Next OPLUG meeting.
Wednesday, February 5th - 2003 at 19:00 CET
Lincoln Pub
Vogts gt. 43, Torshov
Oslo, Norway
A key-signing party is a get-together with PGP users for the purpose of meeting other PGP users and signing each other's keys. This helps to extend the "web of trust" to a great degree. Also, it sometimes serves as a forum to discuss strong cryptography and related issues.
gpg --keyserver www.keyserver.net --send-key <Your_Key_ID>
sverrest@rachel:~$ gpg --fingerprint --list-keys `who am i` pub 1024D/ABACC699 2001-02-23 Sverre Stoltenberg <sverrest@opera.no> Key fingerprint = CCFC 5D16 0354 006B AB46 DB65 D9FD 8ED8 ABAC C699 sub 1024g/572EE7DA 2001-02-23
Key ID | Key Owner | Key Fingerprint | Key size | Key type | Key Info Matches? | Owner ID Matches? |
ABACC699 | Sverre Stoltenberg <sverrest@opera.no> | CCFC 5D16 0354 006B AB46 DB65 D9FD 8ED8 ABAC C699 | 1024 | DSA |
sverrest@rachel:~$ gpg --keyserver www.keyserver.net --recv-keys <Key_ID>
If you get a read error, it means the keyserver is overloaded. Please, try again in a few seconds.
Step 2: Fingerprint and Verify the key
sverrest@rachel:~$ gpg --fingerprint <Key_ID>
GPG will print out the fingerprint of the Key with <Key_ID> (the key you just downloaded). Check the fingerprint against the checklist that you where given at the party. Note: Don't check the fingerprint on your checklist against the fingerprint on the web page as the server may not send you the same key it displays on the web page.
Step 3: Sign the key
sverrest@rachel:~$ gpg --sign-key <Key_ID>
If you have multiple private keys, you can specify which of your private keys to sign the other persons public key with like this:
sverrest@rachel:~$ gpg --default-key <Key_to_use> --sign-key <Key_ID>
sverrest@rachel:~$ gpg --keyserver www.keyserver.net --send-key <Key_ID>
You should see a success message like this:
gpg: success sending to `www.keyserver.net' (status=200)
They have deprecated some config so if you get a warning about --honor-http-proxy, just add
sverrest@rachel:~/.gnupg$ grep keyserver-options options keyserver-options honor-http-proxy
If gpg complains about insecure memory, look at http://www.gnupg.org/documentation/faqs.html#q6.1