4 # -r means dont refresh keys from keyservers
6 # See https://gluestick.office.fsf.org/checklists/person/crypto-keys/ for
9 shopt -s inherit_errexit
2>/dev
/null ||
: # ignore fail in bash < 4.4
11 trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?" >&2' ERR
13 dos_attack_bytes
=1000000
20 for keyserver
in keyring.debian.org keyserver.ubuntu.com pgp.mit.edu
; do
21 echo "Trying $keyserver..."
23 cmd
="gpg --keyserver $keyserver --recv-keys $key"
24 # Keyservers are not very reliable, so retry a few times.
28 if (( ret
== 0 )); then
33 error
=$
(( ret
< error ? ret
: error
)) # use lowest return
40 if (( "$(stat -c %s "$1")" > "$dos_attack_bytes" )) ; then
41 echo -e "\n\nerror: keyring is very large. did we get a signature DoS attack?\n\n"
47 if [[ $1 == -r ]]; then
51 KEYS
+="67819B343B2AB70DED9320872C6464AF2A8E4C02 " #rms
52 KEYS
+="A4626CBAFF376039D2D7554497BA9CE761A0963B " #johns
53 KEYS
+="759C0A4A39A02A079712FB5061B826E87A80C8D6 " #johnh
54 KEYS
+="1487E002421112A3B6C76B545FA66D3CA7518DBF " #andrew
55 KEYS
+="8556112E9B88B1A8B3E3631B58A39239D50484E8 " #jeanne
56 KEYS
+="B125F60B7B287FF6A2B7DF8F170AF0E2954295DF " #ian
57 KEYS
+="36C9950D2F68254ED89C7C03F9C13A10581AB853 " #craigt
58 KEYS
+="2C31130BF7D5A459AFF2A3F3C9DFFE4A33AA52D9 " #knauth
59 KEYS
+="43372794C8ADD5CA8FCFFA6CD03759DAB600E3C0 " #michael
60 KEYS
+="B102017CCF698F79423EF9CC069C04D206A59505 " #zoe
61 KEYS
+="7CCC7ECD3D78EB384F6C02C8966951617A149C73 " #gregf
62 KEYS
+="5BE81180271798C6B4866C54598E4925C518D5DC " #davis
63 KEYS
+="2E0ECE75F8162B407D666767879738E6D6440D57 " #devinu
64 KEYS
+="D86097B5E291BA771FA64D357014A6BE08494155" #odile
66 check-sig-dos fsf-keyring.gpg
67 gpg
--import fsf-keyring.gpg
69 rm -f /tmp
/keys.asc .
/fsf-keyring.gpg
78 gpg
--armor --export $KEYS > key-export
80 check-sig-dos key-export
82 mv key-export fsf-keyring.gpg
84 rm -f fsf-keyring.gpg.asc .
/fsf-keyring.gpg~ key-export
85 gpg
--armor --detach-sign .
/fsf-keyring.gpg