Page 1

GPG SERVER CONFIGURATION AND NOTES


Table of Contents Table of Contents ...................................................................................... 2 Common GPG Commands ........................................................................... 3 Creating a Public/Private keypair ............................................................... 3 Create a sub-key for Encryption ............................................................. 5 List Public Keys in Ring ..................................Error! Bookmark not defined. Export a Public Key .......................................Error! Bookmark not defined. Importing a public key from another company ...Error! Bookmark not defined. Not Sure Warning .........................................Error! Bookmark not defined. Sign a Public Key ..........................................Error! Bookmark not defined. Trust a key (don’t do this now) .......................Error! Bookmark not defined. Deleting a public key from key ring ..................Error! Bookmark not defined. Encrypting a File (email Armor Format) ............Error! Bookmark not defined. Decrypting a file ...........................................Error! Bookmark not defined. Setting up Server ............................................Error! Bookmark not defined. Setup initial key ...........................................Error! Bookmark not defined. Create a sub-key for Encryption ......................Error! Bookmark not defined. Generate a Public Key we can give people .........Error! Bookmark not defined.


Common GPG Commands The following include commonly used commands using the GNGPG application.

Creating a Public/Private keypair This is a process that only needs to be done if you need to create a new public/private key. The first part, creates the private key. It is then used to create an encryption key which is what will be used when you want to encrypt a file. # gpg --gen-key gpg (GnuPG) 1.4.10; Copyright (C) 2008 Free Software Foundation, Inc. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Please select what kind of key you want: (1) RSA and RSA (default) (2) DSA and Elgamal (3) DSA (sign only) (4) RSA (sign only) Your selection? 4 RSA keys may be between 1024 and 4096 bits long. What keysize do you want? (2048) Requested keysize is 2048 bits Please specify how long the key should be valid. 0 = key does not expire <n> = key expires in n days <n>w = key expires in n weeks <n>m = key expires in n months <n>y = key expires in n years Key is valid for? (0) 0 Key does not expire at all Is this correct? (y/N) y You need a user ID to identify your key; the software constructs the user ID from the Real Name, Comment and Email Address in this form: "Heinrich Heine (Der Dichter) <heinrichh@d uesseldorf.de>" Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o You need a Passphrase to protect your secret key. You don't want a passphrase - this is probably a *bad* idea! I will do it anyway. You can change your passphrase at any time, using this program with the option " --edit-key". . . .


gpg: key 31B Note that this key cannot be used for encryption. You may want to use the command "--edit-key" to generate a subkey for this purpose.


Create a sub-key for Encryption Now you are going to create a sub-key that will be used for encrypting files. # gpg --edit-key Secret key is available. pub 2048R Command> addkey This key is not protected. Please select what kind of key you want: (3) DSA (sign only) (4) RSA (sign only) (5) Elgamal (encrypt only) (6) RSA (encrypt only) Your selection? 6 RSA keys may be between 1024 and 4096 bits long. What keysize do you want? (2048) Requested keysize is 2048 bits Please specify how long the key should be valid. 0 = key does not expire <n> = key expires in n days <n>w = key expires in n weeks <n>m = key expires in n months <n>y = key expires in n years Key is valid for? (0) 0 Key does not expire at all Is this correct? (y/N) y Really create? (y/N) y We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. pub 2048R/ Command> save


test  

test document

Read more
Read more
Similar to
Popular now
Just for you