this is obsolete doc -- see http://doc.nethence.com/ instead

PGP configuration 

 

 

Keygen 

Check for existing keys and generate a key, 

gpg --list-keys
gpg --gen-key
gpg --export --armor your_id > ~/your_id.asc

 

To sign another key, check its fingerprint, sign it, trust it and save, 

gpg --fingerprint other_id
gpg --edit-key other_id
sign
trust
save

 

To revocate one of your PGP key pairs, 

gpg --gen-revoke key_id

 

 

Encrypt / Uncrypt 

Encrypt ASCII text messages, 

gpg --recipient rcpt_id --armor --encrypt file

 

Encrypt binary files, 

gpg --recipient rcpt_id --encrypt file

 

Uncrypt anything, 

gpg --decrypt file.gpg > file.out

 

 

Notes 

Some dirty fix for procmail to convert the messages (NOT RECOMMENDED), 

#:0 fw
#* ^Content-Type: multipart/encrypted
#| formail -i "Content-Type: text/plain; charset=iso-8859-1"

 

#:0 fw
#* ^Content-Type: application/pgp
#| formail -i "Content-Type: text/plain; charset=iso-8859-1"

 

Some Pine feature (RECOMMENDED), 

downgrade-multipart-to-text

 

Some Pine filter to make PGP capable, 

#display-filters=_LEADING("-----BEGIN PGP SIGNED ")_ /usr/pkg/libexec/ppf_verify _TMPFILE_,
#       _LEADING("-----BEGIN PGP MESSAGE")_ /usr/pkg/libexec/ppf_decrypt _TMPFILE_
#sending-filters=/usr/pkg/libexec/ppf_sign,
#       /usr/pkg/libexec/ppf_encrypt _RECIPIENTS_

 

 

References 

MIT PGP Keys repository : http://pgp.mit.edu 

(FR) http://matrix.samizdat.net/crypto/gpg_intro/gpg-intro-3.html 

(FR) http://www.lea-linux.org/cached/index/Reseau-secu-gpg-intro.html