summarylogtreecommitdiffstats
diff options
context:
space:
mode:
authorarjan52019-07-19 09:08:42 +0200
committerarjan52019-07-19 09:08:42 +0200
commit893732bc340fb6f80b954984858d46ba4c99a2d2 (patch)
treed4c7650add3d82b674ca2c83b9786008b1c06e31
parent3b2068912488c01ee91d1863473fd4cab9bb6eed (diff)
downloadaur-893732bc340fb6f80b954984858d46ba4c99a2d2.tar.gz
Update gnupg to 2.2.17-2
-rw-r--r--.SRCINFO16
-rw-r--r--PKGBUILD13
-rw-r--r--self-sigs-only.patch56
3 files changed, 73 insertions, 12 deletions
diff --git a/.SRCINFO b/.SRCINFO
index fba27553af0c..7781276cb42f 100644
--- a/.SRCINFO
+++ b/.SRCINFO
@@ -1,7 +1,7 @@
pkgbase = gnupg-large-secmem
pkgdesc = Complete and free implementation of the OpenPGP standard - with extra large secure memory for many parallel decryption actions
- pkgver = 2.2.16
- pkgrel = 1
+ pkgver = 2.2.17
+ pkgrel = 2
url = https://www.gnupg.org/
install = install
arch = x86_64
@@ -24,24 +24,26 @@ pkgbase = gnupg-large-secmem
optdepends = libusb-compat: scdaemon
optdepends = pcsclite: scdaemon
provides = dirmngr
- provides = gnupg2=2.2.16
- provides = gnupg=2.2.16
+ provides = gnupg2=2.2.17
+ provides = gnupg=2.2.17
conflicts = dirmngr
conflicts = gnupg2
conflicts = gnupg
replaces = dirmngr
replaces = gnupg2
replaces = gnupg
- source = https://gnupg.org/ftp/gcrypt/gnupg/gnupg-2.2.16.tar.bz2
- source = https://gnupg.org/ftp/gcrypt/gnupg/gnupg-2.2.16.tar.bz2.sig
+ source = https://gnupg.org/ftp/gcrypt/gnupg/gnupg-2.2.17.tar.bz2
+ source = https://gnupg.org/ftp/gcrypt/gnupg/gnupg-2.2.17.tar.bz2.sig
source = gnupg_large_secmem.patch
+ source = self-sigs-only.patch
validpgpkeys = D8692123C4065DEA5E0F3AB5249B39D24F25E3B6
validpgpkeys = 46CC730865BB5C78EBABADCF04376F3EE0856959
validpgpkeys = 031EC2536E580D8EA286A9F22071B08A33BD3F06
validpgpkeys = 5B80C5754298F0CB55D8ED6ABCEF7E294B092E28
- sha256sums = 6cbe8d454bf5dc204621eed3016d721b66298fa95363395bb8eeceb1d2fd14cb
+ sha256sums = afa262868e39b651a2db4c071fba90415154243e83a830ca00516f9a807fd514
sha256sums = SKIP
sha256sums = 63108d8fcbcfddf7ba6eee699ade0f79f98558c8ba1f07d86c7a55dce603355d
+ sha256sums = 0130c43321c16f53ab2290833007212f8a26b1b73bd4edc2b2b1c9db2b2d0218
pkgname = gnupg-large-secmem
diff --git a/PKGBUILD b/PKGBUILD
index 03906791d9a5..15dc063faaf2 100644
--- a/PKGBUILD
+++ b/PKGBUILD
@@ -6,8 +6,8 @@
pkgname=gnupg-large-secmem
_pkgname=gnupg
-pkgver=2.2.16
-pkgrel=1
+pkgver=2.2.17
+pkgrel=2
pkgdesc='Complete and free implementation of the OpenPGP standard - with extra large secure memory for many parallel decryption actions'
url='https://www.gnupg.org/'
license=('GPL')
@@ -24,10 +24,12 @@ validpgpkeys=('D8692123C4065DEA5E0F3AB5249B39D24F25E3B6'
'031EC2536E580D8EA286A9F22071B08A33BD3F06'
'5B80C5754298F0CB55D8ED6ABCEF7E294B092E28')
source=("https://gnupg.org/ftp/gcrypt/${_pkgname}/${_pkgname}-${pkgver}.tar.bz2"{,.sig}
- "gnupg_large_secmem.patch")
