Hi, No I was not
On Wed, 24 Jul 2019 at 22:54, Brian Spector <br...@qredo.com> wrote: > Hi Tran, sorry for the delay in responding. I think we need to nominate > you as a contributor in order to get your apache ID setup. Were you a > contributor to a previous project? > > Thanks > Brian > > > Brian Spector > Chief Product and Strategy Officer > Qredo Ltd > T: +44 1394825764 > 1 Primrose Street > London, UK EC2A 2EX > https://qredo.com > > Qredo Ltd is a limited company registered in England and Wales (registered > number 7834052). This e-mail and any attachments are confidential, and are > intended only for the named addressee(s). If you are not the intended > recipient you may not copy, disclose to anyone else or otherwise use the > content of this e-mail or any attachment thereto and should notify the > sender immediately and delete them from your system. > > > > ________________________________ > From: Tran Ly Vu <vutransingap...@gmail.com> > Sent: 06 July 2019 3:47 PM > To: dev@milagro.incubator.apache.org <dev@milagro.incubator.apache.org> > Cc: d...@milagro.apache.org <d...@milagro.apache.org> > Subject: Re: URGENT ATTN CONTRIBUTORS: Please sign git commits and > distribute your public key > > Hi, > > So I could not log in to https://id.apache.org , I have an account that > can > access to apache Jira and Confluence but they could not be used to access > to https://id.apache.org. Can someone advice me how I can create an > account > for id.apache.org? > > Key fingerprint: > 1007 7EA8 CBEE 28F4 BB05 EFE4 CE8F A0C4 9557 1477 > > Thanks > > > On Fri, 5 Jul 2019 at 17:43, Brian Spector <br...@qredo.com> wrote: > > > Hi Giorgio, great can you please make sure you update this on your > > id.apache.org profile please? > > > > Thanks > > Brian > > > > On 4 Jul 2019, at 22:20, Giorgio Zoppi wrote: > > > > Pub key finger print. > > 08A9 19B6 5853 BFEA 8AF3 F0B6 E89F 5EAB 4B36 F6B9 > > > > ---------- Forwarded message --------- > > De: Giorgio Zoppi <giorgio.zo...@gmail.com<mailto: > giorgio.zo...@gmail.com > > >> > > Date: jue., 4 jul. 2019 a las 23:15 > > Subject: Re: URGENT ATTN CONTRIBUTORS: Please sign git commits and > > distribute your public key > > To: Brian Spector <br...@qredo.com<mailto:br...@qredo.com>> > > > > > > my public key > > > > El jue., 4 jul. 2019 a las 15:05, Brian Spector (<br...@qredo.com > <mailto: > > br...@qredo.com>>) escribió: > > Hi All, > > > > as we are preparing for a release, it’s critical that contributors > > advertise their public keys in the appropriate places, and also circulate > > your public key to other Milagro contributors to make it stronger in the > > web of trust. > > > > Howard, Patrick, Giorgio, Alessandro, Go, Samuele, Tran, and (apologies > to > > anyone else I have missed) others, the project needs to have your public > > keys advertised, and it’s a critical part of putting your public keys in > > the ‘keys’ file that needs to go out with every release. > > > > We’ve got mine, Stan, Chris, Kealan, and John’s keys signed by other > > developers to strengthen their web of trust, and the signatures on those > > keys have been uploaded to the SKS key server (hopefully they have > > recovered somewhat). > > > > The address of the key server is: hkps://hkps.pool.sks-keyservers.net< > > http://hkps.pool.sks-keyservers.net> > > > > The folks that are CC’d on this list, if you can, at a minimum, do the > > following: > > > > 1. Create a GPG signing key, you should have done this for signing your > > git commits in any case per the previously sent email containing > > instructions on signing git commits. The email text is below my > salutation > > for your reference. > > > > 2. Using that signing key, take it’s public key fingerprint > > https://www.apache.org/dev/openpgp.html#find-key-id-with-fingerprint and > > update your https://id.apache.org profile to include your public key. > > > > 3. Pull down the following public keys from the Key Server at: hkps:// > > hkps.pool.sks-keyservers.net<http://hkps.pool.sks-keyservers.net>. You > > can do with any GPG Win or Mac client. Kealan is on Linux and can give > you > > help if needed. You can search on the key’s fingerprint to make sure you > > are pulling down the right one. > > > > - Brian Spector (I have two keys): > > 0A45 9DA3 BCDB 6FC0 BAF2 6395 A89D 5CEC 2BF1 B012 > > C99A AC81 0E56 3F5E BA2D A1E1 1485 BC9C 64DF 811C > > > > - Chris Morris > > 740E 0DDE 3E53 4774 D7BE BB73 3246 C7FA 219E 5A39 > > > > - Howard Kitto > > 8521 0EC8 B145 174B DFC4 5694 4A7E 0C95 773A C2C4 > > > > - Stanislav Mihaylov > > EBAA B352 00E3 2DB6 4441 B5F4 03BA 3A7C B1D4 64CA > > > > - Kealan McCusker > > 0188 A1FB 0A3D F335 B7A1 B334 FEC7 E31C C347 F69F > > > > - Emir Uzeirbegovic > > 8098 43C0 72A7 9266 AF9E B0F6 743B 16FF B67C 6E8A > > > > - Milagro Security Advisory Public Key > > 8098 43C0 72A7 9266 AF9E B0F6 743B 16FF B67C 6E8A > > > > > > OR, simply import the attached keys into your GPG client. > > > > I have digitally SMIME signed this email so you know it came from me (as > > much as we trust SMIME, not much, but better than nothing). > > > > 4. Optionally, if you feel comfortable doing so, please sign our public > > keys with your git commit signing key, and upload the public keys you > > signed back to the SKS key server at: kps://hkps.pool.sks-keyservers.net > < > > http://hkps.pool.sks-keyservers.net> > > > > 5. CRITICALLY: Please send us your key fingerprint or public keys (make > > sure you sign the email when sending over a public key through email so > we > > can check the signature). This is so we can add your public keys to the > > release’s ‘keys’ file. > > > > Thanks > > Brian > > > > > > — > > > > On 2 Jul 2019, at 13:18, Brian Spector wrote: > > > > > Hi All, > > > > > > We’ve had some watercolor discussions about the SKS key server debacle > > and this got everyone thinking about how important it is to digitally > sign > > our git commits. As releases also need to be digitally signed. > > > > > > Chris, Howard and I are doing this, John is getting setup to do this > and > > it would be great if the rest of the contrib squad (Giorgio, Alessandro, > > Patrick, etc.) did this as well. > > > > > > You can see the ‘verified’ badge next to the commit message here as an > > example: > > https://github.com/apache/incubator-milagro/commits/website/newREADME > > > > > > In short, what we are worried about is that a someone could get access > > to a GitHub account (even an internal compromise of GitHub) and change > > Milagro’s code to somehow inject a vulnerability. > > > > > > Given that this code is performing trusted cryptographic operations, I > > think we should implement a rule for the project that basically states > past > > July 4th, PPMC will approve no git feature branch merges into the develop > > branches on any repo unless all git commits we’re signed by a ‘Verified’ > > digital signing key. This will add confidence for users of the code base. > > > > > > GitHub takes care of the key verification by making sure the ID you > have > > created that is attached to the key (example: brianspec...@apache.org > > <mailto:brianspec...@apache.org>) is an email that you as the GitHub > user > > have entered in as a verified email here: > > https://github.com/settings/emails > > > > > > If you go to this section on the GitHub site in settings: > > https://github.com/settings/emails you are able to add your own GPG key. > > Again, make sure the ID is one that GitHub has on file per above. > > > > > > The instructions for telling GitHub about your signing key are here: > > https://help.github.com/en/articles/telling-git-about-your-signing-key > > > > > > You then need to configure git to always sign your commits, which is > > easy, just follow this instruction. It took me all of 15 minutes to set > > this up. > > > > > > > > > https://medium.com/@rwbutler/signing-commits-using-gpg-on-macos-7210362d15 > > > > > > This is a really easy thing to setup and once you have done it, you can > > use the signing key to sign other contributors signing keys as Apache > likes > > everyone to create a web of trust around the project. > > > > > > I know not every project has this rule, but we, as a security project, > > have higher standards. > > > > > > VOTE: > > > > > > Motion: All committers committing code, and any non-committer code > > coming from any merge request, (OTHER THAN DEPENDENCIES) must be GPG > signed > > by a GitHub verified key. > > > > > > The vote will be open for at least 72 hours. > > > [ ] +1 Approve the motion to make mandatory GPG signing of git commits > > > [ ] +0 No opinion > > > [ ] -1 Do not Approve > > > > > > If you vote not to approve, please state why. Or, start a discussion on > > why we shouldn’t do this given the upsides and low barrier for anyone to > > setup. > > > > > > Thanks > > > Brian > > > > > > > > -- > > Life is a chess game - Anonymous. > > > > > > -- > > Life is a chess game - Anonymous. > > >