summaryrefslogtreecommitdiff
path: root/doc/pacman-key.8.txt
blob: 4201107fbb7f2f5f30cd91b585234640f812b175 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
/////
vim:set ts=4 sw=4 syntax=asciidoc noet spell spelllang=en_us:
/////
pacman-key(8)
=============


Name
----
pacman-key - manage pacman's list of trusted keys


Synopsis
--------
'pacman-key' [options]


Description
-----------
'pacman-key' is a wrapper script for GnuPG used to manage pacman's keyring, which
is the collection of PGP keys used to check signed packages and databases. It
provides the ability to import and export keys, fetch keys from keyservers and
update the key trust database.

More complex keyring management can be achieved using GnuPG directly combined with
the `--homedir` option pointing at the pacman keyring (located in
+{sysconfdir}/pacman.d/gnupg+ by default).


Options
-------
*-a, \--add* [file(s)]::
	Add the key(s) contained in the specified file or files to pacman's
	keyring. If a key already exists, update it.

*\--config* <file>::
	Use an alternate config file instead of the +{sysconfdir}/pacman.conf+
	default.

*-d, \--delete* <keyid(s)>::
	Remove the key(s) identified by the specified keyid(s) from pacman's
	keyring.

*-e, \--export* [keyid(s)]::
	Export key(s) identified by the specified keyid(s) to 'stdout'. If no keyid
	is specified, all keys will be exported.

*\--edit-key* <keyid(s)>::
	Present a menu for key management task on the specified keyids. Useful for
	adjusting a keys trust level.

*-f, \--finger* [keyid(s)]::
	List a fingerprint for each specified keyid, or for all known keys if no
	keyids are specified.

*\--gpgdir* <dir>::
	Set an alternate home directory for GnuPG. If unspecified, the value is
	read from +{sysconfdir}/pacman.conf+.

*-h, \--help*::
	Output syntax and command line options.

*--import* <dir(s)>::
	Adds keys from pubring.gpg into pacman's keyring and imports ownertrust
	values from trustdb.gpg in the specified directories.

*--import-dirs* <dir(s)> ::
	Imports ownertrust values from trustdb.gpg in the specified directories.

*--init*::
	Ensure the keyring is properly initialized and has the required access
	permissions.

*-l, \--list-keys* [keyid(s)]::
	Lists all or specified keys from the public keyring.

*--list-sigs* [keyid(s)]::
	Same as --list-keys, but the signatures are listed too.

*\--lsign-key* <keyid>::
	Locally sign the given key. This is primarily used to root the web of trust
	in the local private key generated by \--init.

*-r, \--receive* <keyserver> <keyid(s)>::
	Fetch the specified keyids from the specified key server URL.

*\--populate* [<keyring(s)>]::
	Reload the default keys from the (optionally provided) keyrings in
	+{pkgdatadir}/keyrings+. For more information, see
	<<SC,Providing a Keyring for Import>> below.

*-u, \--updatedb*::
	Equivalent to \--check-trustdb in GnuPG.

*-v, \--verify* <signature>::
	Verify the given signature file.

*-V, \--version*::
	Displays the program version.


Providing a Keyring for Import
------------------------------
A distribution or other repository provided may want to provide a set of valid
PGP keys used in the signing of its packages and repository databases that can
be readily imported into the pacman keyring.  This is achieved by providing a
PGP keyring file `foo.gpg` that contains the keys for the foo keyring in the
directory +{pkgdatadir}/keyrings+. Optionally the file `foo-revoked` can be
provided containing a list of revoked key IDs for that keyring. These files are
required to be signed (detached) by a trusted PGP key that the user must
manually import to the pacman keyring. This prevents a potentially malicious
repository adding keys to the pacman keyring without the users knowledge.

A key being marked as revoked always takes priority over the key being added to
the pacman keyring, regardless of the keyring it is provided in. To prevent a
key from being revoked when using --populate, its ID can be listed in
+{sysconfdir}/pacman.d/gnupg/holdkeys+.

See Also
--------
linkman:pacman[8], linkman:pacman.conf[5]

include::footer.txt[]