{"node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "revisions": [{"id": "f3eff2ea-2f95-11f1-ba98-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nThis document shows how to use the command line to work with PGP (GPG) for encryption.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate a key pair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nOptionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a private key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <private key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\nEdit and Trust a key\r\n====================\r\n\r\nTo edit a keys trust level (for instance to completely trust your own key) do the following:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --edit-key <KeyID>\r\n trust\r\n 5\r\n y\r\n quit\r\n\r\n\r\nEncrypt a directory\r\n===================\r\n\r\nIf you want to encrypt a directory instead of a file, use the gpg-zip tool:\r\n\r\n.. code-block:: bash\r\n\r\n gpg-zip ~/home/user/secret-files > ~/home/user/secret-files.gpg-zip\r\n\r\nIf you want to use a single shared key use the --symmetric flag.  It will prompt you for a password twice:\r\n\r\n.. code-block:: bash\r\n\r\n gpg-zip --symmetric ~/.password-store > password-store.gpg-zip\r\n\r\n\r\n--list-archive:\r\n  List the contents of the specified archive.\r\n\r\n\r\nHomework\r\n============\r\n\r\n#. create a gpg key pair\r\n#. encrypt a test file\r\n#. decrypt a test file\r\n#. export public and private key pair\r\n#. delete public and private key pair\r\n#. re-import public and private key pair\r\n#. try to decrypt test file again\r\n\r\nMisc\r\n====\r\n\r\n* The keyring files are binary and exist in *~/.gnupg*.\r\n\r\n", "source_format": "rst", "revision_number": 30, "created": 1405158978000}, {"id": "f3efec4f-2f95-11f1-886d-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nThis document shows how to use the command line to work with PGP (GPG) for encryption.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate a key pair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nOptionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a private key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <private key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\nEdit and Trust a key\r\n====================\r\n\r\nTo edit a keys trust level (for instance to completely trust your own key) do the following:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --edit-key <KeyID>\r\n trust\r\n 5\r\n y\r\n quit\r\n\r\n\r\nEncrypt a directory\r\n===================\r\n\r\nIf you want to encrypt a directory instead of a file, use the gpg-zip tool:\r\n\r\n.. code-block: bash\r\n\r\n gpg-zip ~/home/user/secret-files > ~/home/user/secret-files.gpg-zip\r\n\r\nIf you want to use a single shared key use the --symmetric flag.  It will prompt you for a password twice:\r\n\r\n.. code-block: bash\r\n\r\n gpg-zip --symmetric ~/.password-store > password-store.gpg-zip\r\n\r\nHomework\r\n============\r\n\r\n#. create a gpg key pair\r\n#. encrypt a test file\r\n#. decrypt a test file\r\n#. export public and private key pair\r\n#. delete public and private key pair\r\n#. re-import public and private key pair\r\n#. try to decrypt test file again\r\n\r\nMisc\r\n====\r\n\r\n* The keyring files are binary and exist in *~/.gnupg*.\r\n\r\n", "source_format": "rst", "revision_number": 29, "created": 1405157137000}, {"id": "f3efe50c-2f95-11f1-aae9-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nThis document shows how to use the command line to work with PGP (GPG) for encryption.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate a key pair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nOptionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a private key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <private key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\nEdit and Trust a key\r\n====================\r\n\r\nTo edit a keys trust level (for instance to completely trust your own key) do the following:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --edit-key <KeyID>\r\n trust\r\n 5\r\n y\r\n quit\r\n\r\n\r\nencrypt a directory\r\n===================\r\n\r\nIf you want to encrypt a directory instead of a file, use the gpg-zip tool:\r\n\r\n.. code-block: bash\r\n\r\n gpg-zip ~/home/user/secret-files > ~/home/user/secret-files.gpg-zip\r\n\r\nIf you want to use a single shared key use the --symmetric flag.  It will prompt you for a password twice:\r\n\r\n.. code-block: bash\r\n\r\n gpg-zip --symmetric ~/.password-store > password-store.gpg-zip\r\n\r\nHomework\r\n============\r\n\r\n#. create a gpg key pair\r\n#. encrypt a test file\r\n#. decrypt a test file\r\n#. export public and private key pair\r\n#. delete public and private key pair\r\n#. re-import public and private key pair\r\n#. try to decrypt test file again\r\n\r\nMisc\r\n====\r\n\r\n* The keyring files are binary and exist in *~/.gnupg*.\r\n\r\n", "source_format": "rst", "revision_number": 28, "created": 1405157120000}, {"id": "f3efddf5-2f95-11f1-ac6c-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nThis document shows how to use the command line to work with PGP (GPG) for encryption.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate a key pair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nOptionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a private key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <private key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\nEdit and Trust a key\r\n====================\r\n\r\nTo edit a keys trust level (for instance to completely trust your own key) do the following:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --edit-key <KeyID>\r\n trust\r\n 5\r\n y\r\n quit\r\n\r\n\r\nHomework\r\n============\r\n\r\n#. create a gpg key pair\r\n#. encrypt a test file\r\n#. decrypt a test file\r\n#. export public and private key pair\r\n#. delete public and private key pair\r\n#. re-import public and private key pair\r\n#. try to decrypt test file again\r\n\r\nMisc\r\n====\r\n\r\n* The keyring files are binary and exist in *~/.gnupg*.\r\n\r\n", "source_format": "rst", "revision_number": 27, "created": 1404081069000}, {"id": "f3efd5c0-2f95-11f1-9121-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nThis document shows how to use the command line to work with PGP (GPG) for encryption.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate a key pair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nOptionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a private key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <private key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\nEdit and Trust a key\r\n====================\r\n\r\nTo edit a keys trust level (for instance to completely trust your own key) do the following:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --edit-key <KeyID>\r\n trust\r\n 5\r\n y\r\n\r\n\r\nHomework\r\n============\r\n\r\n#. create a gpg key pair\r\n#. encrypt a test file\r\n#. decrypt a test file\r\n#. export public and private key pair\r\n#. delete public and private key pair\r\n#. re-import public and private key pair\r\n#. try to decrypt test file again\r\n\r\nMisc\r\n====\r\n\r\n* The keyring files are binary and exist in *~/.gnupg*.\r\n\r\n", "source_format": "rst", "revision_number": 26, "created": 1404081033000}, {"id": "f3efcb0d-2f95-11f1-9db4-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nThis document shows how to use the command line to work with PGP (GPG) for encryption.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate a key pair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nOptionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a private key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <private key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\nHomework\r\n============\r\n\r\n#. create a gpg key pair\r\n#. encrypt a test file\r\n#. decrypt a test file\r\n#. export public and private key pair\r\n#. delete public and private key pair\r\n#. re-import public and private key pair\r\n#. try to decrypt test file again\r\n\r\nMisc\r\n====\r\n\r\n* The keyring files are binary and exist in *~/.gnupg*.\r\n\r\n\r\n", "source_format": "rst", "revision_number": 25, "created": 1404075609000}, {"id": "f3efbe02-2f95-11f1-91a9-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nThis document shows how to use the command line to work with PGP (GPG) for encryption.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate a key pair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nOptionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a private key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <private key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\n\r\nHomework\r\n============\r\n\r\n#. create a gpg key pair\r\n#. encrypt a test file\r\n#. decrypt a test file\r\n#. export public and private key pair\r\n#. delete public and private key pair\r\n#. re-import public and private key pair\r\n#. try to decrypt test file again", "source_format": "rst", "revision_number": 24, "created": 1403527595000}, {"id": "f3efb177-2f95-11f1-b642-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nThis document shows how to use the command line to work with PGP (GPG) for encryption.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate Key pair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nOptionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a private key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <private key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\n\r\nHomework\r\n============\r\n\r\n#. create a gpg key pair\r\n#. encrypt a test file\r\n#. decrypt a test file\r\n#. export public and private key pair\r\n#. delete public and private key pair\r\n#. re-import public and private key pair\r\n#. try to decrypt test file again", "source_format": "rst", "revision_number": 23, "created": 1403527565000}, {"id": "f3efa87f-2f95-11f1-bf90-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nThis document shows how to use the command line to work with PGP (GPG) for encryption.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate Key pair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nOptionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a private key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <private key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\n\r\nHomework\r\n============\r\n\r\n#. create a gpg keypair\r\n#. encrypt a test file\r\n#. decrypt a test file\r\n#. export public and private keypair\r\n#. delete public and private keypair\r\n#. re-import public and private keypair\r\n#. try to decrypt test file again", "source_format": "rst", "revision_number": 22, "created": 1403527546000}, {"id": "f3efa0d4-2f95-11f1-b372-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nThis document shows how to use the command line to work with PGP (GPG) for encryption.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate GPG Keypair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nOptionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a private key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <private key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\n\r\nHomework\r\n============\r\n\r\n#. create a gpg keypair\r\n#. encrypt a test file\r\n#. decrypt a test file\r\n#. export public and private keypair\r\n#. delete public and private keypair\r\n#. re-import public and private keypair\r\n#. try to decrypt test file again", "source_format": "rst", "revision_number": 21, "created": 1403527511000}, {"id": "f3ef99d4-2f95-11f1-98fc-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nThis document does not use a GUI and only uses the command line.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate GPG Keypair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nOptionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a private key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <private key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\n\r\nHomework\r\n============\r\n\r\n#. create a gpg keypair\r\n#. encrypt a test file\r\n#. decrypt a test file\r\n#. export public and private keypair\r\n#. delete public and private keypair\r\n#. re-import public and private keypair\r\n#. try to decrypt test file again", "source_format": "rst", "revision_number": 20, "created": 1403526854000}, {"id": "f3ef928f-2f95-11f1-92c2-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nThis document does not use a GUI and only uses the command line.