sq-cert-list - Man Page
List certificates and user IDs
Synopsis
sq cert list [Options] FINGERPRINT|KEYID|PATTERN
Description
List certificates and user IDs.
List certificates and user IDs that match a query, are usable, and can be authenticated. By default, bindings (certificate and user ID pairs) must be fully authenticated. If no certificates or bindings match a query, then the command returns a non-zero exit code.
If no queries are provided, then all bindings that are usable, and can be authenticated are listed. If there are no such bindings, the command still succeeds.
By default, unusable certificates, i.e., those that are not valid according to the policy, are revoked, or are not live, are skipped. Likewise, user ID self signatures and certifications that are not valid according to the policy, and user IDs that are revoked are skipped.
Options
Subcommand options
- --amount=AMOUNT
The required amount of trust
120 indicates full authentication; values less than 120 indicate partial authentication. When `--certification-network` is passed, this defaults to 1200, i.e., this command tries to find 10 paths.
- --cert=FINGERPRINT|KEYID
List certificates with the specified fingerprint or key ID
Note: fingerprints and key IDs are self-authenticating identifiers. As such, a certificate with the specified fingerprint or key ID is considered authenticated; no user IDs have to be authenticated.
- --cert-domain=DOMAIN
List bindings with user IDs that contain an email address in the specified domain
A user ID's domain is extracted from the email address, if any, and is normalized by doing puny-code normalization.
- --cert-email=EMAIL
List bindings with user IDs that contain the specified email address
Email addresses are first normalized by doing puny-code normalization on the domain, and lower casing the local part in the so-called empty locale.
- --cert-grep=PATTERN
List bindings with a user ID that contains the pattern
Performs a case-insensitive substring search. Case-folding is done in the empty locale.
- --cert-userid=USERID
List bindings with the specified user ID
The user ID must match exactly.
- --certification-network
Treats the network as a certification network
Normally, the authentication machinery treats the Web of Trust network as an authentication network where a certification only means that the binding is correct, not that the target should be treated as a trusted introducer. In a certification network, the targets of certifications are treated as trusted introducers with infinite depth, and any regular expressions are ignored. Note: The trust amount remains unchanged. This is how most so-called PGP path-finding algorithms work.
- --gossip
Treats all certificates as unreliable trust roots
This option is useful for figuring out what others think about a certificate (i.e., gossip or hearsay). In other words, this finds arbitrary paths to a particular certificate.
Gossip is useful in helping to identify alternative ways to authenticate a certificate. For instance, imagine Ed wants to authenticate Laura's certificate, but asking her directly is inconvenient. Ed discovers that Micah has certified Laura's certificate, but Ed hasn't yet authenticated Micah's certificate. If Ed is willing to rely on Micah as a trusted introducer, and authenticating Micah's certificate is easier than authenticating Laura's certificate, then Ed has learned about an easier way to authenticate Laura's certificate.
Stable since 1.1.0.
- --show-paths
Show why a binding is authenticated
By default, only a user ID and certificate binding's degree of authentication (a value between 0 and 120) is shown. This changes the output to also show how that value was computed by showing the paths from the trust roots to the bindings.
- --unusable
Show bindings that are unusable
Normally, unusable certificates and bindings are not shown. This option considers bindings, even if they are not unusable, because they (or the certificates) are not valid according to the policy, are revoked, or are not live.
This option only makes sense with `--gossip`, because unusable bindings are still considered unauthenticated.
Stable since 1.1.0.
- FINGERPRINT|KEYID|PATTERN
List certs that match the pattern
If the pattern appears to be a fingerprint or key ID, it is treated as if it were passed to `--cert`, which matches on the certificate's fingerprint. Otherwise, it is treated as if it were passed to `--cert-grep`, which matches on user IDs.
Global options
See sq(1) for a description of the global options.
Examples
List all bindings for user IDs containing an email address from example.org, and that can be authenticated.
sq cert list @example.org
List all authenticated bindings for User IDs containing a specific email address.
sq cert list --cert-email=alice@example.org
List all paths to certificates containing a specific email address.
sq cert list --gossip --show-paths \ --cert-email=alice@example.org
See Also
For the full documentation see <https://book.sequoia-pgp.org>.
Version
1.1.0 (sequoia-openpgp 1.22.0)