gpg ca-cert-file=[which file???]
Sat Jul 15 23:07:00 GMT 2017
On 7/15/17, Jim Garrison wrote:
> On 7/15/2017 11:40 AM, Lee wrote:
>> It seems a bit silly to be downloading pgp keys 'in the clear', so
>> after a bit of searching I think I want
>> keyserver hkps://whatever
> Public keys are intended to be public. Why do you think you need
> to encrypt them when downloading?
I had wireshark running when I got a new key via hpk:// and it was
straight http. What does that open me up to? I dunno, but it seems
like using TLS would be better than clear-text http.
So while I don't need to encrypt the public key when downloading, I do
want to have some confidence that the key I requested is the key I
got, that the server I specified is the server gpg was talking to,
that nothing was modified in transit, etc.
This is what got me started on the topic:
What can I do to reduce the chances of getting a fake key?
- keyid-format 0xlong
- use hkps:// and check the cert (keyserver-options check-cert=on)
- what else?
Problem reports: http://cygwin.com/problems.html
Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple
More information about the Cygwin