Page MenuHome GnuPG

Allow gpg to auto-upload a new own key to LDAP servers
Open, HighPublic

Description

Organizations with an internal LDAP server will benefit from an auto-upload after key generation. Maybe we can have a value for the option to extend it to also upload modifications. Or should we always upload modifications?

Event Timeline

werner renamed this task from Allow gpg to auto-upload a new key to LDAP servers to Allow gpg to auto-upload a new own key to LDAP servers.Oct 11 2024, 2:32 PM
werner triaged this task as High priority.
werner created this task.
werner created this object with edit policy "Contributor (Project)".

I suggest always updating modifications which are "exportable".

In case the option is set but no LDAP server is defined, the option is ignored and a warning is displayed.
In case the LDAP server is not reachable, an error message should be shown. The user then might get a hint to send the certificate manually to the LDAP.

ebo removed a project: Restricted Project.Aug 4 2025, 1:39 PM

Hi
I have some questions about the "auto-key-upload: If an LDAP keyserver is configured (in dirmngr), upload a newly created key directly to that server" feature:

  1. If an LDAP keyserver is configured, will every newly created key be uploaded? Is this upload behavior enabled by default?
  2. Even with an LDAP keyserver configured, what if we don’t want to upload by default? If we prefer manual approval or want to upload only a specific subkey, how should we handle that?
  3. What about keys created for testing, temporary use, or personal privacy-sensitive purposes that we don’t want others to discover?

People who use GPG tend to care deeply about privacy and don’t want to upload or expose unnecessary information.

re 1: Only if the option --auto-key-upload is used/configured.
re 2: Do not configure --auto-key-upload but give it on the command line.
re 3: Do not use --auto-key-upload - maybe I should add a --no-auto-key-upload option.

The thing with LDAP servers is that hey are deployed in a controlled environment and not on the public internet. That contracts can be used to punish any abuse. Having an LDAP server on the public internet would bring us back all the problems we have seen with public keyservers: DoS, "faked" keys, and no usable way to delete a key.

werner added a project: gnupg26.
werner moved this task from Backlog to QA on the gnupg26 board.