Heya :)

On Fri, Jun 08, 2012 at 10:11:11AM +0200, Sebastian Urbach wrote:
> [...] if something goes wrong
> with the import. Better loose 5000 than 15000 keys.
For the fun of it, I tried to parse a few weekly dumps and very often, 
not even GPG can successfully parse the packets, i.e. gpg --list-packets 
fails. Usually with "gpg: mpi too large for this implementation (56104 
bits)" but there is a myriad of errors, i.e.
gpg: subpacket of type 16 too short
gpg: mpi larger than indicated length (517 bytes)
gpg: mpi larger than indicated length (0 bytes)
gpg: signature packet: unhashed data too long
gpg: signature packet: hashed data too long
gpg: mpi larger than indicated length (514 bytes)
gpg: packet(14) too short

I usually can parse 30 to 40 out of the 206 or 207 dumps (probably 
containing 15k keys each).

So I appreciate that the dumps will contain less keys.

I wonder why that is though.
Do I have I download or memory problems (on multiple machines..?)?
Is that just malicious data which landed in the pool?
Or is SKS better on parsing OpenPGP packets than GnuPG? Because one 
offending key seems to be 0x5df5c3733a6ced98 which, according to 
http://gpg.spline.inf.fu-berlin.de:11371/pks/lookup?search=0x5DF5C3733A6CED98&fingerprint=on&hash=on&op=vindex
 
is successfully parsed by SKS. Same thing for 0xb51b4b095356aac8 or 
0x857625223295AAB2.
It appears to be keys that carry signature from 0x9710B89BCA57AD7C, the 
"PGP Global Directory Verification Key".

Cheers,
  Tobi

_______________________________________________
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel

Reply via email to