Re: [Fwd: SOT: Evolution and gpg signature verification (was: Re:updating gpg keys)]

2002-10-09 Thread Paul Iadonisi
On Wed, 2002-10-09 at 15:56, Paul Iadonisi wrote: [snip] > *shrug* > > I guess I'll do a little googling around and see if I can come up with > some kind of workaround. gnhlug-discuss Well, I just found this very recent thread on this very problem: http://lists.ximian.com/archives/public/

Re: [Fwd: SOT: Evolution and gpg signature verification (was: Re: updating gpg keys)]

2002-10-09 Thread Derek D. Martin
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At some point hitherto, Derek D. Martin hath spake thusly: > > gpg --keyserver keyserver.kjsl.com --send-key > > I just did this. You may want to try it again. =8^) It didn't help me... when I update my own key, I still get an invalid subkey

Re: [Fwd: SOT: Evolution and gpg signature verification (was: Re:updating gpg keys)]

2002-10-09 Thread Paul Iadonisi
On Wed, 2002-10-09 at 15:10, Derek D. Martin wrote: [snip] > Maybe... Easiest way to find out is to get rid of it. But I don't > think that's the problem. IIRC, Evolution only supports PGP-MIME, > which I would be more than happy to use, except the rest of the world > (besides Mutt) DOES NOT

Re: [Fwd: SOT: Evolution and gpg signature verification (was: Re: updating gpg keys)]

2002-10-09 Thread Derek D. Martin
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At some point hitherto, mike ledoux hath spake thusly: > I may have forgotten to mention in my earlier message that > keyserver.kjsl.com deals with keys that have multiple subkeys properly, > but you need to send your key to it directly in order for i

Re: [Fwd: SOT: Evolution and gpg signature verification (was: Re: updating gpg keys)]

2002-10-09 Thread Derek D. Martin
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At some point hitherto, Paul Iadonisi hath spake thusly: > > gpg: BAD signature from "Derek D. Martin (for signing software) > > <[EMAIL PROTECTED]>" > > > > Is the warning message about the deprecated --honor-http-proxy > > option Maybe... Eas

Re: [Fwd: SOT: Evolution and gpg signature verification (was: Re: updating gpg keys)]

2002-10-09 Thread Derek D. Martin
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At some point hitherto, Paul Iadonisi hath spake thusly: > > gpg: BAD signature from "Derek D. Martin (for signing software) > > <[EMAIL PROTECTED]>" > > > > Is the warning message about the deprecated --honor-http-proxy option Maybe... Easiest w

[Fwd: SOT: Evolution and gpg signature verification (was: Re:updating gpg keys)]

2002-10-09 Thread Paul Iadonisi
Sorry, this might show up twice. -Forwarded Message- > From: Paul Iadonisi <[EMAIL PROTECTED]> > To: Greater New Hampshire LUG <[EMAIL PROTECTED]> > Subject: SOT: Evolution and gpg signature verification (was: Re: updating gpg keys) > Date: 09 Oct 2002 14:35:09 -0400 > > On Wed, 2002-10

Re: updating gpg keys

2002-10-09 Thread pll
In a message dated: Wed, 09 Oct 2002 13:52:27 EDT "Derek D. Martin" said: >At some point hitherto, mike ledoux hath spake thusly: >> No need for a script, just use 'gpg --refresh-keys'. Also, you might want >> to start using '--keyserver keyserver.kjsl.com' instead of pgp.mit.edu, >> as the kjs

Re: updating gpg keys

2002-10-09 Thread Rodent of Unusual Size
semi-ot: someone i know has twiddled mailman into working with pgp. dunno exactly what that means, but if you want to know more, ask ben laurie <[EMAIL PROTECTED]>. -- #kenP-)} Ken Coar, Sanagendamgagwedweinini http://Golux.Com/coar/ Author, developer, opinionist http://Apache-Server.

Re: updating gpg keys

2002-10-09 Thread Derek D. Martin
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At some point hitherto, mike ledoux hath spake thusly: > No need for a script, just use 'gpg --refresh-keys'. Also, you might want > to start using '--keyserver keyserver.kjsl.com' instead of pgp.mit.edu, > as the kjsl keyserver supports multiple sub

updating gpg keys

2002-10-09 Thread Derek D. Martin
At one point, quite possibly at the BLU keysigning, someone mentioned that it would be useful to have a script that would automatically update the keys on your keyring. The purpose of doing so is to obtain the latest signatures on keys that you have, and widen your ring of trust. I just hacked