auto refresh for expired certificates
MFPA
2014-667rhzu3dc-lists-groups at riseup.net
Sun Oct 26 13:22:24 CET 2014
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Hi
On Sunday 26 October 2014 at 11:50:53 AM, in
<mid:544CE01D.4070009 at digitalbrains.com>, Peter Lebbing wrote:
> By the way, my search string was "keyserver lookup
> exposes keyring"
That's brilliant. I tried several options along the lines of: keys
refresh incremental random gnupg.
>> It seems to live at
>> https://github.com/EtiennePerot/parcimonie.sh .
> But this e-mail is to correct this bit: this is
> actually a reimplementation of parcimonie. I hadn't
> looked at it well enough to notice this very obvious
> bit :).
Thanks. That is the one I was thinking of.
Each key is refreshed using a unique Tor circuit rather than a random
keyserver from a list.
The downside that I didn't remember is that it picks a key at random
to refresh each time, so it can't guarantee that every key actually
will get refreshed regularly.
- --
Best regards
MFPA mailto:2014-667rhzu3dc-lists-groups at riseup.net
Live your life as though every day it was your last.
-----BEGIN PGP SIGNATURE-----
iPQEAQEKAF4FAlRM541XFIAAAAAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pJn0D/RFbopmx+Rldh7TF2YOFcDIp4vUWZZRDDZ59
5PJTzQ0Q0SKMup2mY8hpg6Al3O6/wIme4vqY9fQ/Wf4pS4cI2bMuXAwU8RiIVo3s
x2iS3Y/z0z02OxntzrqoI7Be2/BvTJCKjVCnw1VLtjv4mphNJMJJpWOv6Rpk9y3R
UT41jxJj
=FLYp
-----END PGP SIGNATURE-----
More information about the Gnupg-users
mailing list