Your message dated Fri, 03 Jul 2009 19:54:00 +0000
with message-id <[email protected]>
and subject line Bug#345911: fixed in gnupg 1.4.6-2+etch1
has caused the Debian Bug report #345911,
regarding FIXED/1.4.10: gnupg: gpg with big public keyrings very slow
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
345911: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=345911
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: gnupg
Version: 1.2.1-2
Severity: normal
Tags: upstream
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello,
gpg is very slow, when you have big public keyrings, e.g. when you verify
messages of mailing lists which are signed (many different senders). This
also affects encrypting mails with such keyrings. I think there should be a
more efficient interface for mail programs and others.
Hope it was right to file this report against gnupg and not the mail
programs.
With kind regards
Torsten Knodt
- -- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux tk-hybrid-1 2.4.19 #1 Mit Nov 20 12:08:46 CET 2002 i586
Locale: LANG=C, LC_CTYPE=C
Versions of packages gnupg depends on:
ii devfsd 1.3.25-12 Daemon for the device filesystem
ii libc6 2.3.1-5 GNU C Library: Shared libraries an
ii libldap2 2.0.27-2 OpenLDAP libraries (without TLS su
ii makedev 2.3.1-59 Creates device files in /dev.
ii zlib1g 1:1.1.4-8 compression library - runtime
- -- no debconf information
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQE98gUeX1/CjdwsodIRAowEAJ9dfWGNH/H7fnt+dy0n0/rKd1GtFQCfT2SP
BK21TgAEj1DC4+57NcFcyBs=
=1qBZ
-----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---
Source: gnupg
Source-Version: 1.4.6-2+etch1
We believe that the bug you reported is fixed in the latest version of
gnupg, which is due to be installed in the Debian FTP archive:
gnupg-udeb_1.4.6-2+etch1_i386.udeb
to pool/main/g/gnupg/gnupg-udeb_1.4.6-2+etch1_i386.udeb
gnupg_1.4.6-2+etch1.diff.gz
to pool/main/g/gnupg/gnupg_1.4.6-2+etch1.diff.gz
gnupg_1.4.6-2+etch1.dsc
to pool/main/g/gnupg/gnupg_1.4.6-2+etch1.dsc
gnupg_1.4.6-2+etch1_i386.deb
to pool/main/g/gnupg/gnupg_1.4.6-2+etch1_i386.deb
gpgv-udeb_1.4.6-2+etch1_i386.udeb
to pool/main/g/gnupg/gpgv-udeb_1.4.6-2+etch1_i386.udeb
gpgv_1.4.6-2+etch1_i386.deb
to pool/main/g/gnupg/gpgv_1.4.6-2+etch1_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Daniel Leidert (dale) <[email protected]> (supplier of updated gnupg
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sat, 30 May 2009 21:26:42 +0200
Source: gnupg
Binary: gnupg-udeb gpgv gnupg gpgv-udeb
Architecture: source i386
Version: 1.4.6-2+etch1
Distribution: oldstable
Urgency: low
Maintainer: James Troup <[email protected]>
Changed-By: Daniel Leidert (dale) <[email protected]>
Description:
gnupg - GNU privacy guard - a free PGP replacement
gnupg-udeb - GNU privacy guard - a free PGP replacement (udeb)
gpgv - GNU privacy guard - signature verification tool
gpgv-udeb - minimal signature verification tool (udeb)
Closes: 172115 321871 345911
Changes:
gnupg (1.4.6-2+etch1) oldstable; urgency=low
.
* debian/patches/101_172115_fix_keyring_memory_leak.dpatch: Added.
- g10/keyring.c (keyring_get_keyblock): Fix a memory leak due to
ring_trust packets, which slowed down import of large keyrings
leading to potential DoS (closes: #172115, #345911).
* debian/patches/101_321871_unset_noecho_on_sigint.dpatch: Added.
- g10/signal.c (got_fatal_signal), util/ttyio.c (tty_cleanup_after_signal),
include/ttyio.h: Cleanup terminal attributes on interrupt (closes:
#321871).
Files:
ed7080052a8bedd0f30f51bb886e2ce8 997 utils standard gnupg_1.4.6-2+etch1.dsc
d01fe53f1de06daebaa8e84389c66fa4 25914 utils standard
gnupg_1.4.6-2+etch1.diff.gz
e9c43b1b0e1520b8d89c21c62d8329a0 1841596 utils standard
gnupg_1.4.6-2+etch1_i386.deb
7452dcd89d8c7ab5f0d68b574dfcee39 142710 utils important
gpgv_1.4.6-2+etch1_i386.deb
6be355813b46e67be3738efde80b6f9a 128700 debian-installer extra
gpgv-udeb_1.4.6-2+etch1_i386.udeb
5b0fb236018e289cfb5f841b37b3f06f 355612 debian-installer extra
gnupg-udeb_1.4.6-2+etch1_i386.udeb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iQEcBAEBAgAGBQJKIZ+hAAoJECIIoQCMVaAcsPgH/i/kKQOYaMbTxiZI6Cl/MI0V
llnkZO/SFEp2NvfCCuLQu6e6m6O1h+2/8J2WC42FKXEsvhl7Tp7rc+oS0jFkXdio
SCBlSSkVEx3Slx2lBS3zEvjbOFQKbfy8p9SI4q6vG5S0v6UkXhVUusxGds7i2gdR
Q7rkPBMW+nyqPH0JuIxLwVXPYpQFJKi7zt088hdmySZKAzB3o2E3yjiIXAOKUnEY
9e1PGpXab8sqAlSSdj3s3ns1FaR1eeqLQMnaoJi2VLXRdx40gsPoAOGrJ/G3F7eu
2XTjUL6OHbfandURbbZDYVyzi+i7hc311aWLM9Y0hnevXbD+3I8O68pNjNWOYAg=
=lVvm
-----END PGP SIGNATURE-----
--- End Message ---