![]() ![]() Remember this process is about authenticating you as a real individual. (You may change this expiration date after the key is generated, if you change your mind.)īefore the gpg program asks for signature information, the following prompt appears: Please specify how long the key should be valid.Įntering a value of 1y, for example, makes the key valid for one year. If, for example, the email address on the key becomes invalid, an expiration date will remind others to stop using that public key. It is a good idea to choose an expiration date instead of using the default, which is none. Larger is almost always recommended here, however your use case and security models may dictate otherwise.Īgain, the default is sufficient for almost all users, and represents an extremely strong level of security. A RSA/RSA key allows you not only to sign communications, but also to encrypt files. In almost all cases, the default is the correct choice. The first prompt asks you to select what kind of key you prefer: Press the Enter key to assign a default value if desired. Ī series of prompts directs you through the process. The Fedora Documentation Project, for example, asks participants to include a GPG public key in their self-introduction. Distribute your public key as widely as possible, especially to people who you know will want to receive authentic communications from you, such as a mailing list. Other people use your public key to authenticate and/or decrypt your communications. This command generates a key pair that consists of a public and a private key. Now you should make a backup of your private key. In most cases, if you are asked for the key ID, you should prepend "0x" to the key ID, as in "0圆789ABCD". To find your GPG key ID, look in the Key ID column next to the newly created key. If you forget your passphrase, the key cannot be used and any data encrypted using that key will be lost. Choose a passphrase that is strong but also easy to remember. A dialog is displayed asking for a passphrase for the key. Type your full name, email address, and an optional comment describing who you are (e.g.: John C. To create a key, go the the Activities overview and select Passwords and Encryption Keys, which starts the application Seahorse.įrom the File menu select New. You can also install Seahorse using the command line with the command su -c "dnf install seahorse". Select the checkbox next to the seahorse package and select Apply to add the software. Select the Search tab and enter the name seahorse. From the main menu, select Applications > Add/Remove Software. ![]() Install the Seahorse utility, which makes GPG key management easier.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |