Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GnuPG 2.1 best practices review #451

Closed
5 of 10 tasks
anarcat opened this issue Sep 7, 2017 · 10 comments
Closed
5 of 10 tasks

GnuPG 2.1 best practices review #451

anarcat opened this issue Sep 7, 2017 · 10 comments

Comments

@anarcat
Copy link
Contributor

anarcat commented Sep 7, 2017

This is a meta-issue to regroup issues surrounding a formal review of the GnuPG best practices after the publication of the GnuPG 2.1 release, which includes some of the recommendations from the document.

anarcat added a commit to anarcat/riseup_help that referenced this issue Sep 7, 2017
Newer GnuPG versions generate a revocation certificate automatically. See riseupnet#451.
@baldurmen
Copy link
Contributor

Just wanted to drop a "thank you" for this thread of bug reports. i've encountered a few quirks with the migration to GPG and it's nice to know people are looking into it ;D

@wiktor-k
Copy link

Phew, I'm glad that I found this ticket.

I think the best practices guide should either target only modern GnuPG (>2.1) or be split into two - modern and legacy.

Currently it's hard to navigate and a lot of stuff is obsolete in modern gpg (keyserver-options no-honor-keyserver-url is used by default, new keys have 2y expiry automatically, keys are V4, stronger prefs are used by default, the key generation wizard do not ask about Comment)...

There is also stuff that I think is worth adding (for example setting up Web Key Directory on own domain allows easy and secure key discovery using e-mail addresses).

@anarcat
Copy link
Contributor Author

anarcat commented Jun 26, 2018

pull requests are welcome! :)

@wiktor-k
Copy link

Excellent idea :)

kradan added a commit to kradan/riseup_help that referenced this issue Jul 9, 2018
@DamianRivas
Copy link

Hello, thank you for the wonderful guide! I was able to follow every part of the guide, but I'm failing to publish my key to a key server.

I believe this is because gnupg-curl doesn't seem to exist anymore. Are there any known alternatives? I'm on Ubuntu 18.04.

Another weird thing is that https://sks-keyservers.net/sks-keyservers.netCA.pem does not seem to download a file by default. What I did was I right-clicked that link and selected "Save Link As..." Then I was able to save a file called sks-keyservers.netCA.pem. Is this acceptable?

@kradan
Copy link
Contributor

kradan commented Aug 14, 2018 via email

@DamianRivas
Copy link

Hi @kradan! I actually just tried again and it worked for me this time. Perhaps I copied and pasted the fingerprint incorrectly the first time around. And yeah, the command was gpg --send-keys '<fingerprint>' from the publish section of the "Managing OpenPGP Keys" article.

It might be a good idea to explicitly state that dirmngr replaces gnupg-curl. I came across the guide because I'm totally new to encryption, and "Use dirmngr in OpenPGP best practices" didn't mean anything to me until now that I already know to look for that. Just my 2 cents if the goal here is to be welcoming to newbies.

The more I Google, the more it seems that most of the stuff in the riseup guide is deprecated. I realize this is stated in the beginning but considering the amount of information it contains I didn't expect so much to be outdated for newer versions. Although there seems to be some good gems in there like parcimonie.

I don't want to go on a huge tangent, so thanks for the reply and the resources! :)

@heitorPB
Copy link

I just added a new issue about the guide: #539

kradan added a commit to kradan/riseup_help that referenced this issue Sep 20, 2018
kradan added a commit to kradan/riseup_help that referenced this issue Sep 28, 2019
kradan added a commit to kradan/riseup_help that referenced this issue Oct 4, 2019
@rolandog
Copy link

Hey everyone, after checking other 'best practices' implementations, I found a suitable template from which to update RiseUp's 'best practices guide'. Here's the implementation from Roll Your Own Network; what I like about it is the thorough comments with documentation.

However, some of the options are not discussed in RiseUp's guide; like auto-key-retrieve, auto-key-locate, the s2k- options, etc.

It'd be nice to see other people's take on those options.

@disturbio
Copy link
Contributor

We are killing this document as GnuPG's work has been doing good defaults for a while and the guide is by itself problematic.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

8 participants