Hi Gary,
this problem has been discussed already. Here are some quotes:
and
We produce our certificates with our own CA. They neither contain a revocation-URL nor is a OCSP server available. We cannot revoke our certificates and hence windows cannot check whether they were revoked.
Could you please tell me what function from the windows cryptographic API is returning the error message “Die Sperrprüfung konnte keine Sperrprüfung für das Zertifikat durchführen.” when eM Client uses this function to create the S/MIME signature. Is it a function that will select a certificate? Or is it a function that will create a signature? Is eM Client using some kind of cryptographic library that is available on different platforms or is eM Client using the windows cryptographic API directly?
I understand that eM Client cannot be configured such that this error message will be avoided. So I must change the behavior of the windows OS and this will be a lot easier if I know what exact routine from the cryptographic API is used by eM Client.
I nothing helps we must add a revocation-URL to our certificates or add an empty revocation list to windows somehow or create an OCSP-server that will return an empty revocation list.
Kind regards
Peter