<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  (Ruby 3.0.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-dkg-openpgp-abuse-resistant-keystore-05" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Abuse-Resistant OpenPGP Keystores</title>

    <author initials="D. K." surname="Gillmor" fullname="Daniel Kahn Gillmor">
      <organization abbrev="ACLU">American Civil Liberties Union</organization>
      <address>
        <postal>
          <street>125 Broad St.</street>
          <city>New York, NY</city>
          <code>10004</code>
          <country>USA</country>
        </postal>
        <email>dkg@fifthhorseman.net</email>
      </address>
    </author>

    <date year="2022" month="April" day="28"/>

    <area>int</area>
    <workgroup>openpgp</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>OpenPGP transferable public keys are composite certificates, made up
of primary keys, revocation signatures, direct key signatures, user IDs,
identity certifications ("signature packets"), subkeys, and so on.  They
are often assembled by merging multiple certificates that all share the
same primary key, and are distributed in public keystores.</t>

<t>Unfortunately, since many keystores permit any third-party to add a
certification with any content to any OpenPGP certificate, the
assembled/merged form of a certificate can become unwieldy or
undistributable.  Furthermore, keystores that are searched by user ID
or fingerprint can be made unusable for specific searches by public
submission of bogus certificates. And finally, keystores open to public
submission can also face simple resource exhaustion from flooding with
bogus submissions, or legal or other risks from uploads of toxic data.</t>

<t>This draft documents techniques that an archive of OpenPGP
certificates can use to mitigate the impact of these various attacks,
and the implications of these concerns and mitigations for the rest
of the OpenPGP ecosystem.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://dkg.gitlab.io/draft-openpgp-abuse-resistant-keystore/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dkg-openpgp-abuse-resistant-keystore/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        OpenPGP Working Group mailing list (<eref target="mailto:openpgp@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/openpgp/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/dkg/draft-openpgp-abuse-resistant-keystore"/>.</t>
    </note>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t><list style="symbols">
  <t>"OpenPGP certificate" (or just "certificate") is used
interchangeably with <xref target="RFC4880"/>'s "Transferable Public Key".  The
term "certificate" refers unambiguously to the entire composite
object, unlike "key", which might also be used to refer to a
primary key or subkey.</t>
  <t>An "identity certification" (or just "certification") is an
<xref target="RFC4880"/> signature packet that covers OpenPGP identity
information -- that is, any signature packet of type 0x10, 0x11,
0x12, or 0x13.  Certifications are said to (try to) "bind" a
primary key to a User ID.</t>
  <t>The primary key that makes the certification is known as the
"issuer".  The primary key over which the certification is made is
known as the "subject".</t>
  <t>A "first-party certification" is issued by the primary key of a
certificate, and binds itself to a user ID in the certificate. That
is, the issuer is the same as the subject.  This is sometimes
referred to as a "self-sig".</t>
  <t>A "third-party certification" is a made over a primary key and user
ID by some other certification-capable primary key.  That is, the
issuer is different than the subject.  The elusive "second-party"
is presumed to be the verifier who is trying to interpret the
certificate.</t>
  <t>All subkeys are bound to the primary key with an <xref target="RFC4880"/> Subkey
Binding Signature.  Some subkeys also reciprocate by binding
themselves back to the primary key with an <xref target="RFC4880"/> Primary Key
Binding Signature.  The Primary Key Binding Signature is also known
as a "cross-signature" or "cross-sig".</t>
  <t>A "keystore" is any collection of OpenPGP certificates.  Keystores
typically receive mergeable updates over the course of their
lifetime which might add to the set of OpenPGP certificates they
hold, or update the certificates.</t>
  <t>"Certificate validation" is the process whereby a user decides
whether a given user ID in an OpenPGP certificate is acceptable for
use.  For example, if the certificate has a user ID of <spanx style="verb">Alice
&lt;alice@example.org&gt;</spanx> and the user wants to send an e-mail to
<spanx style="verb">alice@example.org</spanx>, the mail user agent might want to ensure that
the certificate is valid for this e-mail address before encrypting
to it. Some clients may rely on specific keystores for certificate
validation, but some keystores (e.g., <xref target="SKS"/>) make no assertions
whatsoever about certificate validity, and others offer only very
subtle guarantees.  See <xref target="certificate-validation"/> for more
details.</t>
  <t>"Certificate lookup" refers to the retrieval of a set of
certificates from a keystore based on the user ID or some substring
match of the user ID.  See <xref target="certificate-lookup"/> for more details.</t>
  <t>"Certificate refresh" refers to retrieval of a certificate from a
 keystore based on the fingerprint of the primary key.  See
 <xref target="certificate-refresh"/> for more details.</t>
  <t>"Certificate discovery" refers to the retrieval of a set of
certificates from a keystore based on the fingerprint or key ID of
any key in the certificate.  See <xref target="certificate-discovery"/> for more
details.</t>
  <t>A "keyserver" is a particular kind of keystore, typically a means of
publicly distributing OpenPGP certificates or updates to them.
Examples of keyserver software include <xref target="SKS"/> and
<xref target="MAILVELOPE-KEYSERVER"/>.  One common HTTP interface for keyservers
is <xref target="I-D.shaw-openpgp-hkp"/>.</t>
  <t>A "synchronizing keyserver" is a keyserver which gossips with other
peers, and typically acts as an append-only log.  Such a keyserver
is typically useful for certificate lookup, certificate discovery,
and certificate refresh (including revocation information).  They
are typically <em>not</em> useful for certificate validation, since they
make no assertions about whether the identities in the certificates
they server are accurate. As of the writing of this document,
<xref target="SKS"/> is the canonical synchronizing keyserver implementation,
though other implementations exist.</t>
  <t>An "e-mail validating keyserver" is a keyserver which attempts to
verify the identity in an OpenPGP certificate's user ID by
confirming access to the e-mail account, and optionally by confirming
access to the secret key.  Some implementations permit removal of a
certificate by anyone who can prove access to the e-mail address in
question.  They are useful for certificate lookup based on e-mail
address and certificate validation (by users who trust the
operator), but some may not be useful for certificate refresh or
certificate discovery, since a certificate could be simply replaced
by an adversary who also has access to the e-mail address in
question.  <xref target="MAILVELOPE-KEYSERVER"/> is an example of such a
keyserver.</t>
  <t>A "sovereignty-respecting" keystore is one that only distributes
data associated with a given certificate that has been explicitly
approved by the primary key of that certificate.  See
<xref target="sovereignty"/> for more details and example strategies.</t>
  <t>"Cryptographic validity" refers to mathematical evidence that a
signature came from the secret key associated with the public key
it claims to come from.  Note that a certification may be
cryptographically valid without the signed data being true (for
example, a given certificate with the user ID <spanx style="verb">Alice
&lt;alice@example.org&gt;</spanx> might not belong to the person who controls
the e-mail address <spanx style="verb">alice@example.org</spanx> even though the self-sig is
cryptographically valid).  In particular, cryptographic validity
for user ID in a certificate is typically insufficient evidence for
certificate validation.  Also note that knowledge of the public key
of the issuer is necessary to determine whether any given signature
is cryptographically valid.  Some keyservers perform cryptographic
validation in some contexts.  Other keyservers (like <xref target="SKS"/>)
perform no cryptographic validation whatsoever.</t>
  <t>OpenPGP revocations can have "Reason for Revocation" (see
<xref target="RFC4880"/>), which can be either "soft" or "hard".  The set of
"soft" reasons is: "Key is superseded" and "Key is retired and no
longer used".  All other reasons (and revocations that do not state
a reason) are "hard" revocations.  See <xref target="revocations"/> for more
detail.</t>
</list></t>

</section>
</section>
<section anchor="problem-statement"><name>Problem Statement</name>

<t>OpenPGP keystores that handle submissions from the public are subject
to a range of attacks by malicious submitters.</t>

<t>This section describes five distinct attacks that public keystores
should consider.</t>

<section anchor="certificate-flooding"><name>Certificate Flooding</name>

<t>Many public keystores (including both the <xref target="SKS"/> keyserver network
and <xref target="MAILVELOPE-KEYSERVER"/>) allow anyone to attach arbitrary data
(in the form of third-party certifications) to any certificate,
bloating that certificate to the point of being impossible to
effectively retrieve.  For example, some OpenPGP implementations
simply refuse to process certificates larger than a certain size.</t>

<t>This kind of Denial-of-Service attack makes it possible to make
someone else's certificate unretrievable from the keystore, preventing
certificate lookup, discovery, or refresh.  In the case of a revoked
certificate that has been flooded, this potentially leaves the client
of the keystore with the compromised certificate in an unrevoked state
locally because it was unable to fetch the revocation information.</t>

<t>Additionally, even without malice, OpenPGP certificates can
potentially grow without bound.</t>

</section>
<section anchor="user-id-flooding"><name>User ID Flooding</name>

<t>Public keystores that are used for certificate lookup may also be
vulnerable to attacks that flood the space of known user IDs.  In
particular, if the keystore accepts arbitrary certificates from the
public and does no verification of the user IDs, then any client
searching for a given user ID may need to review and process an
effectively unbounded set of maliciously-submitted certificates to
find the non-malicious certificates they are looking for.</t>

<t>For example, if an attacker knows that a given system consults a
keystore looking for certificates which match the e-mail address
<spanx style="verb">alice@example.org</spanx>, the attacker may upload thousands of
certificates containing user IDs that match that address.  Even if
those certificates would not be accepted by a client (e.g., because
they were not certified by a known-good authority), the client
still has to iterate through all of them in order to find the
non-malicious certificates.</t>

<t>User ID flooding is only effective if the keystore offers a lookup
interface at all.</t>

</section>
<section anchor="fingerprint-flooding"><name>Fingerprint Flooding</name>

<t>A malicious actor who wants to render a certificate unavailable for
refresh may generate an arbitrary number of OpenPGP certificates with
the targeted primary key attached as a subkey.  If they can convince a
keystore to accept all of those certificates, and the keystore
returns them by subkey match during certificate refresh, then the
certificate refresh client will need to spend an arbitrary amount of
bandwidth and processing power filtering out the irrelevant data, and
may potentially give up before discovering the certificate of
interest.</t>

<t>A malicious actor may also want to confuse a certificate discovery
request that was targeted at a particular subkey, by binding that
subkey to multiple bogus certificates.  If these bogus certificates
are ingested and redistributed by the keystore, then a certificate
discovery client may receive a set of certificates that cannot be
adequately distinguished.</t>

</section>
<section anchor="keystore-flooding"><name>Keystore Flooding</name>

<t>A public keystore that accepts arbitrary OpenPGP material and is
append-only is at risk of being overwhelmed by sheer quantity of
malicious uploaded packets.  This is a risk even if the user ID space
is not being deliberately flooded, and if individual certificates are
protected from flooding by any of the mechanisms described later in
this document.</t>

<t>The keystore itself can become difficult to operate if the total
quantity of data is too large, and if it is a synchronizing keyserver,
then the quantities of data may impose unsustainable bandwidth costs
on the operator as well.</t>

<t>Effectively mitigating against keystore flooding requires either
abandoning the append-only property that some keystores prefer, or
imposing very strict controls on initial ingestion.</t>

</section>
<section anchor="toxic-data"><name>Toxic Data</name>

<t>Like any large public dataset, it's possible that a keystore ends up
hosting some content that is legally actionable in some jurisdictions,
including libel, child pornography, material under copyright or other
"intellectual property" controls, blasphemy, hate speech, etc.</t>

<t>A public keystore that accepts and redistributes arbitrary content
may face risk due to uploads of toxic data.</t>

</section>
</section>
<section anchor="keystore-interfaces"><name>Keystore Interfaces</name>

<t>Some keystores have simple interfaces, like files present in a local
filesystem.  But many keystores offer an API for certificate retrieval
of different types.  This section documents a set of useful
interactions that a client may have with such a keystore.</t>

<t>They are represented in abstract form, and are not intended to be the
full set of interfaces offered by any keystore, but rather a
convenient way to think about the operations that make the keystore
useful for its clients.</t>

<t>Not all keystores may offer all of these interfaces, or they may offer
them in subtly different forms, but clients will nevertheless try to
perform something like these operations with keystores that they
interact with.</t>

<section anchor="certificate-refresh"><name>Certificate Refresh</name>

<t>This is the simplest keystore operation.  The client sends the
keystore the full fingerprint of the certificate's primary key, and
the keystore sends the client the corresponding certificate (or
nothing, if the keystore does not contain a certificate with a
matching primary key).</t>

<figure><artwork><![CDATA[
keystore.cert_refresh(primary_fpr) -> certificate?
]]></artwork></figure>

<t>A client uses certificate refresh to retrieve the full details of a
certificate that it already knows about.  For example, it might be
interested in refreshs to the certificate known to the keystore,
including revocations, expiration refreshs, new third-party
certifications, etc.</t>

<t>Upon successful refresh, the client SHOULD merge the retrieved
certificate with its local copy.</t>

<t>Not all keystores offer this operation. For example, clients cannot
use WKD (<xref target="I-D.koch-openpgp-webkey-service"/>) or OPENPGPKEY
(<xref target="RFC7929"/>) for certificate refresh.</t>

</section>
<section anchor="certificate-discovery"><name>Certificate Discovery</name>

<t>If a client is aware of an OpenPGP signature or certification that it
cannot verify because it does not know the issuing certificate, it may
consult a keystore to try to discover the certificate based on the
Issuer or Issuer Fingerprint subpacket in the signature or
certification it is trying to validate.</t>

<figure><artwork><![CDATA[
keystore.cert_discovery(keyid|fpr) -> certificate_list
]]></artwork></figure>

<t>This is subtly different from certificate refresh
(<xref target="certificate-refresh"/>) in three ways:</t>

<t><list style="symbols">
  <t>it may return more than one certificate (e.g., when multiple
certificates share a subkey, or when a primary key on one
certificate is a subkey on another)</t>
  <t>it is willing to accept searches by short key ID, not just
fingerprint</t>
  <t>it is willing to match against a subkey, not just a primary key</t>
</list></t>

<t>While a certificate discovery client does not initially know the
certificate it is looking for, it's possible that the returned
certificate is one that the client already knows about.  For example,
a new subkey may have been added to a certificate.</t>

<t>Upon successful discovery, the client SHOULD merge any retrieved
certificates with discovered local copies (as determined by primary
key), and then evaluate the original signature against any retrieved
certificate that appears to be valid and reasonable for use in the
signing context.</t>

<t>It is unclear what a client should do if multiple certificates do
appear to be valid for a given signature, because of ambiguity this
represents about the identity of the signer.  However, this ambiguity
is similar to the ambiguity of a certificate with multiple valid user
IDs, which the client already needs to deal with.</t>

<t>Not all keystores offer this operation. For example, clients cannot
use WKD (<xref target="I-D.koch-openpgp-webkey-service"/>) or OPENPGPKEY
(<xref target="RFC7929"/> for certificate discovery.</t>

</section>
<section anchor="certificate-lookup"><name>Certificate Lookup</name>

<t>If a client wants to encrypt a message to a particular e-mail address,
or wants to encrypt a backup to some identity that it knows of but
does not have a certificate for, it may consult a keystore to discover
certificates that claim that identity in their user ID packets.  Both
<xref target="I-D.koch-openpgp-webkey-service"/> and <xref target="I-D.shaw-openpgp-hkp"/> offer
certificate lookup mechanisms.</t>

<t><xref target="RFC4880"/> User IDs are constrained only in that they are a UTF-8
string, but some conventions govern their practical use. See
<xref target="user-id-conventions"/> for more discussion of some common conventions
around user ID structure.</t>

<t>Note that lookup does not necessarily imply user ID or certificate
validation.  It is entirely possible for a keystore to return a
certificate during lookup that the client cannot validate.</t>

<t>Abuse-resistant keystores that offer a lookup interface SHOULD
distinguish interfaces that perform full-string-match lookup from
interfaces that perform e-mail address based lookup.</t>

<section anchor="full-user-id-lookup"><name>Full User ID Lookup</name>

<t>The most straightforward form of certificate lookup asks for the set
of all certificates that contain a user ID that exactly and completely
matches the query parameter supplied by the client.</t>

<figure><artwork><![CDATA[
keystore.cert_lookup(uid) -> certificate_list
]]></artwork></figure>

<t>In its simplest form, this match is done by a simple bytestring
comparison.  More sophisticated keystores MAY perform the comparison
after applying <xref target="UNICODE-NORMALIZATION"/> form NFC to both the <spanx style="verb">uid</spanx>
query and the user IDs from the stored certificates.</t>

</section>
<section anchor="e-mail-address-lookup"><name>E-mail Address Lookup</name>

<t>However, some common use cases look for specific patterns in the user
ID rather than the entire user ID.  Most useful to many existing
OpenPGP clients is a lookup by e-mail address.</t>

<figure><artwork><![CDATA[
keystore.cert_lookup(addr) -> certificate_list
]]></artwork></figure>

<t>For certificates with a user ID that matches the structure of an
<xref target="RFC5322"/> <spanx style="verb">name-addr</spanx> or <spanx style="verb">addr-spec</spanx>, a keystore SHOULD extract the
<spanx style="verb">addr-spec</spanx> from the user ID, canonicalize it (see
<xref target="e-mail-address-canonicalization"/>), and compare it to the
canonicalized form of of the <spanx style="verb">addr</spanx> query parameter.</t>

</section>
<section anchor="other-lookup-mechanisms"><name>Other Lookup Mechanisms</name>

<t>Some keystores offer other forms of substring or regular expression
matching against the stored user IDs.  These other forms of lookup may
be useful in some contexts (e.g., <xref target="identity-monitoring"/>), but they
may also represent privacy concerns (e.g.,
<xref target="publishing-identity-information"/>), and they may impose additional
computational or indexing burdens on the keystore.</t>

</section>
</section>
<section anchor="certificate-validation"><name>Certificate Validation</name>

<t>An OpenPGP client may assess certificate and user ID validity based on
many factors, some of which are directly contained in the certificate
itself (e.g., third-party certifications), and some of which are based
on the context known to the client, including:</t>

<t><list style="symbols">
  <t>Whether it has seen e-mails from that address signed by that
certificate in the past,</t>
  <t>How long it has known about the certificate,</t>
  <t>Whether the certificate was fetched from a keystore that asserts
validity of the user ID or some part of it (such as the e-mail
address).</t>
</list></t>

<t>A keystore MAY facilitate clients pursuing this last point of
contextual corroboration via a direct interface:</t>

<figure><artwork><![CDATA[
keystore.cert_validate(primary_fpr, uid) -> boolean
]]></artwork></figure>

<t>In an e-mail-specific context, the client might only care about the
keystore's opinion about the validity of the certificate for the
e-mail address portion of the user ID only:</t>

<figure><artwork><![CDATA[
keystore.cert_validate(primary_fpr, addr) -> boolean
]]></artwork></figure>

<t>For some keystores, the presence of a certificate in the keystore
alone implies that the keystore asserts the validity of all user IDs
in the certificate retrieved.  For others, the presence in the
keystore applies only to some part of the user ID.  For example,
<xref target="PGP-GLOBAL-DIRECTORY"/> will only return user IDs that have completed
an e-mail validation step, so presence in that keystore implies an
assertion of validity of the e-mail address part of the user IDs
returned, but makes no claim about the <spanx style="verb">display-name</spanx> portion of any
returned user IDs.  Note that a client retrieving a certificate from
such a keystore may merge the certificate with a local copy -- but the
validity asserted by the keystore of course has no bearing on the
packets that the keystore did not return.</t>

<t>In a more subtle example, the retrieval of a certificate looked up via
WKD (<xref target="I-D.koch-openpgp-webkey-service"/>) or DANE (<xref target="RFC7929"/>) should
only be interpreted as a claim of validity about any user ID which
matches the e-mail address by which the certificate was looked up,
with no claims made about any <spanx style="verb">display-name</spanx> portions, or about any
user ID that doesn't match the queried e-mail address at all.</t>

<t>A keystore that offers some sort of validation interface may also
change its opinion about the validity of a given certificate or user
ID over time; the interface described above only allows the client to
ask about the keystore's current opinion, but a more complex interface
might be capable of describing the keystore's assertion over time.
See also <xref target="in-the-past"/>.</t>

<t>An abuse-resistant keystore that clients rely on for any part of their
certificate validation process SHOULD offer a distinct interface for
making assertions about certificate and user ID validity to help
clients avoid some of the subtleties involved with inference based on
presence described above.</t>

<t>Note that the certificate validation operation as described above has
a boolean response.  While a "true" response indicates that keystore
believes the user ID or e-mail address is acceptable for use with the
certificate referred to by the public key fingerprint, a "false"
response doesn't necessarily mean that the keystore actively thinks
that the certificate is actively bad, or must not be used for the
referenced identity.  Rather, "false" is the default state: no opinion
is expressed by the keystore, and the client is left to make their own
inference about validity based on other factors.  A keystore MAY offer
a more nuanced validity interface; if it does, it SHOULD explicitly
document the semantics of the different response types so that clients
can make appropriate judgment.</t>

</section>
<section anchor="certificate-submission"><name>Certificate Submission</name>

<t>Different keystores have different ways to submit a certificate for
consideration for ingestion, including:</t>

<t><list style="symbols">
  <t>a simple upload of a certificate via HTTP</t>
  <t>round-trip e-mail verification</t>
  <t>proof of presence in some other service</t>
  <t>vouching, or other forms of multi-party attestation</t>
</list></t>

<t>Because these schemes vary so widely, this document does not attempt
to describe the keystore certificate submission process in detail.
However, guidance can be found for implementations that generate,
manage, and submit certificates in <xref target="cert-best-practices"/>.</t>

</section>
</section>
<section anchor="simple-mitigations"><name>Simple Mitigations</name>

<t>These steps can be taken by any keystore that wants to avoid obviously
malicious abuse.  They can be implemented on receipt of any new
packet, and are based strictly on the structure of the packet itself.</t>

<section anchor="large-packets"><name>Decline Large Packets</name>

<t>While <xref target="RFC4880"/> permits OpenPGP packet sizes of arbitrary length,
OpenPGP certificates rarely need to be so large.  An abuse-resistant
keystore SHOULD reject any OpenPGP packet larger than 8383
octets. (This cutoff is chosen because it guarantees that the packet
size can be represented as a one- or two-octet <xref target="RFC4880"/> "New Format
Packet Length", but it could be reduced further)</t>

<t>This may cause problems for user attribute packets that contain large
images, but it's not clear that these images are concretely useful in
any context.  Some keystores MAY extend this limit for user attribute
packets specifically, but SHOULD NOT allow even user attributes
packets larger than 65536 octets.</t>

</section>
<section anchor="enforce-strict-user-ids"><name>Enforce Strict User IDs</name>

<t><xref target="RFC4880"/> indicates that User IDs are expected to be UTF-8 strings.
An abuse-resistant keystore MUST reject any user ID that is not valid
UTF-8.</t>

<t>Some abuse-resistant keystores MAY only accept User IDs that meet even
stricter conventions, such as an <xref target="RFC5322"/> <spanx style="verb">name-addr</spanx> or
<spanx style="verb">addr-spec</spanx>, or a URL like <spanx style="verb">ssh://host.example.org</spanx> (see
<xref target="user-id-conventions"/>).</t>

<t>As simple text strings, User IDs don't need to be nearly as long as
any other packets.  An abuse-resistant keystore SHOULD reject any user
ID packet larger than 1024 octets.</t>

</section>
<section anchor="scoped-user-ids"><name>Scoped User IDs</name>

<t>Some abuse-resistant keystores may restrict themselves to publishing
only certificates with User IDs that match a specific pattern.  For
example, <xref target="RFC7929"/> encourages publication in the DNS of only
certificates whose user IDs refer to e-mail addresses within the DNS
zone.  <xref target="I-D.koch-openpgp-webkey-service"/> similarly aims to restrict
publication to certificates relevant to the specific e-mail domain.</t>

</section>
<section anchor="standardize-unhashed"><name>Strip or Standardize Unhashed Subpackets</name>

<t><xref target="RFC4880"/> signature packets contain an "unhashed" block of
subpackets.  These subpackets are not covered by any cryptographic
signature, so they are ripe for abuse.</t>

<t>An abuse-resistant keystore SHOULD strip out all unhashed subpackets
but the following exceptions:</t>

<section anchor="issuer-fingerprint"><name>Issuer Fingerprint</name>

<t>Some certifications only identify the issuer of the certification by
an unhashed Issuer or Issuer Fingerprint subpacket.  If a
certification's hashed subpacket section has no Issuer Fingerprint
(see <xref target="I-D.ietf-openpgp-rfc4880bis"/>) subpacket, then an
abuse-resistant keystore that has cryptographically validated the
certification SHOULD synthesize an appropriate Issuer Fingerprint
subpacket and include it in the certification's unhashed subpackets.</t>

</section>
<section anchor="cross-sigs"><name>Cross-sigs</name>

<t>Some Primary Key Binding Signatures ("cross-sigs") are distributed as
unhashed subpackets in a Subkey Binding Signature.  A
cryptographically-validating abuse-resistant keystore SHOULD be
willing to redistribute a valid cross-sig as an unhashed subpacket.</t>

<t>The redistributed unhashed cross-sig itself should be stripped of all
unhashed subpackets.</t>

</section>
</section>
<section anchor="decline-user-attributes"><name>Decline User Attributes</name>

<t>Due to size concerns, some abuse-resistant keystores MAY choose to
ignore user attribute packets entirely, as well as any certifications
that cover them.</t>

</section>
<section anchor="decline-non-exportable-certifications"><name>Decline Non-exportable Certifications</name>

<t>An abuse-resistant keystore MUST NOT accept any certification that has
the "Exportable Certification" subpacket present and set to 0.  While
most keystore clients will not upload these "local" certifications
anyway, a reasonable public keystore that wants to minimize data has
no business storing or distributing these certifications.</t>

</section>
<section anchor="decline-data-from-the-future"><name>Decline Data From the Future</name>

<t>Many OpenPGP packets have time-of-creation timestamps in them.  An
abuse-resistant keystore with a functional real-time clock MAY decide
to only accept packets whose time-of-creation is in the past.</t>

<t>Note that some OpenPGP implementations may pre-generate OpenPGP
material intended for use only in some future window (e.g. "Here is
the certificate we plan to use to sign our software next year; do not
accept signatures from it until then."), and may use modified
time-of-creation timestamps to try to achieve that purpose.  This
material would not be distributable ahead of time by an
abuse-resistant keystore that adopts this mitigation.</t>

</section>
<section anchor="accept-only-profiled-certifications"><name>Accept Only Profiled Certifications</name>

<t>An aggressively abuse-resistant keystore MAY decide to only accept
certifications that meet a specific profile.  For example, it MAY
reject certifications with unknown subpacket types, unknown notations,
or certain combinations of subpackets.  This can help to minimize the
amount of room for garbage data uploads.</t>

<t>Any abuse-resistant keystore that adopts such a strict posture should
clearly document what its expected certificate profile is, and should
have a plan for how to extend the profile if new types of
certification appear that it wants to be able to distribute.</t>

<t>Note that if the profile is ever restricted (rather than extended),
and the restriction is applied to the material already present, such a
keystore is no longer append-only (see <xref target="non-append-only"/>).</t>

</section>
<section anchor="authorities"><name>Accept Only Certificates Issued by Designated Authorities</name>

<t>An abuse-resistant keystore capable of cryptographic validation MAY
retain a list of designated authorities, typically in the form of a
set of known public keys.  Upon receipt of a new OpenPGP certificate,
the keystore can decide whether to accept or decline each user ID of
the certificate based whether that user ID has a certification that
was issued by one or more of the designated authorities.</t>

<t>If no user IDs are certified by designated authority, such a keystore
SHOULD decline the certificate and its primary key entirely.  Such a
keystore SHOULD decline to retain or propagate all certifications
associated with each accepted user ID except for first-party
certifications and certifications by the designated authorities.</t>

<t>The operator of such a keystore SHOULD have a clear policy about its
set of designated authorities.</t>

<t>Given the ambiguities about expiration and revocation, such a
keyserver SHOULD ignore expiration and revocation of authority
certifications, and simply accept and retain as long as the
cryptographic signature is valid.</t>

<t>Note that if any key is removed from the set of designated
authorities, and that change is applied to the existing keystore, such
a keystore may no longer be append-only (see
<xref target="non-append-only"/>).</t>

</section>
<section anchor="blocklist"><name>Decline Packets by Blocklist</name>

<t>The maintainer of the keystore may keep a specific list of "known-bad"
material, and decline to accept or redistribute items matching that
blocklist.  The material so identified could be anything, but most
usefully, specific public keys or User IDs could be blocked.</t>

<t>Note that if a blocklist grows to include an element already present
in the keystore, it will no longer be append-only (see
<xref target="non-append-only"/>).</t>

<t>Some keystores may choose to apply a blocklist only at retrieval time
and not apply it at ingestion time.  This allows the keystore to be
append-only, and permits synchronization between keystores that don't
share a blocklist, and somewhat reduces the attacker's incentive for
flooding the keystore (see <xref target="retrieval-time-mitigations"/> for more
discussion).</t>

<t>Note that development and maintenance of a blocklist is not without
its own potentials for abuse.  For one thing, the blocklist may itself
grow without bound.  Additionally, a blocklist may be socially or
politically contentious as it may describe data that is toxic
(<xref target="toxic-data"/>) in one community or jurisdiction but not another.
There needs to be a clear policy about how it is managed, whether by
delegation to specific decision-makers, or explicit tests.
Furthermore, the existence of even a well-intentioned blocklist may be
an "attractive nuisance," drawing the interest of would-be censors or
other attacker interested in controlling the ecosystem reliant on the
keystore in question.</t>

</section>
</section>
<section anchor="retrieval-time-mitigations"><name>Retrieval-time Mitigations</name>

<t>Most of the abuse mitigations described in this document are described
as being applied at certificate ingestion time.  It's also possible to
apply the same mitigations when a certificate is retrieved from the
keystore (that is, during certificate lookup, refresh, or discovery).
Applying an abuse mitigation at retrieval time may help a client
defend against a user ID flooding (<xref target="user-id-flooding"/>), certificate
flooding (<xref target="certificate-flooding"/>), or fingerprint flooding
(<xref target="fingerprint-flooding"/>) attack.  It may also help a keystore limit
its liability for redistributing toxic data (<xref target="toxic-data"/>).
However, only mitigations applied at ingestion time are able to
mitigate keystore flooding attacks (<xref target="keystore-flooding"/>).</t>

<t>Some mitigations (like the non-append-only mitigations described in
<xref target="non-append-only"/>) may be applied as filters at retrieval time,
while still allowing access to the (potentially much larger)
unfiltered dataset associated given certificate or user ID via a
distinct interface.</t>

<t>The rest of this section documents specific mitigations that are only
relevant at retrieval time (certificate discovery, lookup, or refresh).</t>

<section anchor="user-id-redacting"><name>Redacting User IDs</name>

<t>Some abuse-resistant keystores may accept and store user IDs but
decline to redistribute some or all of them, while still distributing
the certifications that cover those redacted user IDs.  This draft
refers to such a keystore as a "user ID redacting" keystore.</t>

<t>The certificates distributed by such a keystore are technically
invalid <xref target="RFC4880"/> "transferable public keys", because they lack a
user ID packet, and the distributed certifications cannot be
cryptographically validated independently.  However, an OpenPGP
implementation that already knows the user IDs associated with a given
primary key will be capable of associating each certification with the
correct user ID by trial signature verification.</t>

<section anchor="certificate-refresh-with-redacted-user-ids"><name>Certificate Refresh with Redacted User IDs</name>

<t>A user ID redacting keystore is useful for certificate refresh by a
client that already knows the user ID it expects to see associated
with the certificate.  For example, a client that knows a given
certificate currently has two specific user IDs could access the
keystore to learn that one of the user IDs has been revoked, without
any other client learning the user IDs directly from the keystore.</t>

</section>
<section anchor="certificate-discovery-with-redacted-user-ids"><name>Certificate Discovery with Redacted User IDs</name>

<t>A user ID redacting keystore is somewhat less useful for clients doing
certificate discovery.  Consider the circumstance of receiving a
signed e-mail without access to the signing certificate.  If the
verifier retrieves the certificate from a user ID redacting keystore
by via the Issuer Fingerprint from the signature, and the signature
validates, the received certificate might not be a valid "transferable
public key" unless the client can synthesize the proper user ID.</t>

<t>A reasonable client that wants to validate a certification in the user
ID redacted certificate SHOULD try to synthesize possible user IDs
based on the value of the <xref target="RFC5322"/> From: header in the message:</t>

<t><list style="symbols">
  <t>Decode any <xref target="RFC2047"/> encodings present in the raw header value,
converting into UTF-8 <xref target="UNICODE-NORMALIZATION"/> form C (NFC),
trimming all whitespace from the beginning and the end of the
string.</t>
  <t>The resulting string should be an <xref target="RFC5322"/> <spanx style="verb">name-addr</spanx> or
<spanx style="verb">addr-spec</spanx>.</t>
  <t>If it is a <spanx style="verb">name-addr</spanx>, convert the UTF-8 string into an OpenPGP user
ID and check whether the certification validates, terminating on success.  <list style="symbols">
      <t>If the test fails, extract the <spanx style="verb">addr-spec</spanx> from the <spanx style="verb">name-addr</spanx>
and continue.</t>
    </list></t>
  <t>Canonicalize the <spanx style="verb">addr-spec</spanx> according to
<xref target="e-mail-address-canonicalization"/>, and check whether the
certification validates, terminating on success.</t>
  <t>If it doesn't validate wrap the canonicalized <spanx style="verb">addr-spec</spanx> in
angle-brackets ("&lt;" and "&gt;") and test the resulting minimalist
<spanx style="verb">name-addr</spanx> against the certification, terminating on success.</t>
  <t>If all of the above fails, synthesis has failed.</t>
</list></t>

</section>
<section anchor="certificate-lookup-with-redacted-user-ids"><name>Certificate Lookup with Redacted User IDs</name>

<t>It's possible (though non-intuitive) to use a user ID redacting
keystore for certificate lookup.  Since the keystore retains (but
does not distribute) the user IDs, they can be used to select
certificates in response to a search.  The OpenPGP certificates sent
back in response to the search will not contain the user IDs, but a
client that knows the full user ID they are searching for will be able
to verify the returned certifications.</t>

<t>Certificate lookup from a user ID redacting keystore works better for
certificate lookup by exact user ID match than it does for substring
match, because a client that retrieves a certificate via a substring
match may not be able to reconstruct the redacted user ID.</t>

<t>However, without some additional restrictions on which certifications
are redistributed (whether the user ID is redacted or not),
certificate lookup can be flooded (see <xref target="uploads-vs-lookup"/>).</t>

</section>
<section anchor="uidhash"><name>Hinting Redacted User IDs</name>

<t>To ensure that the distributed certificate is at least structurally a
valid <xref target="RFC4880"/> transferable public key, a user ID redacting
keystore MAY distribute an empty user ID (an OpenPGP packet of tag 13
whose contents are a zero-octet string) in place of the omitted user
ID.  This two-octet replacement user ID packet ("\xb4\x00") is called
the "unstated user ID".</t>

<t>To facilitate clients that match certifications with specific user
IDs, a user ID redacting keystore MAY insert a non-hashed notation
subpacket into the certification.  The notation will have a name of
"uidhash", with 0x80 ("human-readable") flag unset.  The value of such
a notation MUST be 32 octets long, and contains the SHA-256
cryptographic digest of the UTF-8 string of the redacted user ID.</t>

<t>A certificate refresh client which receives such a certification after
the "unstated user ID" SHOULD compute the SHA-256 digest of all user
IDs it knows about on the certificate, and compare the result with the
contents of the "uidhash" notation to decide which user ID to try to
validate the certification against.</t>

</section>
<section anchor="uid-recovery-brute-force"><name>User ID Recovery by Client Brute Force</name>

<t>User ID redaction is at best an imperfect process.  Even if a keystore
redacts a User ID, if it ships a certification over that user ID, an
interested client can guess user IDs until it finds one that causes
the signature to verify.  This is even easier when the space of
legitimate user IDs is relatively small, such as the set of
commonly-used hostnames.</t>

</section>
</section>
<section anchor="primary-key-only-refresh"><name>Primary-key Only Certificate Refresh</name>

<t>Abuse-resistant keystores can defend against a fingerprint flooding
<xref target="fingerprint-flooding"/> attack during certificate refresh by
implementing a narrowly-constrained certificate refresh interface.</t>

<t>Such a keystore MUST accept only a full fingerprint as the search
parameter from the certificate refresh client, and it MUST return at
most a single certificate whose primary key matches the requested
fingerprint.  It MUST NOT return more than one certificate, and it
MUST NOT return any certificate whose primary key does not match the
fingerprint.  In particular, it MUST NOT return certificates where
only the subkey fingerprint matches.</t>

<t>Note that <xref target="I-D.shaw-openpgp-hkp"/> does not offer the primitive
described in <xref target="certificate-refresh"/> exactly.  In that specification,
the set of keys returned by a "get" operation with a "search"
parameter that appears to be a full fingerprint is ambiguous.  Some
popular implementations (e.g., <xref target="SKS"/>) do not currently implement
this mitigation, because they return certificates with subkeys that
match the fingerprint.</t>

</section>
<section anchor="require-cross-sig-discovery"><name>Require Valid Cross-Sigs for Certificate Discovery</name>

<t>By definition, certificate discovery needs to be able to match
subkeys, not just primary keys.  This means that the mitigation in
<xref target="primary-key-only-refresh"/> is ineffective for a keystore that offers
a certificate discovery interface.</t>

<t>An abuse-resistant keystore that aims to defend its certificate
discovery interface from a fingerprint flooding
(<xref target="fingerprint-flooding"/>) attack can follow the following procedure.</t>

<t>Such a keystore MUST accept only a full fingerprint or a 64-bit key ID
as the search parameter from the certificate discovery client.  It
MUST only match that fingerprint against the following:</t>

<t><list style="symbols">
  <t>the fingerprint or key ID of a primary key associated with a valid
certificate</t>
  <t>the fingerprint or key ID of a cryptographically-valid subkey that
also has a cross-sig.</t>
</list></t>

<t>This defends against the fingerprint flooding attack because a
certificate will only be returned by subkey if the subkey has agreed
to be associated with the primary key (and vice versa).</t>

<t>Note that this mitigation means that certificate discovery will fail
if used for subkeys that lack cross-sigs.  In particular, this means
that a client that tries to use the certificate discovery interface to
retrieve a certificate based on its encryption-capable subkey (e.g.,
taking the key ID from a Public Key Encrypted Session Key (PKESK)
packet) will have no success.</t>

<t>This is an acceptable loss, since the key ID in a PKESK is typically
unverifiable anyway.</t>

</section>
</section>
<section anchor="contextual-mitigations"><name>Contextual Mitigations</name>

<t>Some mitigations make the acceptance or rejection of packets
contingent on data that is already in the keystore or the keystore's
developing knowledge about the world.  This means that, depending on
the order that the keystore encounters the various material, or how it
accesses or finds the material, the final set of material retained and
distributed by the keystore might be different.</t>

<t>While this isn't necessarily bad, it may be a surprising property for
some users of keystores.</t>

<section anchor="accept-only-cryptographically-verifiable-certifications"><name>Accept Only Cryptographically-verifiable Certifications</name>

<t>An abuse-resistant keystore that is capable of doing cryptographic
validation MAY decide to reject certifications that it cannot
cryptographically validate.</t>

<t>This may mean that the keystore rejects some packets while it is
unaware of the public key of the issuer of the packet.</t>

<t>As long as the keystore implements the verification algorithm, Any
self-signature should always be cryptographically-verifiable, since
the public key of the issuer is already present in the certificate
under consideration.</t>

</section>
<section anchor="accept-only-certificates-issued-by-known-certificates"><name>Accept Only Certificates Issued by Known Certificates</name>

<t>This is an extension of <xref target="authorities"/>, but where the set of
authorities is just the set of certificates already known to the
keystore.  An abuse-resistant keystore that adopts this strategy is
effectively only crawling the reachable graph of OpenPGP certificates
from some starting core.</t>

<t>A keystore adopting the mitigation SHOULD have a clear documentation
of the core of initial certificates it starts with, as this is
effectively a policy decision.</t>

<t>This mitigation measure may fail due to a compromise of any secret key
that is associated with a primary key of a certificate already present
in the keystore.  Such a compromise permits an attacker to flood the
rest of the network.  In the event that such a compromised key is
identified, it might be placed on a blocklist (see <xref target="blocklist"/>).  In
particular, if a public key is added to a blocklist for a keystore
implementing this mitigation, and it is removed from the keystore,
then all certificates that were only "reachable" from the blocklisted
certificate should also be simultaneously removed.</t>

<t>FIXME: There are complexities associated with this strategy when
certificates expire or are revoked.  If expiration or revocation cause
some certificates to become "unreachable", what should such a keystore
do?</t>

</section>
<section anchor="rate-limit-submissions-by-ip-address"><name>Rate-limit Submissions by IP Address</name>

<t>Some OpenPGP keystores accept material from the general public over
the Internet.  If an abuse-resistant keystore observes a flood of
material submitted to the keystore from a given Internet address, it
MAY choose to throttle submissions from that address.  When receiving
submissions over IPv6, such a keystore MAY choose to throttle entire
nearby subnets, as a malicious IPv6 host is more likely to have
multiple addresses.</t>

<t>This requires that the keystore maintain state about recent
submissions over time and address.  It may also be problematic for
users who appear to share an IP address from the vantage of the
keystore, including those behind a NAT, using a VPN, or accessing the
keystore via Tor.</t>

</section>
<section anchor="exterior-process"><name>Accept Certificates Based on Exterior Process</name>

