Feed of "Keyoxide" https://codeberg.org/keyoxide Wed, 01 Apr 2026 02:25:35 +0200 ArvinFarrelP opened issue keyoxide/keyoxide-web#256 https://codeberg.org/keyoxide/keyoxide-web/issues/256 256#Profile not loading after updating primary UID# Fingerprint:
2A3391F72DB6A6E2CB84D1C894BB0A2151DC1C4C

Description:
My Keyoxide profile previously worked and the GitHub proof was verified.
After changing the primary UID and updating the key signature, the profile page now shows:

No public profile/keys could be found

I already:

  • Updated the key signature
  • Re-published the key to keys.openpgp.org
  • Verified the key is available on the keyserver

Keyserver link:
https://keys.openpgp.org/vks/v1/by-fingerprint/2A3391F72DB6A6E2CB84D1C894BB0A2151DC1C4C

Profile link:
https://keyoxide.org/2A3391F72DB6A6E2CB84D1C894BB0A2151DC1C4C

]]>
ArvinFarrelP 109859362: https://codeberg.org/keyoxide/keyoxide-web/issues/256 Sat, 14 Mar 2026 02:56:10 +0100
schanzen created pull request keyoxide/doipjs#178 https://codeberg.org/keyoxide/doipjs/pulls/178 178#New claim: Taler-mailbox #177# schanzen 100064975: https://codeberg.org/keyoxide/doipjs/pulls/178 Tue, 17 Feb 2026 14:22:25 +0100 schanzen opened issue keyoxide/doipjs#177 https://codeberg.org/keyoxide/doipjs/issues/177 177#[NEW CLAIM] Taler-mailbox# Service provider

Name: Taler mailbox

Short description:

GNU Taler enables users to send/request money to/from their friends (P2P feature).
This is done (internally) by sending respective messages to a contact's mailbox.
The mailbox is identified through a URI.
The mailbox can be queries for its metadata.
The metadata has a free for plain text field which could contain a KOX proof.

Website: https://taler.net

API documentation: https://docs.taler.net/core/api-mailbox.html#configuration-information

Proposed verification mechanism

The $MAILBOX_URI/info/$MAILBOX_ID endpoint is queried to retrieve the Mailbox Metadta JSON.
The info field is parsed for the proof.

Remarks

This is part of https://nlnet.nl/project/TALER-LookupService/

Tasks

The tasks below are not completely understood, guidance needed.

]]>
schanzen 100058576: https://codeberg.org/keyoxide/doipjs/issues/177 Tue, 17 Feb 2026 13:45:51 +0100
chimbosonic commented on issue keyoxide/keyoxide-web#255 https://codeberg.org/keyoxide/keyoxide-web/issues/255#issuecomment-10255628 [BUG] keyoxide.org down <p dir="auto">This is solved</p> This is solved ]]> chimbosonic 95225530: https://codeberg.org/keyoxide/keyoxide-web/issues/255#issuecomment-10255628 Fri, 30 Jan 2026 00:52:47 +0100 nehemiagurl commented on issue keyoxide/doipjs#165 https://codeberg.org/keyoxide/doipjs/issues/165#issuecomment-8479482 [NEW CLAIM] Signal <p dir="auto">you&#39;re taking the wrong approach with verification via group. the verification would have to be closer to the way the <a href="https://docs.keyoxide.org/service-providers/discord/" rel="nofollow">discord verification</a>.</p> you're taking the wrong approach with verification via group. the verification would have to be closer to the way the discord verification. ]]> nehemiagurl 75412059: https://codeberg.org/keyoxide/doipjs/issues/165#issuecomment-8479482 Tue, 25 Nov 2025 19:33:27 +0100 kinetix opened issue keyoxide/keyoxide-docs#69 https://codeberg.org/keyoxide/keyoxide-docs/issues/69 69#https://docs.keyoxide.org/wiki/keyoxide/ broken details/links?# In trying to read up and get an understanding of what keyoxide is & how it works, I got in to this page but am seeing broken links:

The text "example account" links to https://keyoxide.org/hkp/test%40doip.rocks but that page has a failure "Something went wrong while viewing the profile"

Further on, when cutting & pasting the signed message and signature in to https://keyoxide.org/sig - one gets


The following error was reported:

Signature could not be read (readCleartextMessage: options.cleartextMessage must be a string)"

Outdated docs? Broken services / pages?

]]>
kinetix 72838919: https://codeberg.org/keyoxide/keyoxide-docs/issues/69 Sat, 15 Nov 2025 01:06:59 +0100
kamiki opened issue keyoxide/keyoxide-web#253 https://codeberg.org/keyoxide/keyoxide-web/issues/253 253#Backlink format difference if use a post as proof in activitypub# For a mastodon account, if the proof is https://doma.in/@user/postid instead of https://doma.in/@user, it would have https://doma.in/users/user as backlink instead of https://doma.in/@user/. This is trivial and will redirect to the same page, the only problem is that mastodon verification badge does not work anymore because it can only recognize the format of https://doma.in/@user/.
Same thing on Sharkey, if the proof is a link to a post, the profile backlink will be reformatted as https://shar.key/users/userid. This will break the verification badge as well.
If you would like to take a look at an example, here's my profile: https://keyoxide.org/openpgp4fpr:996735be496180afb582ecabee31bb28ecf6b268
Thank you! ]]>
kamiki 71595959: https://codeberg.org/keyoxide/keyoxide-web/issues/253 Mon, 10 Nov 2025 03:22:45 +0100
duxsco commented on pull request keyoxide/doipjs#173 https://codeberg.org/keyoxide/doipjs/pulls/173#issuecomment-8050556 Add support for Direct Key Signature proofs <p dir="auto">My wish to keep my e-mail address confidential outweights everything.</p> My wish to keep my e-mail address confidential outweights everything. ]]> duxsco 69871169: https://codeberg.org/keyoxide/doipjs/pulls/173#issuecomment-8050556 Sun, 02 Nov 2025 19:58:35 +0100 wiktor commented on issue keyoxide/keyoxide-web#154 https://codeberg.org/keyoxide/keyoxide-web/issues/154#issuecomment-8049743 Show UID comment <blockquote> <p dir="auto">I&#39;ll definitely switch to that</p> </blockquote>

I'll definitely switch to that

]]>
wiktor 69855341: https://codeberg.org/keyoxide/keyoxide-web/issues/154#issuecomment-8049743 Sun, 02 Nov 2025 18:19:02 +0100
duxsco commented on issue keyoxide/keyoxide-web#154 https://codeberg.org/keyoxide/keyoxide-web/issues/154#issuecomment-8046311 Show UID comment <p dir="auto">Thank a lot! I&#39;ll definitely switch to that and upload to keys.openpgp.org my <del>UID-less</del> OpenPGP keypair that I use daily to sign my Git commits <span class="emoji" aria-label="slightly smiling face" data-alias="slightly_smiling_face">🙂</span> But, I&#39;ll not verify my e-mail address to have the keypair provided by keys.openpgp.org without UIDs. I need to extend validity of my keypair until end of the year anyway.</p> Thank a lot! I'll definitely switch to that and upload to keys.openpgp.org my UID-less OpenPGP keypair that I use daily to sign my Git commits 🙂 But, I'll not verify my e-mail address to have the keypair provided by keys.openpgp.org without UIDs. I need to extend validity of my keypair until end of the year anyway. ]]> duxsco 69798383: https://codeberg.org/keyoxide/keyoxide-web/issues/154#issuecomment-8046311 Sun, 02 Nov 2025 12:44:08 +0100 wiktor commented on issue keyoxide/keyoxide-web#154 https://codeberg.org/keyoxide/keyoxide-web/issues/154#issuecomment-8041805 Show UID comment <blockquote> <p dir="auto">After GitHub and Codeberg, <a href="https://keyoxide.org/[email protected]" rel="nofollow">https://keyoxide.org/[email protected]</a> points now to my self-hosted website <span class="emoji" aria-label="slightly smiling face" data-alias="slightly_smiling_face">🙂</span></p> </blockquote>

After GitHub and Codeberg, https://keyoxide.org/[email protected] points now to my self-hosted website 🙂

