Your message dated Sun, 12 May 2013 04:48:11 +0000 with message-id <[email protected]> and subject line Bug#583893: fixed in gnupg2 2.0.20-1 has caused the Debian Bug report #583893, regarding gnupg2: Cannot enter pin using pinpad to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 583893: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583893 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: gnupg2 Version: 2.0.14-1.1 Severity: important Unable to use SCM SPR 332 (USB) CHIPDRIVE pinpad card reader. Attempts to initialize an OpenPGP card fail when a PIN input is required from the card reader. For example, 'gpg2 --change-pin' causes a pinentry window to appear showing "Please enter the PIN Use the reader's keypad for input" and an "OK" button. However, when the pinentry window appears the mouse pointer disappears; pressing keys on the reader's keypad produces an audio response but no visible effect. Eventually the pinentry window disappears and the mouse pointer reappears. The command 'gpg2 --card-status' shows the same status, including PIN retry counter : 3 3 3 before and after the failing 'gpg2 --change-pin' command as above. Commands not using pinentry appear to act normally while all commands requiring pinentry fail as described above. 'change-pin' appears to work as expected when using a SCM SCR 335 USB card reader without a pinpad. Both gpg and gpg2 behave the same as described here. The card reader installation for udev followed the instructions at <http://www.gnupg.org/howtos/card-howto/en/ch02s03.html#id2519429>, the udev configuration looks like this: ,----[ ls -lR /etc/udev ] /etc/udev: total 104 -rw-r--r-- 1 root root 229 May 25 16:53 gnupg-ccid.rules -rw-r--r-- 1 root root 92 Nov 2 2008 hdparm.rules -rw-r--r-- 1 root root 77683 Dec 17 19:41 libgphoto2.rules -rw-r--r-- 1 root root 397 Sep 18 2008 links.conf drwxr-xr-x 2 root root 4096 May 25 17:04 rules.d drwxr-xr-x 2 root root 4096 May 25 16:56 scripts -rw-r--r-- 1 root root 269 Dec 8 19:54 udev.conf /etc/udev/rules.d: total 16 lrwxrwxrwx 1 root root 19 Dec 17 19:41 025_libgphoto2.rules -> ../libgphoto2.rules -rw-r--r-- 1 root root 1137 Oct 1 2008 65_dmsetup.rules.dpkg-bak -rw-r--r-- 1 root root 1612 May 5 14:12 70-persistent-cd.rules -rw-r--r-- 1 root root 1195 Dec 17 02:48 70-persistent-cd.rules.old -rw-r--r-- 1 root root 708 Dec 17 02:39 70-persistent-net.rules lrwxrwxrwx 1 root root 19 May 25 17:04 gnupg-ccid.rules -> ../gnupg-ccid.rules lrwxrwxrwx 1 root root 15 Dec 17 17:48 z60_hdparm.rules -> ../hdparm.rules /etc/udev/scripts: total 4 -rwxr-xr-x 1 root root 910 May 25 16:56 gnupg-ccid `---- ,----[ cat /etc/udev/gnupg-ccid.rules ] # GPG SmartCard Reader Support # ACTION=="add", SUBSYSTEM=="usb", ENV{PRODUCT}=="4e6/e003/*", RUN+="/etc/udev/scripts/gnupg-ccid" ACTION=="add", SUBSYSTEM=="usb", ENV{PRODUCT}=="4e6/5115/*", RUN+="/etc/udev/scripts/gnupg-ccid" `---- ,----[ cat /etc/udev/scripts/gnupg-ccid | grep -vE '^$|^# ' ] #!/bin/bash # # GROUP=scard # # # if [ "${ACTION}" = "add" ] && [ -f "${DEVICE}" ] then chmod o-rwx "${DEVICE}" chgrp "${GROUP}" "${DEVICE}" chmod g+rw "${DEVICE}" fi `---- My normal user is in the scard group. ,----[ printenv | grep GPG ] GPG_AGENT_INFO=/tmp/gpg-pDVNV5/S.gpg-agent:4362:1 GPG_TTY=/dev/pts/2 `---- ,----[ pgrep -fl gpg-agent ] 4362 /usr/bin/gpg-agent --daemon --sh --write-env-file=/home/jam/.gnupg/gpg-agent-info-athene /usr/bin/dbus-launch --exit-with-session /usr/bin/seahorse-agent --execute gnome-session `---- Below is some information about the pinentry package in use. I send this report to gnupg2 because I suspect a configuration error and there appear to be no user configuration options for this pinentry. ,---- Package: pinentry-gtk2 Version: 0.8.0-1 Versions of packages pinentry-gtk2 depends on: ii libc6 2.11.1-1 Embedded GNU C Library: Shared lib ii libglib2.0-0 2.24.1-1 The GLib library of C routines ii libgtk2.0-0 2.20.1-1 The GTK+ graphical user interface ii libncurses5 5.7+20100313-2 shared libraries for terminal hand ii libpango1.0-0 1.28.0-1 Layout and rendering of internatio pinentry-gtk2 recommends no packages. Versions of packages pinentry-gtk2 suggests: ii pinentry-doc 0.8.0-1 documentation for pinentry package -- no debconf information `---- -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages gnupg2 depends on: ii dpkg 1.15.7.2 Debian package management system ii gnupg-agent 2.0.14-1.1 GNU privacy guard - password agent ii install-info 4.13a.dfsg.1-5 Manage installed documentation in ii libbz2-1.0 1.0.5-4 high-quality block-sorting file co ii libc6 2.11.1-1 Embedded GNU C Library: Shared lib ii libcurl3-gnutls 7.20.1-2 Multi-protocol file transfer libra ii libgcrypt11 1.4.5-2 LGPL Crypto library - runtime libr ii libgpg-error0 1.6-1 library for common error values an ii libksba8 1.0.7-2 X.509 and CMS support library ii libreadline6 6.1-2 GNU readline and history libraries ii zlib1g 1:1.2.3.4.dfsg-3 compression library - runtime Versions of packages gnupg2 recommends: ii libldap-2.4-2 2.4.21-1 OpenLDAP libraries Versions of packages gnupg2 suggests: ii gnupg-doc 2003.04.06+dak1-1 GNU Privacy Guard documentation ii xloadimage 4.1-16.1 Graphics file viewer under X11 -- no debconf information
--- End Message ---
--- Begin Message ---Source: gnupg2 Source-Version: 2.0.20-1 We believe that the bug you reported is fixed in the latest version of gnupg2, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Eric Dorland <[email protected]> (supplier of updated gnupg2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Sat, 11 May 2013 18:28:57 -0400 Source: gnupg2 Binary: gnupg-agent scdaemon gpgsm gnupg2 Architecture: source amd64 Version: 2.0.20-1 Distribution: unstable Urgency: low Maintainer: Eric Dorland <[email protected]> Changed-By: Eric Dorland <[email protected]> Description: gnupg-agent - GNU privacy guard - password agent gnupg2 - GNU privacy guard - a free PGP replacement (new v2.x) gpgsm - GNU privacy guard - S/MIME version scdaemon - GNU privacy guard - smart card support Closes: 583893 691237 Changes: gnupg2 (2.0.20-1) unstable; urgency=low . * New upstream release. (Closes: #691237, #583893) * debian/patches/02-cve-2012-6085.diff: Remove, merged upstream. * debian/control: Upgrade Standards-Version to 3.9.4. * debian/compat, debian/control: Upgrade to debhelper v9. * debian/control, debian/rules: Drop hardening-wrapper, now that we use debhelper v9. * debian/scdaemon.install: scdaemon has moved under $libexecdir. * debian/control: Tighten dependency on scdaemon. * debian/rules: Turn on all hardening options. * debian/patches/01-gnupg2-rename.diff: Refresh patch. * debian/gnupg-agent.install, debian/gnupg2.install, debian/scdaemon.install: Fix /usr/lib paths for multi-arch. * debian/rules: Pass ${pkglibdir} to --libexecdir since dh v9 passes ${libdir} by default. Checksums-Sha1: 324119b0a3602164627fd4c9fd28fa69a9f3b4b2 1576 gnupg2_2.0.20-1.dsc 7ddfefa37ee9da89a8aaa8f9059d251b4cd02562 4286191 gnupg2_2.0.20.orig.tar.bz2 2623eb7e6fc556e915c46fea0a9b6348078fdab1 15355 gnupg2_2.0.20-1.debian.tar.bz2 3645562fab72037be28af9697304e205205210ba 465158 gnupg-agent_2.0.20-1_amd64.deb 8365862060fbc61ed4b678482b69ab61094767c3 222280 scdaemon_2.0.20-1_amd64.deb 5d5f53010d1c71e377044992d079311f7be9f67d 255710 gpgsm_2.0.20-1_amd64.deb 1d6a349a2e88d7486ad6418e0c4902767493b4f3 2402602 gnupg2_2.0.20-1_amd64.deb Checksums-Sha256: a8254f4bc41dc5db531a8fc9c1cce44134d65d7890cf9573b841ab24e2119ad8 1576 gnupg2_2.0.20-1.dsc 6e949b7f062cab8a3cf0910f91ecf04cabaad458c0aeeec66298651b8b04b79a 4286191 gnupg2_2.0.20.orig.tar.bz2 da6811a983e22524f8555bbbfce8920bfec08433a3a81c30b92785ca885fadff 15355 gnupg2_2.0.20-1.debian.tar.bz2 a264e1f0018409c50c61cccaba3dae2c6b6be4a03ccef4a53e46b232778a2641 465158 gnupg-agent_2.0.20-1_amd64.deb 2e7b6b4a8357c4ba56c8d65506803a8a35a322613791459a381ad2b907205663 222280 scdaemon_2.0.20-1_amd64.deb e970f5c61af44ce35afc6aced2c00afa76e656caa1947b8084508d41da83fb8f 255710 gpgsm_2.0.20-1_amd64.deb 76b3f5a898c57e1d12cdbc19122312ce9baa139fc55d496cc67eb9b1dcb80c6f 2402602 gnupg2_2.0.20-1_amd64.deb Files: a62cb5086496c84bca5a312ed732167b 1576 utils optional gnupg2_2.0.20-1.dsc 9d18ee71bb0b10d40d1c8a393bdd7a89 4286191 utils optional gnupg2_2.0.20.orig.tar.bz2 78ad4a5bdea2fb62faa0a4a4bcb14111 15355 utils optional gnupg2_2.0.20-1.debian.tar.bz2 843c5d0d426091c098f9846d38fca9d1 465158 utils optional gnupg-agent_2.0.20-1_amd64.deb 2e2f44f301b35a0ec2653942ff1f6a1f 222280 utils optional scdaemon_2.0.20-1_amd64.deb b37781967eac85ec19b3ee9f4d6b3d5d 255710 utils optional gpgsm_2.0.20-1_amd64.deb 1338efc08585040a468ed80e9f532632 2402602 utils optional gnupg2_2.0.20-1_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlGPG4cACgkQYemOzxbZcMa5sACcC44edBjxF0wh/n+BPsFkpsD8 axEAoMNpyFhTHEgln75gjseuIzyVzTJ3 =AOWq -----END PGP SIGNATURE-----
--- End Message ---

