add keyserver list

This commit is contained in:
Malin Freeborn 2023-10-18 23:25:54 +02:00
parent 69d6c1ab53
commit 772f642679
Signed by: andonome
GPG Key ID: 52295D2377F4D70F

View File

@ -91,18 +91,41 @@ Once you're in the interface, type `trust`.
gpg --sign-key alice@posteo.net gpg --sign-key alice@posteo.net
``` ```
Then send those trusted keys up to a server, so people can see you have verified them: # Swapping Keys
This system relies on a ring of people swapping key information.
## Sending
Send those trusted keys up to a server, so people can see you have verified them:
```bash ```bash
gpg --send-keys 024C6B1C84449BD1CB4DF7A152295D2377F4D70F gpg --send-keys 024C6B1C84449BD1CB4DF7A152295D2377F4D70F
``` ```
## Upload Your Keys
## Add More Key Servers
Key servers often swap keys, but it's best to just send to multiple places immediately.
You can add key servers by adding this to `~/.gnupg/gpg.conf`.
```
keyserver hkps://keys.openpgp.org
keyserver hkps://mail-api.proton.me
keyserver hkps://keys.mailvelope.com
```
# Refresh Keys # Refresh Keys
Refreshing keys will tell you if some key you have contains a signature from someone you already trust, or if someone has published a revocation certificate (meaning their key should not be trusted any more).
```bash ```bash
gpg --refresh-keys gpg --refresh-keys
``` ```
You can use the [crontab](../basics/cron.md) to refresh keys.
# Export # Export
Your public key: Your public key: