public inbox for linux-media@vger.kernel.org
 help / color / mirror / Atom feed
From: Laurent Pinchart <laurent.pinchart@ideasonboard.com>
To: Hans Verkuil <hverkuil@xs4all.nl>
Cc: "Sakari Ailus" <sakari.ailus@linux.intel.com>,
	linux-media@vger.kernel.org,
	"Kieran Bingham" <kieran.bingham@ideasonboard.com>,
	"Nicolas Dufresne" <nicolas@ndufresne.ca>,
	"Benjamin Gaignard" <benjamin.gaignard@collabora.com>,
	"Hidenori Kobayashi" <hidenorik@chromium.org>,
	"Paul Kocialkowski" <paul.kocialkowski@bootlin.com>,
	"Jacopo Mondi" <jacopo@jmondi.org>,
	"Ricardo Ribalda" <ribalda@chromium.org>,
	"Maxime Ripard" <maxime@cerno.tech>,
	"Daniel Scally" <djrscally@gmail.com>,
	"Jernej Škrabec" <jernej.skrabec@gmail.com>,
	"Dave Stevenson" <dave.stevenson@raspberrypi.com>,
	"Philipp Zabel" <p.zabel@pengutronix.de>
Subject: Re: [ANN] Media Summit at ELCE Dublin, September 12: Draft Agenda V2
Date: Wed, 7 Sep 2022 13:06:49 +0300	[thread overview]
Message-ID: <YxhtOfpRhrxQCeGZ@pendragon.ideasonboard.com> (raw)
In-Reply-To: <34f930db-db94-b134-4a1d-b9586e5b54be@xs4all.nl>

On Wed, Sep 07, 2022 at 11:58:29AM +0200, Hans Verkuil wrote:
> On 07/09/2022 11:51, Laurent Pinchart wrote:
> > On Wed, Sep 07, 2022 at 08:51:48AM +0200, Hans Verkuil wrote:
> >> On 05/09/2022 16:44, Laurent Pinchart wrote:
> >>> On Mon, Sep 05, 2022 at 01:41:11PM +0000, Sakari Ailus wrote:
> >>>> On Tue, Aug 23, 2022 at 12:53:44PM +0200, Hans Verkuil wrote:
> >>>>> 16:45-18:00 Anything else?
> >>>>
> >>>> I think it'd be great to have a GPG key signing party at the end of the
> >>>> meeting.
> >>>
> >>> It's a good idea. Could everybody please send their GPG key fingerprint
> >>> in an e-mail reply to prepare for that ? It can easily be retrieved with
> >>> 'gpg -K' (make sure to pick the right key if you have multiple of them).
> >>> I'll start:
> >>>
> >>> sec   rsa4096/0xF045C2B96991256E 2014-10-09 [C]
> >>>       94231B980100EC619AC10E10F045C2B96991256E
> >>> uid                   [ultimate] Laurent Pinchart <laurent.pinchart@ideasonboard.com>
> >>>
> >>> If you're generating a key for the occasion, create a primary key with
> >>> the Certify (C) capability only, and create separate sub-keys for
> >>> Signature (S) and Encryption (E). There's little reason these days to
> >>> use less than 4096 bits for the primary key if you opt for RSA. The
> >>> subkeys should have an expiration date.
> >>>
> >>> The primary key can then be moved to safe storage, you will only need
> >>> the subkeys for daily usage.  The primary key will be used only to
> >>> create new subkeys and to sign other people's keys.
> >>>
> >>
> >> Can you also give instructions on what to do at the key signing party?
> >>
> >> I do this so rarely that I always forget what magic gpg commands I need
> >> to make to sign keys.
> >>
> >> If everyone has this information at hand, then we can quickly proceed with
> >> this on Monday.
> > 
> > Good point.
> > 
> > First of all, everybody should make sure that their key is published on
> > key servers.
> 
> Which key servers? That's never been clear to me: which key server(s) are
> you supposed to use?

They are supposed to mirror each other, so any of the main ones should
do. hkp://keys.gnupg.net, hkp://pgp.mit.edu, hkps://keys.openpgp.org,
hkp://keyserver.ubuntu.com, ...

> > I will gather al the keys and print a list that I will hand out to
> > everybody on Monday. This will be the authoritative source of
> > information, as anything stored in digital form could theoritically be
> > tampered with.
> > 
> > We will go around the table, and everybody will check that their key ID
> > matches the printed documented (to make sure I haven't tampered with the
> > printed version they have received), and read it out loud for everybody
> > to compare with their own printed version (to make sure I've distributed
> > the same version to everybody). If any mismatch is noticed, people are
> > expected to shout out loud.
> > 
> > Then we will verify identities. If we have a laptop with a webcam that
> > can be hooked up to a projector, we can simply take turns and show a
> > government-issues ID that clearly displays our name, for people in the
> > room to compare that with the keys. Once the fingerprints and the
> > identities are checked, the corresponding keys should be marked as
> > verified on the paper version.
> > 
> > The next step is to sign keys. This is something that will happen after
> > the media summit, and if you have your master key on offline storage,
> > will happen after you get back home. You will need to download keys from
> > key servers, verify that the fingerprints match the paper version and
> > sign the keys.
> > 
> > The final step is to publish signatures. I'll try to check what the
> > latest best practices are. One option is to simply publish the
> > signatures to key servers, but we can also mail them to the key owner,
> > in an encrypted e-mail to make sure the recipient is the intended
> > person.

-- 
Regards,

Laurent Pinchart

  reply	other threads:[~2022-09-07 10:07 UTC|newest]

Thread overview: 29+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-08-23 10:53 [ANN] Media Summit at ELCE Dublin, September 12: Draft Agenda V2 Hans Verkuil
2022-08-24 18:13 ` Nicolas Dufresne
2022-08-25 14:29   ` Nicolas Dufresne
2022-09-05 13:41 ` Sakari Ailus
2022-09-05 14:44   ` Laurent Pinchart
2022-09-05 14:56     ` Ricardo Ribalda
2022-09-05 15:08       ` Jernej Škrabec
2022-09-06  6:58     ` Hans Verkuil
2022-09-07  6:51     ` Hans Verkuil
2022-09-07  7:44       ` Sakari Ailus
2022-09-07  9:51       ` Laurent Pinchart
2022-09-07  9:58         ` Hans Verkuil
2022-09-07 10:06           ` Laurent Pinchart [this message]
2022-09-07 10:30             ` Hans Verkuil
2022-09-07 11:53               ` Maxime Ripard
2022-09-07  7:36     ` Sakari Ailus
2022-09-07  7:44       ` Laurent Pinchart
2022-09-07 12:01         ` Sakari Ailus
2022-09-07 11:53     ` Maxime Ripard
2022-09-30 20:46       ` Maxime Ripard
2022-09-30 20:52         ` Laurent Pinchart
2022-10-01 10:07           ` Maxime Ripard
2022-10-03  0:20             ` Laurent Pinchart
2022-10-10  8:26               ` Maxime Ripard
2022-09-07 12:46     ` Kieran Bingham
2022-09-08  8:47       ` Jacopo Mondi
2022-09-10  4:23     ` Chen-Yu Tsai
2022-09-10 11:18     ` Laurent Pinchart
2022-09-22 22:05   ` Sakari Ailus

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=YxhtOfpRhrxQCeGZ@pendragon.ideasonboard.com \
    --to=laurent.pinchart@ideasonboard.com \
    --cc=benjamin.gaignard@collabora.com \
    --cc=dave.stevenson@raspberrypi.com \
    --cc=djrscally@gmail.com \
    --cc=hidenorik@chromium.org \
    --cc=hverkuil@xs4all.nl \
    --cc=jacopo@jmondi.org \
    --cc=jernej.skrabec@gmail.com \
    --cc=kieran.bingham@ideasonboard.com \
    --cc=linux-media@vger.kernel.org \
    --cc=maxime@cerno.tech \
    --cc=nicolas@ndufresne.ca \
    --cc=p.zabel@pengutronix.de \
    --cc=paul.kocialkowski@bootlin.com \
    --cc=ribalda@chromium.org \
    --cc=sakari.ailus@linux.intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox