/[winpt]/trunk/doc/winpt.texi
ViewVC logotype

Diff of /trunk/doc/winpt.texi

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 222 by twoaday, Thu Jun 1 08:30:46 2006 UTC revision 232 by twoaday, Tue Jun 20 09:29:59 2006 UTC
# Line 8  This file is free under the terms of the Line 8  This file is free under the terms of the
8    
9  Copyright (C) 2006 Timo Schulz  Copyright (C) 2006 Timo Schulz
10    
11  Version 0.0.0  Version 0.2.0
12    
13  @settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows  @settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows
14    
# Line 24  You need at least Windows 98/2K/XP, but Line 24  You need at least Windows 98/2K/XP, but
24  recommend. The program also works on NT/95/ME but there is no support  recommend. The program also works on NT/95/ME but there is no support
25  for these OS versions any longer.  for these OS versions any longer.
26    
27    @section A short Introduction
28    
29    WinPT is a graphical GnuPG front-end which resides in the task bar.
30    It is divided into several, so-called, managers. There is a manager
31    for the keyring, for files and for smart cards. The aim of the program
32    is to secure email communication and to perform file encryption.
33    
34    @subsection What is GnuPG
35    GnuPG is a tool for secure communication and data storage.
36    It can be used to encrypt data and to create digital signatures.
37    It includes an advanced key management facility and is compliant
38    with the proposed Internet standard as described in RFC2440.
39    
40    @subsection The Web of Trust
41    For a detailled description of these and other GnuPG topics, I
42    recommend the available literature at http://www.gnupg.org. But
43    at least a general overview should be given here.
44    
45    The certification scheme of OpenPGP does not base on a hirachical
46    approach. Instead it uses a combination of ownertrust and direct
47    key certification. Here is an example with Alice, Bob, Carol and Dave.
48    
49    Alice knows Bob and checked the fingerprint of Bob's key when he
50    met him personally. Thus she knows that the key really belongs to
51    its owner and he trusts Bob to certify other keys. Then she issued
52    a signature on Bob's key. Bob knows Carol and also checked her identity.
53    Then he signed her key. Alice does not know Carol, but he knows Bob
54    and Bob trusts Carol. And because Alice trusts Bob, at a level she
55    decided before, he also trusts Carol. It's a transitiv relation.
56    Dave is isolated and does not know anybody from the mentioned persons,
57    thus he is not in the WoT.
58    Another very important point is, that the signer can decide,
59    after the certification, how much he trusts the key owner to
60    certify other keys.
61    
62    It is very important to check the identify of a key owner. Mostly
63    this is done by comparing the fingerprint, which were submitted
64    by phone or written down at a personal meeting, with the fingerprint
65    of the key in the keyring. Please bear in mind that anybody can create
66    a key with an email address and a specific name. Thus it is not
67    recommend to sign keys without doing this check before!
68    
69    The fingerprint of the key is hexadecial (160-bit) sequence divided
70    into 10 groups of 4 hex digits. You can get the fingerprint of a key
71    by opening the key property dialog. There you can mark the fingerprint
72    and copy it to the clipboard. The fingerprint of a key can be compared
73    to human fingerprints, it is unique for each key.
74    
75    Example: 1D75 8108 5BC9 D9FB E78B  2078 ED46 81C9 BF3D F9B4
76    
77    It is a good idea to publish your fingerprint wherever possible.
78    For example via a business card or your website.
79    
80  @section Installation of the Program  @section Installation of the Program
81    
# Line 32  can download it from http://wald.intevat Line 84  can download it from http://wald.intevat
84  Download the zip file with the binaries inside and unpack them in  Download the zip file with the binaries inside and unpack them in
85  a folder. All files need to be in the same folder, so if you change  a folder. All files need to be in the same folder, so if you change
86  the folder don't forget to move all files.  the folder don't forget to move all files.
87    You should also download and verify the signature of the packet to
88    make sure that the release is really authentic.
