mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-23 10:29:58 +01:00
export secret keys toPGP
This commit is contained in:
parent
335dcec55b
commit
1098c89a7d
47
doc/FAQ
47
doc/FAQ
@ -2,8 +2,8 @@
|
|||||||
GNUPG FREQUENTLY ASKED QUESTIONS
|
GNUPG FREQUENTLY ASKED QUESTIONS
|
||||||
|
|
||||||
|
|
||||||
Version: 0.34
|
Version: 0.35
|
||||||
Last-Modified: Nov 30, 2000
|
Last-Modified: Dec 14, 2000
|
||||||
Maintained-by: Nils Ellmenreich <nils 'at' gnupg.org>
|
Maintained-by: Nils Ellmenreich <nils 'at' gnupg.org>
|
||||||
|
|
||||||
|
|
||||||
@ -66,7 +66,7 @@ you could search in the mailing list archive.
|
|||||||
5.4) Why is PGP 5.x not able to encrypt messages with some keys?
|
5.4) Why is PGP 5.x not able to encrypt messages with some keys?
|
||||||
5.5) Why is PGP 5.x not able to verify my messages?
|
5.5) Why is PGP 5.x not able to verify my messages?
|
||||||
5.6) How do I transfer owner trust values from PGP to GnuPG?
|
5.6) How do I transfer owner trust values from PGP to GnuPG?
|
||||||
5.7) PGP 5.x, 6.x do not like my secret key.
|
5.7) Older PGPs do not like my secret key.
|
||||||
|
|
||||||
6. PROBLEMS and ERROR MESSAGES
|
6. PROBLEMS and ERROR MESSAGES
|
||||||
6.1) Why do I get "gpg: Warning: using insecure memory!"
|
6.1) Why do I get "gpg: Warning: using insecure memory!"
|
||||||
@ -82,7 +82,8 @@ you could search in the mailing list archive.
|
|||||||
6.9) What is the thing with "can't handle multiple signatures"?
|
6.9) What is the thing with "can't handle multiple signatures"?
|
||||||
6.10) If I submit a key to a keyserver, nothing happens ...
|
6.10) If I submit a key to a keyserver, nothing happens ...
|
||||||
6.11) I get "gpg: waiting for lock ..."
|
6.11) I get "gpg: waiting for lock ..."
|
||||||
6.12) I still have a problem. How do I report a bug?
|
6.12) Older gpg's (e.g., 1.0) have problems with keys from newer gpgs ...
|
||||||
|
6.13) I still have a problem. How do I report a bug?
|
||||||
|
|
||||||
7. ADVANCED TOPICS
|
7. ADVANCED TOPICS
|
||||||
7.1) How does this whole thing work?
|
7.1) How does this whole thing work?
|
||||||
@ -433,7 +434,9 @@ messages?
|
|||||||
This has been frequently requested. However, the current viewpoint
|
This has been frequently requested. However, the current viewpoint
|
||||||
of the GnuPG maintainers is that this would lead to several security
|
of the GnuPG maintainers is that this would lead to several security
|
||||||
issues and will therefore not be implemented in the foreseeable
|
issues and will therefore not be implemented in the foreseeable
|
||||||
future.
|
future. However, for some areas of areas of application gpgme could
|
||||||
|
do the trick. You'll find it at
|
||||||
|
ftp://ftp.guug.de/pub/gcrypt/alpha/gpgme
|
||||||
|
|
||||||
5. COMPATIBILITY ISSUES
|
5. COMPATIBILITY ISSUES
|
||||||
|
|
||||||
@ -499,13 +502,27 @@ it?
|
|||||||
where pgpkeyring is the original keyring and not the GnuPG one you
|
where pgpkeyring is the original keyring and not the GnuPG one you
|
||||||
might have created in the first step.
|
might have created in the first step.
|
||||||
|
|
||||||
5.7) PGP 5.x, 6.x do not like my secret key.
|
5.7) Older PGPs do not like my secret key.
