I have an X509 CA certificate I have imported and I have added the fingerprint
to trustlist.txt.
With the default configuration, gpgsm will attempt (via dirmngr) to verify
that the certificate is valid, so instructing dirmngr to obtain the CRL for
this certificate. The certificate has no CRL DP, so dirmngr attempts to
contact LDAP servers for the CRL. This, too, fails (I have none) so fetching
the CRL fails. Although the error message from dirmngr is somewhat obscure
("configuration error") I believe dirmngr is behaving correctly.
Since the CRL was unobtainable, gpgsm rejects the attempt to sign the
document. This is despite the key being listed in trustlist.txt
If I include the option --disable-trusted-cert-crl-check then the signing
proceeds without any problem.
The gpgsm man page suggests that "relax" in trustlist.txt is equivalent to
the --disable-trusted-cert-crl-check option. This simply not true:
adding "relax" to the trustlist.txt is not sufficient to allow the signing to
proceed.
As a work-around, I have added "disable-trusted-cert-crl-check" to gpgsm.conf.
Whilst undesirable, the security implications for doing this should be minimal
(I hope!), but it's still a bug that should be fixed.
HTH,
Paul.