Next: About this document
Up: E-Mail PrivacyAuthentication
Previous: Anonymous Posting
- Note on multiple keys (including your own).
If you, or someone else, has mulitiple keys, the best way to handle
this is to set up aliases in your
~
/.premail/addresses that use
foo: bar ((key=0x[key_id]))
. This is usefull to have one, light-weight
key that you automagically decrypt and a bigger one for signing and
other stuff.
- Key storage:
Keep backups of your pgp keys, esp. private ones. Really, I mean it.
Send your key to the mit server. You can do this through e-mail,
by e-mailing to pgp-public-keys@pgp5.ai.mit.edu with subject
ADD and your ascii-armored public key in the body, or by the
web at pgp5.ai.mit.edu.
- Key retrieval:
As above, go to http://pgp5.ai.mit.edu (or to one of the mirrors listed
there) and do an extract. Can also be done via e-mail. Read the docs
there on the e-mail version.
- Adding keys:
When you've retrieved a key, use pgp -ka
<filename>
to add the
file's
key to your public key ring. If you want to you read the pgp docs on
how the signature web-of-trust works, otherwise just assume that what
comes from the server is OK.
Robin Lee Powell
Wed Feb 4 20:10:44 EST 1998