mirror of
git://git.gnupg.org/gnupg.git
synced 2025-01-18 14:17:03 +01:00
* gpg.texi (GPG Configuration Options): Make http_proxy option
documentation match reality. (BUGS): Warn about hibernate/safe-sleep/etc writing main RAM to disk, despite locking.
This commit is contained in:
parent
006c5af165
commit
1d4b3d7c3b
@ -1,3 +1,10 @@
|
|||||||
|
2007-01-17 David Shaw <dshaw@jabberwocky.com>
|
||||||
|
|
||||||
|
* gpg.texi (GPG Configuration Options): Make http_proxy option
|
||||||
|
documentation match reality.
|
||||||
|
(BUGS): Warn about hibernate/safe-sleep/etc writing main RAM to
|
||||||
|
disk, despite locking.
|
||||||
|
|
||||||
2006-12-08 Werner Koch <wk@g10code.com>
|
2006-12-08 Werner Koch <wk@g10code.com>
|
||||||
|
|
||||||
* gnupg.texi (direntry): Rename gpg to gpg2.
|
* gnupg.texi (direntry): Rename gpg to gpg2.
|
||||||
|
16
doc/gpg.texi
16
doc/gpg.texi
@ -1389,12 +1389,9 @@ For example, when retrieving multiple keys via @option{--recv-keys}, the
|
|||||||
timeout applies separately to each key retrieval, and not to the
|
timeout applies separately to each key retrieval, and not to the
|
||||||
@option{--recv-keys} command as a whole. Defaults to 30 seconds.
|
@option{--recv-keys} command as a whole. Defaults to 30 seconds.
|
||||||
|
|
||||||
@item http-proxy
|
@item http-proxy=@code{value}
|
||||||
For HTTP-like keyserver schemes that (such as HKP and HTTP itself),
|
Set the proxy to use for HTTP and HKP keyservers. This overrides the
|
||||||
try to access the keyserver over a proxy. If a @code{value} is
|
"http_proxy" environment variable, if any.
|
||||||
specified, use this as the HTTP proxy. If no @code{value} is
|
|
||||||
specified, the value of the environment variable "http_proxy", if any,
|
|
||||||
will be used.
|
|
||||||
|
|
||||||
@item max-cert-size
|
@item max-cert-size
|
||||||
When retrieving a key via DNS CERT, only accept keys up to this size.
|
When retrieving a key via DNS CERT, only accept keys up to this size.
|
||||||
@ -2684,6 +2681,13 @@ warning message about insecure memory your operating system supports
|
|||||||
locking without being root. The program drops root privileges as soon
|
locking without being root. The program drops root privileges as soon
|
||||||
as locked memory is allocated.
|
as locked memory is allocated.
|
||||||
|
|
||||||
|
Note also that some systems (especially laptops) have the ability to
|
||||||
|
``suspend to disk'' (also known as ``safe sleep'' or ``hibernate'').
|
||||||
|
This writes all memory to disk before going into a low power or even
|
||||||
|
powered off mode. Unless measures are taken in the operating system
|
||||||
|
to protect the saved memory, passphrases or other sensitive material
|
||||||
|
may be recoverable from it later.
|
||||||
|
|
||||||
@mansect see also
|
@mansect see also
|
||||||
@ifset isman
|
@ifset isman
|
||||||
@command{gpgv}(1),
|
@command{gpgv}(1),
|
||||||
|
Loading…
x
Reference in New Issue
Block a user