mirror of
git://git.gnupg.org/gnupg.git
synced 2025-01-03 12:11:33 +01:00
doc: Some documentation updates.
-- Also fixed some typos and documented soon to be used OIDs
This commit is contained in:
parent
c772770574
commit
babd87f2da
@ -1543,6 +1543,12 @@ Status codes are:
|
|||||||
1.3.6.1.4.1.11591.2.2.2 wellKnownPrivateKey
|
1.3.6.1.4.1.11591.2.2.2 wellKnownPrivateKey
|
||||||
1.3.6.1.4.1.11591.2.3 CMS contentType
|
1.3.6.1.4.1.11591.2.3 CMS contentType
|
||||||
1.3.6.1.4.1.11591.2.3.1 OpenPGP keyblock (as octet string)
|
1.3.6.1.4.1.11591.2.3.1 OpenPGP keyblock (as octet string)
|
||||||
|
1.3.6.1.4.1.11591.2.4 LDAP stuff
|
||||||
|
1.3.6.1.4.1.11591.2.4.1 attributes
|
||||||
|
1.3.6.1.4.1.11591.2.4.1.1 gpgFingerprint attribute
|
||||||
|
1.3.6.1.4.1.11591.2.4.1.2 gpgSubFingerprint attribute
|
||||||
|
1.3.6.1.4.1.11591.2.4.1.3 gpgMailbox attribute
|
||||||
|
1.3.6.1.4.1.11591.2.4.1.4 gpgSubCertID attribute
|
||||||
1.3.6.1.4.1.11591.2.12242973 invalid encoded OID
|
1.3.6.1.4.1.11591.2.12242973 invalid encoded OID
|
||||||
#+end_example
|
#+end_example
|
||||||
|
|
||||||
|
@ -539,7 +539,7 @@ certificate for that pool. Otherwise, it will use the system CAs.
|
|||||||
@section Configuration
|
@section Configuration
|
||||||
|
|
||||||
Dirmngr makes use of several directories when running in daemon mode:
|
Dirmngr makes use of several directories when running in daemon mode:
|
||||||
There are a few configuration files whih control the operation of
|
There are a few configuration files to control the operation of
|
||||||
dirmngr. By default they may all be found in the current home
|
dirmngr. By default they may all be found in the current home
|
||||||
directory (@pxref{option --homedir}).
|
directory (@pxref{option --homedir}).
|
||||||
|
|
||||||
@ -589,31 +589,92 @@ part will be created by dirmngr if it does not exists but you need to
|
|||||||
make sure that the upper directory exists.
|
make sure that the upper directory exists.
|
||||||
|
|
||||||
@end table
|
@end table
|
||||||
@manpause
|
|
||||||
|
|
||||||
To be able to see what's going on you should create the configure file
|
Several options control the use of trusted certificates for TLS and
|
||||||
@file{~/gnupg/dirmngr.conf} with at least one line:
|
CRLs. Here is an Overview on the use and origin of those Root CA
|
||||||
|
certificates:
|
||||||
|
@table @asis
|
||||||
|
|
||||||
|
@item System
|
||||||
|
|
||||||
|
These System root certificates are used by: FIXME
|
||||||
|
|
||||||
|
The origin of the system provided certificates depends on the
|
||||||
|
platform. On Windows all certificates from the Windows System Stores
|
||||||
|
@code{ROOT} and @code{CA} are used.
|
||||||
|
|
||||||
|
On other platforms the certificates are read from the first file found
|
||||||
|
form this list: @file{/etc/ssl/ca-bundle.pem},
|
||||||
|
@file{/etc/ssl/certs/ca-certificates.crt},
|
||||||
|
@file{/etc/pki/tls/cert.pem},
|
||||||
|
@file{/usr/local/share/certs/ca-root-nss.crt},
|
||||||
|
@file{/etc/ssl/cert.pem}.
|
||||||
|
|
||||||
|
@item GnuPG
|
||||||
|
|
||||||
|
The GnuPG specific certificates stored in the directory
|
||||||
|
@file{/etc/gnupg/trusted-certs} are only used to validate CRLs.
|
||||||
|
|
||||||
|
@c Note that dirmngr's VALIDATE command also uses them but that
|
||||||
|
@c command is anyway only intended for debugging.
|
||||||
|
|
||||||
|
@item OpenPGP keyserver
|
||||||
|
|
||||||
|
For accessing the OpenPGP keyservers the only certificates used are
|
||||||
|
those set with the configuration option @option{hkp-cacert}.
