Internet-Draft OpenPGP Key Replacement August 2025
Shaw & Gallagher Expires 18 February 2026 [Page]
Workgroup:
openpgp
Internet-Draft:
draft-ietf-openpgp-replacementkey-05
Updates:
9580 (if approved)
Published:
Intended Status:
Standards Track
Expires:
Authors:
D. Shaw
Jabberwocky Tech
A. Gallagher, Ed.
PGPKeys.EU

OpenPGP Key Replacement

Abstract

This document specifies a method in OpenPGP to suggest a replacement for an expired, revoked, or deprecated primary key.

About This Document

This note is to be removed before publishing as an RFC.

The latest revision of this draft can be found at https://andrewgdotcom.gitlab.io/openpgp-replacementkey. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-ietf-openpgp-replacementkey/.

Discussion of this document takes place on the OpenPGP Working Group mailing list (mailto:openpgp@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/openpgp/. Subscribe at https://www.ietf.org/mailman/listinfo/openpgp/.

Source for this draft and an issue tracker can be found at https://gitlab.com/andrewgdotcom/openpgp-replacementkey.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 18 February 2026.

Table of Contents

1. Introduction

The OpenPGP message format [RFC9580] defines two ways to invalidate a primary key. One way is that the primary key may be explicitly revoked via a key revocation signature. OpenPGP also supports the concept of key expiration, a date after which the key should not be used. When a primary key is revoked or expires, very often there is another primary key that is intended to replace it.

A key owner may also create a new primary key that is intended to deprecate and replace their existing primary key, but without revoking or expiring that key. This is useful during the rollout of new key versions and algorithms which may not (yet) enjoy universal support. In such cases, a key owner may prefer that their correspondents use their new primary key, but if this is not possible for technical reasons they may continue to use the non-preferred key, which remains valid.

In the past some key owners have created key transition documents, which are signed, human-readable statements stating that a newer primary key should be preferred by their correspondents. It is desirable that this process be automated through a standardised machine-readable mechanism.

This document is to specify the format of a Signature Subpacket to be optionally included in a revocation signature or direct self-signature over a primary key. This subpacket contains a pointer to a suggested replacement for the (now deprecated) primary key that is signed over, or one or more (deprecated) primary keys for which the current primary key is the suggested replacement. The replacement certificate may then be automatically retrieved by the key owner's correspondents and (if supported and validated) used instead of the deprecated certificate.

2. Conventions and Definitions

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

2.1. Terminology

In OpenPGP, the term "key" has often been used broadly to describe different concepts, which can lead to confusion. To avoid ambiguity in this document, we define the following terms:

  • "Replacement Primary Key" and "Deprecated Primary Key": These refer to a primary key as contained in an OpenPGP Certificate (Section 10.1 of [RFC9580]) or Transferable Secret Key (Section 10.2 of [RFC9580]).

  • "Target Key": This refers to either a replacement or deprecated primary key that is referenced in a Replacement Key subpacket.

  • "Current Primary Key": This refers to the primary key that contains the self-signature being discussed.

  • "Replacement Certificate", "Deprecated Certificate" and "Current Certificate": These refer to the certificate that contains the respective primary key.

The term "OpenPGP Certificate", or just "certificate", is used in this document interchangeably with "OpenPGP Transferable Public Key".

This document also introduces the following terms:

  • An "identity" is any identifying label such as an email address or "real name"; it is not limited to User IDs, for example it may be a record in a local database.

  • An "identity claim" is any statement, explicit or implied, that an identity belongs to a particular primary key; it does not need to be a certification signature, and is not necessarily true.

  • An "identity link" is an identity claim that is considered to be true and accurate by the receiving implementation.

  • An "Identity Equivalence Binding" is a doubly-linked, directed relationship between two primary keys, one of which is the stated replacement for the other.

  • An "Identity Equivalence Set" is a collection of two or more primary keys whose Identity Equivalence Bindings form a maximal connected graph.

3. The Replacement Key Subpacket

The Replacement Key subpacket is a Signature Subpacket as specified in Section 5.2.3.7 of [RFC9580], and all general Signature Subpacket considerations from there apply here as well. The value of the Signature Subpacket type octet for the Replacement Key subpacket is 100 (TEMPORARY, permanent code point TBC).

The Replacement Key subpacket is a statement by the key owner that either:

Use of the Replacement Key subpacket is optional. The absence of a Replacement Key subpacket SHOULD NOT be interpreted as meaning that there is no replacement or deprecated primary key(s) relating to the current primary key.

The Replacement Key subpacket MUST only be used in the hashed subpackets area of a primary key revocation or direct key signature. A receiving implementation MUST ignore any Replacement Key subpacket found elsewhere.

4. Format of the Replacement Key Subpacket

The format of the Replacement Key subpacket is:

Table 1: Replacement Key Subpacket Fields
Octets Field Notes
1 Class  
2 Record length (1)  
1 Target Key Version (1)  
N1 Target Key Fingerprint (1)  
M Target Key Imprint (1)  
2 Record length (2) optional
1 Target Key Version (2) optional
N2 Target Key Fingerprint (2) optional
M Target Key Imprint (2) optional
... ... ...

The class octet contains flags that indicate the form and semantics of the subpacket:

Table 2: Replacement Key Subpacket Flags
Flag bit Flag name Form of remainder of packet
0x01 Backward reference(s) Multiple targets may be given

The 0x01 bit of the class octet is the "backward reference(s)" bit. When set, this means that the target key(s) identified by the packet are the primary keys for which the current primary key is the replacement primary key. Otherwise, the subpacket represents a forward reference and the target key is the replacement primary key for the current primary key.

All other flag bits of the class octet are currently undefined. All undefined flags MUST be zeroed when generating the class octet. An implementation that encounters a class octet with nonzero bits that it does not recognise MUST ignore those bits.

Note that if the critical bit on the Replacement Key subpacket is set, a receiving implementation could consider the whole self-signature to be in error (Section 5.2.3.7 of [RFC9580]). The critical bit therefore SHOULD NOT be set on the Replacement Key subpacket.

The remainder of the subpacket contains one or more target records of the form:

( Record Length || Target Key Version || Target Key Fingerprint || Target Key Imprint )

The Record Length field contains a big-endian two-octet number which indicates the length of the next three fields in octets. If a receiving implementation does not understand the target key version, it SHOULD ignore the target record and skip to the next. The Record Length field is authoritative, and a receiving implementation MUST NOT infer the length of a target record by any other means. If the Record Length field indicates that a target record contains more octets than expected, a receiving implementation MUST ignore any trailing extra octets. If a target record contains fewer octets than expected, it is malformed and MUST be ignored.

If a subpacket contains an unexpected number of target records, it is malformed and MUST be ignored.

The length of the Target Key Fingerprint field (N) MUST equal the fingerprint length corresponding to the immediately preceding Target Key Version field, e.g. 20 octets for version 4, or 32 octets for version 6. The length of the Target Key Imprint field (M) MUST equal the length of the output of the digest algorithm used by the enclosing signature, e.g. 32 octets for SHA2-256.

If a replacement or deprecated primary key is unknown, then a Replacement Key subpacket SHOULD NOT be included in the signature.

4.1. Key Imprints

An imprint of a public key packet is a generalisation of a fingerprint. It is calculated in the same way as the fingerprint, except that it may use a digest algorithm other than the one specified for the fingerprint. Conversely, the fingerprint of a public key packet can be considered a special case of an imprint. A public key packet has only one fingerprint, but may have any number of imprints, each using a different digest algorithm.

When used in a Replacement Key subpacket, an imprint MUST use the same digest algorithm as the enclosing signature. This guards against key-substitution attacks when referring to keys that use weaker digest algorithms in their fingerprints. If the signature's digest algorithm is the same as that used by the fingerprint, then the imprint and the fingerprint will be identical. In such a case, the imprint MUST still be included for parsing reasons.

A receiving implementation MAY use the fingerprint to locate a target key, but MUST verify that the imprint matches.

4.2. Graph Topology

A given signature MUST contain at most one Replacement Key subpacket in its hashed subpacket area. If a signature contains more than one such subpacket, even if malformed, a receiving implementation MUST disregard them all. This imposes a simple graph topology:

  • A deprecated certificate MUST NOT claim to have more than one replacement.

  • A deprecated certificate that claims to have a replacement MUST NOT claim to be the replacement for any other(s).

In addition, the order of the deprecated primary keys specified in a backward-reference Replacement Key subpacket is meaningful. If a replacement primary key is supported by a receiving implementation, but is not usable for the desired purpose (for example, it may not have an encryption-capable subkey), the implementation MAY use the ordering of the deprecated primary keys in its backward Replacement Key subpacket (if one exists) to indicate which deprecated primary key is preferred as a fallback. The deprecated primary keys SHOULD therefore be listed in order of decreasing preference.

                                                   .---------------------.
                                                  | Replacement Cert      |
                                                  | +-------------------+ |
                                                  | | Reverse RKSP      | |
 .---------------------.                          | |                   | |
| Deprecated Cert 1     |                         | |  .-------------.  | |
| +-------------------+ | <-----------------------+-+-+ Target Record | | |
| | Forward RKSP      | |              "Replaces" | |  '-------------'  | |
| |  .-------------.  | |                         | |                   | |
| | | Target Record +-+-+-----------------------> | |                   | |
| |  '-------------'  | | "Replaced by"           | |                   | |
| +-------------------+ |                         | |                   | |
 '---------------------'                          | |                   | |
 .---------------------.                          | |                   | |
| Deprecated Cert 2     |                         | |  .-------------.  | |
| +-------------------+ | <-----------------------+-+-+ Target Record | | |
| | Forward RKSP      | |              "Replaces" | |  '-------------'  | |
| |  .-------------.  | |                         | |                   | |
| | | Target Record +-+-+-----------------------> | |                   | |
| |  '-------------'  | | "Replaced by"           | |                   | |
| +-------------------+ |                         | |                   | |
 '---------------------'                          | |                   | |
 .---------------------.                          | |                   | |
| Deprecated Cert 3     |                         | |  .-------------.  | |
| +-------------------+ | <-----------------------+-+-+ Target Record | | |
| | Forward RKSP      | |              "Replaces" | |  '-------------'  | |
| |  .-------------.  | |                         | |                   | |
| | | Target Record +-+-+-----------------------> | |                   | |
| |  '-------------'  | | "Replaced by"           | |                   | |
| +-------------------+ |                         | |                   | |
 '---------------------'                          | |                   | |
                                                  | +-------------------+ |
                                                   '---------------------'
"RKSP" = Replacement Key Subpacket

5. Interpretation of the Replacement Key Subpacket

The relationships expressed by Replacement Key subpackets may be either singly- or doubly-linked. Doubly-linked Replacement Key subpackets have a more consequential interpretation. If a Replacement Key subpacket is found in a Key Revocation signature, then the Reason for Revocation subpacket provides crucial additional context.

5.1. Identity Equivalence Binding

The existence of a matching pair of forward- and backward-reference Replacement Key subpackets on the most recent direct self-signatures or key revocations over two primary keys, with each referring to the other primary key, forms an Identity Equivalence Binding. A collection of certificates whose Identity Equivalence Bindings form a maximal connected graph (see Section 4.2) is an Identity Equivalence Set, and all members of that set are said to be Identity Equivalent to each other.

If an implementation links a particular identity (such as a User ID or a database record) to one primary key by a means other than Identity Equivalence, then it SHOULD treat that identity as being linked, in the same manner and to the same extent, with each other primary key in the same Identity Equivalence Set. Each such "derived" identity link is a subsidiary relationship of the original "direct" identity link. If the same identity is directly linked into the Identity Equivalence Set by multiple identity claims, the derived link(s) are subsidiary to the strongest or most reliable direct link. A derived identity link is otherwise independent of any identity claims over the other primary keys, or lack thereof. Each distinct identity SHOULD be modelled separately; a direct or derived link to one identity makes no statement about any other identities found in the Identity Equivalence Set.

The equivalence binding is invalidated under the following circumstances:

  • if either primary key is hard-revoked.

  • if either primary key overrides the equivalence binding with a new direct self-signature that a) does not contain a Replacement Key subpacket, or b) contains a Replacement Key subpacket that does not refer to the other key, or c) contains a Replacement Key subpacket that inverts the direction of the binding, and there is no corresponding update to the other certificate.

  • if either signature that forms the equivalence binding has expired.

Note however:

  • If either primary key is soft-revoked or expired, the equivalence binding is unaffected.

  • If either primary key is hard-revoked, then the equivalence binding is invalidated but the other key is not revoked.

  • Other properties (such as expiry dates, usage preferences, custom notations) SHOULD NOT be applied to other members of the Identity Equivalence Set.

If a backward Replacement Key subpacket refers to multiple deprecated keys, it is possible that only some of those have a valid Identity Equivalence Binding. If a particular Identity Equivalence Binding is invalid, it does not invalidate the other bindings associated with the same backward Replacement Key subpacket.

Identity Equivalence is transitive; if A and B are both Identity Equivalent to C (in other words, if C replaces both A and B), then A is also Identity Equivalent to B. This transitivity is the basis for an Identity Equivalence Set, in which an identity linked to any of the primary keys is linked to them all. This equality of identity, and the distinction between direct and derived identity links, is independent of the order of preference of fallback primary keys (Section 4.2).

Members of an Identity Equivalence Set MUST be treated as a single key for the purposes of the Web of Trust, particularly when relying on multiple independent certification pathways.

5.1.1. Time Evolution of Identity Equivalence

An implementation MUST NOT assume that Identity Equivalence Bindings have any permanent significance. For example, if an MUA relies solely upon an Identity Equivalence Binding between A and B to validate B, the validity of B at a future date depends on the continuing validity of the Identity Equivalence Binding. If the binding is no longer valid, and there are no other certification pathways to B, then B is no longer valid.

It is therefore RECOMMENDED that applications attempt to find alternative certification pathways for replacement certificates. The optimal method of obtaining alternative certification pathways is application-dependent, and therefore beyond the scope of this document. It should be noted however that similar time evolution concens also apply to other methods of validation, such as the Web of Trust.

5.1.2. Consequences of Identity Equivalence

Identity Equivalence Binding operates at the same conceptual level as subkey binding. A subkey is linked to a particular identity if its primary key is linked to that identity. It is not possible to limit the use of particular subkeys of the same primary to particular identities.

Similarly, a primary key is linked to an identity if any of the primary keys in its Identity Equivalence Group is so linked. This means that it is not possible to limit the use of particular certificates in the group to particular identities. Any identities that the key owner's correspondents link to any member of an Identity Equivalence Group will be equally linked to them all.

For example, if a key owner has a particular User ID in one certificate, but not in an Identity Equivalent certificate, her correspondents will still link that User ID with both certificates. If so, they may (in some circumstances) send messages encrypted to one of the certificates but addressed to an identity that it does not claim.

An implementation SHOULD warn the user if they try to create an Identity Equivalence Group using certificates with mismatched current User IDs. It SHOULD similarly warn the user if they try to add a new User ID to only one member of an Identity Equivalence Group, and (if possible) offer to add it to all members instead.

This is a design limitation of the Key Replacement mechanism. Since Section 10.1 of [RFC9580] does not require a certificate to contain a User ID, it MUST still be possible to link an identity to it by other means. If we were to require matching User IDs for Identity Equivalence, the Replacement Key mechanism would not be fully functional for identity links that did not rely on User IDs.

5.2. Absence of an Identity Equivalence Binding

The Replacement Key subpacket MUST NOT be treated as a Web of Trust certification over either the current or replacement primary key. In the absence of an Identity Equivalence Binding, a receiving implementation SHOULD validate the replacement certificate as they would any other.

If an implementation supports the creation of unpaired Replacement Key subpackets, it SHOULD warn the key owner that correspondents may not be able to use the preferred certificate in the absence of other means of identity verification. For example, it could prompt the key owner to ask the third parties who certified the User ID(s) on the deprecated certificate to certify the corresponding User ID(s) on the replacement.

5.2.1. Limiting Chaining of Non-Equivalent Replacements

It is possible for a singly-linked chain of certificates to exist, where each (non-final) certificate contains a valid forward Replacement Key subpacket with no equivalence binding. Such a chain may terminate, or may form a closed loop. A generating implementation SHOULD NOT intentionally create singly-linked chains or loops, however they may be encountered in practice as a result of a stale cache, user or implementation error, or malice.

It may be possible for the certificates in a singly-linked chain to be validated without Identity Equivalence Bindings, such as by provenance or Web of Trust. In such a scenario, a receiving implementation might be induced to process the chain of references until it found the end, or a certificate that did not validate. An implementation SHOULD limit the maximum number of references it follows (per invocation), and/or implement a loop detection mechanism to prevent following a closed loop of references indefinitely.

For example, a receiving implementation MAY choose to process only one unpaired forward Key Replacement subpacket per invocation. Such an implementation MAY however process a subsequent unpaired subpacket on its next invocation, if the current certificate in the chain successfully validated. While this could result in unstable behaviour, where the apparent preferred certificate of the correspondent changes continually, each invocation will consume a finite amount of resources.

5.3. Reasons for Revocation

For the purposes of Key Revocation signatures:

  • "hard-revoked" means the key has been revoked with a Reason for Revocation subpacket specifying "Key material has been compromised" or "No reason specified"; the absence of a Reason for Revocation subpacket is equivalent to "No reason specified".

  • "soft-revoked" means the key has been revoked with a Reason for Revocation subpacket specifying "Key is superseded" or "Key is retired and no longer used".

If a Key Revocation signature contains a Replacement Key subpacket, a Reason for Revocation subpacket MUST also be included, to prevent it from being interpreted as "No reason specified", which is a hard revocation. If the Reason for Revocation subpacket, or lack thereof, indicates a hard revocation then any additional subpackets, including the Reason for Revocation subpacket, MUST be ignored as they could have been faked by an attacker who compromised the secret key material.

  • if a Replacement Key subpacket is included in a revocation signature, then the Reason For Revocation subpacket SHOULD indicate "Key is superseded".

  • if no Replacement Key subpacket is included in a revocation signature, but a Replacement Key might be specified at a later date, then the Reason For Revocation subpacket MAY indicate "Key is superseded".

  • otherwise, the Reason for Revocation subpacket SHOULD indicate "Key is retired and no longer used", to explicitly state that the revoked primary key has no replacement.

6. Selection of Encryption Subkeys

If a replacement certificate has been validated, whether as a member of an Identity Equivalence Set or otherwise, correspondents SHOULD assign it preference over the current certificate. When a correspondent of the key owner selects subkeys for encryption, the subkeys in the replacement certificate SHOULD therefore be considered first. If the subkeys in the replacement certificate are not usable, then:

When encrypting to herself, the key owner MAY use a different encryption subkey selection algorithm from the one used for her correspondents.

7. Security Considerations

If the Replacement Key subpacket was allowed in the unhashed subpackets area, an attacker could add a bogus Replacement Key subpacket to an existing signature.

An Identity Equivalence Binding requires the active consent of both primary key owners. This is to prevent one key owner from unilaterally claiming signatures made by the other key owner, using the same argument that motivates the embedded Primary Key Binding signature in a signing-capable subkey's binding signature.

The Target Key Imprint is included to mitigate against weaknesses in the fingerprint digest algorithm used by older key versions. By including a digest over the key material in the target primary public key packet, using the same digest algorithm as the enclosing signature, we ensure that the indirect cryptographic binding between the equivalent keys is of the same overall strength as a signature made directly over the target primary public key (as in a certification signature or subkey binding signature). We intentionally chose not to use embedded back-signatures or third-party certifications, both to keep the design simple and to limit the size of the subpacket(s) required.

In the absence of a complete Identity Equivalence Binding, the Replacement Key subpacket is merely advisory. In this scenario, it provides information for the purposes of key discovery only, without any actionable statement about the User IDs on the replacement.

In addition, as this document is an update of [RFC9580], the security considerations there should be carefully reviewed.

8. IANA Considerations

This document requests that the following entry be added to the OpenPGP Signature Subpacket registry:

Table 3: Signature Subpacket Registry
Type Name Specification
100 (TEMPORARY) Replacement Key This document

9. References

9.1. Normative References

[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/rfc/rfc2119>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/rfc/rfc8174>.
[RFC9580]
Wouters, P., Ed., Huigens, D., Winter, J., and Y. Niibe, "OpenPGP", RFC 9580, DOI 10.17487/RFC9580, , <https://www.rfc-editor.org/rfc/rfc9580>.

9.2. Informative References

[Autocrypt]
"Autocrypt", n.d., <https://docs.autocrypt.org>.
[I-D.koch-openpgp-webkey-service]
Koch, W., "OpenPGP Web Key Directory", Work in Progress, Internet-Draft, draft-koch-openpgp-webkey-service-20, , <https://datatracker.ietf.org/doc/html/draft-koch-openpgp-webkey-service-20>.

Appendix A. Example Workflows

In the following, Alice has a v4 primary keypair and subsequently generates a new v6 primary keypair, then at a later date she revokes her v4 primary key. Bob is her correspondent who consumes the updated certificate(s). We do not assume that Alice's secret keys are stored on the same hardware device.

A.1. Alice's Actions

If Alice's client supports v6 certificates, and Alice only has a v4 certificate, it may suggest to Alice that she should generate a v6 primary keypair and certificate. If the secret key material for the v4 certificate is available, the client may offer to generate the new keypair and certificate automatically. The client should warn Alice of potential compatibility issues with any other devices that she may have which share the v4 secret key material. The client should also perform pre-flight checks that may include:

  • Refreshing the certificate from the internet to check whether another client has already created a replacement.

  • Attempting to sync with other devices in a multi-device deployment, e.g. by emailing itself.

On creation of a v6 primary keypair and certificate, Alice's client will:

  • Add a Direct Key signature to Alice's new (v6) certificate, including a backward Replacement Key subpacket that references her deprecated v4 certificate.

  • If the deprecated (v4) secret key is available, add a new Direct Key signature to its certificate with a forward Replacement Key subpacket that references the v6 replacement.

  • Publish the updated certificate(s) to a keyserver.

  • Back up the new secret key material and (if necessary) sync it to any other devices.

Alice's client should perform regular consistency tests, by performing the pre-flight checks above to discover whether another client or device has published a different replacement certificate. In such a scenario, the client should warn the user and attempt to reconcile the differences by first syncing the secret key material, and then updating the older "replacement" certificate to be an additional deprecated certificate for the newer replacement, and finally updating the proper replacement certificate to refer to the additional deprecated certificate.

On revocation of her v4 primary key, Alice's client will:

  • Add a forward Replacement Key subpacket to the Primary Key Revocation signature, referencing the replacement.

  • If the replacement secret key is available, add a new Direct Key signature to its certificate with a new or updated backward Replacement Key subpacket that references the deprecated certificate.

  • Publish the updated certificate(s) to a keyserver.

On receipt of the new (v6) certificate on a second device, Alice's second client will:

  • Check to see if the certificate contains an unpaired backward Replacement Key subpacket that refers to any of the available secret keys.

  • If the reference is correct, add a Direct Key signature to the affected certificate with a forward Replacement Key subpacket.

  • Publish the updated certificate to a keyserver.

If Alice has a local encryption subkey that she prefers for encryption to herself, her client MAY use it regardless of any Replacement Key subpacket(s) in her published certificate.

A.2. Bob's Actions

If Alice has revoked her deprecated Primary Key:

  • Bob wants to send Alice a message; Bob has Alice's deprecated (v4) certificate but they have not corresponded for some time.

  • Bob's client refreshes Alice's deprecated certificate from a keyserver; it contains a Primary Key Revocation signature with a Replacement Key subpacket.

  • Bob's client looks up Alice's replacement (v6) certificate on a keyserver.

  • There is an Identity Equivalence Binding between the deprecated and replacement certificates, which Bob's client automatically validates.

  • Bob's client uses Alice's replacement certificate instead of the deprecated certificate.

There are other means to achieve a similar result, such as WKD [I-D.koch-openpgp-webkey-service] or [Autocrypt], but they may not be available. For example, Alice's service provider may not support WKD, and Alice may not have sent Bob an autocrypt message since revoking her deprecated primary key.

If Alice has not revoked her deprecated Primary Key:

  • Bob wants to send Alice a message and has Alice's deprecated (v4) certificate.

  • Either Bob's copy of Alice's deprecated certificate already has a Replacement Key subpacket that references her replacement (v6) fingerprint, or Bob refreshes Alice's deprecated certificate from a keyserver and sees the new Replacement Key subpacket.

  • If Bob has a v6 implementation, it can proceed with fetching Alice's v6 replacement certificate, validating it, and using it to send his message to Alice.

  • If Bob doesn't have a v6 implementation, it can continue to use Alice's v4 deprecated certificate.

WKD does not currently allow more than one valid certificate to be returned for a query, therefore it cannot easily support this use case.

A.3. Time Evolution of an Identity Equivalence Group

Let’s say that Alice has two deprecated keys (one RSA and one ECC), and a replacement key (ML-DSA). Let’s also say that she has the identity alice@example.com on the RSA and ML-DSA keys, and the identity a.lovelace@example.com on the ECC and ML-DSA keys.

                                                   .-----------------------.
                                                  | Alice's ML-DSA Key      |
        Bob's Second Signature--------------------+-> alice@example.com     |
                                                  | a.lovelace@example.com  |
Bob's First Signature---------.                   | +---------------------+ |
                               |                  | | Reverse RKSP        | |
 .------------------------.    |                  | |                     | |
| Alice's RSA Key          |   |                  | |                     | |
| alice@example.com <------+--'                   | |  .-------------.    | |
| +----------------------+ | <--------------------+-+-+ Target Record |   | |
| | Forward RKSP         | |           "Replaces" | |  '-------------'    | |
| |  .-------------.     | |                      | |                     | |
| | | Target Record +----+-+--------------------> | |                     | |
| |  '-------------'     | | "Replaced by"        | |                     | |
| +----------------------+ |                      | |                     | |
 '------------------------'                       | |                     | |
                                                  | |                     | |
                Bob's Third Signature             | |                     | |
                             |                    | |                     | |
 .------------------------.  |                    | |                     | |
| Alice's ECC Key          | |                    | |                     | |
| a.lovelace@example.com <-+'                     | |  .-------------.    | |
| +----------------------+ | <--------------------+-+-+ Target Record |   | |
| | Forward RKSP         | |           "Replaces" | |  '-------------'    | |
| |  .-------------.     | |                      | |                     | |
| | | Target Record +----+-+--------------------> | |                     | |
| |  '-------------'     | | "Replaced by"        | |                     | |
| +----------------------+ |                      | |                     | |
 '------------------------'                       | |                     | |
                                                  | +---------------------+ |
                                                   '-----------------------'
"RKSP" = Replacement Key Subpacket

If Bob has made a certification signature (1) over alice@example.com and the RSA key, then from his point of view there is a direct identity link between alice@example.com and her RSA key, and a derived identity link (via equivalence) between it and both of the other two keys. These derived links are subsidiary to the direct link and do not have an independent existence - if Bob’s certification expires, the direct link is invalidated and by extension the derived links are also invalidated. If however Bob also made a certification signature (2) over Alice’s ML-DSA key, then the expiration of the first certification would not invalidate the second, and all three keys would remain linked to alice@example.com - but now Bob’s certification over the ML-DSA key would anchor the direct identity link, and the link between alice@example.com and her RSA key would now be equivalence-derived.

None of the above has any consequence for the identity a.lovelace@example.com. Bob knows of no proof that Alice owns that email address, and while her ECC certificate may claim a.lovelace@example.com, and we may therefore infer that the owner of the other certificates also claims a.lovelace@example.com (because equivalence implies they are the same person), there is no supporting evidence to elevate any of these claims to a concrete link.

But let’s say that Bob then receives an email from a.lovelace@example.com with the ML-DSA certificate in its [Autocrypt] header. He MAY therefore infer that the identity a.lovelace@example.com is directly linked (via the TOFU principle) to the ML-DSA certificate - and thereby also to the other two certificates. This TOFU-based direct identity link may be considered “weaker” than one based on a certification signature, and so the derived identity links on the other two certificates SHOULD be considered equally “weak". If Bob subsequently certifies (3) the identity a.lovelace@example.com on the ECC key (for example), all the derived links would become subsidiary to that link, and also become equally “strong”.

Appendix B. Acknowledgments

The authors would like to thank Bart Butler, Kai Engert, Daniel Kahn Gillmor, Daniel Huigens, Simon Josefsson, Johannes Roth, Heiko Schäfer, Falko Strenzke, Neal Walfield, Justus Winter and Aron Wussler for suggestions and discussions.

Appendix C. Document History

Note to RFC Editor: this section should be removed before publication.

C.1. Changes Between draft-ietf-openpgp-replacementkey-04 and -05

  • Key Equivalence is now Identity Equivalence.

  • Specified Identity Equivalence Sets.

  • Defined terms "identity", "identity claim", "identity link", "direct link", "derived link".

  • Moved 0x40 to 0x01 and renamed from "inverse relationship" to "backward reference(s)".

  • Substituted "original" with "deprecated".

  • Expanded and improved "Terminology" section.

  • Merged content of "Placement of the Replacement Key Subpacket" section into other sections.

  • Removed reference to draft-ietf-openpgp-persistent-symmetric-keys (but kept the surrounding text).

  • Renamed and reordered some sections.

  • Added receiving implementation MUSTs in several places.

  • Various minor clarifications.

C.2. Changes Between draft-ietf-openpgp-replacementkey-03 and -04

  • Made target records forward-compatible.

  • Added additional guidance for Alice's client.

  • Removed unnecessary reference to WKD.

  • Removed requirement for unilateral reference to be treated as a preference.

  • Modified wording to avoid incompatibility with future encryption subkey selection draft.

C.3. Changes Between draft-ietf-openpgp-replacementkey-02 and -03

  • Added section clarifying time evolution of equivalence.

  • Added section clarifying how to prevent resource exhaustion when following chains.

  • Clarified description of equivalence transitivity.

C.4. Changes Between draft-ietf-openpgp-replacementkey-01 and -02

  • Added explanation of hard vs soft revocations.

  • Remove the "No Replacement" bit and use the Reason for Revocation subpacket instead.

  • Record length field is now two octets.

  • Inverted treatment of undefined flag bits.

  • Remove references to the Preferred Key Server subpacket.

  • Expanded example workflows section and add reference to draft-ietf-openpgp-persistent-symmetric-keys.

  • Various terminology nitpicking.

C.5. Changes Between draft-ietf-openpgp-replacementkey-00 and -01

  • Updated references to RFC9580.

  • Removed subpacket version octet.

  • Added guidance for encryption subkey selection.

  • Added record length fields.

  • Renamed to "OpenPGP Key Replacement" and normalised terminology.

C.7. Changes Between draft-gallagher-openpgp-replacementkey-01 and -02

  • Specified Public Key Imprints.

  • Specified inverse relationship flag and packet format.

  • Restricted graph topology.

  • Specified Identity Equivalence Binding.

  • Guidance re subpacket placement escalated from SHOULD to MUST, and critical bit to SHOULD NOT.

C.8. Changes Between draft-gallagher-openpgp-replacementkey-00 and -01

  • Added example workflows.

  • Specifically describe "deprecation without expiry or revocation" use case.

  • Add note about weakness of signatures over fingerprints.

  • Miscellaneous clarifications.

C.9. Changes Between draft-shaw-openpgp-replacementkey-00 and draft-gallagher-openpgp-replacementkey-00

  • Changed algid octet to key version octet.

  • Changed initial subpacket version number to 1.

  • Clarified semantics of some edge cases.

Authors' Addresses

Daphne Shaw
Jabberwocky Tech
Andrew Gallagher (editor)
PGPKeys.EU