Skip to content

Conversation

@thefinn93
Copy link
Contributor

Currently checks pgp.mit.edu and keys.gnupg.net, but that's easily changable at the top of the tests.

@ghost
Copy link

ghost commented Jan 2, 2016

It would be nice if it could use HKPS. (E.g. use hkps.pool.sks-keyservers.net)

@thefinn93
Copy link
Contributor Author

It's not even signed by a trusted CA? c'mon

@rugk
Copy link

rugk commented Jan 3, 2016

They use their own (SKS-Keyservers-)CA:

This pool only include servers that have been certified by the sks-keyservers.net CA, of which the certificate can be found at https://sks-keyservers.net/sks-keyservers.netCA.pem [OpenPGP signature] [CRL].

@rugk
Copy link

rugk commented Jan 3, 2016

And if you download this cert over HTTPS you may have the protection level of a CA-system.

And in any way it is better than plain-text queries.

@thefinn93
Copy link
Contributor Author

Fair enough, at this point (for reasons unclear to me) plain-text queries are failing. I'd love to get TLS'd queries working, or any queries working

@thefinn93
Copy link
Contributor Author

I should note that it works fine from my laptop, only intermittently from travis

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants