Thanks for the detailed feedback!

> 1. The list of applicable signing keys included in the tarballs and elsewhere 
> only lists the fingerprints

We'll fix that.

> 2. The list seems kind of long, are all these people really authorized to 
> decide which release tarballs are real?

Yes any member of the dev team can put out a release.  Our goal is that, 
eventually, everyone be experienced in doing so.  There used to be a shared 
release key, but individual keys provides better identification. (Putting out a 
release does require another team member to review it, by the way.)

> 3. The list contains a lot of old MD5 fingerprints and seemingly

To be fixed as part of #1

> 4. Some releases are signed with keys not on the list in the previous 
> tarball, breaking the chain of trust.

We had a key-signing ceremony at the recent F2F, so this should be better 
addressed now.

> 5. As an SSL/X.509/SMIME library, you have a strange preference for PGP/GPG 
> keys.

:)  PGP has market dominance for software distributions.

> 6. The SSL certificate for www.openssl.org is of the lowest trust grade 
> available (domain validated only).

That's an interesting idea, and something we'll pursue after a couple of other 
changes happen. 

--  
Principal Security Engineer, Akamai Technologies
IM: rs...@jabber.me Twitter: RichSalz

Reply via email to