| 1 | Follow this procedure to generate a site password for submission of monitoring data, and send that password in encrypted form to Camilo Viecco at GMOC for use with your monitoring data. |
| 2 | |
| 3 | 1. Install GPG on you machine. |
| 4 | a. For debian users: `apt-get install gpg` |
| 5 | b. For redhat users: `yum install gpg` |
| 6 | c. For Mac Users get it from: `http://macgpg.sourceforge.net/` |
| 7 | d. For windows users: `http://www.gpg4win.org/download.html` |
| 8 | |
| 9 | 2. Now get Camilo Viecco's public gpg keys. |
| 10 | {{{ |
| 11 | gpg --keyserver pgp.mit.edu --recv-keys 0x3EC5EA42 |
| 12 | }}} |
| 13 | 3. Now validate the key: |
| 14 | {{{ |
| 15 | gpg --fingerprint 0x3EC5EA42 |
| 16 | }}} |
| 17 | The return value should be something like: |
| 18 | {{{ |
| 19 | pub 1024D/3EC5EA42 2003-04-02 |
| 20 | Key fingerprint = 0781 10A0 44CC C441 594F E5A9 858A 173E |
| 21 | 3EC5 EA42 |
| 22 | uid Camilo Viecco <cviecco@indiana.edu> |
| 23 | sub 3072g/D63BFA6B 2003-04-02 |
| 24 | }}} |
| 25 | The value to check is the fingerprint: it should match: |
| 26 | {{{ |
| 27 | 0781 10A0 44CC C441 594F E5A9 858A 173E 3EC5 EA42 |
| 28 | }}} |
| 29 | 4. Now generate a password file: Generate a new password for your organization, and save it on a single line as a text file. Password requirements: at least 12 characters (no unicode) , no spaces(or tabs) or ':'. |
| 30 | |
| 31 | 5. Now we encrypt the file |
| 32 | {{{ |
| 33 | gpg -ea -r cviecco@indiana.edu $PASSWORD_FILE |
| 34 | }}} |
| 35 | You are most likely going to get a warning like this: |
| 36 | {{{ |
| 37 | gpg: D63BFA6B: There is no assurance this key belongs to the named user |
| 38 | pub 3072g/D63BFA6B 2003-04-02 Camilo Viecco <cviecco@indiana.edu> |
| 39 | Primary key fingerprint: 0781 10A0 44CC C441 594F E5A9 858A 173E |
| 40 | 3EC5 EA42 |
| 41 | Subkey fingerprint: 4543 9514 0EDD F4E8 08A0 9D95 A879 45D5 |
| 42 | D63B FA6B |
| 43 | It is NOT certain that the key belongs to the person named |
| 44 | in the user ID. If you *really* know what you are doing, |
| 45 | you may answer the next question with yes. |
| 46 | Use this key anyway? (y/N) |
| 47 | }}} |
| 48 | Say yes. A file named with the same name as the password file but with an appended '.asc' extension should have been created. |
| 49 | |
| 50 | 6. Send the encrypted file (the one ending in .asc) to cviecco@grnoc.iu.edu. Please use 'measurement api secret' as the subject. |
| 51 | |
| 52 | 7. Camilo Viecco will send you the production url. This is the url that should be placed on as the DestURL on the measumernt exporter config. |
| 53 | |