-sha256sums=('6cbe8d454bf5dc204621eed3016d721b66298fa95363395bb8eeceb1d2fd14cb'
+ "gnupg_large_secmem.patch"
+ 'self-sigs-only.patch')
+sha256sums=('afa262868e39b651a2db4c071fba90415154243e83a830ca00516f9a807fd514'
'SKIP'
- '63108d8fcbcfddf7ba6eee699ade0f79f98558c8ba1f07d86c7a55dce603355d')
+ '63108d8fcbcfddf7ba6eee699ade0f79f98558c8ba1f07d86c7a55dce603355d'
+ '0130c43321c16f53ab2290833007212f8a26b1b73bd4edc2b2b1c9db2b2d0218')
install=install
@@ -38,6 +40,7 @@ replaces=('dirmngr' 'gnupg2' 'gnupg')
prepare() {
cd "${srcdir}/${_pkgname}-${pkgver}"
sed '/noinst_SCRIPTS = gpg-zip/c sbin_SCRIPTS += gpg-zip' -i tools/Makefile.in
+ patch -R -p1 -i ../self-sigs-only.patch
# See: https://lists.gnupg.org/pipermail/gnupg-devel/2017-June/032905.html
patch -p1 -i ../gnupg_large_secmem.patch
diff --git a/self-sigs-only.patch b/self-sigs-only.patch
new file mode 100644
index 000000000000..3d7406301474
--- /dev/null
+++ b/self-sigs-only.patch
@@ -0,0 +1,56 @@
+From: Werner Koch <wk@gnupg.org>
+Date: Thu, 4 Jul 2019 13:45:39 +0000 (+0200)
+Subject: gpg: Add "self-sigs-only" and "import-clean" to the keyserver options.
+X-Git-Url: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff_plain;h=23c978640812d123eaffd4108744bdfcf48f7c93
+
+gpg: Add "self-sigs-only" and "import-clean" to the keyserver options.
+
+* g10/gpg.c (main): Change default.
+--
+
+Due to the DoS attack on the keyeservers we do not anymore default to
+import key signatures. That makes the keyserver unsuable for getting
+keys for the WoT but it still allows to retriev keys - even if that
+takes long to download the large keyblocks.
+
+To revert to the old behavior add
+
+ keyserver-optiions no-self-sigs-only,no-import-clean
+
+to gpg.conf.
+
+GnuPG-bug-id: 4607
+Signed-off-by: Werner Koch <wk@gnupg.org>
+---
+
+diff --git a/doc/gpg.texi b/doc/gpg.texi
+index 8feab8218..9513a4e0f 100644
+--- a/doc/gpg.texi
++++ b/doc/gpg.texi
+@@ -1917,6 +1917,11 @@ are available for all keyserver types, some common options are:
+
+ @end table
+
++The default list of options is: "self-sigs-only, import-clean,
++repair-keys, repair-pks-subkey-bug, export-attributes,
++honor-pka-record".
++
++
+ @item --completes-needed @var{n}
+ @opindex compliant-needed
+ Number of completely trusted users to introduce a new
+diff --git a/g10/gpg.c b/g10/gpg.c
+index 66e47dde5..0bbe72394 100644
+--- a/g10/gpg.c
++++ b/g10/gpg.c
+@@ -2424,7 +2424,9 @@ main (int argc, char **argv)
+ opt.import_options = IMPORT_REPAIR_KEYS;
+ opt.export_options = EXPORT_ATTRIBUTES;
+ opt.keyserver_options.import_options = (IMPORT_REPAIR_KEYS
+- | IMPORT_REPAIR_PKS_SUBKEY_BUG);
++ | IMPORT_REPAIR_PKS_SUBKEY_BUG
++ | IMPORT_SELF_SIGS_ONLY
++ | IMPORT_CLEAN);
+ opt.keyserver_options.export_options = EXPORT_ATTRIBUTES;
+ opt.keyserver_options.options = KEYSERVER_HONOR_PKA_RECORD;
+ opt.verify_options = (LIST_SHOW_UID_VALIDITY