Package: xul-ext-firegpg
Version: 0.8-1
Severity: normal
Hi!
* If extensions.firegpg.keyserver is set to
"hkps://keys.indymedia.org", it does not pass FireGPG preferences
validation and the default FireGPG keyserver is used.
* If extensions.firegpg.keyserver is set to "keys.indymedia.org",
FireGPG invokes gpg with the --keyserver keys.indymedia.org option
that prevents the use of hkps://.
* If extensions.firegpg.keyserver is not set, the default FireGPG
keyserver (pool.sks-keyservers.net) is used.
* If "extensions.firegpg.keyserver" is set to an empty string, the
default FireGPG keyserver is used.
Seems like FireGPG should be a bit less restrictive when validating
this setting, or allow using whatever is configured in gpg.conf.
Hint: this is likely to prevent FireGPG users from using hkpms:// as
well ;)
-- System Information:
Debian Release: squeeze/sid
APT prefers testing
APT policy: (990, 'testing'), (1, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages xul-ext-firegpg depends on:
ii gnupg 1.4.10-4 GNU privacy guard - a free PGP rep
ii iceweasel 3.5.16-3 Web browser based on Firefox
ii libc6 2.11.2-7 Embedded GNU C Library: Shared lib
ii libgcc1 1:4.4.5-8 GCC support library
ii libnspr4-0d 4.8.6-1 NetScape Portable Runtime Library
ii libstdc++6 4.4.5-8 The GNU Standard C++ Library v3
xul-ext-firegpg recommends no packages.
Versions of packages xul-ext-firegpg suggests:
pn signing-party <none> (no description available)
-- no debconf information
--
intrigeri <[email protected]>
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
| Every now and then I get a little bit restless
| and I dream of something wild.
--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]