8 |
|
|
9 |
Copyright (C) 2006 Timo Schulz |
Copyright (C) 2006 Timo Schulz |
10 |
|
|
11 |
Version 0.1.0 |
Version 0.2.0 |
12 |
|
|
13 |
@settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows |
@settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows |
14 |
|
|
22 |
|
|
23 |
You need at least Windows 98/2K/XP, but Windows XP or better is |
You need at least Windows 98/2K/XP, but Windows XP or better is |
24 |
recommend. The program also works on NT/95/ME but there is no support |
recommend. The program also works on NT/95/ME but there is no support |
25 |
for these OS versions any longer. |
for these OS versions any longer. Mainly because the OS vendor also |
26 |
|
dropped support and no bug fixes will be provided any longer. |
27 |
|
|
28 |
@section A short Introduction |
@section A short Introduction |
29 |
|
|
30 |
WinPT is a graphical GnuPG front-end which resides in the task bar. |
WinPT is a graphical GnuPG front-end which resides in the task bar. |
31 |
It is divided into several, so-called, managers. There is a manager |
It is divided into several, so-called, managers. There is a manager |
32 |
for the keyring, for files and for smart cards. The aim of the program |
for the keyring, for files and for smart cards. The aim of the program |
33 |
is to secure email communication and to perform file encryption. |
is to secure email communication and to perform file encryption and |
34 |
|
to allow an easy and user friendly way for key management. |
35 |
|
|
36 |
@subsection What is GnuPG |
@subsection What is GnuPG |
37 |
GnuPG is a tool for secure communication and data storage. |
GnuPG is a tool for secure communication and data storage. |
71 |
The fingerprint of the key is hexadecial (160-bit) sequence divided |
The fingerprint of the key is hexadecial (160-bit) sequence divided |
72 |
into 10 groups of 4 hex digits. You can get the fingerprint of a key |
into 10 groups of 4 hex digits. You can get the fingerprint of a key |
73 |
by opening the key property dialog. There you can mark the fingerprint |
by opening the key property dialog. There you can mark the fingerprint |
74 |
and copy it to the clipboard. |
and copy it to the clipboard. The fingerprint of a key can be compared |
75 |
|
to human fingerprints, it is unique for each key. |
76 |
|
|
77 |
Example: 1D75 8108 5BC9 D9FB E78B 2078 ED46 81C9 BF3D F9B4 |
Example: 1D75 8108 5BC9 D9FB E78B 2078 ED46 81C9 BF3D F9B4 |
78 |
|
|
85 |
can download it from http://wald.intevation.org/projects/winpt. |
can download it from http://wald.intevation.org/projects/winpt. |
86 |
Download the zip file with the binaries inside and unpack them in |
Download the zip file with the binaries inside and unpack them in |
87 |
a folder. All files need to be in the same folder, so if you change |
a folder. All files need to be in the same folder, so if you change |
88 |
the folder don't forget to move all files. |
the folder do not forget to move all files. |
89 |
You should also download and verify the signature of the packet to |
You should also download and verify the signature of the packet to |
90 |
make sure that the release is really authentic. |
make sure that the release is really authentic. |
91 |
|
|
145 |
@section The First Start |
@section The First Start |
146 |
|
|
147 |
This section is only important for people who never installed |
This section is only important for people who never installed |
148 |
and/or used WinPT before. |
and/or used WinPT before and thus no keyrings are available. |
149 |
|
|
150 |
When the program is started the first time, it offers two choices. |
When the program is started the first time, it offers two choices. |
151 |
The one is to generate a key pair and the other is to copy |
The one is to generate a key pair and the other is to copy |
155 |
|
|
156 |
Now a new dialog is shown which requests some information from |
Now a new dialog is shown which requests some information from |
157 |
the user to allow a meaningful association between the key and |
the user to allow a meaningful association between the key and |
158 |
the user. If the user prefer RSA keys, the check box should be marked. |
the user. If the user prefer RSA keys, the check box should be marked. |
159 |
|
But this is a decision of personal taste and does not influence the security |
160 |
|
or anything else. |
161 |
If the entered data is OK, WinPT then generates a new key pair. As long |
If the entered data is OK, WinPT then generates a new key pair. As long |
162 |
as this step takes, a progress dialog is shown to indicate the |
as this step takes, a progress dialog is shown to indicate the |
163 |
enduring process. When the generation of the keypair is done, WinPT |
enduring process. When the generation of the keypair is done, WinPT |
167 |
why it is also important to store the backup, at least of the |
why it is also important to store the backup, at least of the |
168 |
secret keyring, at a @strong{safe} place. |
secret keyring, at a @strong{safe} place. |
169 |
|
|
170 |
|
@section The Passphrase for the Secret Key |
171 |
|
First a short explaination what passphrase is. A passphrase is like |
172 |
|
a password but usually longer, maybe a sentence, which can consists of |
173 |
|
any 7-bit ASCII characters. It is used to protect your secret key |
174 |
|
and thus it is very import to chose a secure passphrase. If your |
175 |
|
computer, and thus the secret key, were stolen and an attacker can |
176 |
|
guess your passphrase he is able to decrypt all your data and to |
177 |
|
create signatures in your name! A good passphrase is difficult |
178 |
|
to guess but easy to remember and should be at least 10 characters long. |
179 |
|
An easy way to generate a strong passphrase is to use a sentence only |
180 |
|
you know but you can easily remind and then take the first letter of |
181 |
|
each word, plus some special characters and maybe even some intentionally |
182 |
|
made spelling mistakes. |
183 |
|
|
184 |
|
Example: Row - row - row your boat, gently down the stream |
185 |
|
Passphrase: R-r-ryb,gdt |
186 |
|
|
187 |
|
Never write down or passphrase or share it among other people! |
188 |
|
|
189 |
@section Keyserver Access |
@section Keyserver Access |
190 |
|
|
191 |
An easy way to retrieve keys is the keyserver. You can think of |
An easy way to retrieve keys is the keyserver. You can think of |
286 |
"BEGIN PGP MESSAGE" and "END PGP MESSAGE. |
"BEGIN PGP MESSAGE" and "END PGP MESSAGE. |
287 |
|
|
288 |
@subsection Decrypt/Verify Data from the Clipboard |
@subsection Decrypt/Verify Data from the Clipboard |
289 |
|
The most common case is propably that you got a signed email and |
290 |
|
now you want to verify it. For this procedure, you have to copy |
291 |
|
the entire signature in the clipboard. The easiest way is to |
292 |
|
use CTRL+A and CTRL+C, then all available text will be copied. |
293 |
|
WinPT (GnuPG) is smart enough to figure out the signature related |
294 |
|
data. Now go to the taskbar, display the popup menu and select |
295 |
|
Clipboard->Decrypt/Verify. Now a new dialog, the verify dialog, |
296 |
|
should be available on screen with all information about the |
297 |
|
signature. For example who is the signer, when was it signed |
298 |
|
how much do you try this key and what was signed and most |
299 |
|
important, the status of it (is the signature good or BAD). |
300 |
|
A special case is when you don't have the public key to verify |
301 |
|
the signature, if this happens WinPT offers to download the key |
302 |
|
from the default keyserver. If the key was not found, the procedure |
303 |
|
is aborted because without the key the sig cannot bed checked. |
304 |
|
|
305 |
@subsection Sign the Clipboard |
@subsection Sign the Clipboard |
306 |
|
We assume that text that shall be signed is already in the |
307 |
|
clipboard. If not, select the text you want to sign and copy |
308 |
|
with via CTRL+C in the clipboard. Now go to the taskbar and |
309 |
|
open the peopup menu, Clipboard->Sign. If you just have one |
310 |
|
secret key, the passphrase dialog will be automatically shown. |
311 |
|
All you need is to enter your passphrase and confirm. In case |
312 |
|
of more available secret keys, a list with all keys is shown |
313 |
|
and you can select which key shall be used for signing. |
314 |
|
The output is always a cleartext signature which is in text |
315 |
|
format. Do not try to sign binary clipboard data, the result |
316 |
|
would be unpredictable and not readable by human beings. |
317 |
|
|
318 |
|
@section The Current Window Support |
319 |
|
Compared to the clipboard mode, the CWS mode has some advantages. |
320 |
|
Let us assume that you want to extract text from an editor window. |
321 |
|