89    
90  To activate the program you just need to start WinPT.exe. You should  To activate the program you just need to start WinPT.exe. You should
91  now see a little (golden key) icon in the taskbar which indicates that  now see a little (golden key) icon in the taskbar which indicates that
# Line 45  is very easy to use with an average size Line 99  is very easy to use with an average size
99  speaking users, I recommend the light version because it does not  speaking users, I recommend the light version because it does not
100  contain the 2 German PDF manuals.  contain the 2 German PDF manuals.
101    
102    @subsection Getting the Source of the Program
103    As free software, according to the GNU General Public License,
104    WinPT also offers the source code for the program. It can be used
105    for reviews, to compile your own binary and/or to modify and/or
106    redistribute it or just to learn how it works. The source is available
107    at the same place you downloaded the binary. If not, you should
108    contact the author of the site.
109    The entire program can be build with free software; the default
110    environment is a cross-compiler hosted on a Linux box. All you
111    need is the mingw32 packages, a working autoconf environment
112    and the libs WinPT depends on (currently gpgme and libgpg-error).
113    It is also possible to build the binary with cygwin/mingw32 on
114    Windows but this environment is not actively supported and propably
115    needs adjustment of the source.
116    
117  @subsection Configure the Program  @subsection Configure the Program
118  After the installation not much of the default settings need to  After the installation not much of the default settings need to
119  be changed. If you prefer a special keyserver, it is propably a good  be changed. If you prefer a special keyserver, it is propably a good
# Line 68  to the hotkeys. Line 137  to the hotkeys.
137    
138  To enable keyring backups, the user can either decide to use the  To enable keyring backups, the user can either decide to use the
139  GPG home directory as the backup folder or any other folder. In  GPG home directory as the backup folder or any other folder. In
140  the latter case, a folder needs to be chosen. If the backup should  the latter case, a folder needs to be chosen.
 also include the secret keyring, please check the corresponding box.  
141    
142    
143  @section The First Start  @section The First Start
144    
145  This section is only important for people who never installed  This section is only important for people who never installed
146  and/or used WinPT before.  and/or used WinPT before.
147    
# Line 95  why it is also important to store the ba Line 164  why it is also important to store the ba
164  secret keyring, at a @strong{safe} place.  secret keyring, at a @strong{safe} place.
165    
166  @section Keyserver Access  @section Keyserver Access
167    
168  An easy way to retrieve keys is the keyserver. You can think of  An easy way to retrieve keys is the keyserver. You can think of
169  it like a huge database with a lot of keys as its content. It is  it like a huge database with a lot of keys as its content. It is
170  possible to search keys by a pattern, a keyid or even a fingerprint.  possible to search keys by a pattern, a keyid or even a fingerprint.
# Line 110  The main keyserver dialog allows to fetc Line 180  The main keyserver dialog allows to fetc
180  or to search for a given pattern.  or to search for a given pattern.
181    
182  @subsection Retrieve a key by Key ID  @subsection Retrieve a key by Key ID
183    The best way to fetch a key from the server is by the key ID.
184    Just enter the key ID, it is always a good idea to prefix it
185    with 0x and click the "Receive" button.
186    
187    An example:
188    
189    pattern: 0xBF3DF9B4
190    
191    [Receive]
192    
193    
194  @subsection Retrieve a key by its email address  @subsection Retrieve a key by its email address
195    If you only know the email address from your partner, you can
196    enter it instead of the key ID. It is unlikely but possible
197    that there are more keys with the same address. In this situation,
198    WinPT will warn you that multiple keys were imported. The difference
199    to the search function is, that the keys were dirctly fetched and
200    not displayed as a key result list.
201    
202    
203    An example:
204    
205    pattern: name_of_friend@@gmx.net
206    
207    [Receive]
208    
209    
210  @subsection Search for a key by pattern  @subsection Search for a key by pattern
211  If you want to communicate with a new mail partner and you are  If you want to communicate with a new mail partner and you are
# Line 120  email address. This address is considere Line 214  email address. This address is considere
214    
215  An example:  An example:
216    
217  pattern: twoaday@@freakmail.de  pattern: winpt@@windows-privacy-tray.com
218    
219  [Search]  [Search]
220    
# Line 131  should be clicked. Then the key will be Line 225  should be clicked. Then the key will be
225  to your keyring. Now you can encrypt data with this key, for  to your keyring. Now you can encrypt data with this key, for
226  example an email.  example an email.
227    
228  @section Adding new elements to your key  @subsection Sending a Key to the Keyserver
229    After you generated a new key pair, it is a good idea to send your
230    key to the keyserver to make it available for other users. If you
231    issue a signature, the key ID is part of the signature and people can
232    automatically retrieve your key when they try to verify the signature.
233    
234    Actually, the action is performed in the Key Manager and not in the
235    keyserver dialog. Just open the Key Manager, select the key you want
236    to send right-click on it and chose "Send to Keyserver" in the popup
237    menu. Then a message box with the result is shown.
238    
239    @subsection Add, Delete or Edit a Keyserver Entry
240    The keyserver dialog allow to change the existing keyserver entries,
241    to delete them or to add new entries. Just right click on a selected
242    item and a popup menu will be shown with ("Edit", "Remove" and "New").
243    
244    @section Using the Clipboard
245    
246    A major aim from the first day was, that the program does not
247    depend on a special mailer client. For this reason it uses the
248    clipboard to encrypt and/or sign data.
249    For the examples, let's assume that you want to write a new
250    mail or that you received a mail protected by GnuPG.
251    
252    @subsection Encrypt Data in the Clipboard
253    Just copy the text from the mailer window into the clipboard.
254    This is usually done by CTRL+C, make sure you really selected
255    all portions of the text. Then right-click on the tray icon
256    and select Clipboard->Encryption. Now a dialog is shown to
257    select the recipients. This means you need to select all
258    keys which should be able to decrypt the mail. Confirm with "OK".
259    GnuPG now encrypts the data with the selected recipients. At the
260    end a message box with the result is shown. Now the clipboard should
261    contain the encrypted data. Just paste it into the mailer window.
262    The output should contain a header and a footer
263    "BEGIN PGP MESSAGE" and "END PGP MESSAGE.
264    
265    @subsection Decrypt/Verify Data from the Clipboard
266    The most common case is propably that you got a signed email and
267    now you want to verify it. For this procedure, you have to copy
268    the entire signature in the clipboard. The easiest way is to
269    use CTRL+A and CTRL+C, then all available text will be copied.
270    WinPT (GnuPG) is smart enough to figure out the signature related
271    data. Now go to the taskbar, display the popup menu and select
272    Clipboard->Decrypt/Verify. Now a new dialog, the verify dialog,
273    should be available on screen with all information about the
274    signature. For example who is the signer, when was it signed
275    how much do you try this key and what was signed and most
276    important, the status of it (is the signature good or BAD).
277    A special case is when you don't have the public key to verify
278    the signature, if this happens WinPT offers to download the key
279    from the default keyserver. If the key was not found, the procedure
280    is aborted because without the key the sig cannot bed checked.
281    
282    @subsection Sign the Clipboard
283    We assume that text that shall be signed is already in the
284    clipboard. If not, select the text you want to sign and copy
285    with via CTRL+C in the clipboard. Now go to the taskbar and
286    open the peopup menu, Clipboard->Sign. If you just have one
287    secret key, the passphrase dialog will be automatically shown.
288    All you need is to enter your passphrase and confirm. In case
289    of more available secret keys, a list with all keys is shown
290    and you can select which key shall be used for signing.
291    The output is always a cleartext signature which is in text
292    format. Do not try to sign binary clipboard data, the result
293    would be unpredictable and not readable by human beings.
294    
295    @section The Current Window Support
296    Compared to the clipboard mode, the CWS mode has some advantages.
297    Let us assume that you want to extract text from an editor window.
298    With the CWS mode, the program automatically tries to focus the
299    window to select the text and to copy it to the clipboard and
300    execute the selected command (Sign, Encrypt, Decrypt).
301    No manual user interaction is needed. Except this different behaviour,
302    it is very likewise to the clipboard mode and thus we do not describe
303    each command again.
304    
305    @section The Key Manager
306    
307    This part of the program is propably most important for many users.
308    It contains function to manage your keyring and to perform actions
309    which are required and/or useful in the OpenPGP environment.
310    
311    @subsection Tips
312    
313    @itemize @bullet
314    
315    @item
316    If you want to import quickly a key from a into the keyring, just
317    drag and drop the file into the Key Manager window. Then the import
318    procedure will be automatically started.
319    
320    @item
321    Key which were fetched from keyservers often contain a lot of,
322    maybe obsolete, self signatures, if you want to get rid of them
323    you can use the Key Edit->Clean feature. Just start the edit
324    dialog and select the clean command. That's it.
325    
326    @item
327    The keyserver dialog does not allow to import a key directly
328    via an URL, as an alternative you may use the "Import HTTP..."
329    feature in the Key Manager. With it you can directly fetch keys
330    from the web (Example: http://www.users.my-isp.de/~joe/gpg-keys.asc).
331    
332    @item
333    To customize the parameters of the generated key, you can use
334    the expert key generation. It allows you to set the public key
335    algorithm and/or the size of the key directly.
336    
337    @item
338    Most of the list view based dialogs allow to use the right
339    mouse button, to show popup menus with available commands.
340    
341    @end itemize
342    
343    @subsection Create a Revocation Certificate
344    
345    It is very important to do this step early as possible. With this
346    certificate, you can revoke your entire key. The reason for this
347    can be for example, that your key is no longer used or even compromised.
348    After you generated the revoc cert, you should move it to a secure place
349    because anybody who gets access to it, can render your key unuseable.
350    
351    Just right-click on your key and select "Revoke Cert". If you do this
352    step directly after key generation, there is no need to change the
353    default values. Just select a file name and enter the passphrase.
354    The program issues a warning which should be read carefully.
355    
356  @subsection Adding a new secondary key  @subsection Adding a new Secondary Key
357    
358  For most users the existing keys in the key pair are enough  For most users the existing keys in the key pair are enough
359  and no extra key is needed. But there are some exceptions.  and no extra key is needed. But there are some exceptions.
# Line 157  of taste. RSA and ElGamal are both capab Line 377  of taste. RSA and ElGamal are both capab
377  users it's a good idea to let the program chose the key size (in bits).  users it's a good idea to let the program chose the key size (in bits).
378  The default settings should be secure enough for most purposes.  The default settings should be secure enough for most purposes.
379    
380  @subsection Adding a new user ID  @subsection Adding a new User ID
381  If you got a new email account, it's propably a good idea to  If you got a new email account, it's propably a good idea to
382  add these new account to your key also. For example:  add these new account to your key also. For example:
383    
# Line 173  comment: (optional) Line 393  comment: (optional)
393  Now email programs are able to associate this address with your  Now email programs are able to associate this address with your
394  key when somebody wants to send you a protected mail to this account.  key when somebody wants to send you a protected mail to this account.
395    
396  @subsection Adding a photographic ID  @subsection Adding a new Photographic ID
397  With this function you can add a photo to your public. It will be  With this function you can add a photo to your public. It will be
398  displayed in the key property dialog.  displayed in the key property dialog.
399    
# Line 182  enter your passphrase and confirm with O Line 402  enter your passphrase and confirm with O
402  in the dialog carefully to make sure the photo has a proper size  in the dialog carefully to make sure the photo has a proper size
403  (file, height and weight).  (file, height and weight).
