-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
On 2018-07-14 19:14, Unman wrote:
> On Wed, Jul 11, 2018 at 06:52:18PM -0700,
gas...@gmail.com wrote:
>> On Thursday, July 12, 2018 at 6:40:55 AM UTC+8, Unman wrote:
>>> The key on the team page is the key I use for email. My Qubes
>>> signing key isn't difficult to find. Not being signed is not
>>> relevant
>>
>> How is it not relevant? There is no way to find if the key in
>>
qubes.3isec.org is trusted by anyone in the Qubes dev team.
>
> The lack of signatures is not relevant because no one using split
> gpg as recommended will be signing anybody's keys. (Look at the
> "Advanced" paragraph on
https://www.qubes-os.org/doc/split-gpg/)
>
True, but you can still cross-sign your own separate keys without
violating security principles if you generated them in the same VM.
> In the absence of WOT it means that you cant pass off the
> responsibility for confirming a key to others, and have to make
> these judgements for yourself.
To some extent, you can. You just have to rely on others to do it more
manually, e.g.:
https://andrewdavidwong.com/fingerprints.txt
> You'll find that signing key in various places, including in
> mailings by me to this list, so you could check the archive. Since
> you have my email and key you could always email me and ask if it
> is my signing key. (That's what some people do.)
>
>> Why should we trust the key at
qubes.3isec.org as coming from the
>> same Unman?
>
> That's a good question. Without WOT how can you trust *any* key
> relates to the person it's claimed for?
In addition to cross-signing (mentioned above), you can make the
fingerprint and/or key available from other places around the Web
associated with your identity. A disparate collection of sources,
while individually untrustworthy, can provide reasonably strong
evidence of identity in aggregate. Using myself as an example:
https://andrewdavidwong.com/
https://www.qubes-os.org/team/#andrew-david-wong
https://www.qubes-os.org/news/2016/04/29/community-manager/
https://invisiblethingslab.com/#andrew-david-wong
https://keybase.io/adw
https://github.com/andrewdavidwong
https://twitter.com/andrewdavidwong/status/583961424742854656
https://explorer.blockstack.org/name/adw.id
> I've suggested some ways above that link the Qubes signing key and
> the unman email key. Also, you can ask me and I will affirm it is,
> signed with an email key that (perhaps) you do trust.
>
>> Is there a way to check they both derive from the same master
>> key?
>
> They don't. I highly recommend using different keys for different
> purposes.
>
It's worth noting that Joanna uses a "separate master key" model for
her various personal keys, which are used for different purposes:
https://blog.invisiblethings.org/keys/
My setup is similar, except the master key in my model is the
certify-only primary key (master secret key / sec) of my main key,
with subkeys for signing and encryption, and separate cross-signed
keys for other purposes.
There's not much functional difference for others seeking to verify
our keys. Both allow for separate keys for different purposes that can
be verified from a single main key that never leaves the vault in
which it was generated (separate from the split-gpg backend). I think
the difference is mostly a personal preference regarding internal key
management and workflow.
>
> [...]
>
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-----BEGIN PGP SIGNATURE-----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=ySSq
-----END PGP SIGNATURE-----