HOWTO revision 1.1
1How to use ssh keys in PGP signatures 2===================================== 3 41. generate a new ssh key pair 5 6 % ssh-keygen -t rsa -b 4096 -f sshtest-20140202 7 Generating public/private rsa key pair. 8 Enter passphrase (empty for no passphrase): 9 Enter same passphrase again: 10 Your identification has been saved in sshtest-20140202. 11 Your public key has been saved in sshtest-20140202.pub. 12 The key fingerprint is: 13 73:98:cf:3d:89:05:a1:6b:39:6b:24:f9:10:32:7a:05 agc@netbsd-001.cupertino.alistaircrooks.com 14 The key's randomart image is: 15 +--[ RSA 4096]----+ 16 | E . | 17 | . . . | 18 | o o . . | 19 | . + o = . | 20 | . . + S . . | 21 | . * B + . | 22 | + + + | 23 | . . | 24 | | 25 +-----------------+ 26 % 27 282. sign newdata using netpgp 29 30 % netpgp -s -S sshtest-20140202 newdata 31 signature 4096/RSA (Encrypt or Sign) 1c5ef29143e3e3ae 2014-02-02 32 Key fingerprint: a4eb b577 ff2e f878 ea40 8c14 1c5e f291 43e3 e3ae 33 uid netbsd-001.cupertino.alistaircrooks.com (sshtest-20140202.pub) <agc@netbsd-001.cupertino.alistaircrooks.com> 34 % 35 363. verify signature on newdata 37 38 % ./netpgpverify -S sshtest-20140202.pub newdata.gpg 39 Good signature for newdata.gpg made Sun Feb 2 13:40:07 2014 40 signature 4096/RSA (Encrypt or Sign) 1c5ef29143e3e3ae 2014-02-02 41 fingerprint a4eb b577 ff2e f878 ea40 8c14 1c5e f291 43e3 e3ae 42 uid netbsd-001.cupertino.alistaircrooks.com (sshtest-20140202.pub) <agc@netbsd-001.cupertino.alistaircrooks.com> 43 44 % 45 464. get the contents of the file (only if the signature verifies ok) 47 48 % ./netpgpverify -c cat -S sshtest-20140202.pub newdata.gpg 49 /*- 50 * Copyright (c) 2012 Alistair Crooks <agc@NetBSD.org> 51 * All rights reserved. 52 * 53 * Redistribution and use in source and binary forms, with or without 54 * modification, are permitted provided that the following conditions 55 * are met: 56