1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-12-22 10:19:57 +01:00

Update README file.

--

The copyright list in AUTHORS as been compiled from a distribution
tarball.
This commit is contained in:
Werner Koch 2014-06-05 16:20:44 +02:00
parent 23712e69d3
commit 533ff0ab56
3 changed files with 126 additions and 79 deletions

44
AUTHORS
View File

@ -1,10 +1,35 @@
Program: GnuPG Program: GnuPG
Homepage: http://www.gnupg.org Homepage: https://www.gnupg.org
Maintainer: Werner Koch <wk@gnupg.org> Maintainer: Werner Koch <wk@gnupg.org>
Bug reports: http://bugs.gnupg.org Bug reports: http://bugs.gnupg.org
Security related bug reports: <security@gnupg.org> Security related bug reports: <security@gnupg.org>
License: GPLv3+ License: GPLv3+
GnuPG is free software. See the files COPYING for copying conditions.
License copyright years may be listed using range notation, e.g.,
2000-2013, indicating that every year in the range, inclusive, is a
copyrightable year that would otherwise be listed individually.
List of Copyright holders
=========================
Copyright (C) 1997-1998, 2013-2014 Werner Koch
Copyright (C) 1994-2013 Free Software Foundation, Inc.
Copyright (C) 2003-2013 g10 Code GmbH
Copyright (C) 2002 Klarälvdalens Datakonsult AB
Copyright (C) 1995-1997, 2000-2007 Ulrich Drepper <drepper@gnu.ai.mit.edu>
Copyright (C) 1994 X Consortium
Copyright (C) 1998 by The Internet Society.
Copyright (C) 1998-2004 The OpenLDAP Foundation
Copyright (C) 1998-2004 Kurt D. Zeilenga.
Copyright (C) 1998-2004 Net Boolean Incorporated.
Copyright (C) 2001-2004 IBM Corporation.
Copyright (C) 1999-2003 Howard Y.H. Chu.
Copyright (C) 1999-2003 Symas Corporation.
Copyright (C) 1998-2003 Hallvard B. Furuseth.
Copyright (C) 1992-1996 Regents of the University of Michigan.
Authors with a FSF copyright assignment Authors with a FSF copyright assignment
======================================= =======================================
@ -181,28 +206,15 @@ or later.
Note that some files are under a combination of the GNU Lesser General Note that some files are under a combination of the GNU Lesser General
Public License, version 3 and the GNU General Public License, version Public License, version 3 and the GNU General Public License, version
2. A few other files carry the all permissive license note as found 2. A few other files carry the all permissive license note as found
at the bottom of this file. Certain files in keyserver/ allow one at the bottom of this file.
specific exception:
In addition, as a special exception, the Free Software Foundation
gives permission to link the code of the keyserver helper tools:
gpgkeys_ldap, gpgkeys_curl and gpgkeys_hkp with the OpenSSL
project's "OpenSSL" library (or with modified versions of it that
use the same license as the "OpenSSL" library), and distribute the
linked executables. You must obey the GNU General Public License
in all respects for all of the code used other than "OpenSSL". If
you modify this file, you may extend this exception to your version
of the file, but you are not obligated to do so. If you do not
wish to do so, delete this exception statement from your version.
Note that the gpgkeys_* binaries are currently installed under the
name gpg2keys_*.
========= =========
Copyright 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, Copyright 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
2006, 2007, 2008, 2009, 2010, 2011, 2006, 2007, 2008, 2009, 2010, 2011,
2012, 2013 Free Software Foundation, Inc. 2012, 2013 Free Software Foundation, Inc.
Copyright 1997, 1998, 2013, 2014 Werner Koch
This file is free software; as a special exception the author gives This file is free software; as a special exception the author gives
unlimited permission to copy and/or distribute it, with or without unlimited permission to copy and/or distribute it, with or without

113
NEWS
View File

@ -1,51 +1,84 @@
Noteworthy changes in version 2.1.0-betaN (unreleased) Noteworthy changes in version 2.1.0-betaN (unreleased)
----------------------------------------------------- -----------------------------------------------------
* GPG now accepts a space separated fingerprint as a user ID. This * gpg: Add experimental signature support using curve Ed25519 and
with a patched Libgcrypt also encryption support with Curve25519.
* gpg: Allow use of Brainpool curves.
* gpg: Accepts a space separated fingerprint as user ID. This
allows to copy and paste the fingerprint from the key listing. allows to copy and paste the fingerprint from the key listing.
* gpg: The hash algorithm is now printed for signature records in key
listings.
* gpg: Reject signatures made using the MD5 hash algorithm unless the
new option --allow-weak-digest-algos or --pgp2 are given.
* gpg: Print a warning if the Gnome-Keyring-Daemon intercepts the
communication with the gpg-agent.
* gpg: Changed the format of key listings. To revert to the old
format the option --legacy-list-mode is available.
* gpg: New option --pinentry-mode.
* gpg: Fixed decryption using an OpenPGP card.
* gpg: Fixed bug with deeply nested compressed packets.
* gpg: Only the major version number is by default included in the
armored output.
* gpg: Do not create a trustdb file if --trust-model=always is used.
* gpg: Protect against rogue keyservers sending secret keys.
* gpg: The format of the fallback key listing ("gpg KEYFILE") is now
more aligned to the regular key listing ("gpg -k").
* gpg: The option--show-session-key prints its output now before the
decryption of the bulk message starts.
* gpg: New %U expando for the photo viewer.
* gpg,gpgsm: New option --with-secret.
* gpgsm: By default the users are now asked via the Pinentry whether
they trust an X.509 root key. To prohibit interactive marking of
such keys, the new option --no-allow-mark-trusted may be used.
* gpgsm: New commands to export a secret RSA key in PKCS#1 or PKCS#8
format.
* gpgsm: Improved handling of re-issued CA certificates.
* agent: The included ssh agent does now support ECDSA keys.
* agent: New option --enable-putty-support to allow gpg-agent on
Windows to act as a Pageant replacement with full smartcard support.
* scdaemon: New option --enable-pinpad-varlen.
* scdaemon: Various fixes for pinpad equipped card readers.
* scdaemon: Rename option --disable-pinpad (was --disable-keypad).
* scdaemon: Better support fo CCID readers. Now, internal CCID
driver supports readers with no auto configuration feature.
* dirmngr: Removed support for the original HKP keyserver which is
not anymore used by any site.
* dirmngr: Improved support for keyserver pools.
* tools: New option --dirmngr for gpg-connect-agent.
* The GNU Pth library has been replaced by the new nPth library. * The GNU Pth library has been replaced by the new nPth library.
* By default the users are now asked via the Pinentry whether they
trust an X.509 root key. To prohibit interactive marking of such
keys, the new option --no-allow-mark-trusted may be used.
* The included ssh agent does now support ECDSA keys.
* The new option --enable-putty-support allows gpg-agent on Windows
to act as a Pageant replacement with full smartcard support.
* Removed support for the original HKP keyserver which is not anymore
used by any site.
* The hash algorithm is now printed for sig records in key listings.
* New option --pinentry-mode for GPG.
* New option --enable-pinpad-varlen for scdaemon.
* New option --with-secret for GPG and GPGSM.
* Rename option --disable-pinpad for scdaemon (was: --disable-keypad).
* Better support fo CCID readers. Now, internal CCID driver supports
readers with no auto configuration feature.
* Support installation as portable application under Windows. * Support installation as portable application under Windows.
* Fixed GPG to decrypt using an OpenPGP card. * All kind of other improvements - see the git log.
* Fixed bug with deeply nested compressed packets.
* Only the major version number is by default included in the armored
output.
* Do not create a trustdb file if --trust-model=always is used.
* Protect against rogue keyservers sending secret keys.
* GPGSM can now be used to export a secret RSA key in PKCS#1 or
PKCS#8 format.
Noteworthy changes in version 2.1.0beta3 (2011-12-20) Noteworthy changes in version 2.1.0beta3 (2011-12-20)
@ -53,7 +86,7 @@ Noteworthy changes in version 2.1.0beta3 (2011-12-20)
* Fixed regression in GPG's secret key export function. * Fixed regression in GPG's secret key export function.
* Allow generation of card keys up to 4096 bit. * Allowj generation of card keys up to 4096 bit.
* Support the SSH confirm flag. * Support the SSH confirm flag.

48
README
View File

@ -4,17 +4,16 @@
THIS IS A DEVELOPMENT VERSION AND NOT INTENDED FOR REGULAR USE. THIS IS A DEVELOPMENT VERSION AND NOT INTENDED FOR REGULAR USE.
Copyright 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, Copyright 1997-1998, 2013-2014 Werner Koch
2006, 2007, 2008, 2009, 2010, 2011, 2012, Copyright 1998-2013 Free Software Foundation, Inc.
2013 Free Software Foundation, Inc.
INTRODUCTION INTRODUCTION
============ ============
GnuPG is GNU's tool for secure communication and data storage. It can GnuPG is a tool for secure communication and data storage. It can be
be used to encrypt data and to create digital signatures. It includes used to encrypt data and to create digital signatures. It includes an
an advanced key management facility and is compliant with the proposed advanced key management facility and is compliant with the proposed
OpenPGP Internet standard as described in RFC4880 and the S/MIME OpenPGP Internet standard as described in RFC4880 and the S/MIME
standard as described by several RFCs. standard as described by several RFCs.
@ -23,9 +22,9 @@ License. See the file COPYING for details. GnuPG works best on
GNU/Linux or *BSD systems. Most other Unices are also supported but GNU/Linux or *BSD systems. Most other Unices are also supported but
are not as well tested as the Free Unices. are not as well tested as the Free Unices.
GnuPG 2.0 is the stable version of GnuPG integrating support for GnuPG-2 is the stable version of GnuPG integrating support for OpenPGP
OpenPGP and S/MIME. It does not conflict with an installed 1.4 and S/MIME. It does not conflict with an installed 1.4 OpenPGP-only
OpenPGP-only version. version.
BUILD INSTRUCTIONS BUILD INSTRUCTIONS
@ -42,6 +41,10 @@ GnuPG 2.1 depends on the following packages:
You should get the latest versions of course, the GnuPG configure You should get the latest versions of course, the GnuPG configure
script complains if a version is not sufficient. script complains if a version is not sufficient.
For some advanced features several other libraries are required. The
configure script prints diagnostic messages if one of these libraries
is not available and a feature will not be available..
You also need the Pinentry package for most functions of GnuPG; You also need the Pinentry package for most functions of GnuPG;
however it is not a build requirement. Pinentry is available at however it is not a build requirement. Pinentry is available at
ftp://ftp.gnupg.org/gcrypt/pinentry/ . ftp://ftp.gnupg.org/gcrypt/pinentry/ .
@ -60,12 +63,12 @@ As with all packages, you just have to do
(Before doing install you might need to become root.) (Before doing install you might need to become root.)
If everything succeeds, you have a working GnuPG with support for If everything succeeds, you have a working GnuPG with support for
S/MIME and smartcards. Note that there is no binary gpg but a gpg2 so OpenPGP, S/MIME, ssh-agent, and smartcards. Note that there is no
that this package won't conflict with a GnuPG 1.4 installation. gpg2 binary gpg but a gpg2 so that this package won't conflict with a GnuPG
behaves just like gpg. 1.4 installation. gpg2 behaves just like gpg.
In case of problem please ask on gnupg-users@gnupg.org mailing list In case of problem please ask on the gnupg-users@gnupg.org mailing
for advise. list for advise.
Note that the PKITS tests are always skipped unless you copy the PKITS Note that the PKITS tests are always skipped unless you copy the PKITS
test data file into the tests/pkits directory. There is no need to test data file into the tests/pkits directory. There is no need to
@ -138,10 +141,11 @@ dependency on other modules at run and build time.
HOW TO GET MORE INFORMATION HOW TO GET MORE INFORMATION
=========================== ===========================
The primary WWW page is "http://www.gnupg.org" The primary WWW page is "https://www.gnupg.org"
or using TOR "http://ic6au7wa3f6naxjq.onion"
The primary FTP site is "ftp://ftp.gnupg.org/gcrypt/" The primary FTP site is "ftp://ftp.gnupg.org/gcrypt/"
See http://www.gnupg.org/download/mirrors.html for a list of mirrors See https://www.gnupg.org/download/mirrors.html for a list of mirrors
and use them if possible. You may also find GnuPG mirrored on some of and use them if possible. You may also find GnuPG mirrored on some of
the regular GNU mirrors. the regular GNU mirrors.
@ -178,13 +182,11 @@ The English and German mailing lists are watched by the authors and we
try to answer questions when time allows us to do so. try to answer questions when time allows us to do so.
Commercial grade support for GnuPG is available; for a listing of Commercial grade support for GnuPG is available; for a listing of
offers see http://www.gnupg.org/service.html . The driving force offers see https://www.gnupg.org/service.html . Maintaining and
behind the development of GnuPG is the company of its principal improving GnuPG is costly. Since 2001, g10 Code GmbH, a German
author, Werner Koch. Maintenance and improvement of GnuPG and related company owned and headed by GnuPG's principal author Werner Koch, is
software takes up most of their resources. To allow him to continue bearing the majority of these costs. To help them carry on this work,
his work he asks to either purchase a support contract, engage them they need your support. See https://gnupg.org/donate/ .
for custom enhancements, or to donate money. See http://g10code.com .
This file is Free Software; as a special exception the authors gives This file is Free Software; as a special exception the authors gives
unlimited permission to copy and/or distribute it, with or without unlimited permission to copy and/or distribute it, with or without