Repository with OpenPGP keys of the DebOps People
Switch branches/tags
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.
debops-keyring-gpg Fix expiration date of Robin Schneider (Automatic Signing Key) Jun 20, 2017
docs OpenPGP keys can have multiple subkeys Feb 10, 2017
roles Add GPG keys of Aleksey Gavrilov . Sep 15, 2016
.gitignore Enforce that all commits are signed by a key in the debops-keyring Jul 22, 2016
.travis.yml Fix `revert_unsigned_merge_commit` workaround Aug 4, 2016
CHANGES.rst Prefer armor public key exports because it is easier to diff Jun 11, 2017
COPYRIGHT Use the term "OpenGPG" instead of GPG for things like keys and signat… Jul 20, 2016
Makefile Optimize coding style Aug 7, 2016
README.rst Prefer armor public key exports because it is easier to diff Jun 11, 2017
keyids Add GPG keys of Aleksey Gavrilov . Sep 15, 2016



The debops-keyring contains OpenPGP/GnuPG keys used by the DebOps Developers and DebOps Contributors. These keys can be used to authenticate and verify the git commits and tags in main repositories of the DebOps Project.


The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14, [RFC2119].

Why OpenPGP keys are used to sign code in the DebOps Project

The DebOps Project is designed to be used in production environment, therefore some kind of a verifiable trust path is REQUIRED to ensure that the code used to execute commands can be trusted. Because DebOps Project is developed in an environment not exclusively controlled by its Developers (GitHub), additional verification of authenticity provided by commits and tags signed by trusted OpenPGP keys is beneficial to the DebOps Project and its users, regardless of whether signing each git commit is sensible or not.

See also:

Canonical source of the debops-keyring repository

The repository was initialized and signed by Maciej Delmanowski on his own private computer and uploaded to the GitHub repository using the SSH protocol. It can be found at the following URL:

Repository contents

The repository layout is modeled after the debian-keyring.

This directory contains OpenPGP keys currently used by people working on DebOps.
This file contains a canonical mapping between OpenPGP keys and the user names of their owners used within the DebOps Project.
This file defines who the current DebOps Project Leader is.
This file lists the DebOps Project Admins.
This file lists all DebOps Developers.
This file lists all DebOps Contributors.
This file lists all DebOps Bots.

Commit and tag verification

Before the verification can be performed correctly, you need to import the OpenPGP keys to your GnuPG keyring. To do that, you should clone this repository to a directory on your computer, for example with a command:

git clone ~/src/

After that, you should import the provided keys to your OpenPGP keyring:

gpg --import ~/src/*

To verify OpenPGP signatures on commits in a git repository, you can use the command:

git log --show-signature

To verify OpenPGP signature on a tag in a git repository, you can use the command:

git tag --verify <tag-id>

Adding your OpenPGP public key

When you feel associated with the DebOps Project and have made at least one contribution to the Project you are free to add your OpenPGP public key to this repository.

Printing Long Key IDs:

gpg --keyid-format long --list-keys

To do so you should add your OpenPGP public key(s) to debops-keyring-gpg/ using:

gpg -a --export <long_key_ID> > <long_key_ID>

Additionally, it is REQUIRED that you upload your public key(s) to or another OpenPGP keyserver pools which sync with This is also the place where changes (subkeys actively used for signing or encryption, and key expiration) to your key(s) MUST be uploaded to. Key signatures SHOULD be uploaded there as well.

And then specify the key ID to person mapping in the keyids file.

Note that you SHOULD be reasonably confident that "no one has ever had a copy of your private key"[1]. Otherwise you could easily be impersonated. Refer to OpenPGP Best Practices for more details.

Then add yourself to the corresponding file, either roles/contributors or roles/developers (if the requirements from the Becoming a DebOps Developer section are met).

The commit that you make to add or change these files MUST be signed by your most trusted OpenPGP signing (sub)key (Root of Trust – in case you have multiple which (cross) sign each other) to prove that you have control over this identity.

To prove that you have full control over your account on the source code management platform used to work on the DebOps Project (currently GitHub) it is RECOMMENDED for the DebOps Contributors and REQUIRED for the DebOps Developers to provide a proof via the means of

Additionally, it is RECOMMENDED to take part in the Web Of Trust to make it harder for an adversary to fake signatures by pretending to be one of the DebOps Contributors or Developers. In particular as the DebOps Project is related to the Debian Project it is RECOMMENDED to get your key signed by at least one Debian Developer. A signature from another DebOps Developer is sufficient as well.


For asymmetric public-key cryptography we consider any key length below 3248 bits to be deprecated at the time of this writing (for long term protection).

2048 bits (assuming RSA) is the absolut minimum key size which MUST be met (enforced by CI tests).


Changing your OpenPGP public key

The policy for this procedure is not yet fixed. A starting point could be Rules for key replacement in the Debian keyring.

Becoming a DebOps Developer

To become a DebOps Developer, you SHOULD have contribution to the DebOps Project for a while (say 6 months) and know a thing or two how the Project works.

To make this official, all you need to do is follow the Adding your OpenPGP public key section and then add yourself to the roles/developers file.