Re: key signing

2012-10-16 Thread Noah Slater
On Mon, Oct 15, 2012 at 1:46 PM, Benson Margulies bimargul...@gmail.comwrote: 1) send email to him and his PMC fellows, referencing this thread, as evidence that key signing is nice but optional. This seems like the most sensible option. AFAIK, signed keys have never been required to sign

Re: key signing

2012-10-16 Thread Noah Slater
It had to be done, given this thread's epic proportions... ;) [image: Identity] http://xkcd.com/1121/ On Fri, Oct 5, 2012 at 1:04 PM, Benson Margulies bimargul...@gmail.comwrote: I'm offering this discussion here, but it might need to go elsewhere if it goes anywhere at all. It seems to me

Re: key signing

2012-10-15 Thread Benson Margulies
Now I have a practical problem. I've received email from a committer on a project. I have met him in person -- some years ago. I helped him get started at Apache. His fellow PMC members are telling him that it's *necessary* for him to come up with one or more signatures on his key to act at an RM.

Re: key signing

2012-10-15 Thread Nick Burch
On Mon, 15 Oct 2012, Benson Margulies wrote: Choices: There is another option, which I mentioned in the other key signing thread on members@, which applies equally here too. Reposting my answer from there, with a few tweaks... In-person keysigning doesn't just have to be at ApacheCons,

Re: key signing

2012-10-15 Thread Marvin Humphrey
On Mon, Oct 15, 2012 at 5:46 AM, Benson Margulies bimargul...@gmail.com wrote: Now I have a practical problem. I've received email from a committer on a project. I have met him in person -- some years ago. I helped him get started at Apache. His fellow PMC members are telling him that it's

Re: key signing

2012-10-15 Thread Marvin Humphrey
On Mon, Oct 15, 2012 at 6:02 AM, Nick Burch apa...@gagravarr.org wrote: So, for a short-term fix for your potential Release Manger, I'd suggest you get them in touch with a nearby local mentor. Why is raising the barrier to entry for new Release Managers better than having multiple experienced

RE: key signing

2012-10-15 Thread Dennis E. Hamilton
this is fetched from, so I'm not sure how counter-signed versions show up.) I am continuing to experiment. -Original Message- From: Benson Margulies [mailto:bimargul...@gmail.com] Sent: Monday, October 15, 2012 05:46 To: general@incubator.apache.org Subject: Re: key signing Now I have

Re: key signing

2012-10-15 Thread Daniel Shahaf
Dennis E. Hamilton wrote on Mon, Oct 15, 2012 at 11:07:56 -0700: https://people.apache.org/keys/committer/orcmid.asc. (I'm not sure where this is fetched from, so I'm not sure how counter-signed versions Currently keys.gnupg.net

RE: key signing

2012-10-15 Thread Dennis E. Hamilton
, October 15, 2012 11:22 To: Dennis E. Hamilton Cc: general@incubator.apache.org Subject: Re: key signing Dennis E. Hamilton wrote on Mon, Oct 15, 2012 at 11:07:56 -0700: https://people.apache.org/keys/committer/orcmid.asc. (I'm not sure where this is fetched from, so I'm not sure how counter-signed

Re: key signing

2012-10-11 Thread Peter Karman
Greg Stein wrote on 10/10/12 6:44 PM: I've read this entire thread (whew!), and would actually like to throw out a contrary position: No signed keys. +1 -- Peter Karman . http://peknet.com/ . pe...@peknet.com - To

Re: key signing

2012-10-11 Thread Branko Čibej
On 10.10.2012 00:01, Marvin Humphrey wrote: While this protocol does not rely heavily on validating government-issued IDs, the Debian guidelines quoted above point out that some people object to giving such IDs too much creedence: So instead of giving too much credence to government-issued

Re: key signing

2012-10-11 Thread Nick Kew
On 11 Oct 2012, at 00:44, Greg Stein wrote: Please explain how keys are needed for this ASF release? Consumers are already told to verify the SHA1 and nothing more. I doubt any more is needed. SHA1 offers no more protection than a checksum against MITM attack. (assume secure

Re: key signing

2012-10-11 Thread sebb
On 11 October 2012 02:39, Daniel Shahaf d...@daniel.shahaf.name wrote: Greg Stein wrote on Wed, Oct 10, 2012 at 21:31:30 -0400: Not too much. We still instruct users take the signatures and verify them against blah.apache.org/KEYS. John Blackhat could replace the signatures and install his

Re: key signing

2012-10-11 Thread Noah Slater
On Thu, Oct 11, 2012 at 9:01 AM, Nick Kew n...@apache.org wrote: You have to extend that assumption not only to our infrastructure but to every proxy that might come between us and a user, and that might substitute a trojan along with the trojan's own SHA1. The same reasoning holds for the

Re: key signing

2012-10-11 Thread Noah Slater
On Thu, Oct 11, 2012 at 9:48 AM, sebb seb...@gmail.com wrote: On 11 October 2012 02:39, Daniel Shahaf d...@daniel.shahaf.name wrote: Greg Stein wrote on Wed, Oct 10, 2012 at 21:31:30 -0400: Not too much. We still instruct users take the signatures and verify them against

Re: key signing

2012-10-11 Thread Martijn Dashorst
On Thu, Oct 11, 2012 at 10:57 AM, Noah Slater nsla...@tumbolia.org wrote: Which is why we link to the .md5, .sha, .asc, and KEYS files on our severs. Unless you're assuming a MITM along the request/response path to apache.org, in which case all bets are off anyway. No? Which is why I have my

Re: key signing

2012-10-11 Thread Daniel Shahaf
sebb wrote on Thu, Oct 11, 2012 at 09:48:25 +0100: On 11 October 2012 02:39, Daniel Shahaf d...@daniel.shahaf.name wrote: Greg Stein wrote on Wed, Oct 10, 2012 at 21:31:30 -0400: Not too much. We still instruct users take the signatures and verify them against blah.apache.org/KEYS. John

Re: key signing

2012-10-11 Thread Nick Kew
On 11 Oct 2012, at 13:19, Benson Margulies wrote: Over and above that, we could then ask, 'how could we improve protection against most complex problems?' Now that's something the ASF might indeed be well-qualified to hack. Improved end-user tools (e.g. browser plugins) to take advantage of

RE: key signing

2012-10-11 Thread Dennis E. Hamilton
steps at all, other than pay attention to the warning dialogs that the platform coughs up. -Original Message- From: Benson Margulies [mailto:bimargul...@gmail.com] Sent: Thursday, October 11, 2012 05:20 To: general@incubator.apache.org Subject: Re: key signing Greg having more or less

Re: key signing

2012-10-11 Thread Nick Kew
On 11 Oct 2012, at 09:57, Noah Slater wrote: On Thu, Oct 11, 2012 at 9:01 AM, Nick Kew n...@apache.org wrote: You have to extend that assumption not only to our infrastructure but to every proxy that might come between us and a user, and that might substitute a trojan along with the

RE: key signing

2012-10-11 Thread Dennis E. Hamilton
to checking digital signatures on release candidates and in any subsequent forensic investigation/confirmation. - Dennis -Original Message- From: Dennis E. Hamilton [mailto:orc...@apache.org] Sent: Thursday, October 11, 2012 08:19 To: general@incubator.apache.org Subject: RE: key signing

RE: key signing

2012-10-11 Thread Dennis E. Hamilton
it is noticed is an aspect of WoT that I have not investigated.) -Original Message- From: Nick Kew [mailto:n...@webthing.com] Sent: Thursday, October 11, 2012 06:46 To: general@incubator.apache.org Subject: Re: key signing On 11 Oct 2012, at 09:57, Noah Slater wrote: On Thu, Oct 11

Re: key signing

2012-10-11 Thread Nick Kew
On 11 Oct 2012, at 17:14, Dennis E. Hamilton wrote: @Nick I don't understand the supposed attack vector concerning the file digests being of no value and the WoT being essential. - Dennis ANALYSIS So long as the digest value is obtained from a reliable read-only source, it

Re: key signing

2012-10-11 Thread Marvin Humphrey
On Thu, Oct 11, 2012 at 12:00 AM, Branko Čibej br...@apache.org wrote: So instead of giving too much credence to government-issued IDs, you'd prefer to give credence to a service provided for free by a commercial entity with a conceivable interest in inserting backdoors in software or

Re: key signing

2012-10-11 Thread Marvin Humphrey
On Wed, Oct 10, 2012 at 2:36 PM, Nick Kew n...@apache.org wrote: On 10 Oct 2012, at 17:04, Marvin Humphrey wrote: In my opinion, we have sufficient expertise here at the ASF to devise an authentication protocol whose reliability exceeds that of individuals participating unsupervised in a web

RE: key signing

2012-10-11 Thread Dennis E. Hamilton
factors are you thinking of? (I am not sure how many factors signings by others count as new factors.) - Dennis -Original Message- From: Marvin Humphrey [mailto:mar...@rectangular.com] Sent: Thursday, October 11, 2012 11:46 To: general@incubator.apache.org Subject: Re: key signing On Wed

Re: key signing

2012-10-11 Thread Daniel Shahaf
Marvin Humphrey wrote on Thu, Oct 11, 2012 at 11:46:23 -0700: On Wed, Oct 10, 2012 at 2:36 PM, Nick Kew n...@apache.org wrote: On 10 Oct 2012, at 17:04, Marvin Humphrey wrote: In my opinion, we have sufficient expertise here at the ASF to devise an authentication protocol whose

Re: key signing

2012-10-11 Thread Daniel Shahaf
Marvin Humphrey wrote on Thu, Oct 11, 2012 at 11:46:23 -0700: In my opinion, general@incubator is an appropriate venue to explore ways in which the system can be improved. That will necessarily mean talking about I am sure there are crypto minds in the ASF who aren't on general@incubator.

Re: key signing

2012-10-11 Thread Marvin Humphrey
On Thu, Oct 11, 2012 at 1:29 PM, Daniel Shahaf d...@daniel.shahaf.name wrote: 1) RM prepares tarball, signs, uploads for voting 2) voting passes 3) mentor appends his signature to the .asc file 4) artifacts posted to dist/ That solves the problem for end users until the RM attends a

Re: key signing

2012-10-10 Thread Noah Slater
Can you clarify? I understand that being able to speak to someone face to face, and seeing their mannerisms and expressions, allows you to understand them better. Some deep rooted human thing. But how does this impact security or trust, in the context of key signing? On Wed, Oct 10, 2012 at 4:00

Re: key signing

2012-10-10 Thread Benson Margulies
A different angle. Noah asks me to sign his key. Noah tells me that he's committed it to KEYS for CloudStack in svn revision 314159. I examine that revision and see that it was made by, indeed, noah's Apache ID, which is associated with a particular email address. I send email to secretary@,

Re: key signing

2012-10-10 Thread Nick Kew
On 10 Oct 2012, at 11:25, Benson Margulies wrote: I then feel that it's perfectly reasonable to sign a key that has two things in it: the name Noah Slater and nsla...@apache.org, because if this process doesn't verify an adequate association, then no one can trust the Apache IP process,

Re: key signing

2012-10-10 Thread Benson Margulies
On Wed, Oct 10, 2012 at 6:52 AM, Nick Kew n...@apache.org wrote: On 10 Oct 2012, at 11:25, Benson Margulies wrote: I then feel that it's perfectly reasonable to sign a key that has two things in it: the name Noah Slater and nsla...@apache.org, because if this process doesn't verify an

Re: key signing

2012-10-10 Thread Shane Curcuru
Comments: - For many people, ensuring that the human who holds a specific key is the same one who has been using the j...@doe.foo email address and the john...@apache.org SVN/GIT account over a period of time is what is most important. Less important is ensuring that that human's legal name

Re: key signing - trust path check

2012-10-10 Thread Shane Curcuru
Anyone interested in details of PGP signing and tracing trust paths at the ASF should say thank you to long-time member henkp who has done a ton of work documenting and verifying release signing and keys: https://people.apache.org/~henkp/trust/ - Shane On 10/8/2012 6:37 PM, Noah Slater

Re: key signing

2012-10-10 Thread Ted Dunning
Sent from my iPhone On Oct 10, 2012, at 2:47 AM, Noah Slater nsla...@tumbolia.org wrote: Can you clarify? I understand that being able to speak to someone face to face, and seeing their mannerisms and expressions, allows you to understand them better. Some deep rooted human thing. But how

Re: key signing

2012-10-10 Thread Stephen Connolly
On 10 October 2012 15:20, Ted Dunning ted.dunn...@gmail.com wrote: Sent from my iPhone On Oct 10, 2012, at 2:47 AM, Noah Slater nsla...@tumbolia.org wrote: Can you clarify? I understand that being able to speak to someone face to face, and seeing their mannerisms and expressions, allows

Re: key signing

2012-10-10 Thread Nick Kew
On 10 Oct 2012, at 12:20, Benson Margulies wrote: Nick: On the one hand, how is trusting the Apache process better or worse than trusting the State of Massachusetts? When I sign a key I'm basing it on more information than that. Either it's a one-off, when I have additional knowledge of

