/usr/share/gnupg/sks-keyservers.netCA.pem expired Oct 2022 Certificate: Data: Version: 3 (0x2) Serial Number: af:73:c8:b4:cf:9f:80:8f Signature Algorithm: sha1WithRSAEncryption Issuer: C = NO, ST = Oslo, O = sks-keyservers.net CA, CN = sks-keyservers.net CA Validity Not Before: Oct 9 00:33:37 2012 GMT Not After : Oct 7 00:33:37 2022 GMT Seems to be in both stable and newest ~. Reported upstream (as soon as my account there is verified) Reproducible: Always Steps to Reproduce: 1. emerge app-crypt/gnupg 2. equery b /usr/share/gnupg/sks-keyservers.netCA.pem 3. less /usr/share/gnupg/sks-keyservers.netCA.pem
The sks keyservers are dead anyway so I'm not sure it matters that much, does it?
Maybe not - triggers app-forensic/lynis check and by extension my OCD ;)
(In reply to Kim B. Sindalsen from comment #0) > /usr/share/gnupg/sks-keyservers.netCA.pem expired Oct 2022 > > Certificate: > Data: > Version: 3 (0x2) > Serial Number: > af:73:c8:b4:cf:9f:80:8f > Signature Algorithm: sha1WithRSAEncryption > Issuer: C = NO, ST = Oslo, O = sks-keyservers.net CA, CN = > sks-keyservers.net CA > Validity > Not Before: Oct 9 00:33:37 2012 GMT > Not After : Oct 7 00:33:37 2022 GMT > > Seems to be in both stable and newest ~. > > Reported upstream (as soon as my account there is verified) > Could you give us the link to your report? Thanks!
https://dev.gnupg.org/T6404 Not used - so can't harm...