A big +1

Everything went smooth and successfully. And thumps up for the
documentation on Isis site!


On Tue, Dec 18, 2012 at 9:29 PM, Dan Haywood
<d...@haywood-associates.co.uk>wrote:

> other interesting reading: http://people.apache.org/~henkp/trust/
>
> you might also say that the public key might be trusted because it is
> listed on the committers' index, http://people.apache.org/list_H.html
>
>
>
> On 18 December 2012 20:25, Dan Haywood <d...@haywood-associates.co.uk>
> wrote:
>
> > I guess the trust comes from the fact that the KEYS file - which is
> > downloaded from the Isis repo - contains the public key which does verify
> > against the private key I used to sign the release.
> >
> > The message that it isn't trusted should be interpreted as it doesn't
> link
> > to a trusted root CA.
> >
> > I wonder if you had countersigned my key whether you would see the
> message
> > (on the basis that you presumably trust your own self-signed key)?
> >
> >
> >
> > On 18 December 2012 20:20, Jeroen van der Wal <jer...@stromboli.it>
> wrote:
> >
> >> Ok, following this procedure omits the need to specify a keyserver.
> Still
> >> untrusted though:
> >>
> >> gpg --import ~/Development/apache-isis/KEYS
> >> gpg: key 2FDB81B1: public key "Mark Struberg (Apache) <
> >> strub...@apache.org>"
> >> imported
> >> gpg: key 77AD2E23: "Dan Haywood (CODE SIGNING KEY) <
> danhayw...@apache.org
> >> >"
> >> not changed
> >> gpg: key 61459F7A: public key "Mohammad Nour (Personal GMail) <
> >> nour.moham...@gmail.com>" imported
> >> gpg: key 5124D1AB: "Jeroen Christiaan van der Wal (CODE SIGNING KEY) <
> >> jcvander...@apache.org>" not changed
> >> gpg: Total number processed: 4
> >> gpg:               imported: 2  (RSA: 2)
> >> gpg:              unchanged: 2
> >> gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
> >> gpg: depth: 0  valid:   3  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 3u
> >> gpg: next trustdb check due at 2015-08-18
> >> Katla:isis jvanderwal$ gpg --verify --keyserver
> >> pgp.mit.eduisis-1.0.0-source-release.asc isis-1.0.0-source-release.zip
> >> gpg: Signature made Sat 15 Dec 19:50:19 2012 CET using RSA key ID
> 77AD2E23
> >> gpg: Good signature from "Dan Haywood (CODE SIGNING KEY) <
> >> danhayw...@apache.org>"
> >> gpg: WARNING: This key is not certified with a trusted signature!
> >> gpg:          There is no indication that the signature belongs to the
> >> owner.
> >> Primary key fingerprint: 60A6 847D 011F E674 7D8B  E60D 76D7 491A 77AD
> >> 2E23
> >>
> >>
> >>
> >> On Tue, Dec 18, 2012 at 9:09 PM, Dan Haywood
> >> <d...@haywood-associates.co.uk>wrote:
> >>
> >> > On 18 December 2012 20:02, Jeroen van der Wal <jer...@stromboli.it>
> >> wrote:
> >> >
> >> > >
> >> > > In the output I also noticed that Dan's key is not trusted:
> >> > >
> >> > >
> >> > Um, it *is* trusted, in that it is counter-signed by various other
> >> members
> >> > in the ASF web of trust:
> >> >
> >> >
> http://pgp.mit.edu:11371/pks/lookup?op=vindex&search=0x76D7491A77AD2E23
> >> >
> >> >
> >> > I dimly recall that there's a way to import these into your own
> >> certificate
> >> > store, the procedure might be as per [1]
> >> >
> >> > Dan
> >> >
> >> > [1] http://www.apache.org/dev/release-signing.html#keys-policy
> >> >
> >> >
> >> >
> >> >
> >> > > Will continue with further steps.
> >> > >
> >> > > There was an error in the link to the files, fixed below.
> >> > >
> >> > > -Jeroen
> >> > >
> >> > > core:
> >> > >
> >> > >
> >> >
> >>
> https://repository.apache.org/content/repositories/orgapacheisis-022/org/apache/isis/core/isis/1.0.0/isis-1.0.0-source-release.zip
> >> > > *
> >> > >
> >> > >
> >> >
> >>
> https://repository.apache.org/content/repositories/orgapacheisis-022/org/apache/isis/core/isis/1.0.0/isis-1.0.0-source-release.zip.asc
> >> > > jdo objectstore:
> >> > >
> >> > >
> >> >
> >>
> https://repository.apache.org/content/repositories/orgapacheisis-024/org/apache/isis/objectstore/isis-objectstore-jdo/1.0.0/isis-objectstore-jdo-1.0.0-source-release.zip
> >> > > *
> >> > >
> >> > >
> >> >
> >>
> https://repository.apache.org/content/repositories/orgapacheisis-024/org/apache/isis/objectstore/isis-objectstore-jdo/1.0.0/isis-objectstore-jdo-1.0.0-source-release.zip.asc
> >> > > file security:
> >> > >
> >> > >
> >> >
> >>
> https://repository.apache.org/content/repositories/orgapacheisis-025/org/apache/isis/security/isis-security-file/1.0.0/isis-security-file-1.0.0-source-release.zip
> >> > > *
> >> > >
> >> > >
> >> >
> >>
> https://repository.apache.org/content/repositories/orgapacheisis-025/org/apache/isis/security/isis-security-file/1.0.0/isis-security-file-1.0.0-source-release.zip.asc
> >> > > wicket viewer:
> >> > >
> >> > >
> >> >
> >>
> https://repository.apache.org/content/repositories/orgapacheisis-026/org/apache/isis/viewer/isis-viewer-wicket/1.0.0/isis-viewer-wicket-1.0.0-source-release.zip
> >> > > *
> >> > >
> >> > >
> >> >
> >>
> https://repository.apache.org/content/repositories/orgapacheisis-026/org/apache/isis/viewer/isis-viewer-wicket/1.0.0/isis-viewer-wicket-1.0.0-source-release.zip.asc
> >> > > restfulobjects viewer
> >> > >
> >> > >
> >> >
> >>
> https://repository.apache.org/content/repositories/orgapacheisis-027/org/apache/isis/viewer/isis-viewer-restfulobjects/1.0.0/isis-viewer-restfulobjects-1.0.0-source-release.zip
> >> > > *
> >> > >
> >> > >
> >> >
> >>
> https://repository.apache.org/content/repositories/orgapacheisis-027/org/apache/isis/viewer/isis-viewer-restfulobjects/1.0.0/isis-viewer-restfulobjects-1.0.0-source-release.zip.asc
> >> > >
> >> > >
> >> > >
> >> >
> >>
> >
> >
>

Reply via email to