[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <13232.1317789438@turing-police.cc.vt.edu>
Date: Wed, 05 Oct 2011 00:37:18 -0400
From: Valdis.Kletnieks@...edu
To: "Frank Ch. Eigler" <fche@...hat.com>
Cc: Adrian Bunk <bunk@...sta.de>, "H. Peter Anvin" <hpa@...or.com>,
"Rafael J. Wysocki" <rjw@...k.pl>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
Greg KH <gregkh@...e.de>
Subject: Re: kernel.org status: establishing a PGP web of trust
On Tue, 04 Oct 2011 19:17:30 EDT, "Frank Ch. Eigler" said:
> But that's begging the question. The semantics are what you want them
> to be. Some keysigning parties take this super seriously, and maybe
> with strangers there's some room for this. But in the end, when *I*
> see a key with someone else's signature on it, there is no proof how
> rigorously they investigated the person. The "reliable identity" part
> of the web of trust is only one hop deep.
And in fact, there's even support for dealing with bozos who sign keys
incorrectly:
http://www.gnupg.org/gph/en/manual.html#AEN346
"trust in a key's owner" - one of the options is:
none - The owner is known to improperly sign other keys.
(I've done that for 3 people in Europe when I found their sigs on my key on the
keyservers, and they admitted in e-mail that they'd made no real attempt to
verify me...)
You can also assign "partial" or "full" trust, and then configure how many
partial and how many full trust sigs are needed to accept a key as "known".
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists