Werner Koch <w...@gnupg.org> wrote: 
        On Tue,  5 May 2015 01:38, sand...@crustytoothpaste.net said:
        > spawned to prompt the user.  It appears the socket has moved, and
        > symlinking the socket indicates that GnuPG has intentionally broken
        
        It has not been broken but since 2.0.23 gpg detects that GKR hijacks the
        connection and causes all kind of troubles including security
        weaknesses.

This intentional regression is not acceptable and must be fixed in the
Debian GnuPG package. 

        Note that even 2.0 can be configured to use a fixed socket like 2.1
        does:
        
          --use-standard-socket
          --no-use-standard-socket
        
            By enabling this option gpg-agent will listen on the socket named
            'S.gpg-agent', located in the home directory, and not create a
            random socket below a temporary directory.  Tools connecting to
            gpg-agent should first try to connect to the socket given in
            environment variable GPG_AGENT_INFO and then fall back to this
            socket.  This option may not be used if the home directory is
            mounted on a remote file system which does not support special files
            like fifos or sockets.

Thanks, you just broke remote $HOME configurations, just to piss off
GNOME keyring developers. This is antisocial behavior. 

        It has been told enough times that this is GKR bug. Given that the GNOME
        folks are not willing to fix that we are preparing changes to the GnuPG
        system which should allow them to remove that hijacking and instead
        install a new kind of Pinentry which implements what GKR should have
        done.

This should have been done first.

-- 
Joss


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to