[ 
https://issues.apache.org/jira/browse/MPOM-118?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15300838#comment-15300838
 ] 

Christopher Tubbs commented on MPOM-118:
----------------------------------------

Publishing a public key to a keyserver is never required, but it's advised, 
because that's how others know how to encrypt messages to you.

The reason these preferences are stored inside the public key, and should be 
published to a keyserver, is because this communicates to others how you would 
prefer to receive messages encrypted with your public key. The key preferences 
used are the *recipient's* keys.

In the case of a signature, the "recipient" is you (because you are using your 
private key to encrypt, the recipient is persons holding your public key), so 
it uses the key preferences in your key.

I don't know if that's the best explanation, but it's what helped me understand 
what GPG was doing.

> Enforce strong GPG signatures by default
> ----------------------------------------
>
>                 Key: MPOM-118
>                 URL: https://issues.apache.org/jira/browse/MPOM-118
>             Project: Maven POMs
>          Issue Type: Improvement
>          Components: asf
>    Affects Versions: ASF-17
>            Reporter: Christopher Tubbs
>
> maven-gpg-plugin configuration could be improved a bit so that ASF releases 
> are not weakened by a user's weak personal configuration.
> I suggest adding something like the following to maven-gpg-plugin's 
> configuration in the pluginManagement section:
> {code:xml}
> <gpgArguments combine.children="append">
>   <arg>--digest-algo=SHA512</arg>
> </gpgArguments>
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to