[Pacemaker] HA Summit Key-signing Party

Michael Schwartzkopff ms at sys4.de
Mon Jan 26 16:00:20 CET 2015


Am Montag, 26. Januar 2015, 09:17:24 schrieb Digimer:
> On 26/01/15 09:14 AM, Jan Pokorný wrote:
> > Hello cluster masters,
> > 
> > On 13/01/15 00:31 -0500, Digimer wrote:
> >> Any concerns/comments/suggestions, please speak up ASAP!
> > 
> > I'd like to throw a key-signing party as it will be a perfect
> > opportunity to build a web of trust amongst us.
> > 
> > If you haven't incorporated OpenPGP to your communication with the
> > world yet, I would recommend at least considering it, even more in
> > the post-Snowden era.  You can use it to prove authenticity/integrity
> > of the data you emit (signing; not just for email as is the case
> > with this one, but also for SW releases and more), provide
> > privacy/confidentiality of interchanged data (encryption; again,
> > typical scenario is a private email, e.g., when you responsibly
> > report a vulnerability to the respective maintainers), or both.
> > 
> > In case you have no experience with this technology, there are
> > plentiful resources on GnuPG (most renowned FOSS implementation):
> > - https://www.gnupg.org/documentation/howtos.en.html
> > -
> > http://cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html#
> > prep> 
> >    (preparation steps for a key-signing party)
> > 
> > - ...
> > 
> > To make the verification process as smooth and as little
> > time-consuming as possible, I would stick with a list-based method:
> > http://cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html#l
> > ist_based and volunteer for a role of a coordinator.
> > 
> > 
> > What's needed?
> > Once you have a key pair (and provided that you are using GnuPG), please
> > 
> > run the following sequence:
> >      # figure out the key ID for the identity to be verified;
> >      # IDENTITY is either your associated email address/your name
> >      # if only single key ID matches, specific key otherwise
> >      # (you can use "gpg -K" to select a desired ID at the "sec" line)
> >      KEY=$(gpg --with-colons 'IDENTITY' | grep '^pub' | cut -d: -f5)
> >      
> >      # export the public key to a file that is suitable for exchange
> >      gpg --export -a -- $KEY > $KEY
> >      
> >      # verify that you have an expected data to share
> >      gpg --with-fingerprint -- $KEY
> > 
> > with IDENTITY adjusted as per the instruction above, and send me the
> > resulting $KEY file, preferably in a signed (or even encrypted[*]) email
> > from an address associated with that very public key of yours.
> > 
> > [*] You can find my public key at public keyservers:
> > http://pool.sks-keyservers.net/pks/lookup?op=vindex&search=0x60BCBB4F5CD7F
> > 9EF Indeed, the trust in this key should be ephemeral/one-off
> > (e.g., using a temporary keyring, not a universal one before we proceed
> > with the signing :)
> > 
> > 
> > Timeline?
> > Best if you send me your public keys before 2015-02-02.  I will then
> > compile a list of the attendees together with their keys and publish
> > it at https://people.redhat.com/jpokorny/keysigning/2015-ha/
> > so you can print it out and be ready for the party.
> > 
> > Thanks for your cooperation, looking forward to this side-event and
> > hope this will be beneficial to all involved.
> > 
> > 
> > P.S. There's now an opportunity to visit an exhibition of the Bohemian
> > Crown Jewels replicas directly in Brno (sorry, Google Translate only)
> > https://translate.google.com/translate?sl=auto&tl=en&js=y&prev=_t&hl=en&ie
> > =UTF-8&u=http%3A%2F%2Fwww.letohradekbrno.cz%2F%3Fidm%3D55
> =o, keysigning is a brilliant idea!
> 
> I can put the keys in the plan wiki, too.


What about publishing keys in DNSSEC?

Mit freundlichen Grüßen,

Michael Schwartzkopff

-- 
[*] sys4 AG

http://sys4.de, +49 (89) 30 90 46 64, +49 (162) 165 0044
Franziskanerstraße 15, 81669 München

Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer
Aufsichtsratsvorsitzender: Florian Kirstein



More information about the Pacemaker mailing list