lk/data/gpg/basics.md

2.7 KiB

title tags
GPG Basics
Documentation
data
GPG

Making keys

Generate keys:

gpg --full-generate-key

Follow the guide.

Encrypting a file

gpg -r malinfreeborn@posteo.net -e file

-r specifies the recipient.

Check you have an encrypted version of your file.

Changing Expiration Dates

gpg --list-keys
# or...
gpg -k

... and then use the second part of 'pub', which is the ID. But that's not appearing here so... on with gpg2?

Making encrypted files with a local password

Make a password with a password (cypher encryption).

gpg -c --output passwords.txt

or

gpg -c > passwords.txt

Put in a password.

Write message then stop with Ctrl+d.

Get the message back out the file with:

gpg -d passwords.txt

Circles of Trust

Search for a key at any key store:

gpg --search-keys nestorv

Once you've made a decision about someone:

gpg --list-keys

You get something like this:

pub   rsa3072 2021-08-15 [SC] [expires: 2023-08-15]
      CD30421FD825696BD95F1FF644C62C57B790D3CF
uid           [ultimate] Malin Freeborn <malinfreeborn@posteo.net>
sub   rsa3072 2021-08-15 [E] [expires: after-forever]

Notice the long, ugly, string - CD30421FD825696BD95F1FF644C62C57B790D3CF - and how horribly ugly it is. This is a fingerprint.

You can now decide the trust level (this stays on your computer).

gpg --edit-key CD30421FD825696BD95F1FF644C62C57B790D3CF

Once you're in the interface, type trust.

gpg --sign-key alice@posteo.net

Swapping Keys

This system relies on a ring of people swapping key information.

Sending

Send those trusted keys up to a server, so people can see you have verified them:

gpg --send-keys 024C6B1C84449BD1CB4DF7A152295D2377F4D70F

Upload Your Keys

Add More Key Servers

Key servers often swap keys, but it's best to just send to multiple places immediately. You can add key servers by adding this to ~/.gnupg/gpg.conf.

keyserver hkps://keys.openpgp.org
keyserver hkps://mail-api.proton.me
keyserver hkps://keys.mailvelope.com

Refresh Keys

Refreshing keys will tell you if some key you have contains a signature from someone you already trust, or if someone has published a revocation certificate (meaning their key should not be trusted any more).

gpg --refresh-keys

You can use the crontab to refresh keys, but this will mostly fail, since keyservers often don't hold the right data.

Export

Your public key:

gpg --output me.gpg --armor --export

Alternatively:

gpg --export -a person@email.tld > my_key.pub