aboutsummaryrefslogtreecommitdiffstats
path: root/mpi/mpiutil.c
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>2015-02-26 15:34:44 +0000
committerWerner Koch <[email protected]>2015-02-26 17:30:08 +0000
commit52c6c30647a96162a10715e667299167717c58dd (patch)
treea3c7eb78d0e43e8786e2619394ba3de2119a3951 /mpi/mpiutil.c
parentMove two functions from g10/ to util/. (diff)
downloadgnupg-52c6c30647a96162a10715e667299167717c58dd.tar.gz
gnupg-52c6c30647a96162a10715e667299167717c58dd.zip
Switch to a hash and CERT record based PKA system.
* util/pka.c: Rewrite. (get_pka_info): Add arg fprbuflen. Change callers to pass this. * util/strgutil.c (ascii_strlwr): New. * configure.ac: Remove option --disable-dns-pka. (USE_DNS_PKA): Remove ac_define. * g10/getkey.c (parse_auto_key_locate): Always include PKA. -- Note that although PKA is now always build, it will only work if support for looking up via DNS has not been disabled. The new PKA only works with the IPGP DNS certtype and shall be used only to retrieve the fingerprint and optional the key for the first time. Due to the security problems with DNSSEC the former assumption to validate the key using DNSSEC is not anymore justified. Instead an additional layer (e.g. Trust-On-First-Use) needs to be implemented to track change to the key. Having a solid way of getting a key matching a mail address is however a must have. More work needs to go into a redefinition of the --verify-options pka-lookups and pka-trust-increase. The auto-key-locate mechanism should also be able to continue key fetching with another method once the fingerprint has been retrieved with PKA. Signed-off-by: Werner Koch <[email protected]> This is a backport from master. (backported from commit 2fc27c8696f5cf2ddf3212397ea49bff115d617b)
Diffstat (limited to 'mpi/mpiutil.c')
0 files changed, 0 insertions, 0 deletions