Project

General

Profile

ReleaseKey » History » Version 25

Denis 'GNUtoo' Carikli, 11/06/2021 03:10 AM
Add simplier method to retrieve my gpg key

1 16 dl lud
h1. Release keys
2 1 Paul Kocialkowski
3 24 Denis 'GNUtoo' Carikli
{{toc}}
4
5 14 Wolfgang Wiedmeyer
h2. Which key for which Replicant version?
6
7 23 Kurtis Hanna
h3. From Replicant 6.0 0004 RC1 up to the Current Release
8 19 Denis 'GNUtoo' Carikli
9
Key ID: FB31DBA3AB8DB76A4157329F7651568F80374459
10
11
These images are signed with [[People#Denis-GNUtoo-Carikli|Denis 'GNUtoo' Carikli]]'s key and has the following fingerprint:
12
<pre>
13
FB31 DBA3 AB8D B76A 4157  329F 7651 568F 8037 4459
14
</pre>
15
16 25 Denis 'GNUtoo' Carikli
h4. Retrieving the FB31DBA3AB8DB76A4157329F7651568F80374459 key
17
18
The FB31DBA3AB8DB76A4157329F7651568F80374459 can be downloaded form "https://ftp.osuosl.org/pub/replicant/people/GNUtoo/FB31DBA3AB8DB76A4157329F7651568F80374459.key":https://ftp.osuosl.org/pub/replicant/people/GNUtoo/FB31DBA3AB8DB76A4157329F7651568F80374459.key
19
20
It can then be imported with the following command (it needs to be run in the directory where FB31DBA3AB8DB76A4157329F7651568F80374459.key has been downloaded):
21
<pre>
22
gpg --import FB31DBA3AB8DB76A4157329F7651568F80374459.key
23
</pre>
24
25
Alternatively this key is also available in several key servers and it's also part of several Replicant releases, so the other methods mentioned below in   [[ReleaseKey#Retrieving-the-Replicant-release-key]] can also work.
26
27 18 Denis 'GNUtoo' Carikli
h3. Up to Replicant 6.0 0003
28 14 Wolfgang Wiedmeyer
29
Key ID: 5816A24C10757FC4
30
31 17 Denis 'GNUtoo' Carikli
These images are signed with [[People#Wolfgang-Wiedmeyer|Wolfgang Wiedmeyer]]'s key and has the following fingerprint:
32 1 Paul Kocialkowski
<pre>
33 14 Wolfgang Wiedmeyer
0F30 D1A0 2F73 F70A 6FEE  048E 5816 A24C 1075 7FC4
34
</pre>
35
36
h3. Replicant 4.2 and below
37
38
Key ID: 16D1FEEE4A80EB23
39
40
These images are signed with the Replicant release key which expires 2024-01-17 and has the following fingerprint:
41
<pre>
42 1 Paul Kocialkowski
E776 092B 052A DC91 FDD1 FD80 16D1 FEEE 4A80 EB23
43
</pre>
44
45 13 Wolfgang Wiedmeyer
h2. Retrieving the Replicant release key
46 1 Paul Kocialkowski
47 14 Wolfgang Wiedmeyer
In the following, @KEY_ID@ needs to be replaced with the right key ID from above.
48
49 5 Paul Kocialkowski
h3. From a key server (recommended)
50 12 Wolfgang Wiedmeyer
51 9 Loic Dachary
You can retrieve our signing key from a public key server and import it to your GPG keyring using:
52 1 Paul Kocialkowski
53 10 Wolfgang Wiedmeyer
<pre>
54 14 Wolfgang Wiedmeyer
gpg --recv-key KEY_ID
55 13 Wolfgang Wiedmeyer
</pre>
56 1 Paul Kocialkowski
57 21 Kurtis Hanna
It sometimes is the case that certain keyservers have updated GPG keys while other keyservers have expired GPG keys or don't have them at all. In this situation, an alternate keyserver can be specified by adding a keyserver flag to the command:
58 20 Kurtis Hanna
59
<pre>
60
gpg --keyserver KEYSERVER_ID --recv-key KEY_ID
61
</pre>
62
63 22 Kurtis Hanna
For example, to get [[People#Denis-GNUtoo-Carikli|Denis 'GNUtoo' Carikli]]'s up to date public GPG key, you can use a command such as this:
64
65
<pre>
66
gpg --keyserver keys.gnupg.net --recv-key FB31DBA3AB8DB76A4157329F7651568F80374459
67
</pre>
68
69 1 Paul Kocialkowski
Errors may occur if GPG is not properly configured. Following a guide like "this":https://riseup.net/en/security/message-security/openpgp/best-practices should ensure that the key is retrieved securely.
70
71 8 Paul Kocialkowski
h3. From our releases
72 1 Paul Kocialkowski
73
A copy of our signing key is shipped with every Replicant release, distributed with [[ReplicantImages|Replicant images]].
74
Once downloaded, the key can be imported to your GPG keyring using:
75 6 Paul Kocialkowski
<pre>
76 14 Wolfgang Wiedmeyer
gpg  --armor --import path/to/KEY.asc
77 1 Paul Kocialkowski
</pre>
78
79
h2. Establishing a chain of trust
80
81 11 Wolfgang Wiedmeyer
In order to establish a chain of trust, you are encouraged to retrieve our release key physically when meeting a trusted [[People|Replicant developer]] and sign it with your own key.
82 1 Paul Kocialkowski
83 11 Wolfgang Wiedmeyer
You can see the signatures the release key is already signed with running:
84
85 14 Wolfgang Wiedmeyer
<pre>
86 11 Wolfgang Wiedmeyer
gpg --list-sigs KEY_ID
87
</pre>
88 1 Paul Kocialkowski
89 20 Kurtis Hanna
If a key you already trust is among these signatures, a chain of trust is established between your key and the release key. However, this chain of trust is not as strong as the direct one you establish when you personally verify and sign the release key.