|
||||||
|
|
||||||
PGP probably bails out on some private comment packets used by
|
PGP probably bails out on some private comment packets used by
|
||||||
GnuPG. These packets are fully in compliance with OpenPGP; however
|
GnuPG. These packets are fully in compliance with OpenPGP; however
|
||||||
PGP is not really OpenPGP aware. A workaround is to export the
|
PGP is not really OpenPGP aware. A workaround is to export the
|
||||||
secret keys with this command:
|
secret keys with this command:
|
||||||
gpg --export-secret-keys --no-comment -a your-key-id
|
$ gpg --export-secret-keys --no-comment -a your-key-id
|
||||||
|
|
||||||
|
Another possibility is this: by default, GnuPG encrypts your secret
|
||||||
|
key using the Blowfish symmetric algorithm. Older PGPs will only
|
||||||
|
understand 3DES, CAST5, or IDEA symmetric algorithms. Using the
|
||||||
|
following method you can re-encrypt your secret gpg key with a
|
||||||
|
different algo:
|
||||||
|
|
||||||
|
$ gpg --s2k-cipher-algo=CAST5 --s2k-digest-algo=SHA1 \
|
||||||
|
--compress-algo=1 --edit-key username
|
||||||
|
|
||||||
|
Then use passwd to change the password (just change it to the same
|
||||||
|
thing, but it will encrypt the key with CAST5 this time).
|
||||||
|
|
||||||
|
Now you can export it and PGP should be able to handle it.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -607,7 +624,21 @@ in it - why?
|
|||||||
A previous gpg has most likely exited abnormally and left a lock
|
A previous gpg has most likely exited abnormally and left a lock
|
||||||
file. Go to ~/.gnupg and look for .*.lock files and remove them.
|
file. Go to ~/.gnupg and look for .*.lock files and remove them.
|
||||||
|
|
||||||
6.12) I still have a problem. How do I report a bug?
|
6.12) Older gpg's (e.g., 1.0) have problems with keys from newer gpgs ...
|
||||||
|
|
||||||
|
As of 1.0.3, keys generated with gpg are created with preferences to
|
||||||
|
TWOFISH (and AES since 1.0.4) and that also means that they have the
|
||||||
|
capability to use the new MDC encryption method. This will go into
|
||||||
|
OpenPGP soon and is also suppoted by PGP 7. This new method avoids
|
||||||
|
a (not so new) attack on all email encryption systems.
|
||||||
|
|
||||||
|
This in turn means that pre-1.0.3 gpg's have problems with newer
|
||||||
|
key. Because of security fixes, you should keep your gpg
|
||||||
|
installation in a recent state anyway. As a workaround, you can
|
||||||
|
force gpg to use a previous default cipher algo by putting
|
||||||
|
cipher-algo cast5 into your options file.
|
||||||
|
|
||||||
|
6.13) I still have a problem. How do I report a bug?
|
||||||
|
|
||||||
Are you sure that it's not been mentioned somewhere on the mailing
|
Are you sure that it's not been mentioned somewhere on the mailing
|
||||||
lists? Did you have a look at the bug list (You'll find a link to
|
lists? Did you have a look at the bug list (You'll find a link to
|
||||||
|
42
doc/faq.raw
42
doc/faq.raw
@ -13,8 +13,8 @@ The most recent version of the FAQ is available from
|
|||||||
[H H1]GNUPG FREQUENTLY ASKED QUESTIONS[H /H1]
|
[H H1]GNUPG FREQUENTLY ASKED QUESTIONS[H /H1]
|
||||||
|
|
||||||
|
|
||||||
Version: 0.34[H p]
|
Version: 0.35[H p]
|
||||||
Last-Modified: Nov 30, 2000[H p]
|
Last-Modified: Dec 14, 2000[H p]
|
||||||
Maintained-by: [$maintainer]
|
Maintained-by: [$maintainer]
|
||||||
|
|
||||||
|
|
||||||
@ -392,7 +392,9 @@ messages?
|
|||||||
This has been frequently requested. However, the current viewpoint
|
This has been frequently requested. However, the current viewpoint
|
||||||
of the GnuPG maintainers is that this would lead to several security
|
of the GnuPG maintainers is that this would lead to several security
|
||||||
issues and will therefore not be implemented in the foreseeable
|
issues and will therefore not be implemented in the foreseeable
|
||||||
future.
