Page MenuHome GnuPG
Feed Advanced Search

Mar 20 2020

aheinecke created T4884: PKCS #15 support in gpgsm.
Mar 20 2020, 12:27 PM · Feature Request, gnupg, scd, S/MIME
aheinecke added a comment to T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.

Sample how GpgOL handles this: https://dev.gnupg.org/source/gpgol/browse/master/src/keycache.cpp;6f5f48c3d60e0af52f1a9f0e51f60ee653eeeb31$269

Mar 20 2020, 11:03 AM · Not A Bug, S/MIME, gpgme
aheinecke added a comment to T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.

I think what you're saying that there is *no way* to use GPGME in offline mode to validate x.509 certificates, and this is by design. Am I understanding that right?

Mar 20 2020, 11:00 AM · Not A Bug, S/MIME, gpgme
werner added a comment to T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.

After disabling the CRL check again in gpgsm.conf

Mar 20 2020, 8:56 AM · Not A Bug, S/MIME, gpgme

Mar 19 2020

dkg added a comment to T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.

I see no difference between the last two example stanzas that show you running ../run-verify. Are they supposed to have different output?

Mar 19 2020, 10:58 PM · Not A Bug, S/MIME, gpgme
dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

I'm aware of the metadata leakage risks of OCSP, and i share your concerns about them.

Mar 19 2020, 10:14 PM · Not A Bug, gnupg (gpg22), S/MIME
werner added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

OCSP can't be the default because it enables a web bug. The responder immediately sees when a signature is verified or a data is encrypted to a certificate.

Mar 19 2020, 7:00 PM · Not A Bug, gnupg (gpg22), S/MIME
dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

If CRLs or OCSP are a MUST in a given profile, and the cert chain has OCSP but no CRL, it seems like that profile should then try OCSP, rather than failing.

Mar 19 2020, 6:53 PM · Not A Bug, gnupg (gpg22), S/MIME
werner added a comment to T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.

That option does the same as --disable-dirmngr which in trun has the same effect as disable-crl-checks; see gnupg/sm/server.c#option_handler. If you want to check the validity of the cert you check the TRUST status lines. This is what gpgme does for you. An example is gpgme.tests/gpgsm/t-verify. You can run the tests also manually, I do this as follows:

Mar 19 2020, 6:25 PM · Not A Bug, S/MIME, gpgme
dkg added a comment to T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.

I think what you're saying that there is *no way* to use GPGME in offline mode to validate x.509 certificates, and this is by design. Am I understanding that right?

Mar 19 2020, 5:25 PM · Not A Bug, S/MIME, gpgme
werner edited projects for T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs., added: Not A Bug; removed Bug Report.
Mar 19 2020, 1:07 PM · Not A Bug, gnupg (gpg22), S/MIME
werner edited projects for T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set, added: Not A Bug; removed Bug Report.

I can see no bug here. See my comment over at T4881.

Mar 19 2020, 1:06 PM · Not A Bug, S/MIME, gpgme
werner added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

If you want OCSP you need to enable it. CRLs or OCSP are a MUST under the profile we developed gpgsm. This is why --disable-crl-checks by default is not possible. There are lot of interesting things you will come across if you start to use S/MIME. For example you also need to care about the algorithms used for intermediate certificates used to sign CRLs - they need to comply to the policy as well. Or the rarely used PSS padding we encounter sometimes and which is not supported and will probably not be supported

Mar 19 2020, 11:56 AM · Not A Bug, gnupg (gpg22), S/MIME
dkg created T4883: gpgme X.509 certificates have unknown validity in offline mode unless `disable-crl-checks` is set.
Mar 19 2020, 2:25 AM · Not A Bug, S/MIME, gpgme

Mar 18 2020

dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

I thought i'd try with other certificates. I started with the one from this website. It also fails to validate unless i supply --disable-crl-checks, apparently because the immediate issuer (the Let's Encrypt CA) doesn't offer CRLs, only OCSP responders. Perhaps --disable-crl-checks should be the default, or at least if there is no CRL available there shouldn't be a failure by default:

Mar 18 2020, 10:38 PM · Not A Bug, gnupg (gpg22), S/MIME
dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

Aha, i can get it to say f if i use --disable-crl-checks:

Mar 18 2020, 10:30 PM · Not A Bug, gnupg (gpg22), S/MIME
dkg added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

i didn't know that, thanks. i'm now seeing i (which i think means "invalid") in the same configuration:

Mar 18 2020, 9:36 PM · Not A Bug, gnupg (gpg22), S/MIME
werner added a comment to T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..

