package debian-maintainers
tags 596098 moreinfo
stop

The output of keycheck.sh [0] is below.

  Syncing Debian Keyrings with rsync from keyring.debian.org
  Receiving and checking key
  pub   1024D/4D750376 2008-09-10 [expires: 2011-08-26]
        Key fingerprint = 20BB 3CCE CFE5 0A61 39A5  7E9A 1BB3 7533 4D75 0376
  uid                  Mats Erik Andersson <mats.anders...@gisladisker.se>
  sig!         0FE53DD9 2010-08-24  Ola Lundqvist <o...@inguza.com>
  sig!3        4D750376 2009-08-26  Mats Erik Andersson 
<mats.anders...@gisladisker.se>
  sig!3        4D750376 2008-09-10  Mats Erik Andersson 
<mats.anders...@gisladisker.se>
  sub   2048g/245AA735 2008-09-10 [expired: 2009-09-10]
  sig!         4D750376 2008-09-10  Mats Erik Andersson 
<mats.anders...@gisladisker.se>
  .
  Let's test if its a version 4 or greater key
  Key is OpenPGP version 4 or greater.  Good!
  Check for key expire stuff
  Valid "e" flag on key 0x1BB375334D750376, but it expires 1252600359
  This is too soon!
  Please ask the applicant to extend the lifetime of their OpenPGP key!

Please extend the lifetime of your subkey. It expired on 2009-09-10.

It would be really good if you'll use a strong RSA key for your DM
application. [1][2].

Please don't close this bug report. Just add to it.

[0] http://svn.debian.org/viewsvn/nm/trunk/nm-templates/keycheck.sh?view=markup
[1] http://keyring.debian.org/creating-key.html
[2] https://we.riseup.net/riseuplabs+paow/openpgp-best-practices

Attachment: signature.asc
Description: Digital signature

Reply via email to