1 |
twoaday |
222 |
\input texinfo |
2 |
|
|
|
3 |
twoaday |
269 |
@c %**start of header |
4 |
twoaday |
222 |
@setfilename WinPT |
5 |
twoaday |
269 |
@settitle WinPT - The Windows Privacy Tray; a free GPG front-end |
6 |
|
|
@afourpaper |
7 |
|
|
@c %**end of header |
8 |
twoaday |
222 |
|
9 |
twoaday |
269 |
@titlepage |
10 |
|
|
@title Windows Privacy Tray |
11 |
|
|
|
12 |
|
|
@subtitle A free GUI Front-End for GNU Privacy Guard |
13 |
|
|
|
14 |
|
|
@author Timo Schlz, Sundar Pillay |
15 |
twoaday |
222 |
This file describes the Windows Privacy Tray program and its main functions |
16 |
twoaday |
269 |
This file is free under the terms of the GNU General Public License v2. |
17 |
|
|
Version 1.1.1 Copyright (C) 2006 Timo Schulz, Sundar Pillay |
18 |
|
|
@end titlepage |
19 |
twoaday |
222 |
|
20 |
|
|
|
21 |
|
|
@section Requirements for WinPT |
22 |
|
|
|
23 |
twoaday |
253 |
First you need to have a working GnuPG 1.4 installtion on the machine you plan to install WinPT. |
24 |
|
|
If you do not have GPG in your machine, please visit http://www.gnupg.org and download the latest |
25 |
twoaday |
256 |
GPG version there. It comes with a graphical installer so there is no need to do the |
26 |
|
|
installation manually. |
27 |
twoaday |
222 |
|
28 |
twoaday |
253 |
You need at least Windows 98/2K/XP, but Windows XP or better is recommend. The program also works |
29 |
|
|
on NT/95/ME but there is no support for these OS versions any longer. Mainly because the OS |
30 |
|
|
vendor also dropped support and no bug fixes will be provided any longer. |
31 |
twoaday |
256 |
And it is very likely that the program does not work optimal on such platforms. |
32 |
twoaday |
222 |
|
33 |
twoaday |
224 |
@section A short Introduction |
34 |
twoaday |
225 |
|
35 |
twoaday |
253 |
WinPT is a graphical GnuPG front-end which resides in the task bar. It is divided into several, |
36 |
|
|
so-called, managers. There is a manager for the key(ring), for files and for smart cards. |
37 |
|
|
The aim of the program is to secure email communication and to perform file encryption and |
38 |
twoaday |
246 |
to allow an easy and user friendly way for key management. |
39 |
twoaday |
222 |
|
40 |
twoaday |
224 |
@subsection What is GnuPG |
41 |
twoaday |
253 |
GnuPG is a tool for secure communication and data storage. It can be used to encrypt data and |
42 |
|
|
to create digital signatures. It includes an advanced key management facility and is compliant |
43 |
twoaday |
224 |
with the proposed Internet standard as described in RFC2440. |
44 |
|
|
|
45 |
|
|
@subsection The Web of Trust |
46 |
twoaday |
253 |
For a detailled description of these and other GnuPG topics, I recommend the available literature |
47 |
|
|
at http://www.gnupg.org. But at least a general overview should be given here. |
48 |
twoaday |
224 |
|
49 |
twoaday |
253 |
The certification scheme of OpenPGP does not base on a hirachical approach. Instead it uses |
50 |
|
|
a combination of ownertrust and direct key certification. |
51 |
|
|
Here is an example with the imaginary persons called Alice, Bob, Carol and Dave. |
52 |
twoaday |
224 |
|
53 |
twoaday |
253 |
Alice knows Bob and checked the fingerprint of Bob's key when he met him personally. |
54 |
|
|
Thus she knows that the key really belongs to its owner and he trusts Bob to certify other keys. |
55 |
|
|
Then she issued a signature on Bob's key. Bob knows Carol and also checked her identity. |
56 |
|
|
Then he signed her key. Alice does not know Carol, but he knows Bob and Bob trusts Carol. |
57 |
|
|
And because Alice trusts Bob, at a level she decided before, he also trusts Carol. |
58 |
|
|
It's a transitiv relation. Dave is isolated and does not know anybody for the mentioned reasons, |
59 |
|
|
thus he is not in the WoT. Another very important point is, that the signer can decide, after the |
60 |
|
|
certification, how much he trusts the key owner to certify other keys. |
61 |
twoaday |
224 |
|
62 |
twoaday |
253 |
It is very important to check the identify of a key owner. Mostly this is done by comparing the |
63 |
|
|
fingerprint, which were submitted by phone or written down at a personal meeting, with the |
64 |
|
|
fingerprint of the key in the keyring. Please bear in mind that anybody can create a key with an |
65 |
|
|
email address and a specific name. |
66 |
|
|
Thus it is not recommend to sign keys without doing this check before! |
67 |
twoaday |
224 |
|
68 |
twoaday |
253 |
The fingerprint of the key is hexadecial (160-bit) sequence divided into 10 groups of 4 hex |
69 |
|
|
digits. You can get the fingerprint of a key by opening the key property dialog. There you can |
70 |
|
|
mark the fingerprint and copy it to the clipboard. The fingerprint of a key can be compared |
71 |
twoaday |
231 |
to human fingerprints, it is unique for each key. |
72 |
twoaday |
224 |
|
73 |
|
|
Example: 1D75 8108 5BC9 D9FB E78B 2078 ED46 81C9 BF3D F9B4 |
74 |
|
|
|
75 |
twoaday |
227 |
It is a good idea to publish your fingerprint wherever possible. |
76 |
|
|
For example via a business card or your website. |
77 |
|
|
|
78 |
twoaday |
222 |
@section Installation of the Program |
79 |
|
|
|
80 |
twoaday |
253 |
It is always recommend to use the latest version of the program. You can download it from |
81 |
|
|
http://wald.intevation.org/projects/winpt. Download the zip file with the binaries inside and |
82 |
|
|
unpack them in a folder. All files need to be in the same folder, so if you change the folder do |
83 |
|
|
not forget to move all files. |
84 |
|
|
You should also download and verify the signature of the packet to make sure that the release is |
85 |
|
|
really authentic and were not altered in any way. |
86 |
twoaday |
222 |
|
87 |
twoaday |
253 |
To activate the program you just need to start WinPT.exe. You should now see a |
88 |
|
|
little (golden key) icon in the taskbar which indicates that the program is running. |
89 |
|
|
If you want to quit the program, right click on the symbol and select "Exit". |
90 |
twoaday |
222 |
|
91 |
twoaday |
253 |
Alternative, you may use one of the graphical GPG installers which are available on the internet. |
92 |
|
|
I recommend to use Gpg4Win which includes a set of very useful privacy tools, beside WinPT and it |
93 |
|
|
is very easy to use with an average size (~4MB). For non-German speaking users, I recommend the |
94 |
|
|
light version because it does not contain the 2 German PDF manuals. |
95 |
twoaday |
222 |
|
96 |
|
|
@subsection Configure the Program |
97 |
twoaday |
253 |
After the installation not much of the default settings need to be changed. If you prefer a |
98 |
|
|
special keyserver, it is propably a good idea to open the keyserver dialog and to set one of the |
99 |
|
|
existing keyservers as the default or create a new entry and mark it as the new default. |
100 |
|
|
The default keyserver is subkeys.pgp.net, which is the best choice for most users. |
101 |
twoaday |
222 |
|
102 |
twoaday |
253 |
@subsection The GPG Preference Dialog |
103 |
|
|
In this dialog you can change your GPG config and customize its behaviour. Please be advised that |
104 |
|
|
in most cases there is no need to overwrite the default GPG path settings. |
105 |
|
|
There are three different paths available. First, the GPG home directory. The place where the |
106 |
|
|
keyrings are stored and also the config files. The second path points directly to the gpg.exe. |
107 |
|
|
The third is the path to the language files, |
108 |
|
|
where you usually store your winpt.mo/gpg.mo files. These entries should be only changed when |
109 |
|
|
really need and extra caution is needed because with wrong settings, WinPT will not be able to |
110 |
|
|
work any longer! |
111 |
twoaday |
222 |
|
112 |
twoaday |
253 |
The second part of the dialog is the "General GPG options" section. Here you can influence the |
113 |
|
|
behaviour of some commands. If you do not know what they mean, it is safe not to change the |
114 |
|
|
values and stick with the default ones. |
115 |
|
|
For expert users, it is possible to set the signature class of issued key signatures and to set |
116 |
|
|
an expiration date for key signatures or to specify an comment in armor files. |
117 |
|
|
The "Encrypt to this key" might be useful for anybody who needs to decrypt mails or any data he |
118 |
|
|
sent to a recipient. The field value should contain the key ID of the default key pair. |
119 |
|
|
|
120 |
twoaday |
222 |
@subsection Preferences |
121 |
twoaday |
253 |
In the WinPT preference dialog, the user can modify and/or disable the default options. For new |
122 |
|
|
users it is suggested to leave the default values as they are, except when there are problems |
123 |
|
|
related to the hotkeys. |
124 |
twoaday |
222 |
|
125 |
twoaday |
253 |
To enable keyring backups, the user can either decide to use the GPG home directory as the backup |
126 |
|
|
folder or any other folder. In the latter case, a folder needs to be chosen. |
127 |
twoaday |
260 |
The program makes the backup before it terminates and thus it is very important that the keyrings |
128 |
|
|
are stil accessable at this moment. For example if you use an USB flash drive to store your keyrings, |
129 |
|
|
you should unplug it after the the icon disappeared at the task bar. |
130 |
|
|
By default the secret keyring will not be backuped, if you wish that the secret keyring should be |
131 |
|
|
also backuped, and this usually means the backup folder cannot be accessed by other people, you need |
132 |
|
|
to mark "Backup includes secret keyring". |
133 |
twoaday |
222 |
|
134 |
twoaday |
256 |
@subsection Getting the Source of the Program |
135 |
|
|
As free software, according to the GNU General Public License, WinPT also offers the source code |
136 |
|
|
for the program. It can be used for reviews, to compile your own binary and/or to modify and/or |
137 |
|
|
redistribute it or just to learn how it works. The source is available at the same place you |
138 |
|
|
downloaded the binary. If not, you should contact the author of the site. |
139 |
|
|
The entire program can be build with free software; the default environment is a cross-compiler |
140 |
|
|
hosted on a Linux box. All you need is the mingw32 packages, a working autoconf environment |
141 |
|
|
and the libs WinPT depends on (currently gpgme and libgpg-error). |
142 |
|
|
It is also possible to build the binary with cygwin/mingw32 on Windows but this environment is |
143 |
|
|
not actively supported and propably needs adjustment of the source. |
144 |
|
|
|
145 |
|
|
|
146 |
|
|
@section Native Language Support |
147 |
|
|
|
148 |
|
|
The program has the ability to select different languages to provide dialogs and error messages |
149 |
|
|
in the native language of the user. Currently German, Japanese, Portuguese (Brazil) and Slovak. |
150 |
|
|
When WinPT has been installed via a graphical installer, for example Gpg4Win, the language was |
151 |
|
|
automatically selected based on the locale Windows environment. If the stand-alone binary was |
152 |
|
|
downloaded, WinPT offers at the first start to select a language, based on the .mo file it |
153 |
|
|
founded in the current directory. |
154 |
|
|
Otherwise the user needs to perform the following steps. The WinPT ZIP archive contains various |
155 |
|
|
.mo files (de.mo, jp.mo, sk.mo) and the user needs to find his native language, if available and |
156 |
|
|
rename the file to "winpt.mo". For example, if the user prefers German, "de.mo" -> "winpt.mo". |
157 |
|
|
Now the user needs to save the locale dir, where the winpt.mo is stored, in the GPG preference dialog. |
158 |
|
|
|
159 |
twoaday |
222 |
@section The First Start |
160 |
twoaday |
225 |
|
161 |
twoaday |
253 |
This section is only important for people who never installed and/or used WinPT before and thus |
162 |
|
|
no keyrings are available. |
163 |
twoaday |
222 |
|
164 |
twoaday |
253 |
When the program is started the first time, it offers two choices. The one is to generate a key |
165 |
|
|
pair and the other is to copy existing GPG keyrings into the current installation. |
166 |
twoaday |
222 |
|
167 |
|
|
We assume the user will select the first entry. |
168 |
|
|
|
169 |
twoaday |
253 |
Now a new dialog is shown which requests some information from the user to allow a meaningful |
170 |
|
|
association between the key and the user. If the user prefer RSA keys, the check box should be |
171 |
|
|
marked. |
172 |
|
|
But this is a decision of personal taste and does not influence the security or anything else. |
173 |
|
|
If the entered data is OK, WinPT then generates a new key pair. As long as this step takes, a |
174 |
|
|
progress dialog is shown to indicate the enduring process. When the generation of the keypair is |
175 |
|
|
done, WinPT offers the chance to backup the existing keyrings. |
176 |
|
|
This is definitely an important decision because if the keyring will get corrupted or lost, there |
177 |
|
|
is no way to recover the encrypted data. That is why it is also important to store the backup, at |
178 |
|
|
least of the secret keyring, at a @strong{safe} place. |
179 |
twoaday |
222 |
|
180 |
twoaday |
256 |
@subsection Use existing Keyrings and/or Keys |
181 |
|
|
If you already have a valid OpenPGP key pair and you do not want to generate a new key pair, you |
182 |
|
|
should select the second choice at the first start. Then the program will copy your existing keyrings |
183 |
|
|
to the new home directory. Please bear in mind that you need to set the ownertrust manually for each |
184 |
|
|
imported key. You can skip this step if you exported the ownertrust manually to a file, but because |
185 |
|
|
this is a step for experienced users it is not described here. The most important step is, to set |
186 |
|
|
your own key to ultimate ownertrust after import. |
187 |
|
|
|
188 |
|
|
If you have other OpenPGP programs and you wish to use the keys from this application, it is a good |
189 |
|
|
idea to select all keys you want to use and to export them into a single file. Then open the WinPT |
190 |
|
|
Key Manager and drag the file into the Key Manager window. |
191 |
|
|
|
192 |
twoaday |
246 |
@section The Passphrase for the Secret Key |
193 |
|
|
|
194 |
twoaday |
253 |
First a short explaination what passphrase is. A passphrase is like a password but usually |
195 |
|
|
longer, maybe a sentence, which can consists of any 7-bit ASCII characters. It is used to protect |
196 |
|
|
your secret key and thus it is very import to chose a secure passphrase. If your computer, and |
197 |
|
|
thus the secret key, were stolen and an attacker can guess your passphrase he is able to decrypt |
198 |
|
|
all your data and to create signatures in your name! A good passphrase is difficult to guess but |
199 |
|
|
easy to remember and should be at least 10 characters long. |
200 |
|
|
An easy way to generate a strong passphrase is to use a sentence only you know but you can easily |
201 |
|
|
remind and then take the first letter of each word, plus some special characters and maybe even |
202 |
|
|
some intentionally made spelling mistakes. |
203 |
|
|
|
204 |
twoaday |
246 |
Example: Row - row - row your boat, gently down the stream |
205 |
twoaday |
256 |
Passphrase: "R - r - ryb,gdts" |
206 |
twoaday |
246 |
|
207 |
twoaday |
260 |
Never write down your passphrase or share it among other people! |
208 |
twoaday |
246 |
|
209 |
twoaday |
222 |
@section Keyserver Access |
210 |
twoaday |
225 |
|
211 |
twoaday |
253 |
An easy way to retrieve keys is the keyserver. You can think of it like a huge database with a |
212 |
|
|
lot of keys as its content. It is possible to search keys by a pattern, a keyid or even a |
213 |
|
|
fingerprint. |
214 |
|
|
WinPT allows to access different kind of keyservers. For example LDAP, HKP, Finger and HTTP. |
215 |
|
|
But the focus will be set on HKP because this is the common case. |
216 |
twoaday |
222 |
|
217 |
twoaday |
253 |
In some situations WinPT asks the user whether to retrieve keys automatically. One example is the |
218 |
|
|
signature verification when the key that issued the signature was not found in the keyring. |
219 |
twoaday |
222 |
|
220 |
twoaday |
253 |
The main keyserver dialog allows to fetch one or more keys directly or to search for a given pattern. |
221 |
twoaday |
222 |
|
222 |
|
|
@subsection Retrieve a key by Key ID |
223 |
twoaday |
224 |
The best way to fetch a key from the server is by the key ID. |
224 |
twoaday |
253 |
Just enter the key ID, it is a good idea to prefix it with 0x, and click the "Receive" button. |
225 |
twoaday |
222 |
|
226 |
twoaday |
224 |
An example: |
227 |
|
|
|
228 |
|
|
pattern: 0xBF3DF9B4 |
229 |
|
|
|
230 |
|
|
[Receive] |
231 |
|
|
|
232 |
|
|
|
233 |
twoaday |
222 |
@subsection Retrieve a key by its email address |
234 |
twoaday |
253 |
If you only know the email address from your partner, you can enter it instead of the key ID. |
235 |
|
|
It is unlikely but possible that there are more keys with the same address. In this situation, |
236 |
|
|
WinPT will warn you that multiple keys were imported. The difference to the search function is, |
237 |
|
|
that the keys were dirctly fetched and not displayed as a key result list. |
238 |
twoaday |
222 |
|
239 |
twoaday |
224 |
|
240 |
|
|
An example: |
241 |
|
|
|
242 |
|
|
pattern: name_of_friend@@gmx.net |
243 |
|
|
|
244 |
|
|
[Receive] |
245 |
|
|
|
246 |
|
|
|
247 |
twoaday |
222 |
@subsection Search for a key by pattern |
248 |
twoaday |
253 |
If you want to communicate with a new mail partner and you are not sure about the key ID, it can |
249 |
twoaday |
256 |
be useful to search for his email address. This address is considered as quite unique. |
250 |
|
|
Not all keyserver support this query mode, so if you get an error please use subkeys.pgp.net. |
251 |
twoaday |
222 |
|
252 |
|
|
An example: |
253 |
|
|
|
254 |
twoaday |
224 |
pattern: winpt@@windows-privacy-tray.com |
255 |
twoaday |
222 |
|
256 |
|
|
[Search] |
257 |
|
|
|
258 |
twoaday |
253 |
Now a dialog is opened with a list of all keys which matched the search string. If the name |
259 |
|
|
@strong{and} the email address is known, the matching key should be selected and "Receive" |
260 |
|
|
should be clicked. Then the key will be downloaded and added to your keyring. Now you can encrypt |
261 |
|
|
data with this key, for example an email. |
262 |
twoaday |
222 |
|
263 |
twoaday |
256 |
|
264 |
twoaday |
224 |
@subsection Sending a Key to the Keyserver |
265 |
twoaday |
253 |
After you generated a new key pair, it is a good idea to send your key to the keyserver to make |
266 |
|
|
it available for other users. If you issue a signature, the key ID is part of the signature and |
267 |
|
|
people can automatically retrieve your key when they try to verify the signature. |
268 |
twoaday |
222 |
|
269 |
twoaday |
253 |
Actually, the action is performed in the Key Manager and not in the keyserver dialog. Just open |
270 |
|
|
the Key Manager, select the key you want to send right-click on it and chose "Send to Keyserver" |
271 |
|
|
in the popup menu. Then a message box with the result is shown. |
272 |
twoaday |
224 |
|
273 |
|
|
@subsection Add, Delete or Edit a Keyserver Entry |
274 |
twoaday |
253 |
The keyserver dialog allow to change the existing keyserver entries, to delete them or to add new |
275 |
|
|
entries. Just right click on a selected item and a popup menu will be |
276 |
|
|
shown with ("Edit", "Remove" and "New"). |
277 |
twoaday |
224 |
|
278 |
|
|
@section Using the Clipboard |
279 |
twoaday |
225 |
|
280 |
twoaday |
253 |
A major aim from the first day was, that the program does not depend on a special mailer client. |
281 |
|
|
For this reason it uses the clipboard to encrypt and/or sign data. |
282 |
|
|
For the examples, let's assume that you want to write a new mail or that you received a mail |
283 |
|
|
protected by GnuPG. |
284 |
twoaday |
224 |
|
285 |
twoaday |
253 |
@subsection The Clipboard Editor |
286 |
|
|
This dialog allows it to modify the clipboard contents directly and/or to display the contents of |
287 |
|
|
the clipboard. It is also possible to load a text file into the clipboard or store the contents |
288 |
|
|
into a file. For the convenience, the dialog also allows to encrypt and/or decrypt clipboard data. |
289 |
|
|
|
290 |
twoaday |
224 |
@subsection Encrypt Data in the Clipboard |
291 |
twoaday |
253 |
Just copy the text from the mailer window into the clipboard. This is usually done by CTRL+C, |
292 |
|
|
make sure you really selected all portions of the text. Then right-click on the tray icon and |
293 |
|
|
select Clipboard->Encryption. Now a dialog is shown to select the recipients. This means you need |
294 |
|
|
to select all keys which should be able to decrypt the mail. Confirm with "OK". GnuPG now |
295 |
|
|
encrypts the data with the selected recipients. At the end a message box with the result is |
296 |
|
|
shown. Now the clipboard should contain the encrypted data. Just paste it into the mailer window. |
297 |
|
|
The output should contain a header and a footer "BEGIN PGP MESSAGE" and "END PGP MESSAGE. |
298 |
twoaday |
224 |
|
299 |
|
|
@subsection Decrypt/Verify Data from the Clipboard |
300 |
twoaday |
253 |
The most common case is propably that you got a signed email and now you want to verify it. For |
301 |
|
|
this procedure, you have to copy the entire signature in the clipboard. The easiest way is to |
302 |
|
|
use CTRL+A and CTRL+C, then all available text will be copied. WinPT (GnuPG) is smart enough to |
303 |
|
|
figure out the signature related data. Now go to the taskbar, display the popup menu and select |
304 |
|
|
Clipboard->Decrypt/Verify. Now a new dialog, the verify dialog, should be available on screen |
305 |
|
|
with all information about the signature. For example who is the signer, when was it signed how |
306 |
|
|
much do you try this key and what was signed and most important, the status of it (is the |
307 |
|
|
signature good or BAD). |
308 |
|
|
A special case is when you don't have the public key to verify the signature, if this happens |
309 |
|
|
WinPT offers to download the key from the default keyserver. If the key was not found, the |
310 |
|
|
procedure is aborted because without the key the sig cannot bed checked. |
311 |
twoaday |
224 |
|
312 |
|
|
@subsection Sign the Clipboard |
313 |
twoaday |
253 |
We assume that text that shall be signed is already in the clipboard. If not, select the text you |
314 |
|
|
want to sign and copy with via CTRL+C in the clipboard. Now go to the taskbar and open the peopup |
315 |
|
|
menu, Clipboard->Sign. If you just have one secret key, the passphrase dialog will be automatically shown. |
316 |
|
|
All you need is to enter your passphrase and confirm. In case of more available secret keys, a |
317 |
|
|
list with all keys is shown and you can select which key shall be used for signing. |
318 |
|
|
The output is always a cleartext signature which is in text format. Do not try to sign binary |
319 |
|
|
clipboard data, the result would be unpredictable and not readable by human beings. |
320 |
twoaday |
224 |
|
321 |
twoaday |
232 |
@section The Current Window Support |
322 |
twoaday |
253 |
Compared to the clipboard mode, the CWS mode has some advantages. Let us assume that you want to |
323 |
|
|
extract text from an editor window. With the CWS mode, the program automatically tries to focus |
324 |
|
|
the window to select the text and to copy it to the clipboard and execute the |
325 |
twoaday |
256 |
selected command (Sign, Encrypt, Decrypt) and pastes back the GPG data to the window. |
326 |
twoaday |
253 |
No manual user interaction is needed. Except this different behaviour, it is very likewise to the |
327 |
|
|
clipboard mode and thus we do not describe each command again. |
328 |
twoaday |
232 |
|
329 |
twoaday |
263 |
But due to the nature of this mode, it is possible that some kind of windows are not supported. |
330 |
|
|
Which means that the program cannot extract the text from the window. There is nothing we can do |
331 |
|
|
about it, because it depends on the application itself how it reacts on certain Window messages. |
332 |
|
|
But all windows which support the default copy/paste/select all commands should make no problems. |
333 |
|
|
|
334 |
twoaday |
224 |
@section The Key Manager |
335 |
twoaday |
225 |
|
336 |
twoaday |
253 |
This part of the program is propably most important for many users. It contains function to |
337 |
|
|
manage your keyring and to perform actions which are required and/or useful in the OpenPGP environment. |
338 |
twoaday |
224 |
|
339 |
|
|
@subsection Tips |
340 |
|
|
|
341 |
|
|
@itemize @bullet |
342 |
|
|
|
343 |
|
|
@item |
344 |
twoaday |
263 |
If you want to start the Key Manager directly, you can create a batch |
345 |
|
|
file with "winpt.exe --keymanager". This way you do not have to go to |
346 |
|
|
the task bar enable the icon and click on the Key Manager entry in the menu. |
347 |
|
|
|
348 |
|
|
@item |
349 |
twoaday |
253 |
If you want to import quickly a key from a into the keyring, just drag and drop the file into the |
350 |
|
|
Key Manager window. Then the import procedure will be automatically started. |
351 |
twoaday |
224 |
|
352 |
|
|
@item |
353 |
twoaday |
253 |
Key which were fetched from keyservers often contain a lot of, maybe obsolete, self signatures, |
354 |
|
|
if you want to get rid of them you can use the Key Edit->Clean feature. Just start the edit |
355 |
twoaday |
224 |
dialog and select the clean command. That's it. |
356 |
|
|
|
357 |
|
|
@item |
358 |
twoaday |
253 |
The keyserver dialog does not allow to import a key directly via an URL, as an alternative you |
359 |
|
|
may use the "Import HTTP..." feature in the Key Manager. With it you can directly fetch keys |
360 |
twoaday |
224 |
from the web (Example: http://www.users.my-isp.de/~joe/gpg-keys.asc). |
361 |
|
|
|
362 |
|
|
@item |
363 |
twoaday |
253 |
To customize the parameters of the generated key, you can use the expert key generation. |
364 |
|
|
It allows you to set the public key algorithm and/or the size of the key directly. |
365 |
twoaday |
224 |
|
366 |
twoaday |
225 |
@item |
367 |
twoaday |
253 |
Most of the list view based dialogs allow to use the right mouse button, to show popup menus with |
368 |
|
|
available commands. |
369 |
twoaday |
225 |
|
370 |
twoaday |
224 |
@end itemize |
371 |
|
|
|
372 |
twoaday |
225 |
@subsection Create a Revocation Certificate |
373 |
twoaday |
253 |
It is very important to do this step early as possible. With this certificate, you can revoke |
374 |
|
|
your entire key. The reason for this can be for example, that your key is no longer used or even |
375 |
|
|
compromised. |
376 |
|
|
After you generated the revocation cert, you should move it to a secure place because anybody who |
377 |
|
|
gets access to it, can render your key unuseable. |
378 |
twoaday |
225 |
|
379 |
twoaday |
253 |
Just right-click on your key and select "Revoke Cert". If you do this step directly after key |
380 |
|
|
generation, there is no need to change the default values. Just select a file name and enter the |
381 |
|
|
passphrase. The program issues a warning which should be read carefully. |
382 |
twoaday |
225 |
|
383 |
twoaday |
227 |
@subsection Adding a new Secondary Key |
384 |
twoaday |
253 |
For most users the existing keys in the key pair are enough and no extra key is needed. But there |
385 |
|
|
are some exceptions. |
386 |
twoaday |
222 |
|
387 |
|
|
@itemize @bullet |
388 |
|
|
|
389 |
|
|
@item |
390 |
twoaday |
253 |
The primary key has no secondary key and the primary key is not able to encrypt data. In this |
391 |
|
|
case it can be a good idea to add a secondary encryption key. |
392 |
twoaday |
222 |
|
393 |
|
|
@item |
394 |
twoaday |
253 |
A lot of people use secondary encryption keys with an expiration date. Usually the key is valid |
395 |
|
|
for 1-2 years. After the key is expired, a new key is needed in order to encrypt data. |
396 |
twoaday |
222 |
|
397 |
|
|
@end itemize |
398 |
|
|
|
399 |
twoaday |
253 |
What kind of public key algorithm should be selected is a matter of taste. RSA and ElGamal are |
400 |
|
|
both capable for encryption. For most users it's a good idea to let the program chose the key |
401 |
|
|
size (in bits). The default settings should be secure enough for most purposes. |
402 |
twoaday |
222 |
|
403 |
twoaday |
227 |
@subsection Adding a new User ID |
404 |
twoaday |
253 |
If you got a new email account, it's propably a good idea to add these new account to your key |
405 |
|
|
also. For example: |
406 |
twoaday |
222 |
|
407 |
twoaday |
253 |
A new account was registed at gmail.com (john.doo@@gmail.com). |
408 |
twoaday |
222 |
Then you should create a new user ID with the following fields: |
409 |
|
|
|
410 |
|
|
name: John Doo |
411 |
|
|
|
412 |
|
|
email: john.doo@@gmail.com |
413 |
|
|
|
414 |
|
|
comment: (optional) |
415 |
|
|
|
416 |
twoaday |
253 |
Now email programs are able to associate this address with your key when somebody wants to send |
417 |
|
|
you a protected mail to this account. |
418 |
twoaday |
222 |
|
419 |
twoaday |
227 |
@subsection Adding a new Photographic ID |
420 |
twoaday |
253 |
With this function you can add a photo to your public. It will be displayed in the key property |
421 |
|
|
dialog. |
422 |
twoaday |
222 |
|
423 |
twoaday |
253 |
You just need to select a JPEG file which contains the photo and enter your passphrase and |
424 |
|
|
confirm with OK. Please read the note in the dialog carefully to make sure the photo has a proper |
425 |
|
|
size (file, height and weight). |
426 |
twoaday |
222 |
|
427 |
twoaday |
227 |
@subsection Adding a new Designated Revoker |
428 |
twoaday |
253 |
If you want to allow another key to revoke your own key, this might be useful if you lost your |
429 |
|
|
secret or a simliar situation, you can use this function to add a designated revoker to your key. |
430 |
twoaday |
222 |
|
431 |
twoaday |
253 |
All you need to do is to select the key you want to add as a desig revoker. But please bear in |
432 |
|
|
mind that this procedure cannot be undone and that this person really has the power to make your |
433 |
|
|
public key unuseable. You really should trust the selected key, in case it is not a key owned by yourself. |
434 |
twoaday |
222 |
|
435 |
twoaday |
226 |
@subsection Export a Public Key |
436 |
twoaday |
253 |
There are several reason why to export a public key and there are also several ways to do it. If |
437 |
|
|
you want to send the key directly to a mail recipient, you can select the key, right-click, |
438 |
|
|
and select "Send Key to Mail Recipient". As an alternative, you can also export it to the |
439 |
|
|
clipboard or to a file. To export a key to the clipboard, you can select "Copy key to Clipboard" |
440 |
|
|
in the popup menu of the selected key. To export it to a file, you need to select the menu "Key" |
441 |
|
|
and then "Export...". The program will automatically suggest a name for the output. |
442 |
twoaday |
226 |
|
443 |
twoaday |
253 |
@subsection Export your Secret Key |
444 |
|
|
This command should be used with caution because it exports your secret key. Please bear in mind |
445 |
|
|
that you should never export your key to a place where it can be accessed by others. |
446 |
|
|
An USB stick or a likewise mobile storage device should be used for the export. |
447 |
|
|
|
448 |
twoaday |
226 |
@subsection Import a Public Key |
449 |
twoaday |
253 |
Similar to the key import, the import of a key can be done in several ways. First, let's assume |
450 |
|
|
you got a mail with an OpenPGP key included as inline text. Then you can use the current window |
451 |
|
|
feature and "Decrypt/Verify" to import the key. Alternative you also may use the clipboard. |
452 |
|
|
To achieve this, you first need to select the entire key (CTRL+A) and then copy it to the |
453 |
|
|
clipboard (CTRL+C), then use the Key Manager (Edit->Paste) to import it. If the key is stored as |
454 |
|
|
an attachment, or you want to import a key from a file in general, just drag the file and drop it |
455 |
twoaday |
226 |
into the Key Manager window or use "Key" -> "Import...". |
456 |
|
|
|
457 |
twoaday |
227 |
@subsection Sign a Public Key |
458 |
twoaday |
253 |
If you verified that a key really belongs to its owner, you should sign the key to integrate it |
459 |
|
|
into your Web of Trust and also to mark the key as valid in your keyring. Do not sign a key you |
460 |
|
|
just got via email with the request to sign it. Anybody can create a key with your (or better ANY) name, |
461 |
|
|
these information are no hint to whom the key really belongs. You can check a key |
462 |
|
|
by meeting or calling the key owner and verify the key fingerprint of the key with the one |
463 |
|
|
published by the key owner. Additional checks should be to watch at his driver license or the |
464 |
|
|
identity card to make sure that name of the key matches the name of the key owner. After this |
465 |
|
|
procedure is done, you can open the Key Manager, select the right key and either use the context |
466 |
|
|
menu "Sign Key" or use the toolbar button. |
467 |
twoaday |
227 |
|
468 |
twoaday |
253 |
The next dialog will summarize the key information and some additional options. For example if |
469 |
|
|
the signature should be local or exportable. Local means the signature will be stripped if you |
470 |
|
|
export the key and no one else except you can use it to calculate the validity. If you mark the |
471 |
|
|
signature exportable, any other user can see and use it. Now you can select the key you want to |
472 |
|
|
use to sign and enter the passphrase. Confirm with "OK" and the key will be signed. Now the validity |
473 |
|
|
of the new key is "Full". It is propably a good idea to set the ownertrust of the key. |
474 |
|
|
For a detailled description, see the chapter "Key Ownertrust". |
475 |
twoaday |
227 |
|
476 |
|
|
@subsection Key Ownertrust |
477 |
twoaday |
253 |
First we should explain what the ownertrust of a key is. The ownertrust is a measurement how much |
478 |
|
|
you trust somebody to certify and check keys of other people. For example, if you know that Bob |
479 |
|
|
is really the owner of the key, you should sign it. But he is also known to sign other keys |
480 |
|
|
without checking the idenity of the other key owner. Values for the ownertrust are |
481 |
|
|
1) Don't Know 2) Don't Trust 3) Marginal 4) Full |
482 |
|
|
and thus you should propably use an ownertrust value like "Marginal". But this is a personal |
483 |
|
|
decision and stored in a separate file and never exported with the public keys. For further |
484 |
|
|
information, please take a look into the GNU Privacy Handbook. |
485 |
|
|
Just a last work on Key Pairs, they are automatically marked as "Ultimate" because the key |
486 |
|
|
belongs to you and you trust it implicit. |
487 |
twoaday |
242 |
|
488 |
twoaday |
253 |
@subsection List Signatures |
489 |
|
|
This dialog contains a list of all signatures of the selected key. The basic dialog, the tree |
490 |
|
|
based version, just shows signatures when the issuer key is in the public keyring. A double click |
491 |
|
|
opens the signature property dialog which contains detailled description about the selected |
492 |
|
|
signature. A dialog which is useful for people who wants to get all information about the key |
493 |
|
|
signatures, can click on the "Edit.." button. |
494 |
|
|
|
495 |
|
|
@subsection Copy Key Information to the Clipboard |
496 |
|
|
Often it is useful to copy parts of the user ID to the clipboard. One example is that you want to |
497 |
|
|
send an email to the key owner or that you want to search the key by the email address or you |
498 |
|
|
want to copy the fingerprint to the clipboard to paste it somewhere else. |
499 |
|
|
This command is available in the popup menu (right click). |
500 |
|
|
|
501 |
|
|
@subsection Delete one or more Keys |
502 |
|
|
To delete a key, or more than one key, you just need to select the keys in the Key Manager and |
503 |
|
|
either select "Delete" or use the toolbar button. |
504 |
|
|
Be careful if you delete a key pair, because you will not be able to decrypt and/or sign data any |
505 |
|
|
longer. In any case you should have a backup of your key pair at a safe place. |
506 |
|
|
|
507 |
|
|
@subsection Re-verify Signatures |
508 |
|
|
After you refreshed or imported a lot of new keys, either from a file or the keyserver, it is a |
509 |
|
|
good idea to re-verify the signature in the keyring. This speeds up listing operations. |
510 |
|
|
|
511 |
twoaday |
260 |
@subsection Refresh one or more Public Keys from the Keyserver |
512 |
|
|
From time to time it can be useful to refresh keys from the keyring. The reason for this is, |
513 |
|
|
that the key might contain new subkeys, user IDs and or new signatures. It is also possible |
514 |
|
|
that the expiration date of a key has been updated or other preferences were changed. And |
515 |
|
|
maybe even the worst case, that a key has been compromised and is now revoked. |
516 |
|
|
If you want to update a single key, select it and right click on it. Then select the item |
517 |
|
|
"Refresh from the Keyserver" in the popup menu. If you do not select any key, the Key Manager |
518 |
|
|
assumes that you want to refresh all keys in the keyring. Please bear in mind that this |
519 |
|
|
can be a lengthy process if you have a lot of keys in your keyring. |
520 |
|
|
|
521 |
twoaday |
253 |
@subsection WinPT Website |
522 |
|
|
If you want to check for updates or general information about the Windows Privacy Tray program, |
523 |
|
|
you can select this menu item. |
524 |
|
|
The WWW webite of WinPT will be loaded in the default browser. |
525 |
|
|
If you want to visit the project website directly, select the "Project Website" entry. |
526 |
|
|
|
527 |
|
|
@subsection The Key Edit Dialog |
528 |
|
|
For the average GPG user, the popup menu of the Key Manager contains all command to manage your |
529 |
|
|
keys. For example to add a key/userid/revoker/photo, just right click on the click and select the |
530 |
|
|
command from the "Add" submenu. |
531 |
|
|
But for advanced users, this dialog contain a lot of extra commands to customize your key. |
532 |
|
|
|
533 |
|
|
The main dialog contains a list of all keys in the first list view box and all user IDs in the |
534 |
|
|
second list view box. The help button gives you a short hint about each command and what it does. |
535 |
|
|
For example you can set the primary user ID via the "primary" command or with "deluid" you can |
536 |
|
|
delete the selected user ID. Please always bear in mind, that most keyserver are not able to |
537 |
|
|
remove user IDs in its database so if another user fetch your 'updated' key from the keyserver |
538 |
|
|
the user ID might be still part of the key. If you want to make an user ID unuseable, you should |
539 |
|
|
revoke it. This is also possible with this dialog. |
540 |
|
|
|
541 |
|
|
@subsection Update your Preferences in the Key Manager |
542 |
|
|
To avoid that the user needs detour to select the taskbar icon, click on it, etc., all |
543 |
|
|
preferences can be changed in the Key Manager via the Edit->Preferences... menu. |
544 |
|
|
|
545 |
twoaday |
242 |
@section The File Manager |
546 |
|
|
|
547 |
|
|
@subsection Introduction |
548 |
twoaday |
253 |
The File Manager is no replacement for an Explorer Extension. If you secure your files frequently |
549 |
|
|
and you want to do this fast and easy, I suggest to install GPGee. It is a program which |
550 |
|
|
integrates itself into the explorer and provide menu entries in the context menu of files and |
551 |
|
|
directory. But the File Manager can be very useful if you just want to decrypt and/or encrypt |
552 |
|
|
some files without additional programs. You can find the File Manager via the symbol in the |
553 |
|
|
taskbar, right click and then "File Manager". |
554 |
twoaday |
242 |
|
555 |
|
|
@subsection An Overview of the GUI |
556 |
twoaday |
253 |
First there are different ways to add (open) files in the Key Manager. The easiest way is to use |
557 |
|
|
drag and drop to add files into the File Manager. Just drag a file from the explorer and drop it |
558 |
|
|
into the File Manager window. The second way is to use File->Open. A dialog opens which is common |
559 |
|
|
for all "File Open" operations in most Windows application. Now you can select one or more files |
560 |
|
|
and confirm. The files will be automatically added to the File Manager window. The main window |
561 |
|
|
consists of a listview with three rows. |
562 |
twoaday |
242 |
|
563 |
twoaday |
253 |
The first row is the status of the file. It can be "ENCRYPTED", "SIGNED", "PUBKEY", "SECKEY", |
564 |
|
|
"SIG" or "UNKNOWN". Dependent on the file status, the File Manager offers different choices. |
565 |
|
|
For example "SIG" enables the verify options in the (popup) menu. "UNKNOWN" is the default for |
566 |
|
|
all plaintext files. |
567 |
|
|
The second row is the file name. And the last row is the status of the operation. It can be |
568 |
|
|
either "", "SUCCESS" or "FAILED". An empty status means no operation was started yet. FAILED |
569 |
|
|
indicates that the GnuPG operation failed. In this case an error message was issued before. |
570 |
twoaday |
242 |
|
571 |
|
|
Now it follows an example: |
572 |
twoaday |
253 |
We assume that user wants to encrypt "c:\My Ideas\GPG GUI.txt". Drag the file from the Explorer |
573 |
|
|
and drop it into the open File Manager, the main window. The file will be added and recognized |
574 |
|
|
as "UNKNOWN". Now we select the file and right click, a popup menu is shown and we select |
575 |
|
|
"Encrypt". An new dialog is opened which looks similar to the Clipboard Encryption dialog. |
576 |
|
|
Just select the recipients and confirm. In contrast to clipboard encryption, file encryption |
577 |
|
|
offers some more extra options. They are described later. And hour glass will be shown as long as |
578 |
|
|
GnuPG takes to encrypt the file. When the procedure is done, the third row should be change |
579 |
twoaday |
242 |
to "SUCCESS" and the first row to "ENCRYPTED". |
580 |
|
|
|
581 |
twoaday |
263 |
@subsection Verify Detached Signatures |
582 |
|
|
Most of the signature are detached, which means that the signature is separated from the data. |
583 |
|
|
Usually you need to verify a detached signature when you have downloaded a software package or |
584 |
|
|
an update of it. The steps to verify such a signature are easy. Just open the File Manager and |
585 |
|
|
drag the detached signature in the File Manager window. |
586 |
|
|
Now select the signature and select "Verify" either via the popup menu or the File menu. |
587 |
|
|
In most cases you propably need to download the verification key, before you can verify the signature. |
588 |
|
|
|
589 |
twoaday |
242 |
@subsection General Options |
590 |
twoaday |
253 |
Now we describe the general options which are possible in some File Manager dialogs. |
591 |
twoaday |
242 |
|
592 |
|
|
@itemize |
593 |
|
|
|
594 |
|
|
@item Text Output |
595 |
twoaday |
253 |
When this option is checked, the output will be encoded in ASCII armor. This can be useful if the |
596 |
|
|
file should be transfered via email. The size of the output file is larger than the usual binary |
597 |
|
|
output. |
598 |
twoaday |
242 |
|
599 |
|
|
@item Wipe Original |
600 |
twoaday |
253 |
If this option is checked, the original file will be deleted after successfull encryption. |
601 |
|
|
This can be useful if data should not be available in plaintext any longer on a machine. |
602 |
twoaday |
242 |
|
603 |
|
|
@end itemize |
604 |
|
|
|
605 |
twoaday |
256 |
|
606 |
|
|
@section A short Note about Cryptographic Issues |
607 |
|
|
|
608 |
|
|
WinPT itself does not perform any real encryption, signing or decryption. Instead it uses |
609 |
|
|
GPG as the backend program which provides all kind of cryptographic code to perform the |
610 |
|
|
needed operations. |
611 |
|
|
|
612 |
|
|
The default values WinPT uses for key sizes, should be sufficient for personal and commercial |
613 |
|
|
security for the next years. If you are concerned about the default values, you can always use |
614 |
|
|
the expert key generation to make your own decision. GPG also provides |
615 |
|
|
default values for symmetric cipher preferences. By default, the AES (Advanced Encryption Standard) |
616 |
|
|
is used which provides a very good security. You can manually modify your key preferences, this |
617 |
|
|
includes cipher, hash, and compression but usually this is not necessary and also can do harm if |
618 |
|
|
you use algorithms which are not very widespread among other OpenPGP programs. |
619 |
|
|
|
620 |
|
|
@section WinPT and Personal Firewalls |
621 |
|
|
|
622 |
|
|
Because the program uses a global hook to remember the last active current window, it might be |
623 |
|
|
possible that Firewalls warn that the process contains a global hook which is a potential |
624 |
|
|
security risk. In some cases, there might be even a warning that key logging is possible. |
625 |
|
|
This is a false alarm because the hook provided by the program, a CTB (Computer Based Training) |
626 |
|
|
hook, can be only used to save handles of newly created windows, or windows which are |
627 |
|
|
activated or in case of a focus change. Details can be found in the source code of the program |
628 |
|
|
or additional information about the CTB hook at msdn.microsoft.com |
629 |
|
|
|
630 |
|
|
To provide access to keyservers and to download HTTP keys, the program |
631 |
|
|
needs to be able to make outbound connections to the following ports: 80 (http), 11371 (keyserver) |
632 |
|
|
|
633 |
|
|
@subsection Using a HTTP Proxy |
634 |
|
|
If you are behind a firewall and you have no chance make a connection to a keyserver, maybe |
635 |
|
|
because of a policy, you can use a http proxy for outbound connections. Open the Keyserver dialog |
636 |
|
|
and click on the button "Change Proxy". A new dialog opens where you can enter the proxy specific |
637 |
|
|
host name and ports. If the proxy requires authentication, you also have to provide your user name |
638 |
|
|
and your password. Please bear in mind that only a base64 authentication is supported and no other |
639 |
|
|
proxy types (SOCKS for example) can be used. |
640 |
|
|
|
641 |
|
|
|
642 |
twoaday |
253 |
@section Reporting a Problem (Bug) or a Feature Request |
643 |
|
|
|
644 |
|
|
For the case that you have problems with the program, that includes crashes or or the handling, |
645 |
|
|
please first check the forum at http://wald.intevation.org to see if someone else reported and/or |
646 |
|
|
wrote about the issue. It is possible that the issue is already solved/answered in the forum. |
647 |
|
|
Plus all other users can benefit of it because maybe another person has the same problem and then |
648 |
|
|
he can check the forum and will find the answer. |
649 |
|
|
|
650 |
|
|
Feature requests can be submitted at the same site in a different tab (Tracker->Feature Request). |
651 |
|
|
There is no guarantee that the request will be implemented in the next version. The reason is, |
652 |
|
|
that other issues might be more important or that the request must be first discussed with other |
653 |
|
|
developers. But each request will be considered. |
654 |
|
|
|
655 |
|
|
For the case that you found a bug, it is very important to provide much details as possible to |
656 |
|
|
allow the developers to track down the problem and to fix it easily. Please do not forgot to be |
657 |
|
|
precise as possible and the best idea is to provide a step-by-step text to reproduce the problem. |
658 |
|
|
|
659 |
|
|
@section Problem with the Program or an unexpected Behaviour |
660 |
|
|
|
661 |
|
|
First let me say that it is very important always to use the newest version. Each new version |
662 |
|
|
contains bug fixes and might also fix usability issues. This is also valid for GPG, WinPT |
663 |
|
|
checks that the minimum GPG version is available but even so it is important and often useful to |
664 |
|
|
have the newest GPG version if this is possible. |
665 |
|
|
|
666 |
|
|
But sometimes the problem is not the software itself, but the software which was involved to |
667 |
|
|
transfer the data. Here are some examples of what could happen: |
668 |
|
|
|
669 |
|
|
- The downloaded file could be broken (FTP ascii->binary issue) and thus WinPT is unable to |
670 |
|
|
verify the signature. In this case you should download the file again. |
671 |
|
|
|
672 |
|
|
- A mailer broke the signature because the line endings were altered or the mail text was wrapped |
673 |
|
|
after the signature was issued. There is no solution to this problem, except to use |
674 |
|
|
a smart Mail Client. |
675 |
|
|
|
676 |
|
|
- A public key (file or clipboard) will not be recognized but the data should definitely contain |
677 |
|
|
one or more keys. Sometimes line endings are messed up or white spaces were removed. In |
678 |
|
|
this case GPG/WinPT is not able to detect when the data begins and the header section starts. |
679 |
|
|
You can use the clipboard editor to see if the ascii armor is broken. If this happened, the |
680 |
|
|
file must be repaired manually or should be sent again. |
681 |
|
|
|
682 |
|
|
- WinPT reports that the key could not be imported because of missing self signature or a |
683 |
|
|
likewise message. To make sure that the receiver can really verify the key belongs to its |
684 |
|
|
owner, the key carries a self signature which can be checked by anybody. Some PGP 2.6 version |
685 |
|
|
do not issue this self signature and some other PGP versions might be also able to |
686 |
|
|
supress its generation. Such a key cannot be used, even if the import were forced. The solution |
687 |
|
|
to this problem is easy but sometimes not possible. Ask the key issuer to self sign his key and |
688 |
|
|
to upload it to the keyserver or send it again. |
689 |
|
|
But sometimes companies have a policy and thus newly generated keys are not self signed. I do |
690 |
|
|
not know what to do in this case except for asking if it would be possible to sign a copy of |
691 |
|
|
the key. |
692 |
|
|
|
693 |
|
|
- You received a message from a user which uses PGP and WinPT/GPG will not be able to decrypt it. |
694 |
|
|
First let me say that this should happen very seldom with newer (PGP >= 7) versions of PGP. |
695 |
|
|
The reason could be, that IDEA has been used. A patented Cipher which is not included in GPG. |
696 |
|
|
GPG will not be able to decrypt the data because it has been ciphered with IDEA. There is no |
697 |
|
|
solution for this problem, except to use the IDEA plug-in. But be advised that the IDEA |
698 |
|
|
algorithm is only free for private use and NOT for commercial mails. |
699 |
|
|
|
700 |
|
|
Another problem could be, that your files cannot be automatically decrypted by the receiver |
701 |
|
|
(who uses PGP) because the file extension of it is .GPG. You can solve this problem by changing |
702 |
|
|
the default extension in the WinPT preferences from .GPG to .PGP. |
703 |
|
|
|
704 |
|
|
To minimize the change of problems when you communicate with a PGP user, you can add "pgp8" or |
705 |
|
|
"pgp7" to your gpg.conf. This can be done via the Key Manager |
706 |
|
|
->Edit->Preferences...->GPG Config Preferences. |
707 |
|
|
|
708 |
|
|
|
709 |
|
|
@section How can I help the Project |
710 |
|
|
|
711 |
|
|
There are several ways to help the project. For example you could provide (or work on) the |
712 |
|
|
existing documentation or write new docs. You could translate WinPT into a new language or |
713 |
|
|
maintain an existing language file. Of course it is also possible to contribute code or to |
714 |
|
|
become part of the WinPT developer crew. |
715 |
|
|
|
716 |
|
|
@subsection What I need for Development |
717 |
|
|
First, you need a Windows C-compiler and knowledge how to use the tools and the Win32 API. There |
718 |
|
|
is no need to use MS-Visual C, you can use Ming-W32 (gcc) and a free IDE to hack some code. |
719 |
|
|
The default building environment is a mingw32 hosted on Linux and it produces W32 executables. |
720 |
|
|
|
721 |
|
|
If you plan to contribute some code or to work on an item from the TODO file, please contact me |
722 |
|
|
first to make sure no one else is working on it and that and we can discuss the details. |
723 |
|
|
|
724 |
|
|
@section Closing Words |
725 |
|
|
Please remember that currently the core WinPT crew is just me and thus it might take some time to |
726 |
|
|
respond to forum messages, and mails. If my spare time allows it, I try to respond quick as |
727 |
|
|
possible. But as a free software project, I do most coding in my spare time and I can't guarantee |
728 |
|
|
anything. If you need commercial support for WinPT or GPG in general, |
729 |
|
|
please contact g10 Code GmbH. |
730 |
|
|
|
731 |
twoaday |
222 |
@bye |