Due to an influx of spam, we have had to temporarily disable account registrations. Please write an email to accountsupport@archlinux.org, with your desired username, if you want to get access. Sorry for the inconvenience.
@morganamilo can you please provide a clearsigned text (signed by your other key 7E3305BE1B62E81C9D5D4A4D6FE9E7996B0B082E) stating that F850562FCDA369F80D33000AE48D0A8326DE47C5 is (also) your key? :)
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256F850562FCDA369F80D33000AE48D0A8326DE47C5 is also my key-----BEGIN PGP SIGNATURE-----iQEzBAEBCAAdFiEEfjMFvhti6BydXUpNb+nnmWsLCC4FAmD758cACgkQb+nnmWsLCC5eDwf+ILaEJhMD9hDNwYwSh0ylPdNUetmd9o/2GTSbaoNDmbQIplwtKw9zQAA4K94BY8OGDImppJvcvLJ0zJxLpeOHfS5XUbgPdHc+ZiuaWgOT7/XsrXjKwIgqlsu9Se9eiXhScUXCIohTmYYPtybrFj8qPeKcp8EsrrmbFLaV50/X0ydnOhlhW7+FUyKH3vw6xQD5wD/ofO7KgI08lT5IphdP9MAkYjhscJBgp1OAQ9e2wQmW+hWWCvEgRG0OJ2lR9iLt+ELYK2RnQ3zeiVl5hCr09BgznX8Nfbbr4Ujz3W/Wk3/HudwfqYfTAwvd0E5A8uWH7QqldNXBTqp8HcHVpbTchw===Sx4q-----END PGP SIGNATURE-----
@kpcyrd@dvzrv can one of you please already open the merge request. That way we have CI with some basic checks on the keys. I see @dvzrv has already created a signature without the checkbox "The public key has been validated according to the best practices" being checked as well as the key owner uploading it to a keyserver is not checked either.
Sorry, the key is already uploaded. I just forgot to check that box.
The other checkbox is supposed to be done by the keyring maintainer, but I'm afraid that is not obvious enough (we need to restructure this process a little).
FWIW, I have of course made sure the key meets these requirements!
It appears that your key does not contain an encryption subkey (which it should have according to best practice and due to me sending you an encrypted mail):
Key has potential validity: goodKey has fingerprint: F850 562F CDA3 69F8 0D33 000A E48D 0A83 26DE 47C5Checking to see if key is OpenPGPv4: V4Checking the strength of your primary asymmetric key: RSA 4096Checking user-ID- and user-attribute-related items: Morgan Adamiec <morganamilo@archlinux.org>: Self-sig hash algorithms: [SHA-256] Preferred hash algorithms: [SHA-512, SHA-384, SHA-256, SHA-224, SHA-1] Key expiration times: [] Key usage flags: [[sign-data, certify-keys]]Checking subkeys: one of the subkeys is encryption-capable: False
If this situation is anything like mine, you can try extracting it from MIT keyservers which seems to be where Pierre pushes. MIT does not seem to be syncing with anything else right now and downloading keys is pretty hit or miss because both their keyserver and web interface are unstable (not always at the same time either, they have separate issues). You can see my adventures with the same problem here. I was eventually able to download the (my) key from the web interface and gpg --import it and it brought the new signature. I then pushed it to saner keyservers. @morganamilo You might mess around and be able to achieve the same.
I am sorry about the hassle I caused. Are there any keyservers left that are reliable? Maybe we need an alternate workflow then. I'll attach my signatures next time.
I think the lowdown on keyservers right now is that most reliable keyserver link and best web interface is on keyserver.ubuntu.com. It is currently the default used by gpg as distributed in Arch. The biggest drawback is that it does not handle all functions for some key types properly (Curve25519 expiration date extensions?). For the times when those are an issue the pgp.opengpg.org keyserver is solid choice too. It is well behaved as a keyserver and pretty stable, but the web UI is limited. For good measure pgp.surf.nl and pgp.rediris.es seem to be stable too, they are just not in favor as default servers.