On Tue, 7 Jan 2025 04:09:52 +0000
have--- via Gnupg-users <gnupg-users@gnupg.org> wrote:
> 
> A question of netiquette:  Is it acceptable to do this on a first
> post to a public list?

Without having a final answer, some thoughts:

1.
Signed emails which are sent to a list can be verified only with the
public key.  Thus the other list members should have a chance to get
this key.

2.
Sending the key once will exclude those
people / list members who join afterwards.

3.
Sending the key always will increase traffic and amount
of used storage space. Maybe this isn't any kind of real
issue nowadays.

4.
Given a public mailing list archive, can the key be extracted from
there in the far future?  Which format would be suitable for this?
Are the headers archived completely?

5.
The WKD web key directory looks like a suitable workflow to distribute
public keys without repeated overhead inside the emails itselves. Just
as a proof of concept for myself, I tried it several months ago.  It's
easy to setup in conjunction with some webspace. Actually this is only
a "works for me" solution, YMMV.  I do not claim it to be _the_ single
and universal solution.

6.
Maybe the final answer is not agreeing on a single distribution
workflow but having different options live and in the wild. This
could protect against suprising disruption attacks against the
ecosystem as it happended with keyservers in the past.
-- 
kind regards
Frank

Attachment: pgpyQKQLI9CA4.pgp
Description: OpenPGP digital signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to