Skip to content

Instantly share code, notes, and snippets.

@kafene
Last active November 11, 2024 21:10
Show Gist options
  • Save kafene/0a6e259996862d35845784e6e5dbfc79 to your computer and use it in GitHub Desktop.
Save kafene/0a6e259996862d35845784e6e5dbfc79 to your computer and use it in GitHub Desktop.
Setting up WKD for self-hosted automatic key discovery

I just got this working so I figured I'd share what I found, since there's hardly any information about this anywhere online except an RFC, the GPG mailing list and one tutorial from the GnuPG blog.

You can use automatic key discovery with WKD (Web key directory) to make it easy for users to import your key, in GPG since version 2.1.12. Since this feature is fairly new, it isn't yet available in the current LTS release of Ubuntu (16.04; xenial), however it is available in Debian stable (stretch).

I couldn't add a DNS CERT or DANE / OPENPGPKEY record through my email service (which also hosts my nameservers). I tried making the PKA record - a foo._pka.example.com TXT record but GPG doesn't seem to recognize it and fails; I'm still investigating why.

So the last option for self-hosted auto-discovery was WKD.

First thing I had to do was add an email address to my key. My primary UID is just my name so the key represents my identity rather than any particular email address. This was easy enough:

$ gpg --edit-key 0xDEADBEEFCAFEBABE
gpg> adduid
# follow the prompts
gpg> save

I used this to configure a sub-identity using my domain name as the "real name" and an email address ([email protected]). I suppose most here will already have an email address associated with their uid, or else be familiar with the process of editing keys.

Then I created a directory on my server:

$ ssh example.com
> mkdir -p /var/www/.well-known/openpgpkey/hu

The file you'll put inside this directory needs to be named the same as the WKD hash for your key, to get that run:

gpg --with-wkd-hash --fingerprint [email protected]

Below each uid line with an email address, you should see 32 random looking characters @yourdomain.tld, for example:

pub   2048R/0xDEADBEEFCAFEBABE 2015-01-25 [C] [expires: 2020-01-25]
      Key fingerprint = ....
uid                   [ultimate] Your Name <[email protected]>
                      [email protected]

So the WKD hash in this example is sc8wrug2g3mz8m8jz4tjrlgweilkgcba. Let's create the file that we'll be uploading:

gpg --no-armor --export [email protected] > sc8wrug2g3mz8m8jz4tjrlgweilkgcba

Copy that file into .well-known/openpgpkey/hu directory on your web server. If you have SSH access to your server configured you can use scp:

scp ./sc8wrug2g3mz8m8jz4tjrlgweilkgcba example.com:/var/www/.well-known/openpgpkey/hu/

I found that you do not need to enable directory listings for this well-known directory. To specify the correct content type with Apache, you can create a .htaccess file inside the .well-known/openpgpkey/hu directory with the following content:

<IfModule mod_mime.c>
    ForceType application/pgp-key
</IfModule>

That will force all files within the directory to be served as application/pgp-key.

That's all you need to do.

You can test that it's working correctly:

gpg --no-default-keyring --keyring /tmp/gpg-$$ --auto-key-locate clear,wkd --locate-keys [email protected]

Example output:

gpg: key DEADBEEFCAFEBABE: public key "Your Name" imported
gpg: Total number processed: 1
gpg:               imported: 1
gpg: automatically retrieved '[email protected]' via WKD
...

You can instruct users who wish to import your key to run the command:

gpg --auto-key-locate clear,wkd --locate-keys [email protected]

Or, to configure GPG to locate keys using wkd by placing this line in their gpg.conf:

auto-key-locate keyserver,dane,cert,pka,wkd,ldap,hkp://keys.gnupg.net

Note - that's just an example, only the wkd option is relevant for this, but the other options are handy too.

@wiktor-k
Copy link

wiktor-k commented Jun 1, 2024

The ascii armored keys are available in the expected url but gpg and thunderbird don't seem to accept the keys.

The keys must be binary, not armored:

The HTTP GET method MUST return the binary representation of the OpenPGP key for the given mail address.

Source: https://www.ietf.org/archive/id/draft-koch-openpgp-webkey-service-17.html#section-3.1

@pravi
Copy link

pravi commented Jun 1, 2024

Thanks! Though even after dearmoring, mailvelope/keyserver#121 (comment) gpg still fails to find the key.

@pravi
Copy link

pravi commented Jun 2, 2024

This is now working fine in mailvelope keyserver mailvelope/keyserver#147 ascii armored keys are fine for both gpg and thunderbird, the problem was wkd url now includes a query parameter and caddy rewrite rule was not expecting that.


❯ gpg-wks-client --print-wkd-url [email protected] 
https://openpgpkey.puri.sm/.well-known/openpgpkey/puri.sm/hu/g4rf118d16sbj3k77d5txywpm879pszg?l=praveen

@jult
Copy link

jult commented Oct 18, 2024

Truely stunning how needlessly complex the crypto crowd has made this PGP key-sharing. Even the RFC isn't clear on why or what is required for WKD or not. I have tried for hours to get the WKD working on a server, it still doesn't work. These are PUBLIC keys for crying out loud. Who cares how they're retrieved? This is why people give up on using PGP for messaging/email. They all seem to be losing sight of what this is actually used for, WHY it is used. You'd achieve your targeted intention faster using a tool like syncthing and then exchange a QR code for it sharing a folder between whoever you need to. Its encryption is harder to break than openpgp's old 4096b RSA, even. And honestly, me and some remote colleagues had a fully secure linked syncthing dir running for mobile, laptop and PC within minutes. Just sayin'.

@trinitronx
Copy link

trinitronx commented Oct 20, 2024

Truely stunning how needlessly complex the crypto crowd has made this PGP key-sharing.

Indeed! I had similar thoughts when setting up WKD (and GPG + Yubikeys in the past). It's been an age-old problem though, where UI/UX for crypto tools ends up too complex such that mere mortals have difficulty using such tools. It takes some time to read through all the disparate tools' man pages and learn how everything works. There are some other newer tools in the ecosystem that have been trying to solve for this...

Keybase made some great strides towards UX & usability while still enabling power users, up until Zoom Inc. acquired them and pretty much stalled the project. 1

Then, there's Keyoxide which while a bit more technical and still complex, is trying to solve for the "decentralized proofs" piece of the problem that Keybase was solving for by Merkle Tree chains. A bit more complex to figure out, but at least they have good documentation about creating signed proofs & GPG key ownership claims and either using "Ariadne Signature Proof Exchange" (ASPE) server/clients to distribute/gather them, and/or adding them to GPG keys. Keyoxide also has some good docs about setting up WKD, which you may find helpful.

Footnotes

  1. It's still unclear what their plans are for Keybase, and regularly people ask if Keybase is dead. Although, it does appear that some development pulse has picked up again...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment