Processed: Bug#732450: debian/watch: help uscan verify PGP signature automatically

2014-01-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: tag 732450 +pending Bug #732450 {Done: Arno Töll a...@debian.org} [src:apache2] debian/watch: help uscan verify PGP signature automatically Added tag(s) pending. thanks Stopping processing here. Please contact me if you need assistance. --

Bug#732450: debian/watch: help uscan verify PGP signature automatically

2013-12-24 Thread Arno Töll
Hi, On 23.12.2013 17:48, Daniel Kahn Gillmor wrote: But if apache is issuing cryptographic signatures from any of the weak keys in KEYS, we should encourage them to stop doing so. Apache's source code is a high-value target, and we should not leave the software distribution mechanism open to

Bug#732450: debian/watch: help uscan verify PGP signature automatically

2013-12-23 Thread Arno Töll
tag 732450 +pending thanks Hi Daniel, On 18.12.2013 08:53, Daniel Kahn Gillmor wrote: It looks like Jim Jagielski is signing apache2 releases (at least those from 2.2 onward, which are all that we care about) with his key with fingerprint A93D 62EC C3C8 EA12 DB22 0EC9 34EA 76E6 7914 85A8.

Bug#732450: debian/watch: help uscan verify PGP signature automatically

2013-12-23 Thread Daniel Kahn Gillmor
On 12/23/2013 06:48 AM, Arno Töll wrote: thanks for that suggestion. I added your patch for the upcoming package upload. great, thank you! I did, however, add the full keyring of Apache developers that /could/ sign a release as listed in http://www.apache.org/dist/httpd/KEYS While we're