Followup [Re: Follow-Up to Key Signing Party]
Ok, so I did, gpg --recv-keys ... [everyone's ID from the meeting ] gpg --fingerprint ... [ confirm fingerprints ] for key in ... ; do gpg --sign-key $key; done for key in ... ; do gpg --send-key $key; done Now "gpg --list-keys" shows all the keys I expected to see. And just now I did a "gpg --recv-keys <my ID>" and it said I had 6 new signatures, gpg: requesting key 103BA0B0 from hkp server pgp.mit.edu gpg: key 103BA0B0: "Jamie Guinan <guinan@bluebutton.com>" 6 new signatures gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model gpg: depth: 0 valid: 1 signed: 12 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 12 signed: 1 trust: 12-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2009-04-16 gpg: Total number processed: 1 gpg: new signatures: 6 I think that looks good. At some point I'll look into using it for email and other things, but at least the basics are there. -Jamie
Jamie Guinan wrote: (...)
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model gpg: depth: 0 valid: 1 signed: 12 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 12 signed: 1 trust: 12-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2009-04-16
Can anyone translate these lines? Also, when I signed keys this time, I wasn't asked what level of trust to attach to my signature. When we did this a few years ago, I remember having to answer or ignore that question, and my answers appear on those old sigs. When I tried to edit the trust level on the newly signed keys, it didn't seem to stick. Greg
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 gpg --update-trustdb You might have to do it twice if trusting someone now leads you to trusting someone else. - -eric Gregory Avedissian wrote:
Jamie Guinan wrote: (...)
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model gpg: depth: 0 valid: 1 signed: 12 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 12 signed: 1 trust: 12-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2009-04-16
Can anyone translate these lines?
Also, when I signed keys this time, I wasn't asked what level of trust to attach to my signature. When we did this a few years ago, I remember having to answer or ignore that question, and my answers appear on those old sigs. When I tried to edit the trust level on the newly signed keys, it didn't seem to stick.
Greg
_______________________________________________ Wlug mailing list Wlug@mail.wlug.org http://mail.wlug.org/mailman/listinfo/wlug
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFGVCJIaiVxdKlBO58RAj+WAJ0bvjr+a85pP7TC5rwdJJXVVfGGogCfcHQt cNPE0b+ga2YUbSTabwXHbeQ= =blTI -----END PGP SIGNATURE-----
Hi gang, Just wanted to let you know that I signed all of the keys from the PGP key signing party and sent them to the gpg mit server. I am not sure how to confirm that I did it correctly, so if someone can check his key and let me know if I did alright I'd appreciate it. Also how do I check who has signed my key? Thanks, Ross -----Original Message----- From: wlug-bounces@mail.wlug.org [mailto:wlug-bounces@mail.wlug.org] On Behalf Of Eric Martin Sent: Wednesday, May 23, 2007 07:15 To: Worcester Linux Users Group Subject: Re: [Wlug] Followup [Re: Follow-Up to Key Signing Party] -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 gpg --update-trustdb You might have to do it twice if trusting someone now leads you to trusting someone else. - -eric Gregory Avedissian wrote:
Jamie Guinan wrote: (...)
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model gpg: depth: 0 valid: 1 signed: 12 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 12 signed: 1 trust: 12-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2009-04-16
Can anyone translate these lines?
Also, when I signed keys this time, I wasn't asked what level of trust
attach to my signature. When we did this a few years ago, I remember having to answer or ignore that question, and my answers appear on
to those
old sigs. When I tried to edit the trust level on the newly signed keys, it didn't seem to stick.
Greg
_______________________________________________ Wlug mailing list Wlug@mail.wlug.org http://mail.wlug.org/mailman/listinfo/wlug
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFGVCJIaiVxdKlBO58RAj+WAJ0bvjr+a85pP7TC5rwdJJXVVfGGogCfcHQt cNPE0b+ga2YUbSTabwXHbeQ= =blTI -----END PGP SIGNATURE----- _______________________________________________ Wlug mailing list Wlug@mail.wlug.org http://mail.wlug.org/mailman/listinfo/wlug
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Minkov, Ross wrote:
Hi gang,
Just wanted to let you know that I signed all of the keys from the PGP key signing party and sent them to the gpg mit server. I am not sure how to confirm that I did it correctly, so if someone can check his key and let me know if I did alright I'd appreciate it. Also how do I check who has signed my key?
Thanks, Ross
HI Ross, It looks like you've signed my key correctly (thanks!). I see 7 signatures on your key (not including your own). I used kgpg to verify this graphically. Later, Andy - -- Andy Stewart, Founder Worcester Linux Users' Group (http://www.wlug.org) Chelmsford Linux Meetup Group (http://linux.meetup.com/393) Amateur Radio: KB1OIQ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) Comment: Using GnuPG with SUSE - http://enigmail.mozdev.org iD8DBQFGXq7wHl0iXDssISsRAgScAJ9Nk7NaQDrbp45Acz+wDrEGvX+/lACfSVZL RX8nGB/6SCeciNtSPsatZks= =B3kR -----END PGP SIGNATURE-----
participants (5)
-
Andy Stewart
-
Eric Martin
-
Gregory Avedissian
-
Jamie Guinan
-
Minkov, Ross