Gpg Generate Key Non Interactive
Howto generate a GPG-keypair. There are four steps for generating a keypair. We assume, that Alice wants to generate a keypair, so she can decrypt texts, which are encrypted for her. STEP 1: Open keymanagement. First Alice opens the keymanagement through the toolbar. STEP 2: Open generate key dialog. No, don't do that. Adding a trusted-key line to gpg.conf will cause gpg to always trust that key as fully as one of the user's own keys, which is a bad thing. Passing -trusted-key as an argument, and only in this specific case is acceptable (as is passing -trust-model=always in the same way). – Blacklight Shining Dec 13 '15 at 20:46.
Key-Type: 1 |
Key-Length: 2048 |
Subkey-Type: 1 |
Subkey-Length: 2048 |
Name-Real: Root Superuser |
Name-Email: root@handbook.westarete.com |
Expire-Date: 0 |
# Generate the key |
gpg --batch --gen-key gen-key-script |
commented Feb 13, 2014
/generate-pgp-public-key-ubuntu.html. Here's a page that describes the options for the gen-key script: http://www.gnupg.org/documentation/manuals/gnupg-devel/Unattended-GPG-key-generation.html |
commented Feb 13, 2014
Originally I had a couple extra steps to use rng-tools to seed entropy from /dev/urandom. Apparently this is a bad idea because it will just feed bytes regardless of whether there's enough entropy. Here's where I got the original idea, and the subsequent discussion of why it's bad. For new machines, we should generate the keys on our laptops where there's much more entropy to draw from, and then transfer them to the new server, just like we're currently doing with the encrypted data bag secret. |
commented Feb 19, 2018
This is awesome, thank you. |
commented Jan 23, 2019
I configured libvirt tu use /dev/urandom of the host: https://libvirt.org/formatdomain.html#elementsRng |
Generate Gpg Key Windows
commented Apr 9, 2019 • edited
edited
Thanks that was really helpful |