On Wed, 31 Dec 2025 18:48:50 +0000, "Barak A. Pearlmutter" writes:
>Version 3.6.0.3-1 still has an issue with credentials being passed
>through to gpg.

yes, and it doesn't work without any encryption at all either.

>I generated a package 3.6.0.3-1.1 in

thanks for your efforts. we clearly duplicated some of that
in the last two days: i pushed out 3.6.0.3-2 yesterday,
which...

>includes post-3.6.0.3 development, in particular commit ac163d5e which
>fixes the problem.

...also includes that commit but not unchanged. upstream doesn't seem to
understand public key encryption and insists on passphrase-checking
*public* keys without reason.

while that commit fixes some/most gpg2 use with agent and gpgsm and
other special cases, it absolutely breaks
public-key-only/no-private-key-in-sight encryption.

(in the orginal commit, line 150 in dup_main.py makes
public key encryption strictly depend on check remote.
with --no-check-remote you get no public key encryption
at all and it falls through to symmetric.)

>It also has a few other minor tweaks, like an
>updated debian/watch file.

i'll have a look at these when i prep the next release, but
that won't be for a while: 3.0.6 broke much more than it fixed,
and i want 3.0.7 to mature some before i spend time on it.

regards
az


-- 
Alexander Zangerl + GPG Key 2FCCF66BB963BD5F + https://snafu.priv.at/
:q :q! :wq :w :w! :wq! :quit :quit! :help help helpquit quit quithelp
 :quitplease :quitnow :leave :shit ^X^C ^C ^D ^Z ^Q QUITDAMMIT ^]:wq

Attachment: signature.asc
Description: Digital Signature

Reply via email to