[ClusterLabs Developers] [HA/ClusterLabs Summit] Key-Signing Party, 2017 Edition
Jan Pokorný
jpokorny at redhat.com
Fri Jul 21 15:15:07 EDT 2017
Hello cluster masters :-)
as there's little less than 7 weeks left to "The Summit" meetup
(<http://plan.alteeve.ca/>), it's about time to get the ball
rolling so we can voluntarily augment the digital trust amongst
us the attendees, on OpenGPG basis.
Doing that, we'll actually establish a tradition since this will
be the second time such event is being kicked off (unlike the birds
of the feather gathering itself, was edu-feathered back then):
<https://people.redhat.com/jpokorny/keysigning/2015-ha/>
<http://lists.linux-ha.org/pipermail/linux-ha/2015-January/048507.html>
If there are no objections, yours truly will conduct this undertaking.
(As an aside, I am toying with an idea of optimizing the process
a bit now that many keys are cross-signed already; I doubt there's
a value of adding identical signatures just with different timestamps,
unless, of course, the inscribed level of trust is going to change,
presumably elevate -- any comments?)
* * *
So, going to attend summit and want your key signed while reciprocally
spreading the web of trust?
Awesome, let's reuse the steps from the last time:
Once you have a key pair (and provided that you are using GnuPG),
please run the following sequence:
# figure out the key ID for the identity to be verified;
# IDENTITY is either your associated email address/your name
# if only single key ID matches, specific key otherwise
# (you can use "gpg -K" to select a desired ID at the "sec" line)
KEY=$(gpg --with-colons 'IDENTITY' | grep '^pub' | cut -d: -f5)
# export the public key to a file that is suitable for exchange
gpg --export -a -- $KEY > $KEY
# verify that you have an expected data to share
gpg --with-fingerprint -- $KEY
with IDENTITY adjusted as per the instruction above, and send me the
resulting $KEY file, preferably in a signed (or even encrypted[*]) email
from an address associated with that very public key of yours.
Timeline?
Please, send me your public keys *by 2017-09-05*, off-list and
best with [key-2017-ha] prefix in the subject. I will then compile
a list of the attendees together with their keys and publish it at
<https://people.redhat.com/jpokorny/keysigning/2017-ha/>
so it can be printed beforehand.
[*] You can find my public key at public keyservers:
<http://pool.sks-keyservers.net/pks/lookup?op=vindex&search=0x60BCBB4F5CD7F9EF>
Indeed, the trust in this key should be ephemeral/one-off
(e.g. using a temporary keyring, not a universal one before we
proceed with the signing :)
* * *
Thanks for your cooperation, looking forward to this side stage
(but nonetheless important if release or commit[1] signing is to get
traction) happening and hope this will be beneficial to all involved.
See you there!
[1] for instance, see:
<https://github.com/blog/2144-gpg-signature-verification>
<https://pagure.io/pagure/issue/885>
--
Jan (Poki)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <http://lists.clusterlabs.org/pipermail/developers/attachments/20170721/4f45d285/attachment-0002.sig>
More information about the Developers
mailing list