![]() ![]() ![]() (If you use KDE desktop, there’s a similar program called KGPG.) If you use a GNOME-based desktop environement on Linux, then you can manage GPG keys in Seahorse, which is a graphical tool for managing and using encryption keys, passwords and certificates. Sample output /home/linuxbabe/.gnupg/pubring.kbx List Keys in Your Private Keyring gpg -list-secret-key Hint: Most of the time, you can use the fingerprint as key ID. List all keys with signature gpg -list-sigs List all keys in your public keyring gpg -list-keys If you are very careful about privacy, then don’t upload this public key, which has your signature on it. However, this also creates a privacy problem, because the world knows that you know the owner of this public key. This tells the key server that you trust this person’s public key, so other people will have more confidence to trust this public key. You must have you own private key in order to sign another’s public key.Īfter you sign the other person’s public key, you can optionally upload the public key to a key server. Its length is much shorter than the length of public key, therefore it’s easy for you to compare fingerprints. To sign a key, use command gpg -sign-key key-id Then you sign the key to certify it as a valid key.If the two fingerprints match, then you can be sure it’s the correct public key. You contact the key’s owner over the phone, in person or by other means as long as you make sure you contact the key’s true owner and you ask the owner what’s the fingerprint of his/her key.You view the fingerprint of the public key with command: gpg -fingerprint user-id.When somebody give you his/her public key, how do you know the public key really belongs to that person? Once you imported other’s public key, you should validate the key’s authenticity. Once you find the requested public key, you can import it to your keyring. To specify a particular key server, us the -keyserver option like below. If you know the key ID beforehand, use -recv-keys options to import the key from the keyserver. User ID is the recipient’s email address. Use the following command to search public keys on the keyserver. If the recipient’s public key is uploaded to a key server, you can import it from a key server. You can ask the recipient to give you the public key file and import it with the following command: gpg -import public-key-file Import from keyserver ![]() The keyring file is located at ~/.gnupg/pubring.kbx. The keyring contains your public key and imported public keys. If you need to send an encrypted message to a recipient with GPG, then you should import the recipient’s public key to your keyring. Step 3: Import Others’ Public Key to Your Keyring If you don’t verify your email address, then you can’t search the key by email address. When it asks what you want to do with this key, press N and it will quit, because this key is already on your system. gpg -search user-idĪs you can see, it found my public key. This way, an imposter can’t upload a fake key with your email address as the identifier.Īfter your email address is verified, you can search for your key on the key server. Then you will need to verify your email address. If you want others to search your public key by email address, then click the link in the email. If your public key is sent to the openPGP keyserver, it will send a notification to your email address.īy default, your pubic key is not available for search by email address. You have the choice to select a different public keyserver with -keyserver option, but I prefer to use the default openPGP keyserver. On Ubuntu, GPG will send your public key to the default keyserver hkps://. Use the following command to send your public key to a keyserver. There’re hundreds of public keyservers around the world. Remember you should never share your private key, only share your public key. Step 2: Share Your Public Key on Public Keyserver Replace user-id with your GPG email address. Run the following command to list your own GPG public key. We will also look at how to import and verify other’s public keys and manage your keyring. In part 2, you will learn how to upload your public key to a key server so others can send you encrypted messages that only can be decrypted with your private key. In part 1 of this GPG tutorial series, you learned the benefits of GPG and generated your public/private key pair. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |