Le dimanche 18 mars 2018 à 19:23:53+0000, Jonathan McDowell a écrit :
> On Thu, Mar 15, 2018 at 11:59:25AM +0100, Mattia Rizzolo wrote:
> > On Wed, Feb 14, 2018 at 10:06:24PM +0000, Jonathan McDowell wrote:
> > > Fingerprint changes are currently allowed for anyone who doesn't have an
> > > account in LDAP, which includes DMs without a guest account. However
> > > this means that the DM keyring gets out of sync with what nm.debian.org
> > > thinks is the state of the world. "hibby" is a good example of this.
> > 
> > I changed hibby back to the key he had before.  He clearly wasn't using
> > his new one, and his change was fairly old.  The most similar case now
> > is tkren, see below.
> > 
> > We have 3 other cases right now:
> 
> [snip 2 DM -> DD cases]
> > * weinholt:
> >   DD returning from retirement; he had to add a new 4096R key as his
> >   past 1024D was no good anymore.  We will have just to wait for this,
> >   but how would you have handled it from the keyring-maint side?  I
> >   don't believe you'd have liked a "emeritus key rollover" :P
> 
> This is an emeritus DD to DD status and is explicitly allowed by the
> site - I agree this should be the case. The case I'm interested in
> preventing is someone with a key in an active keyring managing to change
> the fingerprint nm.d.o thinks is authoritative for them without it
> having first been updated in the active keyring.
> 
> > > We shouldn't allow DMs to change their fingerprint via nm.debian.org;
> > > once you're part of the project you should go through the usual keyring
> > > replacement process.
> > 
> > Enrico told me that the ability to becoming a DD with a key different
> > than the one used while being a DM is a feature (i.e., on the
> > keyring-maint side it looks like "add new dd key + remove dm key"
> > instead of "move key from dm to dd"), and it has been done in the past.
> 
> I don't think it's a useful feature, I think it's just one that happened
> to exist as a result of the way things worked before DM was folded into
> nm.debian.org.
> 
> > I'm not sure it's a good excuse, and I kind of agree with noodles here;
> > however, I also don't think prospective applicants should need to wait
> > for the monthly update to start a process if they want or need a new
> > key
> 
> The instances I've seen of people changing keys would not have resulted
> in processes being held up due to the monthly update. If a key is
> compromised the update happens much faster (and should be done via that
> method), if it's a case of the applicant moving to a different key but
> the old one is still fine then they can continue to use the old key if
> they don't want extra delay. And realistically the shortage of AMs is
> more likely to cause a delay than the keyring-maint update time.
> 
> I also think there's a slight argument that allowing a backdoor key
> change as part of an application process theoretically reduces security.
> There is no signed statement of movement from one key to another which
> would normally exist, it's just an update in the website.

Done in commit 26d178c7

Cheers

-- 
Pierre-Elliott Bécue
GPG: 9AE0 4D98 6400 E3B6 7528  F493 0D44 2664 1949 74E2
It's far easier to fight for one's principles than to live up to them.

Attachment: signature.asc
Description: PGP signature

Reply via email to