You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I think you might want to upload it also at https://keys.openpgp.org/upload and confirm that you wish to list the key as it's nowadays the default keyserver mostly everywhere and currently when someone attempts to get the key from there, gpg will reject it at least on Debian:
└┌(%:~)┌- LANG=en && !!
LANG=en && gpg --recv-keys "4B9665FB92636D177C7A86D350AAE8A959B13AF3"
gpg: key 0x50AAE8A959B13AF3: new key but contains no user ID - skipped
gpg: Total number processed: 1
gpg: w/o user IDs: 1
I think the linked pgp.mit.edu may also be vulnerable to signature flooding attacks possibly preventing users needing to report security issues using it. Have you thought about enabling WKD on ipfs.io or even hosting the public key on IPFS and linking there from the README.md?
Sorry if this is a wrong place to report this, https://github.com/ipfs/ipfs#security-issues-and-disclosures doesn't link to the PGP key at all and the last paragraph there seems to apply here (if someone had a grievance against IPFS and did signature flooding attacks, I think that would already have happened a long time ago) and the forum didn't seem the right place to me. I guess WKD should be an separate issue, but it came as an afterthought to me while I think it's hoped to replace keyservers.
Edit: I forgot to say that I don't have an actual IPFS security issue to report, I was just browsing through repositories trying to find #957 (I think, I didn't read it yet) and just stumbled upon this potential problem. I think I should also add that WKD capable email clients should automatically attempt to download and use a key from WKD as an additional reason why I think it should be implemented.
The text was updated successfully, but these errors were encountered:
And looking into this closer, I notice that the key has been expired for an year and half, so maybe it has just been forgotten to README.md or expire time extensions weren't pushed to pgp.mit.edu ?
I happened to notice that the README lists an PGP key to be used for security issues and it's on keys.pgp.mit.edu.
I think you might want to upload it also at https://keys.openpgp.org/upload and confirm that you wish to list the key as it's nowadays the default keyserver mostly everywhere and currently when someone attempts to get the key from there, gpg will reject it at least on Debian:
I think the linked pgp.mit.edu may also be vulnerable to signature flooding attacks possibly preventing users needing to report security issues using it. Have you thought about enabling WKD on ipfs.io or even hosting the public key on IPFS and linking there from the README.md?
Sorry if this is a wrong place to report this, https://github.com/ipfs/ipfs#security-issues-and-disclosures doesn't link to the PGP key at all and the last paragraph there seems to apply here (if someone had a grievance against IPFS and did signature flooding attacks, I think that would already have happened a long time ago) and the forum didn't seem the right place to me. I guess WKD should be an separate issue, but it came as an afterthought to me while I think it's hoped to replace keyservers.
Edit: I forgot to say that I don't have an actual IPFS security issue to report, I was just browsing through repositories trying to find #957 (I think, I didn't read it yet) and just stumbled upon this potential problem. I think I should also add that WKD capable email clients should automatically attempt to download and use a key from WKD as an additional reason why I think it should be implemented.
The text was updated successfully, but these errors were encountered: