Path: csiph.com!news.samoylyk.net!gothmog.csi.it!bofh.it!news.nic.it!robomod From: Francesco Poli Newsgroups: linux.debian.security Subject: Re: Keyserver for gpg.conf ? Date: Mon, 17 Nov 2025 18:40:01 +0100 Message-ID: References: X-Mailbox-Line: From debian-security-request@lists.debian.org Mon Nov 17 17:32:37 2025 Old-Return-Path: X-Amavis-Spam-Status: No, score=-16.397 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FOURLA=0.1, LDO_WHITELIST=-5, NICE_REPLY_A=-3.599, PGPSIGNATURE=-5, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001] autolearn=ham autolearn_force=no X-Policyd-Weight: using cached result; rate: -4.6 X-Mailer: Sylpheed 3.8.0beta1 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: multipart/signed; protocol="application/pgp-signature"; micalg="PGP-SHA512"; boundary="Signature=_Mon__17_Nov_2025_18_32_05_+0100_GXrVQaSx.YBtIUwb" X-Mailing-List: archive/latest/29695 List-ID: List-URL: List-Archive: https://lists.debian.org/msgid-search/20251117183205.04e0ba865f042cd6c8e3a929@paranoici.org Approved: robomod@news.nic.it Lines: 62 Organization: linux.* mail to news gateway Sender: robomod@news.nic.it X-Original-Cc: Debian-security X-Original-Date: Mon, 17 Nov 2025 18:32:05 +0100 X-Original-Message-ID: <20251117183205.04e0ba865f042cd6c8e3a929@paranoici.org> X-Original-References: <20251115103427.4fc727b3c8f9d3cb2e2fd642@paranoici.org> Xref: csiph.com linux.debian.security:6491 --Signature=_Mon__17_Nov_2025_18_32_05_+0100_GXrVQaSx.YBtIUwb Content-Type: text/plain; charset=US-ASCII Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, 17 Nov 2025 10:49:00 -0500 Jeffrey Walton wrote: [...] > Daniel Kahn Gillmor (dkg) recommends using a constrained keyserver > like keys.openpgp.org if you want to check for certificate updates, > revocation, expiration, or subkey rollover. Dear Jeffrey, thanks for following up. I've just tried to refresh 50 keys with: keyserver hkps://keys.openpgp.org in my ~/.gnupg/gpg.conf It only found 2 of them and exited with non-zero status, spitting out out the following error message: gpg: keyserver refresh failed: No data Am I the only one who's experiencing issues in refreshing OpenPGP keys with gnupg/2.4.8-4 on an up-to-date Debian testing box? Am I the only one left who still uses gnupg in Debian? Have you all switched to sequoia-chameleon-gnupg, perhaps? I am really puzzled... :-( --=20 http://www.inventati.org/frx/ There's not a second to spare! To the laboratory! ..................................................... Francesco Poli . GnuPG key fpr =3D=3D CA01 1147 9CD2 EFDF FB82 3925 3E1C 27E1 1F69 BFFE --Signature=_Mon__17_Nov_2025_18_32_05_+0100_GXrVQaSx.YBtIUwb Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEygERR5zS79/7gjklPhwn4R9pv/4FAmkbXBUACgkQPhwn4R9p v/4KiA/+KS7qIVmcJedBs/ZiRlvEEgWh9eKkLV+Rx23OZFZNN3m7YWqnaazUEAfp 8R4vrWfsxGrUeGSRFbktjDQC6jTwuCp7Jwrr6eclnPakstZ0+N+V8BPM6y/cgNi6 x6Ia612hIoLXqoQTBnkKSAg2XrRh3pDUAQOYKctX60mNRCZcE2futOwqENEu1TQp 1Js5d9T/RmjytNq0B5r0/Ckv4gH/Gin5alehl/ywI87xlWU9x+Yp6tkAM703KHSG vDxbpPLwUQDKJR+JT/6T/toaK9Yw9ZNdMa0jW5ADOcj3lLY4fGnypJlyMyW7WKJc bgMfpqlOyDklGNNxzAUzVqwl2b+xmWBoF9DcBdZ5GecHzjSvSS/hLgc9hc9v4cre Q8ikxorS++/fWeXLxOV2f8zkkuSkq75vzGpC+OaABMC7UzNR1Dg5fLoG5KzUrp8A eczZvwf10tWeVhWfJUQ+aNck6rZZrHKK53DUYudsMZc1mC4qfWcekgxdGm0K9xfj dUpspXaN9blYJrEab1mwC2dPdZYIveJsmAEYz3CVeqhoRt2FNbKWlYWzfinTGXbA hQl+QfXMlecziuFgqmgWbj9c4mZBzRdDI/pQOvERcpI7hqETn+nnVx0lCGdoMxtE j870dm5kNLVZo63OuZDUO3wqSeFk86kxWHixF3W1tjU4uf0I5YY= =9g1n -----END PGP SIGNATURE----- --Signature=_Mon__17_Nov_2025_18_32_05_+0100_GXrVQaSx.YBtIUwb--