Admin message

We cycled this server ssh keys:

ed25519: SHA256:2D8lksRpOJ8ypmQE5I4Qq3JqYRHIvnlg6tJaFJv5Nbg | MD5:e0:42:d2:20:b5:29:b8:f8:2c:f0:97:a2:c9:e9:c3:6b
rsa: SHA256:4oOr4sH8tA6lu6kzggkZo8Ockmenu7mlmojXnkUyLts | MD5:ec:f1:8f:6c:c3:2e:21:b6:a6:3d:6b:38:69:31:ae:28

Sorry for the inconveniences and happy MayDay!

This project is archived. Its data is read-only.

monkeysign fails to send certifications of User IDs that lack an e-mail-address

some keys, like 25FC1614B8F87B52FF2F99B962AF4031C82E0039, have a user ID that has no e-mail address.

If the user indicates that they intend to certify that user ID, its certification should be attached to any other certification that can be sent -- so the certifications are sent in tandem.

So for example, if an OpenPGP certificate looks like:

uid 0: Alice Jones
uid 1: Alice Jones <alice@example.net>
uid 2: Alice Jones (CEO) <boss@example.biz>

then the e-mail that goes to alice@example.net should contain the certification for User IDs 0 and 1, and the e-mail that goes to boss@example.biz should contain the certification for User IDs 0 and 2.

That way, if the recipient gets any of the e-mails, they can see a certification over the user ID that has no e-mail address.

What monkeysign currently does in the above scenario is to try to send the certification of User ID 0 to "Alice Jones", which is typically treated as a bogus e-mail address and gets bounced.

The behavior i'm proposing is how caff handles this kind of User ID, fwiw.

Edited Jan 19, 2019 by dkg
Assignee Loading
Time tracking Loading