8 |
|
|
9 |
Copyright (C) 2006 Timo Schulz |
Copyright (C) 2006 Timo Schulz |
10 |
|
|
11 |
Version 0.2.0 |
Version 0.9.0 |
12 |
|
|
13 |
@settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows |
@settitle WinPT - The Windows Privacy Tray; a free GPG front-end |
14 |
|
|
15 |
@section Requirements for WinPT |
@section Requirements for WinPT |
16 |
|
|
17 |
First you need to have a working GnuPG 1.4 installtion on the machine you |
First you need to have a working GnuPG 1.4 installtion on the machine you plan to install WinPT. |
18 |
plan to install WinPT. If you don't have GPG in your machine, please |
If you do not have GPG in your machine, please visit http://www.gnupg.org and download the latest |
19 |
visit http://www.gnupg.org and download the latest GPG version there. |
GPG version there. It comes with a graphical installer so there is no need to do this step manually. |
20 |
It comes with a graphical installer so there is no need to do this |
|
21 |
step manually. |
You need at least Windows 98/2K/XP, but Windows XP or better is recommend. The program also works |
22 |
|
on NT/95/ME but there is no support for these OS versions any longer. Mainly because the OS |
23 |
You need at least Windows 98/2K/XP, but Windows XP or better is |
vendor also dropped support and no bug fixes will be provided any longer. |
24 |
recommend. The program also works on NT/95/ME but there is no support |
And it is very likely that work optimal on such platforms. |
|
for these OS versions any longer. Mainly because the OS vendor also |
|
|
dropped support and no bug fixes will be provided any longer. |
|
25 |
|
|
26 |
@section A short Introduction |
@section A short Introduction |
27 |
|
|
28 |
WinPT is a graphical GnuPG front-end which resides in the task bar. |
WinPT is a graphical GnuPG front-end which resides in the task bar. It is divided into several, |
29 |
It is divided into several, so-called, managers. There is a manager |
so-called, managers. There is a manager for the key(ring), for files and for smart cards. |
30 |
for the keyring, for files and for smart cards. The aim of the program |
The aim of the program is to secure email communication and to perform file encryption and |
|
is to secure email communication and to perform file encryption and |
|
31 |
to allow an easy and user friendly way for key management. |
to allow an easy and user friendly way for key management. |
32 |
|
|
33 |
@subsection What is GnuPG |
@subsection What is GnuPG |
34 |
GnuPG is a tool for secure communication and data storage. |
GnuPG is a tool for secure communication and data storage. It can be used to encrypt data and |
35 |
It can be used to encrypt data and to create digital signatures. |
to create digital signatures. It includes an advanced key management facility and is compliant |
|
It includes an advanced key management facility and is compliant |
|
36 |
with the proposed Internet standard as described in RFC2440. |
with the proposed Internet standard as described in RFC2440. |
37 |
|
|
38 |
@subsection The Web of Trust |
@subsection The Web of Trust |
39 |
For a detailled description of these and other GnuPG topics, I |
For a detailled description of these and other GnuPG topics, I recommend the available literature |
40 |
recommend the available literature at http://www.gnupg.org. But |
at http://www.gnupg.org. But at least a general overview should be given here. |
41 |
at least a general overview should be given here. |
|
42 |
|
The certification scheme of OpenPGP does not base on a hirachical approach. Instead it uses |
43 |
The certification scheme of OpenPGP does not base on a hirachical |
a combination of ownertrust and direct key certification. |
44 |
approach. Instead it uses a combination of ownertrust and direct |
Here is an example with the imaginary persons called Alice, Bob, Carol and Dave. |
45 |
key certification. Here is an example with Alice, Bob, Carol and Dave. |
|
46 |
|
Alice knows Bob and checked the fingerprint of Bob's key when he met him personally. |
47 |
Alice knows Bob and checked the fingerprint of Bob's key when he |
Thus she knows that the key really belongs to its owner and he trusts Bob to certify other keys. |
48 |
met him personally. Thus she knows that the key really belongs to |
Then she issued a signature on Bob's key. Bob knows Carol and also checked her identity. |
49 |
its owner and he trusts Bob to certify other keys. Then she issued |
Then he signed her key. Alice does not know Carol, but he knows Bob and Bob trusts Carol. |
50 |
a signature on Bob's key. Bob knows Carol and also checked her identity. |
And because Alice trusts Bob, at a level she decided before, he also trusts Carol. |
51 |
Then he signed her key. Alice does not know Carol, but he knows Bob |
It's a transitiv relation. Dave is isolated and does not know anybody for the mentioned reasons, |
52 |
and Bob trusts Carol. And because Alice trusts Bob, at a level she |
thus he is not in the WoT. Another very important point is, that the signer can decide, after the |
53 |
decided before, he also trusts Carol. It's a transitiv relation. |
certification, how much he trusts the key owner to certify other keys. |
54 |
Dave is isolated and does not know anybody from the mentioned persons, |
|
55 |
thus he is not in the WoT. |
It is very important to check the identify of a key owner. Mostly this is done by comparing the |
56 |
Another very important point is, that the signer can decide, |
fingerprint, which were submitted by phone or written down at a personal meeting, with the |
57 |
after the certification, how much he trusts the key owner to |
fingerprint of the key in the keyring. Please bear in mind that anybody can create a key with an |
58 |
certify other keys. |
email address and a specific name. |
59 |
|
Thus it is not recommend to sign keys without doing this check before! |
60 |
It is very important to check the identify of a key owner. Mostly |
|
61 |
this is done by comparing the fingerprint, which were submitted |
The fingerprint of the key is hexadecial (160-bit) sequence divided into 10 groups of 4 hex |
62 |
by phone or written down at a personal meeting, with the fingerprint |
digits. You can get the fingerprint of a key by opening the key property dialog. There you can |
63 |
of the key in the keyring. Please bear in mind that anybody can create |
mark the fingerprint and copy it to the clipboard. The fingerprint of a key can be compared |
|
a key with an email address and a specific name. Thus it is not |
|
|
recommend to sign keys without doing this check before! |
|
|
|
|
|
The fingerprint of the key is hexadecial (160-bit) sequence divided |
|
|
into 10 groups of 4 hex digits. You can get the fingerprint of a key |
|
|
by opening the key property dialog. There you can mark the fingerprint |
|
|
and copy it to the clipboard. The fingerprint of a key can be compared |
|
64 |
to human fingerprints, it is unique for each key. |
to human fingerprints, it is unique for each key. |
65 |
|
|
66 |
Example: 1D75 8108 5BC9 D9FB E78B 2078 ED46 81C9 BF3D F9B4 |
Example: 1D75 8108 5BC9 D9FB E78B 2078 ED46 81C9 BF3D F9B4 |
70 |
|
|
71 |
@section Installation of the Program |
@section Installation of the Program |
72 |
|
|
73 |
It is always recommend to use the latest version of the program. You |
It is always recommend to use the latest version of the program. You can download it from |
74 |
can download it from http://wald.intevation.org/projects/winpt. |
http://wald.intevation.org/projects/winpt. Download the zip file with the binaries inside and |
75 |
Download the zip file with the binaries inside and unpack them in |
unpack them in a folder. All files need to be in the same folder, so if you change the folder do |
76 |
a folder. All files need to be in the same folder, so if you change |
not forget to move all files. |
77 |
the folder do not forget to move all files. |
You should also download and verify the signature of the packet to make sure that the release is |
78 |
You should also download and verify the signature of the packet to |
really authentic and were not altered in any way. |
79 |
make sure that the release is really authentic. |
|
80 |
|
To activate the program you just need to start WinPT.exe. You should now see a |
81 |
To activate the program you just need to start WinPT.exe. You should |
little (golden key) icon in the taskbar which indicates that the program is running. |
82 |
now see a little (golden key) icon in the taskbar which indicates that |
If you want to quit the program, right click on the symbol and select "Exit". |
83 |
the program is running. If you want to quit the program, right click |
|
84 |
on the symbol and select "Exit". |
Alternative, you may use one of the graphical GPG installers which are available on the internet. |
85 |
|
I recommend to use Gpg4Win which includes a set of very useful privacy tools, beside WinPT and it |
86 |
Alternative, you may use one of the graphical GPG installers which |
is very easy to use with an average size (~4MB). For non-German speaking users, I recommend the |
87 |
are available on the internet. I recommend to use Gpg4Win which |
light version because it does not contain the 2 German PDF manuals. |
|
includes a set of very useful privacy tools, beside WinPT and it |
|
|
is very easy to use with an average size (~4MB). For non-German |
|
|
speaking users, I recommend the light version because it does not |
|
|
contain the 2 German PDF manuals. |
|
88 |
|
|
89 |
@subsection Getting the Source of the Program |
@subsection Getting the Source of the Program |
90 |
As free software, according to the GNU General Public License, |
As free software, according to the GNU General Public License, WinPT also offers the source code |
91 |
WinPT also offers the source code for the program. It can be used |
for the program. It can be used for reviews, to compile your own binary and/or to modify and/or |
92 |
for reviews, to compile your own binary and/or to modify and/or |
redistribute it or just to learn how it works. The source is available at the same place you |
93 |
redistribute it or just to learn how it works. The source is available |
downloaded the binary. If not, you should contact the author of the site. |
94 |
at the same place you downloaded the binary. If not, you should |
The entire program can be build with free software; the default environment is a cross-compiler |
95 |
contact the author of the site. |
hosted on a Linux box. All you need is the mingw32 packages, a working autoconf environment |
|
The entire program can be build with free software; the default |
|
|
environment is a cross-compiler hosted on a Linux box. All you |
|
|
need is the mingw32 packages, a working autoconf environment |
|
96 |
and the libs WinPT depends on (currently gpgme and libgpg-error). |
and the libs WinPT depends on (currently gpgme and libgpg-error). |
97 |
It is also possible to build the binary with cygwin/mingw32 on |
It is also possible to build the binary with cygwin/mingw32 on Windows but this environment is |
98 |
Windows but this environment is not actively supported and propably |
not actively supported and propably needs adjustment of the source. |
|
needs adjustment of the source. |
|
99 |
|
|
100 |
@subsection Configure the Program |
@subsection Configure the Program |
101 |
After the installation not much of the default settings need to |
After the installation not much of the default settings need to be changed. If you prefer a |
102 |
be changed. If you prefer a special keyserver, it is propably a good |
special keyserver, it is propably a good idea to open the keyserver dialog and to set one of the |
103 |
idea to open the keyserver dialog and to set one of the existing |
existing keyservers as the default or create a new entry and mark it as the new default. |
104 |
keyservers as the default or create a new entry and mark it as the |
The default keyserver is subkeys.pgp.net, which is the best choice for most users. |
105 |
new default. The default keyserver is subkeys.pgp.net, which is |
|
106 |
the best choice for most users. |
@subsection The GPG Preference Dialog |
107 |
|
In this dialog you can change your GPG config and customize its behaviour. Please be advised that |
108 |
@subsection GPG Options |
in most cases there is no need to overwrite the default GPG path settings. |
109 |
For expert users, the GPG preference dialog might contain some |
There are three different paths available. First, the GPG home directory. The place where the |
110 |
interesting options. For example to set the expiration date of |
keyrings are stored and also the config files. The second path points directly to the gpg.exe. |
111 |
a signature and/or to set the signing level for key signing. |
The third is the path to the language files, |
112 |
It also allows to set a default 'encrypt-to' key and to set |
where you usually store your winpt.mo/gpg.mo files. These entries should be only changed when |
113 |
the comment in ASCII armored files. |
really need and extra caution is needed because with wrong settings, WinPT will not be able to |
114 |
|
work any longer! |
115 |
|
|
116 |
|
The second part of the dialog is the "General GPG options" section. Here you can influence the |
117 |
|
behaviour of some commands. If you do not know what they mean, it is safe not to change the |
118 |
|
values and stick with the default ones. |
119 |
|
For expert users, it is possible to set the signature class of issued key signatures and to set |
120 |
|
an expiration date for key signatures or to specify an comment in armor files. |
121 |
|
The "Encrypt to this key" might be useful for anybody who needs to decrypt mails or any data he |
122 |
|
sent to a recipient. The field value should contain the key ID of the default key pair. |
123 |
|
|
124 |
@subsection Preferences |
@subsection Preferences |
125 |
In the WinPT preference dialog, the user can modify and/or disable |
In the WinPT preference dialog, the user can modify and/or disable the default options. For new |
126 |
the default options. For new users it is suggested to leave the |
users it is suggested to leave the default values as they are, except when there are problems |
127 |
default values as they are, except when there are problems related |
related to the hotkeys. |
|
to the hotkeys. |
|
|
|
|
|
To enable keyring backups, the user can either decide to use the |
|
|
GPG home directory as the backup folder or any other folder. In |
|
|
the latter case, a folder needs to be chosen. |
|
128 |
|
|
129 |
|
To enable keyring backups, the user can either decide to use the GPG home directory as the backup |
130 |
|
folder or any other folder. In the latter case, a folder needs to be chosen. |
131 |
|
|
132 |
@section The First Start |
@section The First Start |
133 |
|
|
134 |
This section is only important for people who never installed |
This section is only important for people who never installed and/or used WinPT before and thus |
135 |
and/or used WinPT before and thus no keyrings are available. |
no keyrings are available. |
136 |
|
|
137 |
When the program is started the first time, it offers two choices. |
When the program is started the first time, it offers two choices. The one is to generate a key |
138 |
The one is to generate a key pair and the other is to copy |
pair and the other is to copy existing GPG keyrings into the current installation. |
|
existing GPG keyrings into the current installation. |
|
139 |
|
|
140 |
We assume the user will select the first entry. |
We assume the user will select the first entry. |
141 |
|
|
142 |
Now a new dialog is shown which requests some information from |
Now a new dialog is shown which requests some information from the user to allow a meaningful |
143 |
the user to allow a meaningful association between the key and |
association between the key and the user. If the user prefer RSA keys, the check box should be |
144 |
the user. If the user prefer RSA keys, the check box should be marked. |
marked. |
145 |
But this is a decision of personal taste and does not influence the security |
But this is a decision of personal taste and does not influence the security or anything else. |
146 |
or anything else. |
If the entered data is OK, WinPT then generates a new key pair. As long as this step takes, a |
147 |
If the entered data is OK, WinPT then generates a new key pair. As long |
progress dialog is shown to indicate the enduring process. When the generation of the keypair is |
148 |
as this step takes, a progress dialog is shown to indicate the |
done, WinPT offers the chance to backup the existing keyrings. |
149 |
enduring process. When the generation of the keypair is done, WinPT |
This is definitely an important decision because if the keyring will get corrupted or lost, there |
150 |
offers the chance to backup the existing keyrings. This is definitely |
is no way to recover the encrypted data. That is why it is also important to store the backup, at |
151 |
an important decision because if the keyring will get corrupted |
least of the secret keyring, at a @strong{safe} place. |
|
or lost, there is no way to recover the encrypted data. That is |
|
|
why it is also important to store the backup, at least of the |
|
|
secret keyring, at a @strong{safe} place. |
|
152 |
|
|
153 |
@section The Passphrase for the Secret Key |
@section The Passphrase for the Secret Key |
154 |
First a short explaination what passphrase is. A passphrase is like |
|
155 |
a password but usually longer, maybe a sentence, which can consists of |
First a short explaination what passphrase is. A passphrase is like a password but usually |
156 |
any 7-bit ASCII characters. It is used to protect your secret key |
longer, maybe a sentence, which can consists of any 7-bit ASCII characters. It is used to protect |
157 |
and thus it is very import to chose a secure passphrase. If your |
your secret key and thus it is very import to chose a secure passphrase. If your computer, and |
158 |
computer, and thus the secret key, were stolen and an attacker can |
thus the secret key, were stolen and an attacker can guess your passphrase he is able to decrypt |
159 |
guess your passphrase he is able to decrypt all your data and to |
all your data and to create signatures in your name! A good passphrase is difficult to guess but |
160 |
create signatures in your name! A good passphrase is difficult |
easy to remember and should be at least 10 characters long. |
161 |
to guess but easy to remember and should be at least 10 characters long. |
An easy way to generate a strong passphrase is to use a sentence only you know but you can easily |
162 |
An easy way to generate a strong passphrase is to use a sentence only |
remind and then take the first letter of each word, plus some special characters and maybe even |
163 |
you know but you can easily remind and then take the first letter of |
some intentionally made spelling mistakes. |
|
each word, plus some special characters and maybe even some intentionally |
|
|
made spelling mistakes. |
|
164 |
|
|
165 |
Example: Row - row - row your boat, gently down the stream |
Example: Row - row - row your boat, gently down the stream |
166 |
Passphrase: R-r-ryb,gdt |
Passphrase: "R - r - ryb,gdt" |
167 |
|
|
168 |
Never write down or passphrase or share it among other people! |
Never write down or passphrase or share it among other people! |
169 |
|
|
170 |
@section Keyserver Access |
@section Keyserver Access |
171 |
|
|
172 |
An easy way to retrieve keys is the keyserver. You can think of |
An easy way to retrieve keys is the keyserver. You can think of it like a huge database with a |
173 |
it like a huge database with a lot of keys as its content. It is |
lot of keys as its content. It is possible to search keys by a pattern, a keyid or even a |
174 |
possible to search keys by a pattern, a keyid or even a fingerprint. |
fingerprint. |
175 |
WinPT allows to access different kind of keyservers. For example |
WinPT allows to access different kind of keyservers. For example LDAP, HKP, Finger and HTTP. |
176 |
LDAP, HKP, Finger and HTTP. But the focus will be set on HKP because |
But the focus will be set on HKP because this is the common case. |
|
this is the common case. |
|
|
|
|
|
In some situations WinPT asks the user whether to retrieve keys |
|
|
automatically. One example is the signature verification when the |
|
|
key that issued the signature was not found in the keyring. |
|
177 |
|
|
178 |
The main keyserver dialog allows to fetch one or more keys directly |
In some situations WinPT asks the user whether to retrieve keys automatically. One example is the |
179 |
or to search for a given pattern. |
signature verification when the key that issued the signature was not found in the keyring. |
180 |
|
|
181 |
|
The main keyserver dialog allows to fetch one or more keys directly or to search for a given pattern. |
182 |
|
|
183 |
@subsection Retrieve a key by Key ID |
@subsection Retrieve a key by Key ID |
184 |
The best way to fetch a key from the server is by the key ID. |
The best way to fetch a key from the server is by the key ID. |
185 |
Just enter the key ID, it is always a good idea to prefix it |
Just enter the key ID, it is a good idea to prefix it with 0x, and click the "Receive" button. |
|
with 0x and click the "Receive" button. |
|
186 |
|
|
187 |
An example: |
An example: |
188 |
|
|
192 |
|
|
193 |
|
|
194 |
@subsection Retrieve a key by its email address |
@subsection Retrieve a key by its email address |
195 |
If you only know the email address from your partner, you can |
If you only know the email address from your partner, you can enter it instead of the key ID. |
196 |
enter it instead of the key ID. It is unlikely but possible |
It is unlikely but possible that there are more keys with the same address. In this situation, |
197 |
that there are more keys with the same address. In this situation, |
WinPT will warn you that multiple keys were imported. The difference to the search function is, |
198 |
WinPT will warn you that multiple keys were imported. The difference |
that the keys were dirctly fetched and not displayed as a key result list. |
|
to the search function is, that the keys were dirctly fetched and |
|
|
not displayed as a key result list. |
|
199 |
|
|
200 |
|
|
201 |
An example: |
An example: |
206 |
|
|
207 |
|
|
208 |
@subsection Search for a key by pattern |
@subsection Search for a key by pattern |
209 |
If you want to communicate with a new mail partner and you are |
If you want to communicate with a new mail partner and you are not sure about the key ID, it can |
210 |
not sure about the key ID, it can be useful to search for his |
be useful to search for his email address. This address is considered as quite unique. |
|
email address. This address is considered as quite unique. |
|
211 |
|
|
212 |
An example: |
An example: |
213 |
|
|
215 |
|
|
216 |
[Search] |
[Search] |
217 |
|
|
218 |
Now a dialog is opened with a list of all keys which matched |
Now a dialog is opened with a list of all keys which matched the search string. If the name |
219 |
the search string. If the name @strong{and} the email address |
@strong{and} the email address is known, the matching key should be selected and "Receive" |
220 |
is known, the matching key should be selected and "Receive" |
should be clicked. Then the key will be downloaded and added to your keyring. Now you can encrypt |
221 |
should be clicked. Then the key will be downloaded and added |
data with this key, for example an email. |
|
to your keyring. Now you can encrypt data with this key, for |
|
|
example an email. |
|
222 |
|
|
223 |
@subsection Sending a Key to the Keyserver |
@subsection Sending a Key to the Keyserver |
224 |
After you generated a new key pair, it is a good idea to send your |
After you generated a new key pair, it is a good idea to send your key to the keyserver to make |
225 |
key to the keyserver to make it available for other users. If you |
it available for other users. If you issue a signature, the key ID is part of the signature and |
226 |
issue a signature, the key ID is part of the signature and people can |
people can automatically retrieve your key when they try to verify the signature. |
227 |
automatically retrieve your key when they try to verify the signature. |
|
228 |
|
Actually, the action is performed in the Key Manager and not in the keyserver dialog. Just open |
229 |
Actually, the action is performed in the Key Manager and not in the |
the Key Manager, select the key you want to send right-click on it and chose "Send to Keyserver" |
230 |
keyserver dialog. Just open the Key Manager, select the key you want |
in the popup menu. Then a message box with the result is shown. |
|
to send right-click on it and chose "Send to Keyserver" in the popup |
|
|
menu. Then a message box with the result is shown. |
|
231 |
|
|
232 |
@subsection Add, Delete or Edit a Keyserver Entry |
@subsection Add, Delete or Edit a Keyserver Entry |
233 |
The keyserver dialog allow to change the existing keyserver entries, |
The keyserver dialog allow to change the existing keyserver entries, to delete them or to add new |
234 |
to delete them or to add new entries. Just right click on a selected |
entries. Just right click on a selected item and a popup menu will be |
235 |
item and a popup menu will be shown with ("Edit", "Remove" and "New"). |
shown with ("Edit", "Remove" and "New"). |
236 |
|
|
237 |
@section Using the Clipboard |
@section Using the Clipboard |
238 |
|
|
239 |
A major aim from the first day was, that the program does not |
A major aim from the first day was, that the program does not depend on a special mailer client. |
240 |
depend on a special mailer client. For this reason it uses the |
For this reason it uses the clipboard to encrypt and/or sign data. |
241 |
clipboard to encrypt and/or sign data. |
For the examples, let's assume that you want to write a new mail or that you received a mail |
242 |
For the examples, let's assume that you want to write a new |
protected by GnuPG. |
243 |
mail or that you received a mail protected by GnuPG. |
|
244 |
|
@subsection The Clipboard Editor |
245 |
|
This dialog allows it to modify the clipboard contents directly and/or to display the contents of |
246 |
|
the clipboard. It is also possible to load a text file into the clipboard or store the contents |
247 |
|
into a file. For the convenience, the dialog also allows to encrypt and/or decrypt clipboard data. |
248 |
|
|
249 |
@subsection Encrypt Data in the Clipboard |
@subsection Encrypt Data in the Clipboard |
250 |
Just copy the text from the mailer window into the clipboard. |
Just copy the text from the mailer window into the clipboard. This is usually done by CTRL+C, |
251 |
This is usually done by CTRL+C, make sure you really selected |
make sure you really selected all portions of the text. Then right-click on the tray icon and |
252 |
all portions of the text. Then right-click on the tray icon |
select Clipboard->Encryption. Now a dialog is shown to select the recipients. This means you need |
253 |
and select Clipboard->Encryption. Now a dialog is shown to |
to select all keys which should be able to decrypt the mail. Confirm with "OK". GnuPG now |
254 |
select the recipients. This means you need to select all |
encrypts the data with the selected recipients. At the end a message box with the result is |
255 |
keys which should be able to decrypt the mail. Confirm with "OK". |
shown. Now the clipboard should contain the encrypted data. Just paste it into the mailer window. |
256 |
GnuPG now encrypts the data with the selected recipients. At the |
The output should contain a header and a footer "BEGIN PGP MESSAGE" and "END PGP MESSAGE. |
|
end a message box with the result is shown. Now the clipboard should |
|
|
contain the encrypted data. Just paste it into the mailer window. |
|
|
The output should contain a header and a footer |
|
|
"BEGIN PGP MESSAGE" and "END PGP MESSAGE. |
|
257 |
|
|
258 |
@subsection Decrypt/Verify Data from the Clipboard |
@subsection Decrypt/Verify Data from the Clipboard |
259 |
The most common case is propably that you got a signed email and |
The most common case is propably that you got a signed email and now you want to verify it. For |
260 |
now you want to verify it. For this procedure, you have to copy |
this procedure, you have to copy the entire signature in the clipboard. The easiest way is to |
261 |
the entire signature in the clipboard. The easiest way is to |
use CTRL+A and CTRL+C, then all available text will be copied. WinPT (GnuPG) is smart enough to |
262 |
use CTRL+A and CTRL+C, then all available text will be copied. |
figure out the signature related data. Now go to the taskbar, display the popup menu and select |
263 |
WinPT (GnuPG) is smart enough to figure out the signature related |
Clipboard->Decrypt/Verify. Now a new dialog, the verify dialog, should be available on screen |
264 |
data. Now go to the taskbar, display the popup menu and select |
with all information about the signature. For example who is the signer, when was it signed how |
265 |
Clipboard->Decrypt/Verify. Now a new dialog, the verify dialog, |
much do you try this key and what was signed and most important, the status of it (is the |
266 |
should be available on screen with all information about the |
signature good or BAD). |
267 |
signature. For example who is the signer, when was it signed |
A special case is when you don't have the public key to verify the signature, if this happens |
268 |
how much do you try this key and what was signed and most |
WinPT offers to download the key from the default keyserver. If the key was not found, the |
269 |
important, the status of it (is the signature good or BAD). |
procedure is aborted because without the key the sig cannot bed checked. |
|
A special case is when you don't have the public key to verify |
|
|
the signature, if this happens WinPT offers to download the key |
|
|
from the default keyserver. If the key was not found, the procedure |
|
|
is aborted because without the key the sig cannot bed checked. |
|
270 |
|
|
271 |
@subsection Sign the Clipboard |
@subsection Sign the Clipboard |
272 |
We assume that text that shall be signed is already in the |
We assume that text that shall be signed is already in the clipboard. If not, select the text you |
273 |
clipboard. If not, select the text you want to sign and copy |
want to sign and copy with via CTRL+C in the clipboard. Now go to the taskbar and open the peopup |
274 |
with via CTRL+C in the clipboard. Now go to the taskbar and |
menu, Clipboard->Sign. If you just have one secret key, the passphrase dialog will be automatically shown. |
275 |
open the peopup menu, Clipboard->Sign. If you just have one |
All you need is to enter your passphrase and confirm. In case of more available secret keys, a |
276 |
secret key, the passphrase dialog will be automatically shown. |
list with all keys is shown and you can select which key shall be used for signing. |
277 |
All you need is to enter your passphrase and confirm. In case |
The output is always a cleartext signature which is in text format. Do not try to sign binary |
278 |
of more available secret keys, a list with all keys is shown |
clipboard data, the result would be unpredictable and not readable by human beings. |
|
and you can select which key shall be used for signing. |
|
|
The output is always a cleartext signature which is in text |
|
|
format. Do not try to sign binary clipboard data, the result |
|
|
would be unpredictable and not readable by human beings. |
|
279 |
|
|
280 |
@section The Current Window Support |
@section The Current Window Support |
281 |
Compared to the clipboard mode, the CWS mode has some advantages. |
Compared to the clipboard mode, the CWS mode has some advantages. Let us assume that you want to |
282 |
Let us assume that you want to extract text from an editor window. |
extract text from an editor window. With the CWS mode, the program automatically tries to focus |
283 |
With the CWS mode, the program automatically tries to focus the |
the window to select the text and to copy it to the clipboard and execute the |
284 |
window to select the text and to copy it to the clipboard and |
selected command (Sign, Encrypt, Decrypt). |
285 |
execute the selected command (Sign, Encrypt, Decrypt). |
No manual user interaction is needed. Except this different behaviour, it is very likewise to the |
286 |
No manual user interaction is needed. Except this different behaviour, |
clipboard mode and thus we do not describe each command again. |
|
it is very likewise to the clipboard mode and thus we do not describe |
|
|
each command again. |
|
287 |
|
|
288 |
@section The Key Manager |
@section The Key Manager |
289 |
|
|
290 |
This part of the program is propably most important for many users. |
This part of the program is propably most important for many users. It contains function to |
291 |
It contains function to manage your keyring and to perform actions |
