<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.14 (Ruby 3.3.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-gallagher-openpgp-media-types-00" category="info" submissionType="IETF" updates="3156" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Media Types for OpenPGP</title>

    <author fullname="Andrew Gallagher">
      <organization>PGPKeys.EU</organization>
      <address>
        <email>andrewg@andrewg.com</email>
      </address>
    </author>

    <date year="2025" month="August" day="08"/>

    <area>int</area>
    <workgroup>openpgp</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 38?>

<t>This document updates the specification of existing media types, and specifies additional media types, for the identification of OpenPGP data in non-MIME contexts.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://andrewgdotcom.gitlab.io/openpgp-media-types"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-gallagher-openpgp-media-types/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        OpenPGP Working Group mailing list (<eref target="mailto:openpgp@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/openpgp/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/openpgp/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/andrewgdotcom/openpgp-media-types"/>.</t>
    </note>


  </front>

  <middle>


<?line 42?>

<section anchor="introduction"><name>Introduction</name>

<t><xref target="RFC3156"></xref> specifies media types for use in multipart MIME messages (<xref target="RFC1847"></xref>), but these are not sufficient for use in other contexts, such as web-based APIs.
Valid OpenPGP data formats that are not supported by the currently-specified media types include:</t>

<t><list style="symbols">
  <t>non-ASCII-armored data</t>
  <t>non-MIME signed or encrypted messages</t>
  <t>Transferable Secret Keys</t>
</list></t>

<t>We wish to define media types to cover all valid OpenPGP data formats, so that they can be accurately represented in applications that rely on media types for content identification, such as web-based APIs.</t>

</section>
<section anchor="conventions-definitions"><name>Conventions and Definitions</name>

<t>The term "OpenPGP Certificate" is used in this document interchangeably with "OpenPGP Transferable Public Key", as defined in <xref section="10.1" sectionFormat="of" target="RFC9580"/>.</t>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="existing-media-types"><name>Existing Media Types</name>

<t><xref target="RFC3156"></xref> specifies the following media types:</t>

<texttable title="Existing OpenPGP Media Types" anchor="existing-openpgp-media-types">
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Extension</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>application/pgp-encrypted</c>
      <c>(none)</c>
      <c>The "control part" of a multipart/encrypted OpenPGP message</c>
      <c>application/pgp-signature</c>
      <c>asc, sig.</c>
      <c>An ASCII-armored OpenPGP signature packet</c>
      <c>application/pgp-keys</c>
      <c>asc</c>
      <c>An ASCII-armored sequence of one or more OpenPGP Transferable Public Keys</c>
</texttable>

<t>The <spanx style="verb">application/pgp-encrypted</spanx> media type does not directly represent an OpenPGP data format, but the plaintext "control part" of an enclosing <spanx style="verb">multipart/encrypted</spanx> MIME part -- the encrypted message part uses the <spanx style="verb">application/octet-stream</spanx> media type instead.
It is therefore of little use outside the confines of a <spanx style="verb">multipart/encrypted</spanx> MIME part.</t>

<t>The other two media types identify ASCII-armored OpenPGP data formats, and are in general use.
For example, many keyservers serve OpenPGP certificates using an HTTP response with the content type <spanx style="verb">application/pgp-keys</spanx>.</t>

<section anchor="updates-to-existing-media-types"><name>Updates to Existing Media Types</name>

<t>It is established (but currently unspecified) practice for web APIs to serve v4 detached revocation signatures (<xref section="10.1.3" sectionFormat="of" target="RFC9580"/>) in the same packet sequence as OpenPGP certificates, e.g. in <xref target="I-D.gallagher-openpgp-hkp"></xref> and <xref target="I-D.koch-openpgp-webkey-service"></xref>.</t>

<t>The specification of <spanx style="verb">application/pgp-keys</spanx> is hereby extended to allow zero or more v4 detached revocations to precede any certificates in the OpenPGP packet sequence.</t>

</section>
</section>
<section anchor="new-media-types"><name>New Media Types</name>

<t>The following media types are hereby specified:</t>

<texttable title="New OpenPGP Media Types" anchor="new-openpgp-media-types">
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Extension</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>application/pgp-secret-keys</c>
      <c>asc</c>
      <c>An ASCII-armored sequence of one or more OpenPGP Transferable Secret Keys</c>
      <c>application/pgp-message</c>
      <c>asc</c>
      <c>An ASCII-armored OpenPGP message (<xref section="6.2" sectionFormat="of" target="RFC9580"/>)</c>
</texttable>

<t>As these are all ASCII-armored formats by default, they share the <spanx style="verb">.asc</spanx> file extension.</t>

</section>
<section anchor="new-media-type-parameters"><name>New Media Type Parameters</name>

<t>OpenPGP does not require the use of ASCII armor.
Encoding and decoding ASCII armor in binary-safe contexts (such as HTTP) is therefore wasteful.</t>

<t>To accurately indicate the use of OpenPGP's native binary wire format, we specify optional parameters (<xref section="5" sectionFormat="of" target="RFC2045"/>) for all the OpenPGP media types, with the exception of <spanx style="verb">application/pgp-encrypted</spanx>.
OpenPGP media type parameters <bcp14>MUST NOT</bcp14> be used with the <spanx style="verb">application/pgp-encrypted</spanx> media type.</t>

<texttable title="OpenPGP Media Type Parameters" anchor="openpgp-media-type-parameters">
      <ttcol align='left'>Parameter</ttcol>
      <ttcol align='left'>Optional</ttcol>
      <ttcol align='left'>Default value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>armor</c>
      <c>yes</c>
      <c>true</c>
      <c>Whether the OpenPGP packet sequence is ASCII-armored</c>
</texttable>

<t>The <spanx style="verb">armor</spanx> parameter has the following allowed values:</t>

<texttable title="OpenPGP Armor Parameter Values" anchor="openpgp-armor-parameter-values">
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Extension</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>true</c>
      <c>asc, sig</c>
      <c>An armored OpenPGP packet sequence</c>
      <c>false</c>
      <c>pgp</c>
      <c>An un-armored OpenPGP packet sequence</c>
</texttable>

<t>For OpenPGP media types, <spanx style="verb">armor=false</spanx> indicates that ASCII armor has NOT been applied to the binary wire format.
The <spanx style="verb">.asc</spanx> and <spanx style="verb">.pgp</spanx> file extensions correspond the value of the <spanx style="verb">armor</spanx> parameter, but are otherwise shared between the various OpenPGP media types.</t>

<t>To ensure backwards compatibility with existing implementations:</t>

<t><list style="symbols">
  <t>the absence of an <spanx style="verb">armor</spanx> parameter implies <spanx style="verb">armor=true</spanx>.</t>
  <t>the exceptional use of the <spanx style="verb">sig</spanx> extension for an ASCII-armored detached signature is retained.</t>
</list></t>

</section>
<section anchor="media-type-suffixes"><name>Guidance for the Future Specification of Media Type Suffixes</name>

<t>No media type suffixes are currently specified for any OpenPGP media type, however future documents may do so.
For example, one such document could specify an <spanx style="verb">application/pgp-keys+json</spanx> format where the packet sequence has been parsed into an abstract syntax tree that is then represented by JSON object structure.
(This is not a purely theoretical question, as such a JSON format is already implemented by some applications, for example the <xref target="Hockeypuck"></xref> keyserver.)</t>

<t>Any suffixed media type uses the data encoding specified for the suffix.
The <spanx style="verb">armor</spanx> parameter <bcp14>MUST NOT</bcp14> be used in combination with any suffixed OpenPGP media type, since ASCII-armor is only specified in relation to the native OpenPGP wire format.</t>

</section>
<section anchor="implementers"><name>Guidance for Implementers</name>

<t>It is <bcp14>RECOMMENDED</bcp14> that new applications in binary-safe contexts, such as web APIs, use <spanx style="verb">armor=false</spanx>.</t>

<t>ASCII-armor <bcp14>SHOULD</bcp14> continue to be used in 7-bit contexts, such as email.
An explicit <spanx style="verb">armor=true</spanx> parameter <bcp14>SHOULD NOT</bcp14> be added to existing applications, to preserve backwards compatibility, but <bcp14>SHOULD</bcp14> be used in new applications.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The first octet of un-armored OpenPGP data always has the high bit set, therefore the 7-bit clean text of ASCII armor cannot be misinterpreted as the start of an un-armored OpenPGP packet sequence.
The <spanx style="verb">armor</spanx> parameter is therefore highly indicative but not essential for correct parsing of an OpenPGP packet sequence.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA is requested to register the following new templates in the "Media Types" registry, where <spanx style="verb">((THIS DOCUMENT))</spanx> should be replaced by the RFC number of this document:</t>

<t><list style="symbols">
  <t>application/pgp-secret-keys:</t>
</list></t>

<figure><artwork><![CDATA[
MIME media type name: application
MIME subtype name: pgp-secret-keys
Required parameters: none
Optional parameters: armor

Encoding considerations:

   The content of this media type consists of 7bit text if the `armor` parameter does not have the value `false`.

Security considerations:

   See RFC 9580 Section 13.

Interoperability considerations: none

Published specification:

   RFC9580 and ((THIS DOCUMENT)).

Additional information:

   Magic number(s): none
   File extension(s): asc, pgp
   Macintosh File Type Code(s): none

Person & email address to contact for further information:

   Andrew Gallagher
   Email: andrewg&andrewg.com

Intended usage: common

Author/Change controller:

   Andrew Gallagher
   Email: andrewg&andrewg.com
]]></artwork></figure>

<t><list style="symbols">
  <t>application/pgp-message:</t>
</list></t>

<figure><artwork><![CDATA[
MIME media type name: application
MIME subtype name: pgp-message
Required parameters: none
Optional parameters: armor

Encoding considerations:

   The content of this media type consists of 7bit text if the `armor` parameter does not have the value `false`.

Security considerations:

   See RFC 9580 Section 13.

Interoperability considerations: none

Published specification:

   RFC 9580 and ((THIS DOCUMENT)).

Additional information:

   Magic number(s): none
   File extension(s): asc, pgp
   Macintosh File Type Code(s): none

Person & email address to contact for further information:

   Andrew Gallagher
   Email: andrewg&andrewg.com

Intended usage: common

Author/Change controller:

   Andrew Gallagher
   Email: andrewg&andrewg.com
]]></artwork></figure>

<t>IANA is also requested to update the following existing templates in the "Media Types" registry, where <spanx style="verb">((THIS DOCUMENT))</spanx> should be replaced by the RFC number of this document:</t>

<t><list style="symbols">
  <t>application/pgp-signature:</t>
</list></t>

<figure><artwork><![CDATA[
MIME media type name: application
MIME subtype name: pgp-signature
Required parameters: none
Optional parameters: armor

Encoding considerations:

   The content of this media type consists of 7bit text if the `armor` parameter does not have the value `false`.

Security considerations:

   See RFC 9580 Section 13.

Interoperability considerations: none

Published specification:

   RFC9580, RFC 3156, and ((THIS DOCUMENT)).

Additional information:

   Magic number(s): none
   File extension(s): asc, sig, pgp
   Macintosh File Type Code(s): pgDS

Person & email address to contact for further information:

   Andrew Gallagher
   Email: andrewg&andrewg.com

Intended usage: common

Author/Change controller:

   Andrew Gallagher
   Email: andrewg&andrewg.com
]]></artwork></figure>

<t><list style="symbols">
  <t>application/pgp-keys:</t>
</list></t>

<figure><artwork><![CDATA[
MIME media type name: application
MIME subtype name: pgp-keys
Required parameters: none
Optional parameters: armor

Encoding considerations:

   The content of this media type consists of 7bit text if the `armor` parameter does not have the value `false`.

Security considerations:

   See RFC 9580 Section 13.

Interoperability considerations: none

Published specification:

   RFC 9580, RFC 3156, and ((THIS DOCUMENT)).

Additional information:

   Magic number(s): none
   File extension(s): asc, pgp
   Macintosh File Type Code(s): none

Person & email address to contact for further information:

   Andrew Gallagher
   Email: andrewg&andrewg.com

Intended usage: common

Author/Change controller:

   Andrew Gallagher
   Email: andrewg&andrewg.com
]]></artwork></figure>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2045">
  <front>
    <title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
    <author fullname="N. Freed" initials="N." surname="Freed"/>
    <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
    <date month="November" year="1996"/>
    <abstract>
      <t>This initial document specifies the various headers used to describe the structure of MIME messages. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2045"/>
  <seriesInfo name="DOI" value="10.17487/RFC2045"/>
</reference>
<reference anchor="RFC3156">
  <front>
    <title>MIME Security with OpenPGP</title>
    <author fullname="M. Elkins" initials="M." surname="Elkins"/>
    <author fullname="D. Del Torto" initials="D." surname="Del Torto"/>
    <author fullname="R. Levien" initials="R." surname="Levien"/>
    <author fullname="T. Roessler" initials="T." surname="Roessler"/>
    <date month="August" year="2001"/>
    <abstract>
      <t>This document describes how the OpenPGP Message Format can be used to provide privacy and authentication using the Multipurpose Internet Mail Extensions (MIME) security content types described in RFC 1847. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3156"/>
  <seriesInfo name="DOI" value="10.17487/RFC3156"/>
</reference>
<reference anchor="RFC6838">
  <front>
    <title>Media Type Specifications and Registration Procedures</title>
    <author fullname="N. Freed" initials="N." surname="Freed"/>
    <author fullname="J. Klensin" initials="J." surname="Klensin"/>
    <author fullname="T. Hansen" initials="T." surname="Hansen"/>
    <date month="January" year="2013"/>
    <abstract>
      <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="13"/>
  <seriesInfo name="RFC" value="6838"/>
  <seriesInfo name="DOI" value="10.17487/RFC6838"/>
</reference>
<reference anchor="RFC9580">
  <front>
    <title>OpenPGP</title>
    <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
    <author fullname="D. Huigens" initials="D." surname="Huigens"/>
    <author fullname="J. Winter" initials="J." surname="Winter"/>
    <author fullname="Y. Niibe" initials="Y." surname="Niibe"/>
    <date month="July" year="2024"/>
    <abstract>
      <t>This document specifies the message formats used in OpenPGP. OpenPGP provides encryption with public key or symmetric cryptographic algorithms, digital signatures, compression, and key management.</t>
      <t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format. It is not a step-by-step cookbook for writing an application. It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network. It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.</t>
      <t>This document obsoletes RFCs 4880 ("OpenPGP Message Format"), 5581 ("The Camellia Cipher in OpenPGP"), and 6637 ("Elliptic Curve Cryptography (ECC) in OpenPGP").</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9580"/>
  <seriesInfo name="DOI" value="10.17487/RFC9580"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC1847">
  <front>
    <title>Security Multiparts for MIME: Multipart/Signed and Multipart/Encrypted</title>
    <author fullname="J. Galvin" initials="J." surname="Galvin"/>
    <author fullname="S. Murphy" initials="S." surname="Murphy"/>
    <author fullname="S. Crocker" initials="S." surname="Crocker"/>
    <author fullname="N. Freed" initials="N." surname="Freed"/>
    <date month="October" year="1995"/>
    <abstract>
      <t>This document defines a framework within which security services may be applied to MIME body parts. [STANDARDS-TRACK] This memo defines a new Simple Mail Transfer Protocol (SMTP) [1] reply code, 521, which one may use to indicate that an Internet host does not accept incoming mail. This memo defines an Experimental Protocol for the Internet community. This memo defines an extension to the SMTP service whereby an interrupted SMTP transaction can be restarted at a later time without having to repeat all of the commands and message content sent prior to the interruption. This memo defines an Experimental Protocol for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="1847"/>
  <seriesInfo name="DOI" value="10.17487/RFC1847"/>
</reference>

<reference anchor="I-D.gallagher-openpgp-hkp">
   <front>
      <title>OpenPGP HTTP Keyserver Protocol</title>
      <author fullname="Daphne Shaw" initials="D." surname="Shaw">
         <organization>Jabberwocky Tech</organization>
      </author>
      <author fullname="Andrew Gallagher" initials="A." surname="Gallagher">
         <organization>PGPKeys.EU</organization>
      </author>
      <date day="18" month="March" year="2025"/>
      <abstract>
	 <t>   This document specifies a series of conventions to implement an
   OpenPGP keyserver using the Hypertext Transfer Protocol (HTTP).  As
   this document is a codification and extension of a protocol that is
   already in wide use, strict attention is paid to backward
   compatibility with these existing implementations.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-gallagher-openpgp-hkp-07"/>
   
</reference>

<reference anchor="I-D.koch-openpgp-webkey-service">
   <front>
      <title>OpenPGP Web Key Directory</title>
      <author fullname="Werner Koch" initials="W." surname="Koch">
         <organization>g10 Code GmbH</organization>
      </author>
      <date day="2" month="June" year="2025"/>
      <abstract>
	 <t>   This specification describes a service to locate OpenPGP keys by mail
   address using a Web service and the HTTPS protocol.  It also provides
   a method for secure communication between the key owner and the mail
   provider to publish and revoke the public key.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-koch-openpgp-webkey-service-20"/>
   
</reference>

<reference anchor="Hockeypuck" target="https://hockeypuck.io">
  <front>
    <title>Hockeypuck OpenPGP Keyserver</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>


<?line 334?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The author would like to thank Daniel Huigens, Daniel Kahn Gillmor, Heiko Schäfer and Wiktor Kwapisiewicz for suggestions and discussions.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

