On Saturday 21 February 2004 08:56, Steven T. Hatton wrote:
A couple weeks back, someone suggested I publish my public key to a server.
I just learned that by not publishing it, it is causing people problems
when they try to read my email. I can simply attach the key to the same
mail that I signed, and the trust thereby established is as good as the
trust you have in the authenticity of my membership on this list.
Where can I learn more about this? In a hurry.
STH
Steven
In order to publish your key to a public key server, you first have to
generate a public key block for your key. This has to include ONLY your key,
not others already on your keyring. Proceed as follows.
1. List your keys (most of output omitted).
dbarnes@beverly:~> gpg --list-keys
/home/dbarnes/.gnupg/pubring.gpg
--------------------------------
pub 1024D/384446AF 2004-02-12 David Barnes
sub 1024g/73E4D46C 2004-02-12
pub 1024D/59F7C813 2003-05-23 Andreas Schaumann
sub 1024g/9A7B2CF0 2003-05-23
2. Choose a uid to export - can be anything that gpg interprets as uniquely
identifying your key. For me, I used "kcuk", and used grep to verify that
only the key I wanted was exported.
dbarnes@beverly:/media/sda1> gpg --list-keys | grep kcuk
pub 1024D/384446AF 2004-02-12 David Barnes
3. Export your public key in ascii form.
dbarnes@beverly:~> gpg --export --armor kcuk
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.2.2 (GNU/Linux)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=amDM
-----END PGP PUBLIC KEY BLOCK-----
4. Use konqueror (or whatever is your favourite brownser) to go up onto a
public keyserver.
I used "www.keyserver.net/en/".
5. Select the tab "Add a key".
6. Paste the output at stage 3 into the "Paste your key here" window in your
browser.
Press the "Submit this key to the keyserver" button.
7. You can verify that the key has been successfully added by checking via the
fingerprint - in my case "0x384446AF" from stage 2 in the "Search for:" box
(press the "Search for:" button).
NB: note the lower case x and upper case everything else.
Your key should be found.
--
Best Regards
David Barnes