Yesterday
Wed, Apr 8
Maybe. EncryptionResult has a list of invalid recipients and I've changed the code to show the Retry dialog only if there's at least one invalid recipient.
Your suggestion sounds ok to me, maybe with a slight change for the message: "Failed to encrypt the notepad because at least on certificate could not be validated."
I tried to add the list of invalid recipients to the message box, but it seems that gpgsm stops the validation of the certificates at the first invalid recipient. I got only the first Bob certificate reported as invalid recipient when I tried to encrypt to both Bob certificates so that it doesn't make sense to list the (incomplete) list of invalid recipients. It also means that Kleopatra cannot update the invalid recipient certificates because it knows only of one invalid certificate.
Ideally the certificate would change, but Kleopatra has no idea that this certificate turned out to be not valid. In fact, Kleopatra doesn't even know that the encryption failed because of some certificate. It could have failed for any other reason (e.g. full disk). Kleopatra only knows that an error occurred and offers to retry with lower security. (I looked at GpgOL and it does the same.)
yes, basically it's what we want.
Tue, Apr 7
Current implementation for the case of an S/MIME certificate which turns out to be invalid when it's used for encryption. Is that what we want?
Mon, Mar 30
Fri, Mar 27
Before making subtickets for each application: I wonder if it is not all Kleopatra anyway? Isn't the security approval dialog basically Kleopatra?
The equivalent for invalid S/MIME certificates are not-certified *PGP certificates.
(Valid/invalid are not ideal as technical terms as they have a broad general meaning, too. I hope my usage here is correct ;-) It is what I gathered from an explanation given by Werner.)
Invalid certs (as stated in the status column in Kleopatra) are mainly S/MIME certs (e.g. with missing root cert, CRL check failed, etc). I haven't seen invalid pgp certs yet (might be e.g. very old ones with missing self signature).
Invalid and expired are different cases.
Thu, Mar 26
Issue 1) should be implemented as already described (on error -> dialog to retry with "always trust" flag)
@ebo and me talked about this and T6701: GpgOL: Use GPGME_ENCRYPT_ALWAYS_TRUST. We think, it's best to have a short meeting to discuss further changes.
Wed, Mar 25
Tue, Mar 24
Ticket for the hang on file encryption: T8187: Kleopatra: File encryption with invalid S/MIME certificate hangs indefinitely
According to Werner, that should be:
--dry-run
Don't make any changes (this is not completely implemented).Maybe those smime certs will do:
It needs to be clarified which kind of errors should be handled and which kind of S/MIME certificates should be allowed to be used for encryption:
- Valid certificates where the CRL check (or OCSP check?) fails
- Invalid certificates (e.g. because of incomplete chain/missing CA)
- Expired certificates
Mon, Mar 23
Do we have a test certificate for this? The certificate in T6702#176845 is expired.
To clarify, the state in Kleopatra Ingo described a year ago has changed, with T7579: Kleopatra: improve menu items the refresh option in the Tools menu was removed. Both actions to update certificates - in the context menu and in the details - are/work the same.
Removing kleopatra tag since Kleopatra already does what's requested.

