diff options
author | David Shaw <[email protected]> | 2007-01-17 23:38:56 +0000 |
---|---|---|
committer | David Shaw <[email protected]> | 2007-01-17 23:38:56 +0000 |
commit | 1d4b3d7c3b56015889d9287fcb273de14f58be5b (patch) | |
tree | 25b06ad5874d2bb663638f5ba459d8cc5de2925d | |
parent | * parse-packet.c (read_protected_v3_mpi): Make sure to stop (diff) | |
download | gnupg-1d4b3d7c3b56015889d9287fcb273de14f58be5b.tar.gz gnupg-1d4b3d7c3b56015889d9287fcb273de14f58be5b.zip |
* gpg.texi (GPG Configuration Options): Make http_proxy option
documentation match reality. (BUGS): Warn about
hibernate/safe-sleep/etc writing main RAM to disk, despite locking.
Diffstat (limited to '')
-rw-r--r-- | doc/ChangeLog | 7 | ||||
-rw-r--r-- | doc/gpg.texi | 16 |
2 files changed, 17 insertions, 6 deletions
diff --git a/doc/ChangeLog b/doc/ChangeLog index 2147e77ab..f7c9c665b 100644 --- a/doc/ChangeLog +++ b/doc/ChangeLog @@ -1,3 +1,10 @@ +2007-01-17 David Shaw <[email protected]> + + * gpg.texi (GPG Configuration Options): Make http_proxy option + documentation match reality. + (BUGS): Warn about hibernate/safe-sleep/etc writing main RAM to + disk, despite locking. + 2006-12-08 Werner Koch <[email protected]> * gnupg.texi (direntry): Rename gpg to gpg2. diff --git a/doc/gpg.texi b/doc/gpg.texi index a8e213c95..3312963bd 100644 --- a/doc/gpg.texi +++ b/doc/gpg.texi @@ -1389,12 +1389,9 @@ For example, when retrieving multiple keys via @option{--recv-keys}, the timeout applies separately to each key retrieval, and not to the @option{--recv-keys} command as a whole. Defaults to 30 seconds. -@item http-proxy -For HTTP-like keyserver schemes that (such as HKP and HTTP itself), -try to access the keyserver over a proxy. If a @code{value} is -specified, use this as the HTTP proxy. If no @code{value} is -specified, the value of the environment variable "http_proxy", if any, -will be used. +@item http-proxy=@code{value} +Set the proxy to use for HTTP and HKP keyservers. This overrides the +"http_proxy" environment variable, if any. @item max-cert-size When retrieving a key via DNS CERT, only accept keys up to this size. @@ -2684,6 +2681,13 @@ warning message about insecure memory your operating system supports locking without being root. The program drops root privileges as soon as locked memory is allocated. +Note also that some systems (especially laptops) have the ability to +``suspend to disk'' (also known as ``safe sleep'' or ``hibernate''). +This writes all memory to disk before going into a low power or even +powered off mode. Unless measures are taken in the operating system +to protect the saved memory, passphrases or other sensitive material +may be recoverable from it later. + @mansect see also @ifset isman @command{gpgv}(1), |