Today
See the gnupg-devel mailing list for more discussions. Subject: libgcrypt P256 signature malleability via weak DER enforcement"
Windows7 has long reached end-of-life. Do not use it unless you have a fully air-gapped system. In this case, continue to use gpg4win 4.4.1 or resort to the command line of 5.0.0 which should still work.
Yesterday
I don't know how I'm supposed to change/fix this. Not even gpg does what the ticket wants (see the sub ticket). And gpg doesn't report sufficient information to Kleopatra via gpgme. In fact, gpg doesn't emit a STATUS_TRUST_* message if the signing key is expired. Hence, gpgme reports "unknown" validity for the signing key, so that Kleopatra would always print "The used key is not certified by you or any trusted person." for expired keys even if the key was fully certified before it expired.
Fixed. Some examples for the improved texts which are based on the texts that gpg prints.
- good signature with expired key
- good signature with revoked key
- good signature with uncertified key
- expired signature with certified key
- expired signature with uncertified key
Indeed, it looks this way. Thanks so much! Windows 10 and 11 in my case.
On gpg4win-5.0.0 @ win11 I created a bunch of smime certs:
- For each keyusage
- keyEncipherment, dataEncipherment
- digitalSignature
- nonRepudiation
- digitalSignature, nonRepudiation
- Alice's certs with different names, Bob's certs with same name for each key
If the group policy „Allow the use off connected experiences in Office“ is set like this:
Panel Used By
| Dashboard | Home | |
| Dashboard | Restricted Dashboard |




