Re: kernel.org status: establishing a PGP web of trust
From: Rafael J. Wysocki
Date: Sat Oct 01 2011 - 17:31:42 EST
On Saturday, October 01, 2011, H. Peter Anvin wrote:
> Hi all,
> Since the kernel.org status announcement last week a number of you
> have contacted me about re-establishing credentials. In order to
> establish a proper PGP web of trust we need keys that are cross-signed
> by other developers. As such, we ask that you follow the following
> 1. Make sure your systems are uncompromised. We will address specific
> recommended steps for that in a separate email.
> 2. Create a new PGP/GPG key, and also generate a key revocation
> certificate (but don't import it anywhere -- save it for the
> future) for your new key. In the near future we are considering
> setting up an escrow service for key revocation certificates.
> I recommend using a 4096-bit RSA key. Given how fast computers are
> these days, there is no reason to use a shorter key. DSA keys
> should be considered obsolete; substantial weaknesses have been
> found in DSA.
> $ gpg --gen-key
> $ gpg -u <key ID> -o <key ID>.revoke --gen-revoke
OK, how long should the new key be valid?
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/