Hi list,
Has anyone had any experience with https://github.com/SkierPGP/Skier ?
--
Mike Forbes
System Administrator
NZRS Ltd.
M +64 21 999 416
P +64 4 555 0125
PGP: A2BB DF0B 311C 3C8F E1D7 5EEB DA03 46C0 D68F BF2E
___
Sks-devel mailing list
Sks
80 to 443, then has a
location section for /pks that points to the locally running sks
daemon on 127.0.0.1:11371
I'd love to hear how others have managed this.
Cheers,
- --
Mike Forbes
System Administrator
NZRS Ltd.
M +64 21 999 416
P +64 4 555 0125
PGP: A2BB DF0B 311C 3C8F E1D7 5EEB DA03
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 19/05/15 7:04 am, Daniel Roesler wrote:
Are we just going to wait around until someone starts doing this?
We can solve these vulnerabilities now.
Rather than comment on the rest of the thread, this stuck out for me.
(Thanks Daniel!)
So, how
,
- --
Mike Forbes
System Administrator
NZRS Ltd.
M +64 21 999 416
P +64 4 555 0125
PGP: A2BB DF0B 311C 3C8F E1D7 5EEB DA03 46C0 D68F BF2E
-BEGIN PGP SIGNATURE-
iQQcBAEBCgAGBQJVNEJhAAoJENoDRsDWj78u3gcf/i3UQzgwHxk/+X9MP8dtHJNp
tpK0n6e6Z9VUa3Y3E5lztIK6W0mb72XB4vaNeryI4ARNpGtyDqM5Thg/m4wEflRT