1 |
On 02/01/19 08:25, Michał Górny wrote: |
2 |
> On Thu, 2019-01-31 at 12:33 -0500, Rich Freeman wrote: |
3 |
>> On Thu, Jan 31, 2019 at 8:56 AM Michał Górny <mgorny@g.o> wrote: |
4 |
>>> |
5 |
>>> 1. It is entirely customary and therefore requires customized software |
6 |
>>> to use. In other words, it's of limited usefulness to people outside |
7 |
>>> Gentoo or does not work out of the box there. |
8 |
>> |
9 |
>> This part could be addressed easily by having Gentoo create a signing |
10 |
>> key, and automatically signing all dev keys based on LDAP using it. |
11 |
>> Then users can trust that one key and inherit trust for the rest. |
12 |
>> |
13 |
>> Users have to opt into the trust model by trusting somebody's key no |
14 |
>> matter what. No reason that couldn't be a centrally-managed one. |
15 |
>> |
16 |
>> I'll also agree with the comment that physically interacting with |
17 |
>> people is not all that easy. There are many areas of the world where |
18 |
>> FOSS developers are relatively uncommon, let alone Gentoo ones. |
19 |
>> Unless those alternate organizations have VERY broad coverage (such as |
20 |
>> an alternative of a notary recognized by any country or something like |
21 |
>> that) you're still going to have issues. |
22 |
>> |
23 |
>>> Verify the person's real name (at least for the user identifier |
24 |
>>> used for copyright purposes). This is usually done through |
25 |
>>> verifying an identification document with photograph. It is |
26 |
>>> a good idea to ask for the document type earlier, and read on |
27 |
>>> forgery protections used. |
28 |
>> |
29 |
>> "usually"? "identification document"? Does this mean that an |
30 |
>> appropriate method of verification is entirely up to individual |
31 |
>> discretion? If so that makes the process of getting every key signed |
32 |
>> fairly trivial as long as two people have (in?)appropriately-rigorous |
33 |
>> standards... |
34 |
>> |
35 |
> |
36 |
> I'm sorry, I keep forgetting that you can't rely on people in Gentoo |
37 |
> being mature and you need to specify everything as 'MUST' and 'MUST |
38 |
> NOT', or otherwise they are going to ignore the spirit of the policy |
39 |
> and violate in the worst way permitted by bending the wording. |
40 |
> |
41 |
You started this thread with what distinctly appeared to be a plea to |
42 |
avoid ad hominem attacks, just to turn around make make them yourself. |
43 |
Do, kindly, stop it. |