manage your keyring and to perform actions which are required and/or useful in the OpenPGP environment. |
|
which are required and/or useful in the OpenPGP environment. |
|
292 |
|
|
293 |
@subsection Tips |
@subsection Tips |
294 |
|
|
295 |
@itemize @bullet |
@itemize @bullet |
296 |
|
|
297 |
@item |
@item |
298 |
If you want to import quickly a key from a into the keyring, just |
If you want to import quickly a key from a into the keyring, just drag and drop the file into the |
299 |
drag and drop the file into the Key Manager window. Then the import |
Key Manager window. Then the import procedure will be automatically started. |
|
procedure will be automatically started. |
|
300 |
|
|
301 |
@item |
@item |
302 |
Key which were fetched from keyservers often contain a lot of, |
Key which were fetched from keyservers often contain a lot of, maybe obsolete, self signatures, |
303 |
maybe obsolete, self signatures, if you want to get rid of them |
if you want to get rid of them you can use the Key Edit->Clean feature. Just start the edit |
|
you can use the Key Edit->Clean feature. Just start the edit |
|
304 |
dialog and select the clean command. That's it. |
dialog and select the clean command. That's it. |
305 |
|
|
306 |
@item |
@item |
307 |
The keyserver dialog does not allow to import a key directly |
The keyserver dialog does not allow to import a key directly via an URL, as an alternative you |
308 |
via an URL, as an alternative you may use the "Import HTTP..." |
may use the "Import HTTP..." feature in the Key Manager. With it you can directly fetch keys |
|
feature in the Key Manager. With it you can directly fetch keys |
|
309 |
from the web (Example: http://www.users.my-isp.de/~joe/gpg-keys.asc). |
from the web (Example: http://www.users.my-isp.de/~joe/gpg-keys.asc). |
310 |
|
|
311 |
@item |
@item |
312 |
To customize the parameters of the generated key, you can use |
To customize the parameters of the generated key, you can use the expert key generation. |
313 |
the expert key generation. It allows you to set the public key |
It allows you to set the public key algorithm and/or the size of the key directly. |
|
algorithm and/or the size of the key directly. |
|
314 |
|
|
315 |
@item |
@item |
316 |
Most of the list view based dialogs allow to use the right |
Most of the list view based dialogs allow to use the right mouse button, to show popup menus with |
317 |
mouse button, to show popup menus with available commands. |
available commands. |
318 |
|
|
319 |
@end itemize |
@end itemize |
320 |
|
|
321 |
@subsection Create a Revocation Certificate |
@subsection Create a Revocation Certificate |
322 |
|
It is very important to do this step early as possible. With this certificate, you can revoke |
323 |
It is very important to do this step early as possible. With this |
your entire key. The reason for this can be for example, that your key is no longer used or even |
324 |
certificate, you can revoke your entire key. The reason for this |
compromised. |
325 |
can be for example, that your key is no longer used or even compromised. |
After you generated the revocation cert, you should move it to a secure place because anybody who |
326 |
After you generated the revoc cert, you should move it to a secure place |
gets access to it, can render your key unuseable. |
327 |
because anybody who gets access to it, can render your key unuseable. |
|
328 |
|
Just right-click on your key and select "Revoke Cert". If you do this step directly after key |
329 |
Just right-click on your key and select "Revoke Cert". If you do this |
generation, there is no need to change the default values. Just select a file name and enter the |
330 |
step directly after key generation, there is no need to change the |
passphrase. The program issues a warning which should be read carefully. |
|
default values. Just select a file name and enter the passphrase. |
|
|
The program issues a warning which should be read carefully. |
|
331 |
|
|
332 |
@subsection Adding a new Secondary Key |
@subsection Adding a new Secondary Key |
333 |
|
|
334 |
For most users the existing keys in the key pair are enough |
For most users the existing keys in the key pair are enough and no extra key is needed. But there |
335 |
and no extra key is needed. But there are some exceptions. |
are some exceptions. |
336 |
|
|
337 |
@itemize @bullet |
@itemize @bullet |
338 |
|
|
339 |
@item |
@item |
340 |
The primary key has no secondary key and the primary key is not |
The primary key has no secondary key and the primary key is not able to encrypt data. In this |
341 |
able to encrypt data. In this case it can be a good idea to |
case it can be a good idea to add a secondary encryption key. |
|
add a secondary encryption key. |
|
342 |
|
|
343 |
@item |
@item |
344 |
A lot of people use secondary encryption keys with an expiration |
A lot of people use secondary encryption keys with an expiration date. Usually the key is valid |
345 |
date. Usually the key is valid for 1-2 years. After the key is expired, |
for 1-2 years. After the key is expired, a new key is needed in order to encrypt data. |
|
a new key is needed in order to encrypt data. |
|
346 |
|
|
347 |
@end itemize |
@end itemize |
348 |
|
|
349 |
What kind of public key algorithm should be selected is a matter |
What kind of public key algorithm should be selected is a matter of taste. RSA and ElGamal are |
350 |
of taste. RSA and ElGamal are both capable for encryption. For most |
both capable for encryption. For most users it's a good idea to let the program chose the key |
351 |
users it's a good idea to let the program chose the key size (in bits). |
size (in bits). The default settings should be secure enough for most purposes. |
|
The default settings should be secure enough for most purposes. |
|
352 |
|
|
353 |
@subsection Adding a new User ID |
@subsection Adding a new User ID |
354 |
If you got a new email account, it's propably a good idea to |
If you got a new email account, it's propably a good idea to add these new account to your key |
355 |
add these new account to your key also. For example: |
also. For example: |
356 |
|
|
357 |
A new account was registed at gmail.com (john.doo@@gmail.com). |
A new account was registed at gmail.com (john.doo@@gmail.com). |
358 |
Then you should create a new user ID with the following fields: |
Then you should create a new user ID with the following fields: |
359 |
|
|
360 |
name: John Doo |
name: John Doo |
363 |
|
|
364 |
comment: (optional) |
comment: (optional) |
365 |
|
|
366 |
Now email programs are able to associate this address with your |
Now email programs are able to associate this address with your key when somebody wants to send |
367 |
key when somebody wants to send you a protected mail to this account. |
you a protected mail to this account. |
368 |
|
|
369 |
@subsection Adding a new Photographic ID |
@subsection Adding a new Photographic ID |
370 |
With this function you can add a photo to your public. It will be |
With this function you can add a photo to your public. It will be displayed in the key property |
371 |
displayed in the key property dialog. |
dialog. |
372 |
|
|
373 |
You just need to select a JPEG file which contains the photo and |
You just need to select a JPEG file which contains the photo and enter your passphrase and |
374 |
enter your passphrase and confirm with OK. Please read the note |
confirm with OK. Please read the note in the dialog carefully to make sure the photo has a proper |
375 |
in the dialog carefully to make sure the photo has a proper size |
size (file, height and weight). |
|
(file, height and weight). |
|
376 |
|
|
377 |
@subsection Adding a new Designated Revoker |
@subsection Adding a new Designated Revoker |
378 |
If you want to allow another key to revoke your own key, this |
If you want to allow another key to revoke your own key, this might be useful if you lost your |
379 |
might be useful if you lost your secret or a simliar situation, |
secret or a simliar situation, you can use this function to add a designated revoker to your key. |
380 |
you can use this function to add a designated revoker to your key. |
|
381 |
|
All you need to do is to select the key you want to add as a desig revoker. But please bear in |
382 |
