In T4726#130765, @werner wrote:Given that the the angle brackets are elsewhere used to indicate a search by mail address, it would be okay to allow for them in this case too (that is dkg's second example).
[...]
To answer your question: With the exception of case two this is desired behaviour also in the future,
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Nov 23 2019
Nov 23 2019
ringelkrat added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
Nov 16 2019
Nov 16 2019
• werner triaged T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets) as Normal priority.
• werner added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
Given that the the angle brackets are elsewhere used to indicate a search by mail address, it would be okay to allow for them in this case too (that is dkg's second example). The risk of a regression in that case is pretty low.
Nov 7 2019
Nov 7 2019
ringelkrat added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
In T4726#130609, @werner wrote:-r STRINGdoes a remote key lookup only if STRING is a valid addr-spec. No extraction of the addr-spec from STRING is done and thus angle brackets inhibit the use of a remote lookup.
• werner added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
does a remote key lookup only if STRING is a valid addr-spec. No extraction of the addr-spec from STRING is done and thus angle brackets inhibit the use of a remote lookup. This was implemented in this way to be as much as possible backward compatible.
Oct 28 2019
Oct 28 2019
Oct 24 2019
Oct 24 2019
dkg added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
@werner, you seem to be saying that -r does not imply "key lookups on remote services". Is that correct?
Oct 23 2019
Oct 23 2019
ringelkrat added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
In T4726#130341, @werner wrote:This is a misunderstanding. The extraction of mail addresses is only doe for key lookups on remote services. Thus the -r case is as intended.
• werner added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
This is a misunderstanding. The extraction of mail addresses is only doe for key lookups on remote services. Thus the -r case is as intended.
ringelkrat added a comment to T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
Is this task maybe related to T1927?
ringelkrat updated subscribers of T4726: auto-key-locate only works with raw e-mail addresses (not angle-brackets).
Thank you @dkg for creating the bug report! I would like to glean the following information from the above mentioned discussion.
Sep 2 2019
Sep 2 2019
Aug 21 2019
Aug 21 2019
dkg added a comment to T4679: WKD spec should document exactly when a client should fall back from "advanced" to "direct" URL.
This was also raised for (hopefully) wider discussion on the IETF mailing list.
Aug 20 2019
Aug 20 2019
Jul 5 2019
Jul 5 2019
Done for master and 2.2.
• werner triaged T4613: document implementation guidance for WKD clients in draft-koch-openpgp-webkey-service as Normal priority.
Jul 4 2019
Jul 4 2019
Fix will be in 2.2.17
Jul 3 2019
Jul 3 2019
@dkg I believe @aheinecke gave the GpgOL description just as an example of why WKD-first retrieval would be beneficial (for details of that see https://wiki.gnupg.org/AutomatedEncryption#Trust_Levels) and I believe this ticket is a follow-up to my question on gnupg-devel ML: https://lists.gnupg.org/pipermail/gnupg-devel/2019-June/034372.html
auto-key-retrieve happens in the context of signature verification when the certificate is missing. If no signer User ID subpacket is present in the signature, then WKD simply won't work.
• werner moved T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver from Backlog to For next release on the gnupg (gpg22) board.
• werner edited projects for T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver, added: gnupg (gpg22); removed gnupg.
• werner added a parent task for T4595: GPG: auto-key-retrieve should prefer WKD over Keyserver: T4606: Release GnuPG 2.2.17.
• werner added a parent task for T4603: dirmngr WKD redirection changes paths: T4606: Release GnuPG 2.2.17.
• werner moved T4603: dirmngr WKD redirection changes paths from Backlog to For next release on the gnupg (gpg22) board.
I did some manual tests using netcat and KS_FETCH to test the redirection.
I think you're suggesting accepting *any* path if the hostname of the proposed redirection matches openpgpkey.example.org when querying the WKD direct URL for an @example.org address. That would also be a fine solution from my point of view.
I head the same idea when I read your configuration. Given that the advanced lookup was not reallydeployed (see T4590) I also expect that we will receive complains now that it works. Thus white listing any "openpgpkey." seems to me a reasonable easy solution.
Will be in 2.2.17
Oh dear, that happens if one is always on master. I simply forgot to cherry pick the change from master back in November.
Two commits, though.
@werner, thanks for the pointer to the report, that's certainly useful. And i'm happy that organizations like SektionEins are doing GnuPG audits and publishing their results regardless of who paid for them.
See https://sektioneins.de/en/blog/18-11-23-gnupg-wkd.html for details. In short they fear that companies using IP based security for internal services can be attacked via redirect request and in particular becuase that can happen in the background without the user noticing. I am not concerned but we had long lasting discussions also with protonmail about this and the result was that we need to have this protection. We do not know who requested and paid for the audit from SektionEins and they won't tell us.
Jul 2 2019
Jul 2 2019
We need to rewrite the Location to avoid a CSRF attack. See fa1b1eaa4241ff3f0634c8bdf8591cbc7c464144
Jul 1 2019
Jul 1 2019
Jun 28 2019
Jun 28 2019
I recognize that adding network activity to the test suite can be complicated (not all test suites are run with functional network access), but if it is possible to have a unit test or something (that doesn't do network access, but just looks at what the dirmngr *would* have tried somehow?), that would be great. Thanks for looking into this!
Confirmed; that looks like a regression.
Apr 1 2019
Apr 1 2019
Mar 21 2019
Mar 21 2019
• werner added a parent task for T4344: Periodic check of own keys with the WKD: T4417: Work needed for gnupg 2.3.
Jan 25 2019
Jan 25 2019
Dec 5 2018
Dec 5 2018
• aheinecke changed the status of T4268: Provide a method to build a simple WKD server filestructure on Windows from Open to Testing.
Sounds good! I give it to me for testing / documenting this.
Dec 4 2018
Dec 4 2018
• werner added a comment to T4268: Provide a method to build a simple WKD server filestructure on Windows.
With master we can now do:
Nov 28 2018
Nov 28 2018
• aheinecke added a comment to T4268: Provide a method to build a simple WKD server filestructure on Windows.
@werner Be my guest.
Nov 27 2018
Nov 27 2018
• werner added a comment to T4268: Provide a method to build a simple WKD server filestructure on Windows.
Why not using PowerShell? Because --with-colons does not output the required hash? But that can't be the reason because Python has the very same problem. Using Python for scripts is anyway a bit of overkill.
bernhard added a comment to T4268: Provide a method to build a simple WKD server filestructure on Windows.
Precondition: A list of pubkeys, as keyring or as keyring file with list of fingerprints.
Goal: a static file structure that can be uploaded on my webserver.
Platform: Windows, a better solution does require less additional dependencies apart from Gpg4win.
Nov 26 2018
Nov 26 2018
• werner added a comment to T4268: Provide a method to build a simple WKD server filestructure on Windows.
gpg-wks-server --install-key fingerprint
bernhard added a comment to T4268: Provide a method to build a simple WKD server filestructure on Windows.
... that would be useful in many ways. I'd say we should support anyone who wants to use pythong-gnupg on windows.
bernhard added a comment to T4268: Provide a method to build a simple WKD server filestructure on Windows.
@werner it is like @aheinecke writes:
• aheinecke added a comment to T4268: Provide a method to build a simple WKD server filestructure on Windows.
As I see it Bernhard is just asking for the flat strucuture so basically some export script that creates the needed files on windows.
• werner triaged T4268: Provide a method to build a simple WKD server filestructure on Windows as Low priority.
If they really want to do that for Windows, they can use some database approach like Protonmail does it. This does not require any file structure.
• werner added a comment to T4268: Provide a method to build a simple WKD server filestructure on Windows.
Sorry, we won't implement a server for WIndows. No sane provider uses Windows for a large mail setup.
Oct 11 2017
Oct 11 2017
• werner closed T3438: Adding netzguerilla.net to the list of mailservers supporting WKD as Resolved.
• werner added a comment to T3438: Adding netzguerilla.net to the list of mailservers supporting WKD.
Thanks. I added you to the wiki page.
Oct 10 2017
Oct 10 2017
thanks for the links to documents.
we've setup submisson-address and policy links.
• werner triaged T3438: Adding netzguerilla.net to the list of mailservers supporting WKD as High priority.