Re: [ANN] Media Summit at ELCE Dublin, September 12: Draft Agenda V2

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 07/09/2022 11:51, Laurent Pinchart wrote:
> Hi Hans,
> 
> On Wed, Sep 07, 2022 at 08:51:48AM +0200, Hans Verkuil wrote:
>> On 05/09/2022 16:44, Laurent Pinchart wrote:
>>> On Mon, Sep 05, 2022 at 01:41:11PM +0000, Sakari Ailus wrote:
>>>> On Tue, Aug 23, 2022 at 12:53:44PM +0200, Hans Verkuil wrote:
>>>>> 16:45-18:00 Anything else?
>>>>
>>>> I think it'd be great to have a GPG key signing party at the end of the
>>>> meeting.
>>>
>>> It's a good idea. Could everybody please send their GPG key fingerprint
>>> in an e-mail reply to prepare for that ? It can easily be retrieved with
>>> 'gpg -K' (make sure to pick the right key if you have multiple of them).
>>> I'll start:
>>>
>>> sec   rsa4096/0xF045C2B96991256E 2014-10-09 [C]
>>>       94231B980100EC619AC10E10F045C2B96991256E
>>> uid                   [ultimate] Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx>
>>>
>>> If you're generating a key for the occasion, create a primary key with
>>> the Certify (C) capability only, and create separate sub-keys for
>>> Signature (S) and Encryption (E). There's little reason these days to
>>> use less than 4096 bits for the primary key if you opt for RSA. The
>>> subkeys should have an expiration date.
>>>
>>> The primary key can then be moved to safe storage, you will only need
>>> the subkeys for daily usage.  The primary key will be used only to
>>> create new subkeys and to sign other people's keys.
>>>
>>
>> Can you also give instructions on what to do at the key signing party?
>>
>> I do this so rarely that I always forget what magic gpg commands I need
>> to make to sign keys.
>>
>> If everyone has this information at hand, then we can quickly proceed with
>> this on Monday.
> 
> Good point.
> 
> First of all, everybody should make sure that their key is published on
> key servers.

Which key servers? That's never been clear to me: which key server(s) are
you supposed to use?

Regards,

	Hans

> 
> I will gather al the keys and print a list that I will hand out to
> everybody on Monday. This will be the authoritative source of
> information, as anything stored in digital form could theoritically be
> tampered with.
> 
> We will go around the table, and everybody will check that their key ID
> matches the printed documented (to make sure I haven't tampered with the
> printed version they have received), and read it out loud for everybody
> to compare with their own printed version (to make sure I've distributed
> the same version to everybody). If any mismatch is noticed, people are
> expected to shout out loud.
> 
> Then we will verify identities. If we have a laptop with a webcam that
> can be hooked up to a projector, we can simply take turns and show a
> government-issues ID that clearly displays our name, for people in the
> room to compare that with the keys. Once the fingerprints and the
> identities are checked, the corresponding keys should be marked as
> verified on the paper version.
> 
> The next step is to sign keys. This is something that will happen after
> the media summit, and if you have your master key on offline storage,
> will happen after you get back home. You will need to download keys from
> key servers, verify that the fingerprints match the paper version and
> sign the keys.
> 
> The final step is to publish signatures. I'll try to check what the
> latest best practices are. One option is to simply publish the
> signatures to key servers, but we can also mail them to the key owner,
> in an encrypted e-mail to make sure the recipient is the intended
> person.
> 




[Index of Archives]     [Linux Input]     [Video for Linux]     [Gstreamer Embedded]     [Mplayer Users]     [Linux USB Devel]     [Linux Audio Users]     [Linux Kernel]     [Linux SCSI]     [Yosemite Backpacking]

  Powered by Linux