Provided by: sq_1.2.0-1_amd64 bug

NAME

       sq cert list - List certificates and user IDs

SYNOPSIS

       sq cert list [OPTIONS] FINGERPRINT|KEYID|PATTERN

DESCRIPTION

       List certificates and user IDs.

       List  certificates  and  user  IDs that match a query, are usable, and can be authenticated.  By default,
       bindings (certificate and user ID pairs) must be fully authenticated.  If  no  certificates  or  bindings
       match a query, then the command returns a non-zero exit code.

       If  no  queries are provided, then all bindings that are usable, and can be authenticated are listed.  If
       there are no such bindings, the command still succeeds.

       By default, unusable certificates, i.e., those that are not valid according to the policy,  are  revoked,
       or  are  not  live, are skipped.  Likewise, user ID self signatures and certifications that are not valid
       according to the policy, and user IDs that are revoked are skipped.

OPTIONS

   Subcommand options
       --amount=AMOUNT
              The required amount of trust

              120 indicates full authentication; values less than 120  indicate  partial  authentication.   When
              `--certification-network`  is  passed,  this defaults to 1200, i.e., this command tries to find 10
              paths.

       --cert=FINGERPRINT|KEYID
              List certificates with the specified fingerprint or key ID

              Note: fingerprints and key IDs are self-authenticating identifiers.  As such, a  certificate  with
              the  specified  fingerprint  or  key  ID  is  considered  authenticated;  no  user  IDs have to be
              authenticated.

       --cert-domain=DOMAIN
              List bindings with user IDs that contain an email address in the specified domain

              A user ID's domain is extracted from the email  address,  if  any,  and  is  normalized  by  doing
              puny-code normalization.

       --cert-email=EMAIL
              List bindings with user IDs that contain the specified email address

              Email  addresses  are  first  normalized by doing puny-code normalization on the domain, and lower
              casing the local part in the so-called empty locale.

       --cert-grep=PATTERN
              List bindings with a user ID that contains the pattern

              Performs a case-insensitive substring search.  Case-folding is done in the empty locale.

       --cert-userid=USERID
              List bindings with the specified user ID

              The user ID must match exactly.

       --certification-network
              Treats the network as a certification network

              Normally, the authentication machinery treats the  Web  of  Trust  network  as  an  authentication
              network  where  a certification only means that the binding is correct, not that the target should
              be treated as a trusted introducer.  In a certification network, the targets of certifications are
              treated as trusted introducers with infinite depth,  and  any  regular  expressions  are  ignored.
              Note:  The trust amount remains unchanged.  This is how most so-called PGP path-finding algorithms
              work.

       --gossip
              Treats all certificates as unreliable trust roots

              This option is useful for figuring out what others think about  a  certificate  (i.e.,  gossip  or
              hearsay).  In other words, this finds arbitrary paths to a particular certificate.

              Gossip  is  useful  in  helping  to  identify alternative ways to authenticate a certificate.  For
              instance, imagine Ed wants to  authenticate  Laura's  certificate,  but  asking  her  directly  is
              inconvenient.   Ed  discovers  that  Micah  has  certified  Laura's certificate, but Ed hasn't yet
              authenticated Micah's certificate.  If Ed is willing to rely on Micah as a trusted introducer, and
              authenticating Micah's certificate is easier than authenticating Laura's certificate, then Ed  has
              learned about an easier way to authenticate Laura's certificate.

              Stable since 1.1.0.

       --show-paths
              Show why a binding is authenticated

              By  default,  only a user ID and certificate binding's degree of authentication (a value between 0
              and 120) is shown.  This changes the output to also show how that value was  computed  by  showing
              the paths from the trust roots to the bindings.

       --unusable
              Show bindings that are unusable

              Normally,  unusable  certificates and bindings are not shown. This option considers bindings, even
              if they are not unusable, because they (or the  certificates)  are  not  valid  according  to  the
              policy, are revoked, or are not live.

              This  option  only  makes  sense  with  `--gossip`, because unusable bindings are still considered
              unauthenticated.

              Stable since 1.1.0.

        FINGERPRINT|KEYID|PATTERN
              List certs that match the pattern

              If the pattern appears to be a fingerprint or key ID, it is  treated  as  if  it  were  passed  to
              `--cert`,  which matches on the certificate's fingerprint.  Otherwise, it is treated as if it were
              passed to `--cert-grep`, which matches on user IDs.

   Global options
       See sq(1) for a description of the global options.

EXAMPLES

       List all bindings  for  user  IDs  containing  an  email  address  from  example.org,  and  that  can  be
       authenticated.

              sq cert list @example.org

       List all authenticated bindings for User IDs containing a specific email address.

              sq cert list --cert-email=alice@example.org

       List all paths to certificates containing a specific email address.

              sq cert list --gossip --show-paths \
                     --cert-email=alice@example.org

SEE ALSO

       sq(1), sq-cert(1).

       For the full documentation see <https://book.sequoia-pgp.org>.

VERSION

       1.2.0 (sequoia-openpgp 1.22.0)

Sequoia PGP                                           1.2.0                                                SQ(1)