[74573] in North American Network Operators' Group
Re: NANOG 32 PGP key signing
daemon@ATHENA.MIT.EDU (Jonathan McDowell)
Tue Oct 5 08:59:32 2004
Date: Tue, 5 Oct 2004 13:58:55 +0100
From: Jonathan McDowell <noodles@earth.li>
To: nanog@merit.edu
Errors-To: owner-nanog-outgoing@merit.edu
In article
<20041004194249.1ac15275@216-80-33-36.drb-bsr1.chi-drb.il.cable.rcn.com>
(earth.lists.nanog) you wrote:
> Those of you attending NANOG 32 are encouraged to submit your public PGP
> key to take part in the regular key signing event.
...
> As usual, the group PGP signing event will occur following the nsp-sec
> BoF on Monday night. Full details for the NANOG 32 PGP signing event
> can be found here:
> <http://www.nanog.org/pgp.html>
There doesn't seem to be a lot of emphasis on identity verification
according to this page. It only says "You might want to bring photo id
with you". Personally, and all the keysignings I've been involved with
and people I've spoken to about them, you should *always* verify
government issue photo id when agreeing to sign someone's key.
Len Sassaman's Efficient Group Key Signing Method is worth a read too.
It's at:
http://sion.quickie.net/keysigning.txt
J.
--
"Just because I'll spend 4 hours | .''`. Debian GNU/Linux Developer
automating a task that takes 4 | : :' : Happy to accept PGP signed
minutes by hand doesn't mean I'm | `. `' or encrypted mail - RSA +
not lazy." -- Mike Sphar, asr | `- DSA keys on the keyservers.