Closed Veraellyunjie closed 9 months ago
This is a valid concern - there is no proper way (that I know of) for GPG to automatically confirm that the key is actually owned by "team@hashbang.sh", and your local keystore (i.e. an "ultimate" trusted key that you manage) has not signed the hashbang.sh key. Note the text "unknown" in the "Good signature" line. This represents that the key is an unknown key.
The error message you got is that, despite you having a valid signature from the key in your keyring, you do not trust the key. However, you imported the key from a source you trust, and you can verify yourself that the fingerprint matches up. In short: this is working as expected. The signature is valid, it's just that you haven't trusted the key, so you need to look at the fingerprint manually and make sure it matches up.
Note: While there is a Web Key Directory system for OpenPGP, the GPG model of OpenPGP trust does not allow for WKD to be considered an automatically trusted source - while the user ID could verify that it is a valid key from "team@hashbang.sh" (according to the TLS trust model), GPG doesn't have a way to consider a key "valid" without also placing a trust value upon the key.
Not many projects offer verifying their gpg signature, so I am almost ignorant of the procedure and may misinterpret the messages. This is what I got:
Users are offered to verify before obtaining keys. It is suggested a bit later:
Hm, things happen...
"Good signature" vs. "not certified". Go guess... or go google... :)