<t>Some public keystores resist abuse by explicitly filtering OpenPGP
material based on a set of external processes.  For example,
<xref target="DEBIAN-KEYRING"/> adjudicates the contents of the "Debian keyring"
keystore based on organizational procedure and manual inspection.</t>

</section>
<section anchor="accept-certificates-by-e-mail-validation"><name>Accept Certificates by E-mail Validation</name>

<t>Some keystores resist abuse by declining any certificate until the
user IDs have been verified by e-mail.  When these "e-mail validating"
keystores review a new certificate that has a user ID with an e-mail
address in it, they send an e-mail to the associated address with a
confirmation mechanism (e.g., a high-entropy HTTPS URL link) in it.
The e-mail itself MAY be encrypted to an encryption-capable
key found in the proposed certificate.  If the keyholder triggers the
confirmation mechanism, then the keystore accepts the certificate.</t>

<t>Some e-mail validating keystores MAY choose to distribute
certifications over all user IDs for any given certificate, but will
redact (see <xref target="user-id-redacting"/>) those user IDs that have not been
e-mail validated.</t>

<t><xref target="PGP-GLOBAL-DIRECTORY"/> describes some concerns held by a keystore
operator using this approach.  <xref target="MAILVELOPE-KEYSERVER"/> is another
example.</t>

</section>
</section>
<section anchor="non-append-only"><name>Non-append-only mitigations</name>

<t>The following mitigations may cause some previously-retained packets
to be dropped after the keystore receives new information, or as time
passes.  This is entirely reasonable for some keystores, but it may be
surprising for clients of a keystore that expect the keystore to be
append-only (for example, some keyserver synchronization techniques
may expect this property to hold).</t>

<t>Furthermore, keystores that drop old data (e.g., superseded
certifications) may make it difficult or impossible for their users to
reason about the validity of signatures that were made in the past.
See <xref target="in-the-past"/> for more considerations.</t>

<t>Note also that many of these mitigations depend on cryptographic
validation, so they're typically contextual as well.</t>

<t>A keystore that needs to be append-only, or which cannot perform
cryptographic validation MAY omit these mitigations.  Alternately, a
keystore may omit these mitigations at certificate ingestion time, but
apply these mitigations at retrieval time (during certificate refresh,
discovery, or lookup), and offer a more verbose (non-mitigated)
interface for auditors, as described in
<xref target="retrieval-time-mitigations"/>.</t>

<t>Note that <xref target="GnuPG"/> anticipates some of these suggestions with its
"clean" subcommand, which is documented as:</t>

<figure><artwork><![CDATA[
Compact  (by  removing all signatures except the selfsig)
any user ID that is no longer usable  (e.g.  revoked,  or
expired). Then, remove any signatures that are not usable
by the trust calculations.   Specifically,  this  removes
any  signature that does not validate, any signature that
is superseded by a later signature,  revoked  signatures,
and signatures issued by keys that are not present on the
keyring.
]]></artwork></figure>

<section anchor="drop-superseded"><name>Drop Superseded Signatures</name>

<t>An abuse-resistant keystore SHOULD drop all signature packets that are
explicitly superseded.  For example, there's no reason to retain or
distribute a self-sig by key K over User ID U from 2017 if the
keystore have a cryptographically-valid self-sig over &lt;K,U&gt; from 2019.</t>

<t>Note that this covers both certifications and signatures over subkeys,
as both of these kinds of signature packets may be superseded.</t>

<t>Getting this right requires a nuanced understanding of subtleties
in <xref target="RFC4880"/> related to timing and revocation.</t>

</section>
<section anchor="drop-expired"><name>Drop Expired Signatures</name>

<t>If a signature packet is known to only be valid in the past, there is
no reason to distribute it further.  An abuse-resistant keystore with
access to a functional real-time clock SHOULD drop all
certifications and subkey signature packets with an expiration date in
the past.</t>

<t>Note that this assumes that the keystore and its clients all have
roughly-synchronized clocks.  If that is not the case, then there will
be many other problems!</t>

</section>
<section anchor="drop-dangling-user-ids-user-attributes-and-subkeys"><name>Drop Dangling User IDs, User Attributes, and Subkeys</name>

<t>If enough signature packets are dropped, it's possible that some of
the things that those signature packets cover are no longer valid.</t>

<t>An abuse-resistant keystore which has dropped all certifications that
cover a User ID SHOULD also drop the User ID packet.</t>

<t>Note that a User ID that becomes invalid due to revocation MUST NOT be
dropped, because the User ID's revocation signature itself remains
valid, and needs to be distributed.</t>

<t>A primary key with no User IDs and no subkeys and no revocations MAY
itself also be removed from distribution, though note that the removal
of a primary key may make it impossible to cryptographically validate
other certifications held by the keystore.</t>

</section>
<section anchor="only-revocation"><name>Drop All Other Elements of a Directly-Revoked Certificate</name>

<t>If the primary key of a certificate is revoked via a key revocation
signature (type 0x20), an abuse-resistant keystore SHOULD drop all
the rest of the associated data (user IDs, user attributes, and subkeys,
and all attendant certifications and subkey signatures).  This defends
against an adversary who compromises a primary key and tries to flood
the certificate to hide the revocation.</t>

<t>Note that the key revocation signature MUST NOT be dropped.</t>

<t>In the event that an abuse-resistant keystore is flooded with key
revocation signatures, it should retain the hardest, earliest
revocation (see also <xref target="revocations"/>).</t>

<t>In particular, if any of the key revocation signatures is a "hard"
revocation, the abuse-resistant keystore SHOULD retain the earliest
such revocation signature (by signature creation date).</t>

<t>Otherwise, the abuse-resistant keystore SHOULD retain the earliest
"soft" key revocation signature it has seen.</t>

<t>If either of the above date comparisons results in a tie between two
revocation signatures of the same "hardness", an abuse-resistant
keystore SHOULD retain the signature that sorts earliest based on a
binary string comparison of the key revocation signature packet
itself.</t>

</section>
<section anchor="implicit-expiration-date"><name>Implicit Expiration Date</name>

<t>In combination with some of the dropping mitigations above, a
particularly aggressive abuse-resistant keystore MAY choose an
implicit expiration date for all signature packets.  For example, a
signature packet that claims no expiration could be treated by the
keystore as expiring 3 years after issuance.  This would permit the
keystore to eject old packets on a rolling basis.</t>

<t>An abuse-resistant keystore that adopts this mitigation needs a policy
for handling signature packets marked with an explicit expiration that
is longer than implicit maximum.  The two obvious strategies are:</t>

<t><list style="symbols">
  <t>cap the packet's expiration to the system's implicit expiration
date, or</t>
  <t>accept the explicit expiration date.</t>
</list></t>

<t>Warning: Any implementation of this idea is pretty radical, and it's
not clear what it would do to an ecosystem that depends on such a
keystore.  It probably needs more thinking.</t>

</section>
</section>
<section anchor="sovereignty"><name>Primary Key Sovereignty</name>

<t>A keystore can defend against malicious external flooding by treating
the "first party" of each certificate as "sovereign" over that
certificate.  This means in practice that no part of the certificate
will redistributed without explicit permission from the primary key.
We call a keystore that aims to respect primary key sovereignty a
"sovereignty-respecting" keystore.</t>

<t><xref target="RFC4880"/> defines "Key Server Preferences" with a "No-modify" bit.
That bit has never been respected by any keyserver implementation that
the author is aware of.  A sovereignty-respecting keystore effectively
treats that bit as always set, whether it is present in any part of
the certificate or not.</t>

<t>A sovereignty-respecting abuse-resistant keystore can apply other
constraints in addition to primary-key sovereignty, of course, for
reasons as diverse as performance concerns, storage capacity, legal
regulation, cryptographic algorithm support, or project policy.  It
will not redistribute anything that has not been explicitly approved
by the primary key, but that does not mean it has to redistribute
everything that has been explicitly approved by the primary key.</t>

<t>The remaining subsections of <xref target="sovereignty"/> describe some sensible
strategies for a sovereignty-respecting keystore.</t>

<section anchor="refresh-only"><name>Refresh-only Keystores</name>

<t>Some soveriegnty-respecting keystores may resist abuse by declining to
accept any user IDs or certifications whatsoever.</t>

<t>Such a keystore MUST be capable of cryptographic validation.  It
accepts primary key packets, cryptographically-valid direct-key and
revocation signatures from a primary key over itself, subkeys and their
cryptographically-validated binding signatures (and cross-sigs, where
necessary).</t>

<t>A client of a refresh-only keystore cannot possibly use the keystore
for certificate lookup, because there are no user IDs to match.  And
it is not particularly useful for certificate discovery, because the
returned certificate would have no identity information.  However,
such a keystore can be used for certificate refresh, as it's possible
to ship revocations, new subkeys,
updates to subkey expiration, subkey revocations, and updates of direct key
signature-based certificate expiration or other OpenPGP properties.</t>

<t>Note that many popular OpenPGP implementations do not implement direct
primary key expiration mechanisms, relying instead on user ID
expirations.  These user ID expiration dates or other metadata
associated with a self-certification will not be distributed by an
refresh-only keystore.</t>

<t>Certificates shipped by an refresh-only keystore are technically
invalid <xref target="RFC4880"/> "transferable public keys," because they lack a
user ID packet.  However many OpenPGP implementations will accept such
a certificate if they already know of a user ID for the certificate,
because the composite certificate resulting from a merge will be a
standards-compliant transferable public key.</t>

</section>
<section anchor="first-party-only"><name>First-party-only Keystores</name>

<t>Slightly more permissive than the refresh-only keystore described in
<xref target="refresh-only"/> is a sovereignty-respecting keystore that also
permits user IDs and their self-sigs.</t>

<t>A first-party-only keystore only accepts and distributes
cryptographically-valid first-party certifications.  Given a primary
key that the keystore understands, it will only attach user IDs that
have a valid self-sig, and will only accept and re-distribute subkeys
that are also cryptographically valid (including requiring cross-sigs
for signing-capable subkeys as recommended in <xref target="RFC4880"/>).</t>

<t>This effectively avoids certificate flooding attacks, because the only
party who can make a certificate overly large is the holder of the
secret corresponding to the primary key itself.</t>

<t>Note that a first-party-only keystore is still problematic for
those people who rely on the keystore for retrieval of third-party
certifications.  <xref target="fpa3pc"/> attempts to address this lack.</t>

<section anchor="first-party-only-without-user-ids"><name>First-party-only Without User IDs</name>

<t>It is possible to operate an first-party-only keystore that
redistributes certifications (in particular, self-sigs) while
declining to redistribute user IDs themselves
(see <xref target="user-id-redacting"/>).  This defends against concerns about
publishing identifiable information, while enabling full certificate
refresh for those keystore clients that already know the associated
user IDs for a given certificate.</t>

</section>
</section>
<section anchor="fpa3pc"><name>First-party-attested Third-party Certifications</name>

<t>We can augment a first-party-only sovereignty-respecting keystore to
allow it to distribute third-party certifications as long as the
first-party has signed off on the specific third-party certification.</t>

<t>This can be done by placing an Attested Certifications subpacket in
the most recent self-sig of the certificate (see
<xref target="Attested-Certifications"/>).</t>

<section anchor="client-interactions"><name>Client Interactions</name>

<t>Creating such an attestation requires multiple steps by different
parties, each of which is blocked by all prior steps:</t>

<t><list style="symbols">
  <t>The first-party creates the certificate, and transfers it to the
third party.</t>
  <t>The third-party certifies it, and transfers their certification
back to the first party.</t>
  <t>The first party attests to the third party's certification by
issuing a new self-sig.</t>
  <t>Finally, the first party then transfers the updated certificate to
the keystore.</t>
</list></t>

<t>The complexity and length of such a sequence may represent a usability
obstacle to a user who needs a third-party-certified OpenPGP
certificate.</t>

<t>Few OpenPGP clients can currently create the attestations described in
<xref target="Attested-Certifications"/>.  None that the author is aware of are
user-friendly.  More implementation work needs to be done to make it
easy (and understandable) for a user to perform this kind of
attestation.</t>

</section>
<section anchor="third-party-revocations"><name>Revoking Third-party Certifications</name>

<t>A sovereignty-respecting keystore distributes a third-party
certification based on the desires of the first party, but the
third-party themselves may change their mind about the certification
that they issued.  In particular, they may revoke a previously
attested third-party certification.  This causes some additional
complexity.</t>

<section anchor="third-party-certification-revocations-arent-shipped-with-the-certificate"><name>Third-party Certification Revocations Aren't Shipped with the Certificate</name>

<t>Distributing the third-party's revocation of their certification
without the approval of the first party would arguably disrespect the
first-party's sovereignty over their own certificate.  For example,
consider an abusively large revocation, or a revocation which contains
toxic data.</t>

<t>At the same time, if the first party were to revoke their attestation,
then the third-party certification itself <em>and</em> its third-party's
revocation might not be distributed.  So distributing third-party
certification revocations directly on the certificate they refer to
doesn't seem to solve the problem for an abuse-resistant,
sovereignty-respecting keystore.</t>

</section>
<section anchor="third-party-certification-revocations-ship-with-the-issuing-certificate"><name>Third-party Certification Revocations Ship With the Issuing Certificate</name>

<t>Instead, a sovereignty-respecting keystore MAY ship a third-party
certification revocation attached to the end of the issuing
certificate, as this respects the sovereignty of all parties involved.</t>

<t>This means that the certifier's own OpenPGP certificate MAY be
distributed like so:</t>

<figure><artwork><![CDATA[
- A. Primary key
- B. User ID
- C. Self-sig (from A, binding A to B)
- D. Subkey
- E. Subkey binding signature (from A, binds D to A)
- F. Certification revocation signature
     (from A over some other key+userID, targets other
      certification)
]]></artwork></figure>

<t>Note that OpenPGP packet K is unusual here, and augments the
traditional Transferable Public Key structure from <xref target="RFC4880"/>.</t>

<t>A client that cares about third-party certifications SHOULD maintain
an index of certifications based on the SHA256 digest of the
certifications themselves (the "certification index").  The
certification revocation packet SHOULD contain a Signature Target
subpacket using SHA256 to identify the revoked certification.  The
client can use this Signature Target subpacket and the certification
index to identify the targeted certification and to compute the data
over which the revocation is made.  This use of SHA256 is not used for
cryptographic strength, but for indexing efficiency.</t>

<t>A client that cares about third-party certifications from key A SHOULD
refresh the certificate containing A from the keystore, and verify any
discovered certification revocations correctly to the appropriate
certificates, searching for the targeted revocation in its
certification index.</t>

<t>A legacy client that is unaware of this augmentation of the
Transferable Public Key structure is likely to consider packet K as
out-of-order or inapplicable (it would typically expect only a Subkey
Revocation Signature packet in this position), and so will discard it.</t>

<t>In the event that the certificate has no subkeys (packets I and J are
absent), a legacy client might consider F to be an attempt to revoke
Self-Sig C.  However, F's Signature Target subpacket does not point to
C, and the certification is not cryptographically valid over A and B,
so it should be discarded/ignored safely in that case as well.</t>

</section>
</section>
</section>
</section>
<section anchor="client-best-practices"><name>Keystore Client Best Practices</name>

<t>An OpenPGP client that needs to interact with an abuse-resistant
keystore can take steps to minimize the extent that its interactions
with a keystore can be abused by other parties via the attacks
described in <xref target="problem-statement"/>.  This section describes steps that
an abuse-resistant client can take.</t>

<section anchor="use-constrained-keystores-for-lookup"><name>Use Constrained Keystores for Lookup</name>

<t>When performing certificate lookup, an abuse-resistant client SHOULD
prefer to query abuse-resistant keystores to avoid the risks described
in <xref target="uploads-vs-lookup"/>.  In particular, keystores that defend
against User ID Flooding are significantly more reliable for
certificate lookup.</t>

</section>
<section anchor="normalize-addresses-and-user-ids-for-lookup"><name>Normalize Addresses and User IDs for Lookup</name>

<t>When performing lookup by e-mail address, an abuse-resistant client
SHOULD consider canonicalizing the e-mail address before searching
(see <xref target="e-mail-address-canonicalization"/>).</t>

<t>When searching by full User ID, unless there is a strong reason to
believe that a specific non-normalized form is preferable, an
abuse-resistant client SHOULD normalize the entire user ID into
<xref target="UNICODE-NORMALIZATION"/> Form C (NFC) before performing certificate
lookup.</t>

</section>
<section anchor="avoid-fuzzy-lookups"><name>Avoid Fuzzy Lookups</name>

<t>Certificate lookup by arbitrary substring matching, or regular
expression is prone to abuse.  An abuse-resistant client SHOULD prefer
exact-uid or exact-email match lookups where possible.</t>

<t>In particular, an abuse-resistant client should avoid trying to offer
reliable functionality that performs these sort of fuzzy lookups, and
SHOULD warn the user about risks of abuse if the user triggers a
codepath that unavoidably performs such a fuzzy lookup.</t>

</section>
<section anchor="prefer-full-fingerprint-for-discovery-and-refresh"><name>Prefer Full Fingerprint for Discovery and Refresh</name>

<t>Key IDs are inherently weaker and easier to spoof or collide than full
fingerprints.  Where possible, an abuse-resistant keystore client
SHOULD use the full fingerprint when interacting with the keystore.</t>

</section>
<section anchor="use-caution-with-keystore-provided-validation"><name>Use Caution with Keystore-provided Validation</name>

<t>When an abuse-resistant client relies on a keystore for certificate
validation, many things can go subtly wrong if the client fails to
closely track the specific semantics of the keystore's validation
claims.</t>

<t>For example, a certificate published by WKD
(<xref target="I-D.koch-openpgp-webkey-service"/>) at
<spanx style="verb">https://openpgpkey.example.org/.well-known/openpgpkey/hu/iy9q119eutrkn8s1mk4r39qejnbu3n5q?l=joe.doe</spanx>
offers a validation claim only for the e-mail address
<spanx style="verb">joe.doe@example.org</spanx>.  If the certificate retrieved at that address
contains other user IDs, or if the user ID containing that e-mail
address contains an <xref target="RFC5322"/> <spanx style="verb">display-name</spanx>, none of that
information should be considered "validated" by the fact that the
certificate was retrieved via certificate lookup by WKD.</t>

<t>When certificate validation is represented more generally by a
keystore via certificate retrieval (e.g. from an e-mail validating
keyserver that has no distinct certificate validation interface), the
thing validated is the certificate received from the keystore, and not
the result of the merge into any local copy of the certificate already
possessed by the client.</t>

<t>Consider also timing and duration of these assertions of validity,
which represent a subtle tradeoff between privacy and risk as
described in <xref target="validation-privacy"/>.</t>

</section>
</section>
<section anchor="cert-best-practices"><name>Certificate Generation and Management Best Practices</name>

<t>An OpenPGP implementation that generates or manages certificates and
expects to distribute them via abuse-resistant keystores can take
steps to ensure that the certificates generated are more likely to be
accessible when needed.  This section describes steps such an
abuse-sensitive implementation can take.</t>

<section anchor="canonicalized-e-mail-addresses"><name>Canonicalized E-Mail Addresses</name>

<t>E-mail addresses can be written in many different ways.  An
abuse-sensitive implementation considering attaching a user ID
containing an e-mail address on a certificate SHOULD ensure that the
e-mail address is structured as simply as possible.  See
<xref target="e-mail-address-canonicalization"/> for details about e-mail address
canonicalization.</t>

<t>For example, if the e-mail domain considers the local part to be
case-insensitive (as most e-mail domains do today), if a proposed user
ID contains the <spanx style="verb">addr-spec</spanx>: <spanx style="verb">Alice@EXAMPLE.org</spanx>, the implementation
SHOULD warn the user and, if possible, propose replacing the
<spanx style="verb">addr-spec</spanx> part of the user ID with <spanx style="verb">alice@example.org</spanx>.</t>

</section>
<section anchor="normalized-user-ids"><name>Normalized User IDs</name>

<t>User IDs are arbitrary UTF-8 strings, but UTF-8 offers several ways to
represent the same string.  An abuse-sensitive implementation
considering attaching a user ID to a certificate SHOULD normalize the
string using <xref target="UNICODE-NORMALIZATION"/> Form C (NFC) before creating
the self-sig.</t>

<t>At the same time, the implementation MAY also warn the user if the
"compatibility" normalized form (NFKC) differs from the candidate user
ID and, if appropriate, offer to convert the user ID to compatibility
normalized form at the user's discretion.</t>

</section>
<section anchor="avoid-large-user-attributes"><name>Avoid Large User Attributes</name>

<t>An abuse-sensitive implementation SHOULD warn the user when attaching
a user attribute larger than 8383 octets, and SHOULD refuse to attach
user attributes entirely larger than 65536 octets.  (See
<xref target="large-packets"/>)</t>

</section>
<section anchor="provide-cross-sigs"><name>Provide Cross-Sigs</name>

<t><xref target="RFC4880"/> requires cross-sigs for all signing-capable subkeys, but
is agnostic about the use of cross-sigs for subkeys of other
capabilities.</t>

<t>An abuse-sensitive implementation that wants a certificate to be
discoverable by subkey SHOULD provide cross-sigs for any subkey
capable of making a cross-sig.</t>

</section>
<section anchor="provide-issuer-fingerprint-subpackets"><name>Provide Issuer Fingerprint Subpackets</name>

<t>Issuer subpackets contain only 64-bit key IDs.  Issuer Fingerprint
subpackets contain an unambiguous designator of the issuing key,
avoiding the ambiguities described in <xref target="id-vs-fingerprint-discovery"/>.
Abuse-sensitive implementations SHOULD provide Issuer Fingerprint
subpackets.</t>

</section>
<section anchor="put-cross-sigs-and-issuer-fingerprint-in-hashed-subpackets"><name>Put Cross-Sigs and Issuer Fingerprint in Hashed Subpackets</name>

<t>Unhashed subpackets may be stripped or mangled.  Placing cross-sigs
and issuer fingerprint subpackets in the hashed subpackets will ensure
that they are propagated by any cryptographically-validating keystore,
even if that keystore fails to observe the exceptions in
<xref target="standardize-unhashed"/>.</t>

</section>
<section anchor="submit-certificates-to-restricted-lookup-capable-keystores"><name>Submit Certificates to Restricted, Lookup-Capable Keystores</name>

<t>If an abuse-sensitive implementation wants other peers to be able to
to retrieve the managed certificate by certificate lookup (that is, by
searching based on user ID or e-mail address), it needs to be aware
that submission to an unrestricted keystore is not reliable (see
<xref target="uploads-vs-lookup"/> for more details).</t>

<t>Consequently, such an implementation SHOULD submit the managed
certificate to restricted, lookup-capable keystores where possible, as
those keystores are more likely to be able to offer reliable lookup.</t>

</section>
</section>
<section anchor="side-effects-and-ecosystem-impacts"><name>Side Effects and Ecosystem Impacts</name>

<section anchor="designated-revoker"><name>Designated Revoker</name>

<t>A first-party-only keystore as described in <xref target="first-party-only"/> might
decline to distribute revocations made by the designated revoker.
This is a risk to certificate-holder who depend on this mechanism,
because an important revocation might be missed by clients depending
on the keystore.</t>

<t>FIXME: adjust this document to point out where revocations from a
designated revoker SHOULD be propagated, maybe even in
first-party-only keystores.</t>

</section>
<section anchor="id-vs-fingerprint-discovery"><name>Key IDs vs. Fingerprints in Certificate Discovery</name>

<t>During signature verification, a user performing certificate discovery
against a keystore SHOULD prefer to use the full fingerprint as an
index, rather than the 64-bit key ID.  Using a 64-bit key ID is more
likely to run into collision attacks; and if the retrieved certificate
has a matching key ID but the signature cannot be validated with it,
the client is in an ambiguous state -- did it retrieve the wrong
certificate, or is the signature incorrect?  Using the fingerprint
resolves the ambiguity: the signature is incorrect, because the
a fingerprint match is overwhelmingly stronger than a key ID match.</t>

<t>Unfortunately, many OpenPGP implementations distribute signatures with
only an Issuer subpacket, so a client attempting to find such a
certificate MAY perform certificate discovery based on only the key
ID.</t>

<t>A keystore that offers certificate discovery MAY choose to require
full fingerprint, but such a keystore will not be useful for a client
attempting to verify a bare signature from an unknown party if that
signature only has an Issuer subpacket (and no Issuer Fingerprint
subpacket).</t>

</section>
<section anchor="in-band-certificates"><name>In-band Certificates</name>

<t>There are contexts where it is expected and acceptable that the
signature appears without its certificate: for example, if the set of
valid signers is already known (as in some OpenPGP-signed operating
system updates), shipping the certificate alongside the signature
would be pointless bloat.</t>

<t>However, OpenPGP signatures are often found in contexts where the
certificate is not yet known by the verifier.  For example, many
OpenPGP-signed e-mails are not accompanied by the signing certificate.</t>

<t>In another example, the use of authentication-capable OpenPGP keys in
standard SSH connections do not contain the full OpenPGP certificates,
which means that the SSH clients and servers need to resort to
out-of-band processes if evaluation of the OpenPGP certificates is
necessary.</t>

<t>The certificate discovery interface offered by keystores is an attempt
to accommodate these situations.  But in the event that a keystore is
unavailable, does not know the certificate, or suffers from a flooding
attack, signature validation may fail unnecessarily.  In an encrypted
e-mail context specifically, such a failure may also limit the
client's ability to reply with an encrypted e-mail.</t>

<t>Certificate discovery also presents a potential privacy concern for
the signature verifier, as noted in <xref target="discovery-privacy"/>.</t>

<t>These problematic situations can be mitigated by shipping the
certificate in-band, alongside the signature.  Signers SHOULD adopt
this practice where possible to reduce the dependence of the verifier
on the keystores for certificate discovery.  <xref target="AUTOCRYPT"/> is an
example of e-mail recommendations that include in-band certificates.</t>

<section anchor="in-band-certificate-minimization-and-validity"><name>In-band Certificate Minimization and Validity</name>

<t>OpenPGP certificates are potentially large. When distributing an
in-band certificate alongside a signature in a context where size is a
concern (e.g. bandwidth, latency, or storage costs are a factor), the
distributor SHOULD reduce the size of the in-band certificate by
stripping unnecessary packets.  For example, the distributor may:</t>

<t><list style="symbols">
  <t>Strip certification and signature packets that (due to creation and
expiration time) are not relevant to the time of the signature
itself.  This ensures that the reduced certificate is
contemporaneously valid with the signature.</t>
  <t>Strip irrelevant subkeys (and associated Subkey Binding Signature
packets and cross-sigs).  If the signature was issued by a
signing-capable subkey, that subkey (and its binding signature and
cross-sig) are clearly relevant.  Other signing-capable subkeys are
likely to be irrelevant.  But determining which other subkeys are
relevant may be context-specific.  For example, in the e-mail
context, an encryption-capable subkey is likely to be contextually
relevant, because it enables the recipient to reply encrypted, and
therefore should not be stripped.</t>
  <t>Strip user IDs (and associated certifications) that are unlikely to
be relevant to the signature in question.  For example, in the
e-mail context, strip any user IDs that do not match the declared
sender of the message.</t>
  <t>Strip third-party certifications that are unlikely to be relevant
to the verifier.  Doing this successfully requires some knowledge
about what the third-parties the recipient is likely to care about.
Stripping all third-party certifications is a simple means of
certificate reduction. The verifier of such a certificate may need
to do certificate refresh against their preferred keystore to learn
about third-party certifications useful to them.</t>
</list></t>

</section>
</section>
<section anchor="certification-capable-subkeys"><name>Certification-capable Subkeys</name>

<t>Much of this discussion assumes that primary keys are the only
certification-capable keys in the OpenPGP ecosystem.  Some proposals
have been put forward that assume that subkeys can be marked as
certification-capable.  If subkeys are certification-capable, then
much of the reasoning in this draft becomes much more complex, as
subkeys themselves can be revoked by their primary key without
invalidating the key material itself.  That is, a subkey can be both
valid (in one context) and invalid (in another context) at the same
time.  So questions about what data can be dropped (e.g. in
<xref target="non-append-only"/>) are much fuzzier, and the underlying assumptions
may need to be reviewed.</t>

<t>If some OpenPGP implementations accept certification-capable subkeys,
but an abuse-resistant keystore does not accept certifications from
subkeys in general, then interactions between that keystore and those
implementations may be surprising.</t>

</section>
<section anchor="in-the-past"><name>Assessing Certificates in the Past</name>

<t>Online protocols like TLS perform signature and certificate evaluation
based entirely on the present time.  If a certificate that signs a TLS
handshake message is invalid now, it doesn't matter whether it was
valid a week ago, because the present TLS session is the context of
the evaluation.</t>

<t>But OpenPGP signatures are often evaluated at some temporal remove
from when the signature was made.  For example, software packages are
signed at release time, but those signatures are validated at download
time.  A verifier that does not already know the certificate that made
the signature will need to perform certificate discovery against some
set of keystores to find a certificate with which to check the
signature.</t>

<t>Further complicating matters, the composable nature of an OpenPGP
certificate means that the certificate associated with any particular
signing key (primary key or subkey) can transform over time.  So when
evaluating a signature that appears to have been made by a given
certificate, it may be better to try to evaluate the certificate at
the time the signature was made, rather than the present time.</t>

<section anchor="point-in-time"><name>Point-in-time Certificate Evaluation</name>

<t>When evaluating a certificate at a time T in the past (for example,
when trying to validate a data signature by that certificate that was
created at time T), one approach is to discard all packets from the
certificate if the packet has a creation time later than T.  Then
evaluate the resulting certificate from the remaining packets in the
context of time T.</t>

<t>However, any such evaluation MUST NOT ignore "hard" OpenPGP key
revocations, regardless of their creation date. (see <xref target="revocations"/>).</t>

</section>
<section anchor="verification-and-non-append-only"><name>Signature Verification and Non-append-only Keystores</name>

<t>If a non-append-only keystore (<xref target="non-append-only"/>) has dropped
superseded (<xref target="drop-superseded"/>) or expired (<xref target="drop-expired"/>)
certifications, it's possible for the certificate composed of the
remaining packets to have no valid first-party certification at the
time that a given signature was made.  If a user performs certificate
discovery against such a keystore, the certificate it retrieves would
be invalid according to <xref target="RFC4880"/>, and consequently verification of
any signature by that certificate would fail.</t>

<t>One simple mitigation to this problem is to ship a
contemporaneously-valid certificate in-band alongside the signature
(see <xref target="in-band-certificates"/>).</t>

<t>If the distributor does this, then the verifier need only learn about
revocations.  If knowledge about revocation is needed, the verifier
might perform a certificate refresh (not "certificate discovery")
against any preferred keystore, including non-append-only keystores,
merging what it learns into the in-band contemporary certificate.</t>

<t>Then the signature verifier can follow the certificate evaluation
process outlined in <xref target="point-in-time"/>, using the merged certificate.</t>

</section>
</section>
<section anchor="gaol"><name>Global Append-only Ledgers ("Blockchain")</name>

<t>The append-only aspect of some OpenPGP keystores encourages a user of
the keystore to rely on that keystore as a faithful reporter of
history, and one that will not misrepresent or hide the history that
they know about.  An unfaithful "append-only" keystore could abuse the
trust in a number of ways, including withholding revocation
certificates, offering different sets of certificates to different
clients doing certificate lookup, and so on.</t>

<t>However, the most widely used append-only OpenPGP keystore, the
<xref target="SKS"/> keyserver pool, offers no cryptographically verifiable
guarantees that it will actually remain append-only.  Users of the
pool have traditionally relied on its distributed nature, and the
presumption that coordination across a wide range of administrators
would make it difficult for the pool to reliably lie or omit
data. However, the endpoint most commonly used by clients to access
the network is <spanx style="verb">hkps://hkps.pool.sks-keyservers.net</spanx>, the default for
<xref target="GnuPG"/>.  That endpoint is increasingly consolidated, and currently
consists of hosts operated by only two distinct administrators,
increasing the risk of potential misuse.</t>

<t>Offering cryptographic assurances that a keystore could remain
append-only is an appealing prospect to defend against these kinds of
attack.  Many popular schemes for providing such assurances are known
as "blockchain" technologies, or global append-only ledgers.</t>

<t>With X.509 certificates, we have a semi-functional Certificate
Transparency (<xref target="RFC6962"/>, or "CT") ecosystem that is intended to
document and preserve evidence of (mis)issuance by well-known
certificate authorities (CAs), which implements a type of global
append-only ledger.  While the CT infrastructure remains vulnerable to
certain combinations of colluding actors, it has helped to identify
and sanction some failing CAs.</t>

<t>Like other global append-only ledgers, CT itself is primarily a
detection mechanism, and has no enforcement regime.  If a widely-used
CA were identified by certificate transparency to be untrustworthy,
the rest of the ecosystem still needs to figure out how to impose
sanctions or apply a remedy, which may or may not be possible.</t>

<t>CT also has privacy implications -- the certificates published in the
CT logs are visible to everyone, for the lifetime of the log.</t>

<t>For spam abatement, CT logs decline all X.509 certificates except
those issued by certain CAs (those in popular browser "root stores").
This is an example of the strategy outlined in <xref target="authorities"/>).</t>

<t>Additional projects that provide some aspects of global append-only
ledgers that try to address some of the concerns described here
include <xref target="KEY-TRANSPARENCY"/> and <xref target="CONIKS"/>, though they are not
specific to OpenPGP.  Both of these systems are dependent on servers
operated by identity providers, however.  And both offer the ability
to detect a misbehaving identity provider, but no specific enforcement
or recovery strategies against such an actor.</t>

<t>It's conceivable that a keystore could piggyback on the CT logs or
other blockchain/ledger mechanisms like <xref target="BITCOIN"/> to store
irrevocable pieces of data (such as revocation certificates).  Further
work is needed to describe how to do this in an effective and
performant way.</t>

</section>
<section anchor="identity-monitoring"><name>Certificate Lookup for Identity Monitoring</name>

<t>While certificate lookup is classically used to find a key to encrypt
an outbound message to, another use case for certificate lookup is for
the party in control of a particular identity to determine whether
anyone else is claiming that identity.</t>

<t>That is, a client in control of the secret key material associated
with a particular certificate with user ID X might search a keystore
for all certificates matching X in order to find out whether any other
certificates claim it.</t>

<t>This is an important safeguard as part of the ledger-based detection
mechanisms described in <xref target="gaol"/>, but may also be useful for keystores
in general.</t>

<t>However, identity monitoring against a keystore that does not defend
against user ID flooding (<xref target="user-id-flooding"/>) is expensive and
potentially of limited value.  In particular, a malicious actor with a
certificate which duplicates a given User ID could flood the keystore
with similar certificates, hiding whichever one is in malicious use.</t>

<t>Since such a keystore is not considered authoritative by any
reasonable client for the user ID in question, this attack forces the
identity-monitoring defender to spend arbitrary resources fetching and
evaluating each certificate in the flood, without knowing which
certificate other clients might be evaluating.</t>

</section>
</section>
<section anchor="openpgp-details"><name>OpenPGP details</name>

<t>This section collects details about common OpenPGP implementation
behavior that are useful in evaluating and reasoning about OpenPGP
certificates.</t>

<section anchor="revocations"><name>Revocations</name>

<t>It's useful to classify OpenPGP revocations of key material into two
categories: "soft" and "hard".</t>

<t>If the "Reason for Revocation" of an OpenPGP key is either "Key is
superseded" or "Key is retired and no longer used", it is a "soft"
revocation.</t>

<t>An implementation that interprets a "soft" revocation will typically
not invalidate signatures made by the associated key with a creation
date that predates the date of the soft revocation.  A "soft"
revocation in some ways behaves like a non-overridable expiration
date.</t>

<t>All other revocations of OpenPGP keys (with any other Reason for
Revocation, or with no Reason for Revocation at all) should be
considered "hard".</t>

<t>The presence of a "hard" revocation of an OpenPGP key indicates that
the user should reject all signatures and certifications made by that
key, regardless of the creation date of the signature.</t>

<t>Note that some OpenPGP implementations do not distinguish between
these two categories.</t>

<t>A defensive OpenPGP implementation that does not distinguish between
these two categories SHOULD treat all revocations as "hard".</t>

<t>An implementation aware of a "soft" revocation or of key or
certificate expiry at time T SHOULD accept and process a "hard"
revocation even if it appears to have been issued at a time later than
T.</t>

</section>
<section anchor="user-id-conventions"><name>User ID Conventions</name>

<t><xref target="RFC4880"/> requires a user ID to be a UTF-8 string, but does not
constrain it beyond that.  In practice, a handful of conventions
predominate in how User IDs are formed.</t>

<t>The most widespread convention is a <spanx style="verb">name-addr</spanx> as defined in
<xref target="RFC5322"/>.  For example:</t>

<figure><artwork><![CDATA[
Alice Jones <alice@example.org>
]]></artwork></figure>

<t>But a growing number of OpenPGP certificates contain user IDs that are
instead a raw <xref target="RFC5322"/> <spanx style="verb">addr-spec</spanx>, omitting the <spanx style="verb">display-name</spanx> and
the angle brackets entirely, like so:</t>

<figure><artwork><![CDATA[
alice@example.org
]]></artwork></figure>

<t>Some certificates have user IDs that are simply normal human names
(perhaps <spanx style="verb">display-name</spanx> in <xref target="RFC5322"/> jargon, though not necessarily
conforming to a specific ABNF).  For example:</t>

<figure><artwork><![CDATA[
Alice Jones
]]></artwork></figure>

<t>Still other certificates identify a particular network service by
scheme and hostname.  For example, the administrator of an ssh host
participating in the <xref target="MONKEYSPHERE"/> might choose a user ID for the
OpenPGP representing the host like so:</t>

<figure><artwork><![CDATA[
ssh://foo.example.net
]]></artwork></figure>

</section>
<section anchor="e-mail-address-canonicalization"><name>E-mail Address Canonicalization</name>

<t>When an OpenPGP user IDs includes an <spanx style="verb">addr-spec</spanx>, there still may be
multiple ways of representing the addr-spec that refer to the same
underlying mailbox.  Having a truly canonical form of an <spanx style="verb">addr-spec</spanx>
is probably impossible because of legacy deployments of mailservers
that do odd things with the local part, but e-mail addresses used in
an abuse-resistant ecosystem SHOULD be constrained enough to admit to
some sensible form of canonicalization.</t>

<section anchor="disallowing-non-utf-8-local-parts"><name>Disallowing Non-UTF-8 Local Parts</name>

<t>In <xref target="RFC5322"/>, the <spanx style="verb">local-part</spanx> can be any <spanx style="verb">dot-atom</spanx>.  But if this
is <xref target="RFC2047"/> decoded, it could be any arbitrary charset, not
necessarily UTF-8.  FIXME: Do we convert from the arbitrary charset to
UTF-8?</t>

</section>
<section anchor="domain-canonicalization"><name>Domain Canonicalization</name>

<t>FIXME: should domain name be canonicalized into punycode form?  User
IDs are typically user-facing, so i think the canonicalized form
should be the <xref target="UNICODE-NORMALIZATION"/> Form C (NFC) of the domain
name.  Can we punt to some other draft here?</t>

</section>
<section anchor="local-part-canonicalization"><name>Local Part Canonicalization</name>

<t>FIXME:  <xref target="I-D.koch-openpgp-webkey-service"/> recommends downcasing all
ASCII characters in the left-hand side, but leaves all</t>

</section>
</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document offers guidance on mitigating a range of
denial-of-service attacks on public keystores, so the entire document
is in effect about security considerations.</t>

<t>Many of the mitigations described here defend individual OpenPGP
certificates against flooding attacks (see <xref target="certificate-flooding"/>).
But only some of these mitigations defend against flooding attacks
against the keystore itself (see <xref target="keystore-flooding"/>), or against
flooding attacks on the space of possible user IDs (see
<xref target="user-id-flooding"/>).  Thoughtful threat modeling and monitoring of
the keystore and its defenses are probably necessary to maintain the
long-term health of the keystore.</t>

<t><xref target="designated-revoker"/> describes a potentially scary security problem
for designated revokers.</t>

<t>TODO (more security considerations)</t>

<section anchor="uploads-vs-lookup"><name>Tension Between Unrestricted Uploads and Certificate Lookup</name>

<t>Note that there is an inherent tension between accepting arbitrary
certificate uploads and permitting effective certificate lookup.
If a keystore accepts arbitrary certificate uploads for
redistribution, it appears to be vulnerable to user ID flooding
(<xref target="user-id-flooding"/>), which makes it difficult or impossible to rely
on for certificate lookup.</t>

<t>In the broader ecosystem, it may be necessary to use gated/controlled
certificate lookup mechanisms.  For example, both
<xref target="I-D.koch-openpgp-webkey-service"/> and <xref target="RFC7929"/> enable the
administrator of a DNS domain to distribute certificates associated
with e-mail addresses within that domain, while excluding other
parties.  As a rather different example, <xref target="I-D.mccain-keylist"/> offers
certificate lookup on the basis of interest -- a client interested in
an organization can use that mechanism to learn what certificates that
organization thinks are worth knowing about, associated with a range
of identities regardless of the particular DNS domain.  Note that
<xref target="I-D.mccain-keylist"/> does not provide the certificates directly, but
instead expects the client to be able to retrieve them by primary key
fingerprint through some other keystore capable of (and responsible
for) certificate refresh.</t>

</section>
</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<t>Keystores themselves raise a host of potential privacy concerns.
Additional privacy concerns are raised by traffic to and from the
keystores.  This section tries to outline some of the risks to the
privacy of people whose certificates are stored and redistributed in
public keystores, as well as risks to the privacy of people who make
use of the key stores for certificate lookup, certificate discovery,
or certificate refresh.</t>

