[Bug 1846155] Re: gpg --generate-key --batch prompt with SIGINT breaks shell

Seth Arnold 1846155 at bugs.launchpad.net
Tue Oct 1 21:54:29 UTC 2019


Does reset fix the terminal?

Thanks

** Changed in: gnupg2 (Ubuntu)
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to gnupg2 in Ubuntu.
https://bugs.launchpad.net/bugs/1846155

Title:
  gpg --generate-key  --batch prompt with SIGINT breaks shell

Status in gnupg2 package in Ubuntu:
  Incomplete

Bug description:
  Description:
  An unusual password prompt appears when passing --batch during key generation. Using control+c to break to the shell, breaks the shell environment completely.

  Steps to replicate:

  As a root user:
  #> gpg --batch --gen-key temp.batch

  Please enter the pass phrase to protect your new key

  Passphrase: ________________________________
   <Ok>         | <Cancel>

  Ctrl-C (SIGINT) breaks to the shell, and the shell becomes completely
  unstable/unusable after this point. Input is varied with some key
  presses writing to the prompt, and others causing the screen to loop
  back to the previous prompt displayed above. Options are no longer
  able to be selected to cleanly close.

  
  > ~/.gnupg/gpg.conf
  cert-digest-algo SHA256
  digest-algo SHA256

  # Generates batch instructions
  cat > temp.batch << EOF
  %echo Generating a standard key
  Key-Type: RSA
  Key-Length: 4096
  Subkey-Length: 4096
  Name-Real: temp
  Name-Email: temp at contoso.com
  Expire-Date: 0
  %pubring temp.pub
  %secring temp.key
  # commit needed to echo
  %commit
  %echo done

  
  #> gpg --version

  gpg (GnuPG) 2.2.4
  libgcrypt 1.8.1
  Copyright (C) 2017 Free Software Foundation, Inc.
  License GPLv3+: GNU GPL version 3 or later <https://gnu.org/licenses/gpl.html>
  This is free software: you are free to change and redistribute it.
  There is NO WARRANTY, to the extent permitted by law.

  Home: /root/.gnupg
  Supported algorithms:
  Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA
  Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
          CAMELLIA128, CAMELLIA192, CAMELLIA256
  Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
  Compression: Uncompressed, ZIP, ZLIB, BZIP2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnupg2/+bug/1846155/+subscriptions



More information about the foundations-bugs mailing list