that's all i got, i'm sure the other guys that were there can chime in with their experiences (i almost got rajiv to ride piggy back ... maybe next year)

key word is _almost_ ...

several (but unfortunately not all) of the devs verified gpg key fingerprints. those of you who did should now sign keys. <http:// dev.gentoo.org/~rajiv/LWE2006Boston/> has instructions.


wolf31o2 and i also had an interesting conversation with david shaw of the gpg project. apparently gpg 1.4.3 has a some new features to automatically pull public keys from an ldap server or a dns zone based on a uid. this might solve the problem of how to distribute devs' public keys with portage and manifest signing. if we setup a publicly accessible ldap server with the proper schema at ldap:// keys.gentoo.org/ then properly configured gpg setups will automatically download keys as needed.

here is the relevant note from the gnupg 1.4.3 announce email:

    * New auto-key-locate option that takes an ordered list of methods
      to locate a key if it is not available at encryption time (-r or
      --recipient).  Possible methods include "cert" (use DNS CERT as
      per RFC2538bis, "pka" (use DNS PKA), "ldap" (consult the LDAP
      server for the domain in question), "keyserver" (use the
      currently defined keyserver), as well as arbitrary keyserver
      URIs that will be contacted for the key.

    * Able to retrieve keys using DNS CERT records as per RFC-2538bis
      (currently in draft): http://www.josefsson.org/rfc2538bis

--
[email protected] mailing list

Reply via email to