-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
El 25-02-2013 19:54, Peter Loshin escribió:
...
> 2. On keeping an encrypted backup of my secret key material, what
> method is recommended for doing that? (Presumably something like
> "gpg --export-secret-keys | gpg --output secretkeymatter.gpg
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 03/01/2013 06:06 PM, Kristian Fiskerstrand wrote:
> On 03/01/2013 12:07 AM, Doug Barton wrote:
..
>
>> I hope you'll reconsider your decision.
>
> I certainly continuously consider constructive feedback on the
> setup, so will give it some mor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 03/01/2013 12:07 AM, Doug Barton wrote:
> On 02/28/2013 09:33 AM, Kristian Fiskerstrand wrote: | for a
> service that specifically targets the OpenPGP community, I |
> consider using the OpenPGP WoT more appropriate than any CA |
> Corporation.
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 02/28/2013 09:33 AM, Kristian Fiskerstrand wrote:
| for a service that specifically targets the OpenPGP community, I
| consider using the OpenPGP WoT more appropriate than any CA
| Corporation.
Kristian,
I certainly understand that perspective,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi Mark,
A belated answer to this email, as I'm reading through the backlog of
emails.
On 02/26/2013 03:43 PM, Mark H. Wood wrote:
> On Mon, Feb 25, 2013 at 05:54:34PM -0500, Peter Loshin wrote:
>> 3. On using a keyserver with HKPS support: when I
On 2013-02-27 at 10:57 +0100, Niels Laukens wrote:
> Apologies for cross-posting to both mailing lists, but since I got
> replies via both ways I feel this is the easiest way to sync them.
Current status: Kristian and I have debugged and he found the core
issue. If I load down my server, we can s
On 02/26/2013 06:43 AM, Mark H. Wood wrote:
> That service presents a self-signed certificate (I checked), which
> means that if you do not already have a copy of that cert. installed in
> your browser and marked trusted, then it cannot be verified.
This is not correct. As noted on the web site [
I got a new error today:
gpg: sending key 1A1ABC84 to hkp server pool.sks-keyservers.net
gpgkeys: HTTP post error 22: The requested URL returned error: 417
Expectation Failed
Never seen that one before. :)
Overall the performance of the sks-keyservers pool has been great for me
though. Thank
On 02/26/2013 02:19 AM, Peter Lebbing wrote:
On 26/02/13 07:43, Doug Barton wrote:
That worked for me, although I was a bit disappointed that placing the cert at
/etc/ssl/certs/ca.hkps.pool.sks-keyservers.net.cert didn't work like all the
docs said it should.
Please realise that if it would ha
On Mon, Feb 25, 2013 at 05:54:34PM -0500, Peter Loshin wrote:
> 3. On using a keyserver with HKPS support: when I attempt to connect
> (via Chrome) to https://sks-keyservers.net/, I get an error headlined
> "The site's security certificate is not trusted!", stating " the
> server presented a certif
On 26/02/13 11:56, Werner Koch wrote:
> Thus, it won't harm you to add such a kind of Salvation Army CA.
Okay, you made me laugh out loud, thanks :).
It probably won't hurt to add the sks-keyservers CA, although I don't know how
well they guard their private key. Probably fairly well, these are c
On Tue, 26 Feb 2013 11:19, pe...@digitalbrains.com said:
> In other words, trusting a certificate authority is currently an
> all-or-nothing
> thing where you now trust them to certify any SSL-protected service
> you connec
Right, they are all implicitly cross-signed. In reality there is no
sec
ender: gnupg-users-boun...@gnupg.org
Date: Tue, 26 Feb 2013 00:14:13
To: GnuPG Users
Subject: Re: Questions about OpenPGP best practices
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-
On 26/02/13 07:43, Doug Barton wrote:
> That worked for me, although I was a bit disappointed that placing the cert at
> /etc/ssl/certs/ca.hkps.pool.sks-keyservers.net.cert didn't work like all the
> docs said it should.
Please realise that if it would have worked, you would have installed that
sk
On 2013-02-26 09:14, Daniel Kahn Gillmor wrote:
> On 02/25/2013 11:52 PM, Niels Laukens wrote:
>> I find *.sks-keyservers.net unusable (unfortunately).
>>
>> More often than not, I get this:
>> gpgkeys: HTTP fetch error 7: couldn't connect: End of file
>>
>> tcpdump shows me that the server just cl
On Tue, 26 Feb 2013 08:52, ni...@dest-unreach.be said:
> It does work from time to time, so when doing a manual --recv-key, I
> usually get the key within a few tries. But when using e.g. caff (which
The problem is that this is a pool of servers and you don't know which
one you are currently usin
On 02/25/2013 11:52 PM, Niels Laukens wrote:
> I find *.sks-keyservers.net unusable (unfortunately).
>
> More often than not, I get this:
> gpgkeys: HTTP fetch error 7: couldn't connect: End of file
>
> tcpdump shows me that the server just closes the connection without an
> answer.
> It does wor
On 2013-02-26 07:51, Daniel Kahn Gillmor wrote:
> On 02/25/2013 02:54 PM, Peter Loshin wrote:
>> 1. "Don't use pgp.mit.edu". Which keyserver *should* be used? I assume
>> that a pool is better than a particular server; is there one
>> particular pool that is preferred? What about
>> http://pool.sks
On 02/25/2013 11:28 PM, Doug Barton wrote:
> lots, this one for example:
>
> https://help.ubuntu.com/community/GnuTLS
hmm, i don't use ubuntu myself, but i believe that documentation is
wrong, particularly this section:
https://help.ubuntu.com/community/GnuTLS#Deploying_the_Certificates
That
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 02/25/2013 11:10 PM, Daniel Kahn Gillmor wrote:
| On 02/25/2013 10:43 PM, Doug Barton wrote:
|> The Best Practices page you posted above actually suggests:
|>
|>keyserver hkps://hkps.pool.sks-keyservers.net
|>keyserver-options ca-cert-fil
On 02/25/2013 10:43 PM, Doug Barton wrote:
> The Best Practices page you posted above actually suggests:
>
> keyserver hkps://hkps.pool.sks-keyservers.net
> keyserver-options ca-cert-file=/path/to/CA/sks-keyservers.netCA.pem
>
> That worked for me, although I was a bit disappointed that placi
On 02/25/2013 02:54 PM, Peter Loshin wrote:
> 1. "Don't use pgp.mit.edu". Which keyserver *should* be used? I assume
> that a pool is better than a particular server; is there one
> particular pool that is preferred? What about
> http://pool.sks-keyservers.net/?
You should use hkp:// instead of ht
On 02/25/2013 02:54 PM, Peter Loshin wrote:
Many thanks to Daniel Kahn Gillmor for pointing to the best practices
page (https://we.riseup.net/riseuplabs+paow/openpgp-best-practices);
this information is very helpful.
Some questions about the information on this page:
1. "Don't use pgp.mit.edu".
On 2/25/13 5:54 PM, Peter Loshin wrote:
>
> 1. "Don't use pgp.mit.edu". Which keyserver *should* be used? I assume
> that a pool is better than a particular server; is there one
> particular pool that is preferred? What about
> http://pool.sks-keyservers.net/?
>
Yep, that's the one you want.
>
Many thanks to Daniel Kahn Gillmor for pointing to the best practices
page (https://we.riseup.net/riseuplabs+paow/openpgp-best-practices);
this information is very helpful.
Some questions about the information on this page:
1. "Don't use pgp.mit.edu". Which keyserver *should* be used? I assume
th
25 matches
Mail list logo