Hey Gnupg users, what would be the most "canonical" way to store arbitrary, signed data along the gpg key? And then: what is the programmatic way of extracting said data?
My specific usecase is putting a signify [1] public key inside my GPG key, so that I can leverage key distribution to push my signify key. After some digging, I was able to add a "notation" to one of my UIDs, using "edit-key" + "notation", and now I have a signed notation inside a self-sig. See: $ gpg --no-options --list-options show-notation --check-sigs KEYID | grep pub@signify Signature notation: pub@signify=SIGNIFYKEY This extraction process seems dangerous to me, however, since an attacker could add a dummy signature on my key with the same notation. I can improve the above by interpreting the input more thoroughly, since the notation follows the signature info: sig!3 N KEYID 2019-08-17 User Example <u...@example.com> Signature notation: pub@signify=SIGNIFYKEY By checking the signature verification status ("sig!") and KEYID I can ensure that the notation is valid. Does it make sense? Is it a good idea? What would be a better way? Cheers, Tomasz
signature.asc
Description: PGP signature
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users