From 1772d88bb754e8974a0739be7ee9513bd784fe12 Mon Sep 17 00:00:00 2001 From: Dhananjay Balan Date: Mon, 13 Feb 2017 23:29:23 +0100 Subject: [PATCH] Add gpg transition note. --- notes/transition.txt | 55 ++++++++++++++++++++++++++ notes/transition.txt.asc | 85 ++++++++++++++++++++++++++++++++++++++++ site.hs | 4 ++ 3 files changed, 144 insertions(+) create mode 100644 notes/transition.txt create mode 100644 notes/transition.txt.asc diff --git a/notes/transition.txt b/notes/transition.txt new file mode 100644 index 0000000..fce0cc7 --- /dev/null +++ b/notes/transition.txt @@ -0,0 +1,55 @@ +Feb 13th, 2017 + +For number of reasons, I've set up a new GPG key and will be transitioning to it +as my key. + +The old key will be valid for sometime, but I'd prefer if you switch to the new +key for future communications. + +Also, if you feel like, please consider signing the key. This document is signed +with both keys for verification. + +Old key was: + +rsa2048/0xD4E55B033CF4F87F 2014-03-20 [SC] [expires: 2017-03-22] + Key fingerprint = C9F8 AA93 C29F 0716 7E75 74EC D4E5 5B03 3CF4 F87F + +The new key is: +rsa4096/0xED5426FAEC7901DD 2017-02-08 [SC] [expires: 2022-02-07] + Key fingerprint = 4970 CC92 010A 4087 67C6 9904 ED54 26FA EC79 01DD + +You can fetch my key from sks-keyservers.net keyserver. + +gpg --keyserver hkp://pool.sks-keyservers.net/ --recv-keys 0xED5426FAEC7901DD + +If you already know my old key, you can now verify that the new key is +signed by the old one: + + gpg --check-sigs 0xED5426FAEC7901DD + +If you don't already know my old key, or you just want to be double +extra paranoid, you can check the fingerprint against the one above: + + gpg --fingerprint 0xED5426FAEC7901DD + +If you are satisfied that you've got the right key, and the UIDs match +what you expect, I'd appreciate it if you would sign my key: + + gpg --sign-key 0xED5426FAEC7901DD + +Lastly, if you could upload these signatures, i would appreciate it. +You can either send me an e-mail with the new signatures (if you have +a functional MTA on your system): + + gpg --armor --export 0xED5426FAEC7901DD | mail -s 'OpenPGP Signatures' mail@dbalan.in + +Or you can just upload the signatures to a public keyserver directly: + + gpg --keyserver hkp://pool.sks-keyservers.net --send-key 0xED5426FAEC7901DD + +Please let me know if there is any trouble, and sorry for the +inconvenience. + +Regards, + +dbalan diff --git a/notes/transition.txt.asc b/notes/transition.txt.asc new file mode 100644 index 0000000..927fb25 --- /dev/null +++ b/notes/transition.txt.asc @@ -0,0 +1,85 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +Feb 13th, 2017 + +For number of reasons, I've set up a new GPG key and will be transitioning to it +as my key. + +The old key will be valid for sometime, but I'd prefer if you switch to the new +key for future communications. + +Also, if you feel like, please consider signing the key. This document is signed +with both keys for verification. + +Old key was: + +rsa2048/0xD4E55B033CF4F87F 2014-03-20 [SC] [expires: 2017-03-22] + Key fingerprint = C9F8 AA93 C29F 0716 7E75 74EC D4E5 5B03 3CF4 F87F + +The new key is: +rsa4096/0xED5426FAEC7901DD 2017-02-08 [SC] [expires: 2022-02-07] + Key fingerprint = 4970 CC92 010A 4087 67C6 9904 ED54 26FA EC79 01DD + +You can fetch my key from sks-keyservers.net keyserver. + +gpg --keyserver hkp://pool.sks-keyservers.net/ --recv-keys 0xED5426FAEC7901DD + +If you already know my old key, you can now verify that the new key is +signed by the old one: + + gpg --check-sigs 0xED5426FAEC7901DD + +If you don't already know my old key, or you just want to be double +extra paranoid, you can check the fingerprint against the one above: + + gpg --fingerprint 0xED5426FAEC7901DD + +If you are satisfied that you've got the right key, and the UIDs match +what you expect, I'd appreciate it if you would sign my key: + + gpg --sign-key 0xED5426FAEC7901DD + +Lastly, if you could upload these signatures, i would appreciate it. +You can either send me an e-mail with the new signatures (if you have +a functional MTA on your system): + + gpg --armor --export 0xED5426FAEC7901DD | mail -s 'OpenPGP Signatures' mail@dbalan.in + +Or you can just upload the signatures to a public keyserver directly: + + gpg --keyserver hkp://pool.sks-keyservers.net --send-key 0xED5426FAEC7901DD + +Please let me know if there is any trouble, and sorry for the +inconvenience. + +Regards, + +dbalan +-----BEGIN PGP SIGNATURE----- + +iQIcBAEBCgAGBQJYojDfAAoJECTyG9a4xBdOoQoP/ROf75GzL+tJoc3A0JCg7xIF +hqyj6YAcbxeE3MB1ZlQ4WOdTz1xoCOH8ys/aJQvq50gVqjlVbH8qv5+tPbkRAntl +iy5V4wjnTazDF4c38DGIultkuj6MSbhrbq6WGcdYHkKRpJ/2TbH6o4id0+El6Zuk +XP7Nj5Xya6ihDAlh+/3TK8FGHvHE1u2xfKCumm/M+80cz+00AEkQlAkX9TfaSmio +e0l99SZOGNVkCY9MHnmMAlHHGrKRr4euKaK1ueIlFFkGjrNN85X80V/K27vfEMNT +CnAPObjn0biXnne3RfkrmC2RCWra3cZwaV7ZwowEvDT6OxqoLXJsDpbJa9yACKh6 ++2WG2KGR49YmXGcVffGGfmsBCNDl3ppkl2QwSDzN5RlO3i013ojsDJrhNZEiSspz +LZQMP7/ytU8YDSEy3kvuWgX90fKawh1WyBh/4XfNQw7UCsIS30YJVIMj0IFMWhCM +ALjzSOq4H83YNEaEHvgGkWL5w9pAswUDjwJiXQMzB+IHkIjLWnh7MuPl+WjMyBg4 +l6uEKSEbxVJo2BbJDfX6w6RWdpBHDfjKuRwBrhHQRigSdC+As5jN4nzrhR9IYYND +5XyoIkIkHJD/0mrRM87nJMcULGPTnW1ZAbaAWQN8jIkj1+sRSLe5Lpq5gadpOW2g +hMjBOVpeksNG1iDpHGH0iQIcBAEBCgAGBQJYojDfAAoJENC8wg6TuAMjoQoP/2jT +zwP59o5l58ahWLyPs5HcnqodaVdCCbWEj+zYRH2opz5mxpKkSR40ENNZlmRyFcZK +6+KEDmaYzzd23E6AJcQPlAdpxmJsSX+AALra03gbD60YwYDkGe/rnu94R9SAE/uA +r4+NzWUzQaAuE6eJCUn5yKI4Z6BxhdNcOpPr3M6xe0ChBNsKivFSMKeVLuK1WtbR +LzMgrefu85OOMVLATGGIgZPKn1Y7jbV9Kz0tlO/opu2emwWB+Sp9MBAgxjb7nphI +0fejprLQjQty5YGeDfyhXqI3Vpbpk11MV0HOH9ArF1mbIROX1uP2d6V6Eu1F4qPZ +gzpd9+XQ5UEOu2g5qdNzaBfhCXvLwDleJyagvYV1CfZi2ioGb4Q4aUs89dBvkPda +02PT79cVD0xkD4ueW/FBq4YUaAKvGFnEvNJA+s5LeD6+LbhsAoY4+X3ZGJmkES/R +pnKVv9ViQEoAhvgnyi8oNiBxtMwjgjIWQCwbMwLIQTY22GWNr2tWKwqu4HWgmSuE +QSfQdoU8Xjhq7qO83N+NnRn4CyP4jm+kjFd3F8rENuBl+Qa1SNduairoB27DWULj +Y0F07eV8Fw30+IjEdSoRDvx6g+lq4WK7HVudHJuPQ6qFGJMj0tijAQROwCuBoqOI +4enSRSd0Dp3lrd4KdQftyLpy3qzbGy4847uDhq3b +=dWOR +-----END PGP SIGNATURE----- diff --git a/site.hs b/site.hs index ddc5f78..60bca57 100644 --- a/site.hs +++ b/site.hs @@ -34,6 +34,10 @@ main = hakyllWith config $ do route $ idRoute compile copyFileCompiler + match "notes/*" $ do + route $ idRoute + compile copyFileCompiler + match "blog/*" $ do route $ octopressRoute compile $ pandocCompiler