Add --with-validation to check the validity of a certificate in a listing.

Mar 18 2020, 9:07 PM · Not A Bug, gnupg (gpg22), S/MIME
dkg created T4881: "User ID" (Subject, subjectAltName) validity is inaccurate in gpgsm with sample certs..
Mar 18 2020, 8:55 PM · Not A Bug, gnupg (gpg22), S/MIME
werner moved T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF) from Backlog to For next release on the gnupg (gpg22) board.
Mar 18 2020, 3:50 PM · gnupg (gpg22), S/MIME, Bug Report
werner moved T4536: dirmngr fails to find OCSP signer certificate when responder is identified with key ID from Backlog to For next release on the gnupg (gpg22) board.
Mar 18 2020, 3:49 PM · S/MIME, gnupg (gpg22), Bug Report
werner changed the status of T4536: dirmngr fails to find OCSP signer certificate when responder is identified with key ID from Open to Testing.

Sorry, I have not yet followed you test plan but given that we have the patch in master for a long time now I think it is okay to port it to 2.2.

Mar 18 2020, 2:15 PM · S/MIME, gnupg (gpg22), Bug Report

Mar 12 2020

dkg added a comment to T4878: gpgsm's default for include-certs should include the signing cert if it is self-signed.

For reference, here's an error message from openssl smime when it is trying to verify an e-mail message with no embedded certificate at all (despite it knowing about the relevant certificate):

Mar 12 2020, 2:01 PM · gnupg24, gnupg (gpg23), S/MIME, Feature Request
werner triaged T4878: gpgsm's default for include-certs should include the signing cert if it is self-signed as Low priority.
Mar 12 2020, 9:59 AM · gnupg24, gnupg (gpg23), S/MIME, Feature Request
dkg created T4878: gpgsm's default for include-certs should include the signing cert if it is self-signed.
Mar 12 2020, 7:51 AM · gnupg24, gnupg (gpg23), S/MIME, Feature Request

Mar 9 2020

dkg added a comment to T4857: GPGSM: Put encryption key also into signature.

This is an important fix for a sensible S/MIME use case. Thanks for working on it!

Mar 9 2020, 8:40 PM · gnupg, S/MIME

Mar 5 2020

werner lowered the priority of T4538: Support PSS signed CRLs from Normal to Low.

It is actually questionable whether PSS is a better padding scheme than PKCS#1, see
https://www.metzdowd.com/pipermail/cryptography/2019-November/035449.html . PSS seems indeed be rarely used; quoting Peter from a followup on his writeup: “If I get time over the weekend, and I can find a CMS message signed with RSA-PSS, I'll create a forgery using xor256.”

Mar 5 2020, 10:27 AM · dirmngr, S/MIME, libksba

Mar 4 2020

aheinecke added a comment to T4538: Support PSS signed CRLs.

To summarize: The DGN CRL uses a the RSA-PSS Padding / Signature Scheme. ( https://de.wikipedia.org/wiki/Probabilistic_Signature_Scheme )

Mar 4 2020, 3:17 PM · dirmngr, S/MIME, libksba

Feb 26 2020

aheinecke created T4857: GPGSM: Put encryption key also into signature.
Feb 26 2020, 12:52 PM · gnupg, S/MIME

Feb 15 2020

werner changed the status of T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF) from Open to Testing.

Fixed in master and 2.2

Feb 15 2020, 7:25 PM · gnupg (gpg22), S/MIME, Bug Report
werner claimed T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF).
Feb 15 2020, 7:08 PM · gnupg (gpg22), S/MIME, Bug Report
werner edited projects for T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF), added: gnupg (gpg22); removed gnupg.

Really interesting: The code didn't changed since since 2003 and the bug must have been there all the time. It does happen only for 25% of the certificates with CR and LF; the others have padding characters at the end '=' which is also an indication of the end of the base64 block. I wonder why this has not been reported more often; maybe because most people import binary certificates.

Feb 15 2020, 7:01 PM · gnupg (gpg22), S/MIME, Bug Report
thomas added a comment to T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF).

