[Swlug] Meeting << Cardiff >> this Tuesday - keysigning party!
Mark Einon
mark.einon at linux.com
Mon Jun 9 19:18:46 UTC 2014
Hi,
If you still haven't got yourself a PGP key for tomorrow's keysigning party,
here's a quick guide to getting one (although not the _most_ secure!):
* Install gpg (that's gpg, for 'GNU Privacy Guard', not pgp!) from your distro's repo.
* Generate your gnupg keys
bash$ gpg --gen-key
* Select the key types you want - The default is good.
Please select what kind of key you want:
(1) RSA and RSA (default)
(2) DSA and Elgamal
(3) DSA (sign only)
(4) RSA (sign only)
Your selection? <return>
* Select your key size: 4096
RSA keys may be between 1024 and 4096 bits long.
What keysize do you want? (2048) 4096<return>
Requested keysize is 4096 bits
* Set the lifetime of this key: 5 years is good
Requested keysize is 4096 bits
Please specify how long the key should be valid.
0 = key does not expire
<n> = key expires in n days
<n>w = key expires in n weeks
<n>m = key expires in n months
<n>y = key expires in n years
Key is valid for? (0) 1y<return>
Key expires at Fri Nov 5 00:19:43 EST 2014
Is this correct (y/n)? y<return>
* Enter your name and email address(es)...
Real name: Demo User<return>
Email address: demo at nonexistent.nowhere<return>
Comment:
You selected this USER-ID:
"Demo User <demo at nonexistent.nowhere>"
Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O<return>
* Choose a pass phrase. It should be something you won't forget. If you forget
your pass phrase, you cannot recover your key.
* Move the mouse and hit some keys maybe update locate in the background or run
a big find. GPG is reading from /dev/random to get some randomness for your
key generation. /dev/random is populated in part by the interrupts happening
on your computer.
That's it! You should now have a GPG key.
* Send your key to the keyserver:
bash$ gpg --keyserver keyserver.ubuntu.com --send-key <Your_Key_ID>
* Print out the information that you need to bring along to the party:
bash$ gpg --fingerprint <Your_Key_ID>
Hope to see you there!
Cheers,
Mark
On Thu, Jun 05, 2014 at 10:44:45PM +0100, Mark Einon wrote:
> On Thu, Jun 05, 2014 at 08:16:14AM +0100, gedge-l-swlug at yadn.org wrote:
> > ---- REMINDER
> >
> > The next SWLUG meeting in Cardiff
> > will be held on Tuesday (10/June/2014)
> > from around 7pm.
> >
> > Please check the web site - http://swlug.org - for any details/updates
> > (or http://twitter.com/SWLUG).
>
> I'll be there in www.thecityarmscardiff.com from 7ish.
>
> To make the event a bit more useful, there will also be an 'informal'
> PGP keysigning party. In order to participate, you'll need a PGP key.
> Details on how to get one, if you haven't got one already, and more
> keysigning information can be found at:
>
> http://www.cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html
>
> Some keyservers to use to upload your public keys are:
>
> http://keyserver.ubuntu.com/
> http://pgp.mit.edu/
>
> -----
>
> What's a key-signing party?
>
> A key-signing party is a get-together with PGP users for the purpose
> of meeting other PGP users and signing each other's keys. This helps
> to extend the "web of trust" to a great degree. Also, it sometimes
> serves as a forum to discuss strong cryptography and related issues.
>
> Required Items?
>
> 1. Physical attendance
> 2. Government-issued picture ID
> 3. Your key ID, key type, HEX fingerprint, and key size
> 4. A pen/pencil or whatever you'd like to write with....
> 5. NO computer
>
> Why should I use PGP?
>
> You should use PGP, if you need (or want) to protect your personal
> emails from being read by individuals or entities other than your
> intended recipient(s). PGP, when used correctly, can provide message
> privacy, message integrity, message authentication, and to some
> degree non-repudibility.
>
> OK. What are some good applications of PGP?
>
> Protection of email traffic of a sensitive nature, such as the
> coordination of response to ongoing security incidents, requests
> for DNS modifications, requests for networking changes and exchange
> of sensitive personal information like SSNs. At the very least, it
> would be useful to have all such messages signed, so the recipients
> could be sure that the notes were not forged.
>
> Cheers,
>
> Mark
>
> _______________________________________________
> Swlug mailing list
> Swlug at mailman.lug.org.uk
> https://mailman.lug.org.uk/mailman/listinfo/swlug
More information about the Swlug
mailing list