OpenPGP Stack Layering
The OpenPGP application stack can be roughly considered to be divided into layers. These layers have no official meaning, and are somewhat fluid. They are however useful as a mental model, particularly when defining extensions to OpenPGP.
RFC9580 fully specifies only layers 2a, 2b, and 2f.
Layer 1: Cryptographic primitives
- Symmetric algorithms
- Asymmetric algorithms
- Digest algorithms
- AEAD modes
- CSPRNGs
- PKCS1
- Elliptic Curves
Layer 2: OpenPGP
Layer 2a: Data representation
Layer 2b: Packet structure
- Packet framing
- Legacy and OpenPGP packet formats
- Partial packet lengths
- Packet types
- Subpacket types
- Digest construction
- Salting
- Subject preprocessing
- Trailers
- Algorithm-specific signature data
- Algorithm-specific ESK data
- KDFs
Layer 2c: Packet grammar
- Messages
- Document signature types (0x00..0x0f)
- Timestamp signatures (0x40)
- Literal data
- Compression
- Sign-then-encrypt
- One-pass signatures
- Nesting
- Intended recipient
- Certificates (TPKs)
- Key material
- User IDs and User Attributes
- Binding and certification signature types (0x10..0x1f)
- Revocation signature types (0x20..0x3f)
- Criticality
- Exportability
- Oddities
- Detached signatures
- Bare revocations
- Third-party confirmation signatures (0x50)
Layer 2d: Temporal evolution
- Selfsig precedence
- Cumulation of signatures
- Expiry
- Revocation
Layer 2e: PGPKI
Layer 2f: Packet sequence encoding
Layer 3: Application
Validity
In OpenPGP, the word “valid” is used liberally - but there are at least five kinds of “validity” that must be distinguished:
- formal validity (layer 2b)
- packet is well-formed and parseable
- cryptographic validity (layer 2a)
- mathematically incorrect signature
- incorrect digest (“implausible martian”)
- structural validity (layer 2c)
- missing required packets (“evaporated key”)
- disordered packets
- missing self-signatures (unbound signable packet)
- incorrect signature type (“structural martian”)
- temporal validity (layer 2d)
- expired
- revoked
- hard and soft
- post-dated
- issuer validity (layer 2e)
- uncertified
- incomplete certification chain
- insufficient certification weight
- lack of provenance
- identity mismatch
In addition, there are other forms of breakage that fall outside the common usage of “validity”, such as malformed encodings at the packet level (below) and the sequence encoding level (above).
Andrew Gallagher, 6th February 2025