Re: key signing

2012-10-10 Thread Florian Holeczek
Hi Benson, A different angle. Noah asks me to sign his key. Noah tells me that he's committed it to KEYS for CloudStack in svn revision 314159. I examine that revision and see that it was made by, indeed, noah's Apache ID, which is associated with a particular email address. I send

Re: key signing

2012-10-10 Thread Marvin Humphrey
On Wed, Oct 10, 2012 at 7:19 AM, Nick Kew n...@webthing.com wrote: On 10 Oct 2012, at 12:20, Benson Margulies wrote: Nick: On the one hand, how is trusting the Apache process better or worse than trusting the State of Massachusetts? When I sign a key I'm basing it on more information than

Re: key signing

2012-10-10 Thread Marvin Humphrey
On Wed, Oct 10, 2012 at 8:11 AM, Florian Holeczek flor...@holeczek.de wrote: However, what would now be totally wrong IMO is, that some guys in the ASF redefine these rules in order to make the process of release signing more simple. In the WoT big picture, this would automatically mean that

RE: key signing

2012-10-10 Thread Dennis E. Hamilton
with the trustworthiness of digital certificates. -Original Message- From: Benson Margulies [mailto:bimargul...@gmail.com] Sent: Wednesday, October 10, 2012 04:20 To: general@incubator.apache.org Subject: Re: key signing I could argue that we'd be better-served with X.509 certs. An Apache CA

RE: key signing

2012-10-10 Thread Dennis E. Hamilton
: Dennis E. Hamilton [mailto:orc...@apache.org] Sent: Wednesday, October 10, 2012 09:28 To: general@incubator.apache.org Subject: RE: key signing [ ... ] I think the fundamental problems are that (1) this trust structure is not widely understood, even among (new) committers, and (2) the process

Re: key signing

2012-10-10 Thread Florian Holeczek
Hi Marvin, On Wed, Oct 10, 2012 at 8:11 AM, Florian Holeczek flor...@holeczek.de wrote: However, what would now be totally wrong IMO is, that some guys in the ASF redefine these rules in order to make the process of release signing more simple. In the WoT big picture, this would automatically

Re: key signing

2012-10-10 Thread Noah Slater
On Wed, Oct 10, 2012 at 3:20 PM, Ted Dunning ted.dunn...@gmail.com wrote: I have friends who live far away. I know them well. I don't know their key fingerprint. If we send emails or if we text back and forth I not clear that it is them. If I have a video conference and the hold up the

Re: key signing

2012-10-10 Thread Noah Slater
I've said it already in this thread, but I will say it one last time before I drop it. Archiving video provides zero benefits, beyond the human to human connection of seeing what somebody looks like. It provides no way to establish identity or ownership of email/keys that email does not already

Re: key signing

2012-10-10 Thread Benson Margulies
Just to be clear, I don't think I've ever signed a key in my life. In part, because this criteria seem impossibly mushy. - To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org For additional commands, e-mail:

Re: key signing

2012-10-10 Thread Noah Slater
Most people develop their own key signing policy and publish it. Or organisations as a whole do, and ask their members to adhere to it. Something which we might want to consider formalising. On Wed, Oct 10, 2012 at 10:18 PM, Benson Margulies bimargul...@gmail.comwrote: Just to be clear, I don't

Re: key signing - trust path check

2012-10-10 Thread Noah Slater
This is awesome! Unfortunately I (61D50B88) am not in the strong set. Bummer. :( On Wed, Oct 10, 2012 at 2:43 PM, Shane Curcuru a...@shanecurcuru.org wrote: Anyone interested in details of PGP signing and tracing trust paths at the ASF should say thank you to long-time member henkp who has

Re: key signing

2012-10-10 Thread Nick Kew
On 10 Oct 2012, at 17:04, Marvin Humphrey wrote: In my opinion, we have sufficient expertise here at the ASF to devise an authentication protocol whose reliability exceeds that of individuals participating unsupervised in a web of trust, particularly if the protocol were to incorporate

Re: key signing

2012-10-10 Thread Greg Stein
I've read this entire thread (whew!), and would actually like to throw out a contrary position: No signed keys. Consider: releases come from the ASF, not a person. The RM builds the release artifacts and checks them into version control along with hash checksums. Other PMC members validate the

Re: key signing

2012-10-10 Thread Ian Holsman
On Oct 11, 2012, at 10:44 AM, Greg Stein gst...@gmail.com wrote: (assume secure Infrastructure) That's a pretty big assumption isn't it? There have been public instances where open source infrastructures have been hacked, and releases have been messed with. I think keys removes the need

Re: key signing

2012-10-10 Thread Daniel Shahaf
Ian Holsman wrote on Thu, Oct 11, 2012 at 10:53:11 +1100: On Oct 11, 2012, at 10:44 AM, Greg Stein gst...@gmail.com wrote: (assume secure Infrastructure) That's a pretty big assumption isn't it? There have been public instances where open source infrastructures have been hacked,

Re: key signing

2012-10-10 Thread Daniel Shahaf
Greg Stein wrote on Wed, Oct 10, 2012 at 19:44:30 -0400: I've read this entire thread (whew!), and would actually like to throw out a contrary position: No signed keys. Consider: releases come from the ASF, not a person. Therefore, releases should be signed by the ASF as an organisation,

Re: key signing

2012-10-10 Thread Greg Stein
On Wed, Oct 10, 2012 at 9:10 PM, Daniel Shahaf d...@daniel.shahaf.name wrote: Greg Stein wrote on Wed, Oct 10, 2012 at 19:44:30 -0400: I've read this entire thread (whew!), and would actually like to throw out a contrary position: No signed keys. Consider: releases come from the ASF, not a

RE: key signing

2012-10-10 Thread Dennis E. Hamilton
though. This is a pretty standard ceremony for an e-mail non-persona. - Dennis -Original Message- From: Greg Stein [mailto:gst...@gmail.com] Sent: Wednesday, October 10, 2012 16:45 To: general@incubator.apache.org Subject: Re: key signing I've read this entire thread (whew

Re: key signing

2012-10-10 Thread Greg Stein
On Wed, Oct 10, 2012 at 7:53 PM, Ian Holsman i...@holsman.com.au wrote: On Oct 11, 2012, at 10:44 AM, Greg Stein gst...@gmail.com wrote: (assume secure Infrastructure) That's a pretty big assumption isn't it? Empirically, we've had break-ins, so we can assume it will happen again. But now

Re: key signing

2012-10-10 Thread Daniel Shahaf
Greg Stein wrote on Wed, Oct 10, 2012 at 21:14:15 -0400: On Wed, Oct 10, 2012 at 9:10 PM, Daniel Shahaf d...@daniel.shahaf.name wrote: Greg Stein wrote on Wed, Oct 10, 2012 at 19:44:30 -0400: I've read this entire thread (whew!), and would actually like to throw out a contrary position:

Re: key signing

2012-10-10 Thread Daniel Shahaf
Greg Stein wrote on Wed, Oct 10, 2012 at 21:31:30 -0400: Not too much. We still instruct users take the signatures and verify them against blah.apache.org/KEYS. John Blackhat could replace the signatures and install his entry into KEYS. If you use https://people.apache.org/keys/ instead of

Re: key signing

2012-10-10 Thread Greg Stein
On Wed, Oct 10, 2012 at 9:35 PM, Daniel Shahaf d...@daniel.shahaf.name wrote: Greg Stein wrote on Wed, Oct 10, 2012 at 21:14:15 -0400: ... My point is that our instructions to users don't really incorporoate the notions of keys, and (thus) provide near-zero utility. For such So, provide

Re: key signing

2012-10-10 Thread Daniel Shahaf
Greg Stein wrote on Wed, Oct 10, 2012 at 21:40:18 -0400: On Wed, Oct 10, 2012 at 9:35 PM, Daniel Shahaf d...@daniel.shahaf.name wrote: Greg Stein wrote on Wed, Oct 10, 2012 at 21:14:15 -0400: ... My point is that our instructions to users don't really incorporoate the notions of keys,

Re: key signing

2012-10-09 Thread Marvin Humphrey
On Mon, Oct 8, 2012 at 2:24 PM, Noah Slater nsla...@tumbolia.org wrote: 1. The key owner convinces the signer that the identity in the UID is indeed their own identity by whatever evidence the signer is willing to accept as convincing. Usually this means the key owner must present a government

Re: key signing

2012-10-09 Thread Noah Slater
What, precisely, does a video call actually provide? The point of meeting in person is to verify photo IDs. Just talking to somebody with a face doesn't prove anybody. I am fairly certain that YOU have a face, and I have never even seen it. If all you're doing is having a chit chat and swapping

Re: key signing

2012-10-09 Thread Ted Dunning
If you know the person, it adds something that you don't get. On Tue, Oct 9, 2012 at 3:40 PM, Noah Slater nsla...@tumbolia.org wrote: What, precisely, does a video call actually provide? The point of meeting in person is to verify photo IDs. Just talking to somebody with a face doesn't prove

RE: key signing

2012-10-08 Thread Franklin, Matthew B.
-Original Message- From: Marvin Humphrey [mailto:mar...@rectangular.com] Sent: Friday, October 05, 2012 8:54 PM To: general@incubator.apache.org Subject: Re: key signing On Fri, Oct 5, 2012 at 8:55 AM, Jukka Zitting jukka.zitt...@gmail.com wrote: It's good to recommend people to get

Re: key signing

2012-10-08 Thread Branko Čibej
On 08.10.2012 13:44, Franklin, Matthew B. wrote: -Original Message- From: Marvin Humphrey [mailto:mar...@rectangular.com] Sent: Friday, October 05, 2012 8:54 PM To: general@incubator.apache.org Subject: Re: key signing On Fri, Oct 5, 2012 at 8:55 AM, Jukka Zitting jukka.zitt

Re: key signing

2012-10-08 Thread Marvin Humphrey
On Mon, Oct 8, 2012 at 7:36 AM, Branko Čibej br...@apache.org wrote: What guarantee do you have that a particular Skype ID is whoever you think it is? None at all, unless the person involved looked at your Skype contact list and said, yeah, that's me. Likewise for Google Hangout. As long as

Re: key signing

2012-10-08 Thread Branko Čibej
On 08.10.2012 17:43, Marvin Humphrey wrote: On Mon, Oct 8, 2012 at 7:36 AM, Branko Čibej br...@apache.org wrote: What guarantee do you have that a particular Skype ID is whoever you think it is? None at all, unless the person involved looked at your Skype contact list and said, yeah, that's

Re: key signing

2012-10-08 Thread Benson Margulies
On Mon, Oct 8, 2012 at 11:43 AM, Marvin Humphrey mar...@rectangular.com wrote: On Mon, Oct 8, 2012 at 7:36 AM, Branko Čibej br...@apache.org wrote: What guarantee do you have that a particular Skype ID is whoever you think it is? None at all, unless the person involved looked at your Skype

RE: key signing

2012-10-08 Thread Dennis E. Hamilton
@incubator.apache.org Subject: Re: key signing [ ... ] In my opinion, that's vanishingly unlikely, and so the best we can do is to allow users to verify that the signature was, in fact, made by the 'Apache hat' that it claimed to be made by. Using the keys in KEYS, or the fingerprints from LDAP

Re: key signing

2012-10-08 Thread Benson Margulies
-Original Message- From: Benson Margulies [mailto:bimargul...@gmail.com] Sent: Monday, October 08, 2012 08:54 To: general@incubator.apache.org Subject: Re: key signing [ ... ] In my opinion, that's vanishingly unlikely, and so the best we can do is to allow users to verify that the signature

Re: key signing

2012-10-08 Thread Ted Dunning
On Mon, Oct 8, 2012 at 4:53 PM, Benson Margulies bimargul...@gmail.comwrote: On Mon, Oct 8, 2012 at 11:43 AM, Marvin Humphrey mar...@rectangular.com wrote: ... In this respect e-mail is just as secure, so why don't we all just sign keys because someone claiming to be from from Chad sent

Re: key signing

2012-10-08 Thread Marvin Humphrey
On Mon, Oct 8, 2012 at 8:51 AM, Branko Čibej br...@apache.org wrote: It says clearly, as long as you can guarantee that you are communicating with the key's true owner. Which was exactly my point. I assert a virtual key-signing party protocol incorportating Google Plus Hangouts could offer

Re: key signing

2012-10-08 Thread Ted Dunning
On Mon, Oct 8, 2012 at 7:46 PM, Marvin Humphrey mar...@rectangular.comwrote: On Mon, Oct 8, 2012 at 8:51 AM, Branko Čibej br...@apache.org wrote: It says clearly, as long as you can guarantee that you are communicating with the key's true owner. Which was exactly my point. I assert a

Re: key signing

2012-10-08 Thread Noah Slater
On Mon, Oct 8, 2012 at 4:53 PM, Benson Margulies bimargul...@gmail.comwrote: There's another side to this, which I would derisively label, 'so what'? How does it help a user to see that my key is signed by 27 of my fellow Apache contributors, if the user has never met any of us, and has

Re: key signing

2012-10-08 Thread Noah Slater
This is an important point. Debian has a complete toolset and guidelines for managing this. http://www.debian.org/events/keysigning To quote: People should only sign a key under at least two conditions: 1. The key owner convinces the signer that the identity in the UID is indeed their own

Re: key signing

2012-10-08 Thread Benson Margulies
On Mon, Oct 8, 2012 at 5:18 PM, Noah Slater nsla...@tumbolia.org wrote: On Mon, Oct 8, 2012 at 4:53 PM, Benson Margulies bimargul...@gmail.comwrote: There's another side to this, which I would derisively label, 'so what'? How does it help a user to see that my key is signed by 27 of my

Re: key signing

2012-10-08 Thread Noah Slater
Perhaps not Tomcat, but the entire Foundation and all of it's current and future projects should be under consideration here. The long and short of it is that key signing can't hurt. And a key signing guide certainly can't hurt. RMs should feel free to do this, if they are interested in it, and

Re: key signing

2012-10-08 Thread Noah Slater
Caveat: But I do think that if we do have a key signing guide (and I think we should) then it should be strict about our standards. (i.e. when and when not to sign somebody's key. Basic QA on what sort of trust we're trying to build here.) On Mon, Oct 8, 2012 at 11:15 PM, Noah Slater

Re: key signing

2012-10-08 Thread Benson Margulies
On Mon, Oct 8, 2012 at 6:15 PM, Noah Slater nsla...@tumbolia.org wrote: Perhaps not Tomcat, but the entire Foundation and all of it's current and future projects should be under consideration here. The long and short of it is that key signing can't hurt. And a key signing guide certainly can't

Re: key signing

2012-10-08 Thread Benson Margulies
Let's try a little statistically-invalid experiment of sample size one. The last time I had a key signed at Apache, it was by Dan Kulp. Now, pretend that you are a suspicious user of one of the many Maven plugins releases that I RM. Can you reach Dan from yourself in the web? Is there anyone you,

Re: key signing

2012-10-08 Thread Noah Slater
I don't know how to check that. Heh. Would be interested in giving it a shot. Are there tools to look up graphs? On Mon, Oct 8, 2012 at 11:23 PM, Benson Margulies bimargul...@gmail.comwrote: Let's try a little statistically-invalid experiment of sample size one. The last time I had a key

Re: key signing

2012-10-08 Thread Noah Slater
Found one... Just poking around manually... J. Daniel Kulp dk...@apache.org http://pgp.mit.edu:11371/pks/lookup?op=vindexsearch=0x858FC4C4F43856A3 Signed by Carsten Ziegeler cziege...@apache.org http://pgp.mit.edu:11371/pks/lookup?op=vindexsearch=0x132E49D4E41EDC7E Signed by Marcus Crafter

Re: key signing - issues

2012-10-07 Thread Shane Curcuru
On 10/5/2012 8:04 AM, Benson Margulies wrote:... As far as I can see, we don't do anything to facilitate or encourage getting PGP keys signed. We tell people to create a key and put it in the SVN 'keys' file. Key signing strikes me as a bit of a conundrum for us. In all other respects, we

Re: key signing - issues

2012-10-07 Thread Benson Margulies
Shane, After reading all the responses, I'm no longer very interested in pushing the idea of key signing. I am much more interested in explaining to users the existence and use of the LDAP keys. We can explain: If something is signed with a key associated with an Apache committer via the Apache

RE: key signing - issues

2012-10-07 Thread Dennis E. Hamilton
- From: Benson Margulies [mailto:bimargul...@gmail.com] Sent: Sunday, October 07, 2012 08:32 To: general@incubator.apache.org Subject: Re: key signing - issues Shane, After reading all the responses, I'm no longer very interested in pushing the idea of key signing. I am much more interested

Re: key signing

2012-10-05 Thread Daniel Shahaf
Benson Margulies wrote on Fri, Oct 05, 2012 at 08:04:04 -0400: Alternatively, since the chain is CLA - svn access - unsigned key in svn, perhaps all we really need is to document that a signature corresponding to a key in svn is really good enough, and users need not be concerned further.

