On Wed, Apr 05, 2006 at 03:18:31PM +0200, Peter Palfrader wrote: > On Wed, 05 Apr 2006, David Shaw wrote: > > > On Wed, Apr 05, 2006 at 12:30:42PM +0200, Peter Palfrader wrote: > > > > > I notice that if I have both, a IPGP and a PGP CERT RR that GnuPG fails > > > to import the key some of the time: > > > > [..] > > > > > } ;; ANSWER SECTION: > > > } peter.palfrader.org. 43200 IN CERT 6 0 0 > > > FFsAyW1dVK7hIGuvhN56r26UwJx/ > > > } peter.palfrader.org. 43200 IN CERT PGP 0 0 > > > mQGiBDgp0YcRBACN9s8EycXRsu9ym3Sjou1N..... > > > > > > Is having them both not supported or is there a bug somewhere? > > > > At the moment, GnuPG will take whichever it sees first (the PGP or the > > IPGP, but not both). So given round robining, if you have both, it > > will seem to flip back and forth between the two. I'm thinking about > > having GPG favor one or the other in these cases (probably PGP since > > if it has already fetched the whole key, it may as well import it > > rather than go to a web page or keyserver somewhere). > > On the other hand the key that is fetched via DNS has serious size > constraints - DNS limits the RDATA to 64k and I think GnuPG further > limits this to 16k. In my case I have significantly stripped down my > key in order to store it in DNS, so maybe going to the keyserver or the > location specified in IPGP might be a good idea.
Certainly the CERT PGP type has size restrictions, but I think that's fine: I don't really see the CERT PGP type as a repository for whole keys with dozens of signatures like on a keyserver. Rather, it's a place to store minimal (via export-minimal) keys. Once this "seed" key is gotten via CERT PGP, it can be fleshed out via a keyserver or preferred keyserver subpacket on the key itself. The GnuPG 16k max-cert-size is changeable, by the way: --keyserver-options max-cert-size=65536 16k was a bit of a guess as to a good value since CERT is so new. Whether to favor CERT PGP or CERT IPGP is one of those things where a reasonable case can be made for either path. It depends on what you're using CERT for: if you were using CERT in a PKA-like scheme, you'd want CERT PGP to get the answer as fast as possible, while if you were using CERT as a automatic key locater you'd probably want CERT IPGP to get all the signatures. > > The reason it is not fetching from the IPGP record you have there is > > there is only a fingerprint, and you must have a --keyserver defined > > for it to fetch the fingerprint from in that case. Do you have a > > --keyserver defined? > > Ah, now that I do it works nicely. Thanks! Maybe gpg should say that > it wants to have a keyserver in this case? Yes, I think it should. Note that you could make your IPGP contain both a fingerprint and a URL - that way you get to specify where the user will fetch your key from (it may not exist in the manner you desire on their particular keyserver). David _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users