You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@whimsical.apache.org by "Sebb (JIRA)" <ji...@apache.org> on 2019/07/08 00:24:00 UTC
[jira] [Resolved] (WHIMSY-274) Switch to hkps://keys.openpgp.org
for downloading keys
[ https://issues.apache.org/jira/browse/WHIMSY-274?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Sebb resolved WHIMSY-274.
-------------------------
Resolution: Fixed
780438f [WHIMSY-274] Use keys.openpgp.org
> Switch to hkps://keys.openpgp.org for downloading keys
> ------------------------------------------------------
>
> Key: WHIMSY-274
> URL: https://issues.apache.org/jira/browse/WHIMSY-274
> Project: Whimsy
> Issue Type: Improvement
> Components: SecMail
> Reporter: Matt Sicker
> Assignee: Craig L Russell
> Priority: Major
> Time Spent: 20m
> Remaining Estimate: 0h
>
> https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
> The SKS keyserver pool is now infected with some bad certificates which can cause a denial of service attack to gpg (and likely other similar tools). It sounds like it would be prudent to either disable downloading keys or switch to a safer keyserver for now.
> Ideally, users should be able to upload their own GPG keys, and that uploader could automatically filter out these types of malicious keys. This would be a separate feature, though, but now it seems more useful.
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)