[svn] GnuPG - r4406 - trunk/doc

svn author dshaw cvs at cvs.gnupg.org
Thu Jan 18 00:38:57 CET 2007


Author: dshaw
Date: 2007-01-18 00:38:56 +0100 (Thu, 18 Jan 2007)
New Revision: 4406

Modified:
   trunk/doc/ChangeLog
   trunk/doc/gpg.texi
Log:
* gpg.texi (GPG Configuration Options): Make http_proxy option
documentation match reality.  (BUGS): Warn about
hibernate/safe-sleep/etc writing main RAM to disk, despite locking.


Modified: trunk/doc/ChangeLog
===================================================================
--- trunk/doc/ChangeLog	2007-01-16 18:12:43 UTC (rev 4405)
+++ trunk/doc/ChangeLog	2007-01-17 23:38:56 UTC (rev 4406)
@@ -1,3 +1,10 @@
+2007-01-17  David Shaw  <dshaw at jabberwocky.com>
+
+	* gpg.texi (GPG Configuration Options): Make http_proxy option
+	documentation match reality.
+	(BUGS): Warn about hibernate/safe-sleep/etc writing main RAM to
+	disk, despite locking.
+
 2006-12-08  Werner Koch  <wk at g10code.com>
 
 	* gnupg.texi (direntry): Rename gpg to gpg2.

Modified: trunk/doc/gpg.texi
===================================================================
--- trunk/doc/gpg.texi	2007-01-16 18:12:43 UTC (rev 4405)
+++ trunk/doc/gpg.texi	2007-01-17 23:38:56 UTC (rev 4406)
@@ -1389,12 +1389,9 @@
 timeout applies separately to each key retrieval, and not to the
 @option{--recv-keys} command as a whole. Defaults to 30 seconds.
 
- at item http-proxy
-For HTTP-like keyserver schemes that (such as HKP and HTTP itself),
-try to access the keyserver over a proxy. If a @code{value} is
-specified, use this as the HTTP proxy. If no @code{value} is
-specified, the value of the environment variable "http_proxy", if any,
-will be used.
+ at item http-proxy=@code{value}
+Set the proxy to use for HTTP and HKP keyservers.  This overrides the
+"http_proxy" environment variable, if any.
 
 @item max-cert-size
 When retrieving a key via DNS CERT, only accept keys up to this size.
@@ -2684,6 +2681,13 @@
 locking without being root. The program drops root privileges as soon
 as locked memory is allocated.
 
+Note also that some systems (especially laptops) have the ability to
+``suspend to disk'' (also known as ``safe sleep'' or ``hibernate'').
+This writes all memory to disk before going into a low power or even
+powered off mode.  Unless measures are taken in the operating system
+to protect the saved memory, passphrases or other sensitive material
+may be recoverable from it later.
+
 @mansect see also
 @ifset isman
 @command{gpgv}(1), 




More information about the Gnupg-commits mailing list