Only public keys and X.509 certificates are managed by the keyboxd;
private keys are still stored as separate files.
Note that there is no automatic migration; if the use-keyboxd option
is enabled keys are not taken from pubring.kbx. To migrate existing
keys to the keyboxd do this:
1. Disable the keyboxd (remove use-keyboxd from common.conf)
2. Export all public keys
gpg --export --export-options backup > allkeys.gpg
gpgsm --export --armor > allcerts.gpg
3. Enable the keyboxd (add use-keyboxd to common.conf)
4. Import all public keys
gpg --import --import-options restore < allkeys.gpg
gpgsm --import < allcerts.crt
2022/12/20(火) 21:09:53.16
公開鍵リングのSQLiteへの移行手順(自動では移行されない)
秘密鍵は今まで通り
1. 今の公開鍵リングをバックアップ
gpg --export --export-options backup > allkeys.gpg
gpgsm --export --armor > allcerts.gpg
2. coommon.conf(gpg.confではない)に"use-keyboxd"を追加
3. 1でバックアップした鍵リングをインポート
gpg --import --import-options restore < allkeys.gpg
gpgsm --import < allcerts.crt
秘密鍵は今まで通り
1. 今の公開鍵リングをバックアップ
gpg --export --export-options backup > allkeys.gpg
gpgsm --export --armor > allcerts.gpg
2. coommon.conf(gpg.confではない)に"use-keyboxd"を追加
3. 1でバックアップした鍵リングをインポート
gpg --import --import-options restore < allkeys.gpg
gpgsm --import < allcerts.crt
2022/12/20(火) 22:10:34.68
そういえば1.4の方は開発中止?
2022/12/20(火) 22:31:17.86
>>487
EOLは設定されてないけど、致命的な脆弱性が発見されない限りは放置継続かと
EOLは設定されてないけど、致命的な脆弱性が発見されない限りは放置継続かと
2022/12/20(火) 22:33:42.75
2022/12/22(木) 12:14:46.68
Windowsだが、sqlite方式(pubring.db)への移行がうまくいかない
インポート中にinput/outputエラーが起きて数百ある公開鍵の半分もインポートできず終了する
当分は従来方式(pubring.kbx)のままでいいか
インポート中にinput/outputエラーが起きて数百ある公開鍵の半分もインポートできず終了する
当分は従来方式(pubring.kbx)のままでいいか
2023/04/29(土) 10:41:34.09
GnuPG 2.4.1
Noteworthy changes in version 2.4.1
===================================
* If the ~/.gnupg directory does not exist, the keyboxd is now automagically enabled. [rGd9e7488b17]
* gpg: New option --add-desig-revoker. [rG3d094e2bcf]
* gpg: New option --assert-signer. [rGc9e95b8dee]
* gpg: New command --quick-add-adsk and other ADSK features. [T6395, https://gnupg.org/blog/20230321-adsk.html]
* gpg: New list-option "show-unusable-sigs". Also show "[self-signature]" instead of the user-id in key signature listings. [rG103acfe9ca]
* gpg: For symmetric encryption the default S2K hash is now SHA256. [T6367]
* gpg: Detect already compressed data also when using a pipe. Also detect JPEG and PNG file formats. [T6332]
* gpg: New subcommand "openpgp" for --card-edit. [T6462]
* gpgsm: Verification of detached signatures does now strip trailing zeroes from the input if --assume-binary is used. [rG2a13f7f9dc]
* gpgsm: Non-armored detached signature are now created without using indefinite form length octets. This improves compatibility with some PDF signature verification software. [rG8996b0b655]
* gpgtar: Emit progress status lines in create mode. [T6363]
* dirmngr: The LDAP modifyTimestamp is now returned by some keyserver commands. [rG56d309133f]
* ssh: Allow specification of the order keys are presented to ssh. See the man page entry for --enable-ssh-support. [T5996, T6212]
* gpg: Make list-options "show-sig-subpackets" work again. Fixes regression in 2.4.0. [rG5a223303d7]
* gpg: Fix the keytocard command for Yubikeys. [T6378]
* gpg: Do not continue an export after a cancel for the primary key. [T6093]
* gpg: Replace the --override-compliance-check hack by a real fix. [T5655]
* gpgtar: Fix decryption with input taken from stdin. [T6355]
Release-info: https://dev.gnupg.org/T6454
Noteworthy changes in version 2.4.1
===================================
* If the ~/.gnupg directory does not exist, the keyboxd is now automagically enabled. [rGd9e7488b17]
* gpg: New option --add-desig-revoker. [rG3d094e2bcf]
* gpg: New option --assert-signer. [rGc9e95b8dee]
* gpg: New command --quick-add-adsk and other ADSK features. [T6395, https://gnupg.org/blog/20230321-adsk.html]
* gpg: New list-option "show-unusable-sigs". Also show "[self-signature]" instead of the user-id in key signature listings. [rG103acfe9ca]
* gpg: For symmetric encryption the default S2K hash is now SHA256. [T6367]
* gpg: Detect already compressed data also when using a pipe. Also detect JPEG and PNG file formats. [T6332]
* gpg: New subcommand "openpgp" for --card-edit. [T6462]
* gpgsm: Verification of detached signatures does now strip trailing zeroes from the input if --assume-binary is used. [rG2a13f7f9dc]
* gpgsm: Non-armored detached signature are now created without using indefinite form length octets. This improves compatibility with some PDF signature verification software. [rG8996b0b655]
* gpgtar: Emit progress status lines in create mode. [T6363]
* dirmngr: The LDAP modifyTimestamp is now returned by some keyserver commands. [rG56d309133f]
* ssh: Allow specification of the order keys are presented to ssh. See the man page entry for --enable-ssh-support. [T5996, T6212]
* gpg: Make list-options "show-sig-subpackets" work again. Fixes regression in 2.4.0. [rG5a223303d7]
* gpg: Fix the keytocard command for Yubikeys. [T6378]
* gpg: Do not continue an export after a cancel for the primary key. [T6093]
* gpg: Replace the --override-compliance-check hack by a real fix. [T5655]
* gpgtar: Fix decryption with input taken from stdin. [T6355]
Release-info: https://dev.gnupg.org/T6454
2023/06/04(日) 03:06:59.50
GnuPG 2.4.2
2023/06/04(日) 11:14:47.81
Noteworthy changes in version 2.4.2
===================================
* gpg: Print a warning if no more encryption subkeys are left over after changing the expiration date. [rGef2c3d50fa]
* gpg: Fix searching for the ADSK key when adding an ADSK. [T6504]
* gpgsm: Speed up key listings on Windows. [rG08ff55bd44]
* gpgsm: Reduce the number of "failed to open policy file" diagnostics. [rG68613a6a9d]
* agent: Make updating of private key files more robust and track display S/N. [T6135]
* keyboxd: Avoid longish delays on Windows when listing keys. [rG6944aefa3c]
* gpgtar: Emit extra status lines to help GPGME. [T6497]
* w32: Avoid using the VirtualStore. [T6403]
Release-info: https://dev.gnupg.org/T6506
===================================
* gpg: Print a warning if no more encryption subkeys are left over after changing the expiration date. [rGef2c3d50fa]
* gpg: Fix searching for the ADSK key when adding an ADSK. [T6504]
* gpgsm: Speed up key listings on Windows. [rG08ff55bd44]
* gpgsm: Reduce the number of "failed to open policy file" diagnostics. [rG68613a6a9d]
* agent: Make updating of private key files more robust and track display S/N. [T6135]
* keyboxd: Avoid longish delays on Windows when listing keys. [rG6944aefa3c]
* gpgtar: Emit extra status lines to help GPGME. [T6497]
* w32: Avoid using the VirtualStore. [T6403]
Release-info: https://dev.gnupg.org/T6506
2023/06/04(日) 18:06:47.42
毎回こんなの貼り付けてる奴って何なの
2023/07/05(水) 07:30:27.70
GnuPG 2.4.3
2023/07/05(水) 16:34:55.42
>>490だが、GnuPG 2.4.3で再トライしたらあっさり移行完了
2023/07/09(日) 10:39:41.94
2023/07/09(日) 11:11:29.18
いらん
自分でサイトに行け
自分でサイトに行け
2023/07/09(日) 13:33:02.55
必要ならリンクだけ貼れば
今回は無かったのか?
今回は無かったのか?
2023/07/11(火) 12:18:29.97
Noteworthy changes in version 2.4.3
===================================
* gpg: Set default expiration date to 3 years. [T2701]
* gpg: Add --list-filter properties "key_expires" and "key_expires_d". [T6529]
* gpg: Emit status line and proper diagnostics for write errors. [T6528]
* gpg: Make progress work for large files on Windows. [T6534]
* gpg: New option --no-compress as alias for -z0.
* gpgsm: Print PROGRESS status lines. Add new --input-size-hint. [T6534]
* gpgsm: Support SENDCERT_SKI for --call-dirmngr. [rG701a8b30f0]
* gpgsm: Major rewrite of the PKCS#12 parser. [T6536]
* gpgtar: New option --no-compress.
* dirmngr: Extend the AD_QUERY command. [rG207c99567c]
* dirmngr: Disable the HTTP redirect rewriting. [T6477]
* dirmngr: New option --compatibility-flags. [rGbf04b07327]
* dirmngr: New option --ignore-crl-extensions. [T6545]
* wkd: Use export-clean for gpg-wks-client's --mirror and --create commands. [rG2c7f7a5a27]
* wkd: Make --add-revocs the default in gpg-wks-client. New option --no-add-revocs. [rG10c937ee68]
* scd: Make signing work for Nexus cards. [rGb83d86b988]
* scd: Fix authentication with Administration Key for PIV. [rG25b59cf6ce]
Release-info: https://dev.gnupg.org/T6509
===================================
* gpg: Set default expiration date to 3 years. [T2701]
* gpg: Add --list-filter properties "key_expires" and "key_expires_d". [T6529]
* gpg: Emit status line and proper diagnostics for write errors. [T6528]
* gpg: Make progress work for large files on Windows. [T6534]
* gpg: New option --no-compress as alias for -z0.
* gpgsm: Print PROGRESS status lines. Add new --input-size-hint. [T6534]
* gpgsm: Support SENDCERT_SKI for --call-dirmngr. [rG701a8b30f0]
* gpgsm: Major rewrite of the PKCS#12 parser. [T6536]
* gpgtar: New option --no-compress.
* dirmngr: Extend the AD_QUERY command. [rG207c99567c]
* dirmngr: Disable the HTTP redirect rewriting. [T6477]
* dirmngr: New option --compatibility-flags. [rGbf04b07327]
* dirmngr: New option --ignore-crl-extensions. [T6545]
* wkd: Use export-clean for gpg-wks-client's --mirror and --create commands. [rG2c7f7a5a27]
* wkd: Make --add-revocs the default in gpg-wks-client. New option --no-add-revocs. [rG10c937ee68]
* scd: Make signing work for Nexus cards. [rGb83d86b988]
* scd: Fix authentication with Administration Key for PIV. [rG25b59cf6ce]
Release-info: https://dev.gnupg.org/T6509
2023/07/11(火) 13:06:41.54
https://dev.gnupg.org/T6509 だけでいいよ
スレを無駄に伸ばさないように頼む
スレを無駄に伸ばさないように頼む
2023/07/15(土) 07:28:18.72
Gpg4win 4.2.0
https://www.gpg4win.org/version4.2.html
https://www.gpg4win.org/change-history.htm
GnuPG: 2.4.3
Kleopatra: 3.1.28
Okular: 23.07.70-patched
GpgOL: 2.5.8
GpgEX: 1.0.9
Kompendium DE: 4.0.1
Compendium EN: 3.0.0l
https://www.gpg4win.org/version4.2.html
https://www.gpg4win.org/change-history.htm
GnuPG: 2.4.3
Kleopatra: 3.1.28
Okular: 23.07.70-patched
GpgOL: 2.5.8
GpgEX: 1.0.9
Kompendium DE: 4.0.1
Compendium EN: 3.0.0l
2023/07/21(金) 13:43:32.85
一々人のレスを制限してんなよカス
2023/09/20(水) 04:36:37.07
ヽ((◎д◎ ))ゝ ひょえぇ~
2024/01/26(金) 02:38:35.14
GnuPG 2.4.4
今回は修正点特に多い
https://dev.gnupg.org/T6578
Gpg4win 4.3.0もリリース済み(公式サイトはまだ更新されてないけどインストーラーは出来上がってる)
https://files.gpg4win.org/gpg4win-4.3.0.exe
https://files.gpg4win.org/gpg4win-4.3.0.exe.sig
今回は修正点特に多い
https://dev.gnupg.org/T6578
Gpg4win 4.3.0もリリース済み(公式サイトはまだ更新されてないけどインストーラーは出来上がってる)
https://files.gpg4win.org/gpg4win-4.3.0.exe
https://files.gpg4win.org/gpg4win-4.3.0.exe.sig
2024/03/13(水) 07:43:13.49
GnuPG 2.4.5
Noteworthy changes in version 2.4.5
===================================
* gpg,gpgv: New option --assert-pubkey-algo. [T6946]
* gpg: Emit status lines for errors in the compression layer. [T6977]
* gpg: Fix invocation with --trusted-keys and --no-options. [T7025]
* gpgsm: Allow for a longer salt in PKCS#12 files. [T6757]
* gpgtar: Make --status-fd=2 work on Windows. [T6961]
* scd: Support for the ACR-122U NFC reader. [rG1682ca9f01]
* scd: Suport D-TRUST ECC cards. [T7000,T7001]
* scd: Allow auto detaching of kernel drivers; can be disabled with the new compatibility-flag ccid-no-auto-detach. [rGa1ea3b13e0]
* scd: Allow setting a PIN length of 6 also with a reset code for openpgp cards. [T6843]
* agent: Allow GET_PASSPHRASE in restricted mode. [rGadf4db6e20]
* dirmngr: Trust system's root CAs for checking CRL issuers. [T6963]
* dirmngr: Fix regression in 2.4.4 in fetching keys via hkps. [T6997]
* gpg-wks-client: Make option --mirror work properly w/o specifying domains. [rG37cc255e49]
* g13,gpg-wks-client: Allow command style options as in "g13 mount foo". [rGa09157ccb2]
* Allow tilde expansion for the foo-program options. [T7017]
* Make the getswdb.sh tool usable outside the GnuPG tree.
Release-info: https://dev.gnupg.org/T6960
Noteworthy changes in version 2.4.5
===================================
* gpg,gpgv: New option --assert-pubkey-algo. [T6946]
* gpg: Emit status lines for errors in the compression layer. [T6977]
* gpg: Fix invocation with --trusted-keys and --no-options. [T7025]
* gpgsm: Allow for a longer salt in PKCS#12 files. [T6757]
* gpgtar: Make --status-fd=2 work on Windows. [T6961]
* scd: Support for the ACR-122U NFC reader. [rG1682ca9f01]
* scd: Suport D-TRUST ECC cards. [T7000,T7001]
* scd: Allow auto detaching of kernel drivers; can be disabled with the new compatibility-flag ccid-no-auto-detach. [rGa1ea3b13e0]
* scd: Allow setting a PIN length of 6 also with a reset code for openpgp cards. [T6843]
* agent: Allow GET_PASSPHRASE in restricted mode. [rGadf4db6e20]
* dirmngr: Trust system's root CAs for checking CRL issuers. [T6963]
* dirmngr: Fix regression in 2.4.4 in fetching keys via hkps. [T6997]
* gpg-wks-client: Make option --mirror work properly w/o specifying domains. [rG37cc255e49]
* g13,gpg-wks-client: Allow command style options as in "g13 mount foo". [rGa09157ccb2]
* Allow tilde expansion for the foo-program options. [T7017]
* Make the getswdb.sh tool usable outside the GnuPG tree.
Release-info: https://dev.gnupg.org/T6960
2024/03/13(水) 07:48:21.50
Gpg4winとGnuPG for OS Xも2.4.5のがリリース済み
2024/03/27(水) 19:42:19.60
だからビヨンドもチケットが売れてるから耐えてるけど
509名無しさん@お腹いっぱい。
2024/03/27(水) 20:10:23.56 顔はもちろん大事
510名無しさん@お腹いっぱい。
2024/03/27(水) 21:43:23.93 アホだと何故わからないんだろうね
普通に生きてたらまず起こり得ない漢字が一文字入ってた人で取り囲んで実演させたりしたんだけどアメリカンという感じだよね
ここでは何度もこの画面が表示される場合は速やかに(^ワ^=)に報告🌈🦀
・立てられなかったが
普通に生きてたらまず起こり得ない漢字が一文字入ってた人で取り囲んで実演させたりしたんだけどアメリカンという感じだよね
ここでは何度もこの画面が表示される場合は速やかに(^ワ^=)に報告🌈🦀
・立てられなかったが
2024/04/29(月) 17:29:18.97
Very first Beta of GnuPG 2.6 available
https://lists.gnupg.org/pipermail/gnupg-devel/2024-April/035533.html
次期メジャーバージョンの最初のベータ版
PQCサポート(ky1024_bp256、ky768_cv448)
現状ソースコード(tarball)のみ
https://lists.gnupg.org/pipermail/gnupg-devel/2024-April/035533.html
次期メジャーバージョンの最初のベータ版
PQCサポート(ky1024_bp256、ky768_cv448)
現状ソースコード(tarball)のみ
2024/09/13(金) 12:52:58.55
GnuPG 2.5.0 (2.6系に向けた公開テスト版)
Noteworthy changes in version 2.5.0 (2024-07-05)
================================================
[compared to version 2.4.5]
* gpg: Support composite Kyber+ECC public key algorithms. This is experimental due to the yet outstanding FIPS-203 specification. [T6815]
* gpg: Allow algo string "pqc" for --quick-gen-key. [rG12ac129a70]
* gpg: New option --show-only-session-key. [rG1695cf267e]
* gpg: Print designated revokers also in non-colon listing mode. [rG9d618d1273]
* gpg: Make --with-sig-check work with --show-key in non-colon listing mode. [rG0c34edc443]
* tpm: Rework error handling and fix key import [T7129, T7186]
* Varous fixes to improve robustness on 64 bit Windows. [T7139]
Noteworthy changes in version 2.5.0 (2024-07-05)
================================================
[compared to version 2.4.5]
* gpg: Support composite Kyber+ECC public key algorithms. This is experimental due to the yet outstanding FIPS-203 specification. [T6815]
* gpg: Allow algo string "pqc" for --quick-gen-key. [rG12ac129a70]
* gpg: New option --show-only-session-key. [rG1695cf267e]
* gpg: Print designated revokers also in non-colon listing mode. [rG9d618d1273]
* gpg: Make --with-sig-check work with --show-key in non-colon listing mode. [rG0c34edc443]
* tpm: Rework error handling and fix key import [T7129, T7186]
* Varous fixes to improve robustness on 64 bit Windows. [T7139]
2024/09/13(金) 12:53:07.14
Changes which will also show up in the firthcoming 2.4.6:
* gpg: New command --quick-set-ownertrust. [rG967678d972]
* gpg: Indicate disabled keys in key listings and add list option "show-ownertrust". [rG2a0a706eb2]
* gpg: Make sure a DECRYPTION_OKAY is never issued for a bad OCB tag. [T7042]
* gpg: Do not allow to accidently set the RENC usage. [T7072]
* gpg: Accept armored files without CRC24 checksum. [T7071]
* gpg: New --import-option "only-pubkeys". [T7146]
* gpg: Repurpose the AKL mechanism "ldap" to work like the keyserver mechnism but only for LDAP keyservers. [rG068ebb6f1e]
* gpg: ADSKs are now configurable for new keys. [T6882]
* gpgsm: Emit user IDs with an empty Subject also in colon mode. [T7171]
* agent: Consider an empty pattern file as valid. [rGc27534de95]
* agent: Fix error handling of READKEY. [T6012]
* agent: Avoid random errors when storing key in ephemeral mode. [T7129, rGfdc5003956]
* agent: Make "SCD DEVINFO --watch" more robust. [T7151]
* scd: Improve KDF data object handling for OpenPGP cards. [T7058]
* scd: Avoid buffer overrun with more than 16 PC/SC readers. [T7129, rG4c1b007035]
* scd: Fix how the scdaemon on its pipe connection finishes. [T7160]
* gpgconf: Check readability of some files with -X and change its output format. [rG98e287ba6d]
* gpg-mail-tube: New tool to apply PGP/MIME encryption to a mail. [rG28a080bc9f]
* Fix some uninitialized variables and double frees in error code paths. [T7129]
Release-info: https://dev.gnupg.org/T7189
* gpg: New command --quick-set-ownertrust. [rG967678d972]
* gpg: Indicate disabled keys in key listings and add list option "show-ownertrust". [rG2a0a706eb2]
* gpg: Make sure a DECRYPTION_OKAY is never issued for a bad OCB tag. [T7042]
* gpg: Do not allow to accidently set the RENC usage. [T7072]
* gpg: Accept armored files without CRC24 checksum. [T7071]
* gpg: New --import-option "only-pubkeys". [T7146]
* gpg: Repurpose the AKL mechanism "ldap" to work like the keyserver mechnism but only for LDAP keyservers. [rG068ebb6f1e]
* gpg: ADSKs are now configurable for new keys. [T6882]
* gpgsm: Emit user IDs with an empty Subject also in colon mode. [T7171]
* agent: Consider an empty pattern file as valid. [rGc27534de95]
* agent: Fix error handling of READKEY. [T6012]
* agent: Avoid random errors when storing key in ephemeral mode. [T7129, rGfdc5003956]
* agent: Make "SCD DEVINFO --watch" more robust. [T7151]
* scd: Improve KDF data object handling for OpenPGP cards. [T7058]
* scd: Avoid buffer overrun with more than 16 PC/SC readers. [T7129, rG4c1b007035]
* scd: Fix how the scdaemon on its pipe connection finishes. [T7160]
* gpgconf: Check readability of some files with -X and change its output format. [rG98e287ba6d]
* gpg-mail-tube: New tool to apply PGP/MIME encryption to a mail. [rG28a080bc9f]
* Fix some uninitialized variables and double frees in error code paths. [T7129]
Release-info: https://dev.gnupg.org/T7189
2024/09/13(金) 12:54:16.43
GnuPG 2.5.1 (2.6系に向けた公開テスト版)
Noteworthy changes in version 2.5.1 (2024-09-12)
================================================
[compared to version 2.5.0]
* gpg: The support for composite Kyber+ECC public key algorithms does now use the final FIPS-203 and LibrePGP specifications. The experimental keys from 2.5.0 are no longer supported. [T6815]
* gpg: New commands --add-recipients and --change-recipients. [T1825]
* gpg: New option --proc-all-sigs. [T7261]
* gpg: Fix a regression in 2.5.0 in gpgme's tests. [T7195]
* gpg: Make --no-literal work again for -c and --store. [T5852]
* gpg: Improve detection of input data read errors. [T6528]
* gpg: Fix getting key by IPGP record (rfc-4398). [T7288]
* gpgsm: New option --assert-signer. [T7286]
* gpgsm: More improvements to PKCS#12 parsing to cope with latest IVBB changes. [T7213]
* agent: Fix KEYTOCARD command when used with a loopback pinentry. [T7283]
* gpg-mail-tube: Make sure GNUPGHOME is set in vsd mode. New option --as-attach. [rG4511997e9e1b]
* Now uses the process spawn API from libgpg-error. [T7192,T7194]
* Removed the --enable-gpg-is-gpg2 configure time option. [rG2125f228d36c]
* Die Windows version will now be build for 64-Bit Windows and with the corresponding changes to the installation directory and Registry keys.
