Answers suggesting using key servers that listen on Port 80 will work. Another alternative that offers greater privacy and security is:
Use HKPS (HKP over TLS)
This encrypts the connection to the keyserver and helps prevent man-in-the-middle attacks. Also, TCP Port 443 is just as unlikely to be blocked by a corporate firewall as Port 80 (unlike Port 11371).
gpg --keyserver hkps://keyserver.ubuntu.com --recv-keys 94558F59
Note: the URIs, https://keyserver.ubuntu.com
, hkps://keyserver.ubuntu.com
, hkps://keyserver.ubuntu.com:443
are all equivalent.
Configuring this as the default server
Since the release of GnuPG 2.1.9 (2015-10-09), the --keyserver
option for gpg
has been deprecated and users are recommended to “use the --keyserver
in dirmngr.conf
instead”. The user’s default keyserver can be configured permanently by editing ~/.gnupg/dirmngr.conf
:
keyserver hkps://keyserver.ubuntu.com
If the dirmngr
daemon is already running, you’ll need to run gpgconf --reload dirmngr
for the new configuration to take effect.
System default keyservers
Currently (since versions 2.2.29 and 2.3.2, released in July/August 2021), the GnuPG project has keyserver.ubuntu.com
configured as its default keyserver if none is specified by the user while Debian (and Ubuntu) packages of gnupg2
have configured hkps://keys.openpgp.org
as the default keyserver since gnupg2 2.2.17-1
(released in 2019).
Note: other answers suggest using SKS keyserver pools. Unfortunately, these have suffered privacy and abuse problems and, as of June 2021, are no longer operating.