currently, gpgsm sends a request to the dirmngr for a crl check when verifying signatures.
This is a metadata leak that is at least as bad as --auto-key-retrieve by default. Potentially, it's even worse, because the S/MIME certificate could include arbitrary URLs to hit up for a CRL.
I think gpgsm should default to --disable-crl-checks, and we should think more clearly about other ways to ensure that an X.509 certificate is still valid.