I forgot: Instead of importing the missing internal CA, this works:
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Mar 27 2019
I agree, the question is which CRL is checked when how. Maybe there is some mistake on my side. Here is a recipe for Debian:
Mar 26 2019
Many thanks for the fast fix! Decryption works now. I'll report another bug for encryption.
A quick note: The second workaround above does not work.
The presence or absence of the expired certificate in my keyring does not matter. The check by dirmngr fails regardless.
Jul 22 2016
On 2016-07-19, Justus Winter via BTS wrote:
Jan 29 2016
Hi Bernhard,
Oct 15 2015
Oct 2 2015
If I create a key as follows, no expiry date is set:
$ gpg2 --faked-system-time 20100101T000000 --default-cert-expire 1y
--quick-gen-key 'Test Key <test@example.org>'
If I edit a key to add a new user ID under a faked system time as follows, the
new user ID does not receive the specified expiry date.
$ faketime 2010-01-01 gpg2 --homedir test --edit-key --default-sig-expire 2013-12-31