Re: About PGP public key service. (With P.S.)

2000-09-27 Thread Lukasz Stelmach

  Była godzina 21:43:20 w wtorek 26 wrzesień, gdy do autobusu wsiadł kanar
  i wrzasnął:"Dan Boger!!!  Bilecik do kontroli!!!" A on(a) na to:

> Set your mutt/gpg to automatically get keys from a keyserver (like
> wwwkeys.pgp.net) and then when it encounters a key it doesn't know, it'll
> try and get it and automatically verify it.  it's pretty cool. :)

And if you have not got a hard-wire? What then? I just call my teleco to
download mail and read offline. 

By.
-- 
|/   |_,  _   .-  --,2:480/135@fido[EMAIL PROTECTED]
|__ |_|. | \ |_|. ._' /_. 101:1000/135@unholy

... Droga wśród jabłoni prowadzi w nieznane...



Re: About PGP public key service. (With P.S.)

2000-09-26 Thread Dan Boger

On Wed, Sep 27, 2000 at 02:37:39AM +0300, Eugene Paskevich wrote:
> P.S. There are two things I still can't understand.
> 1) Why do people post here signed messages. I think there's no need in it.

because a lot of people (me included) have mutt sign their messages 
automatically, and often don't bother/forget to tell it not to sign to 
lists...

> 2) If they sign their messages they suppose that someone have their public
> key to verify signature. Where can I get it? From public server of keys?
> {I don't remember the correct name.} Again, there is no need in these
> servers. 'couse noone would ask for public key of an unknown man just to
> verify a signature.

Set your mutt/gpg to automatically get keys from a keyserver (like
wwwkeys.pgp.net) and then when it encounters a key it doesn't know, it'll
try and get it and automatically verify it.  it's pretty cool. :)

:)

Dan



About PGP public key service. (With P.S.)

2000-09-26 Thread Eugene Paskevich

I heard that people have troubles with public PGP key service.
That's why I'd like to introduce the way I did it myself.
I hope that this info will be helpful for someone.
--
1) In ~/.procmailrc:
:0
* ^Subject: publicpgpkey
| /home/eugene/bin/publicpgpkey "`formail -x 'From: '`"

2) /home/eugene/bin/publicpgpkey:
#!/bin/sh
KEYRING=/home/eugene/.pgp/pubring.pkr
PUBLIC=/tmp/publicpgpkey
USERID=Eugene

if [ "$1" == "--help" ] ; then
  echo "Public PGP key utility."
  echo "Usage: $0 [e-mail]"
  echo "e-mail: To send public PGP key to a particular e-mail."
  exit 0
fi

pgp -kxa $USERID $PUBLIC $KEYRING > /dev/null 2>&1

if [ ! -n "$1" ] ; then
  cat $PUBLIC
  rm -f $PUBLIC
  exit 0
fi

mail "$1" -s "Public PGP key of Eugene Paskevich" < $PUBLIC
if [ ! "`cat /proc/$PPID/cmdline`" == "-bash" ] ; then
  echo `date ; echo "$1"` >> /home/eugene/.pgp/people
fi
rm -f $PUBLIC
-
Now one can make changes for him/herself and be happy.

P.S. There are two things I still can't understand.
1) Why do people post here signed messages. I think there's no need in it.
2) If they sign their messages they suppose that someone have their public
key to verify signature. Where can I get it? From public server of keys?
{I don't remember the correct name.} Again, there is no need in these
servers. 'couse noone would ask for public key of an unknown man just to
verify a signature.
It's a stupid idea as for me.

-- 
Eugene Paskevich |   *==(---   |   "Alrighty then!"
[EMAIL PROTECTED]|   ---)==*   |-- Ace Venture
Public PGP key:  mailto:[EMAIL PROTECTED]?subject=publicpgpkey
{Mutt 1.2.4i}Moderator of [EMAIL PROTECTED] Be afraid. ;)
##
Eternal nothingness is fine if you happen to be dressed for it.
-- Woody Allen
##