8 |
|
|
9 |
Copyright (C) 2006 Timo Schulz |
Copyright (C) 2006 Timo Schulz |
10 |
|
|
11 |
Version 0.9.0 |
Version 1.0.0 |
12 |
|
|
13 |
@settitle WinPT - The Windows Privacy Tray; a free GPG front-end |
@settitle WinPT - The Windows Privacy Tray; a free GPG front-end |
14 |
|
|
16 |
|
|
17 |
First you need to have a working GnuPG 1.4 installtion on the machine you plan to install WinPT. |
First you need to have a working GnuPG 1.4 installtion on the machine you plan to install WinPT. |
18 |
If you do not have GPG in your machine, please visit http://www.gnupg.org and download the latest |
If you do not have GPG in your machine, please visit http://www.gnupg.org and download the latest |
19 |
GPG version there. It comes with a graphical installer so there is no need to do this step manually. |
GPG version there. It comes with a graphical installer so there is no need to do the |
20 |
|
installation manually. |
21 |
|
|
22 |
You need at least Windows 98/2K/XP, but Windows XP or better is recommend. The program also works |
You need at least Windows 98/2K/XP, but Windows XP or better is recommend. The program also works |
23 |
on NT/95/ME but there is no support for these OS versions any longer. Mainly because the OS |
on NT/95/ME but there is no support for these OS versions any longer. Mainly because the OS |
24 |
vendor also dropped support and no bug fixes will be provided any longer. |
vendor also dropped support and no bug fixes will be provided any longer. |
25 |
And it is very likely that work optimal on such platforms. |
And it is very likely that the program does not work optimal on such platforms. |
26 |
|
|
27 |
@section A short Introduction |
@section A short Introduction |
28 |
|
|
87 |
is very easy to use with an average size (~4MB). For non-German speaking users, I recommend the |
is very easy to use with an average size (~4MB). For non-German speaking users, I recommend the |
88 |
light version because it does not contain the 2 German PDF manuals. |
light version because it does not contain the 2 German PDF manuals. |
89 |
|
|
|
@subsection Getting the Source of the Program |
|
|
As free software, according to the GNU General Public License, WinPT also offers the source code |
|
|
for the program. It can be used for reviews, to compile your own binary and/or to modify and/or |
|
|
redistribute it or just to learn how it works. The source is available at the same place you |
|
|
downloaded the binary. If not, you should contact the author of the site. |
|
|
The entire program can be build with free software; the default environment is a cross-compiler |
|
|
hosted on a Linux box. All you need is the mingw32 packages, a working autoconf environment |
|
|
and the libs WinPT depends on (currently gpgme and libgpg-error). |
|
|
It is also possible to build the binary with cygwin/mingw32 on Windows but this environment is |
|
|
not actively supported and propably needs adjustment of the source. |
|
|
|
|
90 |
@subsection Configure the Program |
@subsection Configure the Program |
91 |
After the installation not much of the default settings need to be changed. If you prefer a |
After the installation not much of the default settings need to be changed. If you prefer a |
92 |
special keyserver, it is propably a good idea to open the keyserver dialog and to set one of the |
special keyserver, it is propably a good idea to open the keyserver dialog and to set one of the |
119 |
To enable keyring backups, the user can either decide to use the GPG home directory as the backup |
To enable keyring backups, the user can either decide to use the GPG home directory as the backup |
120 |
folder or any other folder. In the latter case, a folder needs to be chosen. |
folder or any other folder. In the latter case, a folder needs to be chosen. |
121 |
|
|
122 |
|
@subsection Getting the Source of the Program |
123 |
|
As free software, according to the GNU General Public License, WinPT also offers the source code |
124 |
|
for the program. It can be used for reviews, to compile your own binary and/or to modify and/or |
125 |
|
redistribute it or just to learn how it works. The source is available at the same place you |
126 |
|
downloaded the binary. If not, you should contact the author of the site. |
127 |
|
The entire program can be build with free software; the default environment is a cross-compiler |
128 |
|
hosted on a Linux box. All you need is the mingw32 packages, a working autoconf environment |
129 |
|
and the libs WinPT depends on (currently gpgme and libgpg-error). |
130 |
|
It is also possible to build the binary with cygwin/mingw32 on Windows but this environment is |
131 |
|
not actively supported and propably needs adjustment of the source. |
132 |
|
|
133 |
|
|
134 |
|
@section Native Language Support |
135 |
|
|
136 |
|
The program has the ability to select different languages to provide dialogs and error messages |
137 |
|
in the native language of the user. Currently German, Japanese, Portuguese (Brazil) and Slovak. |
138 |
|
When WinPT has been installed via a graphical installer, for example Gpg4Win, the language was |
139 |
|
automatically selected based on the locale Windows environment. If the stand-alone binary was |
140 |
|
downloaded, WinPT offers at the first start to select a language, based on the .mo file it |
141 |
|
founded in the current directory. |
142 |
|
Otherwise the user needs to perform the following steps. The WinPT ZIP archive contains various |
143 |
|
.mo files (de.mo, jp.mo, sk.mo) and the user needs to find his native language, if available and |
144 |
|
rename the file to "winpt.mo". For example, if the user prefers German, "de.mo" -> "winpt.mo". |
145 |
|
Now the user needs to save the locale dir, where the winpt.mo is stored, in the GPG preference dialog. |
146 |
|
|
147 |
@section The First Start |
@section The First Start |
148 |
|
|
149 |
This section is only important for people who never installed and/or used WinPT before and thus |
This section is only important for people who never installed and/or used WinPT before and thus |
165 |
is no way to recover the encrypted data. That is why it is also important to store the backup, at |
is no way to recover the encrypted data. That is why it is also important to store the backup, at |
166 |
least of the secret keyring, at a @strong{safe} place. |
least of the secret keyring, at a @strong{safe} place. |
167 |
|
|
168 |
|
@subsection Use existing Keyrings and/or Keys |
169 |
|
If you already have a valid OpenPGP key pair and you do not want to generate a new key pair, you |
170 |
|
should select the second choice at the first start. Then the program will copy your existing keyrings |
171 |
|
to the new home directory. Please bear in mind that you need to set the ownertrust manually for each |
172 |
|
imported key. You can skip this step if you exported the ownertrust manually to a file, but because |
173 |
|
this is a step for experienced users it is not described here. The most important step is, to set |
174 |
|
your own key to ultimate ownertrust after import. |
175 |
|
|
176 |
|
If you have other OpenPGP programs and you wish to use the keys from this application, it is a good |
177 |
|
idea to select all keys you want to use and to export them into a single file. Then open the WinPT |
178 |
|
Key Manager and drag the file into the Key Manager window. |
179 |
|
|
180 |
@section The Passphrase for the Secret Key |
@section The Passphrase for the Secret Key |
181 |
|
|
182 |
First a short explaination what passphrase is. A passphrase is like a password but usually |
First a short explaination what passphrase is. A passphrase is like a password but usually |
190 |
some intentionally made spelling mistakes. |
some intentionally made spelling mistakes. |
191 |
|
|
192 |
Example: Row - row - row your boat, gently down the stream |
Example: Row - row - row your boat, gently down the stream |
193 |
Passphrase: "R - r - ryb,gdt" |
Passphrase: "R - r - ryb,gdts" |
194 |
|
|
195 |
Never write down or passphrase or share it among other people! |
Never write down or passphrase or share it among other people! |
196 |
|
|
234 |
|
|
235 |
@subsection Search for a key by pattern |
@subsection Search for a key by pattern |
236 |
If you want to communicate with a new mail partner and you are not sure about the key ID, it can |
If you want to communicate with a new mail partner and you are not sure about the key ID, it can |
237 |
be useful to search for his email address. This address is considered as quite unique. |
be useful to search for his email address. This address is considered as quite unique. |
238 |
|
Not all keyserver support this query mode, so if you get an error please use subkeys.pgp.net. |
239 |
|
|
240 |
An example: |
An example: |
241 |
|
|
248 |
should be clicked. Then the key will be downloaded and added to your keyring. Now you can encrypt |
should be clicked. Then the key will be downloaded and added to your keyring. Now you can encrypt |
249 |
data with this key, for example an email. |
data with this key, for example an email. |
250 |
|
|
251 |
|
|
252 |
