On 02/25/2013 10:43 PM, Doug Barton wrote:
> The Best Practices page you posted above actually suggests:
> 
>   keyserver hkps://hkps.pool.sks-keyservers.net
>   keyserver-options ca-cert-file=/path/to/CA/sks-keyservers.netCA.pem
> 
> That worked for me, although I was a bit disappointed that placing the
> cert at /etc/ssl/certs/ca.hkps.pool.sks-keyservers.net.cert didn't work
> like all the docs said it should.

which docs suggested that should work?  what operating system are you
expecting it to work for?

if you're using debian or a debian-derived system like mint or ubuntu,
and you want to add a CA to the "system trusted root store", you
actually want to add the file with a .crt extension (not .cert) to
/usr/local/share/ca-certificates/ and then run "update-ca-certificates"
as the superuser.

Please read:

 /usr/share/doc/ca-certificates/README.Debian

on your local system for more details.

> Does anyone know where/how to place the cert file on the system so that
> it can be called by demand, rather than having to specify it in the
> gpg.conf?

gpg's keyserver-option ca-cert-file's default for hkps is dependent on
the TLS library libcurl linked to from libcurl in the handler in
/usr/lib/gnupg/gpgkeys_hkp.  on debian systems right now, this is
libgnutls26, which currently has no default root CAs.

newer versions of gnutls have a standard default root CA set that maps
to the system provided above by ca-certificates.

If and when gnupg-curl builds against libgnutls28-dev (the next major
API change in gnutls), it should adopt those changes.

        --dkg

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to