Linux - SoftwareThis forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
That's deliberate and it should also be different even if you deleted ~/.gnupg and re-generated your keys on the same box. gpg uses your random number generator during the key generation.
Copying over your .gnupg directory is fine - just make sure the permissions are correct and that you don't let someone else access its data.
because "name, email, and note" are not the only things used to generate the key pair. gpg would be pointless if i could generate _your_ private key just by knowning your name,email address, and your favorite phrase.
why are they different even if they are created with identical "name" "password" and "note"???
I did a workaround by copying .gnupg directory in both computers..is it a good thing or not?
thanks...
If you want to use one keypair to sign/verify/encrypt/decrypt messages/files on two different computers, copying it over is the only way to accomplish this. If you want to send messages between the two computers, you can just use two keys.
because "name, email, and note" are not the only things used to generate the key pair. gpg would be pointless if i could generate _your_ private key just by knowning your name,email address, and your favorite phrase.
Hmm I think you miss one point here: you also have to insert a password to create the keypair.. so it seemed to me logical you had to be able to create the same keypair by entering the same information (password included!)..
Anyone can tell me the use of not permitting the recreation "by hand" of a keypair and making it instead random by using /dev/random ????
Quote:
Originally Posted by nmh+linuxquestions.o
If you want to use one keypair to sign/verify/encrypt/decrypt messages/files on two different computers, copying it over is the only way to accomplish this. If you want to send messages between the two computers, you can just use two keys.
Hmmm that's what I wanted to hear.. so the only way to encrypt all your stuff for the future time is bringing along a folder with your public and private keys...if you lose it even knowing you name comment email and password is not sufficient..right?
but what do you mean by "keep your private key safe"? even if someone stole it he ought to get to know the password to cheat me..right???
Hmm I think you miss one point here: you also have to insert a password to create the keypair.. so it seemed to me logical you had to be able to create the same keypair by entering the same information (password included!)..
Anyone can tell me the use of not permitting the recreation "by hand" of a keypair and making it instead random by using /dev/random ????
You might try searching for more information, but I think the short of it is that there is no password for certificates, or keypairs. They are just a bunch of bits. Many people choose to encrypt the private key so that if someone else gets ahold of it, there is another layer of defense.
Last edited by nmh+linuxquestions.o; 04-20-2007 at 12:59 AM.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.