On 07/09/2022 11:51, Laurent Pinchart wrote: > Hi Hans, > > On Wed, Sep 07, 2022 at 08:51:48AM +0200, Hans Verkuil wrote: >> On 05/09/2022 16:44, Laurent Pinchart wrote: >>> On Mon, Sep 05, 2022 at 01:41:11PM +0000, Sakari Ailus wrote: >>>> On Tue, Aug 23, 2022 at 12:53:44PM +0200, Hans Verkuil wrote: >>>>> 16:45-18:00 Anything else? >>>> >>>> I think it'd be great to have a GPG key signing party at the end of the >>>> meeting. >>> >>> It's a good idea. Could everybody please send their GPG key fingerprint >>> in an e-mail reply to prepare for that ? It can easily be retrieved with >>> 'gpg -K' (make sure to pick the right key if you have multiple of them). >>> I'll start: >>> >>> sec rsa4096/0xF045C2B96991256E 2014-10-09 [C] >>> 94231B980100EC619AC10E10F045C2B96991256E >>> uid [ultimate] Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx> >>> >>> If you're generating a key for the occasion, create a primary key with >>> the Certify (C) capability only, and create separate sub-keys for >>> Signature (S) and Encryption (E). There's little reason these days to >>> use less than 4096 bits for the primary key if you opt for RSA. The >>> subkeys should have an expiration date. >>> >>> The primary key can then be moved to safe storage, you will only need >>> the subkeys for daily usage. The primary key will be used only to >>> create new subkeys and to sign other people's keys. >>> >> >> Can you also give instructions on what to do at the key signing party? >> >> I do this so rarely that I always forget what magic gpg commands I need >> to make to sign keys. >> >> If everyone has this information at hand, then we can quickly proceed with >> this on Monday. > > Good point. > > First of all, everybody should make sure that their key is published on > key servers. Which key servers? That's never been clear to me: which key server(s) are you supposed to use? Regards, Hans > > I will gather al the keys and print a list that I will hand out to > everybody on Monday. This will be the authoritative source of > information, as anything stored in digital form could theoritically be > tampered with. > > We will go around the table, and everybody will check that their key ID > matches the printed documented (to make sure I haven't tampered with the > printed version they have received), and read it out loud for everybody > to compare with their own printed version (to make sure I've distributed > the same version to everybody). If any mismatch is noticed, people are > expected to shout out loud. > > Then we will verify identities. If we have a laptop with a webcam that > can be hooked up to a projector, we can simply take turns and show a > government-issues ID that clearly displays our name, for people in the > room to compare that with the keys. Once the fingerprints and the > identities are checked, the corresponding keys should be marked as > verified on the paper version. > > The next step is to sign keys. This is something that will happen after > the media summit, and if you have your master key on offline storage, > will happen after you get back home. You will need to download keys from > key servers, verify that the fingerprints match the paper version and > sign the keys. > > The final step is to publish signatures. I'll try to check what the > latest best practices are. One option is to simply publish the > signatures to key servers, but we can also mail them to the key owner, > in an encrypted e-mail to make sure the recipient is the intended > person. >