Package: xul-ext-firegpg Version: 0.8-1 Severity: normal Hi!
* If extensions.firegpg.keyserver is set to "hkps://keys.indymedia.org", it does not pass FireGPG preferences validation and the default FireGPG keyserver is used. * If extensions.firegpg.keyserver is set to "keys.indymedia.org", FireGPG invokes gpg with the --keyserver keys.indymedia.org option that prevents the use of hkps://. * If extensions.firegpg.keyserver is not set, the default FireGPG keyserver (pool.sks-keyservers.net) is used. * If "extensions.firegpg.keyserver" is set to an empty string, the default FireGPG keyserver is used. Seems like FireGPG should be a bit less restrictive when validating this setting, or allow using whatever is configured in gpg.conf. Hint: this is likely to prevent FireGPG users from using hkpms:// as well ;) -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (990, 'testing'), (1, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages xul-ext-firegpg depends on: ii gnupg 1.4.10-4 GNU privacy guard - a free PGP rep ii iceweasel 3.5.16-3 Web browser based on Firefox ii libc6 2.11.2-7 Embedded GNU C Library: Shared lib ii libgcc1 1:4.4.5-8 GCC support library ii libnspr4-0d 4.8.6-1 NetScape Portable Runtime Library ii libstdc++6 4.4.5-8 The GNU Standard C++ Library v3 xul-ext-firegpg recommends no packages. Versions of packages xul-ext-firegpg suggests: pn signing-party <none> (no description available) -- no debconf information -- intrigeri <intrig...@boum.org> | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc | Every now and then I get a little bit restless | and I dream of something wild. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org