[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Fsfe-portugal] Assinatura de chaves gpg
From: |
Jaime E . Villate |
Subject: |
[Fsfe-portugal] Assinatura de chaves gpg |
Date: |
Fri, 8 Jun 2001 11:38:24 +0100 |
User-agent: |
Mutt/1.2.5i |
Viva,
Por favor não esqueçam que na noossa reunião de amanhã às 11h vamos fazer
também uma sessão de asssinatura de chaves digitais. Isto será muito
importante se depois quisermos fazer o trabalho da associação via Internet.
Envio em anexo umas dicas que costumam enviar no projecto Debian quando se faz
uma "signing party" para quem não esteja familiarizado com esses eventos.
Jaime
-------------
From: Evan Prodromou <address@hidden>
Date: 07 Jun 2001 11:23:06 -0700
THE KEYSIGNING PARTY
--------------------
If you've never participated in a keysigning party before, it's pretty
fun, and it can really expand your Web of Trust. Also, signed keys are
required for New Maintainers, so NM candidates should definitely make
this party!
I'll be co-ordinating the keysigning. If you have a GnuPG key that you
want signed, please send it to my address (address@hidden) before 13
Jun 12:00PM, so I can add it to the keyring to sign.
OK, so, here are the steps for a key-signing party.
BEFORE THE PARTY
0. Generate a GnuPG public key, if you don't already have one. To
understand a little more about GnuPG, please try to skim the GnuPG
privacy handbook, available at
/usr/share/doc/gnupg-doc/GNU_Privacy_Handbook/
after an "apt-get install gnupg-doc", or on the Web at:
http://www.gnupg.org/gph/en/manual.html
1. Send your key to the key-signing party organizer. You can get your
public key out of your keyring by doing a command like this:
gpg --export --armor "address@hidden" > yourname.asc
Then, email yourname.asc to the organizer (address@hidden).
Please, don't encrypt the mail you send to the organizer.
2. Print out a copy of your key fingerprint. This is for you to carry
around. You can get a copy of your key fingerprint by doing this:
gpg --fingerprint "address@hidden" > yourname.fp
...and then print yourname.fp out.
3. Make sure you have valid ID, like a passport or driver's license,
that has the same name as on your key.
AT THE PARTY
0. Get a copy of the keyring printout from the organizer.
1. For as many people as you can, do identification (see
below). (We'll probably have a semi-formal, around-the-room session
to do mass identification, which I'll explain at the event. It
worked pretty well last time.)
2. Meet people and have fun.
IDENTIFICATION
Here are the steps that happen when Alice is going to identify Bob.
Alice needs: keyring printout, pencil or pen.
Bob needs: fingerprint printout, ID.
0. Bob presents a picture ID, such as a driver's license or passport.
1. Alice marks on her keyring printout a single check next to Bob's
name, to indicate "identified."
2. Bob reads his fingerprint printout to Alice. Alice follows along
on her keyring printout.
3. If the fingerprint that Bob reads matches the fingerprint Alice has
on her printout, she makes a second check, indicating "fingerprint
matches."
Of course, it's nice if they then switch roles, and Bob identifies
Alice.
AFTER THE PARTY
0. Key signers download the party keyring from the URL I'll publish.
1. For each name on their keyring printout that has two checks
(identified, fingerprint matches), sign that key in the
keyring. For Alice to sign Bob's key, she would do a command like
this:
gpg --keyring /path/to/downloaded-keyring.gpg --sign-key "Bob"
--local-user "Alice"
Remember, keep the keyring separate.
(Also, please don't sign keys of people you did not personally
identify. If you don't take this process seriously, you are a weak
link in the Web of Trust. If I see that you signed the key of
someone who wasn't at the event, I won't sign -your- key, and I'll
suggest that others don't, either.)
2. Once all the signatures have been added, send your copy of the
keyring back to the organizer (address@hidden). This copy will now
have all your signatures in it. Please return your signatures
within one week (by 20 Jun 2001).
3. The organizer will combine all the signatures together, and make
the new, merged keyring available for download. You can download
this file and then use
gpg --import /path/to/second/downloaded-keyring.gpg
To import all the keys with new signatures on them. Debian
members are encouraged to submit their new signatures to the key
server.
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [Fsfe-portugal] Assinatura de chaves gpg,
Jaime E . Villate <=