/[winpt]/trunk/Doc/winpt.texi
ViewVC logotype

Contents of /trunk/Doc/winpt.texi

Parent Directory Parent Directory | Revision Log Revision Log


Revision 232 - (show annotations)
Tue Jun 20 09:29:59 2006 UTC (18 years, 8 months ago) by twoaday
File MIME type: application/x-texinfo
File size: 21205 byte(s)


1 \input texinfo
2
3 @setfilename WinPT
4
5 This file describes the Windows Privacy Tray program and its main functions
6
7 This file is free under the terms of the GNU General Public License v2.
8
9 Copyright (C) 2006 Timo Schulz
10
11 Version 0.2.0
12
13 @settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows
14
15 @section Requirements for WinPT
16
17 First you need to have a working GnuPG 1.4 installtion on the machine you
18 plan to install WinPT. If you don't have GPG in your machine, please
19 visit http://www.gnupg.org and download the latest GPG version there.
20 It comes with a graphical installer so there is no need to do this
21 step manually.
22
23 You need at least Windows 98/2K/XP, but Windows XP or better is
24 recommend. The program also works on NT/95/ME but there is no support
25 for these OS versions any longer.
26
27 @section A short Introduction
28
29 WinPT is a graphical GnuPG front-end which resides in the task bar.
30 It is divided into several, so-called, managers. There is a manager
31 for the keyring, for files and for smart cards. The aim of the program
32 is to secure email communication and to perform file encryption.
33
34 @subsection What is GnuPG
35 GnuPG is a tool for secure communication and data storage.
36 It can be used to encrypt data and to create digital signatures.
37 It includes an advanced key management facility and is compliant
38 with the proposed Internet standard as described in RFC2440.
39
40 @subsection The Web of Trust
41 For a detailled description of these and other GnuPG topics, I
42 recommend the available literature at http://www.gnupg.org. But
43 at least a general overview should be given here.
44
45 The certification scheme of OpenPGP does not base on a hirachical
46 approach. Instead it uses a combination of ownertrust and direct
47 key certification. Here is an example with Alice, Bob, Carol and Dave.
48
49 Alice knows Bob and checked the fingerprint of Bob's key when he
50 met him personally. Thus she knows that the key really belongs to
51 its owner and he trusts Bob to certify other keys. Then she issued
52 a signature on Bob's key. Bob knows Carol and also checked her identity.
53 Then he signed her key. Alice does not know Carol, but he knows Bob
54 and Bob trusts Carol. And because Alice trusts Bob, at a level she
55 decided before, he also trusts Carol. It's a transitiv relation.
56 Dave is isolated and does not know anybody from the mentioned persons,
57 thus he is not in the WoT.
58 Another very important point is, that the signer can decide,
59 after the certification, how much he trusts the key owner to
60 certify other keys.
61
62 It is very important to check the identify of a key owner. Mostly
63 this is done by comparing the fingerprint, which were submitted
64 by phone or written down at a personal meeting, with the fingerprint
65 of the key in the keyring. Please bear in mind that anybody can create
66 a key with an email address and a specific name. Thus it is not
67 recommend to sign keys without doing this check before!
68
69 The fingerprint of the key is hexadecial (160-bit) sequence divided
70 into 10 groups of 4 hex digits. You can get the fingerprint of a key
71 by opening the key property dialog. There you can mark the fingerprint
72 and copy it to the clipboard. The fingerprint of a key can be compared
73 to human fingerprints, it is unique for each key.
74
75 Example: 1D75 8108 5BC9 D9FB E78B 2078 ED46 81C9 BF3D F9B4
76
77 It is a good idea to publish your fingerprint wherever possible.
78 For example via a business card or your website.
79
80 @section Installation of the Program
81
82 It is always recommend to use the latest version of the program. You
83 can download it from http://wald.intevation.org/projects/winpt.
84 Download the zip file with the binaries inside and unpack them in
85 a folder. All files need to be in the same folder, so if you change
86 the folder don't forget to move all files.
87 You should also download and verify the signature of the packet to
88 make sure that the release is really authentic.
89
90 To activate the program you just need to start WinPT.exe. You should
91 now see a little (golden key) icon in the taskbar which indicates that
92 the program is running. If you want to quit the program, right click
93 on the symbol and select "Exit".
94
95 Alternative, you may use one of the graphical GPG installers which
96 are available on the internet. I recommend to use Gpg4Win which
97 includes a set of very useful privacy tools, beside WinPT and it
98 is very easy to use with an average size (~4MB). For non-German
99 speaking users, I recommend the light version because it does not
100 contain the 2 German PDF manuals.
101
102 @subsection Getting the Source of the Program
103 As free software, according to the GNU General Public License,
104 WinPT also offers the source code for the program. It can be used
105 for reviews, to compile your own binary and/or to modify and/or
106 redistribute it or just to learn how it works. The source is available
107 at the same place you downloaded the binary. If not, you should
108 contact the author of the site.
109 The entire program can be build with free software; the default
110 environment is a cross-compiler hosted on a Linux box. All you
111 need is the mingw32 packages, a working autoconf environment
112 and the libs WinPT depends on (currently gpgme and libgpg-error).
113 It is also possible to build the binary with cygwin/mingw32 on
114 Windows but this environment is not actively supported and propably
115 needs adjustment of the source.
116
117 @subsection Configure the Program
118 After the installation not much of the default settings need to
119 be changed. If you prefer a special keyserver, it is propably a good
120 idea to open the keyserver dialog and to set one of the existing
121 keyservers as the default or create a new entry and mark it as the
122 new default. The default keyserver is subkeys.pgp.net, which is
123 the best choice for most users.
124
125 @subsection GPG Options
126 For expert users, the GPG preference dialog might contain some
127 interesting options. For example to set the expiration date of
128 a signature and/or to set the signing level for key signing.
129 It also allows to set a default 'encrypt-to' key and to set
130 the comment in ASCII armored files.
131
132 @subsection Preferences
133 In the WinPT preference dialog, the user can modify and/or disable
134 the default options. For new users it is suggested to leave the
135 default values as they are, except when there are problems related
136 to the hotkeys.
137
138 To enable keyring backups, the user can either decide to use the
139 GPG home directory as the backup folder or any other folder. In
140 the latter case, a folder needs to be chosen.
141
142
143 @section The First Start
144
145 This section is only important for people who never installed
146 and/or used WinPT before.
147
148 When the program is started the first time, it offers two choices.
149 The one is to generate a key pair and the other is to copy
150 existing GPG keyrings into the current installation.
151
152 We assume the user will select the first entry.
153
154 Now a new dialog is shown which requests some information from
155 the user to allow a meaningful association between the key and
156 the user. If the user prefer RSA keys, the check box should be marked.
157 If the entered data is OK, WinPT then generates a new key pair. As long
158 as this step takes, a progress dialog is shown to indicate the
159 enduring process. When the generation of the keypair is done, WinPT
160 offers the chance to backup the existing keyrings. This is definitely
161 an important decision because if the keyring will get corrupted
162 or lost, there is no way to recover the encrypted data. That is
163 why it is also important to store the backup, at least of the
164 secret keyring, at a @strong{safe} place.
165
166 @section Keyserver Access
167
168 An easy way to retrieve keys is the keyserver. You can think of
169 it like a huge database with a lot of keys as its content. It is
170 possible to search keys by a pattern, a keyid or even a fingerprint.
171 WinPT allows to access different kind of keyservers. For example
172 LDAP, HKP, Finger and HTTP. But the focus will be set on HKP because
173 this is the common case.
174
175 In some situations WinPT asks the user whether to retrieve keys
176 automatically. One example is the signature verification when the
177 key that issued the signature was not found in the keyring.
178
179 The main keyserver dialog allows to fetch one or more keys directly
180 or to search for a given pattern.
181
182 @subsection Retrieve a key by Key ID
183 The best way to fetch a key from the server is by the key ID.
184 Just enter the key ID, it is always a good idea to prefix it
185 with 0x and click the "Receive" button.
186
187 An example:
188
189 pattern: 0xBF3DF9B4
190
191 [Receive]
192
193
194 @subsection Retrieve a key by its email address
195 If you only know the email address from your partner, you can
196 enter it instead of the key ID. It is unlikely but possible
197 that there are more keys with the same address. In this situation,
198 WinPT will warn you that multiple keys were imported. The difference
199 to the search function is, that the keys were dirctly fetched and
200 not displayed as a key result list.
201
202
203 An example:
204
205 pattern: name_of_friend@@gmx.net
206
207 [Receive]
208
209
210 @subsection Search for a key by pattern
211 If you want to communicate with a new mail partner and you are
212 not sure about the key ID, it can be useful to search for his
213 email address. This address is considered as quite unique.
214
215 An example:
216
217 pattern: winpt@@windows-privacy-tray.com
218
219 [Search]
220
221 Now a dialog is opened with a list of all keys which matched
222 the search string. If the name @strong{and} the email address
223 is known, the matching key should be selected and "Receive"
224 should be clicked. Then the key will be downloaded and added
225 to your keyring. Now you can encrypt data with this key, for
226 example an email.
227
228 @subsection Sending a Key to the Keyserver
229 After you generated a new key pair, it is a good idea to send your
230 key to the keyserver to make it available for other users. If you
231 issue a signature, the key ID is part of the signature and people can
232 automatically retrieve your key when they try to verify the signature.
233
234 Actually, the action is performed in the Key Manager and not in the
235 keyserver dialog. Just open the Key Manager, select the key you want
236 to send right-click on it and chose "Send to Keyserver" in the popup
237 menu. Then a message box with the result is shown.
238
239 @subsection Add, Delete or Edit a Keyserver Entry
240 The keyserver dialog allow to change the existing keyserver entries,
241 to delete them or to add new entries. Just right click on a selected
242 item and a popup menu will be shown with ("Edit", "Remove" and "New").
243
244 @section Using the Clipboard
245
246 A major aim from the first day was, that the program does not
247 depend on a special mailer client. For this reason it uses the
248 clipboard to encrypt and/or sign data.
249 For the examples, let's assume that you want to write a new
250 mail or that you received a mail protected by GnuPG.
251
252 @subsection Encrypt Data in the Clipboard
253 Just copy the text from the mailer window into the clipboard.
254 This is usually done by CTRL+C, make sure you really selected
255 all portions of the text. Then right-click on the tray icon
256 and select Clipboard->Encryption. Now a dialog is shown to
257 select the recipients. This means you need to select all
258 keys which should be able to decrypt the mail. Confirm with "OK".
259 GnuPG now encrypts the data with the selected recipients. At the
260 end a message box with the result is shown. Now the clipboard should
261 contain the encrypted data. Just paste it into the mailer window.
262 The output should contain a header and a footer
263 "BEGIN PGP MESSAGE" and "END PGP MESSAGE.
264
265 @subsection Decrypt/Verify Data from the Clipboard
266 The most common case is propably that you got a signed email and
267 now you want to verify it. For this procedure, you have to copy
268 the entire signature in the clipboard. The easiest way is to
269 use CTRL+A and CTRL+C, then all available text will be copied.
270 WinPT (GnuPG) is smart enough to figure out the signature related
271 data. Now go to the taskbar, display the popup menu and select
272 Clipboard->Decrypt/Verify. Now a new dialog, the verify dialog,
273 should be available on screen with all information about the
274 signature. For example who is the signer, when was it signed
275 how much do you try this key and what was signed and most
276 important, the status of it (is the signature good or BAD).
277 A special case is when you don't have the public key to verify
278 the signature, if this happens WinPT offers to download the key
279 from the default keyserver. If the key was not found, the procedure
280 is aborted because without the key the sig cannot bed checked.
281
282 @subsection Sign the Clipboard
283 We assume that text that shall be signed is already in the
284 clipboard. If not, select the text you want to sign and copy
285 with via CTRL+C in the clipboard. Now go to the taskbar and
286 open the peopup menu, Clipboard->Sign. If you just have one
287 secret key, the passphrase dialog will be automatically shown.
288 All you need is to enter your passphrase and confirm. In case
289 of more available secret keys, a list with all keys is shown
290 and you can select which key shall be used for signing.
291 The output is always a cleartext signature which is in text
292 format. Do not try to sign binary clipboard data, the result
293 would be unpredictable and not readable by human beings.
294
295 @section The Current Window Support
296 Compared to the clipboard mode, the CWS mode has some advantages.
297 Let us assume that you want to extract text from an editor window.
298 With the CWS mode, the program automatically tries to focus the
299 window to select the text and to copy it to the clipboard and
300 execute the selected command (Sign, Encrypt, Decrypt).
301 No manual user interaction is needed. Except this different behaviour,
302 it is very likewise to the clipboard mode and thus we do not describe
303 each command again.
304
305 @section The Key Manager
306
307 This part of the program is propably most important for many users.
308 It contains function to manage your keyring and to perform actions
309 which are required and/or useful in the OpenPGP environment.
310
311 @subsection Tips
312
313 @itemize @bullet
314
315 @item
316 If you want to import quickly a key from a into the keyring, just
317 drag and drop the file into the Key Manager window. Then the import
318 procedure will be automatically started.
319
320 @item
321 Key which were fetched from keyservers often contain a lot of,
322 maybe obsolete, self signatures, if you want to get rid of them
323 you can use the Key Edit->Clean feature. Just start the edit
324 dialog and select the clean command. That's it.
325
326 @item
327 The keyserver dialog does not allow to import a key directly
328 via an URL, as an alternative you may use the "Import HTTP..."
329 feature in the Key Manager. With it you can directly fetch keys
330 from the web (Example: http://www.users.my-isp.de/~joe/gpg-keys.asc).
331
332 @item
333 To customize the parameters of the generated key, you can use
334 the expert key generation. It allows you to set the public key
335 algorithm and/or the size of the key directly.
336
337 @item
338 Most of the list view based dialogs allow to use the right
339 mouse button, to show popup menus with available commands.
340
341 @end itemize
342
343 @subsection Create a Revocation Certificate
344
345 It is very important to do this step early as possible. With this
346 certificate, you can revoke your entire key. The reason for this
347 can be for example, that your key is no longer used or even compromised.
348 After you generated the revoc cert, you should move it to a secure place
349 because anybody who gets access to it, can render your key unuseable.
350
351 Just right-click on your key and select "Revoke Cert". If you do this
352 step directly after key generation, there is no need to change the
353 default values. Just select a file name and enter the passphrase.
354 The program issues a warning which should be read carefully.
355
356 @subsection Adding a new Secondary Key
357
358 For most users the existing keys in the key pair are enough
359 and no extra key is needed. But there are some exceptions.
360
361 @itemize @bullet
362
363 @item
364 The primary key has no secondary key and the primary key is not
365 able to encrypt data. In this case it can be a good idea to
366 add a secondary encryption key.
367
368 @item
369 A lot of people use secondary encryption keys with an expiration
370 date. Usually the key is valid for 1-2 years. After the key is expired,
371 a new key is needed in order to encrypt data.
372
373 @end itemize
374
375 What kind of public key algorithm should be selected is a matter
376 of taste. RSA and ElGamal are both capable for encryption. For most
377 users it's a good idea to let the program chose the key size (in bits).
378 The default settings should be secure enough for most purposes.
379
380 @subsection Adding a new User ID
381 If you got a new email account, it's propably a good idea to
382 add these new account to your key also. For example:
383
384 A new account was registed at gmail.com (john.doo@@gmail.com).
385 Then you should create a new user ID with the following fields:
386
387 name: John Doo
388
389 email: john.doo@@gmail.com
390
391 comment: (optional)
392
393 Now email programs are able to associate this address with your
394 key when somebody wants to send you a protected mail to this account.
395
396 @subsection Adding a new Photographic ID
397 With this function you can add a photo to your public. It will be
398 displayed in the key property dialog.
399
400 You just need to select a JPEG file which contains the photo and
401 enter your passphrase and confirm with OK. Please read the note
402 in the dialog carefully to make sure the photo has a proper size
403 (file, height and weight).
404
405 @subsection Adding a new Designated Revoker
406 If you want to allow another key to revoke your own key, this
407 might be useful if you lost your secret or a simliar situation,
408 you can use this function to add a designated revoker to your key.
409
410 All you need to do is to select the key you want to add as a desig
411 revoker. But please bear in mind that this procedure cannot be undone
412 and that this person really has the power to make your public key
413 unuseable. You really should trust the selected key, in case it is
414 not a key owned by yourself.
415
416 @subsection Export a Public Key
417 There are several reason why to export a public key and there
418 are also several ways to do it. If you want to send the key
419 directly to a mail recipient, you can select the key, right-click,
420 and select "Send Key to Mail Recipient". As an alternative, you
421 can also export it to the clipboard or to a file. To export a
422 key to the clipboard, you can select "Copy key to Clipboard"
423 in the popup menu of the selected key. To export it to a file,
424 you need to select the menu "Key" and then "Export...". The
425 program will automatically suggest a name for the output.
426
427 @subsection Import a Public Key
428 Similar to the key import, the import of a key can be done in
429 several ways. First, let's assume you got a mail with an OpenPGP
430 key included as inline text. Then you can use the current window
431 feature and "Decrypt/Verify" to import the key. Alternative you
432 also may use the clipboard. To achieve this, you first need to
433 select the entire key (CTRL+A) and then copy it to the clipboard
434 (CTRL+C), then use the Key Manager (Edit->Paste) to import it.
435 If the key is stored as an attachment, or you want to import
436 a key from a file in general, just drag the file and drop it
437 into the Key Manager window or use "Key" -> "Import...".
438
439 @subsection Sign a Public Key
440 If you verified that a key really belongs to its owner, you
441 should sign the key to integrate it into your Web of Trust
442 and also to mark the key as valid in your keyring. Do not sign
443 a key you just got via email with the request to sign it. Anybody
444 can create a key with your (or better ANY) name, these information
445 are no hint to whom the key really belongs. You can check a key
446 by meeting or calling the key owner and verify the key fingerprint
447 of the key with the one published by the key owner. Additional checks
448 should be to watch at his driver license or the identity card to make
449 sure that name of the key matches the name of the key owner. After
450 this procedure is done, you can open the Key Manager, select the
451 right key and either use the context menu "Sign Key" or use the
452 toolbar button.
453
454 The next dialog will summarize the key information and some
455 additional options. For example if the signature should be
456 local or exportable. Local means the signature will be stripped
457 if you export the key and no one else except you can use it to
458 calculate the validity. If you mark the signature exportable,
459 any other user can see and use it. Now you can select the key
460 you want to use to sign and enter the passphrase. Confirm with "OK"
461 and the key will be signed. Now the validity of the new key is
462 "Full". It is propably a good idea to set the ownertrust of the
463 key. For a detailled description, see the chapter "Key Ownertrust".
464
465 @subsection Key Ownertrust
466 First we should explain what the ownertrust of a key is. The ownertrust
467 is a measurement how much you trust somebody to certify and check keys
468 of other people. For example, if you know that Bob is really the owner
469 of the key, you should sign it. But he is also known to sign other keys
470 without checking the idenity of the other key owner. Values for the
471 ownertrust are 1) Don't Know 2) Don't Trust 3) Marginal 4) Full
472 and thus you should propably use an ownertrust value like "Marginal".
473 But this is a personal decision and stored in a separate file and
474 never exported with the public keys. For further information, please
475 take a look into the GNU Privacy Handbook.
476 Just a last work on Key Pairs, they are automatically marked as
477 "Ultimate" because the key belongs to you and you trust it implicit.
478 @bye

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26