quick-docs/modules/ROOT/pages/create-gpg-keys.adoc

72 lines
2.9 KiB
Text
Raw Normal View History

2018-07-29 11:01:46 +00:00
ifdef::context[:parent-context: {context}]
:context: creating-gpg-keys
2018-07-27 14:38:30 +00:00
= Creating GPG Keys
2018-03-02 15:34:56 +00:00
:experimental:
2018-03-02 15:34:56 +00:00
This document explains in detail how to obtain a GPG key using common Fedora utilities.
It also provides information on managing your key as a Fedora contributor.
[[creating-gpg-keys]]
2018-07-27 14:38:30 +00:00
== Creating GPG Keys
2021-02-09 09:27:15 +00:00
include::{partialsdir}/proc_creating-gpg-keys-gnome.adoc[leveloffset=+2]
2021-02-09 09:27:15 +00:00
include::{partialsdir}/proc_creating-gpg-keys-kde.adoc[leveloffset=+2]
2021-02-09 09:27:15 +00:00
include::{partialsdir}/proc_creating-gpg-keys-cli.adoc[leveloffset=+2]
[[making-a-backup]]
2018-07-27 14:38:30 +00:00
== Making a Backup
2021-02-09 09:27:15 +00:00
include::{partialsdir}/proc_backup-gpg-keys-gnome.adoc[leveloffset=+2]
2021-02-09 09:27:15 +00:00
include::{partialsdir}/proc_backup-gpg-keys-kde.adoc[leveloffset=+2]
2021-02-09 09:27:15 +00:00
include::{partialsdir}/proc_backup-gpg-keys-cli.adoc[leveloffset=+2]
[[making-your-public-key-available]]
2018-07-27 14:38:30 +00:00
== Making Your Public Key Available
2018-03-02 15:34:56 +00:00
When you make your public key available to others, they can verify communications you sign, or send you encrypted communications if necessary.
This procedure is also known as _exporting_.
2018-03-02 15:34:56 +00:00
See <<copying-public-gpg-keys-manually>> to a file if you wish to email it to individuals or groups.
2021-02-09 09:27:15 +00:00
include::{partialsdir}/proc_exporting-gpg-keys-gnome.adoc[leveloffset=+2]
2021-02-09 09:27:15 +00:00
include::{partialsdir}/proc_exporting-gpg-keys-kde.adoc[leveloffset=+2]
2021-02-09 09:27:15 +00:00
include::{partialsdir}/proc_exporting-gpg-keys-cli.adoc[leveloffset=+2]
2021-02-09 09:27:15 +00:00
include::{partialsdir}/proc_copying-public-gpg-keys-manually.adoc[leveloffset=+2]
[[safeguarding-your-secret-key]]
2018-07-27 14:38:30 +00:00
== Safeguarding Your Secret Key
2018-03-02 15:34:56 +00:00
Treat your secret key as you would any very important document or physical key.
(Some people always keep their secret key on their person, either on magnetic or flash media.)
If you lose your secret key, you will be unable to sign communications, or to open encrypted communications that were sent to you.
[[hardware-token-options]]
2018-07-27 14:38:30 +00:00
== Hardware Token options
2018-03-02 15:34:56 +00:00
If you followed the above, you have a secret key which is just a regular file.
A more secure model than keeping the key on disk is to use a hardware token.
2021-02-09 09:27:15 +00:00
There are several options available on the market, for example the https://www.yubico.com/products/yubikey-5-overview/[YubiKey].
2018-03-02 15:34:56 +00:00
Look for a token which advertises OpenPGP support.
See https://blog.josefsson.org/2014/06/23/offline-gnupg-master-key-and-subkeys-on-yubikey-neo-smartcard/[this blog entry] for how to create a key with offline backups, and use the token for online access.
2018-07-27 14:38:30 +00:00
include::{partialsdir}/proc_revoking-gpg-keys.adoc[leveloffset=+1]
2018-07-27 14:38:30 +00:00
== Additional resources
2021-02-02 11:30:52 +00:00
* https://www.gnupg.org/[GPG home page]
* https://www.gnupg.org/documentation/[Official GPG documentation]
* https://en.wikipedia.org/wiki/Public-key_cryptography[Wikipedia - Public Key Cryptography]
2018-03-02 15:34:56 +00:00
See a typo, something missing or out of date, or anything else which can be improved? Edit this document at https://pagure.io/fedora-docs/quick-docs[quick-docs's git repository].
2021-02-09 09:27:15 +00:00
2018-07-29 11:01:46 +00:00
ifdef::parent-context[:context: {parent-context}]
ifndef::parent-context[:!context:]