All you need to do is to select the key you want to add as a desig |
mind that this procedure cannot be undone and that this person really has the power to make your |
383 |
revoker. But please bear in mind that this procedure cannot be undone |
public key unuseable. You really should trust the selected key, in case it is not a key owned by yourself. |
|
and that this person really has the power to make your public key |
|
|
unuseable. You really should trust the selected key, in case it is |
|
|
not a key owned by yourself. |
|
384 |
|
|
385 |
@subsection Export a Public Key |
@subsection Export a Public Key |
386 |
There are several reason why to export a public key and there |
There are several reason why to export a public key and there are also several ways to do it. If |
387 |
are also several ways to do it. If you want to send the key |
you want to send the key directly to a mail recipient, you can select the key, right-click, |
388 |
directly to a mail recipient, you can select the key, right-click, |
and select "Send Key to Mail Recipient". As an alternative, you can also export it to the |
389 |
and select "Send Key to Mail Recipient". As an alternative, you |
clipboard or to a file. To export a key to the clipboard, you can select "Copy key to Clipboard" |
390 |
can also export it to the clipboard or to a file. To export a |
in the popup menu of the selected key. To export it to a file, you need to select the menu "Key" |
391 |
key to the clipboard, you can select "Copy key to Clipboard" |
and then "Export...". The program will automatically suggest a name for the output. |
392 |
in the popup menu of the selected key. To export it to a file, |
|
393 |
you need to select the menu "Key" and then "Export...". The |
@subsection Export your Secret Key |
394 |
program will automatically suggest a name for the output. |
This command should be used with caution because it exports your secret key. Please bear in mind |
395 |
|
that you should never export your key to a place where it can be accessed by others. |
396 |
|
An USB stick or a likewise mobile storage device should be used for the export. |
397 |
|
|
398 |
@subsection Import a Public Key |
@subsection Import a Public Key |
399 |
Similar to the key import, the import of a key can be done in |
Similar to the key import, the import of a key can be done in several ways. First, let's assume |
400 |
several ways. First, let's assume you got a mail with an OpenPGP |
you got a mail with an OpenPGP key included as inline text. Then you can use the current window |
401 |
key included as inline text. Then you can use the current window |
feature and "Decrypt/Verify" to import the key. Alternative you also may use the clipboard. |
402 |
feature and "Decrypt/Verify" to import the key. Alternative you |
To achieve this, you first need to select the entire key (CTRL+A) and then copy it to the |
403 |
also may use the clipboard. To achieve this, you first need to |
clipboard (CTRL+C), then use the Key Manager (Edit->Paste) to import it. If the key is stored as |
404 |
select the entire key (CTRL+A) and then copy it to the clipboard |
an attachment, or you want to import a key from a file in general, just drag the file and drop it |
|
(CTRL+C), then use the Key Manager (Edit->Paste) to import it. |
|
|
If the key is stored as an attachment, or you want to import |
|
|
a key from a file in general, just drag the file and drop it |
|
405 |
into the Key Manager window or use "Key" -> "Import...". |
into the Key Manager window or use "Key" -> "Import...". |
406 |
|
|
407 |
@subsection Sign a Public Key |
@subsection Sign a Public Key |
408 |
If you verified that a key really belongs to its owner, you |
If you verified that a key really belongs to its owner, you should sign the key to integrate it |
409 |
should sign the key to integrate it into your Web of Trust |
into your Web of Trust and also to mark the key as valid in your keyring. Do not sign a key you |
410 |
and also to mark the key as valid in your keyring. Do not sign |
just got via email with the request to sign it. Anybody can create a key with your (or better ANY) name, |
411 |
a key you just got via email with the request to sign it. Anybody |
these information are no hint to whom the key really belongs. You can check a key |
412 |
can create a key with your (or better ANY) name, these information |
by meeting or calling the key owner and verify the key fingerprint of the key with the one |
413 |
are no hint to whom the key really belongs. You can check a key |
published by the key owner. Additional checks should be to watch at his driver license or the |
414 |
by meeting or calling the key owner and verify the key fingerprint |
identity card to make sure that name of the key matches the name of the key owner. After this |
415 |
of the key with the one published by the key owner. Additional checks |
procedure is done, you can open the Key Manager, select the right key and either use the context |
416 |
should be to watch at his driver license or the identity card to make |
menu "Sign Key" or use the toolbar button. |
417 |
sure that name of the key matches the name of the key owner. After |
|
418 |
this procedure is done, you can open the Key Manager, select the |
The next dialog will summarize the key information and some additional options. For example if |
419 |
right key and either use the context menu "Sign Key" or use the |
the signature should be local or exportable. Local means the signature will be stripped if you |
420 |
toolbar button. |
export the key and no one else except you can use it to calculate the validity. If you mark the |
421 |
|
signature exportable, any other user can see and use it. Now you can select the key you want to |
422 |
The next dialog will summarize the key information and some |
use to sign and enter the passphrase. Confirm with "OK" and the key will be signed. Now the validity |
423 |
additional options. For example if the signature should be |
of the new key is "Full". It is propably a good idea to set the ownertrust of the key. |
424 |
local or exportable. Local means the signature will be stripped |
For a detailled description, see the chapter "Key Ownertrust". |
|
if you export the key and no one else except you can use it to |
|
|
calculate the validity. If you mark the signature exportable, |
|
|
any other user can see and use it. Now you can select the key |
|
|
you want to use to sign and enter the passphrase. Confirm with "OK" |
|
|
and the key will be signed. Now the validity of the new key is |
|
|
"Full". It is propably a good idea to set the ownertrust of the |
|
|
key. For a detailled description, see the chapter "Key Ownertrust". |
|
425 |
|
|
426 |
@subsection Key Ownertrust |
@subsection Key Ownertrust |
427 |
First we should explain what the ownertrust of a key is. The ownertrust |
First we should explain what the ownertrust of a key is. The ownertrust is a measurement how much |
428 |
is a measurement how much you trust somebody to certify and check keys |
you trust somebody to certify and check keys of other people. For example, if you know that Bob |
429 |
of other people. For example, if you know that Bob is really the owner |
is really the owner of the key, you should sign it. But he is also known to sign other keys |
430 |
of the key, you should sign it. But he is also known to sign other keys |
without checking the idenity of the other key owner. Values for the ownertrust are |
431 |
without checking the idenity of the other key owner. Values for the |
1) Don't Know 2) Don't Trust 3) Marginal 4) Full |
432 |
ownertrust are 1) Don't Know 2) Don't Trust 3) Marginal 4) Full |
and thus you should propably use an ownertrust value like "Marginal". But this is a personal |
433 |
and thus you should propably use an ownertrust value like "Marginal". |
decision and stored in a separate file and never exported with the public keys. For further |
434 |
But this is a personal decision and stored in a separate file and |
information, please take a look into the GNU Privacy Handbook. |
435 |
never exported with the public keys. For further information, please |
Just a last work on Key Pairs, they are automatically marked as "Ultimate" because the key |
436 |
take a look into the GNU Privacy Handbook. |
