Protect what matters – even after you're gone. Make a plan for your digital legacy today.
Forum Discussion
XIII
4 years agoSuper Contributor
GPG support? (like SSH)
Would it be possible to add similar support for GPG keys?
froazin
1 year agoNew Contributor
Big +1
SSH commit signing is fine until you need to rotate keys. Revoking a GPG key will continue to show commits in GitHub (unsure about GitLab) as "verified (expired)". The only way I've found to do the same with SSH keys is to remove the old key completely, but then commits show as "unverified" which defeats the point of supply chain integrity since it's not possible to distinguish a commit that was signed with an old key, or a commit that was not signed, or signed with another key that's not allowed.
The alternative is to not rotate signing keys, but then you compromise supply chain integrity further by not ensuring keys are rotated in a timely fashion.
- ragectl1 month agoOccasional Contributor
The issue with SSH keys is they have no idea of a trust history, so they are not related in a way that GPG keys might be.
Having said that, if you keep your previous SSH keys in your allowed_signes file and don't delete them from your preferred git forge then those old SSH keys should remain listed as verified also.
Whether people trust signed commits or not is an exercise entirely for end user, they might not have your GPG keys trusted either.