Formal Keysigning
Revision as of 13:12, 20 November 2013 by BobJonkman (talk | contribs) (→ToDo for the Participants: Oops. Removed duplicate headings)
- I'm running a formal keysigning after my presentation at KWLUG on Monday, 2 December 2013. These are the steps for both the keymaster (me) and the people attending. Feel free to make changes or additions as you see necessary. You may find some useful information in the Guidelines for Key Signing Parties.
- BobJonkman 05:42, 9 October 2013 (UTC)
- There is now a KWLUG Keysigning Ring in the KWCrypto ownCloud which will contain the public keys of all the participants.
- If you'd like to participate in the keysigning you can either:
- send me encrypted, signed e-mail with your public key attached
- Download the keyring, add your public key, then upload it to the KWCrypto ownCloud.
- BobJonkman 01:12, 26 October 2013 (UTC)
This is a work in progress -- You can help create a definitive procedure for a Formal Keysigning: Login and edit this page. |
Contents
Purpose
A keysigning is not meant to establish your absolute, one true, Real Name™ identity, it is merely to associate a keyID with your identity. The identity you use is up to you, as published in the UserID portion of your GnuPG/PGP key. It could be only an e-mail address, a nickname, or even your real name. It's how people identify you in correspondence, or associate you as the author of a document or software. By signing your key, people verify that the KeyID is associated with the identity by which they know you.
Concepts
Four factors of authentication:
- Something you know (passphrase)
- Something you own (key fob, pass card)
- Something you are (fingerprint, retinal scan)
- Someone who knows you (trusted introducer)
A keysigning party increases the Web of Trust, or the number of trusted introducers who will vouch for the association of your identity with your KeyID.
Preparations before the Keysigning Party
ToDo for the KeyMaster
- Create a keysigning keyring, make it publicly available. This keyring will contain the public keys of the keysiging participants.
- Collect the public keys that people send to you in encrypted, signed e-mail.
- Immediately before the keysigning create a printout of all the KeyIDs, UserIDs and fingerprints in the keyring. Make sufficient copies for all participants. (you could send that printout to all participants in an encrypted, signed e-mail, or participants can download the keyring and print their own).
- Create the printout with:
gpg --no-default-keyring --keyring=./kwlug-keysigning-ring-2013-12-02.asc --fingerprints
Note to editor: Verify this syntax! --Bob.
- Create the printout with:
ToDo for the Participants
- Add your key to the keysigning keyring
- Get a copy of the keysigning keyring (Either download it, or request that the KeyMaster e-mails it to you)
- Add your public key to the keysigning keyring
'''command line for adding your public key to the keyring goes here'''
- Submit the updated keysiging keyring (Either upload it, or e-mail it to the KeyMaster)
- OR E-mail your public key to the keymaster, let him do the work.
At the Keysigning Party
- ...
- ...
- formal declarations and introductions like this:
Bob: "I'm Bob Jonkman, and my keyID is Delta Two Charlie Charlie Echo Five Echo Alpha" Andrew: "I've known Bob since the early days, and that's really him"