We are going to create signed packages. You probably don't want your actual private keys lingering on the practice PC. So please create a keypair just for use during this symposium:
Note | |
---|---|
You may want to use a short and easy password, you 'll have to type it often. You also may want to use a key shorter than 2048 bits. (But on an actual keypair, longer!) |
gpg --gen-key
gpg (GnuPG) 1.4.11; Copyright (C) 2010 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
gpg: directory admin/jurjen/.gnupg' created
gpg: new configuration file admin/jurjen/.gnupg/gpg.conf' created
gpg: WARNING: options in admin/jurjen/.gnupg/gpg.conf' are not yet active during this run
gpg: keyring admin/jurjen/.gnupg/secring.gpg' created
gpg: keyring admin/jurjen/.gnupg/pubring.gpg' created
Please select what kind of key you want:
(1) RSA and RSA (default)
(2) DSA and Elgamal
(3) DSA (sign only)
(4) RSA (sign only)
Your selection? 1
RSA keys may be between 1024 and 4096 bits long.
What keysize do you want? (2048) 1024
Requested keysize is 1024 bits
Please specify how long the key should be valid.
0 = key does not expire
<n> = key expires in n days
<n>w = key expires in n weeks
<n>m = key expires in n months
<n>y = key expires in n years
Key is valid for? (0) 7
Key expires at Thu 01 Nov 2012 12:16:23 PM CET
Is this correct? (y/N) y
You need a user ID to identify your key; the software constructs the user ID
from the Real Name, Comment and Email Address in this form:
"Heinrich Heine (Der Dichter) <heinrichh@duesseldorf.de>"
Real name: John Sudoe
Email address: john@sudoe.com
Comment:
You selected this USER-ID:
"John Sudoe <john@sudoe.com>"
Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
You need a Passphrase to protect your secret key.
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
Not enough random bytes available. Please do some other work to give
the OS a chance to collect more entropy! (Need 284 more bytes)
.+++++
.+++++
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
..+++++
+++++
gpg: /admin/jurjen/.gnupg/trustdb.gpg: trustdb created
gpg: key D1D9258A marked as ultimately trusted
public and secret key created and signed.
gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
gpg: next trustdb check due at 2012-11-01
pub 1024R/D1D9258A 2012-10-25 [expires: 2012-11-01]
Key fingerprint = 887B 2FCB AF28 C63A 88EB E602 8BE6 B41A D1D9 258A
uid John Sudoe <john@sudoe.com>
sub 1024R/34FC48CC 2012-10-25 [expires: 2012-11-01]