Re: [ANN] Media Summit at ELCE Dublin, September 12: Draft Agenda V2

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Sep 07, 2022 at 11:58:29AM +0200, Hans Verkuil wrote:
> On 07/09/2022 11:51, Laurent Pinchart wrote:
> > On Wed, Sep 07, 2022 at 08:51:48AM +0200, Hans Verkuil wrote:
> >> On 05/09/2022 16:44, Laurent Pinchart wrote:
> >>> On Mon, Sep 05, 2022 at 01:41:11PM +0000, Sakari Ailus wrote:
> >>>> On Tue, Aug 23, 2022 at 12:53:44PM +0200, Hans Verkuil wrote:
> >>>>> 16:45-18:00 Anything else?
> >>>>
> >>>> I think it'd be great to have a GPG key signing party at the end of the
> >>>> meeting.
> >>>
> >>> It's a good idea. Could everybody please send their GPG key fingerprint
> >>> in an e-mail reply to prepare for that ? It can easily be retrieved with
> >>> 'gpg -K' (make sure to pick the right key if you have multiple of them).
> >>> I'll start:
> >>>
> >>> sec   rsa4096/0xF045C2B96991256E 2014-10-09 [C]
> >>>       94231B980100EC619AC10E10F045C2B96991256E
> >>> uid                   [ultimate] Laurent Pinchart <laurent.pinchart@xxxxxxxxxxxxxxxx>
> >>>
> >>> If you're generating a key for the occasion, create a primary key with
> >>> the Certify (C) capability only, and create separate sub-keys for
> >>> Signature (S) and Encryption (E). There's little reason these days to
> >>> use less than 4096 bits for the primary key if you opt for RSA. The
> >>> subkeys should have an expiration date.
> >>>
> >>> The primary key can then be moved to safe storage, you will only need
> >>> the subkeys for daily usage.  The primary key will be used only to
> >>> create new subkeys and to sign other people's keys.
> >>>
> >>
> >> Can you also give instructions on what to do at the key signing party?
> >>
> >> I do this so rarely that I always forget what magic gpg commands I need
> >> to make to sign keys.
> >>
> >> If everyone has this information at hand, then we can quickly proceed with
> >> this on Monday.
> > 
> > Good point.
> > 
> > First of all, everybody should make sure that their key is published on
> > key servers.
> 
> Which key servers? That's never been clear to me: which key server(s) are
> you supposed to use?

They are supposed to mirror each other, so any of the main ones should
do. hkp://keys.gnupg.net, hkp://pgp.mit.edu, hkps://keys.openpgp.org,
hkp://keyserver.ubuntu.com, ...

> > I will gather al the keys and print a list that I will hand out to
> > everybody on Monday. This will be the authoritative source of
> > information, as anything stored in digital form could theoritically be
> > tampered with.
> > 
> > We will go around the table, and everybody will check that their key ID
> > matches the printed documented (to make sure I haven't tampered with the
> > printed version they have received), and read it out loud for everybody
> > to compare with their own printed version (to make sure I've distributed
> > the same version to everybody). If any mismatch is noticed, people are
> > expected to shout out loud.
> > 
> > Then we will verify identities. If we have a laptop with a webcam that
> > can be hooked up to a projector, we can simply take turns and show a
> > government-issues ID that clearly displays our name, for people in the
> > room to compare that with the keys. Once the fingerprints and the
> > identities are checked, the corresponding keys should be marked as
> > verified on the paper version.
> > 
> > The next step is to sign keys. This is something that will happen after
> > the media summit, and if you have your master key on offline storage,
> > will happen after you get back home. You will need to download keys from
> > key servers, verify that the fingerprints match the paper version and
> > sign the keys.
> > 
> > The final step is to publish signatures. I'll try to check what the
> > latest best practices are. One option is to simply publish the
> > signatures to key servers, but we can also mail them to the key owner,
> > in an encrypted e-mail to make sure the recipient is the intended
> > person.

-- 
Regards,

Laurent Pinchart



[Index of Archives]     [Linux Input]     [Video for Linux]     [Gstreamer Embedded]     [Mplayer Users]     [Linux USB Devel]     [Linux Audio Users]     [Linux Kernel]     [Linux SCSI]     [Yosemite Backpacking]

  Powered by Linux