> On Feb 15, 2022, at 2:45 PM, Andrew Gallagher <andr...@andrewg.com> wrote:
> 
> 
>> On 15 Feb 2022, at 21:46, Dan Mahoney (Gushi) via Gnupg-users 
>> <gnupg-users@gnupg.org> wrote:
>> 
>> Since the debacle a few years ago with the SKS keyserver denial-of-service 
>> attack, the keyservers are kind of a non-starter.
> 
> Why so? Keyservers are still around, and the ones that survived the 
> apocalypse are generally the ones that are better maintained. The only glitch 
> from a user POV is that you have to publish to both a synchronising server 
> and keys.openpgp.org to make sure everyone sees your updates…

That's a decision I leave up to the people who *make* the key (and the software 
that it's signing).  If they've decided not to push the key out there (and it's 
no longer the case that you can publish just anyone's key) I need to respect 
that.

Right now, the decision is that our key (signed with our prior-year key) is on 
our website and FTP (also via https) site, and we do not assert that it's 
available on the keyservers.

-Dan
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to