Note: much unmarked snippage in quoted text.
In Message-ID:<svn1ha$sic$
1...@gioia.aioe.org>,
<j...@raspberry.invalid> wrote:
>I'm trying to wrap my head around the trust levels.
>
>I get the idea that I can sign someones key which will let people know
>that key is more trustworthy, assuming they trust my key.
>
>What I don't understand, and I'm hoping you can help me, is how to
>export and import that trust.
>
>Something like:
>
>$ gpg --sign-key [keyid]
>
>
>$ gpg --export-trustdb-or-something [keyid] >file.cert
>
>Where "file.cert" would, presumably have my key along with the the key I
>signed that could then be imported by other people.
>
>What am I missing?
It's been a long time, but I think this is correct. If not, I'm sure
that Cunningham's law will prevail.
For ease of writing, I'll assume that [keyid] belongs to Alice's key.
Your command "gpg --sign-key [keyid]" alters Alice's key in your
keyring to show that you've signed it. If you export her key and send
it to Bob, it will show that your key signed it. If Bob already has
your key (and he trusts you), he'll trust Alice's key.
Better yet, though, is to send your signed version of Alice's key
back to Alice. When she imports it, your signature will be added to
all of the other signatures she already has. Thus, when she sends it
to Bob, it'll have all of the signatures she's reaped.
Note that if Bob doesn't already have your key, he has to get it.
That could be directly from you, from Alice, or wherever. Your key
should have as many signers as possible so that Bob can trust that
it's actually yours. Otherwise, he needs to find some other way to
verify it. For instance, if he knows you, you can meet, call, or text
and exchange your key's fingerprint.
And, of course, you get signers by having people sign your key and
sending it back to you.
--
Arthur T. - ar23hur "at" pobox "dot" com