Jump to: navigation, search

Difference between revisions of "OpenPGP Web of Trust/Juno Summit"

m (Juno Summit Key Signing: correct to strict alpha order by field)
m (Juno Summit Key Signing: typo)
 
(14 intermediate revisions by 12 users not shown)
Line 1: Line 1:
 
= Juno Summit Key Signing =
 
= Juno Summit Key Signing =
In an effort to build a secure web of trust, some community members will perform an informal exchange of identification and confirm key fingerprints at the OpenStack Juno Design Summit in room 405 of the the Georgia World Congress Center (one floor up from the Design Summit session rooms) on Wednesday the 14th of May starting at 10:35 AM EDT (14:35 UTC).
+
In an effort to build a secure web of trust, some community members will perform an informal exchange of identification and confirm key fingerprints at the OpenStack Juno Design Summit on Wednesday the 14th of May starting at 10:35 AM EDT (14:35 UTC) in room B301 of the Georgia World Congress Center (in between Infrastructure topic sessions).
  
If you plan to join us, please bring one or more forms of photo identification, preferably at least a [http://en.wikipedia.org/wiki/Passport passport], and make sure the real name on your key corresponds to the name on your passport. If you want additional tips, see the [[OpenPGP Web of Trust#Key Signing Process|parent article]]. This activity takes place during the 10:30-11:00 break period so please arrive promptly.
+
'''The sign-up period is now closed and the list of participants' keys has been finalized.''' If you signed up to participate, please retrieve [http://static.openstack.org/juno-ksp.txt juno-ksp.txt] (it consists of details for 65 participants), confirm your key fingerprint and other details within it are accurate, and verify its checksums according to the md5sum and sha1sum utilities match the following:
 +
<pre>
 +
1ed74f9bee7eae90246d080bb1f8e842 (MD5)
 +
c2b3f6b7be5fa94c533e3a45ad4401f23356c84d (SHA-1)
 +
</pre>
  
'''Add your information to the table below before Wednesday the 7th of May at 23:59 UTC.''' This article will be locked for further edits at that time so that all participants have an opportunity to print copies at home before travelling. Shortly after this article is locked, a checksummed keylist will be linked here and we can attempt to follow [http://keysigning.org/methods/sassaman-projected The 'Sassaman-Projected' Method].
+
If your browser has a tendency to convert line endings to MS-DOS or Macintosh text formats transparently, this will change the checksums so you may instead want to retrieve the [http://static.openstack.org/juno-ksp.tar.gz tarred and gzip-compressed version] and unpack it locally.
  
Please add yourself in alphabetical order by first name.
+
Print a copy of the file and the [http://static.openstack.org/checksum.txt checksums] to bring with you to the Summit (also don't forget a pencil or a pen, and one for your friend who will probably forget theirs!) along with one or more forms of photo identification, preferably at least a [http://en.wikipedia.org/wiki/Passport passport], and make sure the real name on your key corresponds to the name on your passport. If you want additional tips, see the [[OpenPGP Web of Trust#Key Signing Process|parent article]]. This activity takes place during the 10:30-11:00 break period so please arrive promptly. We will follow [http://keysigning.org/methods/sassaman-projected The 'Sassaman-Projected' Method] so that we can hopefully get through all participants in the limited time allotted.
  
{| class="wikitable"
+
A similar message has been [http://lists.openstack.org/pipermail/openstack-dev/2014-May/034693.html posted] on the openstack-dev@lists.openstack.org mailing list with the same attachments, signed by RSA key 0x48F9961143495829 (though the pipermail archive mangles the contents and makes it hard to match up the detached signature, so hopefully you're subscribed to that ML already).
|+ people participating in identification exchange
 
! Real Name !! IRC Nick !! Key Fingerprint !! Preferred E-mail Address
 
|-
 
| Adrien Cunin || Adri2000 || 16F7 F5B3 2D4F 0948 5697  FCBA 37F7 4CBF 350B 810B || adrien@adriencunin.fr
 
|-
 
| Alex Baretto || shakamunyi || A634 1E83 45C2 62E6 FA06  3363 E45E 104C 1F32 70F6 || shakamunyi@gmail.com
 
|-
 
| Alexander Tivelkov || ativelkov || 1D1C 5BE8 78BE 1AA5 E020 494C 41AD CB50 0609 CD08 || ativelkov@mirantis.com
 
|-
 
| Andreas Jaeger || Ajaeger || 93A3 365E CE47 B889 DF7F  FED1 389A 563C C272 A126 || jaegerandi@gmail.com
 
|-
 
| Andreas Jaeger || Ajaeger || EF18 1673 38C4 A372 86B1  E699 5294 24A3 FF91 2ACB || jaegerandi@gmail.com
 
|-
 
| Angus Salkeld || asalkeld || 8417 81C4 3BE3 7E25 9E6C  ED7B 5AC3 6012 F166 35A8 || angus.salkeld@rackspace.com
 
|-
 
| Anne Gentle || annegentle || 563D 74AE 8B7E BDDF 18EB  F068 0EE0 3068 5A1E 68E3 || anne@openstack.org
 
|-
 
| Benjamin Nemec || bnemec || 1731 DC5C 9910 BAB2 1EFF  76EA 37A1 19DD 05CB BBAA || nemecb@gmail.com
 
|-
 
| Chris Jones || Ng || 6C99 9021 9B3A EC6D 4A28 7EE7 C574 7646 7313 2D75 || cmsj@tenshu.net
 
|-
 
| Clark Boylan || clarkb || 4FCA 89E2 13C7 ED32 8B36  229B 0EFB 943E 9E0C 013C || cboylan@sapwetik.org
 
|-
 
| Clint Byrum || SpamapS || F00C 9F2F 4F7E B714 AFAD  1A42 538C 0766 F4BC B38E || clint@fewbar.com
 
|-
 
| Dan Smith || dansmith || E124 C163 113A 5794 E8C2  33D7 1799 C5A3 044A 3355 || dms@danplanet.com
 
|-
 
| Davanum Srinivas || dims || A67E 5FD8 80EB 089F 2317 7967 80D8 3A79 6103 BF59 || davanum@gmail.com
 
|-
 
| David Stanek || dstanek || 5BA1 2BF3 50B6 D550 4BC4  1EEE BD5D 8C91 2896 54DF || dstanek@dstanek.com
 
|-
 
| Devananda van der Veen || devananda || D235 9F32 7586 11A6 D0D5  99DC 845B EE06 7889 83A7 || devananda.vdv@gmail.com
 
|-
 
| Dina Belova || DinaBelova || 950D 48B2 3F58 A436 D4D2  A096 57D4 40F6 6E83 8E8B || dbelova@mirantis.com
 
|-
 
| Dmitry Borodaenko || angdraug || 7FD9 D652 BF5F D2EC 5F13  91B0 798F 1E35 CB4D 38A9 || angdraug@gmail.com
 
|-
 
| Dolph Mathews || dolphm || C1B5 629D E7A3 C2E7 3CF3  D665 7BC8 38D0 688A 4993 || dolph.mathews@gmail.com
 
|-
 
| Doug Hellmann || dhellmann || E060 113F 190C D011 A8FA  B18D 3B6D 06A0 C428 437A || doug@doughellmann.com
 
|-
 
| Frederic Lepied || flepied || 6639 924B 8C3E 11BF F460  D573 DBF7 D8BA B931 62BA || frederic.lepied@enovance.com
 
|-
 
| Graham Hayes || mugsie || 10A2 36A3 7F24 80AA 7C33  36A9 1EE0 4775 7D28 E972 || graham@hayes.ie
 
|-
 
| Gregory Haynes || greghaynes || 6FB6 44BF 9FD0 EBA2 1CE9  471F B08F 42F9 0DC6 599F || greg@greghaynes.net
 
|-
 
| James E. Blair || jeblair || 6AFD 1467 3F42 F649 7C08  0BDD FE65 468E D7FB 3137 || corvus@inaugust.com
 
|-
 
| James Slagle || slagle || 5B37 A8A9 A2EB 7FB3 A671  8E1A 6F94 D23E B144 CED6 || james.slagle@gmail.com
 
|-
 
| Jason E. Rist || jrist || 632D 71C5 1C14 AE9B A239 0CD2 CAB1 6138 BAB7 67F8 || jrist@redhat.com
 
|-
 
| Jason "Jay" Faulkner || JayF || C6DD CA6C 66C4 C935 C6A4  4CA2 C481 B2FF 1612 2806 || jay@jvf.cc
 
|-
 
| Jeremy Stanley || fungi || 97AE 496F C02D EC9F C353  B2E7 48F9 9611 4349 5829 || fungi@yuggoth.org
 
|-
 
| Joe Gordon || jogo || 6FE9 D1ED 1D42 472E 39B5  2963 C98F 2334 3CBB DAC4 || joe.gordon0@gmail.com
 
|-
 
| John Dickinson || notmyname || 6A86 657F C8CF 99F7 8D8C C86A F0E7 F736 6D92 3037 || me@not.mn
 
|-
 
| Jonathan Proulx || jproulx || 4829 BCDD 4A4D 1902 857B  3A16 37C6 224D 225B CD7D || jon@jonproulx.com
 
|-
 
| Juan Gregorio Hernando Rivero || GheRivero || 1904 7374 5A88 BF8D FFE8  44A0 DD0B A251 BC52 FA6F || ghe.rivero@gmail.com
 
|-
 
| Kiall Mac Innes || kiall || CABB 372A 4BDD EA49 C21F  ED52 9D78 AE5F 6DD1 92A2 || kiall@hp.com
 
|-
 
| Khai Do || zaro || 3619 C5E2 5C6F A10B 08AC  09BF 51A4 6A1B 3679 559F || zaro0508@gmail.com
 
|-
 
| Mark Atwood || MarkAtwood || 4F48 0261 701C B81F B003  3401 7322 9172 62CC C1E5 || me@mark.atwood.name
 
|-
 
| Matthew Oliver || mattoliverau || D1D9 7F7D 2C72 A142 9C71  365D 2EF4 97BF 73A3 79C3 || matt@oliver.net.au
 
|-
 
| Matt Wagner || matty_dubs || 5150 9442 00FE 3099 4CA8  D2EA E639 859C 2BE0 2E05 || matt.wagner@redhat.com
 
|-
 
| Matt Wagner || matty_dubs || 9E9D B8DA 7F92 B207 8647  7992 4A9A 24C4 E9ED D380 || matt.wagner@redhat.com
 
|-
 
| Matthew Treinish || mtreinish || 22D7 C9D2 971F 5185 A7FC  CCCC FD12 A0F2 14C9 E177 || mtreinish@kortar.org
 
|-
 
| Melanie Witt || melwitt || EC06 A780 62F9 5E1E B89E 992C 44E2 2070 EEA5 8CA1 || melwitt@yahoo-inc.com
 
|-
 
| Michael Davies || mrda || 6870 C7B4 FB9C 629C C845  4E89 81C9 6288 F959 ABC5 || michael@the-davies.net
 
|-
 
| Monty Taylor || mordred || 9A93 6029 5805 662E 034A  7E70 3390 DB68 041A 12F0 || mordred@inaugust.com
 
|-
 
| Nathan Kinder || nkinder || 28E8 CB5B 9567 BF4D 2735  B8BD 96BE E84E D18B E115 || nkinder@redhat.com
 
|-
 
| Paul Michali || pmichali || 307A 96BB 1A4C D2C7 931D 8D2D 4525 ECC2 53E3 1A83 || pcm@cisco.com
 
|-
 
| Robert Collins || lifeless || 8244 0CEA B440 83C7 9431  D2CC 298E 9A19 AAC0 E286 || robertc@robertcollins.net
 
|-
 
| Roman Podoliaka || rpodolyaka || FA44 628D 79D8 9149 7C9A  3556 B479 9CF8 7DE7 563D || rpodolyaka@mirantis.com
 
|-
 
| Roman Prykhodchenko || romcheg || 2A9D 655C 1EE7 7257 F06B 4EEB 92B1 6497 03EA 935A || me@romcheg.me
 
|-
 
| Sean Dague || sdague || 4134 CF35 4470 6F86 DFB1  3746 1CAC 45A6 9FE5 AF45 || sean@dague.net
 
|-
 
| Sergey Lukjanov || SergeyLukjanov || 71C5 CE23 FE25 A46B 95D2  4BCB 1626 1D61 85DB 0AEC || slukjanov@mirantis.com
 
|-
 
| Stefano Maffulli || reed || 6629 94D4 1857 E810 0B9B  3EE4 E331 14CA ADF1 4949 || stefano@openstack.org
 
|-
 
| Steve Baker || stevebaker || 8172 9177 B91C 6311 60E5  B2F2 0E06 3036 384E 42CD || sbaker@redhat.com
 
|-
 
| Steve Kowalik || StevenK || 6557 4BDD 9F3C 76D0 808C  BF36 FDD6 3BAF 588A 553F || stevenk@ubuntu.com
 
|-
 
| Steven Hardy || shardy || F991 3FFF C92E 22AC F170  91FF 0CE8 E597 4D81 8960 || shardy@redhat.com
 
|-
 
| Thierry Carrez || ttx || 22A7 9430 50DB 1E67 EC2B  641A 507A F890 25B1 0423 || thierry@openstack.org
 
|-
 
| Thomas Goirand || zigo || A0B1 A9F3 5089 5613 0E7A  425C D416 AD15 AC6B 43FE || zigo@debian.org
 
|-
 
| Troy Toman || troytoman || CC5E B4FA 766F AA62 7EA9  766E 9606 8114 D82A 7C29 || troy@tomanator.com
 
|-
 
|}
 

Latest revision as of 22:10, 9 May 2014

Juno Summit Key Signing

In an effort to build a secure web of trust, some community members will perform an informal exchange of identification and confirm key fingerprints at the OpenStack Juno Design Summit on Wednesday the 14th of May starting at 10:35 AM EDT (14:35 UTC) in room B301 of the Georgia World Congress Center (in between Infrastructure topic sessions).

The sign-up period is now closed and the list of participants' keys has been finalized. If you signed up to participate, please retrieve juno-ksp.txt (it consists of details for 65 participants), confirm your key fingerprint and other details within it are accurate, and verify its checksums according to the md5sum and sha1sum utilities match the following:

1ed74f9bee7eae90246d080bb1f8e842 (MD5)
c2b3f6b7be5fa94c533e3a45ad4401f23356c84d (SHA-1)

If your browser has a tendency to convert line endings to MS-DOS or Macintosh text formats transparently, this will change the checksums so you may instead want to retrieve the tarred and gzip-compressed version and unpack it locally.

Print a copy of the file and the checksums to bring with you to the Summit (also don't forget a pencil or a pen, and one for your friend who will probably forget theirs!) along with one or more forms of photo identification, preferably at least a passport, and make sure the real name on your key corresponds to the name on your passport. If you want additional tips, see the parent article. This activity takes place during the 10:30-11:00 break period so please arrive promptly. We will follow The 'Sassaman-Projected' Method so that we can hopefully get through all participants in the limited time allotted.

A similar message has been posted on the openstack-dev@lists.openstack.org mailing list with the same attachments, signed by RSA key 0x48F9961143495829 (though the pipermail archive mangles the contents and makes it hard to match up the detached signature, so hopefully you're subscribed to that ML already).