aboutsummaryrefslogtreecommitdiffstats
path: root/help/C/mail-encryption-gpg-create-key.page
diff options
context:
space:
mode:
Diffstat (limited to 'help/C/mail-encryption-gpg-create-key.page')
-rw-r--r--help/C/mail-encryption-gpg-create-key.page53
1 files changed, 53 insertions, 0 deletions
diff --git a/help/C/mail-encryption-gpg-create-key.page b/help/C/mail-encryption-gpg-create-key.page
new file mode 100644
index 0000000000..a99004abc5
--- /dev/null
+++ b/help/C/mail-encryption-gpg-create-key.page
@@ -0,0 +1,53 @@
+<page xmlns="http://projectmallard.org/1.0/" xmlns:its="http://www.w3.org/2005/11/its"
+ type="topic" id="mail-encryption-gpg-create-key">
+
+ <info>
+ <desc>Signing or encrypting messages via GPG that you send.</desc>
+
+ <link type="guide" xref="mail-encryption#gpg"/>
+
+ <revision pkgversion="2.32.1" version="0.2" date="2011-07-27" status="final"/>
+ <credit type="author">
+ <name>Andre Klapper</name>
+ <email>ak-47@gmx.net</email>
+ </credit>
+ <credit type="author">
+ <name>Novell, Inc</name> <!-- Content partially from http://library.gnome.org/users/evolution/2.32/encryption.html.en#encryption-keygen -->
+ </credit>
+ <license>
+ <p>Creative Commons Share Alike 3.0</p>
+ </license>
+
+ </info>
+
+ <title>Creating a GPG key</title>
+
+<note>These steps are very technical. For average users we nowadays recommend using the Seahorse application for managing GPG keys.</note>
+<!-- TODO:POST-3-2: Update and rewrite using Seahorse. Needs a complete rewrite once https://bugzilla.gnome.org/show_bug.cgi?id=508744 is fixed. -->
+
+<p>Before you can get or send GPG encrypted mail, you need to generate your public and private keys with GPG.</p>
+<steps>
+<item><p>Open a terminal window and enter <code>gpg --gen-key</code>.</p></item>
+<item><p>Select an algorithm, then press Enter.</p></item>
+<item><p>Select a key length, then press Enter.</p></item>
+<item><p>Enter how long your key should be valid for.</p></item>
+<item><p>Type your real name, then press Enter.</p></item>
+<item><p>Type your email address, then press Enter.</p></item>
+<item><p>(Optional) Type a comment, then press Enter.</p></item>
+<item><p>Review your selected user ID. If it is correct, press O.</p></item>
+<item><p>Type a passphrase, then press Enter.</p></item>
+<item><p>Move your mouse randomly to generate the keys.</p></item>
+</steps>
+
+<p>After the keys are generated, you can view your key information by entering <code>gpg --list-keys</code>. You should see something similar to this: <code> /home/you/.gnupg/pubring.gpg ---------------------------- pub 1024D/32j38dk2 2001-06-20 you &lt;you@example.com&gt; sub 1024g/289sklj3 2011-06-20 [expires: 2012-11-14]</code></p>
+<p>GPG creates one list, or keyring, for your public keys and one for your private keys. All the public keys you know are stored in the file <file>~/.gnupg/pubring.gpg</file>. If you want to give other people your key, send them that file.</p>
+<p>If you want, you can upload your keys to a key server:</p>
+<steps>
+<item><p>Check your public key ID with <code>gpg --list-keys</code>. It is the string after <code>1024D</code> on the line beginning with <code>pub</code>. In the example above, it is <code>32j38dk2</code>.</p></item>
+<item><p>Enter the command <code>gpg --send-keys --keyserver wwwkeys.pgp.net <varname>32j38dk2</varname></code>. Substitute your key ID for <quote>32j38dk2</quote>. You need your password to do this.</p></item>
+</steps>
+
+<p>Key servers store your public keys for you so that your friends can decrypt your messages. If you choose not to use a key server, you can manually send your public key, include it in your signature file, or put it on your own Web page. However, it is easier to publish a key once, and then let people download it from a central place when they want.</p>
+<p>If you don't have a key to unlock or encrypt a message, you can set your encryption tool to look it up automatically. If it cannot find the key, an error message appears.</p>
+
+</page>