|
future. However, for some areas of areas of application gpgme could
|
||||||
|
do the trick. You'll find it at
|
||||||
|
[H a href=ftp://ftp.guug.de/pub/gcrypt/alpha/gpgme]ftp://ftp.guug.de/pub/gcrypt/alpha/gpgme[H /a]
|
||||||
|
|
||||||
<S> COMPATIBILITY ISSUES
|
<S> COMPATIBILITY ISSUES
|
||||||
|
|
||||||
@ -463,13 +465,29 @@ it?
|
|||||||
where pgpkeyring is the original keyring and not the GnuPG one you
|
where pgpkeyring is the original keyring and not the GnuPG one you
|
||||||
might have created in the first step.
|
might have created in the first step.
|
||||||
|
|
||||||
<Q> PGP 5.x, 6.x do not like my secret key.
|
<Q> Older PGPs do not like my secret key.
|
||||||
|
|
||||||
PGP probably bails out on some private comment packets used by
|
PGP probably bails out on some private comment packets used by
|
||||||
GnuPG. These packets are fully in compliance with OpenPGP; however
|
GnuPG. These packets are fully in compliance with OpenPGP; however
|
||||||
PGP is not really OpenPGP aware. A workaround is to export the
|
PGP is not really OpenPGP aware. A workaround is to export the
|
||||||
secret keys with this command:
|
secret keys with this command:
|
||||||
[H pre] gpg --export-secret-keys --no-comment -a your-key-id [H /pre]
|
[H pre] $ gpg --export-secret-keys --no-comment -a your-key-id [H /pre]
|
||||||
|
|
||||||
|
Another possibility is this: by default, GnuPG encrypts your secret
|
||||||
|
key using the Blowfish symmetric algorithm. Older PGPs will only
|
||||||
|
understand 3DES, CAST5, or IDEA symmetric algorithms. Using the
|
||||||
|
following method you can re-encrypt your secret gpg key with a
|
||||||
|
different algo:
|
||||||
|
|
||||||
|
[H pre]
|
||||||
|
$ gpg --s2k-cipher-algo=CAST5 --s2k-digest-algo=SHA1 \
|
||||||
|
--compress-algo=1 --edit-key username
|
||||||
|
[H /pre]
|
||||||
|
|
||||||
|
Then use passwd to change the password (just change it to the same
|
||||||
|
thing, but it will encrypt the key with CAST5 this time).
|
||||||
|
|
||||||
|
Now you can export it and PGP should be able to handle it.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -575,6 +593,20 @@ in it - why?
|
|||||||
A previous gpg has most likely exited abnormally and left a lock
|
A previous gpg has most likely exited abnormally and left a lock
|
||||||
file. Go to ~/.gnupg and look for .*.lock files and remove them.
|
file. Go to ~/.gnupg and look for .*.lock files and remove them.
|
||||||
|
|
||||||
|
<Q> Older gpg's (e.g., 1.0) have problems with keys from newer gpgs ...
|
||||||
|
|
||||||
|
As of 1.0.3, keys generated with gpg are created with preferences to
|
||||||
|
TWOFISH (and AES since 1.0.4) and that also means that they have the
|
||||||
|
capability to use the new MDC encryption method. This will go into
|
||||||
|
OpenPGP soon and is also suppoted by PGP 7. This new method avoids
|
||||||
|
a (not so new) attack on all email encryption systems.
|
||||||
|
|
||||||
|
This in turn means that pre-1.0.3 gpg's have problems with newer
|
||||||
|
key. Because of security fixes, you should keep your gpg
|
||||||
|
installation in a recent state anyway. As a workaround, you can
|
||||||
|
force gpg to use a previous default cipher algo by putting
|
||||||
|
[H pre]cipher-algo cast5[H /pre] into your options file.
|
||||||
|
|
||||||
<Q> I still have a problem. How do I report a bug?
|
<Q> I still have a problem. How do I report a bug?
|
||||||
|
|
||||||
Are you sure that it's not been mentioned somewhere on the mailing
|
Are you sure that it's not been mentioned somewhere on the mailing
|
||||||
|
Loading…
x
Reference in New Issue
Block a user