Key consistency checks

This requirement has been approved by Mattia Rizzolo <mattia@debian.org> 2 months, 2 weeks ago.

This process has been closed by gwolf on 2020-01-22: no further modifications are possible.

Every Debian member needs a GPG key of sufficient strength. In addition, all keys should be certified so we can link them to a real-world identity.

The normal requirements are:

If the key does not meet these requirements, and you would struggle to create one which does, contact Front Desk.

This check will be approved manually by Front Desk as the application progresses.

Keycheck results

OpenPGP fingerprint CFC5 EF85 1085 1E73 55B5 5E80 9D11 582A FD54 8CFA
Main key ok (last updated: 2020-03-16 15:12 UTC)
UID Gard Spreemann <gspreemann, gmail.com> ok, 0 non-DD sigs, 2 DD sigs:
  • D929F2992BEF0A33: Didier Raboud <didier@raboud.com>
  • B65A4871CA19D717: Tollef Fog Heen <tfheen@err.no>
UID Gard Spreemann <gard.spreemann, epfl.ch> skip uid_revoked, 0 non-DD sigs, 0 DD sigs:
  • none
UID Gard Spreemann <gspr, nonempty.org> ok, 0 non-DD sigs, 2 DD sigs:
  • B65A4871CA19D717: Tollef Fog Heen <tfheen@err.no>
  • D929F2992BEF0A33: Didier Raboud <didier@raboud.com>

Log

Date Author Action Content Public
2020-01-10 14:34 mattia req_approve Requirement approved yes
2019-09-10 12:10 mattia - Applicant shared plans on how to fix his key, proceeding with AM in the meantime yes
2019-08-30 13:47 mattia - You'll need one more DD signature to proceed. yes