Release-info: https://dev.gnupg.org/T7191
Noteworthy changes in version 2.5.1 (2024-09-12)
================================================
[compared to version 2.5.0]
* gpg: The support for composite Kyber+ECC public key algorithms does now use the final FIPS-203 and LibrePGP specifications. The experimental keys from 2.5.0 are no longer supported. [T6815]
* gpg: New commands --add-recipients and --change-recipients. [T1825]
* gpg: New option --proc-all-sigs. [T7261]
* gpg: Fix a regression in 2.5.0 in gpgme's tests. [T7195]
* gpg: Make --no-literal work again for -c and --store. [T5852]
* gpg: Improve detection of input data read errors. [T6528]
* gpg: Fix getting key by IPGP record (rfc-4398). [T7288]
* gpgsm: New option --assert-signer. [T7286]
* gpgsm: More improvements to PKCS#12 parsing to cope with latest IVBB changes. [T7213]
* agent: Fix KEYTOCARD command when used with a loopback pinentry. [T7283]
* gpg-mail-tube: Make sure GNUPGHOME is set in vsd mode. New option --as-attach. [rG4511997e9e1b]
* Now uses the process spawn API from libgpg-error. [T7192,T7194]
* Removed the --enable-gpg-is-gpg2 configure time option. [rG2125f228d36c]
* Die Windows version will now be build for 64-Bit Windows and with the corresponding changes to the installation directory and Registry keys.
Release-info: https://dev.gnupg.org/T7191
2024/10/30(水) 08:33:32.03
GnuPG 2.4.6
Noteworthy changes in version 2.4.6
===================================
* gpg: New command --quick-set-ownertrust. [rG967678d972]
* gpg: Indicate disabled keys in key listings and add list option "show-ownertrust". [rG2a0a706eb2]
* gpg: Make sure a DECRYPTION_OKAY is never issued for a bad OCB tag. [T7042]
* gpg: Do not allow to accidently set the RENC usage. [T7072]
* gpg: Accept armored files without CRC24 checksum. [T7071]
* gpg: New --import-option "only-pubkeys". [T7146]
* gpg: Repurpose the AKL mechanism "ldap" to work like the keyserver mechnism but only for LDAP keyservers. [rG6551281ca3]
* gpg: ADSKs are now configurable for new keys. [T6882]
* gpg: New option --proc-all-sigs. [T7261]
* gpg: Fix a wrong decryption failed status for signed and OCB encrypted messages without a signature verification key. [T7042]
* gpg: Make --no-literal work again for -c and --store. [T5852]
* gpg: Fix getting key by IPGP. [T7288]
* gpg: Validate the trustdb after the import of a trusted key. [T7200]
* gpg: Exclude expired trusted keys from the key validation process. [T7200]
* gpgsm: New option --assert-signer. [T7286]
* gpgsm: Emit user IDs with an empty Subject also in colon mode. [T7171]
* keyboxd: Fix a race condition on the database handle. [T7294]
* agent: Consider an empty pattern file as valid. [rGc27534de95]
* agent: Fix error handling of READKEY. [T6012]
* agent: Avoid random errors when storing key in ephemeral mode. [T7129, rG19d93a239d]
* agent: Make "SCD DEVINFO --watch" more robust. [T7151]
* agent: Fix detection of the yet unused trustflag de-vs. [T5079]
* scd: Improve KDF data object handling for OpenPGP cards. [T7058]
* scd: Avoid buffer overrun with more than 16 PC/SC readers. [T7129, rG524e3a9345]
* scd: Fix how the scdaemon on its pipe connection finishes. [T7160]
* gpgconf: Check readability of some files with -X and change its output format. [rG759adb2493]
* gpg-mail-tube: New tool to apply PGP/MIME encryption to a mail. [rGa564a9f66c]
* Fix a race condition in creating the socket directory. [T7332]
* Fix some uninitialized variables and double frees in error code paths. [T7129]
Release-info: https://dev.gnupg.org/T7030
Noteworthy changes in version 2.4.6
===================================
* gpg: New command --quick-set-ownertrust. [rG967678d972]
* gpg: Indicate disabled keys in key listings and add list option "show-ownertrust". [rG2a0a706eb2]
* gpg: Make sure a DECRYPTION_OKAY is never issued for a bad OCB tag. [T7042]
* gpg: Do not allow to accidently set the RENC usage. [T7072]
* gpg: Accept armored files without CRC24 checksum. [T7071]
* gpg: New --import-option "only-pubkeys". [T7146]
* gpg: Repurpose the AKL mechanism "ldap" to work like the keyserver mechnism but only for LDAP keyservers. [rG6551281ca3]
* gpg: ADSKs are now configurable for new keys. [T6882]
* gpg: New option --proc-all-sigs. [T7261]
* gpg: Fix a wrong decryption failed status for signed and OCB encrypted messages without a signature verification key. [T7042]
* gpg: Make --no-literal work again for -c and --store. [T5852]
* gpg: Fix getting key by IPGP. [T7288]
* gpg: Validate the trustdb after the import of a trusted key. [T7200]
* gpg: Exclude expired trusted keys from the key validation process. [T7200]
* gpgsm: New option --assert-signer. [T7286]
* gpgsm: Emit user IDs with an empty Subject also in colon mode. [T7171]
* keyboxd: Fix a race condition on the database handle. [T7294]
* agent: Consider an empty pattern file as valid. [rGc27534de95]
* agent: Fix error handling of READKEY. [T6012]
* agent: Avoid random errors when storing key in ephemeral mode. [T7129, rG19d93a239d]
* agent: Make "SCD DEVINFO --watch" more robust. [T7151]
* agent: Fix detection of the yet unused trustflag de-vs. [T5079]
* scd: Improve KDF data object handling for OpenPGP cards. [T7058]
* scd: Avoid buffer overrun with more than 16 PC/SC readers. [T7129, rG524e3a9345]
* scd: Fix how the scdaemon on its pipe connection finishes. [T7160]
* gpgconf: Check readability of some files with -X and change its output format. [rG759adb2493]
* gpg-mail-tube: New tool to apply PGP/MIME encryption to a mail. [rGa564a9f66c]
* Fix a race condition in creating the socket directory. [T7332]
* Fix some uninitialized variables and double frees in error code paths. [T7129]
Release-info: https://dev.gnupg.org/T7030
2024/10/30(水) 08:33:57.75
2.2は今年いっぱいでEOLなので注意
2024/11/03(日) 07:35:32.61
lts にしてゾンビ化しようず
2024/11/28(木) 20:55:48.50
GnuPG 2.4.7 & Gpg4win 4.4.0
Noteworthy changes in version 2.4.7
===================================
* gpg: Allow the use of an ADSK subkey as ADSK subkey. [T6882]
* gpg: Avoid a failure exit code for expired ultimately trusted keys. [T7351]
* gpg: Fix comparing ed448 to ed25519 with --assert-pubkey-algo. [T7425]
* gpg: Retain binary representation for import->export with Ed25519 key signatures. [T7426]
* gpgsm: Improvement for some rare P12 files. [rG5f9975abf5]
* scd: More mitigations against lock ups with multiple cards or apps. [T7323, T7402]
* gpgtar: Fix directory creation during extraction. [T7380]
* gpg-mail-tube: Minor fixes.
* gpgconf: Add list flag to trusted-key et al. [T7313]
* Fix a build problem on macOS (missing unistd.h). [T7193]
Release-info: https://dev.gnupg.org/T7353
Noteworthy changes in version 2.4.7
===================================
* gpg: Allow the use of an ADSK subkey as ADSK subkey. [T6882]
* gpg: Avoid a failure exit code for expired ultimately trusted keys. [T7351]
* gpg: Fix comparing ed448 to ed25519 with --assert-pubkey-algo. [T7425]
* gpg: Retain binary representation for import->export with Ed25519 key signatures. [T7426]
* gpgsm: Improvement for some rare P12 files. [rG5f9975abf5]
* scd: More mitigations against lock ups with multiple cards or apps. [T7323, T7402]
* gpgtar: Fix directory creation during extraction. [T7380]
* gpg-mail-tube: Minor fixes.
* gpgconf: Add list flag to trusted-key et al. [T7313]
* Fix a build problem on macOS (missing unistd.h). [T7193]
Release-info: https://dev.gnupg.org/T7353
2024/12/06(金) 20:53:23.61
GnuPG 2.5.2(テスト版)
Noteworthy changes in version 2.5.2 (2024-12-05)
================================================
[compared to version 2.5.1]
* gpg: Add option 16 to --full-gen-key to create ECC+Kyber. [T6638]
* gpg: For composite algos add the algo string to the colons listings. [T6638]
* gpg: Validate the trustdb after the import of a trusted key. [T7200]
* gpg: Exclude expired trusted keys from the key validation process. [T7200]
* gpg: Fix a wrong decryption failed status for signed and OCB encrypted messages without a signature verification key. [T7042]
* gpg: Retain binary representation for import->export with Ed25519 key signatures. [T7426]
* gpg: Fix comparing ed448 to ed25519 with --assert-pubkey-algo. [T7425]
* gpg: Avoid a failure exit code for expired ultimately trusted keys. [T7351]
* gpg: Emit status error for an invalid ADSK. [T7322]
* gpg: Allow the use of an ADSK subkey as ADSK subkey. [T6882]
* gpg: Fix --quick-set-expire for V5 subkey fingerprints. [T7298]
* gpg: Robust error handling for SCD READKEY. [T7309]
* gpg: Fix cv25519 v5 export regression. [T7316]
* gpgsm: Nearly fourfold speedup of validated certificate listings. [T7308]
* gpgsm: Improvement for some rare P12 files. [rGf50dde6269]
* gpgsm: Terminate key listing on output write error. [T6185]
* agent: Add option --status to the LISTRUSTED command. [rG4275d5fa7a]
* agent: Fix detection of the yet unused trustflag de-vs. [T5079]
* agent: Allow ssh to sign data larger than the Assuan line length. [T7436]
* keyboxd: Fix a race condition on the database handle. [T7294]
* dirmngr: A list of used URLs for loaded CRLs is printed first in the output of the LISTCRL command. [T7337]
Noteworthy changes in version 2.5.2 (2024-12-05)
================================================
[compared to version 2.5.1]
* gpg: Add option 16 to --full-gen-key to create ECC+Kyber. [T6638]
* gpg: For composite algos add the algo string to the colons listings. [T6638]
* gpg: Validate the trustdb after the import of a trusted key. [T7200]
* gpg: Exclude expired trusted keys from the key validation process. [T7200]
* gpg: Fix a wrong decryption failed status for signed and OCB encrypted messages without a signature verification key. [T7042]
* gpg: Retain binary representation for import->export with Ed25519 key signatures. [T7426]
* gpg: Fix comparing ed448 to ed25519 with --assert-pubkey-algo. [T7425]
* gpg: Avoid a failure exit code for expired ultimately trusted keys. [T7351]
* gpg: Emit status error for an invalid ADSK. [T7322]
* gpg: Allow the use of an ADSK subkey as ADSK subkey. [T6882]
* gpg: Fix --quick-set-expire for V5 subkey fingerprints. [T7298]
* gpg: Robust error handling for SCD READKEY. [T7309]
* gpg: Fix cv25519 v5 export regression. [T7316]
* gpgsm: Nearly fourfold speedup of validated certificate listings. [T7308]
* gpgsm: Improvement for some rare P12 files. [rGf50dde6269]
* gpgsm: Terminate key listing on output write error. [T6185]
* agent: Add option --status to the LISTRUSTED command. [rG4275d5fa7a]
* agent: Fix detection of the yet unused trustflag de-vs. [T5079]
* agent: Allow ssh to sign data larger than the Assuan line length. [T7436]
* keyboxd: Fix a race condition on the database handle. [T7294]
* dirmngr: A list of used URLs for loaded CRLs is printed first in the output of the LISTCRL command. [T7337]
2024/12/06(金) 20:53:32.92
* scd: More mitigations against lock ups with multiple cards or apps. [T7323, T7402]
* gpgtar: Use log-file from common.conf only in --batch mode. [rGb389e04ef5]
* gpgtar: Fix directory creation during extraction. [T7380]
* gpg-mail-tube: Minor fixes.
* gpgconf: Add list flag to trusted-key et al. [T7313]
* Implement GNUPG_ASSUME_COMPLIANCE envvar and registry key for testing de-vs compliance mode. [rGb287fb5775,rG7b0be541a9]
* Enable additional runtime protections in speedo builds for Windows. [rG39aa206dc5]
* Fix a race condition in creating the socket directory. [T7332]
* Fix a build problem on macOS (missing unistd.h). [T7193]
Release-info: https://dev.gnupg.org/T7289
* gpgtar: Use log-file from common.conf only in --batch mode. [rGb389e04ef5]
* gpgtar: Fix directory creation during extraction. [T7380]
* gpg-mail-tube: Minor fixes.
* gpgconf: Add list flag to trusted-key et al. [T7313]
* Implement GNUPG_ASSUME_COMPLIANCE envvar and registry key for testing de-vs compliance mode. [rGb287fb5775,rG7b0be541a9]
* Enable additional runtime protections in speedo builds for Windows. [rG39aa206dc5]
* Fix a race condition in creating the socket directory. [T7332]
* Fix a build problem on macOS (missing unistd.h). [T7193]
Release-info: https://dev.gnupg.org/T7289
2025/01/14(火) 19:03:39.69
GnuPG 2.5.3 (テスト版)
Noteworthy changes in version 2.5.3 (2025-01-09)
================================================
[compared to version 2.5.2]
* gpg: Allow for signature subpackets of up to 30000 octets. [rG36dbca3e69]
* gpg: Silence expired trusted-key diagnostics in quiet mode. [T7351]
* gpg: Allow smaller session keys with Kyber and enforce the use of AES-256 if useful. [T7472]
* gpg: Fix regression in key generation from existing card key. [T7309,T7457]
* gpg: Print a warning if the card backup key could not be written. [T2169]
* The --supervised options of gpg-agent and dirmngr have been renamed to --deprecated-supervised as preparation for their removal. [rGa019a0fcd8]
* There is no more default for a keyserver.
