mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-03 22:56:33 +02:00
gpg: With --auto-key-retrieve prefer WKD over keyservers.
* g10/mainproc.c (check_sig_and_print): Print a hint on how to make
use of the preferred keyserver. Remove keyserver lookup just by the
keyid. Try a WKD lookup before a keyserver lookup.
--
The use of the the keyid for lookups does not make much sense anymore
since for quite some time we do have the fingerprint as part of the
signature.
GnuPG-bug-id: 4595
Signed-off-by: Werner Koch <wk@gnupg.org>
(cherry picked from commit 96bf8f4778
)
This commit is contained in:
parent
6396f8d115
commit
3242837d20
3 changed files with 84 additions and 55 deletions
113
g10/mainproc.c
113
g10/mainproc.c
|
@ -1746,7 +1746,6 @@ check_sig_and_print (CTX c, kbnode_t node)
|
|||
int is_revkey = 0;
|
||||
char *issuer_fpr = NULL;
|
||||
PKT_public_key *pk = NULL; /* The public key for the signature or NULL. */
|
||||
int tried_ks_by_fpr;
|
||||
|
||||
if (opt.skip_verify)
|
||||
{
|
||||
|
@ -1897,12 +1896,17 @@ check_sig_and_print (CTX c, kbnode_t node)
|
|||
|
||||
rc = do_check_sig (c, node, NULL, &is_expkey, &is_revkey, &pk);
|
||||
|
||||
/* If the key isn't found, check for a preferred keyserver. */
|
||||
if (gpg_err_code (rc) == GPG_ERR_NO_PUBKEY && sig->flags.pref_ks)
|
||||
/* If the key isn't found, check for a preferred keyserver. Note
|
||||
* that this is only done if honor-keyserver-url has been set. We
|
||||
* test for this in the loop so that we can show info about the
|
||||
* preferred keyservers. */
|
||||
if (gpg_err_code (rc) == GPG_ERR_NO_PUBKEY
|
||||
&& sig->flags.pref_ks)
|
||||
{
|
||||
const byte *p;
|
||||
int seq = 0;
|
||||
size_t n;
|
||||
int any_pref_ks = 0;
|
||||
|
||||
while ((p=enum_sig_subpkt (sig->hashed,SIGSUBPKT_PREF_KS,&n,&seq,NULL)))
|
||||
{
|
||||
|
@ -1913,9 +1917,10 @@ check_sig_and_print (CTX c, kbnode_t node)
|
|||
log_info(_("Key available at: ") );
|
||||
print_utf8_buffer (log_get_stream(), p, n);
|
||||
log_printf ("\n");
|
||||
any_pref_ks = 1;
|
||||
|
||||
if (opt.keyserver_options.options&KEYSERVER_AUTO_KEY_RETRIEVE
|
||||
&& opt.keyserver_options.options&KEYSERVER_HONOR_KEYSERVER_URL)
|
||||
if ((opt.keyserver_options.options&KEYSERVER_AUTO_KEY_RETRIEVE)
|
||||
&& (opt.keyserver_options.options&KEYSERVER_HONOR_KEYSERVER_URL))
|
||||
{
|
||||
struct keyserver_spec *spec;
|
||||
|
||||
|
@ -1924,6 +1929,10 @@ check_sig_and_print (CTX c, kbnode_t node)
|
|||
{
|
||||
int res;
|
||||
|
||||
if (DBG_LOOKUP)
|
||||
log_debug ("trying auto-key-retrieve method %s\n",
|
||||
"Pref-KS");
|
||||
|
||||
free_public_key (pk);
|
||||
pk = NULL;
|
||||
glo_ctrl.in_auto_key_retrieve++;
|
||||
|
@ -1932,6 +1941,9 @@ check_sig_and_print (CTX c, kbnode_t node)
|
|||
if (!res)
|
||||
rc = do_check_sig (c, node, NULL,
|
||||
&is_expkey, &is_revkey, &pk);
|
||||
else if (DBG_LOOKUP)
|
||||
log_debug ("lookup via %s failed: %s\n", "Pref-KS",
|
||||
gpg_strerror (res));
|
||||
free_keyserver_spec (spec);
|
||||
|
||||
if (!rc)
|
||||
|
@ -1939,10 +1951,43 @@ check_sig_and_print (CTX c, kbnode_t node)
|
|||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (any_pref_ks
|
||||
&& (opt.keyserver_options.options&KEYSERVER_AUTO_KEY_RETRIEVE)
|
||||
&& !(opt.keyserver_options.options&KEYSERVER_HONOR_KEYSERVER_URL))
|
||||
log_info (_("Note: Use '%s' to make use of this info\n"),
|
||||
"--keyserver-option honor-keyserver-url");
|
||||
}
|
||||
|
||||
/* If the above methods didn't work, our next try is to retrieve the
|
||||
* key from the WKD. This requires that WKD is in the AKL and the
|
||||
* Signer's UID is in the signature. */
|
||||
if (gpg_err_code (rc) == GPG_ERR_NO_PUBKEY
|
||||
&& (opt.keyserver_options.options & KEYSERVER_AUTO_KEY_RETRIEVE)
|
||||
&& !opt.flags.disable_signer_uid
|
||||
&& akl_has_wkd_method ()
|
||||
&& sig->signers_uid)
|
||||
{
|
||||
int res;
|
||||
|
||||
if (DBG_LOOKUP)
|
||||
log_debug ("trying auto-key-retrieve method %s\n", "WKD");
|
||||
free_public_key (pk);
|
||||
pk = NULL;
|
||||
glo_ctrl.in_auto_key_retrieve++;
|
||||
res = keyserver_import_wkd (c->ctrl, sig->signers_uid, 1, NULL, NULL);
|
||||
glo_ctrl.in_auto_key_retrieve--;
|
||||
/* Fixme: If the fingerprint is embedded in the signature,
|
||||
* compare it to the fingerprint of the returned key. */
|
||||
if (!res)
|
||||
rc = do_check_sig (c, node, NULL, &is_expkey, &is_revkey, &pk);
|
||||
else if (DBG_LOOKUP)
|
||||
log_debug ("lookup via %s failed: %s\n", "WKD", gpg_strerror (res));
|
||||
}
|
||||
|
||||
/* If the avove methods didn't work, our next try is to use the URI
|
||||
* from a DNS PKA record. */
|
||||
* from a DNS PKA record. This is a legacy method which will
|
||||
* eventually be removed. */
|
||||
if (gpg_err_code (rc) == GPG_ERR_NO_PUBKEY
|
||||
&& (opt.keyserver_options.options & KEYSERVER_AUTO_KEY_RETRIEVE)
|
||||
&& (opt.keyserver_options.options & KEYSERVER_HONOR_PKA_RECORD))
|
||||
|
@ -1959,6 +2004,9 @@ check_sig_and_print (CTX c, kbnode_t node)
|
|||
spec = parse_keyserver_uri (uri, 1);
|
||||
if (spec)
|
||||
{
|
||||
if (DBG_LOOKUP)
|
||||
log_debug ("trying auto-key-retrieve method %s\n", "PKA");
|
||||
|
||||
free_public_key (pk);
|
||||
pk = NULL;
|
||||
glo_ctrl.in_auto_key_retrieve++;
|
||||
|
@ -1967,16 +2015,16 @@ check_sig_and_print (CTX c, kbnode_t node)
|
|||
free_keyserver_spec (spec);
|
||||
if (!res)
|
||||
rc = do_check_sig (c, node, NULL, &is_expkey, &is_revkey, &pk);
|
||||
else if (DBG_LOOKUP)
|
||||
log_debug ("lookup via %s failed: %s\n", "PKA",
|
||||
gpg_strerror (res));
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/* If the above methods didn't work, our next try is to locate
|
||||
* the key via its fingerprint from a keyserver. This requires
|
||||
* that the signers fingerprint is encoded in the signature. We
|
||||
* favor this over the WKD method (to be tried next), because an
|
||||
* arbitrary keyserver is less subject to web bug like monitoring. */
|
||||
tried_ks_by_fpr = 0;
|
||||
* that the signers fingerprint is encoded in the signature. */
|
||||
if (gpg_err_code (rc) == GPG_ERR_NO_PUBKEY
|
||||
&& (opt.keyserver_options.options&KEYSERVER_AUTO_KEY_RETRIEVE)
|
||||
&& keyserver_any_configured (c->ctrl))
|
||||
|
@ -1989,56 +2037,21 @@ check_sig_and_print (CTX c, kbnode_t node)
|
|||
if (p)
|
||||
{
|
||||
/* v4 packet with a SHA-1 fingerprint. */
|
||||
if (DBG_LOOKUP)
|
||||
log_debug ("trying auto-key-retrieve method %s\n", "KS");
|
||||
|
||||
free_public_key (pk);
|
||||
pk = NULL;
|
||||
glo_ctrl.in_auto_key_retrieve++;
|
||||
res = keyserver_import_fprint (c->ctrl, p, n, opt.keyserver, 1);
|
||||
tried_ks_by_fpr = 1;
|
||||
glo_ctrl.in_auto_key_retrieve--;
|
||||
if (!res)
|
||||
rc = do_check_sig (c, node, NULL, &is_expkey, &is_revkey, &pk);
|
||||
else if (DBG_LOOKUP)
|
||||
log_debug ("lookup via %s failed: %s\n", "KS", gpg_strerror (res));
|
||||
}
|
||||
}
|
||||
|
||||
/* If the above methods didn't work, our next try is to retrieve the
|
||||
* key from the WKD. */
|
||||
if (gpg_err_code (rc) == GPG_ERR_NO_PUBKEY
|
||||
&& (opt.keyserver_options.options & KEYSERVER_AUTO_KEY_RETRIEVE)
|
||||
&& !opt.flags.disable_signer_uid
|
||||
&& akl_has_wkd_method ()
|
||||
&& sig->signers_uid)
|
||||
{
|
||||
int res;
|
||||
|
||||
free_public_key (pk);
|
||||
pk = NULL;
|
||||
glo_ctrl.in_auto_key_retrieve++;
|
||||
res = keyserver_import_wkd (c->ctrl, sig->signers_uid, 1, NULL, NULL);
|
||||
glo_ctrl.in_auto_key_retrieve--;
|
||||
/* Fixme: If the fingerprint is embedded in the signature,
|
||||
* compare it to the fingerprint of the returned key. */
|
||||
if (!res)
|
||||
rc = do_check_sig (c, node, NULL, &is_expkey, &is_revkey, &pk);
|
||||
}
|
||||
|
||||
/* If the above methods did't work, our next try is to use a
|
||||
* keyserver. */
|
||||
if (gpg_err_code (rc) == GPG_ERR_NO_PUBKEY
|
||||
&& (opt.keyserver_options.options&KEYSERVER_AUTO_KEY_RETRIEVE)
|
||||
&& !tried_ks_by_fpr
|
||||
&& keyserver_any_configured (c->ctrl))
|
||||
{
|
||||
int res;
|
||||
|
||||
free_public_key (pk);
|
||||
pk = NULL;
|
||||
glo_ctrl.in_auto_key_retrieve++;
|
||||
res = keyserver_import_keyid (c->ctrl, sig->keyid, opt.keyserver, 1);
|
||||
glo_ctrl.in_auto_key_retrieve--;
|
||||
if (!res)
|
||||
rc = do_check_sig (c, node, NULL, &is_expkey, &is_revkey, &pk);
|
||||
}
|
||||
|
||||
if (!rc || gpg_err_code (rc) == GPG_ERR_BAD_SIGNATURE)
|
||||
{
|
||||
kbnode_t un, keyblock;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue