-
Notifications
You must be signed in to change notification settings - Fork 686
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Switch to keys.openpgp.org as default keyserver #4128
Comments
I think this makes sense, and is already widely used by various project to host the keys used to sign apt packages. There are two docs-level recommendations we should make: 1 - Since we are specifying a URL to an arbitrary file and not a fingerprint to import, we must guard against unwanted key changes, either due to error or the file being changed on server or in transit. We must validate the fingerprint prior to importing it to the gpg keyring (either programmatically for updates, or manually for first install):
2 - Any user that wants to validate signatures/web of trust would need to |
@emkll Thanks, that makes sense.
What's the purpose of
Do you see this as necessary to document? If so, who's the target audience and how would they act on this information? |
Something else to investigate is if it makes sense to postpone this 'annoyance' until clients support https://tools.ietf.org/html/draft-mccain-keylist-04 |
WKD seems worth considering as a non-keyserver method for publishing the release key which is supported within recent versions of gpg as one of the See draft spec: https://www.ietf.org/id/draft-koch-openpgp-webkey-service-08.txt Being considered in gpgsync as well: firstlookmedia/gpgsync#157 |
note that the SecureDrop release signing key does not currently have an email associated with it (seems like WKD and |
Yes, I did some research on replacing keyservers with WKD and it seems GnuPG supports it:
|
Sadly given the time available (and reduced infra team availability, which we'd need for a WKD implementation) this won't make it for 0.14.0, although keyservers still remain a common pain point during installation and maintenance tasks (even commands like |
I'd do it the other way:
If you check the key during import and not during verification then the file could be correctly signed with other key in user's keyring. With
This is important to detect keys revoked before they're expired. Or, if keyholder is not using expiry at all, to detect any other changes.
Do you mean infra team to manage |
Since the milestone moved, it might be worthwhile to check if https://keys.openpgp.org/about/news#2019-06-12-launch is worthwhile to use as a stop-gap measure until some moment when the infra team has a bit more time. |
@KwadroNaut That's a fantastic suggestion, thanks. This does seem like a very well-designed alternative to the previously existing keyservers:
I've tested it, and the whole user experience was quite clean and straightforward. Key management via one-time links also seems to work well. |
The urgency of this has gone up for us due to recent cert flooding of existing keyservers. WKD still remains an appealing option. Tails includes the Debian Stretch version of gpg, 2.1.18, which supports WKD as a lookup method, but does not yet include the fix for updating expired keys. Until that fix lands in Tails (and a while after that, to give folks time to update), we'd have to force a lookup each time using the (What those parameters mean: Local results should not be overwritten if the key is unchanged. Example output for a key that exists in the local keyring:
|
Testing has also shown @redshiftzero broke this into the following steps:
In addition, we'll want to:
|
In the version of the update logic in 0.14.0, when we switch to using keys.openpgp.org, we need to:
|
The keyserver ecosystem is extremely flaky and poorly maintained. It routinely causes problems during setup and updates as
--recv-key
operations time out unpredictably (most recently #4100). The keyserver ecosystem is also vulnerable to cert flooding attacks.Per the discussion below, we want to:
keys.openpgp.org
as a well-maintained alternative to other keyserver implementations2019-07-01: Updated per discussions below - @eloquence
The text was updated successfully, but these errors were encountered: