1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-12-23 10:29:58 +01:00
Werner Koch 3ef0938cfd
agent: Make --allow-loopback-pinentry the default.
* agent/gpg-agent.c (oNoAllowLoopbackPinentry): New.
(opts): Add --no-allow-loopback-pinentry.  Hide
description of --allow-loopback-pinentry.
(parse_rereadable_options): Set opt.allow_loopback_pinentry by
default.
(main): Replace allow-loopback-pinentry by no-allow-loopback-pinentry
in the gpgconf list.
* tools/gpgconf-comp.c (gc_options_gpg_agent): Ditto.
--

Given that a user can anyway change that options in the gpg-agent.conf
file and that gpg needs to be invoked with --pinentry-mode=loopback
the former default does not make much sense - in that option is useful
at all.  There was a discussion of this topic on gnupg-devel in April
without a clear result.  So we try this new default and just in case
real problems are found for the majority of installations, we can
revert that.  The new default is also aligned with GnuPG's policy to
make its use easier and only require users with very high security
standards to tweak certain options (those users have anyway modeled
their threat model and configured their software according to this).

Signed-off-by: Werner Koch <wk@gnupg.org>
2016-05-04 09:24:18 +02:00
..
2008-06-25 11:14:48 +00:00
2014-12-14 12:15:21 +01:00
sm/
2006-11-14 10:23:21 +00:00
2010-06-10 10:39:44 +00:00
DCO
2013-04-17 11:26:27 +02:00
2003-01-09 13:24:01 +00:00
2009-07-22 13:33:46 +00:00
2010-06-10 10:39:44 +00:00
2007-07-04 19:49:40 +00:00
2007-03-08 18:31:56 +00:00
2014-07-03 11:03:22 +02:00
2015-11-30 11:47:23 +01:00
2013-04-19 12:01:22 +02:00
2013-02-12 14:15:21 +09:00
2016-04-06 18:45:09 +02:00
2016-01-27 14:00:15 +01:00
2007-05-08 13:59:41 +00:00
2006-08-21 20:20:23 +00:00
2008-06-25 11:14:48 +00:00
2012-11-30 12:47:49 -05:00
2009-07-22 13:33:46 +00:00
2011-08-12 14:40:47 +02:00
2016-01-09 11:28:42 +01:00
2016-01-27 14:00:15 +01:00
2006-12-06 16:38:34 +00:00
2015-11-30 11:32:00 +01:00