Script started on 2018-02-07 17:20:23+0100 kkristianf@dionysus:~\kristianf@dionysus ~ $ screen -dRUexport GNUPGHOME=$(mkdtemp -d) kkristianf@dionysus:~\kristianf@dionysus ~ $ gpg --quick-gen-key gpg: keybox '/tmp/tmp.rODtHCnwes/pubring.kbx' created usage: gpg [options] --quick-generate-key USER-ID [ALGO [USAGE [EXPIRE]]] kkristianf@dionysus:~\kristianf@dionysus ~ $ gpg --quick-gen-key test@test.cexample.com About to create a key for: "test@example.com" Continue? (Y/n) y We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. [?1049h(B[?7h[?1h=(B(0lqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqk(B(B(0x(B Please enter the passphrase to(0x(B(B(0x(B protect your new key(0x(B(B(0x(B(B(0x(B(B(0x(B Passphrase: ________________________________________ (0x(B(B(0x(B(B(0x(B(B(0x(B(B(0(B (0x(B(B(0mqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqj(B(B(0(B(B*(B*(B*(B*(B[?25l(B(B[?12l[?25h[?1049l [?1l>[?1049h(B[?7h[?1h=(B[?25l(0lqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqk(B(B(0x(B Warning: You have entered an insecure passphrase.(0x(B(B(0x(B(B(0x(B(B(0x(B A passphrase should be at least 8 characters long.(0x(B(B(0x(B A passphrase should contain at least 1 digit or(0x(B(B(0x(B special character.(0x(B(B(0x(B(B(0x(B(B(0x(B (B(B (0x(B(B(0mqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqj(B(B(0(B(B[?12l[?25h[?1049l [?1l>[?1049h(B[?7h[?1h=(B(0lqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqk(B(B(0x(B Please re-enter this passphrase(0x(B(B(0x(B(B(0x(B(B(0x(B Passphrase: ________________________________________ (0x(B(B(0x(B(B(0x(B(B(0x(B(B(0(B (0x(B(B(0mqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqj(B(B(0(B(B*(B*(B*(B*(B[?25l(B(B[?12l[?25h[?1049l [?1l>We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. gpg: /tmp/tmp.rODtHCnwes/trustdb.gpg: trustdb created gpg: key 5952523DF92FE451 marked as ultimately trusted gpg: directory '/tmp/tmp.rODtHCnwes/openpgp-revocs.d' created gpg: revocation certificate stored as '/tmp/tmp.rODtHCnwes/openpgp-revocs.d/5CF37352DB69926299EDF3395952523DF92FE451.rev' public and secret key created and signed. pub rsa2048 2018-02-07 [SC] [expires: 2020-02-07] 5CF37352DB69926299EDF3395952523DF92FE451 uid test@example.com sub rsa2048 2018-02-07 [E] kkristianf@dionysus:~\kristianf@dionysus ~ $ gpg --recsearch kf@sumptuouscapital.com gpg: error searching keyserver: Cannot assign requested address gpg: keyserver search failed: Cannot assign requested address kkristianf@dionysus:~\kristianf@dionysus ~ $ gpg --search kf@sumptuouscapital.com gpg: error searching keyserver: Cannot assign requested address gpg: keyserver search failed: Cannot assign requested address kkristianf@dionysus:~\kristianf@dionysus ~ $ gpg --search kf@sumptuouscapital.com gpg --search kf@sumptuouscapital.com[1@-[1@-[1@k[1@e[1@y[1@s[1@e[1@r[1@v[1@e[1@r[1@ [1@1[1@9[1@2[1@.[1@1[1@6[1@8[1@.[1@0[1@.[1@6[1@5[1@ gpg: no keyserver known (use option --keyserver) gpg: keyserver search failed: No keyserver available kkristianf@dionysus:~\kristianf@dionysus ~ $ gpg --keyserver 192.168.0.65 --search kf@sumptuouscapital.com gpg --keyserver 192.168.0.65 --search kf@sumptuouscapital.com[1@k[1@e[1@y[1@s[1@2[1@.[1@k[1@f[1@w[1@e[1@b[1@s[1@.[1@n[1@e[1@t gpg: data source: http://keys2.kfwebs.net:11371 (1) Kristian Fiskerstrand Kristian Fiskerstrand 521 bit ECDSA key 43FE956C542CA00B, created: 2012-10-07 (revoked) (2) Kristian Fiskerstrand Kristian Fiskerstrand Kristian Fiskerstrand Kristian Fiskerstrand 4096 bit RSA key 0B7F8B60E3EDFAE3, created: 2007-12-15, expires: 2018-12-31 Keys 1-2 of 2 for "kf@sumptuouscapital.com". Enter number(s), N)ext, or Q)uit > 2 gpg: key 0B7F8B60E3EDFAE3: 10 duplicate signatures removed gpg: key 0B7F8B60E3EDFAE3: 1164 signatures not checked due to missing keys gpg: key 0B7F8B60E3EDFAE3: public key "Kristian Fiskerstrand " imported gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: next trustdb check due at 2020-02-07 gpg: Total number processed: 1 gpg: imported: 1 kkristianf@dionysus:~\kristianf@dionysus ~ $ gpg --keyserver keys2.kfwebs.net --search kf@sumptuouscapital.com --keyserver keys2.kfwebs.net --search kf@sumptuouscapital.com --keyserver keys2.kfwebs.net --search kf@sumptuouscapital.comrecv-key BE99372685E5B738 gpg: keyserver receive failed: No data kkristianf@dionysus:~\kristianf@dionysus ~ $ gpg --keyserver keys2.kfwebs.net --recv-key BE99372685E5B7380BE99372685E5B738xBE99372685E5B738 gpg: keyserver receive failed: No data kkristianf@dionysus:~\kristianf@dionysus ~ $ gpg --keyserver keys2.kfwebs.net --recv-key 0xBE99372685E5B738620AA422B12D1E1DB5F33C32190E E5F6B3F57C384 gpg: key 190E5F6B3F57C384: 6 duplicate signatures removed gpg: key 190E5F6B3F57C384: 207 signatures not checked due to missing keys gpg: key 190E5F6B3F57C384: public key "Pontus Falk (SM0RUX) " imported gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: next trustdb