I've received a request for a more modern key to be used to sign libcap releases. I'm not against doing that, but I have to then effectively build up some trust around it. I've been maintaining the history of keys I've been using (as logged in the libcap.git repo itself): https://git.kernel.org/pub/scm/libs/libcap/libcap.git/log/pgp.keys.asc I'm going to generate a new signing key, and start tagging releases with it in addition to all of the other keys I've been using. They will be tags of the form: sig-libcap-X.YZ I don't plan to deprecate using any of the older keys for a while. (I don't believe single git tags can have more than one signature, so more than one tag is how I will support this new key.)
Thanks for looking into this! > I'm going to generate a new signing key, and start tagging releases with it > in addition to all of the other keys I've been using. While this will allow downstreams to verify the sources using safer cryptographic methods, I am wondering why you want to create an additional tag instead of starting to use a new key though. Due to the functionality offered by OpenPGP, downstreams are able to verify signatures [1] and rely on authentication delegation [2] to establish a trust path between your old and new key. As you have been using third-party identity certifications [3] in the past, my assumption is, that you will be using this for a new key as well and that this should be all that is needed. > I don't plan to deprecate using any of the older keys for a while. This is of course entirely up to you. However, using multiple keys sounds rather tedious and a bit confusing :) [1] https://openpgp.dev/book/verification.html [2] https://openpgp.dev/book/signing_components.html#delegation [3] https://openpgp.dev/book/certificates.html#third-party-identity-certifications
https://git.kernel.org/pub/scm/libs/libcap/libcap.git/commit/?id=d510135f8db1d2e5b5ffd115d908b6447863ebaa
(In reply to Andrew G. Morgan from comment #2) > https://git.kernel.org/pub/scm/libs/libcap/libcap.git/commit/ > ?id=d510135f8db1d2e5b5ffd115d908b6447863ebaa Thanks for adding a more modern key! I just realized I hadn't fully grasped the situation with the tags in the repository and your comment wrt the tags in your initial comment: > (I don't believe single git tags can have more than one signature, so more > than one tag is how I will support this new key.) This is a very uncommon way of dealing with the deprecation of old signing keys, as ideally those keys should just be revoked instead of further used. I had a closer look at the several tag schemas and noticed the use of the different siging keys: - https://git.kernel.org/pub/scm/libs/libcap/libcap.git/tag/?h=libcap-2.71 -> AF7402BC38CC10E6885C1FCA421784ABD41A6DF2 (a DSA 1024 bit key) - https://git.kernel.org/pub/scm/libs/libcap/libcap.git/tag/?h=libcap-korg-2.71 -> 38A644698C69787344E954CE29EE848AE2CCF3F4 (an RSA 4096 bit key, but with SHA-1 binding signatures) - https://git.kernel.org/pub/scm/libs/libcap/libcap.git/tag/?h=v1.2.71 (which is in fact also version 2.71!) -> AF7402BC38CC10E6885C1FCA421784ABD41A6DF2 (a DSA 1024 bit key) - https://git.kernel.org/pub/scm/libs/libcap/libcap.git/tag/?h=sig-libcap-2.71 -> 0D23D34C577B08C4082CFD76430C5CFF993116B1 (an EdDSA 256 bit key - the new one) - https://git.kernel.org/pub/scm/libs/libcap/libcap.git/tag/?h=psx/v1.2.71 (which is in fact also version 2.71!) -> AF7402BC38CC10E6885C1FCA421784ABD41A6DF2 (a DSA 1024 bit key) - https://git.kernel.org/pub/scm/libs/libcap/libcap.git/tag/?h=cap/v1.2.71 (which is in fact also version 2.71!) -> AF7402BC38CC10E6885C1FCA421784ABD41A6DF2 (a DSA 1024 bit key) These tags all exist for a single version of libcap and I think this is very confusing. 4/6 of the tags are signed by a DSA key, that no downstream should be using for verification anymore. 3/6 follow a tagging scheme, that doesn't reflect the actual version specifically (e.g. 1.2.71 instead of 2.71). While I will use the new key with fingerprint 0D23D34C577B08C4082CFD76430C5CFF993116B1 for verification, relying on tags with the scheme `sig-libcap-<version>` now, I believe that all but one tagging scheme and all but one signing key (the latest) should be discontinued to limit the confusion around this.
I will likely transition to the B1 key over the F2 key for most of the tags which each have a distinct purpose, in libcap-2.72. The F4 key is how kernel.org uploads are validated and to replace that I am going to need to get some key-signing done, which will take time.
This commit contains my next steps intention: https://git.kernel.org/pub/scm/libs/libcap/libcap.git/commit/?id=794b185b6a2e90d09e5adcee07118e935b862bb6 As I see it, the compounded history of the libcap git repo (which itself contains pgp.keys.asc) represents a form of blockchain-style self compounding trust. Ultimately, the root of that chain is insecure by modern standards, but things like the 2023 audit of the tree ( https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.iuvg7sbjg8pe ) give credence to the quality of the libcap-2.69 release. I'm going to back tag all of the libcap-2.xy releases with this modern key, since I trust this compounded tree as per git push/pull validation that I do on several computers each time I commit. If that helps folk migrate to trusting this new key, that is fine. If not, when I've obtained more cross-signed trust for this new key, perhaps that will address this? I've yet to decide if I will completely eliminate use of the older keys. The git equivalence of the signed tags is an independent mechanism for bootstrapping some trust in this new key. Indeed, it is unclear to me if the two independently signed equivalent tags for older releases today combine to a more secure signature of those releases than a single tag. Not a crypto person, but I can't see that they combine to anything worse. All very idiosyncratic for libcap. I agree. But this is a long running project etc.