Implemented and backported for VSD 3.4
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Jan 21 2026
The "ca" root cert is not on the ldap, if that matters
In T8048#211860, @ikloecker wrote:some other certificates, but I guess those are from other tests
It also happens on CLI:
With Gpg4win 5.0.0 the LISTKEYS after the server lookup lists the (ephemeral?) ca@gnupg.test certificate and (!) the bob@gnupg.test certificate (and some other certificates, but I guess those are from other tests).
- VSD 3.3.4
- Gpg4win 5.0.0
Jan 20 2026
- gpg4win 5.0.0 @ win11
gpgme logs (also of vsd-3.3.4) will be useful.
I have not checked but I guess that the certificate is marked as ephemeal and kleopatra either lists ephemeral certificates or the ephemeral flag got removed to to a validation process,
Note: This does not happen on vsd-3.3.4
Fixed and backported for VSD 3.4
None of these certificates are for qualified signatures.
Try compare with a gpg4win 3.latest.
I have this fix committed to my working directory:
We have no CVE yet. However, CVE is also a good tag for security bugs,
I create diff with implementation via VirtualLock WinAPI: https://dev.gnupg.org/D622
On 2026-01-20, I found the message to security@gnupg.org of:
Message-ID: 4e708880-04ac-45bc-8d16-6b585f2652a1n@aisle.com
in may spam folder. It has a 10MB long attachment. That might be one of reasons to be identified as a spam.
Considering the current implementation (tpm2d doesn't support keyinfo like scdaemon), it would be good to check the buffer size.
(If key information is accessible easily, we can check with a specific key.)
Jan 19 2026
The gpgme logs show that the information for revoked keys should be there. We just need to check for it (and somehow visualize it).
pub:o:3072:1:3DA05D6B0A5998AF:1768822823:1863514800:::::::: fpr:::::::::C70F6D8F32DFE96F5C47C40B3DA05D6B0A5998AF: uid:o::::::::search (valid) <search@gnupg.test>\r:
gpgme.log (vsd 3.3.4):
Fixed. The problem was that the selected sections were stored in the 64-bit registry (unless browser integration was installed; see T8038), but they were read from the 32-bit registry.
Fixed.
Let's give this Normal priority.
Meh! The installation of the browser integration explicitly enables the 32-bit registry. Obviously a leftover from gpg4win 4.
In T8039#211727, @timegrid wrote:I wonder where the information of the previously installed components comes from, if not from the MementoSection_SEC_kleopatra fields.
Thanks for checking! So now we know why the line is missing. Looks like installing browser integration causes a broken installation (at least with respect to registry keys).
I searched the whole registry and found, that if browser integration is installed, this key still lives in WOW6432Node: Computer\HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gpg4win
Oh, surpisingly it's the other way around: if the information is given in the registry key, all components are preselected. If the key is missing (browser integration installed), only the installed components are preselected. I wonder where the information of the previously installed components comes from, if not from the MementoSection_SEC_kleopatra fields.
Fixed.
Another possibility would be to just add a revoked column (expiration date is already shown) to keep closer to the ldap schema.
Without browser integrations installed, the preselection works fine though.
Probably this happens, because the info in the registry is missing as soon as browser integration is installed, see T8038: NSIS: Updating line omitted if browser integration is installed
should properly uninstall the existing installation.