Provided by: monkeysign_1.1_all bug

NAME

       monkeysign - sign a key in a safe fashion.

SYNOPSIS

       monkeysign [options] <keyid>

DESCRIPTION

       This command signs a key based on the fingerprint or user id specified on the commandline,
       encrypt the result and mail it to the user.  This  leave  the  choice  of  publishing  the
       certification to that person and makes sure that person owns the identity signed.

       This program assumes you have gpg-agent configured to prompt for passwords.

OPTIONS

       -h, --help
              show this help message and exit

       -d, --debug
              request debugging information from GPG engine (lots of garbage)

       -v, --verbose
              explain what we do along the way

       -n, --dry-run
              do not actually do anything

       -u USER, --user=USER
              user id to sign the key with

       --cert-level=CERTLEVEL
              certification level to sign the key with

       -l, --local
              import in normal keyring a local certification

       -k KEYSERVER, --keyserver=KEYSERVER
              keyserver to fetch keys from

       -s SMTPSERVER, --smtp=SMTPSERVER
              SMTP server to use, use a colon to specify the port number if non-standard

       --smtpuser=SMTPUSER
              username for the SMTP server (default: no user)

       --smtppass=SMTPPASS
              password for the SMTP server (default: prompted, if --smtpuser is specified)

       --no-mail
              Do not send email at all. (Default is to use sendmail.)

       -t TO, --to=TO
              Override  destination email for testing (default is to use the first uid on the key
              or send email to each uid chosen)

AUTHORS

       monkeysign was written by Antoine Beaupré <anarcat@debian.org>.

DISTRIBUTION

       The latest version of monkeysign may be downloaded from ⟨http://web.monkeysphere.info/⟩

                                            2013-10-09                              monkeysign(1)