gpg --refresh with large keyrings and hkps in 2.1.1

Guilhem Moulin guilhem at fripost.org
Mon Apr 20 14:03:44 CEST 2015


On Mon, 20 Apr 2015 at 11:34:10 +0200, Werner Koch wrote:
> On Mon, 20 Apr 2015 11:17, guilhem at fripost.org said:
>> Doesn't gpg use a single connection for the whole --refresh-keys?  AFIK
>> the 10min windows (‘MaxCircuitDirtiness’ in the torrc) is only relevant
>> for new connections; I doubt tor client kills existing TCP connections
> 
> At the gpg (or better openpgp) summit last weekend we talked about this
> and came up with the idea to add a --use-tor option to make it easier to
> use TOR.

That would be awesome!  Please beware DNS leaks, though.  Also, do you
plan to restore SOCKSv5 proxying (via --http-proxy and libcurl)?  With
1.4 and 2.0 it's very convenient for fine-grained Tor circuit uses
(E.g., with libcurl's ‘socks5h://’ and a custom username:password.)

> I will work on these things with a higher priority.

Many thanks :-)

-- 
Guilhem.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: Digital signature
URL: </pipermail/attachments/20150420/0f793335/attachment.sig>


More information about the Gnupg-devel mailing list