Problems with cert validation via CRL

David Gray deg at davidegray.com
Tue Feb 21 18:59:16 CET 2017


Thanks, Peter!

According to the documentation the trusted certainty need to be in a folder named "trusted-certs" in the home directory.  I don't believe I've copied them there manually, so if it hasn't happened automatically that could very well be the issue.  I'm at work but once I get home I'll check it out and report back.

Really appreciate the help,

Dave

Sent from my iPhone

> On Feb 21, 2017, at 10:13 AM, Peter Lebbing <peter at digitalbrains.com> wrote:
> 
>> On 21/02/17 13:20, David Gray wrote:
>> I'm no expert, but when I look at the debug info (attached to
>> original email), it appears that gpgsm is able to get the crl that my
>> cert points to but it may be having trouble parsing it.
> 
> Reading that part made me think it couldn't find the issuer of the CRL:
> 
>> dirmngr[3184.0]: error fetching certificate by subject: Configuration error
>> dirmngr[3184.0]: CRL issuer certificate {92616B82E1A2A0AA4FEC67F1C2A3F7B48000C1EC} not found
> 
> When I fetch the CRL we're talking about, OpenSSL tells me about it:
> 
>> Certificate Revocation List (CRL):
>>        Version 2 (0x1)
>>    Signature Algorithm: sha256WithRSAEncryption
>>        Issuer: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO SHA-256 Client Authentication and Secure Email CA
>>        Last Update: Feb 20 16:07:34 2017 GMT
>>        Next Update: Feb 24 16:07:34 2017 GMT
>>        CRL extensions:
>>            X509v3 Authority Key Identifier: 
>>                keyid:92:61:6B:82:E1:A2:A0:AA:4F:EC:67:F1:C2:A3:F7:B4:80:00:C1:EC
>> 
>>            X509v3 CRL Number: 
>>                822
> 
> The issuer is the certificate that gpgsm knows about:
> 
>> Certificate:
>>    Data:
>>        Version: 3 (0x2)
>>        Serial Number:
>>            e0:23:cb:15:12:83:53:89:ad:61:6e:7a:54:67:6b:21
>>    Signature Algorithm: sha256WithRSAEncryption
>>        Issuer: C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root
>>        Validity
>>            Not Before: Dec 22 00:00:00 2014 GMT
>>            Not After : May 30 10:48:38 2020 GMT
>>        Subject: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO SHA-256 Client Authentication and Secure Email CA
>> [...]
>>        X509v3 extensions:
>>            X509v3 Authority Key Identifier: 
>>                keyid:AD:BD:98:7A:34:B4:26:F7:FA:C4:26:54:EF:03:BD:E0:24:CB:54:1A
>> 
>>            X509v3 Subject Key Identifier: 
>>                92:61:6B:82:E1:A2:A0:AA:4F:EC:67:F1:C2:A3:F7:B4:80:00:C1:EC
>> [...]
>> SHA1 Fingerprint=59:B8:25:FC:08:86:0B:04:B3:92:CC:25:FE:C4:8C:76:07:53:B6:89
> 
> I suspect that even though gpgsm knows about it, dirmngr might not,
> hence the failing CRL verification. I think you need to feed the
> certificate to dirmngr as well.
> 
> Whether this is actually the reason you're having problems, I don't know.
> 
> HTH,
> 
> Peter.
> 
> -- 
> I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
> You can send me encrypted mail if you want some privacy.
> My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
> 



More information about the Gnupg-users mailing list