auto refresh for expired certificates

MFPA 2014-667rhzu3dc-lists-groups at riseup.net
Sun Oct 26 13:22:24 CET 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi


On Sunday 26 October 2014 at 11:50:53 AM, in
<mid:544CE01D.4070009 at digitalbrains.com>, Peter Lebbing wrote:




> By the way, my search string was "keyserver lookup
> exposes keyring"

That's brilliant. I tried several options along the lines of: keys
refresh incremental random gnupg.



>> It seems to live at
>> https://github.com/EtiennePerot/parcimonie.sh .

> But this e-mail is to correct this bit: this is
> actually a reimplementation of parcimonie. I hadn't
> looked at it well enough to notice this very obvious
> bit :).

Thanks. That is the one I was thinking of.

Each key is refreshed using a unique Tor circuit rather than a random
keyserver from a list.

The downside that I didn't remember is that it picks a key at random
to refresh each time, so it can't guarantee that every key actually
will get refreshed regularly.


- --
Best regards

MFPA                    mailto:2014-667rhzu3dc-lists-groups at riseup.net

Live your life as though every day it was your last.
-----BEGIN PGP SIGNATURE-----

iPQEAQEKAF4FAlRM541XFIAAAAAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pJn0D/RFbopmx+Rldh7TF2YOFcDIp4vUWZZRDDZ59
5PJTzQ0Q0SKMup2mY8hpg6Al3O6/wIme4vqY9fQ/Wf4pS4cI2bMuXAwU8RiIVo3s
x2iS3Y/z0z02OxntzrqoI7Be2/BvTJCKjVCnw1VLtjv4mphNJMJJpWOv6Rpk9y3R
UT41jxJj
=FLYp
-----END PGP SIGNATURE-----




More information about the Gnupg-users mailing list