SQ(1) User Commands SQ(1)

sq network keyserver fetch - Retrieve certificates from key servers

sq network keyserver fetch [OPTIONS] QUERY

Retrieve certificates from key servers.

By default, any returned certificates are stored in the local certificate store. This can be overridden by using `--output` option.

When a certificate is retrieved from a verifying key server (currently, this is limited to a list of known servers: `hkps://keys.openpgp.org`, `hkps://keys.mailvelope.com`, and `hkps://mail-api.proton.me`), and imported into the local certificate store, the User IDs are also certificated with a local server-specific key. That proxy certificate is in turn certified as a minimally trusted CA (trust amount: 1 of 120) by the local trust root. How much a proxy key server CA is trusted can be tuned using `sq pki link add` or `sq pki link retract` in the usual way.

Emit binary data
Fetch updates for all known certificates
Write to FILE (or stdout when omitted) instead of importing into the certificate store
Set the key server to use. Can be given multiple times.
[default: hkps://keys.openpgp.org, hkps://mail-api.proton.me, hkps://keys.mailvelope.com, hkps://keyserver.ubuntu.com, hkps://sks.pod01.fleetstreetops.com]
Retrieve certificate(s) using QUERY. This may be a fingerprint, a KeyID, or an email address.

See sq(1) for a description of the global options.

sq(1), sq-network(1), sq-network-keyserver(1).

For the full documentation see https://book.sequoia-pgp.org.

0.35.0 (sequoia-openpgp 1.20.0)

0.35.0 Sequoia PGP