GNUPG
Z wiki linux-user
(Stworzenie strony) |
m |
||
Linia 14: | Linia 14: | ||
GnuPG działa na procesorach GNU/Linux with x86, alpha, mips, sparc64, m68k lub powerpc. Więcej odnośnie obsługiwanych systemów i architektur można przeczytać na stronie [http://www.gnupg.org/download/supported_systems.en.html www.gnupg.org/download/supported_systems.en.html]. | GnuPG działa na procesorach GNU/Linux with x86, alpha, mips, sparc64, m68k lub powerpc. Więcej odnośnie obsługiwanych systemów i architektur można przeczytać na stronie [http://www.gnupg.org/download/supported_systems.en.html www.gnupg.org/download/supported_systems.en.html]. | ||
+ | === Tworzenie kluczy === | ||
+ | Na początku musimy utworzyć parę kluczy publiczny oraz prywatny, będziemy ich używać za każdym razem, kiedy będziemy chcieli stworzyć nowe klucze GnuPG w systemie. Używając poniższej komendy pierwszy raz GnuPG stworzy w systemie odpowiednie foldery oraz pliki będzie to wyglądał mniej więcej tak | ||
+ | To create a new key-pair, use the following command: | ||
+ | # gpg --gen-key | ||
+ | gpg (GnuPG) 1.0.7; Copyright (C) 2000 Free Software Foundation, Inc. | ||
+ | This program comes with ABSOLUTELY NO WARRANTY. | ||
+ | This is free software, and you are welcome to redistribute it | ||
+ | under certain conditions. See the file COPYING for details. | ||
+ | gpg: /root/.gnupg: directory created | ||
+ | gpg: /root/.gnupg/options: new options file created | ||
+ | gpg: you have to start GnuPG again, so it can read the new options file | ||
+ | używając tej komendy po raz drugi przejdziemy już do tworzenia faktycznych kluczy (prywatnego i publicznego). | ||
+ | # gpg --gen-key | ||
+ | gpg (GnuPG) 1.4.12; Copyright (C) 2012 Free Software Foundation, Inc. | ||
+ | This is free software: you are free to change and redistribute it. | ||
+ | There is NO WARRANTY, to the extent permitted by law. | ||
+ | Please select what kind of key you want: | ||
+ | (1) RSA and RSA (default) | ||
+ | (2) DSA and Elgamal | ||
+ | (3) DSA (sign only) | ||
+ | (4) RSA (sign only) | ||
+ | Your selection? '''1''' | ||
+ | RSA keys may be between 1024 and 4096 bits long. | ||
+ | What keysize do you want? (2048) '''Enter''' | ||
+ | Please specify how long the key should be valid. | ||
+ | 0 = key does not expire | ||
+ | <n> = key expires in n days | ||
+ | <n>w = key expires in n weeks | ||
+ | <n>m = key expires in n months | ||
+ | <n>y = key expires in n years | ||
+ | Key is valid for? (0) '''Enter''' | ||
+ | Key does not expire at all | ||
+ | Is this correct? (y/N) '''y''' | ||
+ | You need a user ID to identify your key; the software constructs the user ID | ||
+ | from the Real Name, Comment and Email Address in this form: | ||
+ | "Heinrich Heine (Der Dichter) <heinrichh@duesseldorf.de>" | ||
+ | Real name: '''Jan''' | ||
+ | Email address: jan@test1234.pl | ||
+ | Comment: Moje klucze | ||
+ | You selected this USER-ID: | ||
+ | "jan (Moje klucze) <jan@test1234.pl>" | ||
+ | Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O | ||
+ | Enter passphrase: haslo1234567890 | ||
+ | Repeat passphrase: haslo1234567890 | ||
+ | We need to generate a lot of random bytes. It is a good idea to perform | ||
+ | some other action (type on the keyboard, move the mouse, utilize the | ||
+ | disks) during the prime generation; this gives the random number | ||
+ | generator a better chance to gain enough entropy.'''(naciskaj cokolwiek na klawiaturze, ruszaj myszką, wykonuj jakieś operacje na komputerze)''' | ||
+ | jgpg: /root/.gnupg/trustdb.gpg: trustdb created | ||
+ | gpg: key B7939437 marked as ultimately trusted | ||
+ | public and secret key created and signed. | ||
+ | gpg: checking the trustdb | ||
+ | gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model | ||
+ | gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u | ||
+ | pub 2048R/B7939437 2012-09-11 | ||
+ | Key fingerprint = 3AFD 3E8A 4B50 EBF9 88D5 6325 4A39 34B5 B793 9437 | ||
+ | uid jan (Moje klucze) <jan@test1234.pl> | ||
+ | sub 2048R/64360F15 2012-09-11 | ||
+ | Tworzenie kluczy publicznego i prywatnego zakończyło się sukcesem. Klucze znajdują się w katalogu ''/root/.gnupg'' '''pubring.gpg''' oraz '''secring.gpg''' | ||
+ | |||
+ | |||
+ | |||