FUDCon:Blacksburg 2012 GPG Key Signing Event

From FedoraProject

(Difference between revisions)
Jump to: navigation, search
(Add herlo per IRC)
Line 68: Line 68:
 
|-
 
|-
 
| Thom Carlin || thom || 0x1285BE7C || AE19 E8EF BC0B 87E5 FA56  3B9E 8870 B778 1285 BE7C
 
| Thom Carlin || thom || 0x1285BE7C || AE19 E8EF BC0B 87E5 FA56  3B9E 8870 B778 1285 BE7C
 +
|-
 +
| Clint Savage || herlo || 0x62A2258E || 8C10 443D 7F49 A694 018C  A2DD 7D27 D8A2 62A2 258E
 
|-
 
|-
 
! Name !! FAS Username !! Key ID !! Fingerprint
 
! Name !! FAS Username !! Key ID !! Fingerprint

Revision as of 01:52, 9 January 2012

There will be a GPG Key Signing Event held at FUDCon Blacksburg 2012 on Saturday, January 14th, at 1600 (4pm).

Please sign up below and make sure your key is available on the public keyserver network or make a note here with the url if it is not.

We will be conducting the event as follows: The participants will send their key information to the coordinator who would compile it into a list (compiled from this wiki page). Each participant, upon arriving at the party, will be given a copy of the key list. Each participant will then be called on by the coordinator. The participant will then check their key fingerprint against the fingerprint on the sheet that the coordinator gave them. If the participant is sure that their key is the same as the key on the sheet then the participant will read their fingerprint aloud so that the other party participants can make sure they also have the correct matching fingerprint. If they do in fact have the correct matching fingerprint, they will check it off on their sheet. This is necessary to make sure that the coordinator has not made a mistake in the generation of the sheet or has not slipped a sheet with faked key information to one or more of the participants. After everyone has checked off the participant's key, the coordinator will then call on the next participant, and so on. After all of the keys have been verified, the participants and coordinator will be asked to form a long single file line while holding their IDs in front of them. The person at the head of the line walks down the line and checks each person's ID. If their ID is correct, they will place a second check mark on their list. Once a key has two check marks it can be signed.

We are not providing specific guidelines on what IDs are acceptable, or how many are required, however, it is generally expected that each participant will be able to provide some sort of government issued photo identification, such as driver's license, passport, etc., matching the name on their key.

To upload your key, do gpg --keyserver keys.bz --send-keys 0xYOURKEYID

There will also be a CAcert Assurance event.

Name FAS Username Key ID Fingerprint
Nicholas E. Bebout nb 0x154FDAF0 8D9D C33B 8C30 5BBF 6E91 E783 9EF9 FA30 154F DAF0
Nicholas E. Bebout nb 0x110810E9 167B 4A54 236B BEAA 37DC CD92 ED14 D5E7 1108 10E9
Toshio Kuratomi toshio 0xCD84EE48 1289 DAF3 C7FC 1108 C77D ADD9 5FAC 8089 CD84 EE48
Jared Smith jsmith 0x210BDF5A 1E46 74AA A394 0EAA 6596 FDF0 7D9D 159F 210B DF5A
Kevin Fenzi kevin 0x34E36341 A6EA F625 0EBB F132 A8A9 32AD DE29 827B 34E3 6341
Eric Christensen sparks 0x024BB3D1 097C 82C3 52DF C64A 50C2 E3A3 8076 ABDE 024B B3D1
Perry Myers pmyers 0xE65E4F3D 88F9 F1C9 C2F3 1303 01FE 817C C5D2 8B91 E65E 4F3D
Dan Walsh dwalsh 0x8329A1B3 A868 816A C8BF B50C 6F44 63DF AE56 2F13 8329 A1B3
Klaatu klaatu 0x5000280F 45AE 6061 3BC8 EF6C 07BF CB39 1D97 D65F 5000 280F
Ricky Elrod codeblock 0xDAD3DF0E 9739 5A0F BDC8 1D20 A137 CDCC 0027 10B0 DAD3 DF0E
Matt Domsch mdomsch 0x92F0FC09 17A4 17D0 81F5 4B5F DB1C AEF8 21AB EEF7 92F0 FC09
Phil Benchoff n3pb 0xFA6C4994 5CD5 EFA3 E1C5 20B1 B0ED E38C 8337 8A94 FA6C 4994
Chuck Frain chuck 0xB2420431 2045 8609 1674 BE49 AD89 0661 5726 2343 B242 0431
Simon Sekidde sekidde 0x94BC377E 5848 958E 73BA 04D3 7C06 F096 1BA1 2DBF 94BC 377E
Luke Macken lmacken 0x390EBBB9 FFFF CD40 89FE 8E6F C38D A9D9 46C9 B778 390E BBB9
Richard B. Tilley (Brad) rtilley 0x6EF4DA92 2BC7 DF02 5E52 8660 95E5 769C 13E0 F3DE 6EF4 DA92
Thomas Weeks (Tweeks) tweeks 0x750152F1 5A27 DABA EEBC 63A5 2A46 0D78 2757 662F 7501 52F1
Richard W. Godbee, Jr. rwg 0xD1F5C478 C8DB B3B6 352E 8760 8FA2 3BE2 3C32 C580 D1F5 C478
Ben Boeckel mathstuf 0x57E02D57 F4C9 5FFD 6EA4 F7F1 2E19 5865 A6B1 6AF5 57E0 2D57
Ben Boeckel (work) mathstuf 0xD72AD0EF D49F D289 AB5F 09DE 28FB 8006 011B D2DB D72A D0EF
Mark Walker marwalk 0xAA482E46 D780 2F66 B08D 739D 3BF0 2468 7C22 870D AA48 2E46
James Schwinabart mutantmonkey 0x3A7676E7 384E 1FED 4AFE 4843 5432 77E5 D7CE BBD3 3A76 76E7
Christoph Wickert cwickert 0x1999A427 8BFD B656 3415 D8DA 559F 1478 1AAC 3E75 1999 A427
Christoph Wickert (work) cwickert 0x85DACC63 4531 6312 111F 6582 A19F 27A2 168B 6216 85DA CC63
Jeroen van Meeuwen kanarip 0x9342BF08 C6B0 7FB4 43E6 CDDA D258 F70B 28DE 9FDA 9342 BF08
Colin Walters walters 0xAE087291 1CEC 7A9D F7DA 85AB EF84 3DC0 A866 D7CC AE08 7291
Thom Carlin thom 0x1285BE7C AE19 E8EF BC0B 87E5 FA56 3B9E 8870 B778 1285 BE7C
Clint Savage herlo 0x62A2258E 8C10 443D 7F49 A694 018C A2DD 7D27 D8A2 62A2 258E
Name FAS Username Key ID Fingerprint

Back to FUDCon:Blacksburg_2012.