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate GPG Keypair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nOptionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a private key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <private key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\n", "source_format": "rst", "revision_number": 19, "created": 1403526643000}, {"id": "f3ef8bc4-2f95-11f1-b0d5-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nThis document does not use a GUI and only uses the command line.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate GPG Keypair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nor optionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a private key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <private key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\n", "source_format": "rst", "revision_number": 18, "created": 1403526626000}, {"id": "f3ef8408-2f95-11f1-8e70-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nThis document does not use a GUI and only uses the command line.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate GPG Keypair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nor optionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\nTo import a public key file:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a private key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <private key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\n", "source_format": "rst", "revision_number": 17, "created": 1403526604000}, {"id": "f3ef7ccf-2f95-11f1-89ac-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nThis document does not use a GUI and only uses the command line.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate GPG Keypair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nor optionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\nTo import a public key file:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <public key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\n", "source_format": "rst", "revision_number": 16, "created": 1403526502000}, {"id": "f3ef758b-2f95-11f1-9ef6-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nThis document does not use a GUI and only uses the command line.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate GPG Keypair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nor optionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: \r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: \r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\nTo import a public key file:\r\n\r\n.. code-block::\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --allow-secret-key-import --import <public key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.\r\n\r\nDelete a public key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-key <KeyID>\r\n\r\nDelete a private key\r\n=====================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --delete-secret-key <KeyID>\r\n\r\n", "source_format": "rst", "revision_number": 15, "created": 1403526303000}, {"id": "f3ef6d0e-2f95-11f1-b3a5-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nThis document does not use a GUI and only uses the command line.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate GPG Keypair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nor optionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n\r\nExport a public key\r\n========================\r\n\r\nTo export a public key for transportation or sharing, run this:\r\n\r\n.. code-block:: \r\n\r\n gpg --export -a <KeyID>\r\n\r\nThis will output the public key for a given KeyID as ascii, which may be shared and distributed to anyone.\r\n\r\nExport a private key\r\n========================\r\n\r\nTo export a private key for transportation or backup, run this:\r\n\r\n.. code-block:: \r\n\r\n gpg --export-secret-key -a <KeyID>\r\n\r\nThis will output the private key for a given KeyID as ascii, which must be safely gaurded.\r\n\r\nImport a public key\r\n========================\r\n\r\nTo import a public key file:\r\n\r\n.. code-block::\r\n\r\n gpg --import <public key file>\r\n\r\nThis adds the public key in the file to your public key ring.  Alternatively you may omit the file and paste the public key directly to the command prompt.\r\n\r\n\r\nImport a public key\r\n========================\r\n\r\n.. code-block::\r\n\r\n gpg --allow-secret-key-import --import <public key file>\r\n\r\nThis adds the private key in the file to your private key ring. Alternatively you may omit the file and paste the private key directly to the command prompt.", "source_format": "rst", "revision_number": 14, "created": 1403526165000}, {"id": "f3ef61cf-2f95-11f1-b289-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nThis document does not use a GUI and only uses the command line.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate GPG Keypair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted asc message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nor optionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n", "source_format": "rst", "revision_number": 13, "created": 1403525363000}, {"id": "f3ef5953-2f95-11f1-a643-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nThis document does not use a GUI and only uses the command line.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate GPG Keypair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nAlternatively you may encrypt any file (text or binary) using a command like this:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as <file>\r\n\r\nThis will prompt for your passphrase and on success generate an 'asc' file.\r\n\r\nFor example, lets encrypt the fake test file 'secret-raw-payload.txt' using the following command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user MYKEYID1 -as secret-raw-payload.txt\r\n\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nor optionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n", "source_format": "rst", "revision_number": 12, "created": 1403525321000}, {"id": "f3ef5144-2f95-11f1-b445-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nThis document does not use a GUI and only uses the command line.\r\n\r\n.. contents::\r\n\r\n\r\n\r\nCreate GPG Keypair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nor optionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n", "source_format": "rst", "revision_number": 11, "created": 1403524710000}, {"id": "f3ef4793-2f95-11f1-868b-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nThis document does not use a GUI and only uses the command line.\r\n\r\nCreate GPG Keypair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\nDecrypt a test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nor optionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n", "source_format": "rst", "revision_number": 10, "created": 1403524687000}, {"id": "f3ef3eaa-2f95-11f1-bdc4-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nThis document does not use a GUI and only uses the command line.\r\n\r\nCreate GPG Keypair\r\n==================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\ndecrypt the test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nor optionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n", "source_format": "rst", "revision_number": 9, "created": 1403524580000}, {"id": "f3ef3647-2f95-11f1-ac6e-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nCreating GPG Keys Using the Command Line\r\n==========================================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nEncrypt a test message\r\n=========================================================\r\n\r\nThis process may also be used to Validate a private key passphrase.\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\ndecrypt the test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nor optionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n", "source_format": "rst", "revision_number": 8, "created": 1403524413000}, {"id": "f3ef2e76-2f95-11f1-b134-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nCreating GPG Keys Using the Command Line\r\n==========================================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new 'KeyID'.\r\n\r\nList all keys\r\n=============================\r\n\r\nThis is a great way to determine a 'KeyID'\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nValidate a GPG passphrase and encrypt a test message\r\n=========================================================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\ndecrypt the test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nor optionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n", "source_format": "rst", "revision_number": 7, "created": 1403524357000}, {"id": "f3ef2516-2f95-11f1-bf0e-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nCreating GPG Keys Using the Command Line\r\n==========================================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new <keyid>\r\n\r\nDetermine KeyID\r\n===================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nValidate a GPG passphrase and encrypt a test message\r\n=========================================================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\ndecrypt the test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d <encrypted message file>\r\n\r\nThen paste the encrypted message into the terminal.\r\n\r\nor optionally omit the 'encrypted message file' and paste the payload directly into the cmd prompt. \r\n", "source_format": "rst", "revision_number": 6, "created": 1403524234000}, {"id": "f3ef1d6c-2f95-11f1-a826-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nCreating GPG Keys Using the Command Line\r\n==========================================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new <keyid>\r\n\r\nDetermine KeyID\r\n===================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nValidate a GPG passphrase and encrypt a test message\r\n=========================================================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\ndecrypt the test message\r\n==============================\r\n\r\n.. code-block:: bash\r\n\r\n gpg -d\r\n\r\nThen paste the encrypted message into the terminal.", "source_format": "rst", "revision_number": 5, "created": 1403478006000}, {"id": "f3ef13f9-2f95-11f1-a65d-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nCreating GPG Keys Using the Command Line\r\n==========================================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\nDocument your new <keyid>\r\n\r\nDetermine KeyID\r\n===================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --list-keys\r\n\r\nValidate a GPG passphrase and encrypt a test message\r\n=========================================================\r\n\r\n.. code-block:: bash\r\n\r\n gpg --local-user <KEYID> -as\r\n\r\nIt will prompt for a passphrase three times unless a valid one is submitted, then it will allow you to write an encrypted message.  press ctrl-d to end the message.\r\n\r\n", "source_format": "rst", "revision_number": 4, "created": 1403477377000}, {"id": "f3ef09fd-2f95-11f1-942d-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nCreating GPG Keys Using the Command Line\r\n==========================================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\nAlso memorize your long passphrase and never tell anyone it, ever.\r\n\r\n \r\n", "source_format": "rst", "revision_number": 3, "created": 1403474560000}, {"id": "f3ef0136-2f95-11f1-8253-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nCreating GPG Keys Using the Command Line\r\n==========================================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block:: bash\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\n\r\n \r\n", "source_format": "rst", "revision_number": 2, "created": 1403473569000}, {"id": "f3eef417-2f95-11f1-b9e0-e86a64d24d78", "node_id": "f3ede171-2f95-11f1-81cb-e86a64d24d78", "user_id": "edc3f576-2f95-11f1-900f-e86a64d24d78", "author": "foxhop", "data": "Linux GPG\r\n###########\r\n\r\nShort how to document on setting up a PGP (GPG) keypair and a short lesson on how to encrypt a message as well as configuring \"pass\" password client for using the keypair to protect passwords.\r\n\r\nCreating GPG Keys Using the Command Line\r\n==========================================\r\n\r\nUse the following shell command:\r\n\r\n.. code-block::\r\n\r\n gpg --gen-key\r\n\r\nAnswer the prompts, I typically accept all defaults which is 2048 bits and RSA.\r\n\r\n \r\n", "source_format": "rst", "revision_number": 1, "created": 1403473541000}], "count": 30}