Design of a Modern Keyserver Network
andrewg
andrewg at andrewg.com
Thu Jan 30 16:00:32 CET 2025
On 2025-01-30 11:29, Michael Richardson wrote:
>
> I think that that the place where we actually need to differ from the
> past is
> actually the flood-fill between key servers. I think that's probably
> not
> going to work.
Speaking for the current SKS keyserver operators, it *is* currently
working. There are occasional glitches when vandals find a way around
our flooding protections, but we are constantly improving these. (I
realise I'm tempting fate by saying this...)
> Autocrypt seems like the right way for key servers to interact with
> users.
> Effectively, what we want is a kind of STAR:
>
> Support for Short-Term, Automatically Renewed (STAR) Certificates in
> the
> Automated Certificate Management Environment (ACME)
> RFC 8739
>
> specifically, keyservers will stop publishing keys that they can't
> confirm
> that the user actually still wants published.
It's a good idea in principle, but the practicalities of getting
continually refreshed consent to publish are currently prohibitive. ACME
works because the end user (i.e. the server operator) has an automated
job that periodically polls the issuer (e.g. letsencrypt) for fresh
certifications, and the issuer can validate the request by making a
simple HTTP request that the user does not need to be aware of. This
does not translate well to email, which is a fundamentally interactive
protocol. It is true that enigmail used to automatically handle WKS
verification emails, but this did not catch on elsewhere
(unfortunately!) and having multiple keyservers send out such
verifications on a recurring schedule would quickly become annoying (and
potentially get a keyserver blacklisted).
A
More information about the Gnupg-users
mailing list