How to detect fingerprint and type of the key from pubring.gpg(public keyring file)?
m4rtntns at gmail.com
Fri Aug 2 00:58:06 CEST 2013
RIPE(RIR in European region) database allows one to upload ASCII armored
PGP public keys: http://www.ripe.net/data-tools/support/security/pgp
software is able to generate some "key-cert" object attributes
automatically. For example "method", "owner" and "fingerpr":
noc at T42 ~ $ whois -h whois.ripe.net -t key-cert | grep gene
method: [generated] [single] [ ]
owner: [generated] [multiple] [ ]
fingerpr: [generated] [single] [inverse key]
noc at T42 ~ $
Example "key-cert" object provided by RIPE:
owner: Joe User <joe at example.net>
fingerpr: 9D 82 4B B8 38 56 AE 12 BD 88 73 F7 EF D3 7A 92
certif: ---BEGIN PGP PUBLIC KEY BLOCK---
certif: Version: 2.6.3ia
certif: ---END PGP PUBLIC KEY BLOCK---
changed: joe at example.net 19981117
How are those fields automatically detected/generated? "Owner"(UID in gpg
terminology) is written to public key- one can verify this with analyzing
the public key with hex editor. However:
1) is "method" also built into public key? At least "hexdump -C pubring.gpg
| grep -i pgp" does not indicate this.. Or has "PGP" some sort of special
fingerprint which is understood by server-side software? Last but not
least, are there any other types besides "PGP"? I guess it is as pgpdump is
even able to dump the timestamp when the key itself was generated.
2) is fingerprint automatically hashed based on the UID?
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Gnupg-users