mirror of
git://git.gnupg.org/gnupg.git
synced 2025-02-01 16:33:02 +01:00
* Broken links resulting from revised web site filesystem structure
corrected: Intro - available *here* link corrected. Was <http://www.gnupg.org/faq.html>, corrected to be: <http://www.gnupg.org/documentation/faqs.html> 1.1 - RFC 2440 link corrected. Was <http://www.gnupg.org/rfc2440.html>, now linked to: <http://www.rfc-editor.org/> 2.1 - <http://www.gnupg.org/docs.html> corrected to be: <http://www.gnupg.org/documentation/> <http://lists.gnupg.org> corrected to be: <http://www.gnupg.org/documentation/mailing-lists.html> 2.2 - <http://www.gnupg.org/mirrors.html> corrected to be: <http://www.gnupg.org/download/mirrors.html> 3.1 - <http://gnupg.org/backend.html#supsys> corrected to be: <http://gnupg.org/download/supported_systems.html> 3.2 - <http://www.gnupg.org/download.html> corrected to be: <http://www.gnupg.org/download/> * Corrected typo in question 4.12 - Changed "How can a get list of key IDs..." to "How can I get list of key IDs..." * Modified URL listed in question 6.19 to become an actual hyperlink. * Removed line continuation character ("\") at the end of command- strings that were split into two lines (to lessen confusion for those using Windows or OSes that don't support line continuation). * Removed paragraph on line continuation, replacing it with a paragraph to remind the reader that although some command lines may be split into two lines to allow for proper web page display of the FAQ file in some browsers, the entire command-string is to be entered all on one line. * Corrected command-line entries that lacked a "$" character at the beginning of the command-string to signafy a shell prompt in order to apply consitancy throughout the FAQ. * Replaced <pre> tags with <samp> for code entries to improve display for those browser with limited window widths (does not apply to tables). * Trimmed whitespace in tables to narrow width to improve display for those browsers with limited window widths.
This commit is contained in:
parent
78d250a82c
commit
f6e2cb4032
460
doc/faq.raw
460
doc/faq.raw
@ -12,18 +12,18 @@ The most recent version of the FAQ is available from
|
|||||||
[$hVERSION=1.2.1]
|
[$hVERSION=1.2.1]
|
||||||
|
|
||||||
[H body bgcolor=#ffffff text=#000000 link=#1f00ff alink=#ff0000 vlink=#9900dd]
|
[H body bgcolor=#ffffff text=#000000 link=#1f00ff alink=#ff0000 vlink=#9900dd]
|
||||||
[H H1]GnuPG Frequently Asked Questions[H /H1]
|
[H h1]GnuPG Frequently Asked Questions[H /h1]
|
||||||
|
|
||||||
|
|
||||||
[H p]
|
[H p]
|
||||||
Version: 1.6.0[H br]
|
Version: 1.6.1[H br]
|
||||||
Last-Modified: Dec 1, 2002[H br]
|
Last-Modified: Dec 28, 2002[H br]
|
||||||
Maintained-by: [$maintainer]
|
Maintained-by: [$maintainer]
|
||||||
[H /p]
|
[H /p]
|
||||||
|
|
||||||
|
|
||||||
This is the GnuPG FAQ. The latest HTML version is available
|
This is the GnuPG FAQ. The latest HTML version is available
|
||||||
[H a href=[$hGPGHTTP]/faq.html]here[H/a].
|
[H a href=[$hGPGHTTP]/documentation/faqs.html]here[H/a].
|
||||||
|
|
||||||
The index is generated automatically, so there may be errors. Not all
|
The index is generated automatically, so there may be errors. Not all
|
||||||
questions may be in the section they belong to. Suggestions about how
|
questions may be in the section they belong to. Suggestions about how
|
||||||
@ -37,9 +37,9 @@ Please, don't send message like "This should be a FAQ - what's the
|
|||||||
answer?". If it hasn't been asked before, it isn't a FAQ. In that case
|
answer?". If it hasn't been asked before, it isn't a FAQ. In that case
|
||||||
you could search in the mailing list archive.
|
you could search in the mailing list archive.
|
||||||
|
|
||||||
[H HR]
|
[H hr]
|
||||||
<C>
|
<C>
|
||||||
[H HR]
|
[H hr]
|
||||||
|
|
||||||
|
|
||||||
<S> GENERAL
|
<S> GENERAL
|
||||||
@ -50,7 +50,7 @@ you could search in the mailing list archive.
|
|||||||
is GNU's tool for secure communication and data storage. It can be
|
is GNU's tool for secure communication and data storage. It can be
|
||||||
used to encrypt data and to create digital signatures. It includes
|
used to encrypt data and to create digital signatures. It includes
|
||||||
an advanced key management facility and is compliant with the
|
an advanced key management facility and is compliant with the
|
||||||
proposed OpenPGP Internet standard as described in [H a href=http://www.gnupg.org/rfc2440.html]RFC 2440[H/a].
|
proposed OpenPGP Internet standard as described in [H a href=http://www.rfc-editor.org/]RFC 2440[H/a].
|
||||||
As such, it is aimed to be compatible with PGP from NAI, Inc.
|
As such, it is aimed to be compatible with PGP from NAI, Inc.
|
||||||
|
|
||||||
<Q> Is GnuPG compatible with PGP?
|
<Q> Is GnuPG compatible with PGP?
|
||||||
@ -78,14 +78,11 @@ you could search in the mailing list archive.
|
|||||||
converted to a back slash (`\'), and a tilde (`~') represents a
|
converted to a back slash (`\'), and a tilde (`~') represents a
|
||||||
user's "home" directory (reference question <Rhomedir> for an example).
|
user's "home" directory (reference question <Rhomedir> for an example).
|
||||||
|
|
||||||
Also, the indicator used to inform the shell that a continuation
|
Some command-lines presented in this FAQ are too long to properly
|
||||||
of the command will follow on the next line (the `\' character
|
display in some browsers for the web page version of this file, and
|
||||||
seen at the end of some command strings in this FAQ, and represents
|
have been split into two or more lines. For these commands please
|
||||||
a "\<newline>" pair) should be noted. If your shell or command
|
remember to enter the entire command-string on one line or the
|
||||||
interpreter does not support this convention, the command should be
|
command will error, or at minimum not give the desired results.
|
||||||
typed in its entirety as a single entry after removing the trailing
|
|
||||||
backslash and continuing with the second line before pressing Enter
|
|
||||||
or the return key.
|
|
||||||
|
|
||||||
Please keep in mind that this FAQ contains information that may not
|
Please keep in mind that this FAQ contains information that may not
|
||||||
apply to your particular version, as new features and bug fixes are
|
apply to your particular version, as new features and bug fixes are
|
||||||
@ -104,45 +101,45 @@ you could search in the mailing list archive.
|
|||||||
|
|
||||||
On-line resources:
|
On-line resources:
|
||||||
|
|
||||||
[H UL]
|
[H ul]
|
||||||
[H LI]The documentation page is located at [H a href=[$hGPGHTTP]/docs.html]<[$hGPGHTTP]/docs.html>[H/a].
|
[H li]The documentation page is located at [H a href=[$hGPGHTTP]/documentation/]<[$hGPGHTTP]/documentation/>[H/a].
|
||||||
Also, have a look at the HOWTOs and the GNU Privacy Handbook (GPH,
|
Also, have a look at the HOWTOs and the GNU Privacy Handbook (GPH,
|
||||||
available in English, Spanish and Russian). The latter provides a
|
available in English, Spanish and Russian). The latter provides a
|
||||||
detailed user's guide to GnuPG. You'll also find a document about
|
detailed user's guide to GnuPG. You'll also find a document about how
|
||||||
how to convert from PGP 2.x to GnuPG.
|
to convert from PGP 2.x to GnuPG.
|
||||||
|
|
||||||
[H LI]At [H a href=http://lists.gnupg.org]<http://lists.gnupg.org>[H/a] you'll find an online archive of the
|
[H li]At [H a href=[$hGPGHTTP]/documentation/mailing-lists.html]<[$hGPGHTTP]/documentation/mailing-lists.html>[H/a] you'll find
|
||||||
GnuPG mailing lists. Most interesting should be gnupg-users for all
|
an online archive of the GnuPG mailing lists. Most interesting should
|
||||||
user-related issues and gnupg-devel if you want to get in touch with
|
be gnupg-users for all user-related issues and gnupg-devel if you want
|
||||||
the developers.
|
to get in touch with the developers.
|
||||||
|
|
||||||
In addition, searchable archives can be found on MARC, e.g.: [H br]
|
In addition, searchable archives can be found on MARC, e.g.: [H br]
|
||||||
gnupg-users: [H a href=http://marc.theaimsgroup.com/?l=gnupg-users&r=1&w=2]<http://marc.theaimsgroup.com/?l=gnupg-users&r=1&w=2>[H/a][H br]
|
gnupg-users: [H a href=http://marc.theaimsgroup.com/?l=gnupg-users&r=1&w=2]<http://marc.theaimsgroup.com/?l=gnupg-users&r=1&w=2>[H/a][H br]
|
||||||
gnupg-devel: [H a href=http://marc.theaimsgroup.com/?l=gnupg-devel&r=1&w=2]<http://marc.theaimsgroup.com/?l=gnupg-devel&r=1&w=2>[H/a][H br]
|
gnupg-devel: [H a href=http://marc.theaimsgroup.com/?l=gnupg-devel&r=1&w=2]<http://marc.theaimsgroup.com/?l=gnupg-devel&r=1&w=2>[H/a][H br]
|
||||||
|
|
||||||
[H B]PLEASE:[H/B]
|
[H b]PLEASE:[H /b]
|
||||||
Before posting to a list, read this FAQ and the available
|
Before posting to a list, read this FAQ and the available documentation.
|
||||||
documentation. In addition, search the list archive - maybe your
|
In addition, search the list archive - maybe your question has already
|
||||||
question has already been discussed. This way you help people focus
|
been discussed. This way you help people focus on topics that have not
|
||||||
on topics that have not yet been resolved.
|
yet been resolved.
|
||||||
|
|
||||||
[H LI]The GnuPG source distribution contains a subdirectory:
|
[H li]The GnuPG source distribution contains a subdirectory:
|
||||||
|
|
||||||
[H PRE]
|
[H samp]
|
||||||
./doc
|
./doc
|
||||||
[H /PRE]
|
[H /samp]
|
||||||
|
|
||||||
where some additional documentation is located (mainly interesting
|
where some additional documentation is located (mainly interesting
|
||||||
for hackers, not the casual user).
|
for hackers, not the casual user).
|
||||||
[H /UL]
|
[H /ul]
|
||||||
|
|
||||||
<Q> Where do I get GnuPG?
|
<Q> Where do I get GnuPG?
|
||||||
|
|
||||||
You can download the GNU Privacy Guard from its primary FTP server
|
You can download the GNU Privacy Guard from its primary FTP server
|
||||||
[H a href=[$hGPGFTP]/gcrypt/]<[$hGPGFTP]/gcrypt/>[H /a] or from one of the mirrors:
|
[H a href=[$hGPGFTP]/gcrypt/]<[$hGPGFTP]/gcrypt/>[H /a] or from one of the mirrors:
|
||||||
|
|
||||||
[H a href=[$hGPGHTTP]/mirrors.html]
|
[H a href=[$hGPGHTTP]/download/mirrors.html]
|
||||||
<[$hGPGHTTP]/mirrors.html>
|
<[$hGPGHTTP]/download/mirrors.html>
|
||||||
[H /a]
|
[H /a]
|
||||||
|
|
||||||
The current stable version is [$hVERSION]. Please upgrade to this version as
|
The current stable version is [$hVERSION]. Please upgrade to this version as
|
||||||
@ -158,8 +155,8 @@ you could search in the mailing list archive.
