[ale] PGP/GPG Keysigning party! ALE Central November 19th. (Mac OSeX prep)

aaron aaron at pd.org
Mon Nov 2 12:26:11 EST 2009


This past weekend I dove into doing my homework for the Key
signing party at the November 19th ALE meeting.  To follow
Michael's recommendation of generating an RSA / RSA pair
using Mac OSeX requires the latest GnuPG2 packages.

I found them at:

<http://sourceforge.net/projects/macgpg2/files/>

It's a simple unzip / mpkg install, but requires OSeX 10.4.x
or better.  Though not explicitly stated, it seems to be a
Universal binary since it installs and runs on my PPC systems
without issue.

With Mac gpg2, RSA / RSA is the default 1st choice of --gen-key
Other useful info and GUI based MacGPG tools can be found at:
<http://macgpg.sourceforge.net/>

Also, in trying to do a write up for the event, I found a
very informative "How To [GPG] Party" page that covers a lot
of aspects of the WHY as well as the HOW of the web of trust
and such...

<http://cryptnet.net/fdp/crypto/keysigning_party/en/ 
keysigning_party.html>

HTH!
peace
aaron




On 2009, Oct, 27, , at 9:14 PM, Michael H. Warfield wrote:
> Hello all!
>
> Aaron approached me a couple of days about about running a PGP/GPG key
> signing party for the November ALE meeting.  Looking back, it looks  
> like
> the last one was 6-1/2 years ago!  Wow, time flies...  Ok...  So be  
> it.
>
> I will do a VERY BRIEF intro to public key cryptography before the
> meeting but a successful key signing party depends on preparation in
> advance on the part of the participants!  Even well organized  
> keysigning
> parties can degenerate into chaos very easily.  Do not come to the
> meeting looking to learn how to create a new key.  You should have  
> your
> keys ready in advance.  If not, still come, but understand that you'll
> learn some thing about PGP but you probably won't walk away with  
> keys or
> signatures.
>
> To make this go smoothly, I will collect keys in advance of the  
> meeting
> and print out sheets with key fingerprints.  That saves an incredible
> amount of time and effort during the actual meeting and gives me an  
> idea
> of how may keys to expect and copies to make.  It also permits me to
> have a collected keyring I can make available to everyone after the
> meeting.  Please expect to provide at least one photo id which will be
> projected on a screen for everyone to see (sensitive numbers will be
> blacked out with tape).  Drivers license or passport are preferred.
>
> With recent developments in cryptography, some doubt is being cast on
> the DSS/DSA keys.  Debian folks are strongly recommending a return to
> RSA keys and have some "procedures" in place for this.
>
> http://www.debian-administration.org/users/dkg/weblog/48
>
> If you are thinking it's time to dump off the old DSS/DSA keys and
> migrate back to an RSA 2048 bit key, now is the time as well.  My  
> older
> RSA 1024 bit key is still active and I have a DSS/DSA key as well but
> these are both being relegated to "legacy" and I now have a 2048/R key
> (0x674627FF).  I'm not invalidating my old keys but I will only now be
> using them for key signing (my 0xDF1DD471 key is in the web of trust
> book and still in the PGP strong set).
>
> If you're not running the latest GnuPG, which should now be defaulting
> to RSA/RSA keys, it can get a little bit tricky to create a new style
> RSA key.  With older (default DSS/DSA) versions of GunPG, you should
> create a new key but don't accept the default DSA and select "RSA  
> (sign
> only)" key instead.  Once the key is created, edit that key and add an
> RSA encryption key to it.
>
> Better yet, update your GnuPG and the default will create the new key
> like you want (RSA and RSA - sign and encrypt).  If you don't have a
> current key and you don't know what any of this is about, that's fine.
> Just create a new RSA key for yourself (if it says RSA and RSA - TAKE
> THAT OPTION).  If you don't see that option available, ask for help or
> update your system first.
>
> What I need from YOU!  Well in advance of the meeting, please send  
> your
> PGP public keys to alekeyparty at wittsend.com.  If you do not have a PGP
> key and are just looking to get started, the time to start is right  
> now!
> The time is NOT at a key signing party.  This list has some very  
> bright
> folks on it who can help you out if you are having difficulties.  I  
> will
> try to answer questions as best I can, but ask them now.
>
> Last time, we had a few people who did not submit their keys in  
> advance.
> That's fine as long as it's not excessive or we will be there all  
> night.
> At the very least, if you don't submit your keys in advance, your keys
> must be on the public keyservers and you should come with printouts of
> your key fingerprint.  I have business cards on which I have my key
> fingerprints printed.  Some people use little strips of paper.  All of
> that is fine but it should be on "dead trees edition" and enough  
> copies
> so you can pass them out and people can make notes on them.
>
> Procedure at the meeting...  People who submitted their keys go first.
> We will pass out the preprinted sheets and then call people up to
> project their id's.  The audience can then take notes on the sheets  
> that
> they have confirmed their identification (anyone not showing up
> obviously is not confirmed AND SHOULD NOT BE SIGNED).  After that,
> anyone with keysigning cards or other information to pass out can go
> from there.  Anyone not prepared, we'll do what we can but you pays  
> your
> nickel and you takes your chance.
>
> Procedure after the meeting...  I'll update MY keyring with any last
> minute additions, clean out the "no shows", and then make an
> announcement to the list.  You can then download that keyring and sign
> those keys which you feel comfortable that you confirmed their  
> identity.
> You can then submit them to a public key server or send them back  
> to the
> same E-Mail address above and I'll submit them in bulk.
>
> Any questions, please feel free to ping me but please do it early.
> We've only got about 3 weeks before this thing.
>
> Side note.  I'm looking into also including a CA-Cert web of trust
> verification.  That's for X.509 certificates from CA-Cert
> <http://www.cacert.org>.  If you are interested, go up to their  
> site and
> see what the deal is there.  Being preregistered with them helps.  You
> can get free X.509 S/Mime certificates and register OpenID with them,
> them.  That all depends on me getting some additional CA-Cert  
> "assurers"
> involved (there are several in the area).  We did this at USENIX  
> Lisa a
> couple of years back and it works in real well with a keysigning  
> party.
> I'll post more details once I know more, if I can pull that off.
>
> Regards,
> Mike
> -- 
> Michael H. Warfield (AI4NB) | (770) 985-6132 |  mhw at WittsEnd.com
>    /\/\|=mhw=|\/\/          | (678) 463-0932 |  http:// 
> www.wittsend.com/mhw/
>    NIC whois: MHW9          | An optimist believes we live in the  
> best of all
>  PGP Key: 0x674627FF        | possible worlds.  A pessimist is sure  
> of it!
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo



More information about the Ale mailing list