|
beautopia 9:19:14pm Tue contrib % gpg --version
gpg: Command not found.
beautopia 9:19:15pm Tue contrib % rehash
beautopia 9:19:16pm Tue contrib % gpg --version
gpg (GnuPG) 1.0.6
Copyright (C) 2001 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.
Home: ~/.gnupg
Supported algorithms:
Cipher: 3DES, CAST5, BLOWFISH, RIJNDAEL, RIJNDAEL192, RIJNDAEL256, TWOFISH
Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA, ELG
Hash: MD5, SHA1, RIPEMD160
beautopia 9:19:18pm Tue contrib % gpg --gen-key
gpg (GnuPG) 1.0.6; Copyright (C) 2001 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.
gpg: Warning: using insecure memory!
gpg: /home/ptudor/.gnupg: directory created
gpg: /home/ptudor/.gnupg/options: new options file created
gpg: you have to start GnuPG again, so it can read the new options file
beautopia 9:19:19pm Tue contrib % gpg --gen-key
gpg (GnuPG) 1.0.6; Copyright (C) 2001 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.
gpg: Warning: using insecure memory!
gpg: /home/ptudor/.gnupg/secring.gpg: keyring created
gpg: /home/ptudor/.gnupg/pubring.gpg: keyring created
Please select what kind of key you want:
(1) DSA and ElGamal (default)
(2) DSA (sign only)
(4) ElGamal (sign and encrypt)
Your selection? 4
The use of this algorithm is deprecated - create anyway? n
Your selection? 1
DSA keypair will have 1024 bits.
About to generate a new ELG-E keypair.
minimum keysize is 768 bits
default keysize is 1024 bits
highest suggested keysize is 2048 bits
What keysize do you want? (1024) -cr-
Requested keysize is 1024 bits
Please specify how long the key should be valid.
0 = key does not expire
= key expires in n days
w = key expires in n weeks
m = key expires in n months
y = key expires in n years
Key is valid for? (0) -cr-
Key does not expire at all
Is this correct (y/n)? y
You need a User-ID to identify your key; the software constructs the user id
from Real Name, Comment and Email Address in this form:
"Heinrich Heine (Der Dichter) "
Real name: Patrick Tudor
Email address: ptudor@ptudor.net
Comment: pht #1 - personal
You selected this USER-ID:
"Patrick Tudor (pht #1 - personal) "
Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
You need a Passphrase to protect your secret key.
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
++++++++++.++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++..+++++++++++++++.++++++++++++++++++++.++++++++++++++++++++...++++++++++.....+++++
fsfghadfgdfghjadfgertWe need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
+++++.++++++++++..+++++.+++++...++++++++++.++++++++++.++++++++++...+++++..+++++++++++++++.++++++++++...+++++++++++++++++++++++++++++++++++.++++++++++........................>+++++...a.df.g......asd.fg........ae.r.g.<+++++....a.df.g......a.sdf.g.>..+++++........tr.wy..wy...et..y.ur...gf..s.hg..<+++++asdgf..s.df......>s+++++dbf..s...weyutr..y....djg.h..j..i.7..yuir...hjkf..m.cnb++e++yt5+^672354^ ^
public and secret key created and signed.
beautopia 9:22:03pm Tue contrib % gpg --list-keys
gpg: Warning: using insecure memory!
/home/ptudor/.gnupg/pubring.gpg
-------------------------------
pub 1024D/C75862A2 2001-07-04 Patrick Tudor (pht #1 - personal)
sub 1024g/6017D381 2001-07-04
beautopia 9:22:04pm Tue contrib % gpg --edit-key
gpg (GnuPG) 1.0.6; Copyright (C) 2001 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.
gpg: Warning: using insecure memory!
usage: gpg [options] --edit-key user-id [commands]
beautopia 9:24:08pm Tue contrib % gpg --edit-key ptudor
gpg (GnuPG) 1.0.6; Copyright (C) 2001 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions. See the file COPYING for details.
gpg: Warning: using insecure memory!
Secret key is available.
gpg: /home/ptudor/.gnupg/trustdb.gpg: trustdb created
pub 1024D/C75862A2 created: 2001-07-04 expires: never trust: -/u
sub 1024g/6017D381 created: 2001-07-04 expires: never
(1). Patrick Tudor (pht #1 - personal)
Command> adduid
Real name: Patrick Tudor
Email address: ptudor@monster.com
Comment: pht #2 - work
You selected this USER-ID:
"Patrick Tudor (pht #2 - work) "
Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
You need a passphrase to unlock the secret key for
user: "Patrick Tudor (pht #1 - personal) "
1024-bit DSA key, ID C75862A2, created 2001-07-04
pub 1024D/C75862A2 created: 2001-07-04 expires: never trust: -/u
sub 1024g/6017D381 created: 2001-07-04 expires: never
(1). Patrick Tudor (pht #1 - personal)
(2) Patrick Tudor (pht #2 - work)
Save changes? y
beautopia 9:27:06pm Tue contrib % gpg --armor --export
gpg: Warning: using insecure memory!
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.6 (OpenBSD)
Comment: For info see http://www.gnupg.org
mQGiBDtCfaARBACu1urN02rQSOi+5+Kne67yEUZkK2dZmxNhlneOd2UOncYHdlx7
SAWs/n5WBvYiLhVotdYR15oPJ/anQsGRa8/WY2b7taq9y85nSUknpPm0JeVXwmkl
Yro6VYYYKzY+bgNJVymCls9Xmpyv573+w5YoktN0kMZjGSeNjYWM+Al1MwCg5eBQ
k9bVTJffqdxSzTXzbib49zkD/2L388XMvvjfdcE52tQQ1qEydh9xvBLVt1qK1HIs
O5ryZuywCWDaMnrKiwg5TWbH+SUrDgTAudt62kwUY4Q4u96nA2kX6xSgLjzvByDo
oy5oOHyiYQ1vL5UwFsEt1VeQocyXKo2zll04OCarEE6DjKo1oDq4Pjycy2b6C9ke
ZDuiBACP2ygdg4wC4TlGlj78yd8ruMz/wJoHj862V5aXiyL0Qp65shxW7Xqrp0pY
706Nhhz7tpvZM9BFz0ZyJcSMLWrrz2+mhTYgTnB5emfGpIOsDd7yQJueTHfxrp35
aT7XPmYkwlg6WQDqXdEHdL5IiKDgVbZgqjaR3XF6/sUhRPNYfLQ1UGF0cmljayBU
dWRvciAocGh0ICMxIC0gcGVyc29uYWwpIDxwdHVkb3JAcHR1ZG9yLm5ldD6IVwQT
EQIAFwUCO0J9oAULBwoDBAMVAwIDFgIBAheAAAoJEPoVcvfHWGKioD0An2mq+I9n
GAZBKyqqXHSwkPWm//cTAKDSr/1Y4VjvZ+stw8QVanE8l25HOrQyUGF0cmljayBU
dWRvciAocGh0ICMyIC0gd29yaykgPHB0dWRvckBtb25zdGVyLmNvbT6IVwQTEQIA
FwUCO0J+gAULBwoDBAMVAwIDFgIBAheAAAoJEPoVcvfHWGKi/1YAoJItom7L4eMd
KqcrPG9mb/pC/XlqAJ0adM/pd+f+15B60ZH744d8HNR52rkBDQQ7Qn2tEAQAz0Pd
ioVB7bkFFXXVLbyHDr9PLNXfUn8DeBnrlwK0F7zrKsvpxcU8AXtH7bzLRgZ0meOH
iDiN6dB77L2vaoT5buCtHYNs9g9hnPqBtUCBSEwAYNf8oeammHsLBc5y3t400oVc
RlaTzSwh+RyA5+ldn1kwnRGus8eSM1WVlsDvA3sAAwUD/1N90CQNVgjE5fgfDMoM
vD6EVaGbo/R954PgnwnHfIv9U/D85YSdw/QSsP5pJYLzxk3aDIpDRjjIMxSs+rKe
tfvhBakWeSlIa8PHip1JL3l95YKg5I/UW6RBlAaTr0eBfIp9t073XOxPttZkjdBI
lupXAxpq3CgSTFjkH7ZL4JHFiEYEGBECAAYFAjtCfa0ACgkQ+hVy98dYYqKwiwCf
Vecs+mTfjcIDSQKi4SSsJPXSgnsAnjjzpIuzs9SMxqrFrKEd7ODsJZJj
=3EqS
-----END PGP PUBLIC KEY BLOCK-----
beautopia 9:27:08pm Tue contrib % more /usr/local/doc/mutt/samples/gpg.rc
# -*-muttrc-*-
#
# Command formats for gpg.
#
# This version uses gpg-2comp from
# http://muppet.faveve.uni-stuttgart.de/~gero/gpg-2comp.tar.gz
#
# $Id: gpg.rc,v 1.5.2.1 2000/05/23 08:15:02 roessler Exp $
#
# %p The empty string when no passphrase is needed,
# the string "PGPPASSFD=0" if one is needed.
#
# This is mostly used in conditional % sequences.
#
# %f Most PGP commands operate on a single file or a file
# containing a message. %f expands to this file's name.
#
# %s When verifying signatures, there is another temporary file
# containing the detached signature. %s expands to this
# file's name.
#
# %a In "signing" contexts, this expands to the value of the
# configuration variable $pgp_sign_as. You probably need to
# use this within a conditional % sequence.
#
# %r In many contexts, mutt passes key IDs to pgp. %r expands to
# a list of key IDs.
# decode application/pgp
set pgp_decode_command="gpg %?p?--passphrase-fd 0? --no-verbose --batch --output - %f"
# verify a pgp/mime signature
set pgp_verify_command="gpg --no-verbose --batch --output - --verify %s %f"
# decrypt a pgp/mime attachment
set pgp_decrypt_command="gpg --passphrase-fd 0 --no-verbose --batch --output - %f"
# create a pgp/mime signed attachment
# set pgp_sign_command="gpg-2comp --no-verbose --batch --output - --passphrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f"
set pgp_sign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --detach-sign --textmode %?a?-u %a? %f"
# create a application/pgp signed (old-style) message
# set pgp_clearsign_command="gpg-2comp --no-verbose --batch --output - --passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a?
%f"
set pgp_clearsign_command="gpg --no-verbose --batch --output - --passphrase-fd 0 --armor --textmode --clearsign %?a?-u %a? %f"
# create a pgp/mime encrypted attachment
# set pgp_encrypt_only_command="pgpewrap gpg-2comp -v --batch --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f
"
set pgp_encrypt_only_command="pgpewrap gpg -v --batch --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f"
# create a pgp/mime encrypted and signed attachment
# set pgp_encrypt_sign_command="pgpewrap gpg-2comp --passphrase-fd 0 -v --batch --output - --encrypt --sign %?a?-u %a? --armor --al
ways-trust -- -r %r -- %f"
set pgp_encrypt_sign_command="pgpewrap gpg --passphrase-fd 0 -v --batch --output - --encrypt --sign %?a?-u %a? --armor --always-tru
st -- -r %r -- %f"
# import a key into the public key ring
set pgp_import_command="gpg --no-verbose --import -v %f"
# export a key from the public key ring
set pgp_export_command="gpg --no-verbose --export --armor %r"
# verify a key
set pgp_verify_key_command="gpg --no-verbose --batch --fingerprint --check-sigs %r"
# read in the public key ring
set pgp_list_pubring_command="gpg --no-verbose --batch --with-colons --list-keys %r"
# read in the secret key ring
set pgp_list_secring_command="gpg --no-verbose --batch --with-colons --list-secret-keys %r"
# receive key from keyserver:
#set pgp_getkeys_command="wrap.sh -g %r"
set pgp_getkeys_command=""
|
|