Serge van Ginderachter

New GPG Key

Hash: SHA1,SHA512

Date: 22 JUNE 2014

For a number of reasons[0], I've recently set up a new OpenPGP key,
and will be transitioning away from my old one.

The old key will continue to be valid for some time, but i prefer all
future correspondence to come to the new one. I would also like this
new key to be re-integrated into the web of trust. This message is
signed by both keys to certify the transition.

the old key was:

sec 1024D/0x8CC387DA097F5468 2004-07-14
Key fingerprint = 0FAC 6A6C D9D5 134C C87E 4FF3 8CC3 87DA 097F 5468

And the new key is:

sec 4096R/0xD08FC082B8E46E8E 2014-06-22 [expires: 2019-06-21]
Key fingerprint = F744 94B0 7042 6B14 BB90 D283 D08F C082 B8E4 6E8E

To fetch the full key from a public key server, you can simply do:

gpg --keyserver --recv-key

If you already know my old key, you can now verify that the new key is
signed by the old one:

gpg --check-sigs 0xD08FC082B8E46E8E

If you don't already know my old key, or you just want to be double
extra paranoid, you can check the fingerprint against the one above:

gpg --fingerprint 0xD08FC082B8E46E8E

If you are satisfied that you've got the right key, and the UIDs match
what you expect, I'd appreciate it if you would sign my key. You can
do that by issuing the following command:

NOTE: if you have previously signed my key but did a local-only
signature (lsign), you will not want to issue the following, instead
you will want to use --lsign-key, and not send the signatures to the

gpg --sign-key 0xD08FC082B8E46E8E

I'd like to receive your signatures on my key. You can either send me
an e-mail with the new signatures (if you have a functional MTA on
your system):

gpg --export 0xD08FC082B8E46E8E | gpg --encrypt -r '$your_fingerprint' --armor | mail -s 'OpenPGP Signatures'

Additionally, I highly recommend that you implement a mechanism to keep your key
material up-to-date so that you obtain the latest revocations, and other updates
in a timely manner. You can do regular key updates by using parcimonie to
refresh your keyring. Parcimonie is a daemon that slowly refreshes your keyring
from a keyserver over Tor. It uses a randomized sleep, and fresh tor circuits
for each key. The purpose is to make it hard for an attacker to correlate the
key updates with your keyring.

I also highly recommend checking out the excellent Riseup GPG best
practices doc, from which I stole most of the text for this transition
message ;-)

Please let me know if you have any questions, or problems, and sorry
for the inconvenience.

If you have a keybase account and if you are into it, you can also check my
keybase page[1].

Serge van Ginderachter


Version: GnuPG v1


Serge van Ginderachter

The Linux-Training Project: apache, grub2, lsof, fuser and new author

This month is only halfway and already it has been productive for

We saw a revamping of the apache topics (mainly on Debian) which prompted a new author (Hans) to write some webserver content (multiple virtualhosts on ports) on CentOS. Let’s hope he stays active.

The bootloader topic has been reviewed (mainly the grub part) and expanded with information on grub2 (pdf online some hours after midnight…).

We also started a new topic (which will soon appear in the pdf) on troubleshooting tools for file systems (think lsof, fuser, iostat, …).


Serge van Ginderachter

The Linux-Training Project: Linux Fun is still alive

After some months (or rather way too many moons) I finally got around to typing ‘git add’ and ‘git push’ a couple of times. The result is about one hundred new pages and many additions (and typo fixes) in existing content.

The idea is still the same in that Linux Fun is available as a *free* download. Free in the sense that you do not need to pay and you do not need to register (or enter any data of any kind).

LinuxFun.pdf or in html (basically shell and does not change much, most stuff will also work on other Unix systems)
LinuxAdm.pdf (mainly storage, the other chapters are usable but can be improved)
LinuxSrv.pdf (this is not really Linux but apache2, mysql, bind, … and still needs a lot of work)

You can also download one huge LinuxTraining.pdf that contains all three books.

I receive many emails from readers that send me typos or other corrections, this is very much appreciated! I promise to read and fix them all asap!

And I enjoy reading the “thank-you-Paul-for-sharing-this” mails from (mainly poor) countries all around the world.


PS If anyone wants to pay me to write more content, let me know. I also need to buy food and shelter.

Mark Van den Borre


This website uses Launchpad for user authentication.

If you don't have an account there, you will be invited to create one on your first login here.

If you registered on this site before the installation of the Launchpad integration, you will have to log in manually and add the OpenID identities to your account.

Every Ubunteros blogging or publishing anything more or less related to Ubuntu, FOSS and Linux from Belgium is invited to join the Planet. To add your feed(s) to the Planet you should first register at Launchpad and join the Planet Team. Once accepted as a member of the team you will be able to add your feed(s) under the Planet Feeds section of your account page. If necessary, make sure to register a filtered feed to avoid filling the Planet with unrelated content.

Social Networks