Sign a key in a safe fashion.
monkeysign [options] <keyid>
This command signs a key based on the fingerprint or user id specified on the commandline, encrypt the result and mail it to the user. This leave the choice of publishing the certification to that person and makes sure that person owns the identity signed.
This program assumes you have gpg-agent configured to prompt for passwords.
-h, --help
show this help message and exit
--version
show version information and quit
-d, --debug
request debugging information from GPG engine (lots of garbage)
-v, --verbose
explain what we do along the way
-n, --dry-run
do not actually do anything
-u USER, --user=USER
user id to sign the key with (equivalent to GPG's --local-user option)
--cert-level=CERTLEVEL
certification level to sign the key with (equivalent to GPG's --default-cert-level)
-l, --local
import in normal keyring a local certification
-k KEYSERVER, --keyserver=KEYSERVER
keyserver to fetch keys from
-s SMTPSERVER, --smtp=SMTPSERVER
SMTP server to use, use a colon to specify the port number if non-standard
--smtpuser=SMTPUSER
username for the SMTP server (default: no user)
--smtppass=SMTPPASS
password for the SMTP server (default: prompted, if --smtpuser is specified)
--no-mail
do not send email at all (default: use sendmail)
-t TO, --to=TO
override destination email for testing (default: send individually encrypted email to each uid chosen)
monkeysign was written by Antoine Beaupré <[email protected]>.
The latest version of monkeysign may be downloaded from