http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=663757#27
> We believe that the bug you reported is fixed in the latest version of > sks, which is due to be installed in the Debian FTP archive: > > sks_1.1.3-1.debian.tar.gz > to main/s/sks/sks_1.1.3-1.debian.tar.gz > sks_1.1.3-1.dsc > to main/s/sks/sks_1.1.3-1.dsc > sks_1.1.3-1_amd64.deb > to main/s/sks/sks_1.1.3-1_amd64.deb > sks_1.1.3.orig.tar.gz > to main/s/sks/sks_1.1.3.orig.tar.gz John Clizbe wrote: > I have exchanged some emails with the Debian SKS maintainer. > > He is almost finished with the packaging and believes he can upload sks-1.1.3 > in the next few of days. > > Once the new package is available, please consider upgraging to 1.1.3 ASAP. > Servers running SKS prior to version 1.1.3 run the risk of returning erroneous > search results to clients because they lack the ability to search subkey IDs > by long ID or fingerprint. > > There should be no requirement to rebuild SKS's database. Version changes in > Berkeley DB since 4.6 have only required a change to the log file format. This > is easy to accomplish. For details, see the document > https://bitbucket.org/yminsky/sks-keyserver/src/3d12f5a0d7cf/UPGRADING > > -John _______________________________________________ Sks-devel mailing list Sks-devel@nongnu.org https://lists.nongnu.org/mailman/listinfo/sks-devel