

In this example we will create 2048 byte RSA keys expiring in 5 years. Unsupported by any of the Yubikeys hence RSA keys need to be used. Note that even though EC crypto is pretty awesome, it is currently The following will generate the master key. Years just in case any issues are found with RSA or the key gets compromised.

Speaking of security, its also a good practice to expire the keys in few Individual keys without needing to revoke the complete master key. This property is useful for security reasons as it allows to revoke In addition keys can be derived from a master key. Which holds multiple of your keys where each key is used for a different purpose - encryption, signing or authenticating your identity.

Keyring as the name implies is very similar to a physical keyring GPG will not allow to enter passwords unless TTY is configured: ❯❯❯ export GPG_TTY = $( tty ) Generate keys You can check that by looking up recipy information: ❯❯❯ brew info gpg | head -n1 Note that gpg2 is required however brew’s recipy for gpg installs gpg2 by default. Homebrew/cask-drivers/yubico-yubikey-manager You can use Homebrew to install all necessary packages. Also documenting all the stepsįor myself for future use since Im sure I will forget everything Just trying to share it with others as I had to combine multiple sources Might not be the most efficient/effective but they did work for me. I am pretty new to GPG management myself so the steps in this post On a Mac, transfer it to a Yubikey for security and later use it for Git Signing as well as SSH authentication. This tutorial is a step-by-step guide on how to setup your GPG key
