Hello,

On Wed 12 Jun 2024 at 11:23pm +02, Joerg Jaspert wrote:

> On 17258 March 1977, Ian Jackson wrote:
>
>>> > And we also remove the Debian Maintainer role as dak would no  > longer
>>> > know who uploaded the package? Debian is larger than only Debian
>>> > Developers.
>>> This is a policy aspect. When we need to revoke a key used for uploading
>>> this happens via keyring maintainers as far as I understand, but in
>>> urgent cases it is ftp master who can also deny upload rights more
>>> quickly than via a keyring update. In moving to tag2upload as a service
>>> external to ftp, we partially move this capability from ftp master to
>>> the entity running tag2upload (DSA afaiui). Is there a sensible way to
>>> leave this policy aspect with the ftp team when using the tag2upload
>>> service? In effect, I'm asking whether ftp could somehow provide an
>>> authorization oracle to be used by tag2upload.
>> tag2upload leaves this policy with the ftpmaster team.  It uses the
>> archive keyrings and dak's list of Debian Maintainers.
>
>> So there is no change here.
>
> Actually, we can set acls on fingerprints and then that key wont be able
> to upload anymore. That is not something recorded in the keyrings or the
> DM list. Obviously that is not something used often (really really
> seldom), it is more for "this key is compromised badly, please turn off
> anything with it *NOW*" situations, which it's what Helmut meant with the
> urgent cases.

Could you say more specifically how seldom, and also how long it usually
takes between you flicking the emergency switch, and the keyring team
pushing an update?

-- 
Sean Whitton

Reply via email to