gpg4win expired code signing cert; please renew.

have at anonymous.sex have at anonymous.sex
Fri Oct 17 11:19:54 CEST 2025


Hi, WK@, thanks for your attention to this.  Please note up top that 
this is a bug report about a beta release.

On Fri, 17 Oct 2025 09:33:38 +0200, Werner Koch <wk at gnupg.org> wrote:

>Further: Authenticode signatures have a timestamp and thus you have 
>assurance when they were issued.
>
>Gpg4win 5.0 is not too far away.

I don’t know if it was clear amidst other discussions on this thread:  I 
reported a real-world cert validation error on a Microsoft platform, of 
Gpg4win 5 beta.  The latest gpg4win-beta package (369) was published 
2025-09-05, two months after cert expiry — thus, **the Authenticode 
timestamp does not help.**  Prior discussion of the Authenticode 
timestamp, which I hope was not misplaced in topic drift:

https://lists.gnupg.org/pipermail/gnupg-users/2025-October/067899.html
(I messed up my PGP authentication on the metadata of that post, whoops!  
msg sig ok.  Did anyone notice?)

IMO, a bad Authenticode signature which *actually* fails validation with 
error on Microsoft OS is a bug in beta-369.  Well, beta means to shake 
out bugs!  I respectfully suggest these fixes:

1. A gpg4win-5-beta version bump, with a valid Authenticode sig on new 
binary packages (and any other recent beta bugfixes).

2. Review gpg4win release engineering procedure to add guardrail check 
for invalid Authenticode sig.  To protect non-beta releases, too, 
automated regression test should catch the *bad signature* that causes 
Microsoft platform error on (AFAIK) the gpg4win-5.0.0-beta369.exe 
binary.  Security software should not have any security failures of 
software supply chain integrity checks.

I’m sorry, I cannot contribute any patch.  I can’t even check the 
Authenticode sig myself.  I don’t have any Authenticode stuff on my 
machine.  I do not use Gpg4win!  A Microsoft user told me of in-the-wild 
failure on a Microsoft platform; I pieced together the rest of the 
puzzle.

I myself can easily verify your PGP dist sig.  But this does not help 
the PGP-newbie Microsoft user, with whom I am communicating 
remotely/anonymously from my never-Microsoft platform.  My machine says:

>impurify at sex:~/dl/gpg4win$ gpg --verify gpg4win-5.0.0-beta369.exe.sig gpg4win-5.0.0-beta369.exe
>gpg: Signature made Fri Sep  5 12:08:09 2025 UTC
>gpg:                using EDDSA key 6DAA6E64A76D2840571B4902528897B826403ADA
>gpg: Good signature from "Werner Koch (dist signing 2020)"
>Primary key fingerprint: 6DAA 6E64 A76D 2840 571B  4902 5288 97B8 2640 3ADA

(I will try to hold topic-drift replies in abeyance until this primary 
issue is adequately addressed.)

Always,

have at anonymous.sex

-- 
A makeshift way to distribute my current PQ-PGP key:
https://lists.gnupg.org/pipermail/gnupg-users/attachments/20250107/4732a382/attachment.key
01A6D81EEAD7EEEC393DEC1401F4894C154E1B8EE32E9059CA5566792A836823
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 297 bytes
Desc: not available
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20251017/6c799d5c/attachment.sig>


More information about the Gnupg-users mailing list