Zsh script to manage GPG keys without storing the master key in your main GnuPG keyring.
Find a file
2024-06-16 00:04:52 +02:00
.forgejo/workflows chore: forgejo workflows 2024-02-18 23:33:05 +01:00
.github chore: forgejo workflows 2024-02-18 23:33:05 +01:00
.editorconfig initial commit 2022-07-13 23:49:12 +02:00
.gitignore gitignore 2022-07-19 11:50:05 +02:00
CHANGELOG.md initial commit 2022-07-13 23:49:12 +02:00
gpgtool [fix]: set owner trust on import 2024-06-16 00:04:52 +02:00
gpgtool.example.conf reimplemented send 2022-07-19 13:56:06 +02:00
LICENSE initial commit 2022-07-13 23:49:12 +02:00
README.md typos ’n’ shit 2022-07-23 18:36:58 +02:00

GPGTool

Zsh script to manage GPG keys without storing the master key in your main GnuPG keyring.

This is currently in a TESTING state. Do not use for production unless you can manually verify each step doesnt accidentally leak into your main GnuPG keyring.

GPG lets you have sub keys for encryption and for signing without having access to the secret part of the master key. That way you can use your GPG key without fear of having your secure identity compromised should you ever “lose” your keys.

An attacker will be able to use the currently valid sub keys until you revoke them. They will never be able to create new sub keys for your master key.

So in case of compromise of your GPG key(s)

  1. whip out your securely stored master key,
  2. revoke your current sub keys,
  3. make sure to propagate that e.g. via key server and
  4. generate new sub keys.

How It Works

FIXXME

Installation

Download / clone this repo and put it somewhere. Either run gpgtools from there directly or put it in your PATH.

If you want to package this for your flavour for *nix, go ahead. Its GPL.

Usage

Open the Key Safe

FIXXME

Work with Your Keys

FIXXME

Close the Key Safe

FIXXME

(Optional) Configuration File

FIXXME

See gpgtool.example.conf.

F.A.Q.

Q: I want this as a bash script!

A: Thats not a question.

Q: Can I have this as a bash script?

A: No.

GitHub Sponsors ko-fi