Jonathan McDowell writes ("Re: Bug#1102125: debian-keyring: Please add tag2upload oracle service key"): > So your argument is that this is a key others will want easy access to > for validation of signatures produced by tag2upload?
Yes. > I still think it's > closer to something like an archive key (managed by a team, doesn't need > the web of trust or replacement pieces that keyring-maint get involved > with), but equally we already have other role keys present. The key definitely wants to be published officially by Debian. I think debian-keyring.deb is the way we do that for GPG keys that we esxpect humans and computers to use. Its replacement should be managed the same way as some other keys used by systems - I think much like the archive key which you mention. I'm not sure precisely what you mean about the web of trust. The key does bear my signature. But it won't be signing other keys, and if it does that's an anomaly and ought not to be trusted. > Is there a good reason why it can't go in the role-keys keyring and > instead needs it's own keyring? There is much software which should to treat this key the same way that it treats keys in debian-keyring.gpg. [1] For example, dscverify. Assuming this change to the keyring package is accepted, I will be sending a patch to dscverify to look in this keyring when it's verifying signatures on source packages. If we put this key in debian-role-keys.gpg, things get more complicated. Systems (like dscverify) which should trust the tag2upload key, should *not* trust every key in role-keys the same way. For example, if the CD signing key, or DAM's key, were to sign a source package, that would be an anomaly, and ought not to be trusted. So then we'd have to somehow teach all of those systems to trust only *this particular* key out of debian-role-keys.gpg. That would involve either hardcoding the key's name in all that software, using the key name as the security-load-bearing identifier, or separately publishing the fingerprint of the tag2upload key (presumably also in debian-keyring.deb) and teaching all the software to check it. Those options seem considerably worse than a keyring specifically for this key. Ian. [1] Ultimately, modulo some wrinkles, everything that verifies signatures on source packages (or normalised archive/ git tags). -- Ian Jackson <ijack...@chiark.greenend.org.uk> These opinions are my own. Pronouns: they/he. If I emailed you from @fyvzl.net or @evade.org.uk, that is a private address which bypasses my fierce spamfilter.