Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Required Key Flags Breaking Workflows #205

Open
arudzitis-stripe opened this issue Mar 27, 2024 · 2 comments
Open

Required Key Flags Breaking Workflows #205

arudzitis-stripe opened this issue Mar 27, 2024 · 2 comments

Comments

@arudzitis-stripe
Copy link
Contributor

👋 Hello folks! I want to start by saying I really appreciate the existence of this library and the dedication here to trying to do the right thing.

I wanted to flag that I believe #155 has some unintended consequences and could use a bit more discussion.

We regularly exchange OpenPGP keys with third-party institutions and we we still see on occasion that keys are being created without flags indicating the proper usage. I'm not exactly sure where these keys come from, but they are out there in the wild. Often we do not have the ability to request new signatures on these keys, especially as these keys will work with gpg, which is seen as somewhat of a reference implementation.

Since the change was made on this library, we switched to modifying the key structs after parsing to manually mark them as valid, which is viable, but requires us to keep track of keys we expect to have no flags.

I do wish the RFC was stronger on this topic.

On the other hand, the "communications encryption" flag in a self-signature is stating a preference that a given key be used for communications.

I have (questionably) interpreted that as the flags being optional (indicating a preference) rather than a requirement. But I am open to other interpretations.

(#187 was opened by another user, but it seems that in their case they were able to modify the key.)

@twiss
Copy link
Member

twiss commented Apr 3, 2024

Hello 👋 Perhaps we could add a config option to allow using such keys (that would be off by default) in config.go. A PR would be welcome, I'd say :)

@arudzitis-stripe
Copy link
Contributor Author

Cool! I'll see if I can find some time to throw together a PR!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants