Verified Commit 7cbe6c02 authored by Clark's avatar Clark
Browse files

Updating secret key ID printing

parent 972c55d0
......@@ -613,7 +613,7 @@ Create a new AppVM, =bytecache-gpg-vault= from the =fed30-gpg-vault= template to
gpg --full-generate-key
#+END_SRC
List the keys using =gpg -K=.
List the keys using =gpg --list-secret-keys --keyid-format short=.
I'll use this key for 2 purposes: signing git commits (e.g., from =bytecache-dev=), and signing/verifying email (e.g., from =bytecache-email=).
......@@ -626,7 +626,7 @@ bash -c 'cat <<EOT >> ~/.gitconfig
[user]
name = Clark
email = clark@bytecache.io
signingkey = 22CC7B5065698784F109C58F958C0DD1FCC7CFB2
signingkey = FCC7CFB2
[gpg]
program = qubes-gpg-client-wrapper
......@@ -660,14 +660,15 @@ Restart =bytecache-gpg-vault= and =bytecache-dev=.
After restarting, test the split GPG vault by exporting the public key, which can then be provided to Gitlab (or Github), replacing the pub-key ID below with your own.
#+BEGIN_SRC sh
qubes-gpg-client --armor --export 22CC7B5065698784F109C58F958C0DD1FCC7CFB2
qubes-gpg-client --armor --export FCC7CFB2
#+END_SRC
** TODO GPG for Thunderbird
Using Thunderbird v78+, which does /not/ require Enigmail (?).
I'm using Thunderbird v78+, which does /not/ require Enigmail.
* TODO Install software
** TODO Wazuh Agent - Endpoint Security
Wazuh is an HIDS system, which is a fork of OSSEC built on the ELK stack. I'll install a Wazuh agent that I use to send data to a Wazuh server deployed elsewhere (e.g., on =10.0.0.2=).
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment