Difference between revisions of "Keysigning party"

From Wiki | LUG@UCLA
Jump to: navigation, search
Line 17: Line 17:
 
=== Way before the party ===
 
=== Way before the party ===
 
<ol>
 
<ol>
<li> create a PGP key if you haven't already: <code>$ gpg --gen-key</code>
+
<li> create a PGP key if you haven't already: <code>$ gpg --gen-key</code><br> WARNING: make sure you understand the implications of holding a private key, e.g. do not generate it on a computer you don't own and have ''full control'' over.
 
<li> sync your public key with keyservers: <code>$ gpg --send-keys '''$YOUR_KEY_ID'''</code><br>WARNING: this is irreversible. Make sure you are prepared to protect your private key and you are using a very strong passphrase.
 
<li> sync your public key with keyservers: <code>$ gpg --send-keys '''$YOUR_KEY_ID'''</code><br>WARNING: this is irreversible. Make sure you are prepared to protect your private key and you are using a very strong passphrase.
 
<li> submit your '''public''' key to LUG@UCLA:
 
<li> submit your '''public''' key to LUG@UCLA:

Revision as of 04:01, 1 November 2013

Gnupg logo.svg

Note Note: This page is for planning a keysigning party hosted by LUG@UCLA.

A keysigning party is an event for helping people verify each others' PGP keys and strengthening the web of trust.

  • take control of your privacy
  • meet other interesting members of the privacy-aware community
  • pizza

Event information

  • Where: Boelter Hall 4760
  • When: TBA

Instructions

Way before the party

  1. create a PGP key if you haven't already: $ gpg --gen-key
    WARNING: make sure you understand the implications of holding a private key, e.g. do not generate it on a computer you don't own and have full control over.
  2. sync your public key with keyservers: $ gpg --send-keys $YOUR_KEY_ID
    WARNING: this is irreversible. Make sure you are prepared to protect your private key and you are using a very strong passphrase.
  3. submit your public key to LUG@UCLA:

Right before the party

  1. download the keylist and keylist hash
    $ wget https://linux.ucla.edu/keysigning/keylists/keylist.txt
    $ wget https://linux.ucla.edu/keysigning/keyrings/keylist.txt.sha1
  2. check to see if your key ID is on the list next to your name
  3. personally verify the hash: $ sha1sum --check keylist.txt.sha1
  4. add the hash to the bottom of keylist.txt: $ cat keylist.txt.sha1 >>keylist.txt
  5. print keylist.txt and keep safe

During the party

  1. bring the printed copy of keylist.txt
  2. bring one or more forms of ID (e.g. drivers license + Bruin card)
  3. eat pizza

After the party

  1. retrieve your annotated keylist
  2. for every person on the list with two check marks, import that person's key into your local keyring: $ gpg --search-keys "First Last"

Troubleshooting

Q: how do I install GnuPG (gpg)?
A: if your operating system doesn't come with GnuPG already installed, you should seriously consider switching to a different operating system. If you're trying to use PGP on Windows or Mac, it kind of defeats the purpose because the software on your computer cannot be trusted to begin with. See Installfest

Resources