Index

Subject : LUG: Post-Keysigning Party Instructions

From : Ed Anderson <nilbus@nilbus.[redacted]>

Date : Sun, 23 Oct 2005 23:05:22 -0400

Parent


Hi everyone,

For those of you who have not already signed keys, here are the insturctions
again:

gpg --recv-keys <keyid> # Download their key
gpg --fingerprint <keyid> # Verify that the key matches your paper
gpg --sign-key <keyid> # Sign with your key
gpg --send-keys <keyid> # Upload the signed version of the key

So far, only about half of the party's participants have uploaded everyone's
signed keys. Please take time to sign and upload everyone's key. It is
important for developing our web of trust and making the keysigning party
successful that we all do this last step.

A graphical representation of our web of trust is available at
http://www.nilbus.com/pub/ncsulug-trustweb.png

Don't hesitate to mail the list with any questions you have.

Thanks,
Ed Anderson
NCSU LUG

On 14/10/05 00:45 -0400, Ed Anderson wrote:
> Hi everyone,
>
> This is for everyone who would like to attend the keysigning party on
> Oct 19.
>
> Before attending the party, there are a few things you need to do:
> o Generate a GPG key with gpg --gen-key.
> o Upload your key to a keyserver, so everyone can sign it later.
> This can be done with gpg --send-keys <keyid>
> o Send me (nilbus AT nilbus DOT com) your key ID and Fingerprint.
> You can view these with gpg --fingerprint. For example,
> 69A1FFC4, C95C 729F 707A 1C95 78F7 A515 4D2B 7C94 69A1 FFC4.
> You can also send it to me on IRC.
>
> When I recieve your key, I will download the rest of your key
> information from the keyserver. Before the party, I will compile a list
> of everyone's key information, and print out enough copies for everyone
> there. Please send me your key information by 12 the day of the meeting.
>
> What you need at the party:
> o Two forms of positive picture ID, like driver's license and NCSU ID.
> o A copy of your key ID, fingerprint, type, and key size info
> o A Pen/Pencil
>
> The party will go something like this:
> o Each of us will verify that the fingerprint listed on the sheet is
> correct. Then each of us will read our fingerprint aloud, so everyone
> can verify the fingerprint. You can check off every key you verify.
> o Each of us will check the ID of each other participant. You then
> check off each person who's identity matches their key.
>
> After the party:
> o Dinner! :D
> o When you get home, for each name on your list that has two checks,
> you should sign verify and sign the key:
>
> gpg --recv-keys <keyid> # Download their key
> gpg --fingerprint <keyid> # Verify that the key matches your paper
> gpg --sign-key <keyid> # Sign with your key
> gpg --send-keys <keyid> # Upload the signed version of the key
>
> o After we have signed everyone's key, I will generate a cool web of
> trust graph for everyone to goggle at. ;-)
>
> Please let your friends know about this too. The more people, the
> better! For more information about GPG Keysigning parties, visit
> http://www.cryptnet.net/fdp/crypto/gpg-party.html
>
> Ed Anderson
> NCSU LUG

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDXE9yTSt8lGmh/8QRAjCGAJ4yOSQaY+VWu1XgimOWLElMRsbrvQCfSGw2
LQGB/vJdL/jf2EinLE15opE=
=3Ad8
-----END PGP SIGNATURE-----

Replies :