On this page, we collect information on how to usekeys.openpgp.org with different OpenPGP software products.
We are still in the process of adding more. If you are missing some, please write to us and we'll try to add it.
The web interface onkeys.openpgp.org allows you to:
Enigmail for Thunderbird useskeys.openpgp.org by default since version 2.0.12.
Full support is available since Enigmail 2.1 (forThunderbird 68 or newer):
GPG Suite for macOS useskeys.openpgp.org by default since August 2019.
OpenKeychain for Android useskeys.openpgp.org by default since July 2019.
Note that there is no built-in support for upload and email address verification so far.
Pignus for iOS useskeys.openpgp.org by default since November 2019.
To configureGnuPG to usekeys.openpgp.org as keyserver, add this line to yourgpg.conf file:
keyserver hkps://keys.openpgp.org
gpg --auto-key-locate keyserver --locate-keys user@example.net
gpg --refresh-keys
Keys can be uploaded with GnuPG's--send-keys command, but identity information can't be verified that way to make the key searchable by email address (what does this mean?).
gpg --export your_address@example.net | curl -T - https://keys.openpgp.org
gpg --export your_address@example.net > my_key.pub
hkp-cacert ~/.gnupg/sks-keyservers.netCA.pem
This configuration is no longer necessary, but prevents regular certificates from working. It is recommended to simply remove this line from the configuration.
gpg: key A2604867523C7ED8: no user IDThis is aknown problem in GnuPG. We are working with the GnuPG team to resolve this issue.
For users who want to be extra careful,keys.openpgp.org can be reached anonymously as anonion service. If you haveTor installed, use the following configuration:
keyserver hkp://zkaan2xfbuxia2wpf7ofnkbz6r5zdbbvxbunvp5g2iebopbfc4iqmbad.onion
The Web Key Directory (WKD) is a standard for discovery of OpenPGP keys by email address, via the domain of its email provider. It is used to discover unknown keys in some email clients, such asGpgOL.
keys.openpgp.org can be used as a managed WKD service for any domain. To do so, the domain simply needs aCNAME record that delegates itsopenpgpkey subdomain towkd.keys.openpgp.org. It should be possible to do this in the web interface of any DNS hoster.
Once enabled for a domain, its verified addresses will automatically be available for lookup via WKD.
TheCNAME record should look like this:
$ drill openpgpkey.example.org
...
openpgpkey.example.org. 300 IN CNAME wkd.keys.openpgp.org.
There is a simple status checker for testing the service:
$ curl 'https://wkd.keys.openpgp.org/status/?domain=openpgpkey.example.org'
CNAME lookup ok: openpgpkey.example.org resolves to wkd.keys.openpgp.org
For testing key retrieval:
$ gpg --locate-keys --auto-key-locate clear,nodefault,wkd address@example.org
We offer an API for integrated support in OpenPGP applications. Check out ourAPI documentation.
Missing a guide for your favorite implementation? This site is a work-in-progress, and we are looking to improve it. Drop us a line atsupport at keys dot openpgp dot org if you want to help out!
Hagrid v2.0.1 built from871cae1e24
Powered bySequoia-PGP
Background image retrieved fromSubtle Patterns under CC BY-SA 3.0