GNOME Bugzilla – Bug 222232
gpg fails on many signatures that are correct
Last modified: 2002-03-25 21:11:48 UTC
Hello, GOG is failing on many signatures that are correct. It seems that this started happening a lot after i moved from the stable evolution to any of the red-carpet nightly builds. It seems to fail most on sigs generated from mutt and gnus. Especially when sigs are inline and not mime attachments. The following is a mail from the nmap list that failed but I verified by hand... From fyodor@insecure.org Wed Mar 20 03:38:03 2002 Return-Path: <nmap-hackers-return-983-dfelznic=syr.edu@insecure.org> Received: from syr.edu (syr.edu [128.230.1.49]) by mailbox.syr.edu (8.9.2/8.9.2) with ESMTP id DAA08851 for <dfelznic@mailbox.syr.edu>; Wed, 20 Mar 2002 03:38:03 -0500 (EST) Received: from core.lnxnet.net (ppp-159-151.dialups.lnxnet.net [216.218.159.151]) by syr.edu (8.9.3/8.9.3) with SMTP id DAA11448 for <dfelznic@syr.edu>; Wed, 20 Mar 2002 03:38:02 -0500 (EST) Received: (qmail 22641 invoked by uid 509); 20 Mar 2002 08:15:10 -0000 Mailing-List: contact nmap-hackers-help@insecure.org; run by ezmlm Precedence: bulk Delivered-To: mailing list nmap-hackers@insecure.org Delivered-To: moderator for nmap-hackers@insecure.org Received: (qmail 22513 invoked by uid 500); 20 Mar 2002 08:14:39 -0000 Date: Wed, 20 Mar 2002 00:14:39 -0800 From: Fyodor <fyodor@insecure.org> To: nmap-hackers@insecure.org Subject: Nmap 2.54BETA31 released! Message-ID: <20020320081439.GB19483@core.lnxnet.net> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.3.25i X-UIDL: 4bd287b14ee8038208cc21ef179da762 X-Evolution-Source: pop://dfelznic@mailbox.syr.edu/inbox Content-Transfer-Encoding: 8bit -----BEGIN PGP SIGNED MESSAGE----- Hello everyone, I am happy to announce that Nmap 2.54BETA31 is now available. It contains a number of important fixes and updates which I have been sitting on for far too long :). I also snuck in some new features. Here are the CHANGELOG entries o Added ICMP Timestamp and Netmask ping types (-PP and -PM). These (especially timestamp) can be useful against some hosts that do not respond to normal ping (-PI) packets. o Documented the --data_length option and made it work with all the ICMP ping types (echo request, netmask, and timestamp). o Added check for strings.h before including it in portlist.c . This fixes a compilation problem on some versions of Windows. Problem first noted by "Michael Vorin" <mvorin@hotmail.com> o Applied patch from Andy Lutomirski (Luto@myrealbox.com) which fixes a crash on some Windows platforms when timeouts occur. o Fixed "grepable output" (-oG) so that it prints IPID sequence class rather than printing the TCP ISN sequence index twice. Problem noted by Russell Fulton (r.fulton@auckland.ac.nz) o Added mysterious, undocumented --scanflags option. o Applied patch from Andy Lutomirski (Luto@myrealbox.com) which fixes some important Windows bugs. Apparently this can cause a dramatic speedup in some circumstances. The patch had other misc. changes too. o Fix bug noted by Chris V (iselldrugstokidsonline@yahoo.com) in which Nmap could segmentation fault with the (bogus) command: './nmap -sO -p 1-65535 hostname' (protocol only can go up to 255). That being said, Nmap should never segfault just because of bogus options. o Fixed problem noted by Maximiliano (emax25@arnet.com.ar) where Nmap would get stuck in a (nearly) infinite loop when you try to "resume" a random host (-iR) scan. o Included a number of fingerprint updates, but I still have many more web submissions to go through. Also made some nmap-services portlist updates. o Included a bunch of fixes (mostly to prevent compiler warnings) from William McVey (wam@cisco.com) For those of you running Linux/x86 w/a recent version of rpm (www.rpm.org), you can install/upgrade to the newest version of nmap/nmapfe with these commands: rpm -vhU (nmap url) where (nmap url) is one (or both) of these: http://download.insecure.org/nmap/dist/nmap-2.54BETA30-1.i386.rpm http://download.insecure.org/nmap/dist/nmap-frontend-0.2.54BETA30-1.i386.rpm For the rest of you, source tarballs and source RPMs are always available at: http://www.insecure.org/nmap/nmap_download.html For the more paranoid (smart) members of the list, here are the md5 hashes: f0d363b32bab910ea195502322a43cca nmap-2.54BETA31.tgz e46cccf35721870cce969494187829ad nmap-2.54BETA31-1.i386.rpm 801d8df405c473ad02df2bdf380abae9 nmap-2.54BETA31-1.src.rpm ae8cd0f857073d6c6177921ab5316aec nmap-frontend-0.2.54BETA31-1.i386.rpm These release notes should be signed with my PGP key, which is available at http://www.insecure.org/fyodor_gpgkey.txt . The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E Please let me know if you find any problems. Cheers, Fyodor -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iQCVAwUBPJhDws4dPqJTWH2VAQGZuwQAkwLzoCxeWW5wCq0EgRoiCq6fGetbXhxK BpAFejM1RClU9PIMRSxb8Fi0RZRUptYWldt0v8OMgzg3aR60m4/xXmM64roCj6my UAGOJyGOb753CaMElAAZhFMhTNkAki/Viggetz2Mk5Pf4/qtosZ5C7dVc9yzEyWM Jrm2SFLi8Lg= =5ok3 -----END PGP SIGNATURE----- -------------------------------------------------- For help using this (nmap-hackers) mailing list, send a blank email to nmap-hackers-help@insecure.org . List run by ezmlm-idx (www.ezmlm.org).
*** This bug has been marked as a duplicate of 217541 ***