|
||||||
|
|
||||||
|
@item OpenPGP keyserver pool
|
||||||
|
|
||||||
|
This is usually only one certificate read from the file
|
||||||
|
@file{@value{DATADIR}/gnupg/sks-keyservers.netCA.pem}. If this
|
||||||
|
certificate exists it is used to access the special keyservers
|
||||||
|
@code{hkps.pool.sks-keyservers.net} (or @file{hkps://keys.gnupg.net}).
|
||||||
|
|
||||||
|
@end table
|
||||||
|
|
||||||
|
Please note that @command{gpgsm} accepts Root CA certificates for its
|
||||||
|
own purposes only if they are listed in its file @file{trustlist.txt}.
|
||||||
|
@command{dirmngr} does not make use of this list - except FIXME.
|
||||||
|
|
||||||
|
|
||||||
|
@mansect notes
|
||||||
|
|
||||||
|
To be able to see diagnostics it is often useful to put at least the
|
||||||
|
following lines into the configuration file
|
||||||
|
@file{~/gnupg/dirmngr.conf}:
|
||||||
|
|
||||||
@example
|
@example
|
||||||
log-file ~/dirmngr.log
|
log-file ~/dirmngr.log
|
||||||
|
verbose
|
||||||
@end example
|
@end example
|
||||||
|
|
||||||
|
You may want to check the log file to see whether all desired root CA
|
||||||
|
certificates are correctly loaded.
|
||||||
|
|
||||||
To be able to perform OCSP requests you probably want to add the line:
|
To be able to perform OCSP requests you probably want to add the line:
|
||||||
|
|
||||||
@example
|
@example
|
||||||
allow-ocsp
|
allow-ocsp
|
||||||
@end example
|
@end example
|
||||||
|
|
||||||
To make sure that new options are read and that after the installation
|
To make sure that new options are read or that after the installation
|
||||||
of a new GnuPG versions the installed dirmngr is running, you may want
|
of a new GnuPG versions the right dirmngr version is running, you
|
||||||
to kill an existing dirmngr first:
|
should kill an existing dirmngr so that a new instance is started as
|
||||||
|
needed by the otehr components:
|
||||||
|
|
||||||
@example
|
@example
|
||||||
gpgconf --kill dirmngr
|
gpgconf --kill dirmngr
|
||||||
@end example
|
@end example
|
||||||
|
|
||||||
You may check the log file to see whether all desired root
|
Direct interfaction with the dirmngr is possible by using the command
|
||||||
certificates have been loaded correctly.
|
|
||||||
|
@example
|
||||||
|
gpg-connect-agent --dirmngr
|
||||||
|
@end example
|
||||||
|
|
||||||
|
Enter @code{HELP} at the prompt to see a list of commands and enter
|
||||||
|
@code{HELP} followed by a command name to get help on that command.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@c
|
@c
|
||||||
|
@ -364,7 +364,7 @@ are ignored.
|
|||||||
|
|
||||||
Note that all parts of that string are expected to be UTF-8 encoded.
|
Note that all parts of that string are expected to be UTF-8 encoded.
|
||||||
This may lead to problems if the @sc{password} has originally been
|
This may lead to problems if the @sc{password} has originally been
|
||||||
encoded as Latin-1; in such a case better configure tsuch an LDAP server
|
encoded as Latin-1; in such a case better configure such an LDAP server
|
||||||
using the global configuration of @command{dirmngr}.
|
using the global configuration of @command{dirmngr}.
|
||||||
|
|
||||||
Here is an example which uses the default port, no username, no
|
Here is an example which uses the default port, no username, no
|
||||||
|
@ -1271,7 +1271,7 @@ subkey_is_ok (const PKT_public_key *sub)
|
|||||||
return ! sub->flags.revoked && sub->flags.valid && ! sub->flags.disabled;
|
return ! sub->flags.revoked && sub->flags.valid && ! sub->flags.disabled;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Return true if KEYBLOCK has only expired encryption subkyes. Note
|
/* Return true if KEYBLOCK has only expired encryption subkeys. Note
|
||||||
* that the function returns false if the key has no encryption
|
* that the function returns false if the key has no encryption
|
||||||
* subkeys at all or the subkeys are revoked. */
|
* subkeys at all or the subkeys are revoked. */
|
||||||
static int
|
static int
|
||||||
|
Loading…
x
Reference in New Issue
Block a user