I'm not blocking the release on this, but as a general topic, I was trying
to verify gpg sigs on the latest daffodil RC.

I was not able to verify gpg signatures without manually importing josh's
key from keys.openpgp.org.

I was able to sign josh's key and push that to the keys.openpgp.org
keyserver. But I'm told openpgp.org strips away signatures from keys.

Nor have I been able to pull his public key from pgp.mit.edu nor
keyserver.ubuntu.com.

So I asked OpenGPT4o about this keyserver situation. Here's what it said:

**Q:** Do these various keyservers eventually synchronize with each other?


**A:**
In the past, most **OpenPGP keyservers** were part of a distributed network
called the **SKS Keyserver Network**. These keyservers (such as `pgp.mit.edu`
and `keyserver.ubuntu.com`) would synchronize with each other, meaning that
once you uploaded a key or signature to one keyserver, it would eventually
propagate to the others.


However, as of recent years, the situation has changed significantly:


### **Current Keyserver Landscape:**


1. **SKS Keyserver Network (Decommissioned/Deprecated):**
   The SKS keyserver network suffered from scalability and abuse issues
(e.g., spamming keys with garbage data). Many keyservers, including popular
ones like `pgp.mit.edu`, still exist but may not fully sync or could be
unreliable.

(MikeB: yes, pgp.mit.edu appears to be not working. It serves a web page,
but queries get a proxy error as do attempts to query via their email
interface.)


2. **keys.openpgp.org (Modern Keyserver):**
   - **Does not synchronize** with other keyservers.
   - Focuses on privacy and user consent. It only distributes keys if the
key owner has verified their email.
   - **Does not store or share third-party signatures**—you can only see
the primary key and the verified email identity.


3. **Ubuntu Keyserver (hkps://keyserver.ubuntu.com):**
   - This is a commonly used keyserver that still supports third-party
signatures.
   - It functions independently and does not synchronize with `
keys.openpgp.org`.


### **In Summary:**
- Keyservers like `keys.openpgp.org` and `keyserver.ubuntu.com` do not
synchronize with each other.
- If you want to share a signed key, you need to choose an appropriate
keyserver (like Ubuntu's keyserver) or distribute the signed key manually.
- If your primary concern is that others see your signature, consider
advising them to use a keyserver that supports third-party signatures or
send them the signed key directly.


Based on that pessimistic assessment, I asked Google Gemini "Is the PGP Web
of Trust Broken?". Here is it's reply:

Yes, many experts consider the PGP Web of Trust to be largely "broken" due
to issues with keyservers, particularly the ability for malicious actors to
easily flood the system with fake key signatures, rendering the trust
verification process unreliable; this has led to concerns about the
integrity of the Web of Trust model in practice. [1, 2, 3, 4, 5]
Key points about this issue: [1, 2, 3]


• Keyserver attacks: Malicious actors can easily upload large numbers of
fake key signatures to keyservers, making it difficult to distinguish
legitimate keys from fraudulent ones. [1, 2, 3]
• Spamming issue: This "key spamming" can overwhelm users with untrusted
signatures, significantly reducing the effectiveness of the Web of Trust.
[1, 2, 3]
• Impact on trust verification: Due to the difficulty of verifying
signatures on keyservers, users may have trouble confidently trusting a
key, even if it appears to be signed by other trusted individuals. [1, 2,
4]


Alternatives and considerations: [5, 6, 7]


• Manual key verification: To mitigate this issue, some users rely heavily
on manual key verification processes, where they directly exchange keys
with individuals they trust and carefully review the signatures. [5, 6, 7]
• Key signing parties: Organizing key signing parties where individuals
physically meet to verify each other's identities and sign keys can be a
more secure method. [5, 8]
• Emerging solutions: Some platforms like Keybase are attempting to address
the Web of Trust limitations by providing additional verification
mechanisms and user identity checks. [1, 9]


Generative AI is experimental.


[1]
https://crypto.stackexchange.com/questions/80629/what-is-the-pgp-web-of-trust-strongset
[2] https://inversegravity.net/2019/web-of-trust-dead/
[3]
https://www.reddit.com/r/GnuPG/comments/l64rhj/are_services_like_protonmail_damaging_the_web_of/
[4]
https://mailbox.org/en/post/the-keyserver-is-dead-long-live-the-keyserver
[5] https://www.latacora.com/blog/2019/07/16/the-pgp-problem/
[6]
https://www.linuxfoundation.org/blog/blog/pgp-web-of-trust-delegated-trust-and-keyservers
[7]
https://www.giac.org/paper/gsec/625/trust-model-pgp-x509-standard-pki/101441
[8]
https://medium.com/@bblfish/what-are-the-failings-of-pgp-web-of-trust-958e1f62e5b7
[9] https://www.reddit.com/r/GnuPG/comments/wtd1ht/is_gpg_getting_too_old/

Based on this, I'm pretty pessimistic that PGP Web of Trust is worth a damn
any more. Openpgp.org doesn't even distribute signatures on keys. They
strip them off.

Without a trusted backbone of non-spamable PGP key servers, these pgp code
signing keys well.... people will have to just download the KEYS file from
github, but "web" of trust it is not.

Reply via email to