/[winpt]/trunk/Doc/winpt.texi
ViewVC logotype

Diff of /trunk/Doc/winpt.texi

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 226 by twoaday, Mon Jun 12 13:40:21 2006 UTC revision 242 by twoaday, Thu Jun 29 11:18:27 2006 UTC
# Line 8  This file is free under the terms of the Line 8  This file is free under the terms of the
8    
9  Copyright (C) 2006 Timo Schulz  Copyright (C) 2006 Timo Schulz
10    
11  Version 0.0.0  Version 0.2.0
12    
13  @settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows  @settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows
14    
# Line 69  recommend to sign keys without doing thi Line 69  recommend to sign keys without doing thi
69  The fingerprint of the key is hexadecial (160-bit) sequence divided  The fingerprint of the key is hexadecial (160-bit) sequence divided
70  into 10 groups of 4 hex digits. You can get the fingerprint of a key  into 10 groups of 4 hex digits. You can get the fingerprint of a key
71  by opening the key property dialog. There you can mark the fingerprint  by opening the key property dialog. There you can mark the fingerprint
72  and copy it to the clipboard.  and copy it to the clipboard. The fingerprint of a key can be compared
73    to human fingerprints, it is unique for each key.
74    
75  Example: 1D75 8108 5BC9 D9FB E78B  2078 ED46 81C9 BF3D F9B4  Example: 1D75 8108 5BC9 D9FB E78B  2078 ED46 81C9 BF3D F9B4
76    
77    It is a good idea to publish your fingerprint wherever possible.
78    For example via a business card or your website.
79    
80  @section Installation of the Program  @section Installation of the Program
81    
82  It is always recommend to use the latest version of the program. You  It is always recommend to use the latest version of the program. You
# Line 259  The output should contain a header and a Line 263  The output should contain a header and a
263  "BEGIN PGP MESSAGE" and "END PGP MESSAGE.  "BEGIN PGP MESSAGE" and "END PGP MESSAGE.
264    
265  @subsection Decrypt/Verify Data from the Clipboard  @subsection Decrypt/Verify Data from the Clipboard
266    The most common case is propably that you got a signed email and
267    now you want to verify it. For this procedure, you have to copy
268    the entire signature in the clipboard. The easiest way is to
269    use CTRL+A and CTRL+C, then all available text will be copied.
270    WinPT (GnuPG) is smart enough to figure out the signature related
271    data. Now go to the taskbar, display the popup menu and select
272    Clipboard->Decrypt/Verify. Now a new dialog, the verify dialog,
273    should be available on screen with all information about the
274    signature. For example who is the signer, when was it signed
275    how much do you try this key and what was signed and most
276    important, the status of it (is the signature good or BAD).
277    A special case is when you don't have the public key to verify
278    the signature, if this happens WinPT offers to download the key
279    from the default keyserver. If the key was not found, the procedure
280    is aborted because without the key the sig cannot bed checked.
281    
282  @subsection Sign the Clipboard  @subsection Sign the Clipboard
283    We assume that text that shall be signed is already in the
284    clipboard. If not, select the text you want to sign and copy
285    with via CTRL+C in the clipboard. Now go to the taskbar and
286    open the peopup menu, Clipboard->Sign. If you just have one
287    secret key, the passphrase dialog will be automatically shown.
288    All you need is to enter your passphrase and confirm. In case
289    of more available secret keys, a list with all keys is shown
290    and you can select which key shall be used for signing.
291    The output is always a cleartext signature which is in text
292    format. Do not try to sign binary clipboard data, the result
293    would be unpredictable and not readable by human beings.
294    
295    @section The Current Window Support
296    Compared to the clipboard mode, the CWS mode has some advantages.
297    Let us assume that you want to extract text from an editor window.
298    With the CWS mode, the program automatically tries to focus the
299    window to select the text and to copy it to the clipboard and
300    execute the selected command (Sign, Encrypt, Decrypt).
