jkt 05/10/13 20:15:23 Modified: xml/htdocs/doc/en gnupg-user.xml Log: #109151, use subkeys.pgp.net instead of pgp.mit.edu (+ fixed a typo as well)
Revision Changes Path 1.29 +14 -14 xml/htdocs/doc/en/gnupg-user.xml file : http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/gnupg-user.xml?rev=1.29&content-type=text/x-cvsweb-markup&cvsroot=gentoo plain: http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/gnupg-user.xml?rev=1.29&content-type=text/plain&cvsroot=gentoo diff : http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/doc/en/gnupg-user.xml.diff?r1=1.28&r2=1.29&cvsroot=gentoo Index: gnupg-user.xml =================================================================== RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/gnupg-user.xml,v retrieving revision 1.28 retrieving revision 1.29 diff -u -r1.28 -r1.29 --- gnupg-user.xml 4 May 2005 16:46:21 -0000 1.28 +++ gnupg-user.xml 13 Oct 2005 20:15:23 -0000 1.29 @@ -1,7 +1,7 @@ <?xml version='1.0' encoding="UTF-8"?> <!DOCTYPE guide SYSTEM "/dtd/guide.dtd"> -<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/gnupg-user.xml,v 1.28 2005/05/04 16:46:21 neysx Exp $ --> +<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/gnupg-user.xml,v 1.29 2005/10/13 20:15:23 jkt Exp $ --> <guide link = "/doc/en/gnupg-user.xml"> <title>GnuPG Gentoo user guide</title> @@ -22,8 +22,8 @@ <license/> -<version>1.0.13</version> -<date>2005-05-04</date> +<version>1.1</version> +<date>2005-10-13</date> <chapter> <title>Introduction</title> @@ -34,7 +34,7 @@ <p> This guide assumes that you are familiar with public-key cryptography, encryption, and digital signatures. If this is not the case jump to <uri -link="#doc_chap6">Public Key Cryptography</uri> or take a look at the +link="#doc_chap6">Public Key Cryptography</uri> or take a look at the <uri link="http://www.gnupg.org/(en)/documentation/guides.html">GnuPG handbook</uri>, chapter 2, and then come back. </p> @@ -42,9 +42,9 @@ <p> This guide will teach you how to install GnuPG, how to create your key pair, how to add keys to your keyring, how to submit your public key to a key server and -how to sign,encrypt,verify or decode messages you send or receive. You will also -learn how to encrypt files on your local computer to prevent people from reading -their contents. +how to sign, encrypt, verify or decode messages you send or receive. You will +also learn how to encrypt files on your local computer to prevent people from +reading their contents. </p> </body> @@ -364,10 +364,10 @@ <p> Now that you have your key, it is probably a good idea to send it to the world key server. There are a lot of keyservers in the world and most of them exchange -keys between them. Here we are going to send Luis's key to the pgp.mit.edu +keys between them. Here we are going to send Luis's key to the subkeys.pgp.net server. This uses HTTP, so if you need to use a proxy for HTTP traffic don't forget to set it (<c>export http_proxy=http://proxy_host:port/</c>). The command -for sending the key is: <c>gpg --keyserver pgp.mit.edu --keyserver-options +for sending the key is: <c>gpg --keyserver subkeys.pgp.net --keyserver-options honor-http-proxy --send-key 75447B14</c> where <c>75447B14</c> is the key ID. If you don't need a HTTP proxy you can remove the <e>--keyserver-options honor-http-proxy</e>. @@ -392,8 +392,8 @@ </p> <pre caption="Searching keys from keyservers"> -$ <i>gpg --keyserver pgp.mit.edu --keyserver-options honor-http-proxy --search-keys [EMAIL PROTECTED]</i> -gpg: searching for "[EMAIL PROTECTED]" from HKP server pgp.mit.edu +$ <i>gpg --keyserver subkeys.pgp.net --keyserver-options honor-http-proxy --search-keys [EMAIL PROTECTED]</i> +gpg: searching for "[EMAIL PROTECTED]" from HKP server subkeys.pgp.net Keys 1-5 of 5 for "[EMAIL PROTECTED]" (1)Gustavo Felisberto (apt-get install anarchy) <[EMAIL PROTECTED]> 1024 created 2002-12-06, key B9F2D52A @@ -406,7 +406,7 @@ (5)Gustavo Adolfo Silva Ribeiro Felisberto <[EMAIL PROTECTED]> 1024 created 1998-06-14, key AE02AF87 Enter number(s), N)ext, or Q)uit ><i>1</i> -gpg: requesting key B9F2D52A from HKP keyserver pgp.mit.edu +gpg: requesting key B9F2D52A from HKP keyserver subkeys.pgp.net gpg: key B9F2D52A: public key imported gpg: Total number processed: 1 gpg: imported: 1 @@ -574,7 +574,7 @@ </p> <pre caption="~/.gnupg/gpg.conf"> -#keyserver x-hkp://pgp.mit.edu +#keyserver x-hkp://subkeys.pgp.net #keyserver-options auto-key-retrieve include-disabled include-revoked </pre> @@ -582,7 +582,7 @@ Search for the above two lines and uncomment them. With this any time GnuPG needs to check a signature and it does not find the public key on the local keyring it will contact the key server at <uri -link="http://pgp.mit.edu">pgp.mit.edu</uri> and will try to fetch it +link="http://subkeys.pgp.net/">subkeys.pgp.net</uri> and will try to fetch it from there. </p> -- [email protected] mailing list
