Most of the key servers (I hope) use the same code base, and there was
an update to support cors.

So I think this will be available from many:

On 04/19/2014 11:40 PM, [email protected] wrote:
>
>
> Greetings,
>
> I believe I asked a pgp key server http interface question on this
> list a while ago, and received a useful response.
>
> I also wrote [email protected] the request below.. With no
> response.

For questions regarding keyservers, sks-devel[0] is probably your best
bet..

>
>
>
> Is there any way that the http pgp key servers could be changed to
> provide cors headers allowing access from any site? This could
> also be done through some proxy server (njinx?) which accepts,
> forwards and then concatenates cors headers to the response.

This is alreday included in the SKS trunk as of commit [1] for an
upcoming 1.1.5 release. Once that is released
subset.pool.sks-keyservers.net[2] will be bumped to this as a min
requirement and can be used for your purposes.


>
> I realize this is not the pgp keyserver mailing list. But I figure
> the developers of that server also reside in this list -- and I'm
> not sure exactly which list is the right list to post to.
>

References
[0] http://lists.nongnu.org/archive/html/sks-devel/
[1]
https://bitbucket.org/skskeyserver/sks-keyserver/commits/f6e4e88a049a3497cc17b0ad15530782d78bc59f?at=default
[2] https://sks-keyservers.net/overview-of-pools.php#pool_subset

- --
- ----------------------------
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
- ----------------------------
Public PGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
- ----------------------------
"I have always wished that my computer would be as easy to use as my
telephone.
My wish has come true -- I no longer know how to use my telephone"
(Bjarne Stroustrup, April 1999)


============

Kristian Fiskerstrand <[email protected]>
To: "[email protected]" <[email protected]>, gnupg-users
<[email protected]>
 Hello,

We are pleased to announce the availability of a new stable SKS
release:  Version 1.1.5.

SKS is an OpenPGP keyserver whose goal is to provide easy to deploy,
decentralized, and highly reliable synchronization. That means that a
key submitted to one SKS server will quickly be distributed to all key
servers, and even wildly out-of-date servers, or servers that experience
spotty connectivity, can fully synchronize with rest of the system.

What's New in 1.1.5
====================
  - Fixes for machine-readable indices. Key expiration times are now
    read from self-signatures on the key's UIDs. In addition, instead of
    8-digit key IDs, index entries now return the most specific key ID
    possible: 16-digit key ID for V3 keys, and the full fingerprint for
    V4 keys.
  - Add metadata information (number of keys, number of files,
    checksums, etc) to key dump. This allows for information on the
    key dump ahead of download/import, and direct verification of
    checksums using md5sum -c <metadata-file>.
  - Replaced occurrances of the deprecated operator 'or' with '||'
    (BB issue #2)
  - Upgraded to cryptlib-1.7 and own changes are now packaged as
    separate patches that is installed during 'make'. Added the SHA-3
    algorithm, Keccak
  - Option max_matches was setting max_internal_matches. Fixed
    (BB issue #4)
  - op=hget now supports option=mr for completeness (BB issue #17)
  - Add CORS header to web server responses. Allows JavaScript code to
    interact with keyservers, for example the OpenPGP.js project.
  - Change the default hkp_address and recon_address to making the
    default configuration support IPv6. (Requires OCaml 3.11.0 or newer)
  - Only use '-warn-error A' if the source is marked as development as
    per the version suffix (+) (part of BB Issue #2)
  - Reduce logging verbosity for debug level lower than 6 for (i) bad
    requests, and (ii) no results found (removal of HTTP headers in
    log) (BB Issue #13)
  - Add additional OIDs for ECC RFC6637 style implementations
    (brainpool and secp256k1) (BB Issue #25) and fix issue for 32 bit
    arches.
  - Fix a non-persistent cross-site scripting possibility resulting from
    improper input sanitation before writing to client. (BB Issue #26 |
    CVE-2014-3207)


Note when upgrading from earlier versions of SKS
====================
The default values for pagesize settings changed in SKS 1.1.4. To
continue using an existing DB from earlier versions without rebuilding,
explicit settings have to be added to the sksconf file.
pagesize:       4
ptree_pagesize: 1

Getting the Software
====================
SKS can be downloaded from
https://bitbucket.org/skskeyserver/sks-keyserver

Prerequisites
====================
There are a few prerequisites to building this code. You need:
* ocaml-3.11.0 or later (ocaml-3.12.x is recommended). Get it from
  <http://www.ocaml.org>
* Berkeley DB version 4.6.* or later, whereby 4.8 or later is
recommended. You can find the appropriate versions at
<http://www.oracle.com/technetwork/database/berkeleydb/downloads/index.html>
* GNU Make and a C compiler (e.g gcc)

Verifying the integrity of the download
====================
Releases of SKS are signed using the SKS Keyserver Signing Key
available on public keyservers with the KeyID

    0x41259773973A612A
        
and has a fingerprint of

    C90E F143 0B3A C0DF D00E 6EA5 4125 9773 973A 612A.
        
Using GnuPG, verification can be accomplished by, first, retrieving the
signing key using

    gpg --keyserver pool.sks-keyservers.net --recv-key 0x41259773973A612A
        
followed by verifying that you have the correct key

    gpg --keyid-format long --fingerprint 0x41259773973A612A

should produce:

    pub   4096R/41259773973A612A 2012-06-27
    Key fingerprint = C90E F143 0B3A C0DF D00E 6EA5 4125 9773 973A 612A
                
A check should also be made that the key is signed by
trustworthy other keys;

    gpg --list-sigs 0x41259773973A612A

and the fingerprint should be verified through other trustworthy sources.
                        
Once you are certain that you have the correct key downloaded, you can
create a local signature, in order to remember that you have verified
the key.

     gpg --lsign-key 0x41259773973A612A

Finally; verifying the downloaded file can be done using

    gpg --keyid-format long --verify sks-x.y.z.tgz.asc

The resulting output should be similar to
        
    gpg: Signature made Wed Jun 27 12:52:39 2012 CEST
    gpg:                using RSA key 41259773973A612A
    gpg: Good signature from "SKS Keyserver Signing Key"

Checksums for sks-1.1.5.tgz
  SHA1:
  a353426e99de3fb02bf93b953f574335a9f2a590

  SHA256:
  92a7f113f0ba7a28d51d7ced60a984d042d8524c651dc3fcafe9d11cc32981a0

Thanks
====================
We have to thank all the people who helped with this release, by
discussions on the mailing list, submitting patches, or opening issues
for items that needed our attention.

Happy Hacking,
  The SKS Team (Yaron, John, Kristian, Phil, and the other contributors)


- --
- ----------------------------
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
- ----------------------------
Public PGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
- ----------------------------
"Excellence is not a singular act but a habit. You are what you do
repeatedly."|
(Shaquille O'Neal)
_______________________________________________
Gnupg-users mailing list
[email protected]
http://lists.gnupg.org/mailman/listinfo/gnupg-users

On 5/15/14, Paweł Górny <[email protected]> wrote:
>
>
> Hello
>
> I am glad to inform you about the new release of PGpgp - PGP application
> for BlackBerry 10 smartphones, version 1.4.
>
> Please note: as I have found a keyserver which allows cross-domain
> connections, now it is possible to download the public keys.
>
> More details: http://pawelgorny.com/PGpgp/
>
> Kind regards,
>
> Pawel Gorny
>
>
_______________________________________________

http://openpgpjs.org
Subscribe/unsubscribe: http://list.openpgpjs.org

Reply via email to