301    No manual user interaction is needed. Except this different behaviour,
302    it is very likewise to the clipboard mode and thus we do not describe
303    each command again.
304    
305  @section The Key Manager  @section The Key Manager
306    
# Line 313  step directly after key generation, ther Line 353  step directly after key generation, ther
353  default values. Just select a file name and enter the passphrase.  default values. Just select a file name and enter the passphrase.
354  The program issues a warning which should be read carefully.  The program issues a warning which should be read carefully.
355    
356  @subsection Adding a new secondary key  @subsection Adding a new Secondary Key
357    
358  For most users the existing keys in the key pair are enough  For most users the existing keys in the key pair are enough
359  and no extra key is needed. But there are some exceptions.  and no extra key is needed. But there are some exceptions.
# Line 337  of taste. RSA and ElGamal are both capab Line 377  of taste. RSA and ElGamal are both capab
377  users it's a good idea to let the program chose the key size (in bits).  users it's a good idea to let the program chose the key size (in bits).
378  The default settings should be secure enough for most purposes.  The default settings should be secure enough for most purposes.
379    
380  @subsection Adding a new user ID  @subsection Adding a new User ID
381  If you got a new email account, it's propably a good idea to  If you got a new email account, it's propably a good idea to
382  add these new account to your key also. For example:  add these new account to your key also. For example:
383    
# Line 353  comment: (optional) Line 393  comment: (optional)
393  Now email programs are able to associate this address with your  Now email programs are able to associate this address with your
394  key when somebody wants to send you a protected mail to this account.  key when somebody wants to send you a protected mail to this account.
395    
396  @subsection Adding a photographic ID  @subsection Adding a new Photographic ID
397  With this function you can add a photo to your public. It will be  With this function you can add a photo to your public. It will be
398  displayed in the key property dialog.  displayed in the key property dialog.
399    
# Line 362  enter your passphrase and confirm with O Line 402  enter your passphrase and confirm with O
402  in the dialog carefully to make sure the photo has a proper size  in the dialog carefully to make sure the photo has a proper size
403  (file, height and weight).  (file, height and weight).
404    
405  @subsection Adding a new designated revoker  @subsection Adding a new Designated Revoker
406  If you want to allow another key to revoke your own key, this  If you want to allow another key to revoke your own key, this
407  might be useful if you lost your secret or a simliar situation,  might be useful if you lost your secret or a simliar situation,
408  you can use this function to add a designated revoker to your key.  you can use this function to add a designated revoker to your key.
# Line 396  If the key is stored as an attachment, o Line 436  If the key is stored as an attachment, o
436  a key from a file in general, just drag the file and drop it  a key from a file in general, just drag the file and drop it
437  into the Key Manager window or use "Key" -> "Import...".  into the Key Manager window or use "Key" -> "Import...".
438    
439    @subsection Sign a Public Key
440    If you verified that a key really belongs to its owner, you
441    should sign the key to integrate it into your Web of Trust
442    and also to mark the key as valid in your keyring. Do not sign
443    a key you just got via email with the request to sign it. Anybody
444    can create a key with your (or better ANY) name, these information
445    are no hint to whom the key really belongs. You can check a key
446    by meeting or calling the key owner and verify the key fingerprint
447    of the key with the one published by the key owner. Additional checks
448    should be to watch at his driver license or the identity card to make
449    sure that name of the key matches the name of the key owner. After
450    this procedure is done, you can open the Key Manager, select the
451    right key and either use the context menu "Sign Key" or use the
452    toolbar button.
453    
454    The next dialog will summarize the key information and some
455    additional options. For example if the signature should be
456    local or exportable. Local means the signature will be stripped
457    if you export the key and no one else except you can use it to
458    calculate the validity. If you mark the signature exportable,
459    any other user can see and use it. Now you can select the key
460    you want to use to sign and enter the passphrase. Confirm with "OK"
461    and the key will be signed. Now the validity of the new key is
462    "Full". It is propably a good idea to set the ownertrust of the
463    key. For a detailled description, see the chapter "Key Ownertrust".
464    
465    @subsection Key Ownertrust
466    First we should explain what the ownertrust of a key is. The ownertrust
467    is a measurement how much you trust somebody to certify and check keys
468    of other people. For example, if you know that Bob is really the owner
469    of the key, you should sign it. But he is also known to sign other keys
470    without checking the idenity of the other key owner. Values for the
471    ownertrust are 1) Don't Know 2) Don't Trust 3) Marginal 4) Full
472    and thus you should propably use an ownertrust value like "Marginal".
473    But this is a personal decision and stored in a separate file and
474    never exported with the public keys. For further information, please
475    take a look into the GNU Privacy Handbook.
476    Just a last work on Key Pairs, they are automatically marked as
477    "Ultimate" because the key belongs to you and you trust it implicit.
478    
479    @section The File Manager
480    
481    @subsection Introduction
482    The File Manager is no replacement for an Explorer Extension.
483    If you secure your files frequently and you want to do this
484    fast and easy, I suggest to install GPGee. It is a program
485    which integrates itself into the explorer and provide menu
486    entries in the context menu of files and directory. But the
487    File Manager can be very useful if you just want to decrypt
488    and/or encrypt some files without additional programs. You
489    can find the File Manager via the symbol in the taskbar,
490    right click and then "File Manager".
491    
492    @subsection An Overview of the GUI
493    First there are different ways to add (open) files in the
494    Key Manager. The easiest way is to use drag and drop to
495    add files into the File Manager. Just drag a file from the
496    explorer and drop it into the File Manager window. The second
497    way is to use File->Open. A dialog opens which is common for
498    all "File Open" operations in most Windows application. Now
499    you can select one or more files and confirm. The files will
500    be automatically added to the File Manager window. The main
501    window consists of a listview with three rows.
502    
503    The first row is the status of the file. It can be "ENCRYPTED",
504    "SIGNED", "PUBKEY", "SECKEY", "SIG" or "UNKNOWN". Dependent on
505    the file status, the File Manager offers different choices. For example
506    "SIG" enables the verify options in the (popup) menu. "UNKNOWN" is
507    the default for all plaintext files.
508    The second row is the file name. And the last row is the status of
509    the operation. It can be either "", "SUCCESS" or "FAILED". An empty status
510    means no operation was started yet. FAILED indicates that the
511    GnuPG operation failed. In this case an error message was issued before.
512    
513    Now it follows an example:
514    We assume that user wants to encrypt "c:\My Ideas\GPG GUI.txt".
515    Drag the file from the Explorer and drop it into the open File
516    Manager, the main window. The file will be added and recognized
517    as "UNKNOWN". Now we select the file and right click, a popup
518    menu is shown and we select "Encrypt". An new dialog is opened
519    which looks similar to the Clipboard Encryption dialog. Just
520    select the recipients and confirm. In contrast to clipboard encryption,
521    file encryption offers some more extra options. They are described
522    later. And hour glass will be shown as long as GnuPG takes to encrypt
523    the file. When the procedure is done, the third row should be change
524    to "SUCCESS" and the first row to "ENCRYPTED".
525    
526    @subsection General Options
527    Now we describe the general options which are possible in some
528    File Manager dialogs.
529    
530    @itemize
531    
532    @item Text Output
533    When this option is checked, the output will be encoded in ASCII armor.
534    This can be useful if the file should be transfered via email. The
535    size of the output file is larger than the usual binary output.
536    
537    @item Wipe Original
538    If this option is checked, the original file will be deleted after
539    successfull encryption. This can be useful if data should not be
540    available in plaintext any longer on a machine.
541    
542    @end itemize
543    
544  @bye  @bye

Legend:
Removed from v.226  
changed lines
  Added in v.242

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26