Re: key signing

2012-10-05 Thread Florian Holeczek
Daniel Shahaf wrote on 05.10.2012 at 15:15: Benson Margulies wrote on Fri, Oct 05, 2012 at 08:04:04 -0400: Alternatively, since the chain is CLA - svn access - unsigned key in svn, perhaps all we really need is to document that a signature corresponding to a key in svn is really good enough,

Re: key signing

2012-10-05 Thread Jukka Zitting
HI, On Fri, Oct 5, 2012 at 3:15 PM, Daniel Shahaf d...@daniel.shahaf.name wrote: Downloading keys from https://www.apache.org/dist/ or https://people.apache.org/keys/ is good enough enough for users who trust root@ and Thawte. +1 It's good to recommend people to get their keys signed by

Re: key signing

2012-10-05 Thread Craig L Russell
Hi Florian, On Oct 5, 2012, at 8:44 AM, Florian Holeczek wrote: if I understood the Apache pseudonym rules right, the only one who would be able to sign such a key was secretary@, since it's the only one who knows the pseudonym's real identity. The ICLA documents are available to all

Re: key signing

2012-10-05 Thread Daniel Shahaf
Craig L Russell wrote on Fri, Oct 05, 2012 at 08:59:26 -0700: Hi Florian, On Oct 5, 2012, at 8:44 AM, Florian Holeczek wrote: if I understood the Apache pseudonym rules right, the only one who would be able to sign such a key was secretary@, since it's the only one who knows the

Re: key signing

2012-10-05 Thread Benson Margulies
On Fri, Oct 5, 2012 at 4:42 PM, Juan Pablo Santos Rodríguez juanpablo.san...@gmail.com wrote: Hi, picking up Benson's initial question, just my 2c: how about encouraging a key signing party (or something alike, but more informal and/or with fewer people) through general@i.a.o for every

Re: key signing

2012-10-05 Thread Daniel Shahaf
Benson Margulies wrote on Fri, Oct 05, 2012 at 17:12:27 -0400: Oh Secretary, why not create a 'role' PGP key and use it? Because it's harder to implement than to state, and no one has identified a need for it. - To unsubscribe,

Re: key signing

2012-10-05 Thread Craig L Russell
Hi Benson, On Oct 5, 2012, at 2:12 PM, Benson Margulies wrote: On Fri, Oct 5, 2012 at 4:42 PM, Juan Pablo Santos Rodríguez juanpablo.san...@gmail.com wrote: Hi, picking up Benson's initial question, just my 2c: how about encouraging a key signing party (or something alike, but more

Re: key signing

2012-10-05 Thread Benson Margulies
Craig, I appreciate the general scheme of signing. It seems as if we have two approaches to key trust. One is the in-person web of trust, and the other is the CLA - account - key-in-ldap/svn. Given the Foundations' emphasis on geographic diversity, the later seems to me to be more appropriate. I

Re: key signing

2012-10-05 Thread Marvin Humphrey
On Fri, Oct 5, 2012 at 8:55 AM, Jukka Zitting jukka.zitt...@gmail.com wrote: It's good to recommend people to get their keys signed by someone in the Apache web of trust and I think we could do more in that area, Maybe if we didn't insist on face-to-face meetings we'd get better adoption rates.

Re: Key signing for shindig packages.

2009-10-05 Thread Upayavira
On Sat, 2009-10-03 at 16:43 +0800, Niclas Hedhman wrote: On Sat, Oct 3, 2009 at 3:34 AM, Paul Lindner lind...@inuus.com wrote: Hi, Over in the shindig podling we've been working on our 1.1 release. During the voting process it was mentioned that my gpg key is not part of the apache web of

Re: Key signing for shindig packages.

2009-10-03 Thread Niclas Hedhman
On Sat, Oct 3, 2009 at 3:34 AM, Paul Lindner lind...@inuus.com wrote: Hi, Over in the shindig podling we've been working on our 1.1 release. During the voting process it was mentioned that my gpg key is not part of the apache web of trust. * We have the +1s for shindig-1.1-BETA3, does this

Re: Key signing practicalities Was: status of PGP support in Maven

2008-09-28 Thread Craig L Russell
Hi Janne, I will be traveling to Helsinki within the next 6 months (probably). If you're on tripit you can watch for my trip (in case I forget for some reason to let you know). Craig On Sep 23, 2008, at 11:36 PM, Janne Jalkanen wrote: So you assume that that www.apache.org can not be

Re: Key signing practicalities Was: status of PGP support in Maven

2008-09-24 Thread Jukka Zitting
Hi, On Wed, Sep 24, 2008 at 8:36 AM, Janne Jalkanen [EMAIL PROTECTED] wrote: Any people near Helsinki, Finland who are willing to have a coffee and sign my key? ;-) I'll be in Helsinki for two weeks after the ApacheCon US. BR, Jukka Zitting

  1   2   >