Hi Phil, To clarify: Why do you put keys intended only for signing into the WKD? The only purpose of the WKD is to discover keys used to encrypt outgoing data/mail. To verify a signature the WKD does not really help because there is no way to look up the key by fingerprint. Well, one of the fallbacks is:
/* If the above methods didn't work, our next try is to retrieve the * key from the WKD. This requires that WKD is in the AKL and the * Signer's UID is in the signature. */ However, to be able to do this, the signer needs to specify the signing key by NAME (e.g. w...@gnupg.org) and not key fingerprint or keyid (e.g. AEA84EDCF01AD86C4701C85C63113AE866587D0A) as suggested. Or to use the --sender option. Is this your use-case? Makes some sense to me. Summary of options: 1. Upload sign-only keys (strip the encryption subkey). You can't use the Web Key Service in this case. You have to resort to another mechanism like build a local mirror and rsync it. 2. Add a notation to the key not to use the encryption key without asking. This requires all clients to understand this notation and act acordingly. 3. Add a WKD policy not to use the key for opportunistic encryption. Also needs cleint changes. 4. A variant of 1 which strips the encryption subkey after the publication has been confirmed. This can be done with a WKS protocol extension. Advantage is that it can be done on a key by key base. Salam-Shalom, Werner -- The pioneers of a warless world are the youth that refuse military service. - A. Einstein
signature.asc
Description: PGP signature
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users