404    
405  @subsection Adding a new designated revoker  @subsection Adding a new Designated Revoker
406  If you want to allow another key to revoke your own key, this  If you want to allow another key to revoke your own key, this
407  might be useful if you lost your secret or a simliar situation,  might be useful if you lost your secret or a simliar situation,
408  you can use this function to add a designated revoker to your key.  you can use this function to add a designated revoker to your key.
# Line 193  and that this person really has the powe Line 413  and that this person really has the powe
413  unuseable. You really should trust the selected key, in case it is  unuseable. You really should trust the selected key, in case it is
414  not a key owned by yourself.  not a key owned by yourself.
415    
416    @subsection Export a Public Key
417    There are several reason why to export a public key and there
418    are also several ways to do it. If you want to send the key
419    directly to a mail recipient, you can select the key, right-click,
420    and select "Send Key to Mail Recipient". As an alternative, you
421    can also export it to the clipboard or to a file. To export a
422    key to the clipboard, you can select "Copy key to Clipboard"
423    in the popup menu of the selected key. To export it to a file,
424    you need to select the menu "Key" and then "Export...". The
425    program will automatically suggest a name for the output.
426    
427    @subsection Import a Public Key
428    Similar to the key import, the import of a key can be done in
429    several ways. First, let's assume you got a mail with an OpenPGP
430    key included as inline text. Then you can use the current window
431    feature and "Decrypt/Verify" to import the key. Alternative you
432    also may use the clipboard. To achieve this, you first need to
433    select the entire key (CTRL+A) and then copy it to the clipboard
434    (CTRL+C), then use the Key Manager (Edit->Paste) to import it.
435    If the key is stored as an attachment, or you want to import
436    a key from a file in general, just drag the file and drop it
437    into the Key Manager window or use "Key" -> "Import...".
438    
439    @subsection Sign a Public Key
440    If you verified that a key really belongs to its owner, you
441    should sign the key to integrate it into your Web of Trust
442    and also to mark the key as valid in your keyring. Do not sign
443    a key you just got via email with the request to sign it. Anybody
444    can create a key with your (or better ANY) name, these information
445    are no hint to whom the key really belongs. You can check a key
446    by meeting or calling the key owner and verify the key fingerprint
447    of the key with the one published by the key owner. Additional checks
448    should be to watch at his driver license or the identity card to make
449    sure that name of the key matches the name of the key owner. After
450    this procedure is done, you can open the Key Manager, select the
451    right key and either use the context menu "Sign Key" or use the
452    toolbar button.
453    
454    The next dialog will summarize the key information and some
455    additional options. For example if the signature should be
456    local or exportable. Local means the signature will be stripped
457    if you export the key and no one else except you can use it to
458    calculate the validity. If you mark the signature exportable,
459    any other user can see and use it. Now you can select the key
460    you want to use to sign and enter the passphrase. Confirm with "OK"
461    and the key will be signed. Now the validity of the new key is
462    "Full". It is propably a good idea to set the ownertrust of the
463    key. For a detailled description, see the chapter "Key Ownertrust".
464    
465    @subsection Key Ownertrust
466    First we should explain what the ownertrust of a key is. The ownertrust
467    is a measurement how much you trust somebody to certify and check keys
468    of other people. For example, if you know that Bob is really the owner
469    of the key, you should sign it. But he is also known to sign other keys
470    without checking the idenity of the other key owner. Values for the
471    ownertrust are 1) Don't Know 2) Don't Trust 3) Marginal 4) Full
472    and thus you should propably use an ownertrust value like "Marginal".
473    But this is a personal decision and stored in a separate file and
474    never exported with the public keys. For further information, please
475    take a look into the GNU Privacy Handbook.
476    Just a last work on Key Pairs, they are automatically marked as
477    "Ultimate" because the key belongs to you and you trust it implicit.
478  @bye  @bye

Legend:
Removed from v.222  
changed lines
  Added in v.232

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26