auto refresh for expired certificates
2014-667rhzu3dc-lists-groups at riseup.net
Sun Oct 26 13:22:24 CET 2014
-----BEGIN PGP SIGNED MESSAGE-----
On Sunday 26 October 2014 at 11:50:53 AM, in
<mid:544CE01D.4070009 at digitalbrains.com>, Peter Lebbing wrote:
> By the way, my search string was "keyserver lookup
> exposes keyring"
That's brilliant. I tried several options along the lines of: keys
refresh incremental random gnupg.
>> It seems to live at
>> https://github.com/EtiennePerot/parcimonie.sh .
> But this e-mail is to correct this bit: this is
> actually a reimplementation of parcimonie. I hadn't
> looked at it well enough to notice this very obvious
> bit :).
Thanks. That is the one I was thinking of.
Each key is refreshed using a unique Tor circuit rather than a random
keyserver from a list.
The downside that I didn't remember is that it picks a key at random
to refresh each time, so it can't guarantee that every key actually
will get refreshed regularly.
MFPA mailto:2014-667rhzu3dc-lists-groups at riseup.net
Live your life as though every day it was your last.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----
More information about the Gnupg-users