diff --git a/ChangeLog b/ChangeLog index 93bfaf20a..ae97753ec 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,7 @@ +2005-02-16 Werner Koch + + Released 1.4.1rc2. + 2005-02-11 David Shaw * configure.ac: Add --enable-fake-curl option to help test no-curl diff --git a/NEWS b/NEWS index 30d81427d..cb23aa9d4 100644 --- a/NEWS +++ b/NEWS @@ -50,6 +50,9 @@ Noteworthy changes in version 1.4.1 * Add new --edit-key command "bkuptocard" to allow restoring a card key from a backup. + * The "fetch" command of --card-edit now retrieves the key using + the default keyserver if no URL has been stored on the card. + Noteworthy changes in version 1.4.0 (2004-12-16) ------------------------------------------------ diff --git a/configure.ac b/configure.ac index 8131799b0..3dbfbede2 100644 --- a/configure.ac +++ b/configure.ac @@ -26,7 +26,7 @@ min_automake_version="1.9.3" # Remember to change the version number immediately *after* a release # and remove the "-cvs" or "rc" suffix immediately *before* a release. -AC_INIT(gnupg, 1.4.1rc1, bug-gnupg@gnu.org) +AC_INIT(gnupg, 1.4.1rc2, bug-gnupg@gnu.org) # Set development_version to yes if the minor number is odd or you # feel that the default check for a development version is not # sufficient. diff --git a/doc/ChangeLog b/doc/ChangeLog index b76491e9e..599e64310 100644 --- a/doc/ChangeLog +++ b/doc/ChangeLog @@ -1,5 +1,12 @@ 2005-02-15 Werner Koch + * faq.raw: Add htmlcharset header line as suggested by Maxim + Britov. s/ElGamal/Elgamal/. Replaced reference to NAI by PGP + Corp. + + * gpg.ru.sgml: Updated from upstream. Added a closing PARA. + + * gpg.sgml: Add bkuptocard command for --edit-key. 2005-02-05 David Shaw diff --git a/doc/faq.raw b/doc/faq.raw index c46682496..2369fd977 100644 --- a/doc/faq.raw +++ b/doc/faq.raw @@ -1,4 +1,5 @@ [$htmltitle=GnuPG FAQ] +[$htmlcharset=] [$sfaqheader=The GnuPG FAQ says:] [$sfaqfooter= The most recent version of the FAQ is available from @@ -51,7 +52,8 @@ you could search in the mailing list archive. used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in [H a href=http://www.rfc-editor.org/]RFC 2440[H/a]. - As such, it is aimed to be compatible with PGP from NAI, Inc. + As such, it is aimed to be compatible with PGP from PGP Corp. and + other OpenPGP tools Is GnuPG compatible with PGP? @@ -227,7 +229,7 @@ you could search in the mailing list archive. What is the recommended key size? - 1024 bit for DSA signatures; even for plain ElGamal signatures. + 1024 bit for DSA signatures; even for plain Elgamal signatures. This is sufficient as the size of the hash is probably the weakest link if the key size is larger than 1024 bits. Encryption keys may have greater sizes, but you should then check the fingerprint of @@ -238,7 +240,7 @@ you could search in the mailing list archive. [H /samp] As for the key algorithms, you should stick with the default (i.e., - DSA signature and ElGamal encryption). An ElGamal signing key has + DSA signature and Elgamal encryption). An Elgamal signing key has the following disadvantages: the signature is larger, it is hard to create such a key useful for signatures which can withstand some real world attacks, you don't get any extra security compared to @@ -722,12 +724,12 @@ you could search in the mailing list archive. Why is PGP 5.x not able to encrypt messages with some keys? - PGP, Inc. refuses to accept ElGamal keys of type 20 even for + PGP, Inc. refuses to accept Elgamal keys of type 20 even for encryption. They only support type 16 (which is identical at least for decryption). To be more inter-operable, GnuPG (starting with - version 0.3.3) now also uses type 16 for the ElGamal subkey which is + version 0.3.3) now also uses type 16 for the Elgamal subkey which is created if the default key algorithm is chosen. You may add a type - 16 ElGamal key to your public key, which is easy as your key + 16 Elgamal key to your public key, which is easy as your key signatures are still valid. Why is PGP 5.x not able to verify my messages? @@ -803,7 +805,7 @@ you could search in the mailing list archive. supports a few more features from the OpenPGP standard than PGP does. If your secret key has any of those features in use, then PGP will reject the key or you will have problems communicating later. Note - that PGP doesn't do ElGamal signing keys at all, so they are not + that PGP doesn't do Elgamal signing keys at all, so they are not usable with any version. These instructions should work for GnuPG 1.0.7 and later, and PGP @@ -941,11 +943,11 @@ you could search in the mailing list archive. That's a known bug, already fixed in newer versions. - An ElGamal signature does not verify anymore since version 1.0.2 ... + An Elgamal signature does not verify anymore since version 1.0.2 ... Use the option --emulate-md-encode-bug. - Old versions of GnuPG can't verify ElGamal signatures + Old versions of GnuPG can't verify Elgamal signatures Update to GnuPG 1.0.2 or newer. @@ -1159,7 +1161,7 @@ you could search in the mailing list archive. messages may be decrypted by people who accidently got your passphrase. You can add and copy keys to and from your keyring with the 'gpg - --import' and 'gpg --export' option. 'gpg --export-secret-keys' will + --import' and 'gpg --export' command. 'gpg --export-secret-keys' will export secret keys. This is normally not useful, but you can generate the key on one machine then move it to another machine. @@ -1192,13 +1194,13 @@ you could search in the mailing list archive. Why are some signatures with an ELG-E key valid? - These are ElGamal keys generated by GnuPG in v3 (RFC 1991) packets. - The OpenPGP draft later changed the algorithm identifier for ElGamal + These are Elgamal keys generated by GnuPG in v3 (RFC 1991) packets. + The OpenPGP draft later changed the algorithm identifier for Elgamal keys which are usable for signatures and encryption from 16 to 20. - GnuPG now uses 20 when it generates new ElGamal keys but still + GnuPG now uses 20 when it generates new Elgamal keys but still accepts 16 (which is according to OpenPGP "encryption only") if this key is in a v3 packet. GnuPG is the only program which had used - these v3 ElGamal keys - so this assumption is quite safe. + these v3 Elgamal keys - so this assumption is quite safe. How does the whole trust thing work? @@ -1339,4 +1341,4 @@ Copyright (C) 2000, 2001, 2002, 2003 Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111, USA Verbatim copying and distribution of this entire article is permitted in -any medium, provided this notice is preserved. \ No newline at end of file +any medium, provided this notice is preserved. diff --git a/doc/gpg.ru.sgml b/doc/gpg.ru.sgml index 4c926b90a..2d23dd953 100644 --- a/doc/gpg.ru.sgml +++ b/doc/gpg.ru.sgml @@ -1,4 +1,5 @@ - +