1 |
\input texinfo |
2 |
|
3 |
@setfilename WinPT |
4 |
|
5 |
This file describes the Windows Privacy Tray program and its main functions |
6 |
|
7 |
This file is free under the terms of the GNU General Public License v2. |
8 |
|
9 |
Copyright (C) 2006 Timo Schulz |
10 |
|
11 |
Version 0.0.0 |
12 |
|
13 |
@settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows |
14 |
|
15 |
@section Requirements for WinPT |
16 |
|
17 |
First you need to have a working GnuPG 1.4 installtion on the machine you |
18 |
plan to install WinPT. If you don't have GPG in your machine, please |
19 |
visit http://www.gnupg.org and download the latest GPG version there. |
20 |
It comes with a graphical installer so there is no need to do this |
21 |
step manually. |
22 |
|
23 |
You need at least Windows 98/2K/XP, but Windows XP or better is |
24 |
recommend. The program also works on NT/95/ME but there is no support |
25 |
for these OS versions any longer. |
26 |
|
27 |
|
28 |
@section Installation of the Program |
29 |
|
30 |
It is always recommend to use the latest version of the program. You |
31 |
can download it from http://wald.intevation.org/projects/winpt. |
32 |
Download the zip file with the binaries inside and unpack them in |
33 |
a folder. All files need to be in the same folder, so if you change |
34 |
the folder don't forget to move all files. |
35 |
|
36 |
To activate the program you just need to start WinPT.exe. You should |
37 |
now see a little (golden key) icon in the taskbar which indicates that |
38 |
the program is running. If you want to quit the program, right click |
39 |
on the symbol and select "Exit". |
40 |
|
41 |
Alternative, you may use one of the graphical GPG installers which |
42 |
are available on the internet. I recommend to use Gpg4Win which |
43 |
includes a set of very useful privacy tools, beside WinPT and it |
44 |
is very easy to use with an average size (~4MB). For non-German |
45 |
speaking users, I recommend the light version because it does not |
46 |
contain the 2 German PDF manuals. |
47 |
|
48 |
@subsection Configure the Program |
49 |
After the installation not much of the default settings need to |
50 |
be changed. If you prefer a special keyserver, it is propably a good |
51 |
idea to open the keyserver dialog and to set one of the existing |
52 |
keyservers as the default or create a new entry and mark it as the |
53 |
new default. The default keyserver is subkeys.pgp.net, which is |
54 |
the best choice for most users. |
55 |
|
56 |
@subsection GPG Options |
57 |
For expert users, the GPG preference dialog might contain some |
58 |
interesting options. For example to set the expiration date of |
59 |
a signature and/or to set the signing level for key signing. |
60 |
It also allows to set a default 'encrypt-to' key and to set |
61 |
the comment in ASCII armored files. |
62 |
|
63 |
@subsection Preferences |
64 |
In the WinPT preference dialog, the user can modify and/or disable |
65 |
the default options. For new users it is suggested to leave the |
66 |
default values as they are, except when there are problems related |
67 |
to the hotkeys. |
68 |
|
69 |
To enable keyring backups, the user can either decide to use the |
70 |
GPG home directory as the backup folder or any other folder. In |
71 |
the latter case, a folder needs to be chosen. If the backup should |
72 |
also include the secret keyring, please check the corresponding box. |
73 |
|
74 |
|
75 |
@section The First Start |
76 |
This section is only important for people who never installed |
77 |
and/or used WinPT before. |
78 |
|
79 |
When the program is started the first time, it offers two choices. |
80 |
The one is to generate a key pair and the other is to copy |
81 |
existing GPG keyrings into the current installation. |
82 |
|
83 |
We assume the user will select the first entry. |
84 |
|
85 |
Now a new dialog is shown which requests some information from |
86 |
the user to allow a meaningful association between the key and |
87 |
the user. If the user prefer RSA keys, the check box should be marked. |
88 |
If the entered data is OK, WinPT then generates a new key pair. As long |
89 |
as this step takes, a progress dialog is shown to indicate the |
90 |
enduring process. When the generation of the keypair is done, WinPT |
91 |
offers the chance to backup the existing keyrings. This is definitely |
92 |
an important decision because if the keyring will get corrupted |
93 |
or lost, there is no way to recover the encrypted data. That is |
94 |
why it is also important to store the backup, at least of the |
95 |
secret keyring, at a @strong{safe} place. |
96 |
|
97 |
@section Keyserver Access |
98 |
An easy way to retrieve keys is the keyserver. You can think of |
99 |
it like a huge database with a lot of keys as its content. It is |
100 |
possible to search keys by a pattern, a keyid or even a fingerprint. |
101 |
WinPT allows to access different kind of keyservers. For example |
102 |
LDAP, HKP, Finger and HTTP. But the focus will be set on HKP because |
103 |
this is the common case. |
104 |
|
105 |
In some situations WinPT asks the user whether to retrieve keys |
106 |
automatically. One example is the signature verification when the |
107 |
key that issued the signature was not found in the keyring. |
108 |
|
109 |
The main keyserver dialog allows to fetch one or more keys directly |
110 |
or to search for a given pattern. |
111 |
|
112 |
@subsection Retrieve a key by Key ID |
113 |
|
114 |
@subsection Retrieve a key by its email address |
115 |
|
116 |
@subsection Search for a key by pattern |
117 |
If you want to communicate with a new mail partner and you are |
118 |
not sure about the key ID, it can be useful to search for his |
119 |
email address. This address is considered as quite unique. |
120 |
|
121 |
An example: |
122 |
|
123 |
pattern: twoaday@@freakmail.de |
124 |
|
125 |
[Search] |
126 |
|
127 |
Now a dialog is opened with a list of all keys which matched |
128 |
the search string. If the name @strong{and} the email address |
129 |
is known, the matching key should be selected and "Receive" |
130 |
should be clicked. Then the key will be downloaded and added |
131 |
to your keyring. Now you can encrypt data with this key, for |
132 |
example an email. |
133 |
|
134 |
@section Adding new elements to your key |
135 |
|
136 |
@subsection Adding a new secondary key |
137 |
|
138 |
For most users the existing keys in the key pair are enough |
139 |
and no extra key is needed. But there are some exceptions. |
140 |
|
141 |
@itemize @bullet |
142 |
|
143 |
@item |
144 |
The primary key has no secondary key and the primary key is not |
145 |
able to encrypt data. In this case it can be a good idea to |
146 |
add a secondary encryption key. |
147 |
|
148 |
@item |
149 |
A lot of people use secondary encryption keys with an expiration |
150 |
date. Usually the key is valid for 1-2 years. After the key is expired, |
151 |
a new key is needed in order to encrypt data. |
152 |
|
153 |
@end itemize |
154 |
|
155 |
What kind of public key algorithm should be selected is a matter |
156 |
of taste. RSA and ElGamal are both capable for encryption. For most |
157 |
users it's a good idea to let the program chose the key size (in bits). |
158 |
The default settings should be secure enough for most purposes. |
159 |
|
160 |
@subsection Adding a new user ID |
161 |
If you got a new email account, it's propably a good idea to |
162 |
add these new account to your key also. For example: |
163 |
|
164 |
A new account was registed at gmail.com (john.doo@@gmail.com). |
165 |
Then you should create a new user ID with the following fields: |
166 |
|
167 |
name: John Doo |
168 |
|
169 |
email: john.doo@@gmail.com |
170 |
|
171 |
comment: (optional) |
172 |
|
173 |
Now email programs are able to associate this address with your |
174 |
key when somebody wants to send you a protected mail to this account. |
175 |
|
176 |
@subsection Adding a photographic ID |
177 |
With this function you can add a photo to your public. It will be |
178 |
displayed in the key property dialog. |
179 |
|
180 |
You just need to select a JPEG file which contains the photo and |
181 |
enter your passphrase and confirm with OK. Please read the note |
182 |
in the dialog carefully to make sure the photo has a proper size |
183 |
(file, height and weight). |
184 |
|
185 |
@subsection Adding a new designated revoker |
186 |
If you want to allow another key to revoke your own key, this |
187 |
might be useful if you lost your secret or a simliar situation, |
188 |
you can use this function to add a designated revoker to your key. |
189 |
|
190 |
All you need to do is to select the key you want to add as a desig |
191 |
revoker. But please bear in mind that this procedure cannot be undone |
192 |
and that this person really has the power to make your public key |
193 |
unuseable. You really should trust the selected key, in case it is |
194 |
not a key owned by yourself. |
195 |
|
196 |
@bye |