- #GNUPG MAC HOW TO#
- #GNUPG MAC INSTALL#
- #GNUPG MAC PORTABLE#
- #GNUPG MAC SOFTWARE#
- #GNUPG MAC PASSWORD#
Keys 1-6 of 6 for Enter number(s), N)ext, or Q)uit > This time, here’s the output I might get: caladan:~ mph$ gpg -search-keys searching for from hkp server (1) Michael Hall (Managing editor with Jupitermedia) You can also search on a fragment of an e-mail address or a name.įor the sake of example, since I know the domain of the person whose key I want to import, I’ll search on that: .Īs with uploading a key, a terminal window will open and execute a shell command. If you know the e-mail address of the person whose key you want to retrieve, you can type that in. I could ask them for it, but if they’ve already uploaded it to a keyserver, I can retrieve it there.Ĭlick the “Key” item in the menu bar and select “Search for Key.” A text entry box will pop up asking for search terms. Let’s say, for instance, that I wanted to find a public key for one of my coworkers. You can also search for and download keys from a public keyserver and import them into your keychain.
Your key is now residing on a public server. Gpg: sending key C03D4D7D to hkp server That’s all there is to it. Click the “Key” item in the menu bar and select “Send to Keyserver.” Since GPG Keychain Access is just a graphical front-end to command line tools, a terminal window will open up and you’ll see something like this: gpg -send-key F4F1BA89F8E0631DD077906C876A9CF2C03D4D7DĬaladan:~ mph$ gpg -send-key F4F1BA89F8E0613DD078906C876B9CF2C03D4D7D To upload a key you’ve already generated, open GPG Keychain Access, click on the “Secret” tab, and click on the key you’d like to upload. GPG Keychain Access provides a way to automate uploading your key to a keyserver. They provide a place to store a public key in such a way that others can easily retrieve it and add it to their keychains. So that’s where public keyservers come in. You can also post a public key to your Web site, but that presupposes that you have a Web site and that it is completely secure. A public key in ASCII format takes up over a thousand random characters, so it’s not something you want to type in by hand or repeat back to a colleague over the phone. Internet Keyserversĭistributing keys can be a challenge. Finally, GPG Keychain Access offers a way to find keys over the Internet using public keyservers.
You can also use GPG Keychain Access to export your public key into a format others can use to add it to their own GnuPG keychain. Your collection of keys, including the public keys of others and your own secret keys, is called a keychain. With it you can create keys, collect public keys from your correspondents, and search public key servers to add to your collection of public keys from others. Managing your keys is a job for the GPG Keychain Access app. In fact, to use GnuPG encryption successfully, anybody you’re going to be sharing encrypted mail with has to have a copy of that key. The public key isn’t supposed to be a secret.You don’t need to go that far, but it’s not something you should put in a publicly shared place, either.
#GNUPG MAC PORTABLE#
Some people keep theirs stored on a portable USB drive. No matter how strong the password, you should also take care to avoid making the key publicly available.
#GNUPG MAC PASSWORD#
The Mac Password Generator can help you with that. When you generate it, you can give it a password and that password should be a strong one.
#GNUPG MAC SOFTWARE#
We’re going to start from the assumption that you’ve installed all the software and have generated a GnuPG key. Part two spent time installing and configuring GPGMail.
#GNUPG MAC HOW TO#
If you need a refresher on GnuPG, or want more detailed guides on installation, part one of these columns covered what public-key cryptography is and how to get MacGPG.
#GNUPG MAC INSTALL#
You’ll also want to go ahead and install GPGMail, a plugin that works with Apple’s Mail.app and provides a means to sign and encrypt e-mail messages. First, you’ll want to install MacGPG from the MacGPG site, including the files labeled “GNU Privacy Guard” and “GPG Keychain Access.” You’ll need a few things installed to follow along. This week, we’re going to delve into managing your GnuPG keys … the foundation of its security. Over the past few editions of Networking Notes, we’ve covered the installation and configuration of GnuPG, a Free Software implementation of Pretty Good Privacy, a public-key cryptography protocol you can use to secure your mail and text. We conclude our look at using public-key cryptography to secure your mail and text by delving into managing your GnuPG keys - the foundation of its security.