Page MenuHome GnuPG
Feed Advanced Search

May 8 2018

aheinecke assigned T3953: GPGSM: Treat EXPKEYSIG as error to werner.

I think this issue is important as GPGME should not report "Green" / Everything OK in that case and only have the EXPKEYSIG in details.

May 8 2018, 4:00 PM · Bug Report, S/MIME, gnupg

May 7 2018

aheinecke created T3966: Dirmngr: no suitable certificate found to verify the OCSP response.
May 7 2018, 1:59 PM · gpg4win, dirmngr, S/MIME

May 4 2018

aheinecke created T3961: GpgOL: Add option to prefer S/MIME over OpenPGP in autoresolution.
May 4 2018, 8:23 AM · S/MIME, gpgol

May 3 2018

aheinecke closed T3923: dirmngr: CRL's on windows are not properly cached / parsed as Resolved.

This is resolved in my opinion. I've tested with some larger CRL's and it worked on Windows.

May 3 2018, 10:47 AM · Bug Report, gpg4win, S/MIME, dirmngr

May 2 2018

aheinecke added a parent task for T2110: Gpgsm 2.1 external key search gives duplicated results: T3899: Gpg4win 3.1.1.
May 2 2018, 1:41 PM · gnupg (gpg22), S/MIME, Bug Report, gpg4win, Windows, Windows 32
aheinecke closed T2110: Gpgsm 2.1 external key search gives duplicated results as Resolved.

No longer happens when the good old ldapwrapper is used.

May 2 2018, 1:41 PM · gnupg (gpg22), S/MIME, Bug Report, gpg4win, Windows, Windows 32

Apr 30 2018

aheinecke triaged T3948: GPGSM: Multiple issues reported to KMail as Normal priority.

The highest priority I see here is for T3953 which I think is a bug that might result in a good signature shown for an expired, but otherwise valid and trusted certificate.

Apr 30 2018, 3:24 PM · gnupg, S/MIME
aheinecke added a parent task for T3955: GPGSM: Might not handle extended key usage properly: T3948: GPGSM: Multiple issues reported to KMail.
Apr 30 2018, 3:22 PM · S/MIME, gnupg
aheinecke added a subtask for T3948: GPGSM: Multiple issues reported to KMail: T3955: GPGSM: Might not handle extended key usage properly.
Apr 30 2018, 3:22 PM · gnupg, S/MIME
aheinecke renamed T3955: GPGSM: Might not handle extended key usage properly from GPGSM: Does not handle extended key usage to GPGSM: Might not handle extended key usage properly.
Apr 30 2018, 3:21 PM · S/MIME, gnupg
aheinecke created T3955: GPGSM: Might not handle extended key usage properly.
Apr 30 2018, 3:21 PM · S/MIME, gnupg
aheinecke added a parent task for T3954: GPGSM: Might be too strict in certificate chain validation: T3948: GPGSM: Multiple issues reported to KMail.
Apr 30 2018, 3:13 PM · S/MIME, gnupg
aheinecke added a subtask for T3948: GPGSM: Multiple issues reported to KMail: T3954: GPGSM: Might be too strict in certificate chain validation.
Apr 30 2018, 3:13 PM · gnupg, S/MIME
aheinecke created T3954: GPGSM: Might be too strict in certificate chain validation.
Apr 30 2018, 3:12 PM · S/MIME, gnupg
aheinecke added a parent task for T3953: GPGSM: Treat EXPKEYSIG as error: T3948: GPGSM: Multiple issues reported to KMail.
Apr 30 2018, 3:00 PM · Bug Report, S/MIME, gnupg
aheinecke added a subtask for T3948: GPGSM: Multiple issues reported to KMail: T3953: GPGSM: Treat EXPKEYSIG as error.
Apr 30 2018, 3:00 PM · gnupg, S/MIME
aheinecke created T3953: GPGSM: Treat EXPKEYSIG as error.
Apr 30 2018, 3:00 PM · Bug Report, S/MIME, gnupg
aheinecke added a subtask for T3948: GPGSM: Multiple issues reported to KMail: T3952: GPGSM: Add weak digest algo handling to disable MD5 signatures.
Apr 30 2018, 2:03 PM · gnupg, S/MIME
aheinecke added a parent task for T3952: GPGSM: Add weak digest algo handling to disable MD5 signatures: T3948: GPGSM: Multiple issues reported to KMail.
Apr 30 2018, 2:03 PM · S/MIME, gnupg
aheinecke created T3952: GPGSM: Add weak digest algo handling to disable MD5 signatures.
Apr 30 2018, 2:03 PM · S/MIME, gnupg

Apr 27 2018

aheinecke created T3948: GPGSM: Multiple issues reported to KMail.
Apr 27 2018, 3:44 PM · gnupg, S/MIME

Apr 25 2018

aheinecke added a parent task for T2110: Gpgsm 2.1 external key search gives duplicated results: T3937: Dirmgnr: X509 Searches on Windows can hang.
Apr 25 2018, 4:52 PM · gnupg (gpg22), S/MIME, Bug Report, gpg4win, Windows, Windows 32
aheinecke added a comment to T2110: Gpgsm 2.1 external key search gives duplicated results.

Still happens. There are also "BER" errors that seem random.

Apr 25 2018, 4:52 PM · gnupg (gpg22), S/MIME, Bug Report, gpg4win, Windows, Windows 32

Apr 24 2018

aheinecke created T3933: Kleopatra: Set allow-ocsp in dirmngr if OCSP is enabled through config dialog.
Apr 24 2018, 9:18 AM · kleopatra, dirmngr, S/MIME

Apr 23 2018

aheinecke added a parent task for T3929: GpgOL: S/MIME Auto resolving fallback does not work: T3899: Gpg4win 3.1.1.
Apr 23 2018, 4:04 PM · S/MIME, gpgol
aheinecke closed T3929: GpgOL: S/MIME Auto resolving fallback does not work as Resolved.

Fixed with: https://commits.kde.org/libkleo/1318d2e13764e736d29c902500c21979e99eef9c

Apr 23 2018, 4:04 PM · S/MIME, gpgol
aheinecke renamed T3929: GpgOL: S/MIME Auto resolving fallback does not work from GpgOL to GpgOL: S/MIME Auto resolving fallback does not work.
Apr 23 2018, 2:04 PM · S/MIME, gpgol
werner added a comment to T3923: dirmngr: CRL's on windows are not properly cached / parsed.

See also T2448

Apr 23 2018, 9:26 AM · Bug Report, gpg4win, S/MIME, dirmngr

Apr 21 2018

werner triaged T3927: gpgsm certificate import fails because of hardcoded password length limitation as Low priority.

This for importing passwords using a somewhat heuristic approach to accommodate for all the weird things other PKCS#12 implementations do. I have not looked into the specs for a decade and thus can't tell you the reason for that limitations. There might have been one back then. In any case PKCS#12 is the most insecure things in the PKCS suite and it is questionable whether this can be called a standard.

Apr 21 2018, 7:24 PM · Feature Request, gnupg24, S/MIME

Apr 20 2018

aheinecke changed the status of T3923: dirmngr: CRL's on windows are not properly cached / parsed from Open to Testing.

Looks ok now in my tests. I still want to test against more CA's with more CLRs (e.g. COMODO and CACert)

Apr 20 2018, 4:39 PM · Bug Report, gpg4win, S/MIME, dirmngr
aheinecke added a parent task for T3923: dirmngr: CRL's on windows are not properly cached / parsed: T3899: Gpg4win 3.1.1.
Apr 20 2018, 4:38 PM · Bug Report, gpg4win, S/MIME, dirmngr
aheinecke created T3923: dirmngr: CRL's on windows are not properly cached / parsed.
Apr 20 2018, 3:42 PM · Bug Report, gpg4win, S/MIME, dirmngr

Apr 16 2018

aheinecke added a comment to T3907: Internal error when encrypting to cacert certificate.

I wonder if CACert intentionally sabotages X509 / CMS.

Apr 16 2018, 1:39 PM · Bug Report, S/MIME, gpg4win
aheinecke created T3907: Internal error when encrypting to cacert certificate.
Apr 16 2018, 11:16 AM · Bug Report, S/MIME, gpg4win

Feb 12 2018

bernhard added a comment to T3348: gpgsm: should default to --disable-crl-checks.

When disabling CRL checks, you expose the user to drawbacks by outdated or revoked certificates. While I agree that improving implementations to not check the validation information too often or even build proxies is a good idea, I have a tendency to keep crl checking enabled for CMS crypto operations because it seems to be a lesser drawback.

Feb 12 2018, 10:06 AM · gpgme, gnupg, S/MIME

Jan 31 2018

werner added a comment to T3348: gpgsm: should default to --disable-crl-checks.

--use-tor does not avoid it because the CRL-DP can be made unique for each certificate. Depending on the verification model a CRL or OCSP lookup is necessary for correct evalution of a signature (shell model as used for qualified signature). This is why we in gpg honor-keyserver-url is not enabled by default; the keyserver URL take from the key is the OpenPGP counterpart of the CRL-DP.

Jan 31 2018, 6:11 PM · gpgme, gnupg, S/MIME
dkg added a comment to T3348: gpgsm: should default to --disable-crl-checks.

it is the decision of the user to use such a certificate.

Jan 31 2018, 5:04 PM · gpgme, gnupg, S/MIME
werner added a comment to T3348: gpgsm: should default to --disable-crl-checks.

The implemented X.509 profiles require that the status of a certificate is to be checked. CRLs are also not looked up for each verification but only once during their lifetime. Some CA have unreasonable short lifetimes for their CRL but it is the decision of the user to use such a certificate.

Jan 31 2018, 9:47 AM · gpgme, gnupg, S/MIME

Jan 30 2018

dkg added a comment to T3348: gpgsm: should default to --disable-crl-checks.

Additionally, we might want some sort of delayed or batched CRL-checking that doesn't block signature verification with another network interaction, but would protect the user against future problems.

Jan 30 2018, 5:46 PM · gpgme, gnupg, S/MIME

Oct 24 2017

werner closed T1644: Do not expect KeyIDs to be unique as Resolved.
Oct 24 2017, 5:51 PM · gnupg (gpg22), S/MIME, Bug Report

Oct 20 2017

werner added a comment to T1644: Do not expect KeyIDs to be unique.

DCO = Developer's Certificate of Origin. See gnupg/doc/HACKING under "** License Policy" .

Oct 20 2017, 3:58 PM · gnupg (gpg22), S/MIME, Bug Report
werner edited projects for T2110: Gpgsm 2.1 external key search gives duplicated results, added: gnupg (gpg22); removed gnupg (gpg21), gnupg.
Oct 20 2017, 1:54 PM · gnupg (gpg22), S/MIME, Bug Report, gpg4win, Windows, Windows 32
werner edited projects for T1644: Do not expect KeyIDs to be unique, added: gnupg (gpg22); removed gnupg (gpg21).
Oct 20 2017, 1:41 PM · gnupg (gpg22), S/MIME, Bug Report
perske added a comment to T1644: Do not expect KeyIDs to be unique.

I am preparing the patch I am using against 2.2.0. What is DCO?

Oct 20 2017, 1:29 PM · gnupg (gpg22), S/MIME, Bug Report
werner edited projects for T1644: Do not expect KeyIDs to be unique, added: gnupg (gpg21); removed gnupg, gnupg (gpg20).
Oct 20 2017, 1:16 PM · gnupg (gpg22), S/MIME, Bug Report
werner added a comment to T1644: Do not expect KeyIDs to be unique.

@perske, may I ask you to send a DCO and an possible updated patch against 2.2 to gnupg-devel@ ? I would like to add it to 2.2.2. Sorry for the delays.

Oct 20 2017, 1:14 PM · gnupg (gpg22), S/MIME, Bug Report

Sep 18 2017

werner edited projects for T3305: GPGSM should support default-new-key-algo like GnuPG, added: gnupg (gpg23); removed gnupg (gpg22).
Sep 18 2017, 4:28 PM · gnupg24, gnupg (gpg23), S/MIME

Aug 24 2017

werner triaged T3348: gpgsm: should default to --disable-crl-checks as Normal priority.
Aug 24 2017, 5:23 PM · gpgme, gnupg, S/MIME

Aug 23 2017

werner added a project to T3348: gpgsm: should default to --disable-crl-checks: gpgme.

I would suggest that MUAs who care about privacy do no use S/MIME at all or at least direct GPGME to not consider CRLs during signature verification. We don't have such a feature in GPGME right now but I think that is the right place to add it. X.509 is way to complicated to avoid meta data leaks.

Aug 23 2017, 10:59 AM · gpgme, gnupg, S/MIME

Aug 17 2017

marcus added a project to T3348: gpgsm: should default to --disable-crl-checks: gnupg.
Aug 17 2017, 3:03 PM · gpgme, gnupg, S/MIME

Aug 16 2017

dkg added a comment to T3348: gpgsm: should default to --disable-crl-checks.

i think it's strictly worse, even when the certificates are "trusted" in sense (1) -- with OpenPGP keyserver lookups, at least it is the client who decides which keyserver to use, on what protocol, to look up the given issuer fingerprint.

Aug 16 2017, 10:33 PM · gpgme, gnupg, S/MIME

Aug 15 2017

marcus added a comment to T3348: gpgsm: should default to --disable-crl-checks.

My comment was only in response to this:

Aug 15 2017, 5:53 PM · gpgme, gnupg, S/MIME
dkg added a comment to T3348: gpgsm: should default to --disable-crl-checks.

I see at least two different kinds of "trust" here.

Aug 15 2017, 5:50 PM · gpgme, gnupg, S/MIME
marcus added a comment to T3348: gpgsm: should default to --disable-crl-checks.

If the certificate is signed by a trusted root CA, doesn't that mean that we at least trust the URLs in the certificate chain for CRL and OCSP access?

Aug 15 2017, 5:40 PM · gpgme, gnupg, S/MIME
dkg added a comment to T3348: gpgsm: should default to --disable-crl-checks.

Making matters worse, i note that some CRLs, like those issued by MIT's Lincoln Lab are quick and easy to fetch over the Internet directly, but hang or timeout when fetched via Tor.

Aug 15 2017, 1:38 AM · gpgme, gnupg, S/MIME
bremner added a comment to T3348: gpgsm: should default to --disable-crl-checks.

Debian Bug 842291 shows some performance impact of the CRL checks (as well as the potential for privacy problems).

Aug 15 2017, 1:29 AM · gpgme, gnupg, S/MIME

Aug 14 2017

dkg created T3348: gpgsm: should default to --disable-crl-checks in the S1 Public space.
Aug 14 2017, 11:14 PM · gpgme, gnupg, S/MIME

Jul 27 2017

werner triaged T3305: GPGSM should support default-new-key-algo like GnuPG as Normal priority.
Jul 27 2017, 12:29 PM · gnupg24, gnupg (gpg23), S/MIME
aheinecke created T3305: GPGSM should support default-new-key-algo like GnuPG.
Jul 27 2017, 10:45 AM · gnupg24, gnupg (gpg23), S/MIME
werner added a project to T2313: gpg --import of secret keys prompts for passwords in 2.1: S/MIME.

Well, iff we implement that for gpg we also need to implement it for gpgsm.

Jul 27 2017, 9:41 AM · S/MIME, Feature Request, Stalled, gnupg, OpenPGP

Jul 17 2017

marcus added a comment to T1457: Decryption of msg encrypted to expired smime certificate fails if local-user is set.