@subsection Sending a Key to the Keyserver |
@subsection Sending a Key to the Keyserver |
253 |
After you generated a new key pair, it is a good idea to send your key to the keyserver to make |
After you generated a new key pair, it is a good idea to send your key to the keyserver to make |
254 |
it available for other users. If you issue a signature, the key ID is part of the signature and |
it available for other users. If you issue a signature, the key ID is part of the signature and |
310 |
Compared to the clipboard mode, the CWS mode has some advantages. Let us assume that you want to |
Compared to the clipboard mode, the CWS mode has some advantages. Let us assume that you want to |
311 |
extract text from an editor window. With the CWS mode, the program automatically tries to focus |
extract text from an editor window. With the CWS mode, the program automatically tries to focus |
312 |
the window to select the text and to copy it to the clipboard and execute the |
the window to select the text and to copy it to the clipboard and execute the |
313 |
selected command (Sign, Encrypt, Decrypt). |
selected command (Sign, Encrypt, Decrypt) and pastes back the GPG data to the window. |
314 |
No manual user interaction is needed. Except this different behaviour, it is very likewise to the |
No manual user interaction is needed. Except this different behaviour, it is very likewise to the |
315 |
clipboard mode and thus we do not describe each command again. |
clipboard mode and thus we do not describe each command again. |
316 |
|
|
563 |
|
|
564 |
@end itemize |
@end itemize |
565 |
|
|
566 |
|
|
567 |
|
@section A short Note about Cryptographic Issues |
568 |
|
|
569 |
|
WinPT itself does not perform any real encryption, signing or decryption. Instead it uses |
570 |
|
GPG as the backend program which provides all kind of cryptographic code to perform the |
571 |
|
needed operations. |
572 |
|
|
573 |
|
The default values WinPT uses for key sizes, should be sufficient for personal and commercial |
574 |
|
security for the next years. If you are concerned about the default values, you can always use |
575 |
|
the expert key generation to make your own decision. GPG also provides |
576 |
|
default values for symmetric cipher preferences. By default, the AES (Advanced Encryption Standard) |
577 |
|
is used which provides a very good security. You can manually modify your key preferences, this |
578 |
|
includes cipher, hash, and compression but usually this is not necessary and also can do harm if |
579 |
|
you use algorithms which are not very widespread among other OpenPGP programs. |
580 |
|
|
581 |
|
@section WinPT and Personal Firewalls |
582 |
|
|
583 |
|
Because the program uses a global hook to remember the last active current window, it might be |
584 |
|
possible that Firewalls warn that the process contains a global hook which is a potential |
585 |
|
security risk. In some cases, there might be even a warning that key logging is possible. |
586 |
|
This is a false alarm because the hook provided by the program, a CTB (Computer Based Training) |
587 |
|
hook, can be only used to save handles of newly created windows, or windows which are |
588 |
|
activated or in case of a focus change. Details can be found in the source code of the program |
589 |
|
or additional information about the CTB hook at msdn.microsoft.com |
590 |
|
|
591 |
|
To provide access to keyservers and to download HTTP keys, the program |
592 |
|
needs to be able to make outbound connections to the following ports: 80 (http), 11371 (keyserver) |
593 |
|
|
594 |
|
@subsection Using a HTTP Proxy |
595 |
|
If you are behind a firewall and you have no chance make a connection to a keyserver, maybe |
596 |
|
because of a policy, you can use a http proxy for outbound connections. Open the Keyserver dialog |
597 |
|
and click on the button "Change Proxy". A new dialog opens where you can enter the proxy specific |
598 |
|
host name and ports. If the proxy requires authentication, you also have to provide your user name |
599 |
|
and your password. Please bear in mind that only a base64 authentication is supported and no other |
600 |
|
proxy types (SOCKS for example) can be used. |
601 |
|
|
602 |
|
|
603 |
@section Reporting a Problem (Bug) or a Feature Request |
@section Reporting a Problem (Bug) or a Feature Request |
604 |
|
|
605 |
For the case that you have problems with the program, that includes crashes or or the handling, |
For the case that you have problems with the program, that includes crashes or or the handling, |