aboutsummaryrefslogtreecommitdiffhomepage
path: root/doc/GnuPG-signature.html
diff options
context:
space:
mode:
authorVirtualTam <virtualtam@flibidi.net>2015-08-04 16:07:13 +0200
committerVirtualTam <virtualtam@flibidi.net>2015-08-04 16:07:13 +0200
commit27cf2e671d1f35bd8c9383d008cd3733fc1c6e0d (patch)
tree4726baf18e7057eac3f9b6bdb5991fe6117814fc /doc/GnuPG-signature.html
parent96db105e4c0833324f7168edb5673278de8ccd54 (diff)
parent992af0b9d77cb4fbac2c37ef8d5896042d67a2a3 (diff)
downloadShaarli-27cf2e671d1f35bd8c9383d008cd3733fc1c6e0d.tar.gz
Shaarli-27cf2e671d1f35bd8c9383d008cd3733fc1c6e0d.tar.zst
Shaarli-27cf2e671d1f35bd8c9383d008cd3733fc1c6e0d.zip
Merge pull request #294 from virtualtam/doc/update
Doc: sync from Wiki, generate HTML
Diffstat (limited to 'doc/GnuPG-signature.html')
-rw-r--r--doc/GnuPG-signature.html199
1 files changed, 199 insertions, 0 deletions
diff --git a/doc/GnuPG-signature.html b/doc/GnuPG-signature.html
new file mode 100644
index 00000000..c9e0455a
--- /dev/null
+++ b/doc/GnuPG-signature.html
@@ -0,0 +1,199 @@
1<!DOCTYPE html>
2<html>
3<head>
4 <meta charset="utf-8">
5 <meta name="generator" content="pandoc">
6 <meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=yes">
7 <title>Shaarli - GnuPG signature</title>
8 <style type="text/css">code{white-space: pre;}</style>
9 <!--[if lt IE 9]>
10 <script src="http://html5shim.googlecode.com/svn/trunk/html5.js"></script>
11 <![endif]-->
12 <style type="text/css">
13table.sourceCode, tr.sourceCode, td.lineNumbers, td.sourceCode {
14 margin: 0; padding: 0; vertical-align: baseline; border: none; }
15table.sourceCode { width: 100%; line-height: 100%; }
16td.lineNumbers { text-align: right; padding-right: 4px; padding-left: 4px; color: #aaaaaa; border-right: 1px solid #aaaaaa; }
17td.sourceCode { padding-left: 5px; }
18code > span.kw { color: #007020; font-weight: bold; }
19code > span.dt { color: #902000; }
20code > span.dv { color: #40a070; }
21code > span.bn { color: #40a070; }
22code > span.fl { color: #40a070; }
23code > span.ch { color: #4070a0; }
24code > span.st { color: #4070a0; }
25code > span.co { color: #60a0b0; font-style: italic; }
26code > span.ot { color: #007020; }
27code > span.al { color: #ff0000; font-weight: bold; }
28code > span.fu { color: #06287e; }
29code > span.er { color: #ff0000; font-weight: bold; }
30 </style>
31 <link rel="stylesheet" href="github-markdown.css">
32</head>
33<body>
34<div id="local-sidebar">
35<ul>
36<li><a href="Home.html">Home</a></li>
37<li>Installation
38<ul>
39<li><a href="Server-requirements.html">Server requirements</a></li>
40<li><a href="Server-configuration.html">Server configuration</a></li>
41<li><a href="Shaarli-configuration.html">Shaarli configuration</a></li>
42</ul></li>
43<li><a href="Usage.html">Usage</a>
44<ul>
45<li><a href="Sharing-button.html">Sharing button</a> (bookmarklet)</li>
46<li><a href="Firefox-share.html">Firefox share</a></li>
47<li><a href="RSS-feeds.html">RSS feeds</a></li>
48</ul></li>
49<li>How To
50<ul>
51<li><a href="Backup,-restore,-import-and-export.html">Backup, restore, import and export</a></li>
52<li><a href="Copy-an-existing-installation-over-SSH-and-serve-it-locally.html">Copy an existing installation over SSH and serve it locally</a></li>
53<li><a href="Download-CSS-styles-from-an-OPML-list.html">Download CSS styles from an OPML list</a></li>
54</ul></li>
55<li><a href="Troubleshooting.html">Troubleshooting</a></li>
56<li><a href="Development.html">Development</a>
57<ul>
58<li><a href="GnuPG-signature.html">GnuPG signature</a></li>
59<li><a href="Coding-guidelines.html">Coding guidelines</a></li>
60<li><a href="Directory-structure.html">Directory structure</a></li>
61<li><a href="3rd-party-libraries.html">3rd party libraries</a></li>
62<li><a href="Plugin-System.html">Plugin System</a></li>
63<li><a href="Security.html">Security</a></li>
64<li><a href="Static-analysis.html">Static analysis</a></li>
65<li><a href="Theming.html">Theming</a></li>
66<li><a href="Unit-tests.html">Unit tests</a></li>
67</ul></li>
68<li>About
69<ul>
70<li><a href="FAQ.html">FAQ</a></li>
71<li><a href="Community-&amp;-Related-software.html">Community &amp; Related software</a></li>
72<li><a href="TODO.html">TODO</a></li>
73</ul></li>
74</ul>
75</div>
76<h1 id="gnupg-signature">GnuPG signature</h1>
77<h2 id="introduction">Introduction</h2>
78<h3 id="pgp-and-gpg">PGP and GPG</h3>
79<p><a href="https://gnupg.org/">Gnu Privacy Guard</a> (GnuPG) is an Open Source implementation of the <a href="https://en.wikipedia.org/wiki/Pretty_Good_Privacy#OpenPGP">Pretty Good [](.html)<br />Privacy</a> (OpenPGP) specification. Its main purposes are digital authentication,<br />signature and encryption.</p>
80<p>It is often used by the <a href="https://en.wikipedia.org/wiki/Free_and_open-source_software">FLOSS</a> community to verify:<a href=".html"></a></p>
81<ul>
82<li>Linux package signatures: Debian <a href="https://wiki.debian.org/SecureApt">SecureApt</a>, ArchLinux <a href="https://www.archlinux.org/master-keys/">Master [](.html)<br />Keys</a></li>
83<li><a href="https://en.wikipedia.org/wiki/Revision_control">SCM</a> releases &amp; maintainer identity<a href=".html"></a></li>
84</ul>
85<h3 id="trust">Trust</h3>
86<p>To quote Phil Pennock (the author of the <a href="https://bitbucket.org/skskeyserver/sks-keyserver/wiki/Home">SKS</a> key server - <a href="http://sks.spodhuis.org/" class="uri">http://sks.spodhuis.org/</a>):<a href=".html"></a></p>
87<blockquote>
88<p>You MUST understand that presence of data in the keyserver (pools) in no way connotes trust. Anyone can generate a key, with any name or email address, and upload it. All security and trust comes from evaluating security at the “object level”, via PGP Web-Of-Trust signatures. This keyserver makes it possible to retrieve keys, looking them up via various indices, but the collection of keys in this public pool is KNOWN to contain malicious and fraudulent keys. It is the common expectation of server operators that users understand this and use software which, like all known common OpenPGP implementations, evaluates trust accordingly. This expectation is so common that it is not normally explicitly stated.</p>
89</blockquote>
90<p>Trust can be gained by having your key signed by other people (and signing their key back, too :) ), for instance during <a href="https://en.wikipedia.org/wiki/Key_signing_party">key signing parties</a>, see:<a href=".html"></a></p>
91<ul>
92<li><a href="http://www.cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html">The Keysigning party HOWTO</a><a href=".html"></a></li>
93<li><a href="https://en.wikipedia.org/wiki/Web_of_trust">Web of trust</a><a href=".html"></a></li>
94</ul>
95<h2 id="generate-a-gpg-key">Generate a GPG key</h2>
96<p>See <a href="http://stackoverflow.com/a/16725717">Generating a GPG key for Git tagging</a>.<a href=".html"></a></p>
97<h3 id="gpg---provide-identity-information">gpg - provide identity information</h3>
98<pre class="sourceCode bash"><code class="sourceCode bash">$ <span class="kw">gpg</span> --gen-key
99
100<span class="kw">gpg</span> (GnuPG) <span class="kw">2.1.6;</span> <span class="kw">Copyright</span> (C) <span class="kw">2015</span> Free Software Foundation, Inc.
101<span class="kw">This</span> is free software: you are free to change and redistribute it.
102<span class="kw">There</span> is NO WARRANTY, to the extent permitted by law.
103
104<span class="kw">Note</span>: Use <span class="st">&quot;gpg2 --full-gen-key&quot;</span> for a full featured key generation dialog.
105
106<span class="kw">GnuPG</span> needs to construct a user ID to identify your key.
107
108<span class="kw">Real</span> name: Marvin the Paranoid Android
109<span class="kw">Email</span> address: marvin@h2g2.net
110<span class="kw">You</span> selected this USER-ID:
111 <span class="st">&quot;Marvin the Paranoid Android &lt;marvin@h2g2.net&gt;&quot;</span>
112
113<span class="kw">Change</span> (N)<span class="kw">ame</span>, (E)<span class="kw">mail</span>, or (O)<span class="kw">kay</span>/<span class="kw">(Q)uit?</span> o
114<span class="kw">We</span> need to generate a lot of random bytes. It is a good idea to perform
115<span class="kw">some</span> other action (type on the keyboard, move the mouse, utilize the
116<span class="kw">disks</span>) <span class="kw">during</span> the prime generation<span class="kw">;</span> <span class="kw">this</span> gives the random number
117<span class="kw">generator</span> a better chance to gain enough entropy.</code></pre>
118<h3 id="gpg---entropy-interlude">gpg - entropy interlude</h3>
119<p>At this point, you will:</p>
120<ul>
121<li>be prompted for a secure password to protect your key (the input method will depend on your Desktop Environment and configuration)</li>
122<li>be asked to use your machine's input devices (mouse, keyboard, etc.) to generate random entropy; this step <em>may take some time</em></li>
123</ul>
124<h3 id="gpg---key-creation-confirmation">gpg - key creation confirmation</h3>
125<pre class="sourceCode bash"><code class="sourceCode bash"><span class="kw">gpg</span>: key A9D53A3E marked as ultimately trusted
126<span class="kw">public</span> and secret key created and signed.
127
128<span class="kw">gpg</span>: checking the trustdb
129<span class="kw">gpg</span>: 3 marginal(s) <span class="kw">needed</span>, 1 complete(s) <span class="kw">needed</span>, PGP trust model
130<span class="kw">gpg</span>: depth: 0 valid: 2 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 2u
131<span class="kw">pub</span> rsa2048/A9D53A3E 2015-07-31
132 <span class="kw">Key</span> fingerprint = AF2A 5381 E54B 2FD2 14C4 A9A3 0E35 ACA4 A9D5 3A3E
133<span class="kw">uid</span> [ultimate] Marvin the Paranoid Android <span class="kw">&lt;</span>marvin@h2g2.net<span class="kw">&gt;</span>[](.html)
134<span class="kw">sub</span> rsa2048/8C0EACF1 2015-07-31</code></pre>
135<h3 id="gpg---submit-your-public-key-to-a-pgp-server-optional">gpg - submit your public key to a PGP server (Optional)</h3>
136<pre class="sourceCode bash"><code class="sourceCode bash">$ <span class="kw">gpg</span> --keyserver pgp.mit.edu --send-keys A9D53A3E
137<span class="kw">gpg</span>: sending key A9D53A3E to hkp server pgp.mit.edu</code></pre>
138<h2 id="create-and-push-a-gpg-signed-tag">Create and push a GPG-signed tag</h2>
139<p>See <a href="http://git-scm.com/book/en/v2/Distributed-Git-Maintaining-a-Project#Tagging-Your-Releases">Git - Maintaining a project - Tagging your [](.html)<br />releases</a>.</p>
140<h3 id="prerequisites">Prerequisites</h3>
141<p>This guide assumes that you have:</p>
142<ul>
143<li>a GPG key matching your GitHub authentication credentials
144<ul>
145<li>i.e., the email address identified by the GPG key is the same as the one in your <code>~/.gitconfig</code></li>
146</ul></li>
147<li>a GitHub fork of Shaarli</li>
148<li>a local clone of your Shaarli fork, with the following remotes:
149<ul>
150<li><code>origin</code> pointing to your GitHub fork</li>
151<li><code>upstream</code> pointing to the main Shaarli repository</li>
152</ul></li>
153<li>maintainer permissions on the main Shaarli repository (to push the signed tag)</li>
154</ul>
155<h3 id="bump-shaarlis-version">Bump Shaarli's version</h3>
156<pre class="sourceCode bash"><code class="sourceCode bash">$ <span class="kw">cd</span> /path/to/shaarli
157
158<span class="co"># create a new branch</span>
159$ <span class="kw">git</span> fetch upstream
160$ <span class="kw">git</span> checkout upstream/master -b v0.5.0
161
162<span class="co"># bump the version number</span>
163$ <span class="kw">vim</span> index.php shaarli_version.php
164
165<span class="co"># commit the changes</span>
166$ <span class="kw">git</span> add index.php shaarli_version.php
167$ <span class="kw">git</span> commit -s -m <span class="st">&quot;Bump version to v0.5.0&quot;</span>
168
169<span class="co"># push the commit on your GitHub fork</span>
170$ <span class="kw">git</span> push origin v0.5.0</code></pre>
171<h3 id="create-and-merge-a-pull-request">Create and merge a Pull Request</h3>
172<p>This one is pretty straightforward ;-)</p>
173<h3 id="create-and-push-a-signed-tag">Create and push a signed tag</h3>
174<pre class="sourceCode bash"><code class="sourceCode bash"><span class="co"># update your local copy</span>
175$ <span class="kw">git</span> checkout master
176$ <span class="kw">git</span> fetch upstream
177$ <span class="kw">git</span> pull upstream master
178
179<span class="co"># create a signed tag</span>
180$ <span class="kw">git</span> tag -s -m <span class="st">&quot;Release v0.5.0&quot;</span> v0.5.0
181
182<span class="co"># push it to &quot;upstream&quot;</span>
183$ <span class="kw">git</span> push --tags upstream</code></pre>
184<h3 id="verify-a-signed-tag">Verify a signed tag</h3>
185<p><a href="https://github.com/shaarli/Shaarli/releases/tag/v0.5.0"><code>v0.5.0</code></a> is the first GPG-signed tag pushed on the Community Shaarli.<a href=".html"></a></p>
186<p>Let's have a look at its signature!</p>
187<pre class="sourceCode bash"><code class="sourceCode bash">$ <span class="kw">cd</span> /path/to/shaarli
188$ <span class="kw">git</span> fetch upstream
189
190<span class="co"># get the SHA1 reference of the tag</span>
191$ <span class="kw">git</span> show-ref tags/v0.5.0
192<span class="kw">f7762cf803f03f5caf4b8078359a63783d0090c1</span> refs/tags/v0.5.0
193
194<span class="co"># verify the tag signature information</span>
195$ <span class="kw">git</span> verify-tag f7762cf803f03f5caf4b8078359a63783d0090c1
196<span class="kw">gpg</span>: Signature made Thu 30 Jul 2015 11:46:34 CEST using RSA key ID 4100DF6F
197<span class="kw">gpg</span>: Good signature from <span class="st">&quot;VirtualTam &lt;virtualtam@flibidi.net&gt;&quot;</span> [ultimate][](.html)</code></pre>
198</body>
199</html>