sq-cert-list - Man Page

List certificates and user IDs

Synopsis

sq cert list [Options] FINGERPRINT|KEYID|PATTERN

Description

List certificates and user IDs.

List certificates and user IDs that match a query, are usable, and can be authenticated.  By default, bindings (certificate and user ID pairs) must be fully authenticated.  If no certificates or bindings match a query, then the command returns a non-zero exit code.

If no queries are provided, then all bindings that are usable, and can be authenticated are listed.  If there are no such bindings, the command still succeeds.

By default, unusable certificates, i.e., those that are not valid according to the policy, are revoked, or are not live, are skipped.  Likewise, user ID self signatures and certifications that are not valid according to the policy, and user IDs that are revoked are skipped.

Options

Subcommand options

--amount=AMOUNT

The required amount of trust

120 indicates full authentication; values less than 120 indicate partial authentication.  When `--certification-network` is passed, this defaults to 1200, i.e., this command tries to find 10 paths.

--cert=FINGERPRINT|KEYID

List certificates with the specified fingerprint or key ID

Note: fingerprints and key IDs are self-authenticating identifiers.  As such, a certificate with the specified fingerprint or key ID is considered authenticated; no user IDs have to be authenticated.

--cert-domain=DOMAIN

List bindings with user IDs that contain an email address in the specified domain

A user ID's domain is extracted from the email address, if any, and is normalized by doing puny-code normalization.

--cert-email=EMAIL

List bindings with user IDs that contain the specified email address

Email addresses are first normalized by doing puny-code normalization on the domain, and lower casing the local part in the so-called empty locale.

--cert-grep=PATTERN

List bindings with a user ID that contains the pattern

Performs a case-insensitive substring search.  Case-folding is done in the empty locale.

--cert-userid=USERID

List bindings with the specified user ID

The user ID must match exactly.

--certification-network

Treats the network as a certification network

Normally, the authentication machinery treats the Web of Trust network as an authentication network where a certification only means that the binding is correct, not that the target should be treated as a trusted introducer.  In a certification network, the targets of certifications are treated as trusted introducers with infinite depth, and any regular expressions are ignored.  Note: The trust amount remains unchanged.  This is how most so-called PGP path-finding algorithms work.

--gossip

Treats all certificates as unreliable trust roots

This option is useful for figuring out what others think about a certificate (i.e., gossip or hearsay).  In other words, this finds arbitrary paths to a particular certificate.

Gossip is useful in helping to identify alternative ways to authenticate a certificate.  For instance, imagine Ed wants to authenticate Laura's certificate, but asking her directly is inconvenient.  Ed discovers that Micah has certified Laura's certificate, but Ed hasn't yet authenticated Micah's certificate.  If Ed is willing to rely on Micah as a trusted introducer, and authenticating Micah's certificate is easier than authenticating Laura's certificate, then Ed has learned about an easier way to authenticate Laura's certificate.

Stable since 1.1.0.

--show-paths

Show why a binding is authenticated

By default, only a user ID and certificate binding's degree of authentication (a value between 0 and 120) is shown.  This changes the output to also show how that value was computed by showing the paths from the trust roots to the bindings.

--unusable

Show bindings that are unusable

Normally, unusable certificates and bindings are not shown. This option considers bindings, even if they are not unusable, because they (or the certificates) are not valid according to the policy, are revoked, or are not live.

This option only makes sense with `--gossip`, because unusable bindings are still considered unauthenticated.

Stable since 1.1.0.

FINGERPRINT|KEYID|PATTERN

List certs that match the pattern

If the pattern appears to be a fingerprint or key ID, it is treated as if it were passed to `--cert`, which matches on the certificate's fingerprint.  Otherwise, it is treated as if it were passed to `--cert-grep`, which matches on user IDs.

Global options

See sq(1) for a description of the global options.

Examples

List all bindings for user IDs containing an email address from example.org, and that can be authenticated.

    sq cert list @example.org

List all authenticated bindings for User IDs containing a specific email address.

    sq cert list --cert-email=alice@example.org

List all paths to certificates containing a specific email address.

    sq cert list --gossip --show-paths \
    --cert-email=alice@example.org

See Also

sq(1), sq-cert(1).

For the full documentation see <https://book.sequoia-pgp.org>.

Version

1.1.0 (sequoia-openpgp 1.22.0)

Referenced By

sq-cert(1).

1.1.0 Sequoia PGP