aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDaniel Kahn Gillmor <[email protected]>2019-07-12 01:52:11 +0000
committerDaniel Kahn Gillmor <[email protected]>2019-07-20 18:16:20 +0000
commit253024a536a3e859d043ff2d8a36c2f4c32ce3e9 (patch)
tree13dfe14ad32abdde64658a3e824ff7f20d19f39d
parentdirmngr: Only use SKS pool CA for SKS pool (diff)
downloadgnupg-253024a536a3e859d043ff2d8a36c2f4c32ce3e9.tar.gz
gnupg-253024a536a3e859d043ff2d8a36c2f4c32ce3e9.zip
Use hkps://keys.openpgp.org as the default keyserver
As of 2.2.17, GnuPG will refuse to accept any third-party certifications from OpenPGP certificates pulled from the keyserver network. The SKS keyserver network currently has at least a dozen popular certificates which are flooded with enough unusable third-party certifications that they cannot be retrieved in any reasonable amount of time. The hkps://keys.openpgp.org keyserver installation offers HKPS, performs cryptographic validation, and by policy does not distribute third-party certifications anyway. It is not distributed or federated yet, unfortunately, but it is functional, which is more than can be said for the dying SKS pool. And given that GnuPG is going to reject all the third-party certifications anyway, there is no clear "web of trust" rationale for relying on the SKS pool. One sticking point is that keys.openpgp.org does not distribute user IDs unless the user has proven control of the associated e-mail address. This means that on standard upstream GnuPG, retrieving revocations or subkey updates of those certificates will fail, because upstream GnuPG ignores any incoming certificate without a user ID, even if it knows a user ID in the local copy of the certificate (see https://dev.gnupg.org/T4393). However, we have three patches in debian/patches/import-merge-without-userid/ that together fix that bug. Signed-off-by: Daniel Kahn Gillmor <[email protected]> Gbp-Pq: Name Use-hkps-keys.openpgp.org-as-the-default-keyserver.patch
-rw-r--r--configure.ac2
-rw-r--r--doc/dirmngr.texi2
2 files changed, 2 insertions, 2 deletions
diff --git a/configure.ac b/configure.ac
index 6fd90d1b6..d3b2997f3 100644
--- a/configure.ac
+++ b/configure.ac
@@ -1870,7 +1870,7 @@ AC_DEFINE_UNQUOTED(SCDAEMON_SOCK_NAME, "S.scdaemon",
AC_DEFINE_UNQUOTED(DIRMNGR_SOCK_NAME, "S.dirmngr",
[The name of the dirmngr socket])
AC_DEFINE_UNQUOTED(DIRMNGR_DEFAULT_KEYSERVER,
- "hkps://hkps.pool.sks-keyservers.net",
+ "hkps://keys.openpgp.org",
[The default keyserver for dirmngr to use, if none is explicitly given])
AC_DEFINE_UNQUOTED(GPGEXT_GPG, "gpg", [The standard binary file suffix])
diff --git a/doc/dirmngr.texi b/doc/dirmngr.texi
index 8e6cbc643..d79447f9a 100644
--- a/doc/dirmngr.texi
+++ b/doc/dirmngr.texi
@@ -328,7 +328,7 @@ whether Tor is locally running or not. The check for a running Tor is
done for each new connection.
If no keyserver is explicitly configured, dirmngr will use the
-built-in default of hkps://hkps.pool.sks-keyservers.net.
+built-in default of hkps://keys.openpgp.org.
@item --nameserver @var{ipaddr}
@opindex nameserver