this is obsolete doc -- see http://doc.nethence.com/ instead
PGP configuration
Keygen
Check for existing keys and generate a key,
gpg --list-keys
gpg --gen-key
gpg --export --armor your_id > ~/your_id.asc
To sign another key, check its fingerprint, sign it, trust it and save,
gpg --fingerprint other_id
gpg --edit-key other_id
sign
trust
save
To revocate one of your PGP key pairs,
gpg --gen-revoke key_id
Encrypt / Uncrypt
Encrypt ASCII text messages,
gpg --recipient rcpt_id --armor --encrypt file
Encrypt binary files,
gpg --recipient rcpt_id --encrypt file
Uncrypt anything,
gpg --decrypt file.gpg > file.out
Notes
Some dirty fix for procmail to convert the messages (NOT RECOMMENDED),
#:0 fw
#* ^Content-Type: multipart/encrypted
#| formail -i "Content-Type: text/plain; charset=iso-8859-1"
#:0 fw
#* ^Content-Type: application/pgp
#| formail -i "Content-Type: text/plain; charset=iso-8859-1"
Some Pine feature (RECOMMENDED),
downgrade-multipart-to-text
Some Pine filter to make PGP capable,
#display-filters=_LEADING("-----BEGIN PGP SIGNED ")_ /usr/pkg/libexec/ppf_verify _TMPFILE_,
# _LEADING("-----BEGIN PGP MESSAGE")_ /usr/pkg/libexec/ppf_decrypt _TMPFILE_
#sending-filters=/usr/pkg/libexec/ppf_sign,
# /usr/pkg/libexec/ppf_encrypt _RECIPIENTS_
References
MIT PGP Keys repository : http://pgp.mit.edu
(FR) http://matrix.samizdat.net/crypto/gpg_intro/gpg-intro-3.html
(FR) http://www.lea-linux.org/cached/index/Reseau-secu-gpg-intro.html