I don't know if decryption method was changed, but at least the "can't sign using" message appears to be unchanged yet (from looking at the source code).

Jul 17 2017, 2:38 PM · Bug Report, gnupg, S/MIME

May 8 2017

werner closed T1259: pinentry should show fingerprint if certify a OpenPGP certificate as Wontfix.

7 years old and meanwhile Kleopatra has been reworked. Further showing two fingerprint (for the signing and the too be signed key) is confusing. In particular because the passphrase for the signing key is usually cached.

May 8 2017, 2:34 PM · gnupg, S/MIME, Feature Request

Apr 4 2017

kai merged T1861: gpgsm does not handle certificates with ambiguous name correctly into T1644: Do not expect KeyIDs to be unique.
Apr 4 2017, 2:57 PM · gnupg (gpg22), S/MIME, Bug Report
kai merged task T1861: gpgsm does not handle certificates with ambiguous name correctly into T1644: Do not expect KeyIDs to be unique.
Apr 4 2017, 2:57 PM · Duplicate, Bug Report, gnupg, gnupg (gpg20), S/MIME

Apr 3 2017

werner closed T2230: gpgsm decryption with smartcard fails with "Invalid session key" as Resolved.

we are now at 2.1.20 - time to mark this one as resolved.

Apr 3 2017, 10:51 PM · Restricted Project, gnupg, scd, Bug Report, S/MIME

Mar 30 2017

admin created S/MIME.
Mar 30 2017, 6:42 PM

Feb 22 2017

aheinecke set Version to master on T2972: GPGSM: Chain too long on cross signed certificate.
Feb 22 2017, 3:06 PM · Bug Report, gnupg, KDE, S/MIME
aheinecke added a comment to T2972: GPGSM: Chain too long on cross signed certificate.

Feb 22 2017, 3:06 PM · Bug Report, gnupg, KDE, S/MIME
aheinecke set External Link to https://bugs.kde.org/show_bug.cgi?id=376563 on T2972: GPGSM: Chain too long on cross signed certificate.
Feb 22 2017, 3:06 PM · Bug Report, gnupg, KDE, S/MIME
aheinecke added projects to T2972: GPGSM: Chain too long on cross signed certificate: S/MIME, KDE, gnupg, Bug Report.
Feb 22 2017, 3:06 PM · Bug Report, gnupg, KDE, S/MIME

Jan 6 2017

werner removed a project from T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo: Unreleased.
Jan 6 2017, 5:30 PM · gnupg, Bug Report, S/MIME

Nov 29 2016

werner added a comment to T2230: gpgsm decryption with smartcard fails with "Invalid session key".

Yeah, lets do that. Commit 8489b12 to go into 2.1.17. Thanks.

Nov 29 2016, 7:51 PM · Restricted Project, gnupg, scd, Bug Report, S/MIME
werner added a project to T2230: gpgsm decryption with smartcard fails with "Invalid session key": Restricted Project.
Nov 29 2016, 7:51 PM · Restricted Project, gnupg, scd, Bug Report, S/MIME
lorenz added a comment to T2230: gpgsm decryption with smartcard fails with "Invalid session key".

What about putting in the suggested patch as an intermediate step towards a full
solution?

Nov 29 2016, 4:58 PM · Restricted Project, gnupg, scd, Bug Report, S/MIME

Sep 28 2016

werner added a project to T2110: Gpgsm 2.1 external key search gives duplicated results: S/MIME.
Sep 28 2016, 9:46 AM · gnupg (gpg22), S/MIME, Bug Report, gpg4win, Windows, Windows 32

Jul 31 2016

perske added a comment to T1644: Do not expect KeyIDs to be unique.

D198: 866_gnupg-2.1.14.diff

Jul 31 2016, 10:00 PM · gnupg (gpg22), S/MIME, Bug Report
perske added a comment to T1644: Do not expect KeyIDs to be unique.

With T1590 irrelevant, issues 1862, 1970, and 2336 resolved (very special
thanks to everyone who helped in fixing them!), this is the only problem left in
version 2.1.14 that forces me to use a patched version of gpgsm for my webmailer.

My patch from 2014-04-30 works, but by mistake ("if (cmp < 0)" in place of "if
(cmp > 0)" it selects not the newest but the oldest one of the ambiguous
certificates what is bad in the DFN PKI because an older one of the certificates
is revoked, so I attach a new patch against 2.1.14.

Jul 31 2016, 10:00 PM · gnupg (gpg22), S/MIME, Bug Report

Jun 15 2016

werner added a project to T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo: Unreleased.
Jun 15 2016, 10:15 PM · gnupg, Bug Report, S/MIME
werner closed T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo as Resolved.
Jun 15 2016, 10:15 PM · gnupg, Bug Report, S/MIME
werner removed a project from T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo: Restricted Project.
Jun 15 2016, 10:15 PM · gnupg, Bug Report, S/MIME

Jun 14 2016

TARehman added a comment to T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo.

Ah, I see. The GUI interface affects the S/MIME algorithm, not the general
one. I don't know why I didn't put that together sooner. Well, I'm glad that
it revealed the minor bug anyway.

Jun 14 2016, 4:12 PM · gnupg, Bug Report, S/MIME
werner added a project to T2273: Using GPA and Kleopatra in gpg4win does not allow you to change cipher-algo: S/MIME.
Jun 14 2016, 4:07 PM · gnupg, Bug Report, S/MIME

May 13 2016

lorenz added a comment to T2230: gpgsm decryption with smartcard fails with "Invalid session key".

Anything else I can do to help?

May 13 2016, 10:12 AM · Restricted Project, gnupg, scd, Bug Report, S/MIME

Feb 24 2016

lorenz added a comment to T2230: gpgsm decryption with smartcard fails with "Invalid session key".

For what it's worth, with the following trivial patch the decryption works:

diff --git a/sm/decrypt.c b/sm/decrypt.c
index a560272..aa6e874 100644

  • a/sm/decrypt.c

+++ b/sm/decrypt.c
@@ -74,9 +74,9 @@ prepare_decryption (ctrl_t ctrl, const char *hexkeygrip, const
char *desc,

    log_printhex ("pkcs1 encoded session key:", seskey, seskeylen);

  n=0;
  • if (seskeylen == 24)

+ if (seskeylen == 24 || seskeylen == 16)

{
  • /* Smells like a 3-des key. This might happen because a SC has

+ /* Smells like a 3-des or AES key. This might happen because a SC has

          already done the unpacking. */
     }
   else

I am not sure this is a good solution, though, it is probably better to somehow
pass along the information whether the padding is already stripped or not.

Kind regards,

Lorenz
Feb 24 2016, 4:05 PM · Restricted Project, gnupg, scd, Bug Report, S/MIME

Jan 29 2016

lorenz added a comment to T2230: gpgsm decryption with smartcard fails with "Invalid session key".

This is likey due to the card already decoding the pkcs#1 - we need to look
closer at this use case.

For reference, I have a OpenPGP v2.0 card from "ZeitControl".

I think the card will always remove the encoding internally and only return the
plaintext, as far as I can tell from
http://g10code.com/docs/openpgp-card-2.0.pdf, Section 7.2.9

Jan 29 2016, 10:31 AM · Restricted Project, gnupg, scd, Bug Report, S/MIME
werner added a project to T2230: gpgsm decryption with smartcard fails with "Invalid session key": S/MIME.
Jan 29 2016, 9:37 AM · Restricted Project, gnupg, scd, Bug Report, S/MIME

Sep 21 2015

werner removed a project from T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256: Restricted Project.
Sep 21 2015, 8:55 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME
werner closed T1932: GnuPG 2.1 (gpgsm):set default of 'hash-algo' from sha1 to sha256 as Resolved.
Sep 21 2015, 8:55 AM · Feature Request, gnupg, gnupg (gpg21), S/MIME

Sep 8 2015

werner added a comment to T2091: allow s/mime encryption without issuer certificates present.

