-
Notifications
You must be signed in to change notification settings - Fork 2
Description
Currently all commits in this repo are signed. This is good and I can verify them from example with git log --show-signature.
There are two keys that were used to sign commits, 4AEE930798874F0D018886BDB37E62D143879B36 and 4E1CD92D4E2096B647933E276735C0E1BD65D048. Of these, only 4AEE930798874F0D018886BDB37E62D143879B36 is available to download via the keyservers listed in the readme.
But while the keys might contain a developer name not unheard of in Rocky Linux land, there is no signature from the official Rocky Linux GPG key (RPM-GPG-KEY-rockyofficial), as published on the Rocky Website, to these keys. So how do I verify that this key is indeed related to Rocky Linux? A green checkmark shown on the Github website doesn't tell me that.
In the long run I want to be able import the official Rocky Linux key into my GPG-keyring once and then be able to verify the releases and checksums against this key over the years, regardless of which individual developer does the commits. When the same key is used for years, many people will have it in their keyrings, making fraudulent key changes much harder.
I think the best solution would be to sign all commits into this repo just with this one key. The second best solution would be if the keys used to sign the commits are signed by the official Rocky Linux GPG key and these signatures were published for easy download.