With the CWS mode, the program automatically tries to focus the |
322 |
|
window to select the text and to copy it to the clipboard and |
323 |
|
execute the selected command (Sign, Encrypt, Decrypt). |
324 |
|
No manual user interaction is needed. Except this different behaviour, |
325 |
|
it is very likewise to the clipboard mode and thus we do not describe |
326 |
|
each command again. |
327 |
|
|
328 |
@section The Key Manager |
@section The Key Manager |
329 |
|
|
499 |
Just a last work on Key Pairs, they are automatically marked as |
Just a last work on Key Pairs, they are automatically marked as |
500 |
"Ultimate" because the key belongs to you and you trust it implicit. |
"Ultimate" because the key belongs to you and you trust it implicit. |
501 |
|
|
502 |
|
@section The File Manager |
503 |
|
|
504 |
|
@subsection Introduction |
505 |
|
The File Manager is no replacement for an Explorer Extension. |
506 |
|
If you secure your files frequently and you want to do this |
507 |
|
fast and easy, I suggest to install GPGee. It is a program |
508 |
|
which integrates itself into the explorer and provide menu |
509 |
|
entries in the context menu of files and directory. But the |
510 |
|
File Manager can be very useful if you just want to decrypt |
511 |
|
and/or encrypt some files without additional programs. You |
512 |
|
can find the File Manager via the symbol in the taskbar, |
513 |
|
right click and then "File Manager". |
514 |
|
|
515 |
|
@subsection An Overview of the GUI |
516 |
|
First there are different ways to add (open) files in the |
517 |
|
Key Manager. The easiest way is to use drag and drop to |
518 |
|
add files into the File Manager. Just drag a file from the |
519 |
|
explorer and drop it into the File Manager window. The second |
520 |
|
way is to use File->Open. A dialog opens which is common for |
521 |
|
all "File Open" operations in most Windows application. Now |
522 |
|
you can select one or more files and confirm. The files will |
523 |
|
be automatically added to the File Manager window. The main |
524 |
|
window consists of a listview with three rows. |
525 |
|
|
526 |
|
The first row is the status of the file. It can be "ENCRYPTED", |
527 |
|
"SIGNED", "PUBKEY", "SECKEY", "SIG" or "UNKNOWN". Dependent on |
528 |
|
the file status, the File Manager offers different choices. For example |
529 |
|
"SIG" enables the verify options in the (popup) menu. "UNKNOWN" is |
530 |
|
the default for all plaintext files. |
531 |
|
The second row is the file name. And the last row is the status of |
532 |
|
the operation. It can be either "", "SUCCESS" or "FAILED". An empty status |
533 |
|
means no operation was started yet. FAILED indicates that the |
534 |
|
GnuPG operation failed. In this case an error message was issued before. |
535 |
|
|
536 |
|
Now it follows an example: |
537 |
|
We assume that user wants to encrypt "c:\My Ideas\GPG GUI.txt". |
538 |
|
Drag the file from the Explorer and drop it into the open File |
539 |
|
Manager, the main window. The file will be added and recognized |
540 |
|
as "UNKNOWN". Now we select the file and right click, a popup |
541 |
|
menu is shown and we select "Encrypt". An new dialog is opened |
542 |
|
which looks similar to the Clipboard Encryption dialog. Just |
543 |
|
select the recipients and confirm. In contrast to clipboard encryption, |
544 |
|
file encryption offers some more extra options. They are described |
545 |
|
later. And hour glass will be shown as long as GnuPG takes to encrypt |
546 |
|
the file. When the procedure is done, the third row should be change |
547 |
|
to "SUCCESS" and the first row to "ENCRYPTED". |
548 |
|
|
549 |
|
@subsection General Options |
550 |
|
Now we describe the general options which are possible in some |
551 |
|
File Manager dialogs. |
552 |
|
|
553 |
|
@itemize |
554 |
|
|
555 |
|
@item Text Output |
556 |
|
When this option is checked, the output will be encoded in ASCII armor. |
557 |
|
This can be useful if the file should be transfered via email. The |
558 |
|
size of the output file is larger than the usual binary output. |
559 |
|
|
560 |
|
@item Wipe Original |
561 |
|
If this option is checked, the original file will be deleted after |
562 |
|
successfull encryption. This can be useful if data should not be |
563 |
|
available in plaintext any longer on a machine. |
564 |
|
|
565 |
|
@end itemize |
566 |
|
|
567 |
@bye |
@bye |