]]>
wiktor 69712763: https://codeberg.org/keyoxide/keyoxide-web/issues/154#issuecomment-8041805 Sat, 01 Nov 2025 21:51:25 +0100
duxsco commented on issue keyoxide/keyoxide-web#154 https://codeberg.org/keyoxide/keyoxide-web/issues/154#issuecomment-8041202 Show UID comment <blockquote> <p dir="auto">It&#39;s kind of weird to have one key verified and then link to stuff in a non-content-addressable way. I suggest at least adding your main key fingerprint in the comment as currently you&#39;ve reduced the security of this entire scheme to basically &#34;whatever GitHub serves at <a href="https://github.com/duxsco/duxsco" rel="nofollow">https://github.com/duxsco/duxsco</a>&#34; (with a nice green checkboxes).</p> </blockquote> <p dir="auto"><a href="/wiktor" class="mention" rel="nofollow">@wiktor</a> After GitHub and Codeberg, <a href="https://keyoxide.org/[email protected]" rel="nofollow">https://keyoxide.org/[email protected]</a> points now to my self-hosted website <span class="emoji" aria-label="slightly smiling face" data-alias="slightly_smiling_face">🙂</span></p>

It's kind of weird to have one key verified and then link to stuff in a non-content-addressable way. I suggest at least adding your main key fingerprint in the comment as currently you've reduced the security of this entire scheme to basically "whatever GitHub serves at https://github.com/duxsco/duxsco" (with a nice green checkboxes).

@wiktor After GitHub and Codeberg, https://keyoxide.org/[email protected] points now to my self-hosted website 🙂

]]>
duxsco 69701552: https://codeberg.org/keyoxide/keyoxide-web/issues/154#issuecomment-8041202 Sat, 01 Nov 2025 20:40:15 +0100
xyhhx created pull request keyoxide/kx-aspe-cli#22 https://codeberg.org/keyoxide/kx-aspe-cli/pulls/22 22#fix: handle no uri when generating proofs# return an actionable error message when trying to generate proofs on a profile with no uri

example output:

$ ./kx-aspe generate proof
✗ failed to handle profile (reason: no ASPE URI found in profile. It must be uploaded before proofs can be generated)

resolves: #21

]]>
xyhhx 67093625: https://codeberg.org/keyoxide/kx-aspe-cli/pulls/22 Tue, 21 Oct 2025 21:17:45 +0200
lucasmz opened issue keyoxide/kx-aspe-web#29 https://codeberg.org/keyoxide/kx-aspe-web/issues/29 29#Warn that hashed claims don't work in browser environments without WebAssembly# Following keyoxide/keyoxide-web#252,

It would be interesting to have a warning around how hashed claims may not work when using a browser that has WebAssembly disabled for security reasons.

]]>
lucasmz 66382148: https://codeberg.org/keyoxide/kx-aspe-web/issues/29 Sat, 18 Oct 2025 19:54:57 +0200
lucasmz opened issue keyoxide/keyoxide-web#252 https://codeberg.org/keyoxide/keyoxide-web/issues/252 252#Better handling of WebAssembly requirements for hashed claims# Proposal

WebAssembly is needed for Keyoxide to be able to verify hashed claims with Argon2, WebAssembly however can be disabled for security purposes, decreasing attack surface.

Instead of the web app showing that this is a lack of WebAssembly, it will simply fail verification.

My suggestion is be able to detect when WASM isn't available, and warn the user.