belongs to you and you trust it implicit. |
437 |
Just a last work on Key Pairs, they are automatically marked as |
|
438 |
"Ultimate" because the key belongs to you and you trust it implicit. |
@subsection List Signatures |
439 |
|
This dialog contains a list of all signatures of the selected key. The basic dialog, the tree |
440 |
|
based version, just shows signatures when the issuer key is in the public keyring. A double click |
441 |
|
opens the signature property dialog which contains detailled description about the selected |
442 |
|
signature. A dialog which is useful for people who wants to get all information about the key |
443 |
|
signatures, can click on the "Edit.." button. |
444 |
|
|
445 |
|
@subsection Copy Key Information to the Clipboard |
446 |
|
Often it is useful to copy parts of the user ID to the clipboard. One example is that you want to |
447 |
|
send an email to the key owner or that you want to search the key by the email address or you |
448 |
|
want to copy the fingerprint to the clipboard to paste it somewhere else. |
449 |
|
This command is available in the popup menu (right click). |
450 |
|
|
451 |
|
@subsection Delete one or more Keys |
452 |
|
To delete a key, or more than one key, you just need to select the keys in the Key Manager and |
453 |
|
either select "Delete" or use the toolbar button. |
454 |
|
Be careful if you delete a key pair, because you will not be able to decrypt and/or sign data any |
455 |
|
longer. In any case you should have a backup of your key pair at a safe place. |
456 |
|
|
457 |
|
@subsection Re-verify Signatures |
458 |
|
After you refreshed or imported a lot of new keys, either from a file or the keyserver, it is a |
459 |
|
good idea to re-verify the signature in the keyring. This speeds up listing operations. |
460 |
|
|
461 |
|
@subsection WinPT Website |
462 |
|
If you want to check for updates or general information about the Windows Privacy Tray program, |
463 |
|
you can select this menu item. |
464 |
|
The WWW webite of WinPT will be loaded in the default browser. |
465 |
|
If you want to visit the project website directly, select the "Project Website" entry. |
466 |
|
|
467 |
|
@subsection The Key Edit Dialog |
468 |
|
For the average GPG user, the popup menu of the Key Manager contains all command to manage your |
469 |
|
keys. For example to add a key/userid/revoker/photo, just right click on the click and select the |
470 |
|
command from the "Add" submenu. |
471 |
|
But for advanced users, this dialog contain a lot of extra commands to customize your key. |
472 |
|
|
473 |
|
The main dialog contains a list of all keys in the first list view box and all user IDs in the |
474 |
|
second list view box. The help button gives you a short hint about each command and what it does. |
475 |
|
For example you can set the primary user ID via the "primary" command or with "deluid" you can |
476 |
|
delete the selected user ID. Please always bear in mind, that most keyserver are not able to |
477 |
|
remove user IDs in its database so if another user fetch your 'updated' key from the keyserver |
478 |
|
the user ID might be still part of the key. If you want to make an user ID unuseable, you should |
479 |
|
revoke it. This is also possible with this dialog. |
480 |
|
|
481 |
|
@subsection Update your Preferences in the Key Manager |
482 |
|
To avoid that the user needs detour to select the taskbar icon, click on it, etc., all |
483 |
|
preferences can be changed in the Key Manager via the Edit->Preferences... menu. |
484 |
|
|
485 |
@section The File Manager |
@section The File Manager |
486 |
|
|
487 |
@subsection Introduction |
@subsection Introduction |
488 |
The File Manager is no replacement for an Explorer Extension. |
The File Manager is no replacement for an Explorer Extension. If you secure your files frequently |
489 |
If you secure your files frequently and you want to do this |
and you want to do this fast and easy, I suggest to install GPGee. It is a program which |
490 |
fast and easy, I suggest to install GPGee. It is a program |
integrates itself into the explorer and provide menu entries in the context menu of files and |
491 |
which integrates itself into the explorer and provide menu |
directory. But the File Manager can be very useful if you just want to decrypt and/or encrypt |
492 |
entries in the context menu of files and directory. But the |
some files without additional programs. You can find the File Manager via the symbol in the |
493 |
File Manager can be very useful if you just want to decrypt |
taskbar, right click and then "File Manager". |
|
and/or encrypt some files without additional programs. You |
|
|
can find the File Manager via the symbol in the taskbar, |
|
|
right click and then "File Manager". |
|
494 |
|
|
495 |
@subsection An Overview of the GUI |
@subsection An Overview of the GUI |
496 |
First there are different ways to add (open) files in the |
First there are different ways to add (open) files in the Key Manager. The easiest way is to use |
497 |
Key Manager. The easiest way is to use drag and drop to |
drag and drop to add files into the File Manager. Just drag a file from the explorer and drop it |
498 |
add files into the File Manager. Just drag a file from the |
into the File Manager window. The second way is to use File->Open. A dialog opens which is common |
499 |
explorer and drop it into the File Manager window. The second |
for all "File Open" operations in most Windows application. Now you can select one or more files |
500 |
way is to use File->Open. A dialog opens which is common for |
and confirm. The files will be automatically added to the File Manager window. The main window |
501 |
all "File Open" operations in most Windows application. Now |
consists of a listview with three rows. |
502 |
you can select one or more files and confirm. The files will |
|
503 |
be automatically added to the File Manager window. The main |
The first row is the status of the file. It can be "ENCRYPTED", "SIGNED", "PUBKEY", "SECKEY", |
504 |
window consists of a listview with three rows. |
"SIG" or "UNKNOWN". Dependent on the file status, the File Manager offers different choices. |
505 |
|
For example "SIG" enables the verify options in the (popup) menu. "UNKNOWN" is the default for |
506 |
The first row is the status of the file. It can be "ENCRYPTED", |
all plaintext files. |
507 |
"SIGNED", "PUBKEY", "SECKEY", "SIG" or "UNKNOWN". Dependent on |
The second row is the file name. And the last row is the status of the operation. It can be |
508 |
the file status, the File Manager offers different choices. For example |
either "", "SUCCESS" or "FAILED". An empty status means no operation was started yet. FAILED |
509 |
"SIG" enables the verify options in the (popup) menu. "UNKNOWN" is |
indicates that the GnuPG operation failed. In this case an error message was issued before. |
|
the default for all plaintext files. |
|
|
The second row is the file name. And the last row is the status of |
|
|
the operation. It can be either "", "SUCCESS" or "FAILED". An empty status |
|
|
means no operation was started yet. FAILED indicates that the |
|
|
GnuPG operation failed. In this case an error message was issued before. |
|
510 |
|
|
511 |
Now it follows an example: |
Now it follows an example: |
512 |
We assume that user wants to encrypt "c:\My Ideas\GPG GUI.txt". |
We assume that user wants to encrypt "c:\My Ideas\GPG GUI.txt". Drag the file from the Explorer |
513 |
Drag the file from the Explorer and drop it into the open File |
and drop it into the open File Manager, the main window. The file will be added and recognized |
514 |
Manager, the main window. The file will be added and recognized |
as "UNKNOWN". Now we select the file and right click, a popup menu is shown and we select |
515 |
as "UNKNOWN". Now we select the file and right click, a popup |
"Encrypt". An new dialog is opened which looks similar to the Clipboard Encryption dialog. |
516 |
menu is shown and we select "Encrypt". An new dialog is opened |
Just select the recipients and confirm. In contrast to clipboard encryption, file encryption |
517 |
which looks similar to the Clipboard Encryption dialog. Just |
offers some more extra options. They are described later. And hour glass will be shown as long as |
518 |
select the recipients and confirm. In contrast to clipboard encryption, |
GnuPG takes to encrypt the file. When the procedure is done, the third row should be change |
|
file encryption offers some more extra options. They are described |
|
|
later. And hour glass will be shown as long as GnuPG takes to encrypt |
|
|
the file. When the procedure is done, the third row should be change |
|
519 |
to "SUCCESS" and the first row to "ENCRYPTED". |
to "SUCCESS" and the first row to "ENCRYPTED". |
520 |
|
|
521 |
@subsection General Options |
@subsection General Options |
522 |
Now we describe the general options which are possible in some |
Now we describe the general options which are possible in some File Manager dialogs. |
|
File Manager dialogs. |
|
523 |
|
|
524 |
@itemize |
@itemize |
525 |
|
|
526 |
@item Text Output |
@item Text Output |
527 |
When this option is checked, the output will be encoded in ASCII armor. |
When this option is checked, the output will be encoded in ASCII armor. This can be useful if the |
528 |
This can be useful if the file should be transfered via email. The |
file should be transfered via email. The size of the output file is larger than the usual binary |
529 |
size of the output file is larger than the usual binary output. |
output. |
530 |
|
|
531 |
@item Wipe Original |
@item Wipe Original |
532 |
If this option is checked, the original file will be deleted after |
If this option is checked, the original file will be deleted after successfull encryption. |
533 |
successfull encryption. This can be useful if data should not be |
This can be useful if data should not be available in plaintext any longer on a machine. |
|
available in plaintext any longer on a machine. |
|
534 |
|
|
535 |
@end itemize |
@end itemize |
536 |
|
|
537 |
|
@section Reporting a Problem (Bug) or a Feature Request |
538 |
|
|
539 |
|
For the case that you have problems with the program, that includes crashes or or the handling, |
540 |
|
please first check the forum at http://wald.intevation.org to see if someone else reported and/or |
541 |
|
wrote about the issue. It is possible that the issue is already solved/answered in the forum. |
542 |
|
Plus all other users can benefit of it because maybe another person has the same problem and then |
543 |
|
he can check the forum and will find the answer. |
544 |
|
|
545 |
|
Feature requests can be submitted at the same site in a different tab (Tracker->Feature Request). |
546 |
|
There is no guarantee that the request will be implemented in the next version. The reason is, |
547 |
|
that other issues might be more important or that the request must be first discussed with other |
548 |
|
developers. But each request will be considered. |
549 |
|
|
550 |
|
For the case that you found a bug, it is very important to provide much details as possible to |
551 |
|
allow the developers to track down the problem and to fix it easily. Please do not forgot to be |
552 |
|
precise as possible and the best idea is to provide a step-by-step text to reproduce the problem. |
553 |
|
|
554 |
|
@section Problem with the Program or an unexpected Behaviour |
555 |
|
|
556 |
|
First let me say that it is very important always to use the newest version. Each new version |
557 |
|
contains bug fixes and might also fix usability issues. This is also valid for GPG, WinPT |
558 |
|
checks that the minimum GPG version is available but even so it is important and often useful to |
559 |
|
have the newest GPG version if this is possible. |
560 |
|
|
561 |
|
But sometimes the problem is not the software itself, but the software which was involved to |
562 |
|
transfer the data. Here are some examples of what could happen: |
563 |
|
|
564 |
|
- The downloaded file could be broken (FTP ascii->binary issue) and thus WinPT is unable to |
565 |
|
verify the signature. In this case you should download the file again. |
566 |
|
|
567 |
|
- A mailer broke the signature because the line endings were altered or the mail text was wrapped |
568 |
|
after the signature was issued. There is no solution to this problem, except to use |
569 |
|
a smart Mail Client. |
570 |
|
|
571 |
|
- A public key (file or clipboard) will not be recognized but the data should definitely contain |
572 |
|
one or more keys. Sometimes line endings are messed up or white spaces were removed. In |
573 |
|
this case GPG/WinPT is not able to detect when the data begins and the header section starts. |
574 |
|
You can use the clipboard editor to see if the ascii armor is broken. If this happened, the |
575 |
|
file must be repaired manually or should be sent again. |
576 |
|
|
577 |
|
- WinPT reports that the key could not be imported because of missing self signature or a |
578 |
|
likewise message. To make sure that the receiver can really verify the key belongs to its |
579 |
|
owner, the key carries a self signature which can be checked by anybody. Some PGP 2.6 version |
580 |
|
do not issue this self signature and some other PGP versions might be also able to |
581 |
|
supress its generation. Such a key cannot be used, even if the import were forced. The solution |
582 |
|
to this problem is easy but sometimes not possible. Ask the key issuer to self sign his key and |
583 |
|
to upload it to the keyserver or send it again. |
584 |
|
But sometimes companies have a policy and thus newly generated keys are not self signed. I do |
585 |
|
not know what to do in this case except for asking if it would be possible to sign a copy of |
586 |
|
the key. |
587 |
|
|
588 |
|
- You received a message from a user which uses PGP and WinPT/GPG will not be able to decrypt it. |
589 |
|
First let me say that this should happen very seldom with newer (PGP >= 7) versions of PGP. |
590 |
|
The reason could be, that IDEA has been used. A patented Cipher which is not included in GPG. |
591 |
|
GPG will not be able to decrypt the data because it has been ciphered with IDEA. There is no |
592 |
|
solution for this problem, except to use the IDEA plug-in. But be advised that the IDEA |
593 |
|
algorithm is only free for private use and NOT for commercial mails. |
594 |
|
|
595 |
|
Another problem could be, that your files cannot be automatically decrypted by the receiver |
596 |
|
(who uses PGP) because the file extension of it is .GPG. You can solve this problem by changing |
597 |
|
the default extension in the WinPT preferences from .GPG to .PGP. |
598 |
|
|
599 |
|
To minimize the change of problems when you communicate with a PGP user, you can add "pgp8" or |
600 |
|
"pgp7" to your gpg.conf. This can be done via the Key Manager |
601 |
|
->Edit->Preferences...->GPG Config Preferences. |
602 |
|
|
603 |
|
|
604 |
|
@section How can I help the Project |
605 |
|
|
606 |
|
There are several ways to help the project. For example you could provide (or work on) the |
607 |
|
existing documentation or write new docs. You could translate WinPT into a new language or |
608 |
|
maintain an existing language file. Of course it is also possible to contribute code or to |
609 |
|
become part of the WinPT developer crew. |
610 |
|
Commercial support for WinPT is available via g10 Code GmbH. |
611 |
|
|
612 |
|
@subsection What I need for Development |
613 |
|
First, you need a Windows C-compiler and knowledge how to use the tools and the Win32 API. There |
614 |
|
is no need to use MS-Visual C, you can use Ming-W32 (gcc) and a free IDE to hack some code. |
615 |
|
The default building environment is a mingw32 hosted on Linux and it produces W32 executables. |
616 |
|
|
617 |
|
If you plan to contribute some code or to work on an item from the TODO file, please contact me |
618 |
|
first to make sure no one else is working on it and that and we can discuss the details. |
619 |
|
|
620 |
|
@section Closing Words |
621 |
|
Please remember that currently the core WinPT crew is just me and thus it might take some time to |
622 |
|
respond to forum messages, and mails. If my spare time allows it, I try to respond quick as |
623 |
|
possible. But as a free software project, I do most coding in my spare time and I can't guarantee |
624 |
|
anything. If you need commercial support for WinPT or GPG in general, |
625 |
|
please contact g10 Code GmbH. |
626 |
|
|
627 |
@bye |
@bye |