[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <201110012333.55428.rjw@sisk.pl>
Date: Sat, 1 Oct 2011 23:33:55 +0200
From: "Rafael J. Wysocki" <rjw@...k.pl>
To: "H. Peter Anvin" <hpa@...or.com>
Cc: Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
Greg KH <gregkh@...e.de>
Subject: Re: kernel.org status: establishing a PGP web of trust
Hi,
On Saturday, October 01, 2011, H. Peter Anvin wrote:
> Hi all,
>
> Since the kernel.org status announcement last week a number of you
> have contacted me about re-establishing credentials. In order to
> establish a proper PGP web of trust we need keys that are cross-signed
> by other developers. As such, we ask that you follow the following
> steps:
>
> 1. Make sure your systems are uncompromised. We will address specific
> recommended steps for that in a separate email.
>
> 2. Create a new PGP/GPG key, and also generate a key revocation
> certificate (but don't import it anywhere -- save it for the
> future) for your new key. In the near future we are considering
> setting up an escrow service for key revocation certificates.
>
> I recommend using a 4096-bit RSA key. Given how fast computers are
> these days, there is no reason to use a shorter key. DSA keys
> should be considered obsolete; substantial weaknesses have been
> found in DSA.
>
> $ gpg --gen-key
> $ gpg -u <key ID> -o <key ID>.revoke --gen-revoke
OK, how long should the new key be valid?
Rafael
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists