Welcome to docker.ru hosting provider linux mirror located at Moscow, Russian Federation.
Server configuration: Linux with OpenZFS, 2 x E5-2670v2, 128 GB ECC memory, 12 x 4 TB raidz2 + 1 TB SSD for L2ARC.
Network: 20 gbps uplink, IPv4 (185.253.23.31), IPv6 (2a04:8580:ffff:fffe::2).
My hostname is mirror.docker.ru
Red Hat Enterprise Linux 4: Red Hat Enterprise Linux Step By Step Guide | ||
---|---|---|
Prev | Appendix B. Getting Started with Gnu Privacy Guard | Next |
Once you have created your keypair, you should create a revocation certificate for your public key. If you forget your passphrase, or if it has been compromised, you can publish this certificate to inform users that your public key should no longer be used.
Note | |
---|---|
When you generate a revocation certificate, you are not revoking the key you just created. Instead, you are giving yourself a safe way to revoke your key from public use in case you forget your passphrase, switch ISPs (addresses), or suffer a hard drive crash. The revocation certificate can then be used to disqualify your public key. |
Your signature is valid to others who read your correspondence before your key is revoked, and you are able to decrypt messages received prior to its revocation. To generate a revocation certificate, use the --gen-revoke option:
gpg --output revoke.asc --gen-revoke you@example.com |
Note that if you omit the --output revoke.asc option from the above, your revocation certificate is returned to the standard output, which is your monitor screen. While you can copy and paste the contents of the output into a file of your choice using a text editor, it is probably easier to send the output to a file in your login directory. That way, you can keep the certificate for use later, or move it to a diskette and store it someplace safe.
The output looks similar to the following:
sec 1024D/823D25A9 2000-04-26 Your Name <you@example.com> Create a revocation certificate for this key? |
Press
Once your revocation certificate has been created (revoke.asc), it is located in your login directory. You should copy the certificate to a diskette and store it in a secure place. (If you do not know how to copy a file to a diskette in Red Hat Enterprise Linux, see the Red Hat Enterprise Linux Step By Step Guide, Section 13.1 Using Diskettes).