* Bas van Gils ([EMAIL PROTECTED]) [010911 08:47]:
> 
> Hi everyone,
> 
> just recently I installed gpg on my machine (that is, after reading the
> article in Linux Journal). It works together with mutt brilliantly. No
> problem there. 
> 
> Now, I read a lot of debian mailinglists and noticed that a lot (all ?)
> of people in the Debian-organization post with a PGP-signature. Mutt
> "complains" that it can't verify the signatures because it doesn't have
> the public-keys in my key-ring. Makes sense ;-) 
> 
> I was wondering: is there an (easy) way of importing the keys of these
> people in my key-ring? Or do I have to look-up these keys at a
> key-server and import them 1 by 1 <guess that would be the `safe' thing
> to do..>

Well, the safest thing to do would be to verify people's key signatures
with the people themselves, and establish for yourself that you trust
that that key belongs to that person as much as you believe that that
person is who they say they are. Once you have done that, you should
probably sign the key consider it trusted.

In the meantime, you can add keys to your public keyring and consider
them mostly untrusted but still use them to verify signatures. If you've
been using a key for a long time, you develop some implicit trust level
that that really is that person's key, even if you don't know that
person. For example, if you've been watching me giving advice to people
on this list for months and always signing with the same key, you get
"enough" of a trust level that when you see someone dispensing advice
with a signature from this key, it's probably the same person who did it
a few weeks back (even though you have no proof that I'm actually Vineet
Kumar).

To start collecting public keys, your best bet is to tell gpg where it
can find a keyserver, and when you ask it to verify a signature whose
public key is not on your ring, it will automatically try to download it
from the keyserver. These downloaded keys should be considered the
lowest trust level; anyone can send a key to a keyserver with a bogus
uid on it and then start signing messages using it.

So now that I've gotten the lectures out of the way, here's how it's
acually done:

add a line like the following to your .gnupg/options file:
keyserver wwwkeys.us.pgp.net

After that, it will work like magic. No matter where you're calling
gnupg from (i.e. it works from inside mutt =) ), if it doesn't have that
key and you try to verify a signature, it wil try to get it from the
keyserver.

Cheers,

-- 
Vineet                                   http://www.anti-dmca.org
Unauthorized use of this .sig may constitute violation of US law.
echo Qba\'g gernq ba zr\!             |tr 'a-zA-Z' 'n-za-mN-ZA-M'

Attachment: pgpYO1XP21EGO.pgp
Description: PGP signature

Reply via email to