Wald certificate will be fixed very soon. But as it is not fixed yet, I provided an http link, not https for you.

Feb 15 2020, 3:41 PM · gnupg (gpg22), S/MIME, Bug Report
werner added projects to T4847: "gpgsm: invalid radix64 character 2d skipped" when trying to import a PEM file with DOS line endings (CR+LF): S/MIME, gnupg.

Thomas, please provide a sample certificate. I can't access the intevation site to see whether one of the links has the cert. And pretty please fix the wald certificates!

Feb 15 2020, 12:43 PM · gnupg (gpg22), S/MIME, Bug Report

Feb 3 2020

Joey_D added a comment to T4699: X.509 certificate request more comfortable.

Hi Andre, did you already get anywhere with this task? Thanks a lot in advance, Joachim

Feb 3 2020, 9:22 PM · Restricted Project, kleopatra, S/MIME, gpg4win, Feature Request

Dec 17 2019

werner added a comment to T4777: Pinentry sometimes mixes languages.

The description comes from gpg/gpgsm while the prompts are from gpg-agent. Thus if the agent has been started with the German local but gpgsm without a local this would explain the behaviour.

Dec 17 2019, 11:39 AM · gnupg (gpg23), S/MIME, gpgagent
werner added a project to T4779: GpgSM: "Invalid Object" error when importing .p12 certs with wrong passphrase: gnupg (gpg23).
Dec 17 2019, 11:36 AM · gnupg24 (gnupg-2.4.3), Restricted Project, gnupg (gpg23), S/MIME
aheinecke reassigned T4779: GpgSM: "Invalid Object" error when importing .p12 certs with wrong passphrase from wk to werner.
Dec 17 2019, 10:57 AM · gnupg24 (gnupg-2.4.3), Restricted Project, gnupg (gpg23), S/MIME
aheinecke assigned T4783: GpgSM: Configuration Error for Certificates without CLR dps to werner.
Dec 17 2019, 10:57 AM · S/MIME
aheinecke created T4779: GpgSM: "Invalid Object" error when importing .p12 certs with wrong passphrase.
Dec 17 2019, 10:28 AM · gnupg24 (gnupg-2.4.3), Restricted Project, gnupg (gpg23), S/MIME
aheinecke created T4777: Pinentry sometimes mixes languages.
Dec 17 2019, 10:19 AM · gnupg (gpg23), S/MIME, gpgagent

Dec 7 2019

werner updated the task description for T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.
Dec 7 2019, 4:28 PM · gnupg (gpg22), S/MIME, Bug Report
werner changed the visibility for T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.
Dec 7 2019, 4:28 PM · gnupg (gpg22), S/MIME, Bug Report
werner updated the task description for T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.
Dec 7 2019, 4:26 PM · gnupg (gpg22), S/MIME, Bug Report
werner closed T4696: Fresh certificate get's pulled into certificate chain with expired root certificate as Resolved.
Dec 7 2019, 1:15 PM · gnupg (gpg22), S/MIME, Bug Report

Dec 6 2019

werner moved T4696: Fresh certificate get's pulled into certificate chain with expired root certificate from For next release to Ready for release on the gnupg (gpg22) board.
Dec 6 2019, 8:30 PM · gnupg (gpg22), S/MIME, Bug Report
werner added a comment to T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.

I found a solution for master and 2.1.19 which minimizes the risk of regressions:

Dec 6 2019, 8:29 PM · gnupg (gpg22), S/MIME, Bug Report

Dec 5 2019

aheinecke closed T3961: GpgOL: Add option to prefer S/MIME over OpenPGP in autoresolution as Resolved.

I think this is now resolved.

Dec 5 2019, 1:16 PM · S/MIME, gpgol

Dec 4 2019

werner triaged T4767: gpgme_signature_t exp_timestamp behaves differently for OpenPGP vs. CMS as Low priority.
Dec 4 2019, 10:43 AM · OpenPGP, S/MIME, gpgme, Bug Report
dkg added a comment to T4767: gpgme_signature_t exp_timestamp behaves differently for OpenPGP vs. CMS.

Very few OpenPGP data signatures have an expiration time either, fwiw. I have never actually seen one in the wild, and no one that i know uses --ask-sig-expire or --default-sig-expire (it shows up in the cupt test suite and the apt test suite, but doesn't appear to be actually used by anything).

Dec 4 2019, 10:03 AM · OpenPGP, S/MIME, gpgme, Bug Report
werner added a comment to T4767: gpgme_signature_t exp_timestamp behaves differently for OpenPGP vs. CMS.

CMS signatures do not have a expiration time. Further the meaning of the expiration time of one of the certificates also depends on the validation model (shell or chain); thus a one-to-one relationship between these times is not possible.

Dec 4 2019, 8:56 AM · OpenPGP, S/MIME, gpgme, Bug Report
werner triaged T4765: gpgsm --import should not try to invoke dirmngr if it is not necessary as Low priority.
Dec 4 2019, 8:47 AM · gnupg24, gnupg (gpg23), S/MIME, Bug Report
dkg created T4767: gpgme_signature_t exp_timestamp behaves differently for OpenPGP vs. CMS.
Dec 4 2019, 8:02 AM · OpenPGP, S/MIME, gpgme, Bug Report

Dec 3 2019

dkg created T4765: gpgsm --import should not try to invoke dirmngr if it is not necessary.
Dec 3 2019, 10:26 PM · gnupg24, gnupg (gpg23), S/MIME, Bug Report
werner added a comment to T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.

Thank you.

Dec 3 2019, 3:00 PM · gnupg (gpg22), S/MIME, Bug Report
destogl added a comment to T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.

I uploaded the certificate files. For a test please do the following:

Dec 3 2019, 2:31 PM · gnupg (gpg22), S/MIME, Bug Report
destogl changed the visibility for T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.
Dec 3 2019, 2:28 PM · gnupg (gpg22), S/MIME, Bug Report

Nov 27 2019

werner added a comment to T4696: Fresh certificate get's pulled into certificate chain with expired root certificate.

Sorry, a fix didn't made it into 2.2.18.

Nov 27 2019, 8:19 AM · gnupg (gpg22), S/MIME, Bug Report

Nov 26 2019

werner triaged T4756: gpgsm --list-keys behaves differently than gpg when --passphrase is supplied as Normal priority.
Nov 26 2019, 4:52 PM · Feature Request, S/MIME

Nov 25 2019

werner triaged T4757: gpgsm --import --quiet is not quiet as Low priority.
Nov 25 2019, 10:19 PM · S/MIME, Bug Report
dkg created T4757: gpgsm --import --quiet is not quiet.
Nov 25 2019, 8:43 PM · S/MIME, Bug Report
dkg created T4756: gpgsm --list-keys behaves differently than gpg when --passphrase is supplied.
Nov 25 2019, 7:06 PM · Feature Request, S/MIME

Nov 21 2019

werner triaged T4751: gpgsm unable to import a PKCS12 file with a NULL password as Normal priority.
Nov 21 2019, 8:13 AM · gnupg, Feature Request, S/MIME
dkg created T4751: gpgsm unable to import a PKCS12 file with a NULL password.
Nov 21 2019, 4:22 AM · gnupg, Feature Request, S/MIME

Nov 7 2019

werner lowered the priority of T4696: Fresh certificate get's pulled into certificate chain with expired root certificate from High to Normal.
Nov 7 2019, 3:18 PM · gnupg (gpg22), S/MIME, Bug Report

Oct 4 2019

aheinecke moved T4543: GpgOL: Moved S/MIME mails can no longer be read by other clients from Backlog to In Progress on the g10code board.
Oct 4 2019, 4:34 PM · g10code, S/MIME, gpg4win, gpgol
aheinecke added a project to T4543: GpgOL: Moved S/MIME mails can no longer be read by other clients: g10code.
Oct 4 2019, 4:31 PM · g10code, S/MIME, gpg4win, gpgol
aheinecke renamed T4543: GpgOL: Moved S/MIME mails can no longer be read by other clients from GpgOL: Moved S/MIME mails with attachments can no longer be read by other clients to GpgOL: Moved S/MIME mails can no longer be read by other clients.
Oct 4 2019, 4:14 PM · g10code, S/MIME, gpg4win, gpgol

Sep 9 2019

aheinecke claimed T4699: X.509 certificate request more comfortable.

I give this normal priority even if it is a whish because I have the same whish and already have some code around that would make it more comfortable, especially if it is used directly in GpgOL.

Sep 9 2019, 11:26 AM · Restricted Project, kleopatra, S/MIME, gpg4win, Feature Request
werner added projects to T4699: X.509 certificate request more comfortable: gpg4win, S/MIME.
Sep 9 2019, 7:40 AM · Restricted Project, kleopatra, S/MIME, gpg4win, Feature Request

Sep 5 2019

werner triaged T4696: Fresh certificate get's pulled into certificate chain with expired root certificate as High priority.

Thanks for the sample certs. I noticed the posts but had not the time to look into them.

Sep 5 2019, 3:56 PM · gnupg (gpg22), S/MIME, Bug Report

Aug 22 2019

gniibe added a comment to T4480: GPGSM: Duplicated IMPORT_OK status lines emitted.

It appears (for me) correct behavior.

Aug 22 2019, 3:52 AM · S/MIME

Jul 5 2019

aheinecke closed T4561: GPG / GPGSM: Pinentry cancels lead to wrong error codes as Resolved.

Works for me! :-)

Jul 5 2019, 9:44 AM · S/MIME, gnupg
aheinecke merged T3928: canceling password dialog for decrypting is not recognized correctling. into T4561: GPG / GPGSM: Pinentry cancels lead to wrong error codes.
Jul 5 2019, 9:33 AM · S/MIME, gnupg

Jun 13 2019

werner added a comment to T4257: GPGME: op_verify failes for S/MIME with EBADF in multithreaded signature verification.

I have a larger change for the wait code in the works. This will go into 1.14.0 but not in 1.13.1

Jun 13 2019, 9:06 AM · S/MIME, gpgme

Jun 7 2019

aheinecke created T4561: GPG / GPGSM: Pinentry cancels lead to wrong error codes.
Jun 7 2019, 9:56 AM · S/MIME, gnupg

Jun 6 2019

werner added a comment to T4257: GPGME: op_verify failes for S/MIME with EBADF in multithreaded signature verification.

I had to patch strace to follow threads but not forks (P8) and then when built with support for -k I tracked it down: In the inbound handler we close the fd immediately on EOF. However the upper layers don't know about it and a select fails with EBADF. Of course we could ignore the EBADF, figure out the closed fd and restart. The problem is that another thread may have opened a new oobject and that will get the last closed fd assigned - bummer.

Jun 6 2019, 5:08 PM · S/MIME, gpgme
aheinecke added a comment to T4257: GPGME: op_verify failes for S/MIME with EBADF in multithreaded signature verification.

Just noticed that due to me failing to properly understand re-entrant locks the run-thread test is broken at least on windows in that it never waits for completion. So running out of filedescriptors is to expect. I'll fix the test.

Jun 6 2019, 9:44 AM · S/MIME, gpgme
aheinecke added a comment to T4257: GPGME: op_verify failes for S/MIME with EBADF in multithreaded signature verification.

My observation from running the verify threaded test on windows is that it does behave differently. The EBADF does not occur.

Jun 6 2019, 8:51 AM · S/MIME, gpgme

Jun 5 2019

werner added a comment to T4257: GPGME: op_verify failes for S/MIME with EBADF in multithreaded signature verification.

Something(tm) closes an arbitrary file descriptor behind our back. Not easy to track down because strace can not trace only threads - it always wants to trace all children as well - which is a bit too much and leads to other problems.

Jun 5 2019, 9:03 PM · S/MIME, gpgme
werner raised the priority of T4257: GPGME: op_verify failes for S/MIME with EBADF in multithreaded signature verification from Normal to High.
Jun 5 2019, 9:00 PM · S/MIME, gpgme

Jun 4 2019

werner claimed T4257: GPGME: op_verify failes for S/MIME with EBADF in multithreaded signature verification.
Jun 4 2019, 11:42 AM · S/MIME, gpgme
werner moved T4257: GPGME: op_verify failes for S/MIME with EBADF in multithreaded signature verification from Backlog to QA for next release on the gpgme board.
Jun 4 2019, 11:03 AM · S/MIME, gpgme
werner removed a project from T4379: Invalid crypto engine importing a certificate: gpgme.
Jun 4 2019, 10:17 AM · S/MIME, Bug Report

Jun 3 2019

werner added a comment to T4555: GpgSM: BER Error / Invalid radix64 character 2d skipped if newline is missing at EOF.

A newline is required by the PEM standard.

Jun 3 2019, 4:37 PM · Bug Report, S/MIME
aheinecke created T4555: GpgSM: BER Error / Invalid radix64 character 2d skipped if newline is missing at EOF.
Jun 3 2019, 4:18 PM · Bug Report, S/MIME

May 29 2019

werner added a comment to T4536: dirmngr fails to find OCSP signer certificate when responder is identified with key ID.

Thanks, the mentioned OpenSSL option should be helpful.

May 29 2019, 9:19 AM · S/MIME, gnupg (gpg22), Bug Report
misterzed88 added a comment to T4536: dirmngr fails to find OCSP signer certificate when responder is identified with key ID.

A high level test description is:

  1. Configure both gpgsm and dirmngr to use OCSP.
  2. Import the responder signer certificate with gpgsm --import.
  3. Use a certificate with OCSP responder extension present, or configure a default OCSP responder in dirmngr.
  4. Configure your OCSP responder to identify itself with key ID (and not subject name)
  5. Attempt to sign or verify with gpgsm.
  6. You should get an error, with dirmngr logs showing that the responder signer certificate could not be found.
May 29 2019, 9:11 AM · S/MIME, gnupg (gpg22), Bug Report
misterzed88 added a comment to T4535: gpgsm --sign prints misleading error message when using default key.

Thank you for a quick fix (despite this being a minor problem).

May 29 2019, 8:51 AM · gnupg (gpg22), S/MIME, Bug Report

May 28 2019

aheinecke created T4543: GpgOL: Moved S/MIME mails can no longer be read by other clients.
May 28 2019, 3:10 PM · g10code, S/MIME, gpg4win, gpgol
werner added a comment to T4536: dirmngr fails to find OCSP signer certificate when responder is identified with key ID.

Do you have any test cases? Note that T3966 is due to missing support for SHA-256.

May 28 2019, 12:36 PM · S/MIME, gnupg (gpg22), Bug Report
werner closed T3966: Dirmngr: no suitable certificate found to verify the OCSP response as Resolved.
May 28 2019, 12:32 PM · gpg4win, dirmngr, S/MIME
werner added a comment to T3966: Dirmngr: no suitable certificate found to verify the OCSP response.

We only supported SHA-1 signed OCSP requests. Fix will go into 2.2.16.

May 28 2019, 12:29 PM · gpg4win, dirmngr, S/MIME

May 27 2019

werner triaged T4537: gpgsm support for timestamp signatures as Normal priority.
May 27 2019, 3:58 PM · gnupg24, S/MIME, Feature Request
werner triaged T4536: dirmngr fails to find OCSP signer certificate when responder is identified with key ID as Normal priority.
May 27 2019, 3:57 PM · S/MIME, gnupg (gpg22), Bug Report
werner closed T4535: gpgsm --sign prints misleading error message when using default key as Resolved.

Thanks to your very good analysis, this was easy to fix.

May 27 2019, 3:49 PM · gnupg (gpg22), S/MIME, Bug Report
werner triaged T4535: gpgsm --sign prints misleading error message when using default key as Low priority.
May 27 2019, 3:29 PM · gnupg (gpg22), S/MIME, Bug Report

May 24 2019

werner added a comment to T4538: Support PSS signed CRLs.

Interesting tinge: The main CRL of the dgn.de CA uses a nextUpdate in the year 2034 (15 years in the future) which would force dirmngr to cache the CRL until then. However, the CRL of the intermediate certificate has a nextUpdate only one month in the future. There is currently no entry in that second level CRL, so their idea might be that an updated second level CRL will also trigger a reload of the main CRL. I have not checked how we implement that in Dirmngr but I doubt that such a thing will work for us and that it is in any way standard compliant.

May 24 2019, 11:59 AM · dirmngr, S/MIME, libksba
werner added a subtask for T4538: Support PSS signed CRLs: T4523: Gpg4win: Multiple problems reported 05-2019.
May 24 2019, 9:10 AM · dirmngr, S/MIME, libksba
werner removed a parent task for T4538: Support PSS signed CRLs: T4523: Gpg4win: Multiple problems reported 05-2019.
May 24 2019, 9:10 AM · dirmngr, S/MIME, libksba