This should be something similar to gpg --always-trust

Sep 8 2015, 8:51 AM · gnupg, S/MIME, Feature Request
werner added projects to T2091: allow s/mime encryption without issuer certificates present: S/MIME, gnupg.
Sep 8 2015, 8:51 AM · gnupg, S/MIME, Feature Request

Aug 31 2015

aheinecke closed T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating as Resolved.
Aug 31 2015, 9:03 AM · gnupg, Bug Report, S/MIME, dirmngr
aheinecke removed a project from T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating: Restricted Project.
Aug 31 2015, 9:03 AM · gnupg, Bug Report, S/MIME, dirmngr
aheinecke added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

yes there are no remaining problems that I can see here.

Thanks -> resolved.

Aug 31 2015, 9:03 AM · gnupg, Bug Report, S/MIME, dirmngr

Aug 30 2015

werner added a comment to T1978: Dirmngr ldap CRL checks prevent dirmngr from terminating.

aheinecke: Did you had a chance to test this with 2.1.7 or master?

Aug 30 2015, 10:15 PM · gnupg, Bug Report, S/MIME, dirmngr

Aug 28 2015

aheinecke closed T1921: Duplicated certificates in gpgsm pubring (2.1) as Resolved.
Aug 28 2015, 11:04 PM · Bug Report, gnupg, dirmngr, S/MIME
aheinecke removed a project from T1921: Duplicated certificates in gpgsm pubring (2.1): Restricted Project.
Aug 28 2015, 11:04 PM · Bug Report, gnupg, dirmngr, S/MIME

Jun 25 2015

werner added a comment to T1921: Duplicated certificates in gpgsm pubring (2.1).

Pushed as 5e1a844. Thanks.

Jun 25 2015, 1:07 PM · Bug Report, gnupg, dirmngr, S/MIME
werner added a project to T1921: Duplicated certificates in gpgsm pubring (2.1): Restricted Project.
Jun 25 2015, 1:07 PM · Bug Report, gnupg, dirmngr, S/MIME

Jun 24 2015

aheinecke added a comment to T1921: Duplicated certificates in gpgsm pubring (2.1).

Ok now I found kbxutil and learned about ephemeral certificates (Yep reading
helps) ;-)

After the first import kbxutil lists the Root certificate three times.
Twice with ephemeral flags, once without. So gpgsm -k shows it only once. But
kbxutil --find-dups already lists those duplicates.

fpr=11:B9:1B:31:EE:09:E0:84:4D:25:4E:58:7A:65:CE:51:84:F3:6B:70 recno=5 7 8
fpr=98:2D:D4:1D:BE:91:EE:72:B3:B8:43:33:F2:21:F7:74:64:39:08:7E recno=2 4 6

Now after the verify gpgsm takes the first of those certificates and unsets the
ephemeral flag as it was used as part of a complete trustchain. (sm/certchain.c:

If the first certificate was ephemeral we now have two certificates that are not
ephemeral but are the same and gpgsm -k shows both.

My solution is to check in keydb_store_cert for ephemeral certificates and
instead of inserting those again without the ephemeral flag to remove the
ephemeral flag of the existing certificate.

It's still unclear to me though why there were three certificates (Two ephemeral
and one normal) I would have expected one ephemeral and one normal certificate.

Patch attached.

Jun 24 2015, 7:09 PM · Bug Report, gnupg, dirmngr, S/MIME
aheinecke added a comment to T1921: Duplicated certificates in gpgsm pubring (2.1).

D287: 648_0001-sm-Fix-cert-storage-for-ephemeral-certs.patch

Jun 24 2015, 7:09 PM · Bug Report, gnupg, dirmngr, S/MIME