# Set the key as fully trusted
$ gpg --ask-cert-level --edit-key 90D808E2
gpg (GnuPG) 1.4.11; Copyright (C) 2010 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 1 signed: 2 trust: 0-, 0q, 0n, 0m, 0f, 1u
gpg: depth: 1 valid: 2 signed: 1 trust: 2-, 0q, 0n, 0m, 0f, 0u
gpg: next trustdb check due at 2021-10-02
pub 2048R/90D808E2 created: 2011-02-17 expires: never usage: SC
trust: unknown validity: undefined
sub 2048R/63916311 created: 2011-02-17 expires: 2013-02-16 usage: E
[ undef ] (1). Carl Harris <ceharris@vt.edu>
[ unknown] (2) [jpeg image of size 5229]
# Note that as we start, UIDs, trust, and validity are all unknown or undefined.
# The UIDs and validity will be "full" if the key is signed by a fully-trusted key.
# Verify the fingerprint and compare to your out-of-band-copy
gpg> fpr
pub 2048R/90D808E2 2011-02-17 Carl Harris <ceharris@vt.edu>
Primary key fingerprint: 22E2 04A6 657E FA4C D669 E438 C928 091B 90D8 08E2
# Since this key has an image, check it.
# If you don't have a way to validate the image, use the command, use the
# uid command to select all of the UIDs you are going to sign.
gpg> showphoto
Displaying jpeg photo ID of size 5229 for key 90D808E2 (uid 2)
gpg> sign
Really sign all user IDs? (y/N) y
pub 2048R/90D808E2 created: 2011-02-17 expires: never usage: SC
trust: unknown validity: undefined
Primary key fingerprint: 22E2 04A6 657E FA4C D669 E438 C928 091B 90D8 08E2
Carl Harris <ceharris@vt.edu>
[jpeg image of size 5229]
How carefully have you verified the key you are about to sign actually belongs
to the person named above? If you don't know what to answer, enter "0".
(0) I will not answer. (default)
(1) I have not checked at all.
(2) I have done casual checking.
(3) I have done very careful checking.
Your selection? (enter `?' for more information): 3
Are you sure that you want to sign this key with your
key "Phillip E Benchoff <benchoff@bev.net>" (FA6C4994)
I have checked this key very carefully.
Really sign? (y/N) y
You need a passphrase to unlock the secret key for
user: "Phillip E Benchoff <benchoff@bev.net>"
3072-bit RSA key, ID FA6C4994, created 2011-10-05
# Set the trust level to full.
# Only do this for keys you trust to certify other keys.
gpg> trust
pub 2048R/90D808E2 created: 2011-02-17 expires: never usage: SC
trust: unknown validity: undefined
sub 2048R/63916311 created: 2011-02-17 expires: 2013-02-16 usage: E
[ undef ] (1). Carl Harris <ceharris@vt.edu>
[ unknown] (2) [jpeg image of size 5229]
Please decide how far you trust this user to correctly verify other users' keys
(by looking at passports, checking fingerprints from different sources, etc.)
1 = I don't know or won't say
2 = I do NOT trust
3 = I trust marginally
4 = I trust fully
5 = I trust ultimately
m = back to the main menu
Your decision? 4
pub 2048R/90D808E2 created: 2011-02-17 expires: never usage: SC
trust: full validity: undefined
sub 2048R/63916311 created: 2011-02-17 expires: 2013-02-16 usage: E
[ undef ] (1). Carl Harris <ceharris@vt.edu>
[ unknown] (2) [jpeg image of size 5229]
Please note that the shown key validity is not necessarily correct
unless you restart the program.
gpg> save
|