summaryrefslogtreecommitdiffstats
path: root/doc
diff options
context:
space:
mode:
authorDaniel Kahn Gillmor <dkg@fifthhorseman.net>2016-10-28 00:30:58 +0200
committerWerner Koch <wk@gnupg.org>2016-11-17 15:29:35 +0100
commit7c1613d41566f7d8db116790087de323621205fe (patch)
tree7f600268106788a35f089a062af3783b0791595c /doc
parentdirmngr: Register hkp-cacert even if the file doesn't exist yet (diff)
downloadgnupg2-7c1613d41566f7d8db116790087de323621205fe.tar.xz
gnupg2-7c1613d41566f7d8db116790087de323621205fe.zip
dirmngr: Add system CAs if no hkp-cacert is given
* dirmngr/dirmngr.c (http_session_new): If the user isn't talking to the HKPS pool, and they have not specified any hkp-cacert, then we should default to the system CAs, rather than nothing. * doc/dirmngr.texi: Document choice of CAs. -- Consider three possible classes of dirmngr configuration: a) no hkps:// keyserver URLs at all (communication with keyservers is entirely in the clear) b) hkps:// keyserver URLs, but no hkp-cacert directives c) hkps:// keyserver URLs, and at least one hkp-cacert directive class (a) provides no confidentiality of requests. class (b) currently will never work because the server certificate cannot be validated. class (c) is currently supported as intended. This patch allows users with configurations in class (b) to work as most users expect (relying on the system certificate authorities), without affecting users in classes (a) or (c). Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net> o minor indentation fix - wk
Diffstat (limited to 'doc')
-rw-r--r--doc/dirmngr.texi5
1 files changed, 5 insertions, 0 deletions
diff --git a/doc/dirmngr.texi b/doc/dirmngr.texi
index 73afbc318..bc3072ce8 100644
--- a/doc/dirmngr.texi
+++ b/doc/dirmngr.texi
@@ -461,6 +461,11 @@ the file is in PEM format a suffix of @code{.pem} is expected for
@var{file}. This option may be given multiple times to add more
root certificates. Tilde expansion is supported.
+If no @code{hkp-cacert} directive is present, dirmngr will make a
+reasonable choice: if the keyserver in question is the special pool
+@code{hkps.pool.sks-keyservers.net}, it will use the bundled root
+certificate for that pool. Otherwise, it will use the system CAs.
+
@end table