From owner-freebsd-security Fri Feb 9 14: 0:30 2001 Delivered-To: freebsd-security@freebsd.org Received: from vexpert.dbai.tuwien.ac.at (vexpert.dbai.tuwien.ac.at [128.130.111.12]) by hub.freebsd.org (Postfix) with ESMTP id 6222937B684; Fri, 9 Feb 2001 14:00:09 -0800 (PST) Received: from deneb (deneb [128.130.111.2]) by vexpert.dbai.tuwien.ac.at (8.11.1/8.11.1) with ESMTP id f19M07e09880; Fri, 9 Feb 2001 23:00:07 +0100 (MET) Date: Fri, 9 Feb 2001 23:00:06 +0100 (CET) From: Gerald Pfeifer To: FreeBSD Security Advisories Cc: Subject: Re: Reminder notice about FreeBSD Security Advisories In-Reply-To: <20010209214354.2FBD637B4EC@hub.freebsd.org> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Fri, 9 Feb 2001, FreeBSD Security Advisories wrote: > A copy of the public key containing more signatures may be retrieved > from the http://keys.pgp.com key server. There seems to be a problem with your key on (some) PGP key servers: deneb[90]:~% gpg --recv-keys 73d288a5 gpg: Warning: using insecure memory! gpg: requesting key 73D288A5 from wwwkeys.eu.pgp.net ... gpg: key 73D288A5: invalid self-signature gpg: key 73D288A5: no valid user IDs gpg: this may be caused by a missing self-signature gpg: Total number processed: 1 gpg: w/o user IDs: 1 keys.pgp.com worked fine, though. > Note that the security-officer PGP key uses the IDEA algorithm for > encrypted (as opposed to signed) messages you may wish to send to us, > which is not included in gnupg by default. Hmm, are you sure? We're using a version of GnuPG installed from pristine sources (not from the /ports tree) and this seems to support IDEA: deneb[91]:~% gpg --version gpg (GnuPG) 1.0.4 Copyright (C) 2000 Free Software Foundation, Inc. This program comes with ABSOLUTELY NO WARRANTY. This is free software, and you are welcome to redistribute it under certain conditions. See the file COPYING for details. Home: ~/.gnupg Supported algorithms: Cipher: IDEA, 3DES, CAST5, BLOWFISH, RIJNDAEL, RIJNDAEL192, RIJNDAEL256, TWOFISH gpg: skipping pubkey 1: already loaded gpg: skipping pubkey 2: already loaded gpg: skipping pubkey 3: already loaded Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA, ELG Hash: MD5, SHA1, RIPEMD160 Hope this helps, Gerald -- Gerald "Jerry" pfeifer@dbai.tuwien.ac.at http://www.dbai.tuwien.ac.at/~pfeifer/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message