[pkg-gnupg-maint] Bug#969330: libpam-ssh-agent-auth: Authentication fails a random number of times before succeeding when ED25519 keys are used.

Daniel Kahn Gillmor dkg at debian.org
Thu Apr 28 21:38:49 BST 2022


Control: forwarded 969330 https://dev.gnupg.org/T5682
Control: close 969330 2.2.34-1

On Wed 2022-02-02 23:40:28 +0000, Chris Boot wrote:
> This bug actually appears to be in GnuPG itself, not 
> libpam-ssh-agent-auth. Please see my comments at the end of 
> https://github.com/jbeverly/pam_ssh_agent_auth/issues/28.
>
> The bug is fixed in GnuPG 2.3.4 and 2.2.33 with the following changelog 
> entry for both:
>
>    * scd: Support longer data for ssh-agent authentication with openpgp
>      cards.  [T5682]
>
> This corresponds to the following GnuPG bug:
>
> https://dev.gnupg.org/T5682
>
> Please update GnuPG to 2.2.33 or 2.3.4.

Thanks for reporting this, Alexander, and for tracking it down, Chris.
Should be resolved with the recent uploads of 2.2.34 and 2.2.35 to
debian unstable.

       --dkg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 227 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-gnupg-maint/attachments/20220428/f1a1406c/attachment.sig>


More information about the pkg-gnupg-maint mailing list