mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-02 22:46:30 +02:00
gpg: Remove support for PKA.
* g10/gpg.c (oPrintPKARecords): Remove. (opts): Remove --print-pka-records. (main): Remove "pka-lookups","pka-trust-increase" and other PKA stuff. * g10/options.h (EXPORT_DANE_FORMAT): Remove. (VERIFY_PKA_LOOKUPS, VERIFY_PKA_TRUST_INCREASE): Remove. (KEYSERVER_HONOR_PKA_RECORD): Remove. * g10/packet.h (pka_info_t): Remove. (PKT_signature): Remove flags.pka_tried and pka_info. * g10/parse-packet.c (register_known_notation): Remove "pka-address@gnupg.org". * g10/pkclist.c (check_signatures_trust): Remove PKA stuff. * g10/call-dirmngr.c (gpg_dirmngr_get_pka): Remove. * g10/export.c (parse_export_options): Remove "export-pka". (do_export): Adjust for this. (write_keyblock_to_output): Ditto. (do_export_stream): Ditto. (print_pka_or_dane_records): Rename to ... (print_dane_records): this and remove two args. Remove PKA printing. * g10/free-packet.c (free_seckey_enc, cp_pka_info): Adjust for removed pka_info field. * g10/getkey.c (get_pubkey_byname): Make AKL_PKA a dummy. * g10/keyserver.c: Remove "honor-pka-record". (keyserver_import_pka): Remove. * g10/mainproc.c (get_pka_address): Remove. (pka_uri_from_sig): Remove. (check_sig_and_print): Remove code for PKA. -- PKA (Public Key Association) was a DNS based key discovery method which looked up fingerprint by mail addresses in the DNS. This goes back to the conference where DKIM was suggested to show that we already had a better method for this available with PGP/MIME. PKA was was later superseded by an experimental DANE method and is today not anymore relevant. It is anyway doubtful whether PKA was ever widely used. Signed-off-by: Werner Koch <wk@gnupg.org>
This commit is contained in:
parent
fde7d83357
commit
7f3ce66ec5
17 changed files with 35 additions and 464 deletions
39
doc/gpg.texi
39
doc/gpg.texi
|
@ -1434,18 +1434,6 @@ the opposite meaning. The options are:
|
|||
all the AKA lines as well as photo Ids are not shown with the signature
|
||||
verification status.
|
||||
|
||||
@item pka-lookups
|
||||
@opindex verify-options:pka-lookups
|
||||
Enable PKA lookups to verify sender addresses. Note that PKA is based
|
||||
on DNS, and so enabling this option may disclose information on when
|
||||
and what signatures are verified or to whom data is encrypted. This
|
||||
is similar to the "web bug" described for the @option{--auto-key-retrieve}
|
||||
option.
|
||||
|
||||
@item pka-trust-increase
|
||||
@opindex verify-options:pka-trust-increase
|
||||
Raise the trust in a signature to full if the signature passes PKA
|
||||
validation. This option is only meaningful if pka-lookups is set.
|
||||
@end table
|
||||
|
||||
@item --enable-large-rsa
|
||||
|
@ -1810,9 +1798,6 @@ list. The default is "local,wkd".
|
|||
@item cert
|
||||
Locate a key using DNS CERT, as specified in RFC-4398.
|
||||
|
||||
@item pka
|
||||
Locate a key using DNS PKA.
|
||||
|
||||
@item dane
|
||||
Locate a key using DANE, as specified
|
||||
in draft-ietf-dane-openpgpkey-05.txt.
|
||||
|
@ -1896,10 +1881,7 @@ preferred keyserver for data signatures.
|
|||
disabled by removing WKD from the auto-key-locate list or by using the
|
||||
option @option{--disable-signer-uid}.
|
||||
|
||||
4. If the option @option{honor-pka-record} is active, the legacy PKA
|
||||
method is used.
|
||||
|
||||
5. If any keyserver is configured and the Issuer Fingerprint is part
|
||||
4. If any keyserver is configured and the Issuer Fingerprint is part
|
||||
of the signature (since GnuPG 2.1.16), the configured keyservers are
|
||||
tried.
|
||||
|
||||
|
@ -1980,11 +1962,6 @@ are available for all keyserver types, some common options are:
|
|||
"web bug": The creator of the key can see when the keys is
|
||||
refreshed. Thus this option is not enabled by default.
|
||||
|
||||
@item honor-pka-record
|
||||
If @option{--auto-key-retrieve} is used, and the signature being
|
||||
verified has a PKA record, then use the PKA information to fetch
|
||||
the key. Defaults to "yes".
|
||||
|
||||
@item include-subkeys
|
||||
When receiving a key, include subkeys as potential targets. Note that
|
||||
this option is not used with HKP keyservers, as they do not support
|
||||
|
@ -2002,8 +1979,7 @@ are available for all keyserver types, some common options are:
|
|||
@end table
|
||||
|
||||
The default list of options is: "self-sigs-only, import-clean,
|
||||
repair-keys, repair-pks-subkey-bug, export-attributes,
|
||||
honor-pka-record".
|
||||
repair-keys, repair-pks-subkey-bug, export-attributes".
|
||||
|
||||
|
||||
@item --completes-needed @var{n}
|
||||
|
@ -2434,9 +2410,9 @@ opposite meaning. The options are:
|
|||
|
||||
@item import-export
|
||||
Run the entire import code but instead of storing the key to the
|
||||
local keyring write it to the output. The export options
|
||||
@option{export-pka} and @option{export-dane} affect the output. This
|
||||
option can be used to remove all invalid parts from a key without the
|
||||
local keyring write it to the output. The export option
|
||||
@option{export-dane} affect the output. This option can for example
|
||||
be used to remove all invalid parts from a key without the
|
||||
need to store it.
|
||||
|
||||
@item merge-only
|
||||
|
@ -2634,11 +2610,6 @@ opposite meaning. The options are:
|
|||
running the @option{--edit-key} command "minimize" before export except
|
||||
that the local copy of the key is not modified. Defaults to no.
|
||||
|
||||
@item export-pka
|
||||
Instead of outputting the key material output PKA records suitable
|
||||
to put into DNS zone files. An ORIGIN line is printed before each
|
||||
record to allow diverting the records to the corresponding zone file.
|
||||
|
||||
@item export-dane
|
||||
Instead of outputting the key material output OpenPGP DANE records
|
||||
suitable to put into DNS zone files. An ORIGIN line is printed before
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue