[openpgp] Fwd: New Version Notification for draft-gallagher-openpgp-hkp-05.txt
Andrew Gallagher <andrewg@andrewg.com> Sat, 06 July 2024 10:16 UTC
Return-Path: <andrewg@andrewg.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 72E90C14F6AB for <openpgp@ietfa.amsl.com>; Sat, 6 Jul 2024 03:16:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=andrewg.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rGOtTU_zAe05 for <openpgp@ietfa.amsl.com>; Sat, 6 Jul 2024 03:16:48 -0700 (PDT)
Received: from fum.andrewg.com (fum.andrewg.com [135.181.198.78]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CA83AC14F6A5 for <openpgp@ietf.org>; Sat, 6 Jul 2024 03:16:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=andrewg.com; s=andrewg-com; t=1720261005; bh=hgQlZK6TEgLBnA6MOk7mLReNwV6/F19/PC8KLmUDe6Q=; h=From:Subject:References:To:Date:From; b=gsJgIPEUMauM4nl6e9LsCPtD2p0wGh9y4eYGF3M3ZzfqbRhTr5MOYRIf3F3kC9nb0 8ZWajEjRL5Brnvjo2JpgG1/UwlJHa3rkrd78LKtCtskskAYkoMBz5LKdJVtL7T0LES r1eJL29fTvJeTbdUGtJjzyWJ4IDmeubkiu8yFW8iKMFOAoFFKb/ALciKuL2fkxKhQE Egn69Z5Np8u1PenYeEssF6YGq9IFRKd6pv9BU4BZ0pfapAH5iv1TN4ruLrohrm5rD3 B9FgwVT1JI/zDyQ+t3omNisQhdU5K9b8qdw8u2gUW1hxY39j3hKF88T5jf3TPBsb4G whYDz0g8dxwfw==
Received: from smtpclient.apple (serenity [IPv6:fc93:5820:7349:eda2:99a7::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by fum.andrewg.com (Postfix) with ESMTPSA id E58905DCA4 for <openpgp@ietf.org>; Sat, 6 Jul 2024 10:16:44 +0000 (UTC)
From: Andrew Gallagher <andrewg@andrewg.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_6F81052B-E86A-48C9-9ACD-ABD66AB76D1C"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6.1.1\))
Message-Id: <15DDAFD3-0E8A-4214-A976-40A71E7C70EC@andrewg.com>
References: <172026037292.188.16657394326821825096@dt-datatracker-5f88556585-j5r2h>
To: IETF OpenPGP WG <openpgp@ietf.org>
Date: Sat, 06 Jul 2024 11:16:30 +0100
X-Mailer: Apple Mail (2.3731.700.6.1.1)
Message-ID-Hash: 6MUJVHCS4LXKUM26YDP4JDOT3XAYQWAW
X-Message-ID-Hash: 6MUJVHCS4LXKUM26YDP4JDOT3XAYQWAW
X-MailFrom: andrewg@andrewg.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-openpgp.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [openpgp] Fwd: New Version Notification for draft-gallagher-openpgp-hkp-05.txt
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/4u3SEYr_weFK1ToNumo2rCChsl0>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Owner: <mailto:openpgp-owner@ietf.org>
List-Post: <mailto:openpgp@ietf.org>
List-Subscribe: <mailto:openpgp-join@ietf.org>
List-Unsubscribe: <mailto:openpgp-leave@ietf.org>
Hi, all. I have just published a new version of the HKP draft. This version includes changes as requested by various implementers at the OpenPGP Email Summit last month: * updates to the v1 machine-readable request format to allow keys to be served from a static filesystem * extensions to the openpgpkey discovery protocol to facilitate discovery over HKP As per the roadmap in the current WG charter, I believe this draft is now suitable for adoption, whenever the WG has the capacity. Thanks, A > Begin forwarded message: > > From: internet-drafts@ietf.org > Subject: New Version Notification for draft-gallagher-openpgp-hkp-05.txt > Date: 6 July 2024 at 11:06:12 IST > To: "Andrew Gallagher" <andrewg@andrewg.com>, "Daphne Shaw" <dshaw@jabberwocky.com> > > A new version of Internet-Draft draft-gallagher-openpgp-hkp-05.txt has been > successfully submitted by Andrew Gallagher and posted to the > IETF repository. > > Name: draft-gallagher-openpgp-hkp > Revision: 05 > Title: OpenPGP HTTP Keyserver Protocol > Date: 2024-07-06 > Group: Individual Submission > Pages: 26 > URL: https://www.ietf.org/archive/id/draft-gallagher-openpgp-hkp-05.txt > Status: https://datatracker.ietf.org/doc/draft-gallagher-openpgp-hkp/ > HTMLized: https://datatracker.ietf.org/doc/html/draft-gallagher-openpgp-hkp > Diff: https://author-tools.ietf.org/iddiff?url2=draft-gallagher-openpgp-hkp-05 > > Abstract: > > This document specifies a series of conventions to implement an > OpenPGP keyserver using the Hypertext Transfer Protocol (HTTP). As > this document is a codification and extension of a protocol that is > already in wide use, strict attention is paid to backward > compatibility with these existing implementations. > > > > The IETF Secretariat > >
- [openpgp] Fwd: New Version Notification for draft… Andrew Gallagher