Re: About PGP public key service. (With P.S.)
Była godzina 21:43:20 w wtorek 26 wrzesień, gdy do autobusu wsiadł kanar i wrzasnął:"Dan Boger!!! Bilecik do kontroli!!!" A on(a) na to: > Set your mutt/gpg to automatically get keys from a keyserver (like > wwwkeys.pgp.net) and then when it encounters a key it doesn't know, it'll > try and get it and automatically verify it. it's pretty cool. :) And if you have not got a hard-wire? What then? I just call my teleco to download mail and read offline. By. -- |/ |_, _ .- --,2:480/135@fido[EMAIL PROTECTED] |__ |_|. | \ |_|. ._' /_. 101:1000/135@unholy ... Droga wśród jabłoni prowadzi w nieznane...
Re: About PGP public key service. (With P.S.)
On Wed, Sep 27, 2000 at 02:37:39AM +0300, Eugene Paskevich wrote: > P.S. There are two things I still can't understand. > 1) Why do people post here signed messages. I think there's no need in it. because a lot of people (me included) have mutt sign their messages automatically, and often don't bother/forget to tell it not to sign to lists... > 2) If they sign their messages they suppose that someone have their public > key to verify signature. Where can I get it? From public server of keys? > {I don't remember the correct name.} Again, there is no need in these > servers. 'couse noone would ask for public key of an unknown man just to > verify a signature. Set your mutt/gpg to automatically get keys from a keyserver (like wwwkeys.pgp.net) and then when it encounters a key it doesn't know, it'll try and get it and automatically verify it. it's pretty cool. :) :) Dan
About PGP public key service. (With P.S.)
I heard that people have troubles with public PGP key service. That's why I'd like to introduce the way I did it myself. I hope that this info will be helpful for someone. -- 1) In ~/.procmailrc: :0 * ^Subject: publicpgpkey | /home/eugene/bin/publicpgpkey "`formail -x 'From: '`" 2) /home/eugene/bin/publicpgpkey: #!/bin/sh KEYRING=/home/eugene/.pgp/pubring.pkr PUBLIC=/tmp/publicpgpkey USERID=Eugene if [ "$1" == "--help" ] ; then echo "Public PGP key utility." echo "Usage: $0 [e-mail]" echo "e-mail: To send public PGP key to a particular e-mail." exit 0 fi pgp -kxa $USERID $PUBLIC $KEYRING > /dev/null 2>&1 if [ ! -n "$1" ] ; then cat $PUBLIC rm -f $PUBLIC exit 0 fi mail "$1" -s "Public PGP key of Eugene Paskevich" < $PUBLIC if [ ! "`cat /proc/$PPID/cmdline`" == "-bash" ] ; then echo `date ; echo "$1"` >> /home/eugene/.pgp/people fi rm -f $PUBLIC - Now one can make changes for him/herself and be happy. P.S. There are two things I still can't understand. 1) Why do people post here signed messages. I think there's no need in it. 2) If they sign their messages they suppose that someone have their public key to verify signature. Where can I get it? From public server of keys? {I don't remember the correct name.} Again, there is no need in these servers. 'couse noone would ask for public key of an unknown man just to verify a signature. It's a stupid idea as for me. -- Eugene Paskevich | *==(--- | "Alrighty then!" [EMAIL PROTECTED]| ---)==* |-- Ace Venture Public PGP key: mailto:[EMAIL PROTECTED]?subject=publicpgpkey {Mutt 1.2.4i}Moderator of [EMAIL PROTECTED] Be afraid. ;) ## Eternal nothingness is fine if you happen to be dressed for it. -- Woody Allen ##