Hi,

Adam D. Barratt wrote:
> Vincent Danjean wrote:
>> Package: spamassassin
>> Version: 3.2.4-2
>> Followup-For: Bug #486408
>>
>> Using "sa-update -D", we clearly see the problem: gpg refuse to
>> certify  the downloaded file because the used key is not cross-certified.
>>  The correct fix is to ask upstream to cross-certify its key (by
>> pointing them to http://www.gnupg.org/faq/subkey-cross-certify.html )
> 
> Upstream have already done this, as per the fragment from the 3.2.5
> changelog I pasted in
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=486408#10

  I do not know how recent this is. But before sending my report,
I manually download the tar.gz, the tar.gz.asc and ask gpg to get
the key from a public keyserver (keys.gnupg.net in my case).
  So, 2 hours ago, their cross certified key were not available
on this public key server yet.

  Looking at the previous answers, I download the new key from
http://wiki.apache.org/spamassassin/SaUpdateKeyNotCrossCertified
and I just uploaded it to keys.gnupg.net.

  Best regards,
    Vincent

PS: I just discovered that you already answer to this bug before my
message. When reportbug show you a bug, it only show you the first
report :-( I will perhaps send a wishbug to reportbug if I find some
time.

-- 
Vincent Danjean       GPG key ID 0x9D025E87         [EMAIL PROTECTED]
GPG key fingerprint: FC95 08A6 854D DB48 4B9A  8A94 0BF7 7867 9D02 5E87
Unofficial pacakges: http://www-id.imag.fr/~danjean/deb.html#package
APT repo:  deb http://perso.debian.org/~vdanjean/debian unstable main




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to