From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=5.0 tests=MAILING_LIST_MULTI, RCVD_IN_DNSWL_NONE autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 23928 invoked from network); 13 Jul 2020 18:15:23 -0000 Received: from ns1.primenet.com.au (HELO primenet.com.au) (203.24.36.2) by inbox.vuxu.org with ESMTPUTF8; 13 Jul 2020 18:15:23 -0000 Received: (qmail 26401 invoked by alias); 13 Jul 2020 18:15:11 -0000 Mailing-List: contact zsh-workers-help@zsh.org; run by ezmlm Precedence: bulk X-No-Archive: yes List-Id: Zsh Workers List List-Post: List-Help: List-Unsubscribe: Sender: zsh-workers@zsh.org X-Seq: 46244 Received: (qmail 2158 invoked by uid 1010); 13 Jul 2020 18:15:10 -0000 X-Qmail-Scanner-Diagnostics: from out1-smtp.messagingengine.com by f.primenet.com.au (envelope-from , uid 7791) with qmail-scanner-2.11 (clamdscan: 0.102.3/25870. spamassassin: 3.4.4. Clear:RC:0(66.111.4.25):SA:0(-2.6/5.0):. Processed in 4.124632 secs); 13 Jul 2020 18:15:10 -0000 X-Envelope-From: d.s@daniel.shahaf.name X-Qmail-Scanner-Mime-Attachments: | X-Qmail-Scanner-Zip-Files: | Received-SPF: none (ns1.primenet.com.au: domain at daniel.shahaf.name does not designate permitted sender hosts) X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduiedrvdekgdduvdehucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpeffhffvuffkofggtgfgsehtqhdttd ertdejnecuhfhrohhmpeffrghnihgvlhcuufhhrghhrghfuceougdrshesuggrnhhivghl rdhshhgrhhgrfhdrnhgrmhgvqeenucggtffrrghtthgvrhhnpeegleegkedvhfeggfevje dvtdeikedtieeiveefudejtdeuvedtheelffdvteehtdenucffohhmrghinhepshhouhhr tggvfhhorhhgvgdrnhgvthdpiihshhdrohhrghdpghhnuhhpghdrohhrghenucfkphepje elrddujeeirdefledrieelnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehm rghilhhfrhhomhepugdrshesuggrnhhivghlrdhshhgrhhgrfhdrnhgrmhgv X-ME-Proxy: Date: Mon, 13 Jul 2020 18:14:23 +0000 From: Daniel Shahaf To: zsh-workers@zsh.org Subject: Hosting copies of the PGP public keys Message-ID: <20200713181423.0b979d87@tarpaulin.shahaf.local2> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Phil points out that it would be useful for http://zsh.sourceforge.net/Arc/source.html to carry not only the `gpg --list-keys` output but also actual copies of the public keys, in a format that can be imported by OpenPGP tools (e.g., =C2=ABgpg --import=C2= =BB), in order to let people retrieve keys without relying on the public keyservers. I propose that that the RMs add copies of their public keys to, say, keys/{pws,danielsh,dana}.asc in the zsh-web.git repository (using =C2=ABgpg --armor --export $MyEmailAddress=C2=BB), and then, as part of uploading a release, we also `cat keys/*.asc` into a zsh-keyring.asc and upload it to zsh.org. WDYT? Cheers, Daniel P.S. Phil also mentioned WKD. It's a federated way to auto-discover public keys given an email address. To be an option, the RMs would need to add *@zsh.org addresses to their keys, and we'd need to serve some files from https://openpgpkey.zsh.org/. Details: https://wiki.gnupg.org/WKDHosting#Publishing