OpenPGP: external GnuPG fails if GPGME.gpgme_op_decrypt_ext returns armored results (rnp_op_verify_execute returns 268435457, RNP_ERROR_BAD_FORMAT)
Categories
(MailNews Core :: Security: OpenPGP, defect)
Tracking
(thunderbird_esr78 fixed, thunderbird84 fixed)
People
(Reporter: bruno.n.pagani, Assigned: KaiE)
References
Details
Attachments
(9 files, 2 obsolete files)
(deleted),
message/rfc822
|
Details | |
(deleted),
text/x-phabricator-request
|
wsmwk
:
approval-comm-esr78+
|
Details |
(deleted),
text/plain
|
Details | |
(deleted),
patch
|
Details | Diff | Splinter Review | |
(deleted),
text/plain
|
Details | |
(deleted),
text/plain
|
Details | |
(deleted),
text/plain
|
Details | |
(deleted),
patch
|
Details | Diff | Splinter Review | |
(deleted),
text/x-phabricator-request
|
wsmwk
:
approval-comm-beta+
wsmwk
:
approval-comm-esr78+
|
Details |
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Steps to reproduce:
Opened any encrypted message, either old (which were likely sent using Enigmail, and displayed correctly under Thunderbird+Enigmail) or brand new (i.e. sent to myself using this Thunderbird version).
I’m using the external GnuPG feature. I’m apparently able to sign correctly, so it’s likely not an issue with the setup.
Actual results:
Message cannot be decrypted.
In the console log, I can see this:
rnp_op_verify_execute returned unexpected: 268435457
Expected results:
Message should be decrypted and displayed successfully.
Hello Bruno, thank you for reporting. Please update the summary to reflect that it concerns the external GnuPG feature, for example:
Decrypt with external GnuPG fails with rnp_op_verify_execute returned unexpected
Reporter | ||
Updated•4 years ago
|
Reporter | ||
Updated•4 years ago
|
Reporter | ||
Comment 2•4 years ago
|
||
Hi Ben,
Done. Is there anything else I can do to help debug this?
Comment 3•4 years ago
|
||
For debugging it, see https://wiki.mozilla.org/Thunderbird:OpenPGP#Debugging_.2F_Tracing
Assignee | ||
Comment 4•4 years ago
|
||
Code 268435457 is RNP_ERROR_BAD_FORMAT
We always start by trying to decrypt with the internal RNP.
Apparently RNP think thiss isn't just a missing secret key, it thinks the whole PGP message is bad.
For a message that you send to yourself, do you get the same problem with the copy of the message that is stored in your Sent folder?
Looking at our code, I see that for the above error code, we currently don't attempt to decrypt using GPGME. (We only do that for error codes RNP_ERROR_DECRYPT_FAILED and RNP_ERROR_NO_SUITABLE_KEY.)
It would help us to get a copy of a message in that broken format.
Could you please follow the instruction from bug 1663400 comment 2 to send a test message?
After you sent the test message, please confirm that the copy in your sent folder gives you the same problem.
We'll then try to investigate what's happening.
Thanks in advance.
Assignee | ||
Updated•4 years ago
|
Reporter | ||
Comment 5•4 years ago
|
||
So, I’ve sent an email to Kai following the instructions. I confirm I can neither debug the copy stored in Sent, nor the copy sent to my myself.
In the system console, I get this more detailed output using RNP_LOG_CONSOLE=1
:
[init_encrypted_src() /build/thunderbird/src/thunderbird-78.4.0/comm/third_party/rnp/src/librepgp/stream-parse.cpp:2044] failed to obtain decrypting key or password
[init_packet_sequence() /build/thunderbird/src/thunderbird-78.4.0/comm/third_party/rnp/src/librepgp/stream-parse.cpp:2268] wrong pkt tag 45
console.debug: "rnp_op_verify_execute returned unexpected: 268435457"
The enigdbug.txt file seems uninteresting w.r.t. the console log, in fact they are identical except for those three lines that are only in the console output.
I’ve also attached to this bug the message as stored in my Sent folder.
Assignee | ||
Comment 6•4 years ago
|
||
Thanks for the test message.
I can decrypt it just fine.
Assignee | ||
Comment 7•4 years ago
|
||
(In reply to Bruno Pagani from comment #5)
[init_encrypted_src() /build/thunderbird/src/thunderbird-78.4.0/comm/third_party/rnp/src/librepgp/stream-parse.cpp:2044] failed to obtain decrypting key or password
[init_packet_sequence() /build/thunderbird/src/thunderbird-78.4.0/comm/third_party/rnp/src/librepgp/stream-parse.cpp:2268] wrong pkt tag 45
console.debug: "rnp_op_verify_execute returned unexpected: 268435457"
This is probably the cause of your problem.
The missing decrypting key is expected, because as you said, you're using the external key in gnupg configuration.
So for some reason, RNP is unhappy with this message in general, and thinks it contains a problem, and is therefore complaining about it.
Nickolay, do you want to check what's happening here?
I'll forward you an email that was encrypted to the key material that can be found on gitlab here:
https://gitlab.com/openpgp-wg/openpgp-samples
Assignee | ||
Updated•4 years ago
|
Assignee | ||
Comment 8•4 years ago
|
||
Independent of the detail with RNP, we should probably extend the list of error scenarios, in which Thunderbird should continue to attempt decrpyting with GPGME.
Assignee | ||
Comment 9•4 years ago
|
||
Updated•4 years ago
|
Assignee | ||
Comment 10•4 years ago
|
||
The attached patch adds the fallback for additional error codes, I've added the ones that seemed reasonable to me, which are those that don't suggest a general fatal failure (e.g. other than a failure to understand the data).
Comment 11•4 years ago
|
||
Pushed by kaie@kuix.de:
https://hg.mozilla.org/comm-central/rev/bfa8183cf7b8
Allow fallback to GPGME decryption in additional RNP failure scenarios. r=PatrickBrunschwig
Assignee | ||
Updated•4 years ago
|
Assignee | ||
Comment 12•4 years ago
|
||
I assume there'll be no additional 83.x beta.
This is a very obvious correctness fix, I think it's safe to put it into esr78 without waiting.
Comment 13•4 years ago
|
||
Assignee | ||
Comment 14•4 years ago
|
||
Comment on attachment 9187153 [details]
Bug 1675939 - Allow fallback to GPGME decryption in additional RNP failure scenarios. r=PatrickBrunschwig
[Approval Request Comment]
Regression caused by (bug #):
User impact if declined: users cannot decrypt certain messages, limited to users of non-default external gnupg configuration
Testing completed (on c-c, etc.):
Risk to taking this patch (and alternatives if risky): low
Reporter | ||
Comment 15•4 years ago
|
||
I’ve tried your patch above 78.4.1 sources, but it still does not work:
[DEBUG] mimeDecryp.jsm: starting decryption
[DEBUG] mimeDecrypt.jsm: got API: RNP
[DEBUG] rnp-cryptoAPI.js: decryptMime()
[DEBUG] rnp-cryptoAPI.js: decrypt()
[init_encrypted_src() /build/thunderbird/src/thunderbird-78.4.1/comm/third_party/rnp/src/librepgp/stream-parse.cpp:2044] failed to obtain decrypting key or password
[init_packet_sequence() /build/thunderbird/src/thunderbird-78.4.1/comm/third_party/rnp/src/librepgp/stream-parse.cpp:2268] wrong pkt tag 45
[DEBUG] mimeDecrypt.jsm: done: 268435457
[DEBUG] mimeDecrypt.jsm: displayStatus()
The only visible change is that the line console.debug: "rnp_op_verify_execute returned unexpected: 268435457"
disappeared, but it seems to be still treated as some sort of return value from the decryption.
Assignee | ||
Comment 16•4 years ago
|
||
Comment on attachment 9187153 [details]
Bug 1675939 - Allow fallback to GPGME decryption in additional RNP failure scenarios. r=PatrickBrunschwig
thanks for the quick feedback, removing the request for branch approval
Assignee | ||
Comment 17•4 years ago
|
||
Bruno, it's expected that you still get the error output on the console. We cannot prevent that.
However, afterwards, with the new code, we should try to run a decrypt through GnuPG.
Do you possibly have a chance to enable GPGME logging, and see if we access it to attempt the decryption?
Alternatively, it sounds like you are building Thunderbird locally?
If that's true, then I could create a patch that enables more logging, so we see what our code attempts to do.
Reporter | ||
Comment 18•4 years ago
|
||
(In reply to Kai Engert (:KaiE:) from comment #17)
Bruno, it's expected that you still get the error output on the console. We cannot prevent that.
However, afterwards, with the new code, we should try to run a decrypt through GnuPG.
Do you possibly have a chance to enable GPGME logging, and see if we access it to attempt the decryption?
I don’t know how to do that, but if you have a link with instructions I can try to follow them.
Alternatively, it sounds like you are building Thunderbird locally?
If that's true, then I could create a patch that enables more logging, so we see what our code attempts to do.
Yes I am (I’m an Arch Linux packager, testing our new build for issues before we release it). I could definitively use such a patch.
Reporter | ||
Comment 19•4 years ago
|
||
(In reply to Bruno Pagani from comment #18)
(In reply to Kai Engert (:KaiE:) from comment #17)
Bruno, it's expected that you still get the error output on the console. We cannot prevent that.
However, afterwards, with the new code, we should try to run a decrypt through GnuPG.
Do you possibly have a chance to enable GPGME logging, and see if we access it to attempt the decryption?
I don’t know how to do that, but if you have a link with instructions I can try to follow them.
OK, it was quite simple actually: https://www.gnupg.org/documentation/manuals/gpgme/Debugging.html
I see thousands of line in this file as soon as I try to open the encrypted email in TB.
Comment 20•4 years ago
|
||
Sorry for a bit late reply. I re-checked with the latest CLI utility - and rnp_op_verify_execute() returns correct RNP_ERROR_NO_SUITABLE_KEY on that message, so looks like it's the problem of the different workflow/functions call order.
Kai, do you make use of rnp_ffi_set_key_provider() ? Within it you may distinguish which keys are required to decrypt the data, and do a fallback to the GnuPG if the corresponding secret key is not available.
Assignee | ||
Comment 21•4 years ago
|
||
I can confirm Nickolay's observation, I'm actually getting RNP_ERROR_NO_SUITABLE_KEY, too, with the RNP snapshot from September 13, the one we still include in the stable release.
Assignee | ||
Comment 22•4 years ago
|
||
Bruno, the behavior you're observing is different from the one we see with our builds.
I wonder if there is anything special about your Thunderbird build for Arch Linux that has the side effect of causing the problem you see.
Which RNP and Botan libraries are you using? Are you using the ones that are contained in the Thunderbird source distribution, or are you using other versions?
Assignee | ||
Updated•4 years ago
|
Assignee | ||
Updated•4 years ago
|
Assignee | ||
Comment 23•4 years ago
|
||
Your log output from above
[init_packet_sequence() /build/thunderbird/src/thunderbird-78.4.1/comm/third_party/rnp/src/librepgp/stream-parse.cpp:2268] wrong pkt tag 45
seems to clarify that you're using the RNP code that Thunderbird includes.
However, I don't get this message when opening the test message you had sent to me - when using a configuration in which RNP doesn't have access to required secret key material, as in your scenario.
Reporter | ||
Comment 24•4 years ago
|
||
We are using system botan, so 2.17.1. You can see for which library we are using system ones (as much as possible in fact) here: https://git.archlinux.org/svntogit/packages.git/tree/trunk/mozconfig.cfg?h=packages/thunderbird
I’ll try with vendored botan version and see if that is the culprit.
Reporter | ||
Comment 25•4 years ago
|
||
Same issue using vendored botan (I realized that I did not state explicitly it since you found it by yourself, but yes we use Thunderbird vendored RNP since we don’t package it currently —this might change in the future).
Not sure what I should do at this point?
Comment 26•4 years ago
|
||
Do you have at least one secret key imported to the Thunderbird (or generated there), or do not have them at all? Maybe that could make a difference.
Reporter | ||
Comment 27•4 years ago
|
||
No, they are no any secret key in Thunderbird. I’ve just generated one for some identity to try, but that did not make any change.
Reporter | ||
Comment 28•4 years ago
|
||
OK, so I went a step further and tried the official Mozilla binaries. And I get the same issue:
[init_encrypted_src() /builds/worker/checkouts/gecko/comm/third_party/rnp/src/librepgp/stream-parse.cpp:2044] failed to obtain decrypting key or password
[init_packet_sequence() /builds/worker/checkouts/gecko/comm/third_party/rnp/src/librepgp/stream-parse.cpp:2268] wrong pkt tag 45
Reporter | ||
Updated•4 years ago
|
Reporter | ||
Comment 29•4 years ago
|
||
I’ve also tried in a clean profile, after setting up a dummy account and adding the message to it, as well as setting GnuPG and the key in E2E settings, to no avail (exactly the same error as above, while the gpgme.log file gets filled with content).
Assignee | ||
Comment 30•4 years ago
|
||
So to summarize:
- for the same message, you get error BAD_FORMAT, but both Nickolay and I get error NO_SUITABLE_KEY
- we don't understand why you get error BAD_FORMAT
- you've tested code that attempts decryption with GPGME for error error BAD_FORMAT
- your testing and logging seems to confirm that the experimental patch indeed enabled fallback to GPGME
- if you don't see a decrypted message, it means that GnuPG cannot decrypt your message, or that your message is corrupted.
If RNP reports BAD_FORMAT, and GPGME cannot decrypt, it seems most likely that you are experiencing some kind of data corruption.
Bruno, at this time I have no idea what could go wrong.
I suggest that as the next step you investigate if the message files that Thunderbird accesses might be corrupted.
I think the easiest is to work with the example message that you had sent.
I will edit the message you had sent to alice-test remove the headers, and attach it.
Hopefully you still have the message in your sent folder. Use file save as to save the message from inside Thunderbird to a .eml file. Then compare your saved file with the file I will attach. Do you see any corruption or difference in the file you have saved?
Then try to use GnuPG to decrypt both your file and my file. Can GnuPG decrypt both, or is there a failure?
Assignee | ||
Comment 31•4 years ago
|
||
Never mind. You had already attached your copy from the sent folder.
Are you able to decrypt that file with gnupg?
Reporter | ||
Comment 32•4 years ago
|
||
Yeah, it’s definitively not a corruption issue, as even loading the message attached here into a clean profile lead to the same issue.
I’ve attached the output of gpg --decrypt message.eml
, so you can see that definitively works.
If you want to provide patches around that code path to get more debug, I’ll happily test them and report.
Assignee | ||
Comment 33•4 years ago
|
||
Bruno, here is a patch that adds logging. It's based on current comm-esr78, which should be almost identical to the soon-to-be-released 78.5.0
I've prepared my environment this way:
- saved file message.eml that you had attached to this bug
- used a Thunderbird profile that does NOT have the Alice/Bob secret keys
- set pref allow_external_gnupg to true
- imported Alice's secret key into the GnuPG keyring (no smartcard)
- started Thunderbird.
- opened error console
- cleared error console (trash button)
- in the TB main window, "file open saved message", selected your file
- back to error console
- right click, export visible messages to file
I'm attaching the file that produced.
We can see the following in the file:
- rnp_op_verify_execute exitCode: 301989894 (no suitable key)
- calling GPGME.decrypt
- GPGMELib.gpgme_op_decrypt_ext exitCode: 0
- r2.decryptedData contains a PGP block with different contents.
That's the result of GPGME having stripped away the encryption, and having produced a new block that only contains the remaining signature information - recursive call to RNP.decrypt
That call will process the remaining encoding and evaluate the signature - rnp_op_verify_execute exitCode: 0
RNP reports the processing of that inner data was good - result.decryptedData: shows the message that you have attached as "decrypted.txt"
Can you please do the same, and provide the file you get from saving the error console?
Assignee | ||
Comment 34•4 years ago
|
||
Assignee | ||
Comment 35•4 years ago
|
||
Comment 36•4 years ago
|
||
Comment on attachment 9188300 [details]
Bug 1675939 - Add pref to automatically accept OpenPGP public key as accepted/unverified on import. r=PatrickBrunschwig
Revision D97316 was moved to bug 1675342. Setting attachment 9188300 [details] to obsolete.
Assignee | ||
Comment 37•4 years ago
|
||
Please ignore the previous comment, it was intended for a different bug.
Reporter | ||
Comment 38•4 years ago
|
||
So here you go. This is trying to decrypt with my key, I’ll try again with Alice’s.
Assignee | ||
Comment 39•4 years ago
|
||
That's interesting. On your system, GPGME reports a successful operation.
"GPGMELib.gpgme_op_decrypt_ext exitCode: 0"
But the decrypted data it returns looks differently.
Could you please provide the full message block? The second pink section, the one that starts with "LS0tLS1CRUdJTiBQR1AgTU...".
By default, the message is truncated. There's a little arrow in front of it, if you click it, it will expand. Then you can right click and copy it. Could you please save it to a file and attach?
Assignee | ||
Comment 40•4 years ago
|
||
From the first section, because of the identical line "sha1: 86bd2366b2e4c8ff80f1a950f7c3ffdaf311ee6a RNP.jsm:923:9" in both of our logs, we know that on your system, it operates on the same input that I got.
Reporter | ||
Comment 41•4 years ago
|
||
(In reply to Kai Engert (:KaiE:) from comment #39)
That's interesting. On your system, GPGME reports a successful operation.
"GPGMELib.gpgme_op_decrypt_ext exitCode: 0"But the decrypted data it returns looks differently.
Could you please provide the full message block? The second pink section, the one that starts with "LS0tLS1CRUdJTiBQR1AgTU...".
By default, the message is truncated. There's a little arrow in front of it, if you click it, it will expand. Then you can right click and copy it. Could you please save it to a file and attach?
Actually I had exported it like this for the first time, then while comparing to yours I realized I could keep the section collapsed. ^^ So here is the previous log with expanded sections.
BTW, the log for Alice’s key is bit for bit identical (the only difference is that I don’t get asked for my passphrase by the gpg-agent, which is expected since Alice’s is not passphrase protected).
Assignee | ||
Comment 42•4 years ago
|
||
Thanks. What are the versions of GnuPG and GPGME that you have installed?
Reporter | ||
Comment 43•4 years ago
|
||
Respectively 2.2.23 and 1.14.0. I can try 2.2.24 and 1.15.0 (quite easily for the second one as it is already available in the [testing] repository).
Reporter | ||
Comment 44•4 years ago
|
||
Same issue on GPGME 1.15.0.
Assignee | ||
Comment 45•4 years ago
|
||
I think I understand what's happening.
We're calling gpgme_op_decrypt_ext with flag GPGME_DECRYPT_UNWRAP - which is equivalent to the (almost undocumented) functionality from "gpg --unwrap"
In all my past experiments, the output of that code was always a binary PGP message. Because I cannot easily process that binary output, I'm always using code to transform that into "armored" PGP content.
If I run a base64 decoding operating on the block you got, it looks like the output that I get.
So apparently, on your system, the result of "gpg --unwrap" isn't binary, but it's already armored. We apply another level of armoring, and RNP fails to decode it.
On my system I'm using gpg 2.2.20 and GPGME 1.12.0. Your versions are newer.
I see I have a call to gpgme_set_armor(1). I remember that had not given me the expected results, which was the reason why I had added applied an RNP function for armoring on top of the GPGME output.
I'm guessing that newer versions of GPGME have fixed this to work correctly.
I suggest we remove the call to gpgme_set_armor, and always rely on the RNP armoring code, so it can work consistently with old and new gpg versions.
I'll make a patch for you to try.
Assignee | ||
Comment 46•4 years ago
|
||
Assignee | ||
Updated•4 years ago
|
Reporter | ||
Comment 47•4 years ago
|
||
I’m compiling with your patch, but not sure that will work: I do have armor
in my gpg.conf file. This has been a recommended setting for ages (so long that I do not even remember why exactly), and it might be responsible for armoring the output of your gpg --unwrap
call. If I’m right, it means the output will still be armored even after patching out that line.
I’ll make a quick test by removing this line from my configuration and see if that changes something while the compilation runs.
Reporter | ||
Comment 48•4 years ago
|
||
Bingo, removing armor from my config make it work. So I’m quite sure your patch won’t work.
Assignee | ||
Comment 49•4 years ago
|
||
I'm glad you confirmed it's the armoring.
I wasn't aware that a config in gpg.conf can override the default. It sounds like it's better if we dynamically check if the data we've received from GPGME is armored or not, and only apply the armoring using RNP if we're using a buggy version.
Assignee | ||
Comment 50•4 years ago
|
||
Comment on attachment 9188378 [details] [diff] [review]
no-gpgme-unwrap-armor.patch
This patch cannot work. The change is in the signing code, I hadn't paid attention.
Assignee | ||
Updated•4 years ago
|
Assignee | ||
Comment 51•4 years ago
|
||
This patch v3 works for me in the following scenarios:
- default gpg.conf (no "armor" statement) and old GPG
(I used logging to confirm we detect the missing armoring and call RNP enarmor) - gpg.conf containing "armor"
(I used logging to confirm we detect the armored data)
In both scenarios, the message is correctly displayed.
Bruno, would you like to test this patch with your newer gpg versions?
Thanks in advance
Reporter | ||
Comment 52•4 years ago
|
||
Yes, it works for me! Congratulations on finding the root cause and fixing it properly. :)
Assignee | ||
Comment 53•4 years ago
|
||
Thank you for patiently working with us!
Assignee | ||
Comment 54•4 years ago
|
||
Comment 55•4 years ago
|
||
Pushed by kaie@kuix.de:
https://hg.mozilla.org/comm-central/rev/3396fcaf2cdc
Detect if output from GPGME.gpgme_op_decrypt_ext is armored. r=PatrickBrunschwig
Assignee | ||
Updated•4 years ago
|
Assignee | ||
Comment 56•4 years ago
|
||
Comment on attachment 9187153 [details]
Bug 1675939 - Allow fallback to GPGME decryption in additional RNP failure scenarios. r=PatrickBrunschwig
[Approval Request Comment]
Regression caused by (bug #): no
User impact if declined: smartcard users cannot use latest GnuPG versions
Testing completed (on c-c, etc.): manually
Risk to taking this patch (and alternatives if risky): low, impact limited to users of non-default config
Assignee | ||
Comment 57•4 years ago
|
||
Comment on attachment 9188424 [details]
Bug 1675939 - Detect if output from GPGME.gpgme_op_decrypt_ext is armored. r=PatrickBrunschwig
[Approval Request Comment]
Regression caused by (bug #): no
User impact if declined: smartcard users cannot use latest GnuPG versions
Testing completed (on c-c, etc.): manually
Risk to taking this patch (and alternatives if risky): low, impact limited to users of non-default config
Comment 58•4 years ago
|
||
Comment on attachment 9188424 [details]
Bug 1675939 - Detect if output from GPGME.gpgme_op_decrypt_ext is armored. r=PatrickBrunschwig
[Triage Comment]
Approved for beta
Comment 59•4 years ago
|
||
Comment on attachment 9187153 [details]
Bug 1675939 - Allow fallback to GPGME decryption in additional RNP failure scenarios. r=PatrickBrunschwig
[Triage Comment]
Approved for beta
Assignee | ||
Comment 60•4 years ago
|
||
Comment on attachment 9187153 [details]
Bug 1675939 - Allow fallback to GPGME decryption in additional RNP failure scenarios. r=PatrickBrunschwig
oh, this first part is already on the 84 branch.
