three computers and one secret key?

Robert T Wyatt robert.wyatt at mail.utexas.edu
Wed Sep 27 18:39:04 CEST 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Robert,

Thank you very much for your help. I believe that I have both (all three
really) working now.

It seems that on MacOS 10.3.9 I needed to disable the OpenPGP option
"Use gpg-agent for passphrase handling." (The enigmail error mentioned a
problem accessing gpg-agent.) Additionally, since it is using gpg 1.4.1,
the command is a little different:

gpg --secret-keyring --no-default-keyring ~/path/to/mykeys/priv.asc

On the PC (running gpg 1.4.5--with no man pages apparently), I moved the
files to:

C:\Documents and Settings\username\Application Data\gnupg

... and renamed them to pubring.asc and secring.asc.
Issuing gpg --import on each file appropriately created the correct
pubring.gpg and secring.gpg that I needed.

Do I have a volunteer to accept an encrypted message from me so that I
can verify it's working? (Does it make sense to ask this question? Can
sending an encrypted message to someone other than myself verify this
any better than just sending one to myself--which I know works?)

Thanks,
Robert
- --
Robert T Wyatt
Assistant Registrar
Registration and Room Scheduling (M5504)
The University of Texas at Austin
phone (512) 475-7602
fax (512) 475-7515


Robert J. Hansen wrote:
> Robert T Wyatt wrote:
>> So what am I supposed to be doing? Assuming it can be done, how do I
>> export my secret key for use on other computers? Do I have to use a
>> memory stick or other portable device to make this work? Is it possible
>> (and prudent) to put it on a server somewhere in a secure fashion?
> 
> Open up a Terminal window (Terminal is in your Applications/Utilities
> folder) and type the following:
> 
> 
> 
> gpg --armor --export-secret-key [your key ID] > priv.asc
> gpg --armor --export [your key ID] > pub.asc
> mkdir mykeys
> mv priv.asc pub.asc mykeys
> zip -r ~/Desktop/mykeys.zip mykeys
> rm -rf mykeys
> 
> 
> 
> This will create a zipfile on your desktop called mykeys.zip.  Copy that
> to your other machines and unzip it there.  You'll find inside it the
> files "pub.asc" and "priv.asc".
> 
> On your other Macs, copy it to your desktop and unzip it.  Then open up
> another Terminal window there and type:
> 
> 
> 
> gpg --import-secret-key ~/Desktop/mykeys/priv.asc
> gpg --import ~/Desktop/mykeys/pub.asc
> gpg --edit-key [your key ID] trust
> 
> 
> 
> This last line will start up a GnuPG key edit menu.  Type '5', then 'y',
> then type 'save'.
> 
> Your key is now copied to your other Mac, and trusted on your other
> machine, too.
> 
> 
> 
> WARNING: I'm giving you shell commands here.  Do not _ever_ follow
> random shell commands you get from unknown people on the Internet.  You
> can really screw up your computer that way.  Wait for other people on
> the list to take a look at what I'm telling you to do, and wait for a
> consensus as to whether I'm giving you good advice or bad advice.
> 
> And yes, there really are such losers on the Internet as who try to get
> people to do stupid things that will damage their own machine.
> 
> That said, Terminal is an incredibly powerful and useful tool, and it's
> worth your time to learn it, if you haven't already.  :)
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFGqkYsFMntyigSLMRAhwRAJ9ACb9uFz0M3OYoKLNHeSIE5uCGsgCgjliJ
50e5Nx8BA9mzgAY1NNr3Jqk=
=HBXM
-----END PGP SIGNATURE-----



More information about the Gnupg-users mailing list