[Pkg-gnupg-maint] Bug#519333: gnupg: Please include support for encrypted keyserver queries [PATCH]

David Shaw dshaw at jabberwocky.com
Thu Mar 12 17:22:50 UTC 2009


On Thu, Mar 12, 2009 at 01:17:08PM -0400, Daniel Kahn Gillmor wrote:
> On 03/12/2009 12:33 AM, David Shaw wrote:
> 
> > As the author of that patch, let me request that you - please - don't
> > adopt it just yet.  To be sure, the feature is coming, but the exact
> > semantics are not yet set in stone. Adopting the feature before it is
> > finished and released ties the hands of those working on it, as it would
> > be much harder to make changes to the design.
> 
> David, thanks for the quick feedback here (and for authoring the patch
> in the first place!)  I understand why you wouldn't want your hands tied
> for something that may change, and respect that.  Can i contribute to
> sorting out the target semantics somehow?

Please do!

>  What part of the semantics
> are you concerned may change?  As far as i can tell, the user-facing
> bits of the change are:
> 
>  * keyservers providing secured HKP are expected to run TLS-wrapped HKP
> by default on port 11372 (the hkp port + 1).  of course, running on
> alternate ports is not forbidden.

Yes.  I'm not 100% ready to discard TLS over 11371 quite yet, though.
TLS upgrade gives a lot of nice semantics that SSL over 11372 doesn't
have.  I need to test what is possible here.

>  * if a user prefixes their keyserver location with hkps:// , and gpg is
> built with with libcurl, gpg will wrap its connections to the keyserver
> in TLS (using 11372 by default instead of 11371), and will verify the
> remote machine's identity before performing keyserver access.

Currently that is what the patch does.  It might be nice to also
support client-side certificates.  Remember that gpg2 does X.509
natively, so we certainly have access to the certs to identify
ourselves with.

Are you on gnupg-devel?  I've started a thread there so the GPG
community can talk about this.

David





More information about the Pkg-gnupg-maint mailing list