From: Laurent Pinchart <laurent.pinchart@ideasonboard.com>
To: Hans Verkuil <hverkuil@xs4all.nl>
Cc: "Sakari Ailus" <sakari.ailus@linux.intel.com>,
linux-media@vger.kernel.org,
"Kieran Bingham" <kieran.bingham@ideasonboard.com>,
"Nicolas Dufresne" <nicolas@ndufresne.ca>,
"Benjamin Gaignard" <benjamin.gaignard@collabora.com>,
"Hidenori Kobayashi" <hidenorik@chromium.org>,
"Paul Kocialkowski" <paul.kocialkowski@bootlin.com>,
"Jacopo Mondi" <jacopo@jmondi.org>,
"Ricardo Ribalda" <ribalda@chromium.org>,
"Maxime Ripard" <maxime@cerno.tech>,
"Daniel Scally" <djrscally@gmail.com>,
"Jernej Škrabec" <jernej.skrabec@gmail.com>,
"Dave Stevenson" <dave.stevenson@raspberrypi.com>,
"Philipp Zabel" <p.zabel@pengutronix.de>
Subject: Re: [ANN] Media Summit at ELCE Dublin, September 12: Draft Agenda V2
Date: Wed, 7 Sep 2022 13:06:49 +0300 [thread overview]
Message-ID: <YxhtOfpRhrxQCeGZ@pendragon.ideasonboard.com> (raw)
In-Reply-To: <34f930db-db94-b134-4a1d-b9586e5b54be@xs4all.nl>
On Wed, Sep 07, 2022 at 11:58:29AM +0200, Hans Verkuil wrote:
> On 07/09/2022 11:51, Laurent Pinchart wrote:
> > On Wed, Sep 07, 2022 at 08:51:48AM +0200, Hans Verkuil wrote:
> >> On 05/09/2022 16:44, Laurent Pinchart wrote:
> >>> On Mon, Sep 05, 2022 at 01:41:11PM +0000, Sakari Ailus wrote:
> >>>> On Tue, Aug 23, 2022 at 12:53:44PM +0200, Hans Verkuil wrote:
> >>>>> 16:45-18:00 Anything else?
> >>>>
> >>>> I think it'd be great to have a GPG key signing party at the end of the
> >>>> meeting.
> >>>
> >>> It's a good idea. Could everybody please send their GPG key fingerprint
> >>> in an e-mail reply to prepare for that ? It can easily be retrieved with
> >>> 'gpg -K' (make sure to pick the right key if you have multiple of them).
> >>> I'll start:
> >>>
> >>> sec rsa4096/0xF045C2B96991256E 2014-10-09 [C]
> >>> 94231B980100EC619AC10E10F045C2B96991256E
> >>> uid [ultimate] Laurent Pinchart <laurent.pinchart@ideasonboard.com>
> >>>
> >>> If you're generating a key for the occasion, create a primary key with
> >>> the Certify (C) capability only, and create separate sub-keys for
> >>> Signature (S) and Encryption (E). There's little reason these days to
> >>> use less than 4096 bits for the primary key if you opt for RSA. The
> >>> subkeys should have an expiration date.
> >>>
> >>> The primary key can then be moved to safe storage, you will only need
> >>> the subkeys for daily usage. The primary key will be used only to
> >>> create new subkeys and to sign other people's keys.
> >>>
> >>
> >> Can you also give instructions on what to do at the key signing party?
> >>
> >> I do this so rarely that I always forget what magic gpg commands I need
> >> to make to sign keys.
> >>
> >> If everyone has this information at hand, then we can quickly proceed with
> >> this on Monday.
> >
> > Good point.
> >
> > First of all, everybody should make sure that their key is published on
> > key servers.
>
> Which key servers? That's never been clear to me: which key server(s) are
> you supposed to use?
They are supposed to mirror each other, so any of the main ones should
do. hkp://keys.gnupg.net, hkp://pgp.mit.edu, hkps://keys.openpgp.org,
hkp://keyserver.ubuntu.com, ...
> > I will gather al the keys and print a list that I will hand out to
> > everybody on Monday. This will be the authoritative source of
> > information, as anything stored in digital form could theoritically be
> > tampered with.
> >
> > We will go around the table, and everybody will check that their key ID
> > matches the printed documented (to make sure I haven't tampered with the
> > printed version they have received), and read it out loud for everybody
> > to compare with their own printed version (to make sure I've distributed
> > the same version to everybody). If any mismatch is noticed, people are
> > expected to shout out loud.
> >
> > Then we will verify identities. If we have a laptop with a webcam that
> > can be hooked up to a projector, we can simply take turns and show a
> > government-issues ID that clearly displays our name, for people in the
> > room to compare that with the keys. Once the fingerprints and the
> > identities are checked, the corresponding keys should be marked as
> > verified on the paper version.
> >
> > The next step is to sign keys. This is something that will happen after
> > the media summit, and if you have your master key on offline storage,
> > will happen after you get back home. You will need to download keys from
> > key servers, verify that the fingerprints match the paper version and
> > sign the keys.
> >
> > The final step is to publish signatures. I'll try to check what the
> > latest best practices are. One option is to simply publish the
> > signatures to key servers, but we can also mail them to the key owner,
> > in an encrypted e-mail to make sure the recipient is the intended
> > person.
--
Regards,
Laurent Pinchart
next prev parent reply other threads:[~2022-09-07 10:07 UTC|newest]
Thread overview: 29+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-08-23 10:53 [ANN] Media Summit at ELCE Dublin, September 12: Draft Agenda V2 Hans Verkuil
2022-08-24 18:13 ` Nicolas Dufresne
2022-08-25 14:29 ` Nicolas Dufresne
2022-09-05 13:41 ` Sakari Ailus
2022-09-05 14:44 ` Laurent Pinchart
2022-09-05 14:56 ` Ricardo Ribalda
2022-09-05 15:08 ` Jernej Škrabec
2022-09-06 6:58 ` Hans Verkuil
2022-09-07 6:51 ` Hans Verkuil
2022-09-07 7:44 ` Sakari Ailus
2022-09-07 9:51 ` Laurent Pinchart
2022-09-07 9:58 ` Hans Verkuil
2022-09-07 10:06 ` Laurent Pinchart [this message]
2022-09-07 10:30 ` Hans Verkuil
2022-09-07 11:53 ` Maxime Ripard
2022-09-07 7:36 ` Sakari Ailus
2022-09-07 7:44 ` Laurent Pinchart
2022-09-07 12:01 ` Sakari Ailus
2022-09-07 11:53 ` Maxime Ripard
2022-09-30 20:46 ` Maxime Ripard
2022-09-30 20:52 ` Laurent Pinchart
2022-10-01 10:07 ` Maxime Ripard
2022-10-03 0:20 ` Laurent Pinchart
2022-10-10 8:26 ` Maxime Ripard
2022-09-07 12:46 ` Kieran Bingham
2022-09-08 8:47 ` Jacopo Mondi
2022-09-10 4:23 ` Chen-Yu Tsai
2022-09-10 11:18 ` Laurent Pinchart
2022-09-22 22:05 ` Sakari Ailus
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=YxhtOfpRhrxQCeGZ@pendragon.ideasonboard.com \
--to=laurent.pinchart@ideasonboard.com \
--cc=benjamin.gaignard@collabora.com \
--cc=dave.stevenson@raspberrypi.com \
--cc=djrscally@gmail.com \
--cc=hidenorik@chromium.org \
--cc=hverkuil@xs4all.nl \
--cc=jacopo@jmondi.org \
--cc=jernej.skrabec@gmail.com \
--cc=kieran.bingham@ideasonboard.com \
--cc=linux-media@vger.kernel.org \
--cc=maxime@cerno.tech \
--cc=nicolas@ndufresne.ca \
--cc=p.zabel@pengutronix.de \
--cc=paul.kocialkowski@bootlin.com \
--cc=ribalda@chromium.org \
--cc=sakari.ailus@linux.intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox