Re: Keysigning in times of COVID-19

2020-08-08 Thread Gunnar Wolf
Adrian Bunk dijo [Fri, Aug 07, 2020 at 04:46:18PM +0300]:
> Why are you requiring key signing at all when it has no defined semantics?
> 
> Many DDs check only the government issued photo ID for signing a key and 
> this is also how keysigning parties work, but if this is considered 
> optional there is do defined meaning to a signature.
> 
> If you as DAM do not have a problem if DDs have own policies that do not 
> require checking a government issued photo ID, then I do not see why the 
> key signing requirement exists at all.

FWIW, and as I said in my other mail - Each of the three keyring-maint
members have different policies.

The word "trust" also has many different meanings and values, but we
treat it as a binary thing here - Do two people trust the person
controlling 0xDEADBEEF to be Gunnar Wolf or not? If so, we
accept. If not, we don't. And yes, we have made some exceptions and
jumped through some hoops to adapt to reality, but that's the trust
level we can impose without our requirements breaking down into chaos.

We had quite a hard time in 2015 when we did the <2048b purge. But we
managed not to loosen our requirements.



Re: Keysigning in times of COVID-19

2020-08-08 Thread Gunnar Wolf
Hello Enrico, and thanks for bringing the discussion over here.

Enrico Zini dijo [Thu, Aug 06, 2020 at 05:54:21PM +0200]:
> Hello,
> 
> we have people approaching Debian with a lack of GPG signatures, and we
> generally cannot ask them to travel and meet other developers in person
> to get their key signed.
> 
> Technically, we are not requiring that people meet a DD in person, only
> that people have their key signed by a DD.
> 
> Technically, every DD has their own policies for signing keys, which
> could go from not requiring meeting in person at all, to requiring to
> meet in person multiple times. It might require to check a government
> issued photo ID, or it might not.
> 
> Practically, I feel like most of the time people's policies match what
> are the perceived expectations of the rest of the project. Meeting in
> person has always been a good safe bet, if only for the reson that it's
> been accepted without question for many years.
> 
> It's time to review those expectations.
> (...)

Enrico brought up this topic to DPL, DAM, front-desk and keyring-maint
about two weeks ago. I will copy over what I answered back then:

We have been rehashing many of the (great) arguments you present
every now and then since... At least, I remember the point being
brought up after the Yuge KSP from HEL at DC5, and the
Transnational Republic incident of DC6.

Our guidelines have been for many many many years that "everybody
is free to set their own policy — but please be sensible and
careful". We have never sent out an official announcement, either
from DAM or from keyring-maint, about it... but AIUI we have been
basically in agreement and explicitly said so at KSP introductions
(I have, repeatedly).

We have often mentioned positive examples (i.e. pseudonymous
community members we completely trust). We have mentioned the ease
to acquire forged or plainly fake official-looking IDs.

So, where do I stand? I try not to sign keys for people I cannot
recognize without looking at their papers. That means, my signing
resembles a lot my group of friends, the group of peple we meet year
after year in DebConf, plus some others I've bumped into now and
then. IDs? Show them to me, I don't really mind, I have done many
signings without looking at IDs. I know first-hand¹ that forging them
is very easy.

I also know some of our friends have a made-up identity. Some of those
identities are close to twenty years old, at least. That's worth the
same as a birth-given name in my book...

And yes, I have often refused to sign people's keys when they approach
me at a DebConf if we have not held significative interactions in the
past. I usually insist that I do not sign at a first
meeting. Although, yes, if meeting somebody at other ocassions,
specially given Latin America is a quite PGP-sparse region... I tend
to be a bit more flexible, to aid people getting connected and start
contributing.

And... Well, to the point at hand: Yes, I do think we have to rethink
our policies. I don't have an answer right now, and most likely, I
won't sign any keys during this DebConf. But as more of our activities
are conducted online, we will have to start trusting videoconferences
to prove identities.

(of course... given deepfakes have been getting better and
better... who knows? :-\ )

¹ If you must know, >25 years ago I paid for a passport I should not
  have received. My personal data was correct, but back then, my
  country required a military service "clearance" I didn't have. I am
  not proud of having paid for an illegal document, and would not do
  it again. But it's part of what I learnt, and I am sure my
  experience would not change _too much_ going to other
  countries. More money to spend, perhaps...


signature.asc
Description: PGP signature


Re: Keysigning in times of COVID-19

2020-08-08 Thread Felix Lechner
Hi Olek,

On Sat, Aug 8, 2020 at 6:36 PM Olek Wojnar  wrote:
>
> You are attributing motivations to me that I do not have.

More significantly, you are not responsible for "our tendency to suck
every discussion into such a long-term thing that it immobilizes us."
Sam is right with his general observation, but the issue is social. We
need fewer hurt feelings and more trust in each other. Debian is more
than its parts.

At the end of the day, we all want the same thing. Let's give the
world a great operating system!

Kind regards
Felix Lechner



Re: Keysigning in times of COVID-19

2020-08-08 Thread Eldon Koyle
On Sat, Aug 8, 2020 at 5:04 PM Sam Hartman  wrote:

> Until you have a concrete suggestion, you're derailing the discussion.
> Enrico and a number of people sound like they would like a way forward
> that works for people trying to become DMs today.
> When I hear things like "eventually have a GR," that's on an entirely
> different scope than they are asking about.


Would it be a reasonable compromise to start a new thread rather than
just quashing any deeper discussion?

-- 
Eldon



Re: Keysigning in times of COVID-19

2020-08-08 Thread Olek Wojnar
Sam,

I do not appreciate your aspersions and I think your hostile attitude is
completely uncalled for. I don't know why me sharing my thoughts on this
subject has triggered you into lashing out.

On Sat, Aug 8, 2020, 19:04 Sam Hartman  wrote:

>
> Sometimes that is necessary; some ideas need to be stopped.
>
> I disagree that processing DMs today is such an idea.
>

You are attributing motivations to me that I do not have. Allow me to
repeat myself, again: I see the question of real-life verification as
central to the issue that was raised. I'm not the first to bring it up. I
do not appreciate your dismissive attitude, it comes across as quite
condescending. Last I checked, everyone in Debian was free to share their
opinions, especially in response to a call for opinions.

To connect the dots more obviously, if there is a consensus that a
contributor's online identity and reputation is sufficient for Debian's
purposes then that answers the original question and clarifies the
project's position on the subject.

I have no intention of continuing pointless quibbling. I have made my
point. If other people agree, great. If they disagree, that's fine too.
Let's just try to be civil and professional, ok?


Re: Keysigning in times of COVID-19

2020-08-08 Thread Sam Hartman
> "Olek" == Olek Wojnar  writes:


>  TL;DR: While there may be improvements to be found in a
> completely different approach to identity, let us not let the
> scope of the discussion broaden that far, so we can make
> progress today.

Olek>I respectful disagree on this point. This conversation
Olek> started with a question about how to verify identity without
Olek> in-person interaction.  The reason a number of people have
Olek> seemingly broadened the scope (from my perspective, I clearly
Olek> don't know people's actual motivations) is because that is the
Olek> deeper question behind the original query.

Until you have a concrete suggestion, you're derailing the discussion.
Enrico and a number of people sound like they would like a way forward
that works for people trying to become DMs today.
When I hear things like "eventually have a GR," that's on an entirely
different scope than they are asking about.

It's possible no short-term solutions will emerge.
And I don't mind people exploring longer-term things.
What I mind a great deal is our tendency to suck every discussion into
such a long-term thing that it immobilizes us.
You are adding stop energy: you've broadened the scope to a question
that you then say you cannot answer.

Sometimes that is necessary; some ideas need to be stopped.

I disagree that processing DMs today is such an idea.



Re: Keysigning in times of COVID-19

2020-08-08 Thread Olek Wojnar
Hi Sam,

On Sat, Aug 8, 2020, 11:46 Sam Hartman  wrote:

>
> TL;DR: While there may be improvements to be found in a completely
> different approach to identity, let us not let the scope of the
> discussion broaden that far, so we can make progress today.
>

I respectful disagree on this point. This conversation started with a
question about how to verify identity without in-person interaction. The
reason a number of people have seemingly broadened the scope (from my
perspective, I clearly don't know people's actual motivations) is because
that is the deeper question behind the original query.

> "Olek" == Olek Wojnar  writes:
>
> Olek> Thanks to some great tools, it's fairly easy to
> Olek> verify that they do indeed control the email addresses tied to
> Olek> their key. That's what I care about at that point in time.
>
> For me, that's not nearly enough.
> If all you want to do is verify that a particular point in time, an
> email address belongs to a key, set up a service to do that.
>

I was referring to the caff package.

When I sign a key I am signing a certification that I believe
> 1) the key and
> 2) the real world identity
>
> correspond to the digital identity in the FLOSS community represented by
> the claimed email address.
>

That is how I have always done it as well but this conversation is making
me rethink the *why* of that process.

I don't want to throw out what we have without a viable suggestion that
> the project can get behind.
>

Agreed.

So, let's focus this thread on key signing and how to adapt that because
> it's what we have today and because we're looking for some short-term
> answers.
> If you want to start a different thread proposing to revamp how we think
> about identity, go for it.
>

Again, I disagree that these are distinct topics. I think they are
intrinsically linked.

There have been some good points so far about the value of having a
real-world identity connected to your Debian identity for reasons of
accountability and liability. There have also been good points about
personal privacy. (Dissident Test, anyone?)

I was just recently speaking with a prospective first-time contributor who
was very excited about being involved in the project but was not
comfortable sharing their real life identity. Do we turn people like that
away or welcome their contributions into the project once we have validated
their reliability and trustworthiness *in the scope of the Debian Project*?
Do we absolutely *have* to have a real life identity connected to someone
to sign their key? Or to accept a patch? Or a packaging job? Or permissions
as a DM?

I'm not advocating a position since I'm not 100% sure what the answer
should be. But I think that these are important questions to ask ourselves
and an important conversation to have. Perhaps this will eventually lead to
a GR, or perhaps we'll develop a consensus here. But we absolutely need to
be having this conversation and considering all points of view and
repercussions.

-Olek

>


Re: Keysigning in times of COVID-19

2020-08-08 Thread Sam Hartman

TL;DR: While there may be improvements to be found in a completely
different approach to identity, let us not let the scope of the
discussion broaden that far, so we can make progress today.

> "Olek" == Olek Wojnar  writes:


Olek>  TL;DR: I think without some link back to real world
Olek> identity, we open ourselves up to attacks where people build
Olek> trust only to betray us.

Olek>I agree with you that this is a potentially-serious
Olek> problem. However, I'm not sure that keysigning is the right
Olek> place to address it. I've seen a number of comments, including
Olek> yours, seemingly conflate the trust we place in the validity
Olek> of a cryptographic key and the trust we place in someone
Olek> during the NM process.

To some extent I've been sloppy because it's the end result I care about
 not where in the process particular steps happen.

I'm happy to dig into my thoughts on the breakdown though.

Olek> I think it is important to distinguish
Olek> between the two.  So, I don't really care (much) how
Olek> technically competent or hard-working someone is when I sign
Olek> their key.

Agreed.
I care to some extent how good of a job I think they will do in key
management, and some of that is technical.

Olek> Thanks to some great tools, it's fairly easy to
Olek> verify that they do indeed control the email addresses tied to
Olek> their key. That's what I care about at that point in time.

For me, that's not nearly enough.
If all you want to do is verify that a particular point in time, an
email address belongs to a key, set up a service to do that.
That would be a valuable service for many purposes, but don't waste my
time signing stuff if that's all you want.
Such a service would have an implicitly (or explicitly if it were
documented) different certification process than my signatures.
I argue Debian should not trust such a service for the identity
verification part of our membership process.

When I sign a key I am signing a certification that I believe
1) the key and
2) the real world identity

correspond to the digital identity in the FLOSS community represented by
the claimed email address.

That is a statement that is deeper than simply that the email adress
corresponds to the key.


Olek> Now, if they want me to sponsor them in the NM process, that's
Olek> when I am going to take a much closer look at their work and
Olek> their attitude and determine if we should grant them the level
Olek> of trust that goes with completing that process.

Agreed.

Olek> That is also
Olek> where I humbly submit we should have some level of identity
Olek> verification. I'm not sure what that should look like but the
Olek> point is where it should take place. If we previously verified
Olek> someone's identity and subsequently banned them from the
Olek> project, the NM process seems like the logical place to ensure
Olek> that such a person is not able to slip back into
Olek> Debian. Centralized and standardized is much easier in a
Olek> process administered by a few people (NM) than in a
Olek> distributed process with substantial variability and no means
Olek> of reliable QA (random keysigning party).  -Olek

It's hard to evaluate such a suggestion until you do know what such a
process looks like.
I think that what we have today  by caring more about identity than
simply keys belonging to email addresses works reasonably well.
It may be that some identity verification process in NM works even
better.
I don't want to throw out what we have without a viable suggestion that
the project can get behind.

As an example, while copying government IDs and checking against some
central service, possibly also using one of those identity verification
services that looks at credit information etc, might (for many people in
the US and Europe at least) be more effective than what we do, I have
great confidence that would not be politically acceptable to the
project.
So, let's focus this thread on key signing and how to adapt that because
it's what we have today and because we're looking for some short-term
answers.
If you want to start a different thread proposing to revamp how we think
about identity, go for it.  For me at least you'll need a concrete
suggestion before I can approach that discussion.


signature.asc
Description: PGP signature