******************************************************************************
*                                                                            *
*                       zimmermann system log                                *
*                                                                            *
******************************************************************************
*  Please add new entries in reverse chronological order whenever you make   *
*  changes to this system (first command at top, last at bottom)             *
******************************************************************************

2010-03-10 - micah
	* Updated /etc/monkeysphere/*.conf to use zimmermann
	for the keyserver

2010-03-09 - dkg
	* transferred the https://z.m.o key from /root/.gnupg into the
	monkeysphere-host keyring with:

         gpg --export-secret-keys | GNUPGHOME=/var/lib/monkeysphere/host gpg --import

	* used undocumented "monkeysphere-host update-pgp-pub-file" to
	refresh the output of m-h s.

2010-02-19 - dkg
	* upgraded to monkeysphere 0.28-1~bpo50+1 (includes gnupg from
	backports.org)

2010-02-?? - dkg
	* manually created an OpenPGP certificate for zimmermann's https
	RSA key, stored in /root/.gnupg; published it to the keyserver
	network, certified it myself.

2008-11-29 - dkg
	* zimmermann now uses an X.509 certificate signed by the MF/PL CA
	for its HTTPS connection.

2008-11-19 - dkg
	* added 10 SKS peers as a result of feedback from sks-devel.
	* set localtime to America/New_York via dpkg-reconfigure tzdata
	* aptitude update && aptitude full-upgrade
	* set up /var/lib/sks/www/index.html based on
	doc/zimmermann/index.html from this repo.
	* made nginx proxy plain ol' HTTP on port 80 also so that SKS does
	not need to try to listen on a privileged port.
	* turned on initial_stat and stat_hour: 3 in /etc/sks/sksconf

2008-11-19 - mlc
	* aptitude install nginx
	* get rid of /etc/nginx/sites-enabled/default
	* create /etc/nginx/sites-available/https-proxy and make a symlink
	  to it in the sites-enabled directory
	* invoke-rc.d nginx start

2008-11-17 - micah
	* verified the SHA256 values for the key material
	* /usr/lib/sks/sks_build.sh (chose option #2: normalbuild)
	* chown -R debian-sks:debian-sks /var/lib/sks
	* edit /etc/default/sks to enable the initscript
	* /etc/init.d/sks start
	* rm -rf /var/lib/sks/dump
	
2008-11-15 - micah
	* aptitude update && aptitude full-upgrade
	* aptitude install sks
	* cd /var/lib/sks/dump ; wget -q -r -np -nd -A bz2,SHA256,asc \
	  http://nynex.net/keydump/ -e robots=off
	* install monkeysphere 0.21-2 package
	* apt-get install bzip2 ; bunzip2 /var/lib/sks/dump/*.bz2

2008-11-15 - jamie
  * aptitude install esmtp-run mailx
	* edited /etc/esmtp-run, configured to relay to bulk.mayfirst.org