/[winpt]/trunk/Doc/winpt.texi
ViewVC logotype

Diff of /trunk/Doc/winpt.texi

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 224 by twoaday, Sun Jun 4 10:13:20 2006 UTC revision 227 by twoaday, Wed Jun 14 06:57:57 2006 UTC
# Line 8  This file is free under the terms of the Line 8  This file is free under the terms of the
8    
9  Copyright (C) 2006 Timo Schulz  Copyright (C) 2006 Timo Schulz
10    
11  Version 0.0.0  Version 0.1.0
12    
13  @settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows  @settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows
14    
# Line 25  recommend. The program also works on NT/ Line 25  recommend. The program also works on NT/
25  for these OS versions any longer.  for these OS versions any longer.
26    
27  @section A short Introduction  @section A short Introduction
28    
29  WinPT is a graphical GnuPG front-end which resides in the task bar.  WinPT is a graphical GnuPG front-end which resides in the task bar.
30  It is divided into several, so-called, managers. There is a manager  It is divided into several, so-called, managers. There is a manager
31  for the keyring, for files and for smart cards. The aim of the program  for the keyring, for files and for smart cards. The aim of the program
# Line 72  and copy it to the clipboard. Line 73  and copy it to the clipboard.
73    
74  Example: 1D75 8108 5BC9 D9FB E78B  2078 ED46 81C9 BF3D F9B4  Example: 1D75 8108 5BC9 D9FB E78B  2078 ED46 81C9 BF3D F9B4
75    
76    It is a good idea to publish your fingerprint wherever possible.
77    For example via a business card or your website.
78    
79  @section Installation of the Program  @section Installation of the Program
80    
81  It is always recommend to use the latest version of the program. You  It is always recommend to use the latest version of the program. You
# Line 94  is very easy to use with an average size Line 98  is very easy to use with an average size
98  speaking users, I recommend the light version because it does not  speaking users, I recommend the light version because it does not
99  contain the 2 German PDF manuals.  contain the 2 German PDF manuals.
100    
101    @subsection Getting the Source of the Program
102    As free software, according to the GNU General Public License,
103    WinPT also offers the source code for the program. It can be used
104    for reviews, to compile your own binary and/or to modify and/or
105    redistribute it or just to learn how it works. The source is available
106    at the same place you downloaded the binary. If not, you should
107    contact the author of the site.
108    The entire program can be build with free software; the default
109    environment is a cross-compiler hosted on a Linux box. All you
110    need is the mingw32 packages, a working autoconf environment
111    and the libs WinPT depends on (currently gpgme and libgpg-error).
112    It is also possible to build the binary with cygwin/mingw32 on
113    Windows but this environment is not actively supported and propably
114    needs adjustment of the source.
115    
116  @subsection Configure the Program  @subsection Configure the Program
117  After the installation not much of the default settings need to  After the installation not much of the default settings need to
118  be changed. If you prefer a special keyserver, it is propably a good  be changed. If you prefer a special keyserver, it is propably a good
# Line 121  the latter case, a folder needs to be ch Line 140  the latter case, a folder needs to be ch
140    
141    
142  @section The First Start  @section The First Start
143    
144  This section is only important for people who never installed  This section is only important for people who never installed
145  and/or used WinPT before.  and/or used WinPT before.
146    
# Line 143  why it is also important to store the ba Line 163  why it is also important to store the ba
163  secret keyring, at a @strong{safe} place.  secret keyring, at a @strong{safe} place.
164    
165  @section Keyserver Access  @section Keyserver Access
166    
167  An easy way to retrieve keys is the keyserver. You can think of  An easy way to retrieve keys is the keyserver. You can think of
168  it like a huge database with a lot of keys as its content. It is  it like a huge database with a lot of keys as its content. It is
169  possible to search keys by a pattern, a keyid or even a fingerprint.  possible to search keys by a pattern, a keyid or even a fingerprint.
# Line 220  to delete them or to add new entries. Ju Line 241  to delete them or to add new entries. Ju
241  item and a popup menu will be shown with ("Edit", "Remove" and "New").  item and a popup menu will be shown with ("Edit", "Remove" and "New").
242    
243  @section Using the Clipboard  @section Using the Clipboard
244    
245  A major aim from the first day was, that the program does not  A major aim from the first day was, that the program does not
246  depend on a special mailer client. For this reason it uses the  depend on a special mailer client. For this reason it uses the
247  clipboard to encrypt and/or sign data.  clipboard to encrypt and/or sign data.
# Line 244  The output should contain a header and a Line 266  The output should contain a header and a
266  @subsection Sign the Clipboard  @subsection Sign the Clipboard
267    
268  @section The Key Manager  @section The Key Manager
269    
270  This part of the program is propably most important for many users.  This part of the program is propably most important for many users.
271  It contains function to manage your keyring and to perform actions  It contains function to manage your keyring and to perform actions
272  which are required and/or useful in the OpenPGP environment.  which are required and/or useful in the OpenPGP environment.
# Line 274  To customize the parameters of the gener Line 297  To customize the parameters of the gener
297  the expert key generation. It allows you to set the public key  the expert key generation. It allows you to set the public key
298  algorithm and/or the size of the key directly.  algorithm and/or the size of the key directly.
299    
300    @item
301    Most of the list view based dialogs allow to use the right
302    mouse button, to show popup menus with available commands.
303    
304  @end itemize  @end itemize
305    
306  @subsection Adding a new secondary key  @subsection Create a Revocation Certificate
307    
308    It is very important to do this step early as possible. With this
309    certificate, you can revoke your entire key. The reason for this
310    can be for example, that your key is no longer used or even compromised.
311    After you generated the revoc cert, you should move it to a secure place
312    because anybody who gets access to it, can render your key unuseable.
313    
314    Just right-click on your key and select "Revoke Cert". If you do this
315    step directly after key generation, there is no need to change the
316    default values. Just select a file name and enter the passphrase.
317    The program issues a warning which should be read carefully.
318    
319    @subsection Adding a new Secondary Key
320    
321  For most users the existing keys in the key pair are enough  For most users the existing keys in the key pair are enough
322  and no extra key is needed. But there are some exceptions.  and no extra key is needed. But there are some exceptions.
# Line 300  of taste. RSA and ElGamal are both capab Line 340  of taste. RSA and ElGamal are both capab
340  users it's a good idea to let the program chose the key size (in bits).  users it's a good idea to let the program chose the key size (in bits).
341  The default settings should be secure enough for most purposes.  The default settings should be secure enough for most purposes.
342    
343  @subsection Adding a new user ID  @subsection Adding a new User ID
344  If you got a new email account, it's propably a good idea to  If you got a new email account, it's propably a good idea to
345  add these new account to your key also. For example:  add these new account to your key also. For example:
346    
# Line 316  comment: (optional) Line 356  comment: (optional)
356  Now email programs are able to associate this address with your  Now email programs are able to associate this address with your
357  key when somebody wants to send you a protected mail to this account.  key when somebody wants to send you a protected mail to this account.
358    
359  @subsection Adding a photographic ID  @subsection Adding a new Photographic ID
360  With this function you can add a photo to your public. It will be  With this function you can add a photo to your public. It will be
361  displayed in the key property dialog.  displayed in the key property dialog.
362    
# Line 325  enter your passphrase and confirm with O Line 365  enter your passphrase and confirm with O
365  in the dialog carefully to make sure the photo has a proper size  in the dialog carefully to make sure the photo has a proper size
366  (file, height and weight).  (file, height and weight).
367    
368  @subsection Adding a new designated revoker  @subsection Adding a new Designated Revoker
369  If you want to allow another key to revoke your own key, this  If you want to allow another key to revoke your own key, this
370  might be useful if you lost your secret or a simliar situation,  might be useful if you lost your secret or a simliar situation,
371  you can use this function to add a designated revoker to your key.  you can use this function to add a designated revoker to your key.
# Line 336  and that this person really has the powe Line 376  and that this person really has the powe
376  unuseable. You really should trust the selected key, in case it is  unuseable. You really should trust the selected key, in case it is
377  not a key owned by yourself.  not a key owned by yourself.
378    
379    @subsection Export a Public Key
380    There are several reason why to export a public key and there
381    are also several ways to do it. If you want to send the key
382    directly to a mail recipient, you can select the key, right-click,
383    and select "Send Key to Mail Recipient". As an alternative, you
384    can also export it to the clipboard or to a file. To export a
385    key to the clipboard, you can select "Copy key to Clipboard"
386    in the popup menu of the selected key. To export it to a file,
387    you need to select the menu "Key" and then "Export...". The
388    program will automatically suggest a name for the output.
389    
390    @subsection Import a Public Key
391    Similar to the key import, the import of a key can be done in
392    several ways. First, let's assume you got a mail with an OpenPGP
393    key included as inline text. Then you can use the current window
394    feature and "Decrypt/Verify" to import the key. Alternative you
395    also may use the clipboard. To achieve this, you first need to
396    select the entire key (CTRL+A) and then copy it to the clipboard
397    (CTRL+C), then use the Key Manager (Edit->Paste) to import it.
398    If the key is stored as an attachment, or you want to import
399    a key from a file in general, just drag the file and drop it
400    into the Key Manager window or use "Key" -> "Import...".
401    
402    @subsection Sign a Public Key
403    If you verified that a key really belongs to its owner, you
404    should sign the key to integrate it into your Web of Trust
405    and also to mark the key as valid in your keyring. Do not sign
406    a key you just got via email with the request to sign it. Anybody
407    can create a key with your (or better ANY) name, these information
408    are no hint to whom the key really belongs. You can check a key
409    by meeting or calling the key owner and verify the key fingerprint
410    of the key with the one published by the key owner. Additional checks
411    should be to watch at his driver license or the identity card to make
412    sure that name of the key matches the name of the key owner. After
413    this procedure is done, you can open the Key Manager, select the
414    right key and either use the context menu "Sign Key" or use the
415    toolbar button.
416    
417    The next dialog will summarize the key information and some
418    additional options. For example if the signature should be
419    local or exportable. Local means the signature will be stripped
420    if you export the key and no one else except you can use it to
421    calculate the validity. If you mark the signature exportable,
422    any other user can see and use it. Now you can select the key
423    you want to use to sign and enter the passphrase. Confirm with "OK"
424    and the key will be signed. Now the validity of the new key is
425    "Full". It is propably a good idea to set the ownertrust of the
426    key. For a detailled description, see the chapter "Key Ownertrust".
427    
428    @subsection Key Ownertrust
429    First we should explain what the ownertrust of a key is. The ownertrust
430    is a measurement how much you trust somebody to certify and check keys
431    of other people. For example, if you know that Bob is really the owner
432    of the key, you should sign it. But he is also known to sign other keys
433    without checking the idenity of the other key owner. Values for the
434    ownertrust are 1) Don't Know 2) Don't Trust 3) Marginal 4) Full
435    and thus you should propably use an ownertrust value like "Marginal".
436    But this is a personal decision and stored in a separate file and
437    never exported with the public keys. For further information, please
438    take a look into the GNU Privacy Handbook.
439    Just a last work on Key Pairs, they are automatically marked as
440    "Ultimate" because the key belongs to you and you trust it implicit.
441    
442  @bye  @bye

Legend:
Removed from v.224  
changed lines
  Added in v.227

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26