Skip to content
@pgpkeys-eu

pgpkeys.eu

PGPKeys.EU provides software and services to the OpenPGP cryptography ecosystem

PGPkeys EU

SKS

SKS refers to both a software package (herein called sks-keyserver for clarity), and the database synchronisation protocol that it speaks. The sks-keyserver software is effectively end of life; the SKS protocol is not. There are several other software packages that speak SKS, notably Hockeypuck, and also Peaks (experimental).

Synchronising and non-synchronising keyservers

The synchronising keyserver network is still operational, but has changed significantly in the last few years. The main changes are:

  1. the vast majority have been ported from sks-keyserver to hockeypuck, which has mitigated their stability issues
  2. the sks-keyservers.net round-robin domain name has fallen into disuse due to legal uncertainty
  3. many distributions (including debian and ubuntu) now use the non-synchronising keys.openpgp.org as their default

If you want to use a synchronising keyserver, you have to pick a specific provider from the list at https://spider.pgpkeys.eu. Many people (including upstream gnupg) use https://keyserver.ubuntu.com because it has a good reputation for reliability, but it is not the only such choice. In addition, there are several non-synchronising keyservers in common use, the best-known of which is https://keys.openpgp.org . Unfortunately, there is currently no way to exhaustively search these keyservers for a given key without manually iterating through them.

HKP and WKD

All synchronising keyservers and most non-synchronising keyservers speak HTTP Keyserver Protocol (HKP), the de-facto standard keyserver lookup protocol supported by most OpenPGP clients. Web Key Directory (WKD) is a modern key discovery protocol, however it is not a like-for-like replacement for HKP. HKP keyservers and WKD keystores are complementary protocols:

Feature HKP WKD
Key lookup by email userID yes yes(1)
Key lookup by non-email userID yes no
Key lookup by keyID/fingerprint yes no
Key owner controls own key (self-sovereignty) no yes
Distribution of revocations yes maybe(2)
  1. WKD only works if the domain owner implements it.
  2. Revocations are only distributed over WKD if the key owner specifically uploads them

Background

The SKS apocalypse rendered the sks-keyserver software effectively unusable. There are a few old systems still maintained as public-facing services but these are now in a distinct minority.

Hockeypuck v2.1 and later mitigates the immediate problem by applying size limits to public keys. This has been (at least initially) at the expense of a slightly broken recon algorithm. In most cases this breakage has been absorbable, but a small number of operators have experienced runaway failure. Work to fix this is part of our brief here.

Links

Popular repositories Loading

  1. walk_sks walk_sks Public

    A tool to draw pretty graphs of the SKS keyserver network

    Ruby 7 2

  2. sks_spider sks_spider Public

    Forked from philpennock/sks_spider

    Tool to spider the PGP SKS keyserver mesh

    Go 4 1

  3. wkd-to-hkp wkd-to-hkp Public

    A tool to send modified keys from a Web Key Directory to one or more hkp keyservers

    Shell 1

  4. go-crypto go-crypto Public

    Forked from ProtonMail/go-crypto

    Soft fork of ProtonMail/go-crypto, with restored OpenPGP V3 packet support

    Go 1

  5. .github .github Public

    1

  6. hockeypuck hockeypuck Public

    Forked from hockeypuck/hockeypuck

    OpenPGP Key Server

    Go 1

Repositories

Showing 10 of 11 repositories

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…