<section anchor="publishing-identity-information"><name>Publishing Identity Information</name>

<t>Public OpenPGP keystores often distribute names or e-mail addresses of
people.  Some people do not want their names or e-mail addresses
distributed in a public keystore, or may change their minds about it
at some point.  Append-only keystores are particularly problematic in
that regard.  The mitigation in <xref target="only-revocation"/> can help such
users strip their details from keys that they control.  However, if an
OpenPGP certificate with their details is uploaded to a keystore, but
is not under their control, it's unclear what mechanisms can be used
to remove the certificate that couldn't also be exploited to take down
an otherwise valid certificate.</t>

<t>Some jurisdictions may present additional legal risk for keystore
operators that distribute names or e-mail addresses of non-consenting
parties.</t>

<t>Refresh-only keystores (<xref target="refresh-only"/>) and user ID redacting
keystores (<xref target="user-id-redacting"/>) may reduce this particular privacy
concern because they distribute no user IDs at all.</t>

</section>
<section anchor="social-graph"><name>Social Graph</name>

<t>Third-party certifications effectively map out some sort of social
graph.  A certification asserts a statement of belief by the issuer
that the real-world party identified by the user ID is in control of
the subject cryptographic key material.  But those connections may be
potentially sensitive, and some people may not want these maps built.</t>

<t>A first-party-only keyserver (<xref target="first-party-only"/>) avoids this
privacy concern because it distributes no third-party privacy concern.</t>

<t>First-party attested third-party certifications described in
<xref target="fpa3pc"/> are even more relevant edges in the social graph, because
their bidirectional nature suggests that both parties are aware of
each other, and see some value in mutual association.</t>

</section>
<section anchor="tracking-clients"><name>Tracking Clients by Queries</name>

<t>Even without third-party certifications, the acts of certificate
lookup, certificate discovery, and certificate refresh represent a
potential privacy risk, because the keystore queried gets to learn
which user IDs (in the case of lookup) or which certificates (in the
case of refresh or discovery) the client is interested in.  In the case
of certificate refresh, if a client attempts to refresh all of its known
certificates from the same keystore, that set is likely to be a unique
set, and therefore identifies the client.  A keystore that monitors
the set of queries it receives might be able to profile or track those
clients who use it repeatedly.</t>

<t>A privacy-aware client which wants to to avoid such a tracking attack
MAY try to perform certificate refresh from multiple different
keystores.  To hide network location, a client making a network query
to a keystore SHOULD use an anonymity network like <xref target="TOR"/>.  Tools
like <xref target="PARCIMONIE"/> are designed to facilitate this type of
certificate refresh.  Such a client SHOULD also decline to use protocol
features that permit linkability across interactions with the same
keystore, such as TLS session resumption, HTTP cookies, and so on.</t>

<t>Keystores which permit public access and want to protect the privacy
of their clients SHOULD NOT reject access from clients using <xref target="TOR"/>
or comparable anonymity networks.  Additionally, they SHOULD minimize
access logs they retain.</t>

<t>Alternately, some keystores may distribute their entire contents to
any interested client, in what can be seen as the most trivial form of
private information retrieval.  <xref target="DEBIAN-KEYRING"/> is one such
example; its contents are distributed as an operating system package.
Clients can interrogate their local copy of such a keystore without
exposing their queries to a third-party.</t>

</section>
<section anchor="validation-privacy"><name>"Live" Certificate Validation Leaks Client Activity</name>

<t>If a client relies on a keystore's certificate validation interface,
or on the presence of a certificate in a keystore as a part of its
validation calculations, it's unclear how long the assertion from the
keystore is or should be considered to hold.  One seemingly simple
approach is to simply query the keystore's validation interface each
time that the client needs to validate the certificate.</t>

<t>This "live" validation approach poses a quandary to the client in the
event that the keystore is unavailable.  How should in interpret the
"unknown" result?  In addition, live validation reveals the client's
activity to the keystore with fine precision.</t>

<t>A privacy-aware client that depends on keystores for certificate
validation SHOULD NOT perform "live" certificate validation on each
use it makes of the certificate.  Rather, it SHOULD cache the
validation information for some period of time and make use of the
cached copy where possible.  If such a client does a regular
certificate refresh from the same keystore, it SHOULD also
pre-emptively query the keystore for certificate validation at the
same time.</t>

<t>Choosing the appropriate time intervals for this kind of caching has
implications for the windows of risk for the client that might use a
revoked certificate.  Defining an appropriate schedule to make this
tradeoff is beyond the scope of this document.</t>

</section>
<section anchor="discovery-privacy"><name>Certificate Discovery Leaks Client Activity</name>

<t>The act of doing certificate discovery on unknown signatures offers a
colluding keystore and remote peer a chance to track a client's
consumption of a given signature.</t>

<t>An attacker with access to keystore logs could sign a message with a
unique key, and then watch the keystore activity to determine when a
client consumes the signature.  This is potentially a tracking or
"phone-home" situation.</t>

<t>A signer that has no interest in this particular form of tracking can
mitigate this concern by shipping their certificate in-band, alongside
the signature, as recommended in <xref target="in-band-certificates"/>.</t>

<t>A privacy-aware client MAY insist on in-band certificates by declining
to use any certificate discovery interface at all, and treat a bare
signature by an unknown certificate as an invalid signature.</t>

</section>
<section anchor="refresh-privacy"><name>Certificate Refresh Leaks Client Activity</name>

<t>The act of doing certificate refresh itself reveals some information
that the client is interested in a given certificate and how it may
have changed since the last time the client refreshed it, or since it
was first received by the client.</t>

<t>This is essentially the same privacy problem presented by OCSP
<xref target="RFC6960"/> in the X.509 world.  In the online world of TLS, this
privacy leak is mitigated by the CertificateStatus TLS handshake
extension (<xref target="RFC4366"/>), a.k.a. "OCSP stapling".  There is no
comparable solution for the store-and-forward or non-online scenarios
where OpenPGP is often found.</t>

<t>Privacy-aware clients MAY prefer to access refresh interfaces from
anonymity-preserving networks like <xref target="TOR"/> to obscure where they are
on the network, but if the certificate being refreshed is known to be
used only by a single client that may not help.</t>

<t>Privacy-aware clients MAY prefer to stage their certificate refreshes
over time, but longer delays imply greater windows of vulnerability
for use of an already-revoked certificate.  This strategy also does
not help when a previously-unknown certificate is encountered in-band
(see <xref target="in-band-certificates"/>), and the OpenPGP client wants to
evaluate it for use in the immediate context.</t>

</section>
<section anchor="distinct-keystore-interfaces-leak-client-context-and-intent"><name>Distinct Keystore Interfaces Leak Client Context and Intent</name>

<t>The distinct keystore interfaces documented in
<xref target="keystore-interfaces"/> offer subtly different semantics, and are
used by a reasonable keystore client at different times.  A keystore
that offers distinct discovery and refresh interfaces may infer that a
client visiting the refresh interface already knows about the
certificate in question, or that a client visiting the discovery
interface is in the process of verifying a signature from a
certificate it has not seen before.</t>

<t>HKP itself (<xref target="I-D.shaw-openpgp-hkp"/>) conflates these two interfaces
-- the same HKP query is be used to perform both discovery and refresh
(though implementations like <xref target="SKS"/> are not at all abuse-resistant
for either use), which may obscure the context and intent of the
client from the keystore somewhat.</t>

<t>A privacy-aware client that can afford the additional bandwidth and
complexity MAY use the keystore's discovery interface for both refresh
and discovery, since the discovery interface is a proper superset of
the refresh interface.</t>

</section>
<section anchor="cleartext-queries"><name>Cleartext Queries</name>

<t>If access to the keystore happens over observable channels (e.g.,
cleartext connections over the Internet), then a passive network
monitor could perform the same type profiling or tracking attack
against clients of the keystore described in <xref target="tracking-clients"/>.
Keystores which offer network access SHOULD provide encrypted
transport.</t>

</section>
<section anchor="traffic-analysis"><name>Traffic Analysis</name>

<t>Even if a keystore offers encrypted transport, the size of queries and
responses may provide effective identification of the specific
certificates fetched during lookup, discovery, or refresh, leaving open
the types of tracking attacks described in <xref target="tracking-clients"/>.
Clients of keystores SHOULD pad their queries to increase the size of
the anonymity set.  And keystores SHOULD pad their responses.</t>

<t>The appropriate size of padding to effectively anonymize traffic to
and from keystores is likely to be mechanism- and cohort-specific.
For example, padding for keystores accessed via the DNS (<xref target="RFC7929"/>
may use different padding strategies that padding for keystores
accessed over WKD (<xref target="I-D.koch-openpgp-webkey-service"/>), which may in
turn be different from keystores accessed over HKPS
(<xref target="I-D.shaw-openpgp-hkp"/>).  A keystore which only accepts user IDs
within a specific domain (e.g., <xref target="scoped-user-ids"/>) or which uses
custom process (<xref target="exterior-process"/>) for verification might have
different padding criteria than a keystore that serves the general
public.</t>

<t>Specific padding policies or mechanisms are out of scope for this
document.</t>

</section>
</section>
<section anchor="user-considerations"><name>User Considerations</name>

<t><xref target="client-interactions"/> describes some outstanding work that needs to
be done to help users understand how to produce and distribute a
third-party-certified OpenPGP certificate to an abuse-resistant
keystore.</t>

<t>Additionally, some keystores present directly user-facing affordances.
For example, <xref target="SKS"/> keyservers typically offer forms and listings
that can be viewed directly in a web browser.  Such a keystore SHOULD
be as clear as possible about what abuse mitigations it takes (or does
not take), to avoid user confusion.</t>

<t>Keystores which do not expect to be used directly as part of a
certificate validation calculation SHOULD advise clients as explicitly
as possible that they offer no assertions of validity.</t>

<t>Experience with the <xref target="SKS"/> keyserver network shows that many users
treat the keyserver web interfaces as authoritative.  That is, users
act as though the keyserver network offers some type of certificate
validation.  Unfortunately, The developer and implementor communities
explicitly disavow any authoritative role in the ecosystem, and the
implementations attempt very few mitigations against abuse, permitting
redistribution of even cryptographically invalid OpenPGP packets.
Clearer warnings to end users might reduce this kind of misperception.
Or the community could encourage the removal of frequently
misinterpreted user interfaces entirely.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document asks IANA to register two entries in the OpenPGP
Notation IETF namespace, both with a reference to this document:</t>

<t><list style="symbols">
  <t>the "uidhash" notation is defined in <xref target="uidhash"/>.</t>
</list></t>

<section anchor="document-history"><name>Document History</name>

<t>substantive changes bewteen -04 and -05:</t>

<t><list style="symbols">
  <t>Clarify distinctions between different signature types</t>
  <t>Point to Attested Certifications proposal</t>
  <t>Formatting changes: use xml2rfc v3, publish editor's copy</t>
</list></t>

<t>substantive changes bewteen -03 and -04:</t>

<t><list style="symbols">
  <t>change "certificate update" to "certificate refresh" for clarity</t>
  <t>relax first-party-attested third-party certification constraints
at the suggestion of Valodim</t>
  <t>introduce "primary key sovereignty" concept explicitly</t>
  <t>describe how to distribute and consume attestation revocations</t>
  <t>introduce augmentation to TPK for third-party certification revocation
distribution</t>
</list></t>

<t>substantive changes between -02 and -03:</t>

<t><list style="symbols">
  <t>new sections:
  <list style="symbols">
      <t>Keystore Interfaces</t>
      <t>Keystore Client Best Practices</t>
      <t>Certificate Generation and Management Best Practices</t>
    </list></t>
  <t>rename "certificate discovery" to "certificate lookup"</t>
  <t>redefine "certificate discovery" to refer to lookup by signing (sub)key</t>
  <t>new attack: fingerprint flooding</t>
  <t>new retrieval-time mitigations -- tighter filters on discovery and update</t>
  <t>recommend in-band certificates where possible to avoid discovery and lookup</t>
  <t>new privacy considerations:
  <list style="symbols">
      <t>distinct keystore interfaces</t>
      <t>certificate update</t>
      <t>certificate discovery</t>
      <t>certificate validation</t>
    </list></t>
  <t>more nuance about unhashed subpacket filtering</t>
</list></t>

<t>substantive changes between -01 and -02:</t>

<t><list style="symbols">
  <t>distinguish different forms of flooding attack</t>
  <t>distinguish toxic data as distinct from flooding</t>
  <t>retrieval-time mitigations</t>
  <t>user ID redaction</t>
  <t>references to related work (CT, keylist, CONIKS, key transparency,
ledgers/"blockchain", etc)</t>
  <t>more details about UI/UX</t>
</list></t>

<t>substantive changes between -00 and -01:</t>

<t><list style="symbols">
  <t>split out Contextual and Non-Append-Only mitigations</t>
  <t>documented several other mitigations, including:
  <list style="symbols">
      <t>Decline Data From the Future</t>
      <t>Blocklist</t>
      <t>Exterior Process</t>
      <t>Designated Authorities</t>
      <t>Known Certificates</t>
      <t>Rate-Limiting</t>
      <t>Scoped User IDs</t>
    </list></t>
  <t>documented Updates-Only Keystores</t>
  <t>consider three different kinds of flooding</t>
  <t>deeper discussion of privacy considerations</t>
  <t>better documentation of Reason for Revocation</t>
  <t>document user ID conventions</t>
</list></t>

</section>
</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>This document is the result of years of operational experience and
observation, as well as conversations with many different people --
users, implementors, keystore operators, etc.  A non-exhaustive list
of people who have contributed ideas or nuance to this document
specifically includes:</t>

