As of 2023 June, the `hopenpgp-tools` is not part of the latest Debian 12 stable package repositories.
To install it, go to [https://packages.debian.org/sid/hopenpgp-tools](https://packages.debian.org/sid/hopenpgp-tools) to select your architecture and then an ftp server.
Edit `/etc/apt/sources.list` and add the ftp server:
```
deb http://ftp.debian.org/debian sid main
```
and then add this to `/etc/apt/preferences` (or a fragment, e.g. `/etc/apt/preferences.d/00-sid`) so that APT still prioritizes packages from the stable repository over sid.
```
Package: *
Pin: release n=sid
Pin-Priority: 10
```
**Note** Live Ubuntu images [may require modification](https://github.com/drduh/YubiKey-Guide/issues/116) to `/etc/apt/sources.list` and may need additional packages:
```console
@ -239,11 +258,14 @@ $ sudo service pcscd start
$ ~/.local/bin/ykman openpgp info
```
**Note** Debian 12 doesn't recommend installing non-Debian packaged Python applications globally. But fortunately, it isn't even necessary as `yubikey-manager` is available in the stable main repository:
@ -2184,6 +2236,18 @@ Transfer that public key to the computer from which you use your GPG key, and th
$ gpg --import gpg-0x*.asc
```
Alternatively, use a public key server (it will update the key if already on the server):
```console
$ gpg --send-key $KEYID
```
and import the newly updated key on any computer where you wish to use it (it will update the key if previously imported):
```console
$ gpg --recv $KEYID
```
This will extend the validity of your GPG key and will allow you to use it for SSH authorization. Note that you do _not_ need to update the SSH public key located on remote servers.
## Rotating keys
@ -3214,6 +3278,7 @@ Continue with the Verify section of this guide.
# Links
* [Minimal key management tool written for this guide](https://gitlab.com/lsasolutions/makegpg)