The board took up this subject briefly at our Aug 29th meeting.  Below is
the board's feedback;

Marshall Schor wrote:
> 
> Apache signing, to my knowledge, doesn't require use of a certificate
> authority.

Apache projects post trusted signatories in a KEYS or equivalent file within
the http://www.apache.org/dist/{project}/ distribution location.  You may
also advertise any key within the http://people.apache.org/ committers view
by following the instructions on that site for maintaining your .foaf entry.

PGP keys should also be registered at the pgp.mit.edu keyserver, and we ask
you to countersign one anothers' keys at an appropriate event, such as the
ApacheCon key signing events.

However, the board considers any personal signing mechanism to be equivalent
and appropriate.  So signing a tarball with your PGP key, or a jar with your
Java Code Signing Certificate, or a .NET assembly with a Code Signing Cert
would all be equivalent.  Simply document the trusted certificates in the
appropriate distribution/download directories, and preferably include some
short comments or instructions for users to obtain/validate the signatures
of packages they download.

> I'd be interested to learn if others have gone down the Java JAR signing
> path, and if so,
>  - is it considered an OK alternative to Apache signing,

Source tarballs should still be signed with your pgp key.  Binaries can
be signed (as appropriate) with your code signing certificate as necessary.

>  - how did you get a certificate authority to verify ownership of your
> signing key

If this becomes a frequently used approach and proves to be an issue, the
board will take up the issue of considering obtaining a signing authority
certificate and signing individual certificates at some point in the future,
once a specific proposal is brought to us.

Bill


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to