GnuPG Fedora Core 3 - Printable Version +- Linux-Noob Forums (https://www.linux-noob.com/forums) +-- Forum: Linux Server Administration (https://www.linux-noob.com/forums/forum-8.html) +--- Forum: Security and Firewalls (https://www.linux-noob.com/forums/forum-87.html) +--- Thread: GnuPG Fedora Core 3 (/thread-2723.html) |
GnuPG Fedora Core 3 - xDamox - 2005-04-30 Well I though I would write a little tutorial on GnuPG encryption. Quote:GnuPG is a complete and free replacement for PGP. Because it does not use the patented IDEA algorithm, it can be used without any restrictions. GnuPG is a RFC2440 (OpenPGP) compliant application. The first step to using GnuPG is to generate a private and public key which will be used for encrypting files/signing documents. First create a .gnupg dir in your home directory as shown below: Code: mkdir .gnupg This is the directory your public and private key will be stored. The next step is to create the keys so type the command: Code: gpg --gen-key Once that command has been enter you will be prompted with: Code: gpg (GnuPG) 1.2.6; Copyright (C) 2004 Free Software Foundation, Inc. if you will be encrypting file and signing files use DSA and ELGamal or if your just using it to sign files choose DSA or RSA. Once you have selected your key type you will then be presented with a screen asking for a keysize as shown below: Code: DSA keypair will have 1024 bits. The keysize can be any depending on the file you want to encrypt/sign the keysize I settle for is 4096 :) if you do enter a keysize over 2048 you will be prompted with a message saying: Code: Keysizes larger than 2048 are not suggested because just type yes :)the next screen you will be prompted with is asking how long you want the keys to last. Code: Please specify how long the key should be valid. Then it will ask three more questions asking for your name etc. Now that the key is created you will be able to encrypt files by issuing the following: Code: gpg -e file_to_encrypt.txt you can also add -a to armor the encryption. once that is do it will create a file called: file_to_encrypt.txt.gpg or .asc thats about it you can also have a look at what other arguments gpg takes by typing: Code: gpg --help well good luck GnuPG Fedora Core 3 - znx - 2005-05-02 neat... walked it through.. perfect [img]<___base_url___>/uploads/emoticons/default_laugh.png[/img] GnuPG Fedora Core 3 - P38 - 2005-05-02 Now, what are you going to do with it? Don't get me wrong. I like GPG and I have used it and PGP back to the days just after Phillip Zimmerman released it to the world. The problem is, not many people use it and except for the hard-core community, a pgp/gpg signature means little to nothing. I've even had people ask me why my emails were so ugly. (I signed each email that I sent and my key's fingerprint was included in my signature.) Now, I have shifted from gpg/pgp over to a digital certificate in my outlook and I am watching X.509 support in gpg and the open email programs like pine and mutt. Maybe a poll would be in order. "Do you use gpg or pgp to sign or encrypt your email". I bet the percentage of users that reply yes would be shockingly low. GnuPG Fedora Core 3 - znx - 2005-05-02 i use it for those that i can.. but not for a lot in all honesty GnuPG Fedora Core 3 - lerum - 2005-05-03 I only use it for Important emails like when I send my coursework to home. Other than that. The answer would be no I don't Use it much. GnuPG Fedora Core 3 - xDamox - 2005-05-04 I think when you sign emails with GPG with the new KMail it attached the public key instead of adding the ugly signature at the bottom :) GnuPG Fedora Core 3 - P38 - 2005-05-04 Quote:I think when you sign emails with GPG with the new KMail it attached the public key instead of addingthe ugly signature at the bottom :) That is the way that Mutt does it also. According to the docs, that indicates that the signature is taking place late enough in the process that the message plus all the attachments are being signed. Pine, on the other hand, uses a script to encrypt/sign messages and it does not encript/sign the message attachements as part of the message. |