[The Keysiging will be Day two (Saturday) at 14:00 to 16:00 or whenever people stop showing up with cards]
Sign a PGP key today, starting with mine.
I know that sounds selfish, but hey, you've got to be proactive about these things!
What I want to do is to revive the PGP party at DEFCON in a new streamlined fashion. With the advent of PGP key servers, such as keyserver.pgp.com, there is no need to do the floppy shuffle. All you need is the key ID and fingerprint of the person’s key you want to sign. You search for that key on the key servers, and if the two match you are sure it is the right key for the right person.
PGP, and when I say PGP I also mean GPG, is a great security tool. But like any tool you have to use it properly to get the most out of it. In the case of PGP it comes down to a strong pass phrase, keeping your secret key file to yourself, and creating a web of trust.
To create that web of trust you need to sign other people’s keys, and have yours signed as well. This has always been a pain in the ass because of the logistics of swapping floppies, etc.
To help facilitate this I have created a template for OfficeDepot micro-perf business cards. Use the template, and fill in your email address, key ID and fingerprint. Add a picture if you want. Then print a bunch of these out, and bring them to the con. Look for the PGP key exchange on the schedule, and show up to swap fingerprints with others. Heck, just hand them out all during con.
The goal is to increase the hacker web of trust with as little effort as possible. To do this you should take a few steps in advance:
1 Make sure your PGP key is valid and the one you want to use. One people start signing it it is a pain to discard it and start over.
2 Submit your key to keyserver.pgp.com. There are many others, but for ease of use we'll pick just one for now.
3 Print cards with your key ID and fingerprint. It would help to add your name or email address as well so people can remember who you are when it comes time for them to sign your key.
Once you have handed out your card and collected some from others it is time to process them after the show.
1 Search keyserver.pgp.com for the key id of the key you want to sign, and import it to your public key ring.
2 Sign that public key, and make sure to select Allow signature to be exported. This allows others to rely on your signature.
3 Send the signed key to the keyserver. On the graphical version of PGP for Windows or OS/X this is done using the send-to command. Highlight the newly signed key and send-to the server keyserver.pgp.com. It synchronizes the key you have with the key on the keyserver.
4 You are all done! The owner of the key can now check to see if you have signed their key.
Now it is time to check to see if anyone has signed your key.
1 Select your key and perform an update command. You will see your key that is found on the key servers. Import it to your public key ring, and see if there are any new signatures on it.
Just to stay current it is a good idea every couple of months to update your own key, as well as the keys of others. If you have to revoke your key it is polite to submit the revocation to the key servers so others know not to use that key anymore.
Download the template here:
http://www.defcon.org/dtangent/pgp-card-template.doc
http://www.defcon.org/dtangent/pgp-card-template.sxw
OK, now that you have read that, go sign my damn key! I'll sign yours as well if I am sure you are who you say you are!
My PGP Key:
The Dark Tangent (RSA 2048) <dtangent@defcon.org>
Key ID: 0x308D3094
PGP Fingerprint: D709 EAEB E09E DFC3 E47F 87AF 0EBE 0282 308D 3094
Sign a PGP key today, starting with mine.
I know that sounds selfish, but hey, you've got to be proactive about these things!
What I want to do is to revive the PGP party at DEFCON in a new streamlined fashion. With the advent of PGP key servers, such as keyserver.pgp.com, there is no need to do the floppy shuffle. All you need is the key ID and fingerprint of the person’s key you want to sign. You search for that key on the key servers, and if the two match you are sure it is the right key for the right person.
PGP, and when I say PGP I also mean GPG, is a great security tool. But like any tool you have to use it properly to get the most out of it. In the case of PGP it comes down to a strong pass phrase, keeping your secret key file to yourself, and creating a web of trust.
To create that web of trust you need to sign other people’s keys, and have yours signed as well. This has always been a pain in the ass because of the logistics of swapping floppies, etc.
To help facilitate this I have created a template for OfficeDepot micro-perf business cards. Use the template, and fill in your email address, key ID and fingerprint. Add a picture if you want. Then print a bunch of these out, and bring them to the con. Look for the PGP key exchange on the schedule, and show up to swap fingerprints with others. Heck, just hand them out all during con.
The goal is to increase the hacker web of trust with as little effort as possible. To do this you should take a few steps in advance:
1 Make sure your PGP key is valid and the one you want to use. One people start signing it it is a pain to discard it and start over.
2 Submit your key to keyserver.pgp.com. There are many others, but for ease of use we'll pick just one for now.
3 Print cards with your key ID and fingerprint. It would help to add your name or email address as well so people can remember who you are when it comes time for them to sign your key.
Once you have handed out your card and collected some from others it is time to process them after the show.
1 Search keyserver.pgp.com for the key id of the key you want to sign, and import it to your public key ring.
2 Sign that public key, and make sure to select Allow signature to be exported. This allows others to rely on your signature.
3 Send the signed key to the keyserver. On the graphical version of PGP for Windows or OS/X this is done using the send-to command. Highlight the newly signed key and send-to the server keyserver.pgp.com. It synchronizes the key you have with the key on the keyserver.
4 You are all done! The owner of the key can now check to see if you have signed their key.
Now it is time to check to see if anyone has signed your key.
1 Select your key and perform an update command. You will see your key that is found on the key servers. Import it to your public key ring, and see if there are any new signatures on it.
Just to stay current it is a good idea every couple of months to update your own key, as well as the keys of others. If you have to revoke your key it is polite to submit the revocation to the key servers so others know not to use that key anymore.
Download the template here:
http://www.defcon.org/dtangent/pgp-card-template.doc
http://www.defcon.org/dtangent/pgp-card-template.sxw
OK, now that you have read that, go sign my damn key! I'll sign yours as well if I am sure you are who you say you are!
My PGP Key:
The Dark Tangent (RSA 2048) <dtangent@defcon.org>
Key ID: 0x308D3094
PGP Fingerprint: D709 EAEB E09E DFC3 E47F 87AF 0EBE 0282 308D 3094
Comment