[Bug 1846155] Re: gpg --generate-key --batch prompt with SIGINT breaks shell
Seth Arnold
1846155 at bugs.launchpad.net
Tue Oct 1 21:54:29 UTC 2019
Does reset fix the terminal?
Thanks
** Changed in: gnupg2 (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to gnupg2 in Ubuntu.
https://bugs.launchpad.net/bugs/1846155
Title:
gpg --generate-key --batch prompt with SIGINT breaks shell
Status in gnupg2 package in Ubuntu:
Incomplete
Bug description:
Description:
An unusual password prompt appears when passing --batch during key generation. Using control+c to break to the shell, breaks the shell environment completely.
Steps to replicate:
As a root user:
#> gpg --batch --gen-key temp.batch
Please enter the pass phrase to protect your new key
Passphrase: ________________________________
<Ok> | <Cancel>
Ctrl-C (SIGINT) breaks to the shell, and the shell becomes completely
unstable/unusable after this point. Input is varied with some key
presses writing to the prompt, and others causing the screen to loop
back to the previous prompt displayed above. Options are no longer
able to be selected to cleanly close.
> ~/.gnupg/gpg.conf
cert-digest-algo SHA256
digest-algo SHA256
# Generates batch instructions
cat > temp.batch << EOF
%echo Generating a standard key
Key-Type: RSA
Key-Length: 4096
Subkey-Length: 4096
Name-Real: temp
Name-Email: temp at contoso.com
Expire-Date: 0
%pubring temp.pub
%secring temp.key
# commit needed to echo
%commit
%echo done
#> gpg --version
gpg (GnuPG) 2.2.4
libgcrypt 1.8.1
Copyright (C) 2017 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <https://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Home: /root/.gnupg
Supported algorithms:
Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
CAMELLIA128, CAMELLIA192, CAMELLIA256
Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnupg2/+bug/1846155/+subscriptions
More information about the foundations-bugs
mailing list