]]>
lucasmz 66381602: https://codeberg.org/keyoxide/keyoxide-web/issues/252 Sat, 18 Oct 2025 19:48:54 +0200
eggplants commented on pull request keyoxide/keyoxide-web#209 https://codeberg.org/keyoxide/keyoxide-web/pulls/209#issuecomment-7722044 Fix wrong errors list <p dir="auto"><a href="/Ryuno-Ki" class="mention" rel="nofollow">@Ryuno-Ki</a> <a href="https://codeberg.org/keyoxide/keyoxide-web/pulls/209#issuecomment-2520449" class="ref-issue" rel="nofollow">#209 (comment)</a></p> @Ryuno-Ki #209 (comment) ]]> eggplants 65421320: https://codeberg.org/keyoxide/keyoxide-web/pulls/209#issuecomment-7722044 Tue, 14 Oct 2025 15:33:59 +0200 eggplants commented on pull request keyoxide/keyoxide-web#209 https://codeberg.org/keyoxide/keyoxide-web/pulls/209#issuecomment-7714409 Fix wrong errors list <p dir="auto"><a href="/Ryuno-Ki" class="mention" rel="nofollow">@Ryuno-Ki</a> ping</p> @Ryuno-Ki ping ]]> eggplants 65294183: https://codeberg.org/keyoxide/keyoxide-web/pulls/209#issuecomment-7714409 Tue, 14 Oct 2025 01:55:27 +0200 sitiom commented on pull request keyoxide/doipjs#176 https://codeberg.org/keyoxide/doipjs/pulls/176#issuecomment-7579327 feat: add SourceForge provider <blockquote> <p dir="auto">Can you merge against <code>dev</code> branch as <code>main</code> should remain stable? Thank you.</p> </blockquote> <p dir="auto"><a href="/Ryuno-Ki" class="mention" rel="nofollow">@Ryuno-Ki</a> done!</p>

Can you merge against dev branch as main should remain stable? Thank you.

@Ryuno-Ki done!

]]>
sitiom 63689800: https://codeberg.org/keyoxide/doipjs/pulls/176#issuecomment-7579327 Tue, 07 Oct 2025 08:42:25 +0200
sitiom commented on pull request keyoxide/keyoxide-docs#68 https://codeberg.org/keyoxide/keyoxide-docs/pulls/68#issuecomment-7577599 feat: add SourceForge docs <p dir="auto">Here: <a href="https://sourceforge.net/u/sitiom/keyoxide/proof/" rel="nofollow">https://sourceforge.net/u/sitiom/keyoxide/proof/</a></p> Here: https://sourceforge.net/u/sitiom/keyoxide/proof/ ]]> sitiom 63660994: https://codeberg.org/keyoxide/keyoxide-docs/pulls/68#issuecomment-7577599 Tue, 07 Oct 2025 02:53:32 +0200 sitiom commented on pull request keyoxide/keyoxide-brands#17 https://codeberg.org/keyoxide/keyoxide-brands/pulls/17#issuecomment-7577584 feat: add SourceForge logo <blockquote> <p dir="auto">Thank you for the effort.</p> <p dir="auto">Can you share where you downloaded the images from? What license is attached?</p> </blockquote> <p dir="auto"><a href="/Ryuno-Ki" class="mention" rel="nofollow">@Ryuno-Ki</a> From <a href="https://simpleicons.org/?q=SourceForge" rel="nofollow">SimpleIcons</a> and the <a href="https://a.fsdn.com/con/img/sandiego/svg/originals/sf-icon-orange-no_sf.svg" rel="nofollow">website source</a>.</p> <p dir="auto">The logo usage is defined here: <a href="https://sourceforge.net/p/forge/documentation/SourceForge%20Logo/" rel="nofollow">https://sourceforge.net/p/forge/documentation/SourceForge%20Logo/</a></p>

Thank you for the effort.

Can you share where you downloaded the images from? What license is attached?

@Ryuno-Ki From SimpleIcons and the website source.

The logo usage is defined here: https://sourceforge.net/p/forge/documentation/SourceForge%20Logo/

]]>
sitiom 63660910: https://codeberg.org/keyoxide/keyoxide-brands/pulls/17#issuecomment-7577584 Tue, 07 Oct 2025 02:51:43 +0200
sitiom created pull request keyoxide/keyoxide-brands#17 https://codeberg.org/keyoxide/keyoxide-brands/pulls/17 17#feat: add SourceForge logo# keyoxide/doipjs#175 ]]> sitiom 63526438: https://codeberg.org/keyoxide/keyoxide-brands/pulls/17 Mon, 06 Oct 2025 12:59:20 +0200 sitiom created pull request keyoxide/keyoxide-docs#68 https://codeberg.org/keyoxide/keyoxide-docs/pulls/68 68#feat: add SourceForge docs# keyoxide/doipjs#175 ]]> sitiom 63507157: https://codeberg.org/keyoxide/keyoxide-docs/pulls/68 Mon, 06 Oct 2025 11:02:51 +0200 sitiom created pull request keyoxide/doipjs#176 https://codeberg.org/keyoxide/doipjs/pulls/176 176#feat: add SourceForge provider# Resolves #175 ]]> sitiom 63487822: https://codeberg.org/keyoxide/doipjs/pulls/176 Mon, 06 Oct 2025 08:45:11 +0200 sitiom opened issue keyoxide/doipjs#175 https://codeberg.org/keyoxide/doipjs/issues/175 175#[NEW CLAIM]# Service provider

