项目作者: yasuo-ozu
项目描述 :
A (almost) secure container to manage your GPG master keys
高级语言: Shell
项目地址: git://github.com/yasuo-ozu/gpg-managing-container.git
gpg-managing-container
What’s this?
This is (almost) secure environment to generate and manage your GPG master key on your computer.
A USB stick is used to store your credentials. And the partition is encrypted with LUKS, whose key will be stored in your computer, encrypted with your passphrase.
Requirement
- A secure Arch Linux machine (with encrypted root, recommended), called host machine
- New USB stick, used entirely by LUKS encrypted fs to store your master key.
The way
- Invoke the system-wide update with
sudo pacman -Syu
and then reboot. - Do the basic setup of
gnupg
on your host machine. - Run
./run.sh
and follow the guide. A USB stick is required to continue. - It opens a shell in a (almost) secure container, which is separated from the host and the Internet.
- You can create GPG master keys and subkeys in the container. The files in the
~
will be stored safely in the USB stick. - Also you can use any file you like, if it was copied to the
files
directory. - If you want to apply your new subkeys (not master) to the host, run
apply-subkey
in the container. - If you want to copy your revocation certificate to your host’s
~/.gnupg/XXXXX.gpg-revocation-certificate
, run export-revocation-certificate
. - Press Ctrl-D to exit from the container.
- If you want to manage the same key later, use the same USB key, and automatically the LUKS key file in your host’s
/opt/gpg-maintaining-container
will be used to decrypt it.
Moving the host LUKS key
- Just copy
/opt/gpg-managing-container
. Do not forget to set the right permissions.
Todo