Return-Path: X-Original-To: apmail-incubator-general-archive@www.apache.org Delivered-To: apmail-incubator-general-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 32AA2D272 for ; Mon, 15 Oct 2012 18:08:28 +0000 (UTC) Received: (qmail 45864 invoked by uid 500); 15 Oct 2012 18:08:27 -0000 Delivered-To: apmail-incubator-general-archive@incubator.apache.org Received: (qmail 45724 invoked by uid 500); 15 Oct 2012 18:08:27 -0000 Mailing-List: contact general-help@incubator.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: general@incubator.apache.org Delivered-To: mailing list general@incubator.apache.org Received: (qmail 45710 invoked by uid 99); 15 Oct 2012 18:08:27 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 15 Oct 2012 18:08:27 +0000 X-ASF-Spam-Status: No, hits=0.7 required=5.0 tests=SPF_NEUTRAL,WEIRD_PORT X-Spam-Check-By: apache.org Received-SPF: neutral (nike.apache.org: local policy) Received: from [216.119.133.2] (HELO a2s42.a2hosting.com) (216.119.133.2) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 15 Oct 2012 18:08:19 +0000 Received: from 71-217-73-181.tukw.qwest.net ([71.217.73.181]:32947 helo=Astraendo) by a2s42.a2hosting.com with esmtpa (Exim 4.77) (envelope-from ) id 1TNp52-00253q-8i for general@incubator.apache.org; Mon, 15 Oct 2012 14:07:56 -0400 Reply-To: From: "Dennis E. Hamilton" To: References: In-Reply-To: Subject: RE: key signing Date: Mon, 15 Oct 2012 11:07:56 -0700 Message-ID: <004401cdab00$017de530$0479af90$@apache.org> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Mailer: Microsoft Outlook 14.0 Content-Language: en-us Thread-index: AQG2VGgRTYEyxooaYPD8V1D+NVOSCQHOLgZAl9q5/NA= X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - a2s42.a2hosting.com X-AntiAbuse: Original Domain - incubator.apache.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - apache.org X-Virus-Checked: Checked by ClamAV on apache.org @Benson There are two things that can be done, with (2) being what matters to you, it seems to me: 1. The committer can upload the fingerprint-associated public key to the PGP Global Directory at . That will initiate an e-mail verification for every e-mail=20 in the pubkey record (cert for short). The procedure and its risks are described in the Key Verification Policy,=20 . =20 The key will not be published on that server until the e-mail=20 verification occurs. It will there be countersigned by the PGP=20 Global Directory Verification Key. Note that there is a=20 revocation procedure and revocation (i.e., removal from that=20 directory) will happen if one of the periodic e-mail=20 confirmations fails. Here's an example of how those counter-signings show up: = The e-mail verification is vulnerable (as described in the Key=20 Verification Policy) in much the same way that Apache credentials=20 and Account records are vulnerable with respect to the use of=20 e-mail association as authentication. 2. In conjunction with checking for the key at (1), or independently,=20 the advice from the PGP folk is that an independent means of=20 identity agreement should be employed. So long as you have a=20 way of doing that, and the other party can confirms that is the=20 public key for which they possess the secret key, it seems=20 appropriate to countersign the public key. =20 Technically, this should not rely on the e-mail address. Use a=20 different channel whereby the committer confirms identity, including having or knowing something that satisfies you. Since you can be confident about your own public key, have the party send you an encrypted message that satisfies you=20 concerning the identity of the originator. That message plaintext=20 could also be signed by the party, demonstrating their possession=20 of the private key for the pubkey in question. =20 The odd thing about the WoT is that it depends on how much *you*=20 are considered dependable in verifying the cert creator's identity.=20 Each inspector of the committer certificate determines their own trust of the counter-signing signatures (whether by WoT transitivity rules or their own personal knowledge/trust).=20 -- Dennis=20 Since I dropped in on this thread, I went through the key registration=20 process for a unique key that only has orcmid@ a.o as the associated=20 e-mail. The public key was put wherever the Gnu Privacy Assistant puts=20 them. I uploaded the public key to the MIT PGP key server myself. =20 I also went through the PGP Global Directory verification procedure. I put the fingerprint in my Apache Account record and a version of the cert magically appeared at=20 . (I'm not sure where this is fetched from, so I'm not sure how counter-signed versions show up.) I am continuing to experiment. -----Original Message----- From: Benson Margulies [mailto:bimargulies@gmail.com]=20 Sent: Monday, October 15, 2012 05:46 To: general@incubator.apache.org Subject: Re: key signing Now I have a practical problem. I've received email from a committer on a project. I have met him in person -- some years ago. I helped him get started at Apache. His fellow PMC members are telling him that it's *necessary* for him to come up with one or more signatures on his key to act at an RM. Choices: 1) send email to him and his PMC fellows, referencing this thread, as evidence that key signing is nice but optional. 2) go ahead and sign his key based on simple email. I'm a very bad paranoid; I'm not interested in the idea that some person out there is anxious to undermine Apache and has captured one or both or our gmail accounts, or is acting as an MITM. I have plenty of writing-style evidence that this email address disgorges communications from him. 3) Engage in some more or less baroque protocol involving skype or carrier pigeons. Anyone care to try to tell me what to do? My views are colored by my, and his, complete disinterest in the WoT outside of its use at Apache, and my conviction that I do, indeed, know that this key is under the control of a particular person who signed a CLA and got voted in as a committer of a particular project. --------------------------------------------------------------------- To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org For additional commands, e-mail: general-help@incubator.apache.org --------------------------------------------------------------------- To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org For additional commands, e-mail: general-help@incubator.apache.org