On 7/3/19 10:17 AM, Andrew Gallagher wrote: > On 03/07/2019 05:46, Phil Pennock via Gnupg-users wrote: >> Beware: the HKP schema of paths is used with the keyserver in that >> field, in GnuPG at least. > OK, but what's the failure mode? If it's graceful, then we haven't lost > much. So long as key updates fall back to a keyserver somewhere it > should be transparent. > > This does of course need thorough testing, as not all clients will have > the same failure modes. >
at least one issue that has been pointed out historically about relying on specification of TPK URI for refresh is privacy issues related to callbacks and/or DoS. There are various ways this can be used for other attack vectors as well, so they are mostly just ignored. -- ---------------------------- Kristian Fiskerstrand Blog: https://blog.sumptuouscapital.com Twitter: @krifisk ---------------------------- Public OpenPGP keyblock at hkp://pool.sks-keyservers.net fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3 ---------------------------- Corruptissima re publica plurimæ leges The greater the degeneration of the republic, the more of its laws
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users