check due at 2020-02-07 gpg: Total number processed: 1 gpg: imported: 1 kkristianf@dionysus:~\kristianf@dionysus ~ $ gpg --keyserver keys2.kfwebs.net --recv-key 620AA422B12D1E1DB5F33C32190E E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ 0xBE99372685E5B738 620AA422B12D1E1DB5F33C32190E E5F6B3F57C384 key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ ekey 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ xkey 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ ikey 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ tkey 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ -key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ recv-key 0xBE99372685E5B738 exit-key 620AA422B12D1E1DB5F33C32190E E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ recv-key 0xBE99372685E5B738 exit-key 620AA422B12D1E1DB5F33C32190E E5F6B3F57C384 -key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ e-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ d-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ i-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ t-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $  --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ - --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ - --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ o --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ n --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ l --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ y --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ - --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ s --edit-key 620AA422B12D1E1DB5F3C32190E5F6B3F57C384 kkristianf@dionysus:~\kristianf@dionysus ~ $ i --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384g --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384n --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384- --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384t --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384e --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384x --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384t --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384- --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384i --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384d --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384s --edit-key 620AA422B12D1E1DB5F33C32190E5F6B3F57C384 gpg (GnuPG) 2.2.4; Copyright (C) 2017 Free Software Foundation, Inc. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. pub rsa4096/190E5F6B3F57C384 created: 2016-04-04 expires: 2021-04-03 usage: SCA trust: unknown validity: unknown sub rsa4096/EBA227C53F044B78 created: 2016-04-04 expires: 2021-04-03 usage: E sub rsa4096/89B996178BADA887 created: 2017-12-27 expires: 2021-04-03 usage: A [ unknown] (1). Pontus Falk (SM0RUX) [ unknown] (2) [jpeg image of size 21959] gpg> sign Really sign all user IDs? (y/N) y Skipping user ID "[jpeg image of size 21959]", which is not a text ID. pub rsa4096/190E5F6B3F57C384 created: 2016-04-04 expires: 2021-04-03 usage: SCA trust: unknown validity: unknown Primary key fingerprint: 620A A422 B12D 1E1D B5F3 3C32 190E 5F6B 3F57 C384 Pontus Falk (SM0RUX) This key is due to expire on 2021-04-03. Are you sure that you want to sign this key with your key "test@example.com" (5952523DF92FE451) Really sign? (y/N) y [?1049h(B[?7h[?1h=(B(0lqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqk(B(B(0x(B Please enter the passphrase to unlock the OpenPGP secret key: (0x(B(B(0x(B "test@example.com"(0x(B(B(0x(B 2048-bit RSA key, ID 5952523DF92FE451,(0x(B(B(0x(B created 2018-02-07.(0x(B(B(0x(B(B(0x(B(B(0x(B(B(0x(B(B(0x(B Passphrase: __________________________________________________ (0x(B(B(0x(B(B(0x(B(B(0x(B(B(0(B(0x(B(B(0mqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqj(B(B(0(B(B*(B*(B*(B*(B[?25l(B(B[?12l[?25h[?1049l [?1l> gpg> check key 190E5F6B3F57C384: 207 signatures not checked due to missing keys gpg> save kkristianf@dionysus:~\kristianf@dionysus ~ $ gpg --keyserver keys2.kfwebs.net --only-sign-text-ids --edit-key 620AA42 22B12D1E1DB5F33C32190E5F6B3F57C384  gpg (GnuPG) 2.2.4; Copyright (C) 2017 Free Software Foundation, Inc. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. gpg: checking the trustdb gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 1 signed: 1 trust: 1-, 0q, 0n, 0m, 0f, 0u gpg: next trustdb check due at 2018-12-31 pub rsa4096/190E5F6B3F57C384 created: 2016-04-04 expires: 2021-04-03 usage: SCA trust: unknown validity: full sub rsa4096/EBA227C53F044B78 created: 2016-04-04 expires: 2021-04-03 usage: E sub rsa4096/89B996178BADA887 created: 2017-12-27 expires: 2021-04-03 usage: A [ full ] (1). Pontus Falk (SM0RUX) [ unknown] (2) [jpeg image of size 21959] gpg> checkquit kkristianf@dionysus:~\kristianf@dionysus ~ $ exit exit Script done on 2018-02-07 17:28:53+0100