Name: SourceForge

Short description: Centralized source code repository hosting service and software project management site

Website: https://sourceforge.net/

API documentation: REST API Overview

Proposed verification mechanism

Create page from personal wiki and fetch from https://sourceforge.net/rest/u/<username>/<wikiname>/<pagename>/.
Example response (https://sourceforge.net/u/sitiom/keyoxide/proof/):

{
    "_id": "62c95b51354138d6659cb7af",
    "mod_date": "2025-10-06 05:26:07.187000",
    "labels": [],
    "related_artifacts": [],
    "discussion_thread": {
        "_id": "ddfffbdd9a",
        "discussion_id": "62c95b51354138d6659cb7aa",
        "subject": "",
        "limit": 10,
        "page": null,
        "posts": []
    },
    "discussion_thread_url": "https://sourceforge.net/rest/u/sitiom/keyoxide/_discuss/thread/ddfffbdd9a/",
    "title": "proof",
    "text": "This is an OpenPGP proof that connects [my OpenPGP key](https://keyoxide.org/9763AE10706A1E8FCF74E5AEF6FD3820BCBC1A98) to [this SourceForge account](https://sourceforge.net/u/sitiom). For details check out https://docs.keyoxide.org/wiki/identity-claims-proofs/\r\n\r\n\\[Verifying my OpenPGP key: openpgp4fpr:9763AE10706A1E8FCF74E5AEF6FD3820BCBC1A98]",
    "attachments": []
}

Remarks

Creating an issue from https://community.keyoxide.org/d/37-add-sourceforge, which was from 3 years ago.

Tasks

]]>
sitiom 63486715: https://codeberg.org/keyoxide/doipjs/issues/175 Mon, 06 Oct 2025 08:37:43 +0200
lepus2589 commented on issue keyoxide/doipjs#106 https://codeberg.org/keyoxide/doipjs/issues/106#issuecomment-7392598 [CLAIM BUG] Hashed OpenPGP proof doesn't work <blockquote> <p dir="auto">Sorry to bring up an old issue, ...</p> </blockquote> <p dir="auto">Don&#39;t be sorry! This is a bug/issue tracker, not a forum. Issues stay relevant until they are closed.</p> <p dir="auto">This is indeed still relevant because nobody worked on it. And yes, the only &#34;workaround&#34; is to use a non-hashed proof. From the comments by <a href="/tyy" class="mention" rel="nofollow">@tyy</a> and myself above you can see, that this is due to the fact that the notation field <code>[email protected]</code>, which is originally only intended for CLAIMS (which are always non-hashed), is currently misused to hold a proof, which can therefore only be non-hashed. This is a specification problem and can thus not be trivially fixed.</p> <p dir="auto">Unfortunately, as the project&#39;s main author <a href="/yarmo" class="mention" rel="nofollow">@yarmo</a> has gone mostly radio silent, I don&#39;t know when or even if this is going to be fixed. It&#39;s a shame. I had high hopes for the keyoxide project...</p>

Sorry to bring up an old issue, ...

Don't be sorry! This is a bug/issue tracker, not a forum. Issues stay relevant until they are closed.

This is indeed still relevant because nobody worked on it. And yes, the only "workaround" is to use a non-hashed proof. From the comments by @tyy and myself above you can see, that this is due to the fact that the notation field [email protected], which is originally only intended for CLAIMS (which are always non-hashed), is currently misused to hold a proof, which can therefore only be non-hashed. This is a specification problem and can thus not be trivially fixed.

Unfortunately, as the project's main author @yarmo has gone mostly radio silent, I don't know when or even if this is going to be fixed. It's a shame. I had high hopes for the keyoxide project...

]]>
lepus2589 61336711: https://codeberg.org/keyoxide/doipjs/issues/106#issuecomment-7392598 Fri, 26 Sep 2025 15:17:10 +0200
RShirohara commented on pull request keyoxide/keyoxide-web#251 https://codeberg.org/keyoxide/keyoxide-web/pulls/251#issuecomment-7369231 feat: add support for encoded localPart to `/wkd/:id` <p dir="auto">Thank you!</p> Thank you! ]]> RShirohara 61056673: https://codeberg.org/keyoxide/keyoxide-web/pulls/251#issuecomment-7369231 Thu, 25 Sep 2025 12:02:00 +0200 chimbosonic approved keyoxide/keyoxide-web#251 https://codeberg.org/keyoxide/keyoxide-web/pulls/251#issuecomment-7367518 feat: add support for encoded localPart to `/wkd/:id` chimbosonic 61023754: https://codeberg.org/keyoxide/keyoxide-web/pulls/251#issuecomment-7367518 Thu, 25 Sep 2025 09:02:11 +0200 RShirohara created pull request keyoxide/keyoxide-web#251 https://codeberg.org/keyoxide/keyoxide-web/pulls/251 251#feat: add support for encoded localPart to `/wkd/:id`# When obtaining public keys using WKD, fix process to comply with the RFC (draft) by adding the query parameter ?l=....
This fix improves interoperability with OpenPGP Key Servers like ProtonMail that require ?l=....

Fixes #114.

]]>
RShirohara 60846232: https://codeberg.org/keyoxide/keyoxide-web/pulls/251 Wed, 24 Sep 2025 14:38:05 +0200
burgeonlab commented on issue keyoxide/doipjs#106 https://codeberg.org/keyoxide/doipjs/issues/106#issuecomment-7315627 [CLAIM BUG] Hashed OpenPGP proof doesn't work <p dir="auto">Sorry to bring up an old issue, but seems it is still <a href="https://keyoxide.org/aspe:keyoxide.org:ECRWVAY2NPHAVIXTQEBZCU5HRQ" rel="nofollow">relevant</a>. I cannot add a hashed proof in the notation of a PGP key. I double checked the hash and my ASP URI is verified with this <a href="https://keyoxide.org/util/argon2" rel="nofollow">tool</a> (the hash was generated inside the Android app). I tried adding the claim using the Android app manually and also via the OpenPGP &#34;template&#34; option directly, both failed. Is the only workaround to use the non-hashed proof?</p> Sorry to bring up an old issue, but seems it is still relevant. I cannot add a hashed proof in the notation of a PGP key. I double checked the hash and my ASP URI is verified with this tool (the hash was generated inside the Android app). I tried adding the claim using the Android app manually and also via the OpenPGP "template" option directly, both failed. Is the only workaround to use the non-hashed proof? ]]> burgeonlab 60633232: https://codeberg.org/keyoxide/doipjs/issues/106#issuecomment-7315627 Tue, 23 Sep 2025 14:59:07 +0200 wiktor commented on pull request keyoxide/doipjs#173 https://codeberg.org/keyoxide/doipjs/pulls/173#issuecomment-6843814 Add support for Direct Key Signature proofs <p dir="auto"><a href="/Ryuno-Ki" class="mention" rel="nofollow">@Ryuno-Ki</a> would you mind taking a look at this PR? I&#39;d really want to see it live <em>somewhere</em> so that I could work on the CLI proof updater part... kthxbai <span class="emoji" aria-label="person bowing" data-alias="bow">🙇</span></p> @Ryuno-Ki would you mind taking a look at this PR? I'd really want to see it live somewhere so that I could work on the CLI proof updater part... kthxbai 🙇 ]]> wiktor 55892911: https://codeberg.org/keyoxide/doipjs/pulls/173#issuecomment-6843814 Mon, 01 Sep 2025 14:35:23 +0200