Release-info: https://dev.gnupg.org/T7442
Noteworthy changes in version 2.5.3 (2025-01-09)
================================================
[compared to version 2.5.2]
* gpg: Allow for signature subpackets of up to 30000 octets. [rG36dbca3e69]
* gpg: Silence expired trusted-key diagnostics in quiet mode. [T7351]
* gpg: Allow smaller session keys with Kyber and enforce the use of AES-256 if useful. [T7472]
* gpg: Fix regression in key generation from existing card key. [T7309,T7457]
* gpg: Print a warning if the card backup key could not be written. [T2169]
* The --supervised options of gpg-agent and dirmngr have been renamed to --deprecated-supervised as preparation for their removal. [rGa019a0fcd8]
* There is no more default for a keyserver.
Release-info: https://dev.gnupg.org/T7442
2025/02/13(木) 00:42:17.71
GnuPG 2.5.4 (テスト版)
Noteworthy changes in version 2.5.4 (2025-02-12)
================================================
[compared to version 2.5.3]
* gpg: New option --disable-pqc-encryption. [rG00c31f8b04]
* gpg: Fix --quick-add-key for Weierstrass ECC with usage given. [T7506]
* gpg: Fix handling with no CRC armor. [T7071]
* gpg: New private Kyber keys are now cross-referenced using a new Link attribute. [T6638]
* gpg: Fix an import problem with keys having another primary key as a subkey. [T7527]
* gpgsm: Allow unattended PKCS#12 export without passphrase. [rG159e801043]
* gpgsm: Allow CSR generation with an unprotected key. [rG89055f24f4]
* agent: New option --change-std-env-name. [T7522]
* agent: Fix ssh-agent's request_identities for skipped Brainpool keys. [rG2469dc5aae]
* Do not package zlib and bzip2 object files in a Speedo release build. [T7442]
Release-info: https://dev.gnupg.org/T7480
Noteworthy changes in version 2.5.4 (2025-02-12)
================================================
[compared to version 2.5.3]
* gpg: New option --disable-pqc-encryption. [rG00c31f8b04]
* gpg: Fix --quick-add-key for Weierstrass ECC with usage given. [T7506]
* gpg: Fix handling with no CRC armor. [T7071]
* gpg: New private Kyber keys are now cross-referenced using a new Link attribute. [T6638]
* gpg: Fix an import problem with keys having another primary key as a subkey. [T7527]
* gpgsm: Allow unattended PKCS#12 export without passphrase. [rG159e801043]
* gpgsm: Allow CSR generation with an unprotected key. [rG89055f24f4]
* agent: New option --change-std-env-name. [T7522]
* agent: Fix ssh-agent's request_identities for skipped Brainpool keys. [rG2469dc5aae]
* Do not package zlib and bzip2 object files in a Speedo release build. [T7442]
Release-info: https://dev.gnupg.org/T7480
2025/03/08(土) 12:45:40.32
GnuPG 2.5.5 (テスト版)
Noteworthy changes in version 2.5.5 (2025-03-07)
================================================
[compared to version 2.5.4]
* gpg: Fix a verification DoS due to a malicious subkey in the keyring. [T7527]
* dirmngr: Fix possible hangs due to blocking connection requests. [T6606, T7434]
* w32: On socket nonce mismatch close the socket. [T7434]
* w32: Print more detailed diagnostics for IPC errors.
* GPGME is not any more distributed with the Windows installer. Please install gpg4win to get gpgme version.
Release-info: https://dev.gnupg.org/T7530
Noteworthy changes in version 2.5.5 (2025-03-07)
================================================
[compared to version 2.5.4]
* gpg: Fix a verification DoS due to a malicious subkey in the keyring. [T7527]
* dirmngr: Fix possible hangs due to blocking connection requests. [T6606, T7434]
* w32: On socket nonce mismatch close the socket. [T7434]
* w32: Print more detailed diagnostics for IPC errors.
* GPGME is not any more distributed with the Windows installer. Please install gpg4win to get gpgme version.
Release-info: https://dev.gnupg.org/T7530
2025/03/08(土) 12:46:52.02
https://www.gpg4win.org/version5.html
Gpg4win開発版はこちらからダウンロード可能
(今リンクされてる5.0.0-beta103に含まれてるのはGnuPG 2.5.4なので注意)
Gpg4win開発版はこちらからダウンロード可能
(今リンクされてる5.0.0-beta103に含まれてるのはGnuPG 2.5.4なので注意)
2025/03/11(火) 14:55:59.81
Gpg4win 5.0.0-beta145
これにはGnuPG 2.5.5が入ってる
これにはGnuPG 2.5.5が入ってる
2025/05/09(金) 22:20:00.42
GnuPG 2.5.6 (テスト版) & Gpg4win 5.0.0-beta190
Noteworthy changes in version 2.5.6 (2025-05-08)
================================================
[compared to version 2.5.5]
* gpg: Add a flag to the filter expressions for left anchored substring match. [rGc12b7d047e]
* gpg: New list option "show-trustsig" to avoid resorting to colon mode for this info. [rG41d6ae8f41]
* gpg: New command --quick-tsign-key to create a trust signature. [rGd90b290f97]
* gpg: New keygen parameter "User-Id". [rGcfd597c603]
* gpg: New list options "show-trustsig". [rGrG41d6ae8f41]
* gpg: Fix double free of internal data in no-sig-cache mode [T7547]
* gpg: Signatures from revoked or expired keys do not anymore show up as missing keys. Fixes regression in 2.5.5. [T7583]
* gpgsm: Extend --learn-card by an optional s/n argument. [T7379]
* gpgsm: Skip expired certificates when selection a certificate by subject. [rG4cf83273e8]
* card: New command "ll" as alias for "list --cards". [rGd6ee7adebe]
* scd: Fix posssible lockup on Windows due to a lost select result. [rGa7ec3792c5]
* scd:p15: Accept P15 cards with a zero-length label. [rGdb25aa9887]
* keyboxd: Use case-insensitive search for mail addresses. [T7576]
* dirmngr: Fix a problem in libdns related to an address change from 127.0.0.1. [T4021]
* gpgconf: Fix reload and kill of keyboxd. [T7569]
* Fix logic for certain recsel conditions. [rG8968e84903]
* Add Solaris support to get_signal_name. [T7638]
* Fix build error of the test shell on AIX. [T7632]
Release-info: https://dev.gnupg.org/T7586
Noteworthy changes in version 2.5.6 (2025-05-08)
================================================
[compared to version 2.5.5]
* gpg: Add a flag to the filter expressions for left anchored substring match. [rGc12b7d047e]
* gpg: New list option "show-trustsig" to avoid resorting to colon mode for this info. [rG41d6ae8f41]
* gpg: New command --quick-tsign-key to create a trust signature. [rGd90b290f97]
* gpg: New keygen parameter "User-Id". [rGcfd597c603]
* gpg: New list options "show-trustsig". [rGrG41d6ae8f41]
* gpg: Fix double free of internal data in no-sig-cache mode [T7547]
* gpg: Signatures from revoked or expired keys do not anymore show up as missing keys. Fixes regression in 2.5.5. [T7583]
* gpgsm: Extend --learn-card by an optional s/n argument. [T7379]
* gpgsm: Skip expired certificates when selection a certificate by subject. [rG4cf83273e8]
* card: New command "ll" as alias for "list --cards". [rGd6ee7adebe]
* scd: Fix posssible lockup on Windows due to a lost select result. [rGa7ec3792c5]
* scd:p15: Accept P15 cards with a zero-length label. [rGdb25aa9887]
* keyboxd: Use case-insensitive search for mail addresses. [T7576]
* dirmngr: Fix a problem in libdns related to an address change from 127.0.0.1. [T4021]
* gpgconf: Fix reload and kill of keyboxd. [T7569]
* Fix logic for certain recsel conditions. [rG8968e84903]
* Add Solaris support to get_signal_name. [T7638]
* Fix build error of the test shell on AIX. [T7632]
Release-info: https://dev.gnupg.org/T7586
2025/05/27(火) 14:37:05.93
Gpg4win 4.4.1
深刻なセキュリティ脆弱性の修正のためアップデート推奨
(入ってるGnuPG 2.4.8は公式にはまだリリースアナウンスされていないバージョン)
About the vulnerability:
Embedded malicious fonts in a PDF file may lead to code execution in Okular. CVSS Base Score: 8.1 (v3.1)
Details https://euvd.enisa.europa.eu/enisa/EUVD-2025-6367 (alternative ids: CVE-2025-27363, GHSA-g8qj-jv5h-78cp)
There are other good things in Gpg4win 4.4.1, for example
* improvements in the Outlook Add-in (GpgOL)
* a better Kleopatra
* GnuPG upgraded to v2.4.8
Check out the https://www.gpg4win.org/change-history.html
深刻なセキュリティ脆弱性の修正のためアップデート推奨
(入ってるGnuPG 2.4.8は公式にはまだリリースアナウンスされていないバージョン)
About the vulnerability:
Embedded malicious fonts in a PDF file may lead to code execution in Okular. CVSS Base Score: 8.1 (v3.1)
Details https://euvd.enisa.europa.eu/enisa/EUVD-2025-6367 (alternative ids: CVE-2025-27363, GHSA-g8qj-jv5h-78cp)
There are other good things in Gpg4win 4.4.1, for example
* improvements in the Outlook Add-in (GpgOL)
* a better Kleopatra
* GnuPG upgraded to v2.4.8
Check out the https://www.gpg4win.org/change-history.html
2025/06/03(火) 09:22:28.77
GnuPG 2.5.7 (テスト版)
Noteworthy changes in version 2.5.7 (2025-06-02)
================================================
[compared to version 2.5.6]
* gpg: Allow updating a SHA-1 key certification w/o using the --force-sign-key option. [T7663]
* gpg: The group key flag has now been fully implemented. [rG8833a34bf0]
* gpg: Make combination of show-only-fpr-mbox and show-unusable-uid work. [rGd5a4a2dc89]
* gpg: Do not allow compressed key packets on import. [T7014]
* gpgsm: Allow an empty subject DN also during import. [T7171]
* agent: Recover the old behavior with max-cache-ttl=0. [T6681]
* agent: Fix ECC key on smartcard for composite KEM with PQC. [T7648]
* scd: Fix a harmless read buffer over-read in a function used by PKCS#15 cards. [T7662]
* gpg-mail-tube,wks: Support templates for mail content. [T7381]
* Use the KEM interface of Libgcrypt for encryption/decryption. [T7649]
* Fix a glitch in socket handling in Windows in case of a nonce mismatch. [rG645cf7d8fc]
Release-info: https://dev.gnupg.org/T7671
Gpg4win 最新ベータ版(5.0.0-beta190)に入ってるのはまだgpg 2.5.6
Noteworthy changes in version 2.5.7 (2025-06-02)
================================================
[compared to version 2.5.6]
* gpg: Allow updating a SHA-1 key certification w/o using the --force-sign-key option. [T7663]
* gpg: The group key flag has now been fully implemented. [rG8833a34bf0]
* gpg: Make combination of show-only-fpr-mbox and show-unusable-uid work. [rGd5a4a2dc89]
* gpg: Do not allow compressed key packets on import. [T7014]
* gpgsm: Allow an empty subject DN also during import. [T7171]
* agent: Recover the old behavior with max-cache-ttl=0. [T6681]
* agent: Fix ECC key on smartcard for composite KEM with PQC. [T7648]
* scd: Fix a harmless read buffer over-read in a function used by PKCS#15 cards. [T7662]
* gpg-mail-tube,wks: Support templates for mail content. [T7381]
* Use the KEM interface of Libgcrypt for encryption/decryption. [T7649]
* Fix a glitch in socket handling in Windows in case of a nonce mismatch. [rG645cf7d8fc]
Release-info: https://dev.gnupg.org/T7671
Gpg4win 最新ベータ版(5.0.0-beta190)に入ってるのはまだgpg 2.5.6
2025/06/03(火) 21:34:55.63
リリースアナウンスは出てないけど
https://www.gnupg.org/download/index.html
> GnuPG 2.4.8 2025-05-14
5/14付で安定版2.4.8が出てることになってる
https://www.gnupg.org/download/index.html
> GnuPG 2.4.8 2025-05-14
5/14付で安定版2.4.8が出てることになってる
2025/06/21(土) 01:06:13.08
GnuPG 2.5.8 (テスト版)
Noteworthy changes in version 2.5.8 (2025-06-20)
================================================
[compared to version 2.5.7]
* gpg: Show revocation reason with a standard -k listing. [T7083]
* gpg: Emit a revocation reason as comment in a "pub" record. [T7083]
* agent: Fix regression in 2.5.7 decrypting with a card based cv25519 key. [T7676]
* scd:openpgp: Fix a regression in exporting card based ed25519 ssh keys. [T7589]
* dirmngr: Do not require a keyserver for "gpg --fetch-key". [T7693]
Release-info: https://dev.gnupg.org/T7672
Gpg4win 最新ベータ版(5.0.0-beta190)に入ってるのはgpg 2.5.6
Noteworthy changes in version 2.5.8 (2025-06-20)
================================================
[compared to version 2.5.7]
* gpg: Show revocation reason with a standard -k listing. [T7083]
* gpg: Emit a revocation reason as comment in a "pub" record. [T7083]
* agent: Fix regression in 2.5.7 decrypting with a card based cv25519 key. [T7676]
* scd:openpgp: Fix a regression in exporting card based ed25519 ssh keys. [T7589]
* dirmngr: Do not require a keyserver for "gpg --fetch-key". [T7693]
Release-info: https://dev.gnupg.org/T7672
Gpg4win 最新ベータ版(5.0.0-beta190)に入ってるのはgpg 2.5.6
2025/07/02(水) 08:24:31.11
2025/07/14(月) 23:15:18.50
GnuPG 2.5.9 & Gpg4win 5.0.0-beta345
Noteworthy changes in version 2.5.9 (2025-07-10)
================================================
[compared to version 2.5.8]
* gpg: Add the revocation reason to the sigclass of a "rev" line.
Regression in 2.5.7. [T7073]
* gpg: Do not show the non-standard secp256k1 curve in the menu to select the curve. It can however be specified using its name. [rG49a9171f63]
* gpg: Fix regression in using the secp256k1 curve. [T7698]
* dirmngr: New option --user-agent and send a default User-Agent of "GnuPG/2.6" for all HTTP requests. [T7715]
Release-info: https://dev.gnupg.org/T7695
Noteworthy changes in version 2.5.9 (2025-07-10)
================================================
[compared to version 2.5.8]
* gpg: Add the revocation reason to the sigclass of a "rev" line.
Regression in 2.5.7. [T7073]
* gpg: Do not show the non-standard secp256k1 curve in the menu to select the curve. It can however be specified using its name. [rG49a9171f63]
* gpg: Fix regression in using the secp256k1 curve. [T7698]
* dirmngr: New option --user-agent and send a default User-Agent of "GnuPG/2.6" for all HTTP requests. [T7715]
Release-info: https://dev.gnupg.org/T7695
2025/08/09(土) 15:39:44.49
リリースのアナウンスはないけどGnuPG 2.5.11 & Gpg4win 5.0.0-beta357 (どちらもテスト版)
https://www.gnupg.org/download/index.html
https://www.gpg4win.org/version5.html
https://www.gnupg.org/download/index.html
https://www.gpg4win.org/version5.html
2025/09/03(水) 08:03:32.24
GnuPG 2.5.12 (テスト版だけど "fully supported and thus ready for production use" と謳ってる)
Gpg4winの新しいベータ版はまだ出てない
Noteworthy changes in version 2.5.12 (2025-09-02)
=================================================
[compared to version 2.5.11]
* gpg: New options --[no-]auto-key-upload. [T7333]
* gpg: Keys send to an LDAP server are now first updated from that server. New keyserver option "no-update-before-send" to disable this feature. [T7730]
* gpg: Disable default compression for 7z compressed input. [rG53252628de]
* gpg: Fix a regression with composite PQC and ECC algos. [T7649]
* gpg: Fix the list of possible algos for --edit-key:addkey. [T7788]
* gpg: Allow to select the Kyber variants with --edit-key:addkey. [T7792]
* gpg: Avoid a second Pinentry pop-up for a configured ADSK during key generation. [T7491]
* gpg: Change the ADSK key binding time to use the current time. [T6882]
* gpgsm: Add option --no-qes-note and new trustlist flag "noconsent". [T7713]
* agent: Enable "relax" in the trustlist by default and add flag "norelax". [rG7b133027ae]
* agent: Fix a crash on Windows in the Putty support. [T7799]
* dirmgr: Support LDAP servers using a schema like the Windows LDS servers. [T7742]
* scd:openpgp: Support Yubikey attestation generation. [rG5ddfedf24a]
* gpgtar: Fix regression in end-of-archive detection. [T7757]
Release-info: https://dev.gnupg.org/T7756
Gpg4winの新しいベータ版はまだ出てない
Noteworthy changes in version 2.5.12 (2025-09-02)
=================================================
[compared to version 2.5.11]
* gpg: New options --[no-]auto-key-upload. [T7333]
* gpg: Keys send to an LDAP server are now first updated from that server. New keyserver option "no-update-before-send" to disable this feature. [T7730]
* gpg: Disable default compression for 7z compressed input. [rG53252628de]
* gpg: Fix a regression with composite PQC and ECC algos. [T7649]
* gpg: Fix the list of possible algos for --edit-key:addkey. [T7788]
* gpg: Allow to select the Kyber variants with --edit-key:addkey. [T7792]
* gpg: Avoid a second Pinentry pop-up for a configured ADSK during key generation. [T7491]
* gpg: Change the ADSK key binding time to use the current time. [T6882]
* gpgsm: Add option --no-qes-note and new trustlist flag "noconsent". [T7713]
* agent: Enable "relax" in the trustlist by default and add flag "norelax". [rG7b133027ae]
* agent: Fix a crash on Windows in the Putty support. [T7799]
* dirmgr: Support LDAP servers using a schema like the Windows LDS servers. [T7742]
* scd:openpgp: Support Yubikey attestation generation. [rG5ddfedf24a]
* gpgtar: Fix regression in end-of-archive detection. [T7757]
Release-info: https://dev.gnupg.org/T7756
2025/09/06(土) 12:57:53.01
2025/10/22(水) 23:29:33.55
GnuPG 2.5.13
Noteworthy changes in version 2.5.13 (2025-10-22)
=================================================
[compared to version 2.5.12]
* gpg: Fix de-vs compliance with OCB and additional password. [T7804]
* gpg: Detect duplicate keys with --add-recipients. [T1825]
* gpg: Take care about the prefix for cv25519 encryption. [T7649]
* gpg: Avoid potential downgrade to SHA1 in 3rd party key signatures. [rGdb9705ef59]
* gpg: Error out on unverified output for non-detached signatures. [rG8abc320f2a]
* gpgsm: Use KEM interface for en- and decryption. [T7811,T7845]
* gpgsm: Fix delete and store certificate locking glitches. [T7855]
* gpg,gpgsm: Run keybox compression only when there are no other users. [T7855]
* gpg,gpgsm: Improve keybox closing and locking order on read and write. [T7855]
* gpg,gpgsm: Always use share mode read-write for the keybox file access. [T7829]
* scd:openpgp: Fix an oddity in changing the PIN. [T7840]
* dirmngr: New LDAP keyserver flag "upload". [T7866]
* agent: Retry private key deletion in case of sharing violations for up to 400ms. [T7863]
* Take care of a possible race on daemon startup under Windows. [T7829]
* Improve file renaming on Windows in case of a sharing violation error. [T7829]
Release-info: https://dev.gnupg.org/T7801
Noteworthy changes in version 2.5.13 (2025-10-22)
=================================================
[compared to version 2.5.12]
* gpg: Fix de-vs compliance with OCB and additional password. [T7804]
* gpg: Detect duplicate keys with --add-recipients. [T1825]
* gpg: Take care about the prefix for cv25519 encryption. [T7649]
* gpg: Avoid potential downgrade to SHA1 in 3rd party key signatures. [rGdb9705ef59]
* gpg: Error out on unverified output for non-detached signatures. [rG8abc320f2a]
* gpgsm: Use KEM interface for en- and decryption. [T7811,T7845]
* gpgsm: Fix delete and store certificate locking glitches. [T7855]
* gpg,gpgsm: Run keybox compression only when there are no other users. [T7855]
* gpg,gpgsm: Improve keybox closing and locking order on read and write. [T7855]
* gpg,gpgsm: Always use share mode read-write for the keybox file access. [T7829]
* scd:openpgp: Fix an oddity in changing the PIN. [T7840]
* dirmngr: New LDAP keyserver flag "upload". [T7866]
* agent: Retry private key deletion in case of sharing violations for up to 400ms. [T7863]
* Take care of a possible race on daemon startup under Windows. [T7829]
* Improve file renaming on Windows in case of a sharing violation error. [T7829]
Release-info: https://dev.gnupg.org/T7801
2025/10/22(水) 23:30:37.08
レスを投稿する
ニュース
- 【速報】トランプ大統領、中国の習近平国家主席を「国賓」として招待することに ★2 [ニョキニョキ★]
- 日本と中国を結ぶ12航空路線で全便欠航 中国人に最も人気の海外旅行先は日本から韓国に [ぐれ★]
- 米中電話会談、トランプ氏は「米国側は中国にとっての台湾問題の重要性を理解する」 [1ゲットロボ★]
- 【東京・足立の車暴走】赤信号無視か 危険運転致死傷疑いも視野に捜査 逮捕された職業不詳の男性(37)は精神疾患で通院歴も ★3 [ぐれ★]
- 【音楽】「なんでこんなバカが国のトップなの?」 若者に人気のバンド「GEZAN」のマヒトゥ・ザ・ピーポーが高市総理に苦言 [シャチ★]
- ホンダの下期世界販売、半導体不足で日本車2位→4位に 3強崩れる [蚤の市★]