Assignee | ||
Comment 61•4 years ago
|
||
Updated•4 years ago
|
Assignee | ||
Comment 62•4 years ago
|
||
Comment on attachment 9188424 [details]
Bug 1675939 - Detect if output from GPGME.gpgme_op_decrypt_ext is armored. r=PatrickBrunschwig
[Approval Request Comment]
Regression caused by (bug #): no
User impact if declined: smartcard users cannot use latest GnuPG versions
Testing completed (on c-c, etc.): manually
Risk to taking this patch (and alternatives if risky): low, impact limited to users of non-default config
Assignee | ||
Comment 63•4 years ago
|
||
Comment on attachment 9187153 [details]
Bug 1675939 - Allow fallback to GPGME decryption in additional RNP failure scenarios. r=PatrickBrunschwig
[Approval Request Comment]
Regression caused by (bug #): no
User impact if declined: smartcard users cannot use latest GnuPG versions
Testing completed (on c-c, etc.): manually
Risk to taking this patch (and alternatives if risky): low, impact limited to users of non-default config
Comment 64•4 years ago
|
||
Comment on attachment 9188424 [details]
Bug 1675939 - Detect if output from GPGME.gpgme_op_decrypt_ext is armored. r=PatrickBrunschwig
[Triage Comment]
Approved for esr78
Comment 65•4 years ago
|
||
Comment on attachment 9187153 [details]
Bug 1675939 - Allow fallback to GPGME decryption in additional RNP failure scenarios. r=PatrickBrunschwig
[Triage Comment]
Approved for esr78
Assignee | ||
Comment 66•4 years ago
|
||
Assignee | ||
Comment 67•4 years ago
|
||
(In reply to Pulsebot from comment #13)
Pushed by kaie@kuix.de:
https://hg.mozilla.org/comm-central/rev/4ace0f66e67d
Fix forgotton colon, reported by eslint. rs=bustage DONTBUILD
forgotton in initial esr78 uplift... sorry
got a=wsmwk in chat.
https://hg.mozilla.org/releases/comm-esr78/rev/a14eafb64ef5d1dedcca24530cab174816e9dbed
Assignee | ||
Comment 68•4 years ago
|
||
Bruno, I consider to backout (undo) the first of the two patches.
I believe it is unnecessary to fix your scenario.
And I discovered that it can cause false message feedback to be given - if the signature processing of a message results in a failure, our UI can incorrectly report that it's a decrypted message that we cannot decrypt.
Would you like to test that undoing
https://hg.mozilla.org/comm-central/rev/bfa8183cf7b8
https://hg.mozilla.org/comm-central/rev/4ace0f66e67d
still works as expected?
Reporter | ||
Comment 69•4 years ago
|
||
@Kai: Yeah, I think you’re right. I cannot test right now, but I’m pretty sure that won’t be an issue. I’ll re-open after 78.5.1 (since the revert has been targeted for this release) if it ever happens to break.
Comment 70•4 years ago
|
||
This already did work in TB 84.0b2, but it's broken again in both, TB 84.0b3, and Daily 85.0a1 (2020-12-04).
Reopening.
Also, can anyone confirm whether bug 1660041 is the exact same problem?
Comment 71•4 years ago
|
||
@Christian 1660041 is of different source: extra chars in the armored message, which should be stripped out by the Thunderbird (see https://bugzilla.mozilla.org/show_bug.cgi?id=1660041#c17)
Comment 72•4 years ago
|
||
The reason I'm asking is because the message from the Error Console is exactly the same for both bugs:
rnp_op_verify_execute returned unexpected: 268435457
And the initial fix for this bug did also work for the problematic messages mentioned in bug 1660041, at least temporarily with TB 84.0b2. But not anymore now with 84.0b3.
Assignee | ||
Comment 73•4 years ago
|
||
I think we should keep this bug fixed. The cause of the other problem is different from the issue described in this bug.
It is important feedback that the initial commit in this bug helped for the symptom in bug 1660041.
I have an idea what happened, but I think further discussion on this should be done in bug 1660041, I'll comment there.
Description
•