<t><list style="symbols">
  <t>Antoine Beaupré</t>
  <t>Heiko Stamer</t>
  <t>ilf</t>
  <t>Jamie McClelland</t>
  <t>Jon Callas</t>
  <t>Jonathan McDowell</t>
  <t>Justus Winter</t>
  <t>Marcus Brinkmann</t>
  <t>Micah Lee</t>
  <t>Neal Walfield</t>
  <t>Phil Pennock</t>
  <t>Philihp Busby</t>
  <t>vedaal</t>
  <t>Vincent Breitmoser</t>
  <t>Wiktor Kwapisiewicz</t>
</list></t>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC2047' target='https://www.rfc-editor.org/info/rfc2047'>
<front>
<title>MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text</title>
<author fullname='K. Moore' initials='K.' surname='Moore'><organization/></author>
<date month='November' year='1996'/>
<abstract><t>This particular document is the third document in the series.  It describes extensions to RFC 822 to allow non-US-ASCII text data in Internet mail header fields.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2047'/>
<seriesInfo name='DOI' value='10.17487/RFC2047'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC4880' target='https://www.rfc-editor.org/info/rfc4880'>
<front>
<title>OpenPGP Message Format</title>
<author fullname='J. Callas' initials='J.' surname='Callas'><organization/></author>
<author fullname='L. Donnerhacke' initials='L.' surname='Donnerhacke'><organization/></author>
<author fullname='H. Finney' initials='H.' surname='Finney'><organization/></author>
<author fullname='D. Shaw' initials='D.' surname='Shaw'><organization/></author>
<author fullname='R. Thayer' initials='R.' surname='Thayer'><organization/></author>
<date month='November' year='2007'/>
<abstract><t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format.  It is not a step-by-step cookbook for writing an application.  It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network.  It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.</t><t>OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage.  These services include confidentiality, key management, authentication, and digital signatures.  This document specifies the message formats used in OpenPGP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4880'/>
<seriesInfo name='DOI' value='10.17487/RFC4880'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>


<reference anchor='I-D.ietf-openpgp-rfc4880bis'>
   <front>
      <title>OpenPGP Message Format</title>
      <author fullname='Werner Koch'>
	 <organization>GnuPG e.V.</organization>
      </author>
      <author fullname='brian m. carlson'>
	 </author>
      <author fullname='Ronald Henry Tse'>
	 <organization>Ribose</organization>
      </author>
      <author fullname='Derek Atkins'>
	 </author>
      <author fullname='Daniel Kahn Gillmor'>
	 </author>
      <date day='31' month='August' year='2020'/>
      <abstract>
	 <t>   { Work in progress to update the OpenPGP specification from RFC4880 }

   This document specifies the message formats used in OpenPGP.  OpenPGP
   provides encryption with public-key or symmetric cryptographic
   algorithms, digital signatures, compression and key management.

   This document is maintained in order to publish all necessary
   information needed to develop interoperable applications based on the
   OpenPGP format.  It is not a step-by-step cookbook for writing an
   application.  It describes only the format and methods needed to
   read, check, generate, and write conforming packets crossing any
   network.  It does not deal with storage and implementation questions.
   It does, however, discuss implementation issues necessary to avoid
   security flaws.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-openpgp-rfc4880bis-10'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-openpgp-rfc4880bis-10.txt' type='TXT'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC4366' target='https://www.rfc-editor.org/info/rfc4366'>
<front>
<title>Transport Layer Security (TLS) Extensions</title>
<author fullname='S. Blake-Wilson' initials='S.' surname='Blake-Wilson'><organization/></author>
<author fullname='M. Nystrom' initials='M.' surname='Nystrom'><organization/></author>
<author fullname='D. Hopwood' initials='D.' surname='Hopwood'><organization/></author>
<author fullname='J. Mikkelsen' initials='J.' surname='Mikkelsen'><organization/></author>
<author fullname='T. Wright' initials='T.' surname='Wright'><organization/></author>
<date month='April' year='2006'/>
<abstract><t>This document describes extensions that may be used to add functionality to Transport Layer Security (TLS).  It provides both generic extension mechanisms for the TLS handshake client and server hellos, and specific extensions using these generic mechanisms.</t><t>The extensions may be used by TLS clients and servers.  The extensions are backwards compatible: communication is possible between TLS clients that support the extensions and TLS servers that do not support the extensions, and vice versa.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4366'/>
<seriesInfo name='DOI' value='10.17487/RFC4366'/>
</reference>



<reference anchor='RFC5322' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='RFC6960' target='https://www.rfc-editor.org/info/rfc6960'>
<front>
<title>X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP</title>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='M. Myers' initials='M.' surname='Myers'><organization/></author>
<author fullname='R. Ankney' initials='R.' surname='Ankney'><organization/></author>
<author fullname='A. Malpani' initials='A.' surname='Malpani'><organization/></author>
<author fullname='S. Galperin' initials='S.' surname='Galperin'><organization/></author>
<author fullname='C. Adams' initials='C.' surname='Adams'><organization/></author>
<date month='June' year='2013'/>
<abstract><t>This document specifies a protocol useful in determining the current status of a digital certificate without requiring Certificate Revocation Lists (CRLs). Additional mechanisms addressing PKIX operational requirements are specified in separate documents.  This document obsoletes RFCs 2560 and 6277.  It also updates RFC 5912.</t></abstract>
</front>
<seriesInfo name='RFC' value='6960'/>
<seriesInfo name='DOI' value='10.17487/RFC6960'/>
</reference>



<reference anchor='RFC6962' target='https://www.rfc-editor.org/info/rfc6962'>
<front>
<title>Certificate Transparency</title>
<author fullname='B. Laurie' initials='B.' surname='Laurie'><organization/></author>
<author fullname='A. Langley' initials='A.' surname='Langley'><organization/></author>
<author fullname='E. Kasper' initials='E.' surname='Kasper'><organization/></author>
<date month='June' year='2013'/>
<abstract><t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves.  The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t><t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t></abstract>
</front>
<seriesInfo name='RFC' value='6962'/>
<seriesInfo name='DOI' value='10.17487/RFC6962'/>
</reference>



<reference anchor='RFC7929' target='https://www.rfc-editor.org/info/rfc7929'>
<front>
<title>DNS-Based Authentication of Named Entities (DANE) Bindings for OpenPGP</title>
<author fullname='P. Wouters' initials='P.' surname='Wouters'><organization/></author>
<date month='August' year='2016'/>
<abstract><t>OpenPGP is a message format for email (and file) encryption that lacks a standardized lookup mechanism to securely obtain OpenPGP public keys.  DNS-Based Authentication of Named Entities (DANE) is a method for publishing public keys in DNS.  This document specifies a DANE method for publishing and locating OpenPGP public keys in DNS for a specific email address using a new OPENPGPKEY DNS resource record.  Security is provided via Secure DNS, however the OPENPGPKEY record is not a replacement for verification of authenticity via the &quot;web of trust&quot; or manual verification.  The OPENPGPKEY record can be used to encrypt an email that would otherwise have to be sent unencrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7929'/>
<seriesInfo name='DOI' value='10.17487/RFC7929'/>
</reference>


<reference anchor='I-D.shaw-openpgp-hkp'>
   <front>
      <title>The OpenPGP HTTP Keyserver Protocol (HKP)</title>
      <author fullname='David Shaw' initials='D.' surname='Shaw'>
         <organization>Jabberwocky Tech</organization>
      </author>
      <date day='20' month='March' year='2003'/>
      <abstract>
	 <t>This document specifies a series of conventions to implement an
OpenPGP keyserver using the Hypertext Transfer Protocol (HTTP).  As
this document is a codification and extension of a protocol that is
already in wide use, strict attention is paid to backward
compatibility with these existing implementations.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-shaw-openpgp-hkp-00'/>
   <format target='https://www.ietf.org/archive/id/draft-shaw-openpgp-hkp-00.txt' type='TXT'/>
</reference>


<reference anchor='I-D.koch-openpgp-webkey-service'>
   <front>
      <title>OpenPGP Web Key Directory</title>
      <author fullname='Werner Koch'>
	 <organization>GnuPG e.V.</organization>
      </author>
      <date day='14' month='November' year='2021'/>
      <abstract>
	 <t>   This specification describes a service to locate OpenPGP keys by mail
   address using a Web service and the HTTPS protocol.  It also provides
   a method for secure communication between the key owner and the mail
   provider to publish and revoke the public key.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-koch-openpgp-webkey-service-13'/>
   <format target='https://www.ietf.org/archive/id/draft-koch-openpgp-webkey-service-13.txt' type='TXT'/>
</reference>


<reference anchor='I-D.mccain-keylist'>
   <front>
      <title>Distributing OpenPGP Key Fingerprints with Signed Keylist Subscriptions</title>
      <author fullname='R. Miles McCain'>
	 <organization>First Look Media</organization>
      </author>
      <author fullname='Micah Lee'>
	 <organization>The Intercept</organization>
      </author>
      <author fullname='Nat Welch'>
	 <organization>Google</organization>
      </author>
      <date day='2' month='September' year='2019'/>
      <abstract>
	 <t>   This document specifies a system by which an OpenPGP client may
   subscribe to an organization&#39;s public keylist to keep its keystore
   up-to-date with correct keys from the correct keyserver(s), even in
   cases where the keys correspond to multiple (potentially
   uncontrolled) domains.  Ensuring that all members or followers of an
   organization have their colleagues&#39; most recent PGP public keys is
   critical to maintaining operational security.  Without the most
   recent keys&#39; fingerprints and a source of trust for those keys (as
   this document specifies), users must manually update and sign each
   others&#39; keys -- a system that is untenable in larger organizations.
   This document proposes a experimental format for the keylist file as
   well as requirements for clients who wish to implement this
   experimental keylist subscription functionality.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-mccain-keylist-05'/>
   <format target='https://www.ietf.org/archive/id/draft-mccain-keylist-05.txt' type='TXT'/>
</reference>


<reference anchor="SKS" target="https://bitbucket.org/skskeyserver/sks-keyserver/wiki/Home">
  <front>
    <title>SKS Keyserver Documentation</title>
    <author initials="Y." surname="Minsky" fullname="Yaron Minsky">
      <organization>SKS development team</organization>
    </author>
    <author initials="K." surname="Fiskerstrand" fullname="Kristian Fiskerstrand">
      <organization>sks-keyservers.net pool operator</organization>
    </author>
    <author initials="P." surname="Pennock" fullname="Phil Pennock">
      <organization></organization>
    </author>
    <date year="2018" month="March" day="25"/>
  </front>
</reference>
<reference anchor="GnuPG" target="https://www.gnupg.org/documentation/manuals/gnupg.pdf">
  <front>
    <title>Using the GNU Privacy Guard</title>
    <author initials="W." surname="Koch" fullname="Werner Koch">
      <organization>GnuPG development team</organization>
    </author>
    <date year="2019" month="April" day="04"/>
  </front>
</reference>
<reference anchor="MAILVELOPE-KEYSERVER" target="https://github.com/mailvelope/keyserver/">
  <front>
    <title>Mailvelope Keyserver</title>
    <author initials="T." surname="Oberndörfer" fullname="Thomas Oberndörfer">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="AUTOCRYPT" target="https://autocrypt.org/">
  <front>
    <title>Autocrypt - Convenient End-to-End Encryption for E-Mail</title>
    <author initials="V." surname="Breitmoser" fullname="Vincent Breitmoser">
      <organization></organization>
    </author>
    <author initials="H." surname="Krekel" fullname="Holger Krekel">
      <organization></organization>
    </author>
    <author initials="D. K." surname="Gillmor" fullname="Daniel Kahn Gillmor">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DEBIAN-KEYRING" target="https://keyring.debian.org/">
  <front>
    <title>Debian Keyring</title>
    <author initials="J." surname="McDowell" fullname="Jonathan McDowell">
      <organization>Debian</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="TOR" target="https://www.torproject.org/">
  <front>
    <title>The Tor Project</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="PARCIMONIE" target="https://gaffer.ptitcanardnoir.org/intrigeri/code/parcimonie/">
  <front>
    <title>Parcimonie</title>
    <author initials="" surname="Intrigeri" fullname="Intrigeri">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="PGP-GLOBAL-DIRECTORY" target="https://keyserver.pgp.com/vkd/VKDVerificationPGPCom.html">
  <front>
    <title>PGP Global Directory Key Verification Policy</title>
    <author >
      <organization>Symantec Corporation</organization>
    </author>
    <date year="2011"/>
  </front>
</reference>
<reference anchor="MONKEYSPHERE" target="https://web.monkeysphere.info/">
  <front>
    <title>Monkeysphere</title>
    <author initials="D. K." surname="Gillmor" fullname="Daniel Kahn Gillmor">
      <organization></organization>
    </author>
    <author initials="J." surname="Rollins" fullname="Jameson Rollins">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="KEY-TRANSPARENCY" target="https://keytransparency.org/">
  <front>
    <title>Key Transparency, a transparent and secure way to look up public keys</title>
    <author initials="G." surname="Belvin" fullname="Gary Belvin">
      <organization>Google</organization>
    </author>
    <author initials="R." surname="Hurst" fullname="Ryan Hurst">
      <organization>Google</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="CONIKS" target="https://coniks.cs.princeton.edu/">
  <front>
    <title>CONIKS Key Management System</title>
    <author initials="E." surname="Felten" fullname="Edward Felten">
      <organization>Princeton University</organization>
    </author>
    <author initials="M." surname="Freedman" fullname="Michael Freedman">
      <organization>Princeton University</organization>
    </author>
    <author initials="M." surname="Melara" fullname="Marcela Melara">
      <organization>Princeton University</organization>
    </author>
    <author initials="A." surname="Blankstein" fullname="Aaron Blankstein">
      <organization>Princeton University</organization>
    </author>
    <author initials="J." surname="Bonneau" fullname="Joseph Bonneau">
      <organization>Stanford University/Electronic Frontier Foundation</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="BITCOIN" target="https://bitcoin.org/">
  <front>
    <title>Bitcoin</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="UNICODE-NORMALIZATION" target="https://unicode.org/reports/tr15/">
  <front>
    <title>Unicode Normalization Forms</title>
    <author initials="K." surname="Whistler" fullname="Ken Whistler">
      <organization>Unicode Consortium</organization>
    </author>
    <date year="2019" month="February" day="04"/>
  </front>
</reference>
<reference anchor="Attested-Certifications" target="https://gitlab.com/openpgp-wg/rfc4880bis/merge_requests/20">
  <front>
    <title>Documentation of the Attested Certifications subpacket</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

