]> pere.pagekite.me Git - homepage.git/commitdiff
Generated.
authorPetter Reinholdtsen <pere@hungry.com>
Tue, 17 Nov 2015 09:45:44 +0000 (10:45 +0100)
committerPetter Reinholdtsen <pere@hungry.com>
Tue, 17 Nov 2015 09:45:44 +0000 (10:45 +0100)
blog/images/2015-11-17-new-gpg-key-transition.txt [new file with mode: 0644]

diff --git a/blog/images/2015-11-17-new-gpg-key-transition.txt b/blog/images/2015-11-17-new-gpg-key-transition.txt
new file mode 100644 (file)
index 0000000..877f1d8
--- /dev/null
@@ -0,0 +1,73 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA1
+
+2015-11-17 11:50:00 +0100
+
+I am finally replacing my old 1024 bit OpenPGP key.
+
+The old key will continue to be valid for some time, but I prefer all
+future correspondence to come to the new one.  I would also like this
+new key to be re-integrated into the web of trust.  This message is
+signed by both keys to certify the transition.
+
+The old key was:
+
+  sec 1024D/2A30D729 2002-08-13
+      Key fingerprint = 830C 56B4 1256 81C5 4D71  CFD1 DB4C CC4B 2A30 D729
+
+And the new key is:
+
+  sec 3936R/EE4E02F9 2015-11-03
+      Key fingerprint = 3AC7 B2E3 ACA5 DF87 78F1  D827 111D 6B29 EE4E 02F9
+
+To fetch the full key from a public key server, you can simply do:
+
+  gpg --keyserver pool.sks-keyservers.net --recv-key EE4E02F9
+
+If you already know my old key, you can now verify that the new key is
+signed by the old one:
+
+  gpg --check-sigs EE4E02F9
+
+If you don't already know my old key, or you just want to be double
+extra paranoid, you can check the fingerprint against the one above:
+
+  gpg --fingerprint EE4E02F9
+
+If you are satisfied that you've got the right key, and the UIDs match
+what you expect, I'd appreciate it if you would sign my key:
+
+  gpg --sign-key EE4E02F9
+
+Lastly, if you could upload these signatures, i would appreciate it.
+You can either send me an e-mail with the new signatures (if you have
+a functional MTA on your system):
+
+  gpg --armor --export EE4E02F9 | mail -s 'OpenPGP Signatures' pere@debian.org
+
+Or you can just upload the signatures to a public keyserver directly:
+
+  gpg --keyserver pgp.mit.edu --send-key EE4E02F9
+
+Please let me know if there is any trouble, and sorry for the
+inconvenience.
+
+Happy hacking
+Petter Reinholdtsen
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v1
+
+iQIVAwUBVkr2rYEoCqCHuvsOAQLFXQ/7BEcLwtgg7jZq+tMsqdbKVJ56SX7lnW7j
+RCihWVav/43dh2GcLGMpKj267zSNBbuBPEyurOOKmawiGwpqmiSxFE+64lmRGEFN
+b4RjkiYB6lkMgSMGacETdfeU4CKSFq+Us5SMBotSJUwzZmaqd6Wf+xHOHgd8x1jf
+FQuHWpw191IVw1UWTKuKOGEhr+W9klJhVNnsAQa5vqofBOdzRYu94tNqXXmRKQXW
+i5t+MvA+QfRiR7RdcVA2KlZl4EUQ3ttZjBkOITGnPSw51BiO07pUYi5mHgJHxfZm
+vnfrEp6QVHduVs1+Kly2pcqFb113/L1dSr4Glx5KmolDG9ZIijv3cC6JNhzu+H6a
+WWTUIfbOS8e6lKYQ0mmAORuOTBif2OhoFcSuh8IAs1zBzA9bpTsnMg5xBZvKS1l6
+NbMGuuT/ES6Zqxkn+4izBKFBkPwUDpdptWXm1e7MPyIB9NscctcP0dR8YFym/kc0
+qftTfF2s0ao10LuN9N5syxo6Se9S+oMjevOVWEd5O4IAeRbrHnPfSseZzAf/NRGA
+qC0+JQISqc/rm/V3hkA8vATg7u0n+XJ56STKRv+ELv2rHG9VPBoAVggaSv0pVT/g
+UhR9XwiOgvEIDbpi/WPT6IOXCSnR0RTnD8/be2bbq2D/EEBZhki23HmTAkUOnrPY
+pufX6IUk4Ng=
+=Xz5z
+-----END PGP SIGNATURE-----