Chinaunix首页 | 论坛 | 博客
  • 博客访问: 1745835
  • 博文数量: 297
  • 博客积分: 285
  • 博客等级: 二等列兵
  • 技术积分: 3006
  • 用 户 组: 普通用户
  • 注册时间: 2010-03-06 22:04
个人简介

Linuxer, ex IBMer. GNU https://hmchzb19.github.io/

文章分类

全部博文(297)

文章存档

2020年(11)

2019年(15)

2018年(43)

2017年(79)

2016年(79)

2015年(58)

2014年(1)

2013年(8)

2012年(3)

分类: LINUX

2016-07-19 11:24:02


此文转自: 
License:CC BY-NC-SA 3.0


A colleague at work once asked me how to get started using gpg, the . He had no experience with it at all. Here’s a slightly expanded version of what I told him.

Your Key

Private and public keys are at the heart of gpg’s encryption and decryption processes. The best first step is to create a key pair for yourself.

Generate a private key.

gpg --gen-key 

You’ll have to answer a bunch of questions:

What kind and size of key you want; the defaults are probably good enough.

How long the key should be valid. You can safely choose a non-expiring key for your own use. If you plan to use a key for public signing, you might want to consider a yearly expiration.

Your real name and e-mail address; these are necessary for identifying your key in a larger set of keys.

A comment for your key, perhaps to distinquish a key used for special tasks like signing software releases. The comment can be empty.

A passphrase. Whatever you do, don’t forget it! Your key, and all your encrypted files, will be useless if you do.

Generate an ASCII version of your public key.

gpg --armor --output pubkey.txt --export 'Your Name' 

You can freely distribute this file by sending it to friends, posting it on your web site, or whatever.

You might also want to register your key with public keyservers so that others can retrieve your key without having to contact you directly.

gpg --send-keys 'Your Name' --keyserver hkp://subkeys.pgp.net 

Encrypting a file for personal use

Encrypting files for your personal use is quite easy.

Encrypt a file called foo.txt. The argument to the --recipient option should be the all or part of the name you used when generating your private key.

# the long version gpg --encrypt --recipient 'Your Name' foo.txt # using terse options gpg -e -r Name foo.txt 

The encrypted version of the file will by default be named foo.txt.gpg. You can modify that behavior using the --output (-o) option.

Decrypt the encrypted file. You’ll be asked to provide the passphrase you used when generating your private key. If you don’t use the --output option, the contents of the encrypted file will be sent to standard output.

gpg --output foo.txt --decrypt foo.txt.gpg 

If you have an encrypted file that you think you’ll want to edit on a regular basis, you might consider using the for transparently editing gpg-encrypted files.

A more DIY approach can use make to automate the process of viewing and editing your encrypted file. Here’s an example Makefile (to use it, you’ll need to make sure that the leading whitespace in the targets is composed of Tabs, not ordinary spaces). The example assumes that foo.txt is the name of the unencrypted version of your file.

# example Makefile for viewing/editing an encrypted file GPGID = you@your.address
FILEPLAIN = foo.txt
FILECRYPT = $(FILEPLAIN).gpg

GPG = gpg
RM = /bin/rm -i
VI = vim all: @echo "" @echo "usage:" @echo "" @echo "* make view -- to see $(FILEPLAIN)" @echo "* make edit -- to edit $(FILEPLAIN)" @echo "" edit: @umask 0077;\ $(GPG) --output $(FILEPLAIN) --decrypt $(FILECRYPT) @$(VI) $(FILEPLAIN) @umask 0077;\ $(GPG) --encrypt --recipient $(GPGID) $(FILEPLAIN) @$(RM) $(FILEPLAIN) view: @umask 0077; $(GPG) --decrypt $(FILECRYPT) | less 

Encrypting a file for someone else

The really cool thing about GnuPG is that you can safely encrypt files for others using publicly available keys.

Import your friend’s key, which you might have received via e-mail or on a floppy. If the file is named key.asc, then just use the --import option to add it to your keyring:

gpg --import key.asc 

That’s it! You can verify the import using the --list-keys option.

Alternatively, you might be able to find your friend’s key on a public keyserver.

gpg --search-keys 'myfriend@his.isp.com' \
  --keyserver hkp://subkeys.pgp.net 

Here’s what a session looks like when someone searches for my key.

$ gpg --search-keys heinlein@madboa
gpgkeys: WARNING: this is an *experimental* HKP interface!
gpgkeys: searching for "heinlein@madboa" from HKP server
subkeys.pgp.net
Keys 1-5 of 5 for "heinlein@madboa"
(1)     Paul Heinlein 
          1024 bit DSA key 8F54CA35, created 2000-11-10
(2)     Paul Heinlein 
          1024 bit DSA key 8F54CA35, created 2000-11-10
(3)     Paul Heinlein 
          1024 bit DSA key 8F54CA35, created 2000-11-10
(4)     Paul Heinlein 
          1024 bit DSA key 8F54CA35, created 2000-11-10
(5)     [user attribute packet]
          1024 bit DSA key 8F54CA35, created 2000-11-10
Enter number(s), N)ext, or Q)uit > 
gpgkeys: WARNING: this is an *experimental* HKP interface!
gpg: key 8F54CA35: public key "Paul Heinlein "
imported
gpg: Total number processed: 1
gpg:               imported: 1

You’ll note that my key has four different e-mail addresses attached to it. That’s perfectly normal.

Once you’ve got the other person’s public key, encrypt a file using it.

gpg --encrypt --recipient 'myfriend@his.isp.net' foo.txt 

You’ll end up with a file called foo.txt.gpg that you can send as an e-mail attachment or make available for downloading via ftp or the web.

Decrypting a file from someone else

If someone sends you an encrypted file, the file has typically been encrypted using your public key. Decrypting it is no different than decrypting a file you’ve encrypted for your own use.

gpg --output foo.txt --decrypt foo.txt.gpg 

Detached Signatures

GnuPG can come in handy when you want to be assured that the file you’ve just downloaded is the one its creator wants you to have. The OpenVPN developers, for instance, release GnuPG signatures for all their.

To verify a file using its detached signature, you must first have imported the signer’s public key. Assume we’ve downloaded crucial.tar.gz and the developers have also released a signature file, crucial.tar.gz.asc. Once you’re confident that you have the developers’ public key in your local keyring, then the verification step is easy:

gpg --verify crucial.tar.gz.asc crucial.tar.gz 

Creating a detached signature is similarly easy. The following example will create a signature for your-file.zip called your-file.zip.asc.

gpg --armor --detach-sign your-file.zip 

People who have imported your public key into their keyrings can then verify that their version of your file is identical to theirs.

Basic Key Management

After a while, you will probably have several keys in your ring. It’s easy to list them all:

gpg --list-keys 

Should you lose trust in or contact with a person with a key in your ring, you’ll want to delete it:

gpg --delete-key 'myfriend@his.isp.com' 

For further reading

To move beyond these simple instructions, consult the GnuPG Documentation.
#------------------------------------------#
basically 我只用这玩意来检查我下载的包。 
e.g

点击(此处)折叠或打开

  1. curl -Ok http://mirrors.cnnic.cn/apache/tomcat/tomcat-9/v9.0.0.M9/bin/apache-tomcat-9.0.0.M9.tar.gz
  2. curl -Ok https://www.apache.org/dist/tomcat/tomcat-9/v9.0.0.M9/bin/apache-tomcat-9.0.0.M9.zip.asc
  3. gpg --verify apache-tomcat-9.0.0.M9.zip.asc apache-tomcat-9.0.0.M9.tar.gz
  4. #发现缺少作者的Public key
  5. gpg --keyserver pgpkeys.mit.edu --recv-key 2F6059E7
  6. #再来verify
  7. gpg --verify apache-tomcat-9.0.0.M9.zip.asc apache-tomcat-9.0.0.M9.tar.gz
  8. #公钥的fingerprint
  9. gpg --fingerprint 2F6059E7
  10. #list keys
  11. gpg --list-keys


阅读(1338) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~