Received: by 2002:a05:7412:5112:b0:fa:6e18:a558 with SMTP id fm18csp918549rdb; Tue, 23 Jan 2024 21:41:40 -0800 (PST) X-Google-Smtp-Source: AGHT+IHb/owSaggeGAluSCTyKKQH3nkRCH95EYSVHKsmnAt4gZqoqbt3kdCbmqWCpZvpWuVtXWdU X-Received: by 2002:a05:6402:a4e:b0:55a:6ea2:e6ac with SMTP id bt14-20020a0564020a4e00b0055a6ea2e6acmr1179993edb.61.1706074900700; Tue, 23 Jan 2024 21:41:40 -0800 (PST) Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id p11-20020a05640243cb00b0055c9ccaa394si828591edc.673.2024.01.23.21.41.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 23 Jan 2024 21:41:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-36478-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@mit.edu header.s=outgoing header.b=F0BpVUTY; arc=fail (body hash mismatch); spf=pass (google.com: domain of linux-kernel+bounces-36478-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-36478-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 7728B1F24134 for ; Wed, 24 Jan 2024 05:41:40 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id C30E5E579; Wed, 24 Jan 2024 05:41:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=mit.edu header.i=@mit.edu header.b="F0BpVUTY" Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 29743DDCE for ; Wed, 24 Jan 2024 05:41:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=18.9.28.11 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706074892; cv=none; b=q1w1bpFHFT3KXbTI7uw3/ROcXjLUIlq4d6kLIhZ00lzNEhmnZjDvBUUCKgK9fOZDi4Y8A6lZOXDsH99fi+9yPc2U/GMDh6Dca4Z6eYJ9u+KoKoxDUkm44CDdJByQuUmTqfAYdvauID/vLw1ZSh6fpCB0fJgaq1EnHkEBgN1wr4g= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706074892; c=relaxed/simple; bh=RLLxUdkDPBsC4Vc8m/92Z8uc3PsBrwkuLEFD0qAnxk8=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=A0XqUHkgSXYCq0hUmQcp2kOpbHET1AbAwkv8csqk/mr0M6qalTpH7pwn75DAw4es52Zr12erhsJb8EaBG1x8nRlLZPEUGM4VpJiYGG4L29dPqY0ytmBBGVL3P4nsgyY0CRo4Gnzh6p/3aPVquDBTtI5SvRLfI13FvcSM5RWa+iQ= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=mit.edu; spf=pass smtp.mailfrom=mit.edu; dkim=pass (2048-bit key) header.d=mit.edu header.i=@mit.edu header.b=F0BpVUTY; arc=none smtp.client-ip=18.9.28.11 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=mit.edu Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=mit.edu Received: from cwcc.thunk.org (pool-173-48-122-36.bstnma.fios.verizon.net [173.48.122.36]) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 40O5aZSQ021415 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 24 Jan 2024 00:36:36 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=outgoing; t=1706074597; bh=sRhoaUO93OYOZ4Mh1rIvfQPvG6ITdq3qLbPLkxj4DZc=; h=Date:From:Subject:Message-ID:MIME-Version:Content-Type; b=F0BpVUTYIIq9DhD6RIMbtl8UtRyoZOfiiIWalFE4m3/nj+EyRGTrwU07sQz/KoWal NpwtarN3J7R0VIgTAZxNMn3j1CcW3B17QaYGzOmNRp+6OKAtvZqKBwWOCGFOh6NikM NjSG7Ek2kdVd08NvNoixsHjp72hiUpfCLyRR5H/fkOVd0EKbl0mlsmdiQyV/KrMt8S VlENNQZuzuAQAmho+7Lw/Nb0AaHZVmCdD4cPY7xQFtiETbaRjXgBCh9I1UYcfFDzNH HWTSjgdWUITuD/nyJOFZe0PRnXoXMgy98sSEevoH28zJJCQMS239VPFd3TJk/qhuI3 8d6NgA4oLWMew== Received: by cwcc.thunk.org (Postfix, from userid 15806) id E029415C04DD; Wed, 24 Jan 2024 00:36:34 -0500 (EST) Date: Wed, 24 Jan 2024 00:36:34 -0500 From: "Theodore Ts'o" To: Linus Torvalds Cc: Alexander Gordeev , G@mit.edu, James Bottomley , Andrew Morton , linux-scsi , linux-kernel Subject: Re: [GIT PULL] final round of SCSI updates for the 6.7+ merge window Message-ID: <20240124053634.GD1452899@mit.edu> References: <7b104abd42691c3e3720ca6667f5e52d75ab6a92.camel@HansenPartnership.com> <20240121063038.GA1452899@mit.edu> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Sun, Jan 21, 2024 at 10:48:35AM -0800, Linus Torvalds wrote: > On Sat, 20 Jan 2024 at 22:30, Theodore Ts'o wrote: > > > > Linus, you haven't been complaining about my key, which hopefully > > means that I'm not causing you headaches > > Well, honestly, while I pointed out that if everybody was expiring > keys, I'd have this headache once or twice a week, the reality is that > pretty much nobody is. There's James, you, and a handful of others. > > So in practice, I hit this every couple of months, not weekly. And if > I can pick up updates from the usual sources, it's all fine. James' > setup just doesn't match anybody elses, so it's grating. If we told those people who wantg to pursue key rotation to just always upload keys to the Kernel keyring, using the instructions here[1], and at the beginning of each merge window, you updated your local clone of the kernel keyring git repo[2], and then ran the scripts/korg-refresh-keys, the headache to you would be limited to running "cd ~/git/korg-pgpkeys ; git pull ; /scripts/korg-refresh-keys" every 2 or 3 months. The work you'd have to do would be a fixed amount of work, even if more people were using PGP key rotation. [1] https://korg.docs.kernel.org/pgpkeys.html [2] https://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git Would that be an acceptable (hopefully minimal!) amount of annoyance for you? - Ted