package debian-maintainers tags 596098 moreinfo stop The output of keycheck.sh [0] is below.
Syncing Debian Keyrings with rsync from keyring.debian.org Receiving and checking key pub 1024D/4D750376 2008-09-10 [expires: 2011-08-26] Key fingerprint = 20BB 3CCE CFE5 0A61 39A5 7E9A 1BB3 7533 4D75 0376 uid Mats Erik Andersson <mats.anders...@gisladisker.se> sig! 0FE53DD9 2010-08-24 Ola Lundqvist <o...@inguza.com> sig!3 4D750376 2009-08-26 Mats Erik Andersson <mats.anders...@gisladisker.se> sig!3 4D750376 2008-09-10 Mats Erik Andersson <mats.anders...@gisladisker.se> sub 2048g/245AA735 2008-09-10 [expired: 2009-09-10] sig! 4D750376 2008-09-10 Mats Erik Andersson <mats.anders...@gisladisker.se> . Let's test if its a version 4 or greater key Key is OpenPGP version 4 or greater. Good! Check for key expire stuff Valid "e" flag on key 0x1BB375334D750376, but it expires 1252600359 This is too soon! Please ask the applicant to extend the lifetime of their OpenPGP key! Please extend the lifetime of your subkey. It expired on 2009-09-10. It would be really good if you'll use a strong RSA key for your DM application. [1][2]. Please don't close this bug report. Just add to it. [0] http://svn.debian.org/viewsvn/nm/trunk/nm-templates/keycheck.sh?view=markup [1] http://keyring.debian.org/creating-key.html [2] https://we.riseup.net/riseuplabs+paow/openpgp-best-practices
signature.asc
Description: Digital signature