Summary: | app-crypt/gnupg ships with expired certificate sks-keyservers.netCA.pem for obsolete SKS keyservers | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Kim B. Sindalsen <gentoo> |
Component: | Current packages | Assignee: | Gentoo's Team for Core System packages <base-system> |
Status: | UNCONFIRMED --- | ||
Severity: | trivial | CC: | jstein |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
See Also: | https://dev.gnupg.org/T6404 | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Kim B. Sindalsen
2023-01-31 18:45:08 UTC
The sks keyservers are dead anyway so I'm not sure it matters that much, does it? Maybe not - triggers app-forensic/lynis check and by extension my OCD ;) (In reply to Kim B. Sindalsen from comment #0) > /usr/share/gnupg/sks-keyservers.netCA.pem expired Oct 2022 > > Certificate: > Data: > Version: 3 (0x2) > Serial Number: > af:73:c8:b4:cf:9f:80:8f > Signature Algorithm: sha1WithRSAEncryption > Issuer: C = NO, ST = Oslo, O = sks-keyservers.net CA, CN = > sks-keyservers.net CA > Validity > Not Before: Oct 9 00:33:37 2012 GMT > Not After : Oct 7 00:33:37 2022 GMT > > Seems to be in both stable and newest ~. > > Reported upstream (as soon as my account there is verified) > Could you give us the link to your report? Thanks! https://dev.gnupg.org/T6404 Not used - so can't harm... |