SSH
Make a public and private key pair and place them in the local ~/.ssh directory
1 | mkdir ~/.ssh |
the public key is ~/.ssh/id_rsa.pub
Transfer this file using rsync to Hostgator. It should be in /home2/mbcladwell/.ssh/authorized_keys
1 | rsync -av -e "ssh -p 2222" ~/.ssh/id_dsa.pub mbcladwell@123.123.123.123:.ssh/authorized_keys |
1 | ssh mbcladwell@123.123.123.123 |
GPG
to get a key:
gpg –keyserver subkeys.pgp.net –recv-keys 219EC810
to add to keyring:
gpg -a –export 55BE302B | apt-key add -
To find an expired key:
apt-key list | grep expired
root@dc7700s:/home/mbc# apt-key list | grep expired
pub 1024D/C4447CF3 2010-11-05 [expired: 2015-03-26]
then run: apt-key adv –recv-keys –keyserver keys.gnupg.net C4447CF3
$ gpg –export-secret-keys -a keyid > my_private_key.asc
$ gpg –export -a keyid > my_public_key.asc
gpg –import public.key
gpg –allow-secret-key-import –import private.key
!!!note the second import
To export secret key for transfer to another computer:
gpg –export-secret-keys –armor –output secret.asc
After fresh install copy ~/.gnupg directory to new machine via USB
Revoke a key
First import into keyring the revocation certificate (previously generated)
$ gpg –import ~/syncd/.gnupg/mystuff/verizonrevocation.txt
Then send the revoked key id to the keyserver
$ gpg –keyserver pgp.mit.edu –send-keys 16D9C90B47237FB3
Then go to the keyserver and query name - should see “revoked” in the first line.
For ~/syncd/.gnupg
in ~/.bashrc must have: export GNUPGHOME=/home/mbc/syncd/.gnupg
#chmod 700 /home/mbc/syncd/.gnupg
Tor
You need to add the following entry in /etc/apt/sources.list or a new file in /etc/apt/sources.list.d/:
deb http://deb.torproject.org/torproject.org wheezy main
deb-src http://deb.torproject.org/torproject.org wheezy main
Then add the gpg key used to sign the packages by running the following commands at your command prompt:
gpg --keyserver keys.gnupg.net --recv 886DDD89
gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -
You can install it with the following commands:
$ apt-get update
$ apt-get install tor deb.torproject.org-keyring
tar -xvJf tor-browser-linux32-5.5.4_en-US.tar.xz
cd to tor director and run batch file.
Miscellaneous
mbcladwell+website.com@gmail.com attaches destination crumb so you can monitor who is handing out your email. Works only with gmail.
How to keep your isps nose out of your browser history with encrypted dns