Kultiges Zusammensitzen und gemeinsames Murmeln magischer Zahlen.At the Grazer Linuxtage 2013 in Graz there will be an OpenPGP (pgp/gpg) keysigning party.
Gert Döring, FdI 95
The party will be on Saturday, April 20th, at 18:30. It will be located behind the buffet.
The party will be conducted using Len Sassaman's Efficient Group Key Signing Method:
email@example.com- until Wednesday, April 17th, 2013 - 23:59.
If your key is not listed at http://glt13.2904.cc/keys/ now, please contact us personally.
This deadline has now passed. If you haven't submitted your key yet, it's too late.
If you still want to participate, please follow the points listed below, like everybody else (i.e. grab the file, check the checksum and bring the printout with you). This is so that you can sign other people's keys.
ksp-glt13.v2.txt) giving the fingerprint of each key on the ring.
ksp-glt13.v2.txtis correct. Also compute the ripemd160 hash of
ksp-glt13.v2.txt. One way to do this is with gpg invoked as follows:
% gpg --print-md ripemd160 ksp-glt13.v2.txt
Just to be sure that you have no problems with the download, here is the ripemd160 hash as we have calculated it:
Note that this is just a hint - you must do the check yourself offline.
BB90 D375 1D01 6682 7832 AD4A 91FB 88AB 67FE C64C
We will also read the SHA256 hash, so you should calculate that too (
gpg --print-md sha256).
ksp-glt13.v2.txtand an official identification document (passport or identity card) with photo!
ksp-glt13.v2.txt. Verify that the hash recited matches what you computed. This guarantees that all participants are working from the same list of keys.
ksp-glt13.v2.txt; check that your fingerprint is correct.
ksp-glt13.v2.txtso that we can ensure we are all working with the same copy.
Relevant Information and Sources for More Information
CA Fire and Forget is a script that helps you in keysigning. It takes a list of keyids on the command line, fetches them from a keyserver and calls GnuPG so that you can sign it. It then mails each key to all its email addresses - only including the one UID that we send to in each mail, pruned from all but self sigs and sigs done by you.
Depends: gnupg (>= 1.3.92), perl, libgnupg-interface-perl, libmime-perl, libmailtools-perl (>= 1.62)
Uli Martens wrote a small perl script that, given a key ID and
tells you which keys (UIDs) you already signed by annotating the UID with
153 [ ] Fingerprint OK [ ] ID OK (S) pub 1024D/52698E9F 2001-11-07 Uli Martens <firstname.lastname@example.org> Key fingerprint = A48F 8894 37A0 FDE9 60D5 212A 2A58 CEAA 5269 8E9F (S) uid Uli Martens <email@example.com> ( ) uid Uli Martens <firstname.lastname@example.org> (S) uid Uli Martens <email@example.com>
It requires perl, gnupg (>=1.2.x) and either Locale::Recode (in Debian Package libintl-perl, in testing and unstable) or recode (Debian Package recode).