mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-03 22:56:33 +02:00
* card-util.c (fetch_url): Fetch the key from the default
keyserver if no URL is available. * w32installer.nsi: Added page to select the language. * mk-w32-dist: Create the opt.ini using the available languages.
This commit is contained in:
parent
ca24b4ea3f
commit
00ef56868d
37 changed files with 14300 additions and 14607 deletions
32
doc/faq.raw
32
doc/faq.raw
|
@ -1,4 +1,5 @@
|
|||
[$htmltitle=GnuPG FAQ]
|
||||
[$htmlcharset=<meta http-equiv="content-type" content="text/html; charset=utf-8">]
|
||||
[$sfaqheader=The GnuPG FAQ says:]
|
||||
[$sfaqfooter=
|
||||
The most recent version of the FAQ is available from
|
||||
|
@ -51,7 +52,8 @@ you could search in the mailing list archive.
|
|||
used to encrypt data and to create digital signatures. It includes
|
||||
an advanced key management facility and is compliant with the
|
||||
proposed OpenPGP Internet standard as described in [H a href=http://www.rfc-editor.org/]RFC 2440[H/a].
|
||||
As such, it is aimed to be compatible with PGP from NAI, Inc.
|
||||
As such, it is aimed to be compatible with PGP from PGP Corp. and
|
||||
other OpenPGP tools
|
||||
|
||||
<Q> Is GnuPG compatible with PGP?
|
||||
|
||||
|
@ -227,7 +229,7 @@ you could search in the mailing list archive.
|
|||
|
||||
<Q> What is the recommended key size?
|
||||
|
||||
1024 bit for DSA signatures; even for plain ElGamal signatures.
|
||||
1024 bit for DSA signatures; even for plain Elgamal signatures.
|
||||
This is sufficient as the size of the hash is probably the weakest
|
||||
link if the key size is larger than 1024 bits. Encryption keys may
|
||||
have greater sizes, but you should then check the fingerprint of
|
||||
|
@ -238,7 +240,7 @@ you could search in the mailing list archive.
|
|||
[H /samp]
|
||||
|
||||
As for the key algorithms, you should stick with the default (i.e.,
|
||||
DSA signature and ElGamal encryption). An ElGamal signing key has
|
||||
DSA signature and Elgamal encryption). An Elgamal signing key has
|
||||
the following disadvantages: the signature is larger, it is hard
|
||||
to create such a key useful for signatures which can withstand some
|
||||
real world attacks, you don't get any extra security compared to
|
||||
|
@ -722,12 +724,12 @@ you could search in the mailing list archive.
|
|||
|
||||
<Q> Why is PGP 5.x not able to encrypt messages with some keys?
|
||||
|
||||
PGP, Inc. refuses to accept ElGamal keys of type 20 even for
|
||||
PGP, Inc. refuses to accept Elgamal keys of type 20 even for
|
||||
encryption. They only support type 16 (which is identical at least
|
||||
for decryption). To be more inter-operable, GnuPG (starting with
|
||||
version 0.3.3) now also uses type 16 for the ElGamal subkey which is
|
||||
version 0.3.3) now also uses type 16 for the Elgamal subkey which is
|
||||
created if the default key algorithm is chosen. You may add a type
|
||||
16 ElGamal key to your public key, which is easy as your key
|
||||
16 Elgamal key to your public key, which is easy as your key
|
||||
signatures are still valid.
|
||||
|
||||
<Q> Why is PGP 5.x not able to verify my messages?
|
||||
|
@ -803,7 +805,7 @@ you could search in the mailing list archive.
|
|||
supports a few more features from the OpenPGP standard than PGP does.
|
||||
If your secret key has any of those features in use, then PGP will
|
||||
reject the key or you will have problems communicating later. Note
|
||||
that PGP doesn't do ElGamal signing keys at all, so they are not
|
||||
that PGP doesn't do Elgamal signing keys at all, so they are not
|
||||
usable with any version.
|
||||
|
||||
These instructions should work for GnuPG 1.0.7 and later, and PGP
|
||||
|
@ -941,11 +943,11 @@ you could search in the mailing list archive.
|
|||
|
||||
That's a known bug, already fixed in newer versions.
|
||||
|
||||
<Q> An ElGamal signature does not verify anymore since version 1.0.2 ...
|
||||
<Q> An Elgamal signature does not verify anymore since version 1.0.2 ...
|
||||
|
||||
Use the option --emulate-md-encode-bug.
|
||||
|
||||
<Q> Old versions of GnuPG can't verify ElGamal signatures
|
||||
<Q> Old versions of GnuPG can't verify Elgamal signatures
|
||||
|
||||
Update to GnuPG 1.0.2 or newer.
|
||||
|
||||
|
@ -1159,7 +1161,7 @@ you could search in the mailing list archive.
|
|||
messages may be decrypted by people who accidently got your passphrase.
|
||||
|
||||
You can add and copy keys to and from your keyring with the 'gpg
|
||||
--import' and 'gpg --export' option. 'gpg --export-secret-keys' will
|
||||
--import' and 'gpg --export' command. 'gpg --export-secret-keys' will
|
||||
export secret keys. This is normally not useful, but you can generate
|
||||
the key on one machine then move it to another machine.
|
||||
|
||||
|
@ -1192,13 +1194,13 @@ you could search in the mailing list archive.
|
|||
|
||||
<Q> Why are some signatures with an ELG-E key valid?
|
||||
|
||||
These are ElGamal keys generated by GnuPG in v3 (RFC 1991) packets.
|
||||
The OpenPGP draft later changed the algorithm identifier for ElGamal
|
||||
These are Elgamal keys generated by GnuPG in v3 (RFC 1991) packets.
|
||||
The OpenPGP draft later changed the algorithm identifier for Elgamal
|
||||
keys which are usable for signatures and encryption from 16 to 20.
|
||||
GnuPG now uses 20 when it generates new ElGamal keys but still
|
||||
GnuPG now uses 20 when it generates new Elgamal keys but still
|
||||
accepts 16 (which is according to OpenPGP "encryption only") if this
|
||||
key is in a v3 packet. GnuPG is the only program which had used
|
||||
these v3 ElGamal keys - so this assumption is quite safe.
|
||||
these v3 Elgamal keys - so this assumption is quite safe.
|
||||
|
||||
<Q> How does the whole trust thing work?
|
||||
|
||||
|
@ -1339,4 +1341,4 @@ Copyright (C) 2000, 2001, 2002, 2003 Free Software Foundation, Inc.,
|
|||
59 Temple Place - Suite 330, Boston, MA 02111, USA
|
||||
|
||||
Verbatim copying and distribution of this entire article is permitted in
|
||||
any medium, provided this notice is preserved.
|
||||
any medium, provided this notice is preserved.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue