diff --git a/key.xhtml b/key.xhtml index 1c43077..93a207f 100644 --- a/key.xhtml +++ b/key.xhtml @@ -1,7 +1,7 @@ - + @@ -96,9 +96,11 @@
SSH keys used to sign data outside of their validity periods should be classified as compromised; only trust SSH keys used within their validity periods.
Each SSH key is signed with the previous key, allowing verification of the
- chain-of-trust. It is strongly recommended that you verify the entire
- chain, which can be performed by adding each of my public keys to SSH's
- allowed_signers
file, then running the following command for each key:
It is strongly recommended that you verify the entire chain, which can
+ be performed by adding each of my public keys to SSH's allowed_signers
file,
+ then running the following command for each key:
ssh-keygen -Y verify -f <allowed_signers file> -I <signer name/email address> -n file -s <signature file of file-to-verify> < <file-to-verify>
You can use my base allowed_signers
file
in lieu of your own, or inject its contents into your own.
(Sig)
+ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHSJTj7ksjVys/nBy3H6Tn+AwJlzLG9RUAtNOBPAaEtj
SHA256:/O3c09/4f1lh4zrhFs2qvQEDda6dZbTwG9xEcj8OfWo
(Sig)
+ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ7xGvfyArrAwOAzjnkPIWYmLzX4JAxjrqpzkDBMycQS
SHA256:K/a677+eHm7chi3X4s77BIpLTE9Vge1tsv+jUL5gI+Y
(Sig)
+ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILHPGnrIg7dI7GUqA+lTztJSrn+7QyRceajqs4iaU8UG
SHA256:FtEVfx1CmTKMy40VwZvF4k+3TC+QhCWy+EmPRg50Nnc
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINs8UH2hVmNSg0qKig/9ZQt07IuOHsorRfw1doEgMuJ8
SHA256:9Pl0nZ2UJacgm+IeEtLSZ4FOESgP1eKCtRflfPfdX9M