HOWTO revision 1.1
1How to use ssh keys in PGP signatures
2=====================================
3
41. generate a new ssh key pair
5
6	% ssh-keygen -t rsa -b 4096 -f sshtest-20140202
7	Generating public/private rsa key pair.
8	Enter passphrase (empty for no passphrase):
9	Enter same passphrase again:
10	Your identification has been saved in sshtest-20140202.
11	Your public key has been saved in sshtest-20140202.pub.
12	The key fingerprint is:
13	73:98:cf:3d:89:05:a1:6b:39:6b:24:f9:10:32:7a:05 agc@netbsd-001.cupertino.alistaircrooks.com
14	The key's randomart image is:
15	+--[ RSA 4096]----+
16	|    E     .      |
17	|     .   . .     |
18	|    o o . .      |
19	|   . + o = .     |
20	|  . . + S . .    |
21	|   .   * B + .   |
22	|        + + +    |
23	|       .     .   |
24	|                 |
25	+-----------------+
26	%
27
282. sign newdata using netpgp
29
30	% netpgp -s -S sshtest-20140202 newdata
31	signature  4096/RSA (Encrypt or Sign) 1c5ef29143e3e3ae 2014-02-02
32	Key fingerprint: a4eb b577 ff2e f878 ea40 8c14 1c5e f291 43e3 e3ae
33	uid              netbsd-001.cupertino.alistaircrooks.com (sshtest-20140202.pub) <agc@netbsd-001.cupertino.alistaircrooks.com>
34	%
35
363. verify signature on newdata
37
38	% ./netpgpverify -S sshtest-20140202.pub newdata.gpg
39	Good signature for newdata.gpg made Sun Feb  2 13:40:07 2014
40	signature     4096/RSA (Encrypt or Sign) 1c5ef29143e3e3ae 2014-02-02
41	fingerprint   a4eb b577 ff2e f878 ea40 8c14 1c5e f291 43e3 e3ae
42	uid           netbsd-001.cupertino.alistaircrooks.com (sshtest-20140202.pub) <agc@netbsd-001.cupertino.alistaircrooks.com>
43
44	%
45
464. get the contents of the file (only if the signature verifies ok)
47
48	% ./netpgpverify -c cat -S sshtest-20140202.pub newdata.gpg
49	/*-
50	 * Copyright (c) 2012 Alistair Crooks <agc@NetBSD.org>
51	 * All rights reserved.
52	 *
53	 * Redistribution and use in source and binary forms, with or without
54	 * modification, are permitted provided that the following conditions
55	 * are met:
56