Apparently there is some confusion in this discussion, regarding what must be passed over trusted channels (not pointing at any particular person). So, to clarify.

For the purpose of signature verification, public key material is not required to be taken from a trusted source. The thing to be verified through a trusted route is the fingerprint.

Yes, from purely cryptographic PoV this is imperfect: the fingerprint is SHA-1, which no longer provides neccessary security guarantees. A malicious agent may theoretically provide a forged key with a matching fingerprint. But “I believe this website” isn’t a valid cryptographic construct either; instead obtaining signatures is required. So the argument is mostly moot.

When talking about obtaining keys based on evaluating trust in non-cryptographic manner, there is little difference in getting a complete key from places you trust, compared to getting a key off anywhere and getting a fingerprint/keyID from the places you trust. Key owners publishing their keys on their/project website is the best way, but — in its absence — just verify the fingerprint.

In particular keyservers are not more trusted than AUR. Quite opposite. With keyservers, to you the key uploader is anonymous. On AUR the uploader is pseudonymous or a traceable person.

Reply via email to