Re: [ANN] Media Summit at ELCE Dublin, September 12: Draft Agenda V2

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Hans,

On Wed, Sep 07, 2022 at 08:51:48AM +0200, Hans Verkuil wrote:
> On 05/09/2022 16:44, Laurent Pinchart wrote:
> > On Mon, Sep 05, 2022 at 01:41:11PM +0000, Sakari Ailus wrote:
> >> On Tue, Aug 23, 2022 at 12:53:44PM +0200, Hans Verkuil wrote:
> >>> 16:45-18:00 Anything else?
> >>
> >> I think it'd be great to have a GPG key signing party at the end of the
> >> meeting.
> > 
> > It's a good idea. Could everybody please send their GPG key fingerprint
> > in an e-mail reply to prepare for that ? It can easily be retrieved with
> > 'gpg -K' (make sure to pick the right key if you have multiple of them).
> > I'll start:
> > 
> > sec   rsa4096/0xF045C2B96991256E 2014-10-09 [C]
> >       94231B980100EC619AC10E10F045C2B96991256E
> > uid                   [ultimate] Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx>
> > 
> > If you're generating a key for the occasion, create a primary key with
> > the Certify (C) capability only, and create separate sub-keys for
> > Signature (S) and Encryption (E). There's little reason these days to
> > use less than 4096 bits for the primary key if you opt for RSA. The
> > subkeys should have an expiration date.
> > 
> > The primary key can then be moved to safe storage, you will only need
> > the subkeys for daily usage.  The primary key will be used only to
> > create new subkeys and to sign other people's keys.
> > 
> 
> Can you also give instructions on what to do at the key signing party?
> 
> I do this so rarely that I always forget what magic gpg commands I need
> to make to sign keys.
> 
> If everyone has this information at hand, then we can quickly proceed with
> this on Monday.

Good point.

First of all, everybody should make sure that their key is published on
key servers.

I will gather al the keys and print a list that I will hand out to
everybody on Monday. This will be the authoritative source of
information, as anything stored in digital form could theoritically be
tampered with.

We will go around the table, and everybody will check that their key ID
matches the printed documented (to make sure I haven't tampered with the
printed version they have received), and read it out loud for everybody
to compare with their own printed version (to make sure I've distributed
the same version to everybody). If any mismatch is noticed, people are
expected to shout out loud.

Then we will verify identities. If we have a laptop with a webcam that
can be hooked up to a projector, we can simply take turns and show a
government-issues ID that clearly displays our name, for people in the
room to compare that with the keys. Once the fingerprints and the
identities are checked, the corresponding keys should be marked as
verified on the paper version.

The next step is to sign keys. This is something that will happen after
the media summit, and if you have your master key on offline storage,
will happen after you get back home. You will need to download keys from
key servers, verify that the fingerprints match the paper version and
sign the keys.

The final step is to publish signatures. I'll try to check what the
latest best practices are. One option is to simply publish the
signatures to key servers, but we can also mail them to the key owner,
in an encrypted e-mail to make sure the recipient is the intended
person.

-- 
Regards,

Laurent Pinchart



[Index of Archives]     [Linux Input]     [Video for Linux]     [Gstreamer Embedded]     [Mplayer Users]     [Linux USB Devel]     [Linux Audio Users]     [Linux Kernel]     [Linux SCSI]     [Yosemite Backpacking]

  Powered by Linux