[gcr/wip/nielsdg/remove-sks-from-default] Remove SKS network from keyserver defaults
- From: Niels De Graef <nielsdg src gnome org>
- To: commits-list gnome org
- Cc:
- Subject: [gcr/wip/nielsdg/remove-sks-from-default] Remove SKS network from keyserver defaults
- Date: Fri, 16 Aug 2019 05:56:08 +0000 (UTC)
commit f1c31c64778fb1ee299c42b70d998715409f5bee
Author: Niels De Graef <nielsdegraef gmail com>
Date: Fri Aug 16 07:51:30 2019 +0200
Remove SKS network from keyserver defaults
The keyservers from the SKS network were recently infected with poisoned
certificates, as proclaimed here
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f.
As a result of importing these certificates, some people can experience
slow (to the point of being unusable) GPG tools. This is something that
cannot be "fixed" in SKS keyservers, so let's at least drop them from
the default keyservers we have in gcr (which are also used by seahorse).
schema/org.gnome.crypto.pgp.gschema.xml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
---
diff --git a/schema/org.gnome.crypto.pgp.gschema.xml b/schema/org.gnome.crypto.pgp.gschema.xml
index 08c9d40..a1a32dd 100644
--- a/schema/org.gnome.crypto.pgp.gschema.xml
+++ b/schema/org.gnome.crypto.pgp.gschema.xml
@@ -26,7 +26,7 @@
<description>The ID of the last secret key used to sign a message.</description>
</key>
<key name="keyservers" type="as">
- <default>['hkp://pool.sks-keyservers.net', 'ldap://keyserver.pgp.com']</default>
+ <default>['ldap://keyserver.pgp.com']</default>
<summary>PGP key servers</summary>
<description>A list of key server URIs to search for remote PGP keys. A display name
can be included, by appending a space and then the name.</description>
</key>
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]