Here's how you can mitigate the attack in your local GPG config:- Open
gpg.conf
in a text editor. Ensure there is no line starting with keyserver
. If there is, remove it. - Open
dirmngr.conf
in a text editor. Add the line keyserver hkps://keys.openpgp.org
to the end of it.
Here's how you can check your keyring for broken keys:
(You'll also need to do a sort -n and look for keys with a large number of
signatures: 150,000 is the SKS limit, 100-1000 is typical.)
There doesn't seem to be any easy way to fix the SKS servers themselves.
T