|
|||||||
Windows NT/2000) and Macintosh OS/X. A list of OSes reported to be OK
|
Windows NT/2000) and Macintosh OS/X. A list of OSes reported to be OK
|
||||||
is presented at:
|
is presented at:
|
||||||
|
|
||||||
[H a href=[$hGPGHTTP]/backend.html#supsys]
|
[H a href=[$hGPGHTTP]/download/supported_systems.html]
|
||||||
<[$hGPGHTTP]/backend.html#supsys>
|
<[$hGPGHTTP]/download/supported_systems.html>
|
||||||
[H /a]
|
[H /a]
|
||||||
|
|
||||||
<Q> Which random data gatherer should I use?
|
<Q> Which random data gatherer should I use?
|
||||||
@ -171,9 +168,9 @@ you could search in the mailing list archive.
|
|||||||
systems. Also Solaris users with the SUNWski package installed have
|
systems. Also Solaris users with the SUNWski package installed have
|
||||||
a /dev/random. In these cases, use the configure option:
|
a /dev/random. In these cases, use the configure option:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
--enable-static-rnd=linux
|
--enable-static-rnd=linux
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
In addition, there's also the kernel random device by Andi Maier
|
In addition, there's also the kernel random device by Andi Maier
|
||||||
[H a href= http://www.cosy.sbg.ac.at/~andi/]<http://www.cosy.sbg.ac.at/~andi/>[H /a], but it's still beta. Use at your
|
[H a href= http://www.cosy.sbg.ac.at/~andi/]<http://www.cosy.sbg.ac.at/~andi/>[H /a], but it's still beta. Use at your
|
||||||
@ -181,12 +178,12 @@ you could search in the mailing list archive.
|
|||||||
|
|
||||||
On other systems, the Entropy Gathering Daemon (EGD) is a good choice.
|
On other systems, the Entropy Gathering Daemon (EGD) is a good choice.
|
||||||
It is a perl-daemon that monitors system activity and hashes it into
|
It is a perl-daemon that monitors system activity and hashes it into
|
||||||
random data. See the download page [H a href=[$hGPGHTTP]/download.html]<[$hGPGHTTP]/download.html>[H /a]
|
random data. See the download page [H a href=[$hGPGHTTP]/download/]<[$hGPGHTTP]/download/>[H /a]
|
||||||
to obtain EGD. Use:
|
to obtain EGD. Use:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
--enable-static-rnd=egd
|
--enable-static-rnd=egd
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
here.
|
here.
|
||||||
|
|
||||||
@ -208,22 +205,22 @@ you could search in the mailing list archive.
|
|||||||
[H a href=ftp://ftp.gnupg.dk/pub/contrib-dk/]<ftp://ftp.gnupg.dk/pub/contrib-dk/>[H /a]. Look for:
|
[H a href=ftp://ftp.gnupg.dk/pub/contrib-dk/]<ftp://ftp.gnupg.dk/pub/contrib-dk/>[H /a]. Look for:
|
||||||
|
|
||||||
[H pre]
|
[H pre]
|
||||||
idea.c.gz (c module)
|
idea.c.gz (c module)
|
||||||
idea.c.gz.sig (signature file)
|
idea.c.gz.sig (signature file)
|
||||||
[H /pre]
|
[H /pre]
|
||||||
|
|
||||||
[H pre]
|
[H pre]
|
||||||
ideadll.zip (c module and win32 dll)
|
ideadll.zip (c module and win32 dll)
|
||||||
ideadll.zip.sig (signature file)
|
ideadll.zip.sig (signature file)
|
||||||
[H /pre]
|
[H /pre]
|
||||||
|
|
||||||
Compilation directives are in the headers of these files. You will
|
Compilation directives are in the headers of these files. You will
|
||||||
then need to add the following line to your ~/.gnupg/gpg.conf or
|
then need to add the following line to your ~/.gnupg/gpg.conf or
|
||||||
~/.gnupg/options file:
|
~/.gnupg/options file:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
load-extension idea
|
load-extension idea
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
|
|
||||||
<S> USAGE
|
<S> USAGE
|
||||||
@ -236,9 +233,9 @@ you could search in the mailing list archive.
|
|||||||
have greater sizes, but you should then check the fingerprint of
|
have greater sizes, but you should then check the fingerprint of
|
||||||
this key:
|
this key:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg --fingerprint <user ID>
|
$ gpg --fingerprint <user ID>
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
As for the key algorithms, you should stick with the default (i.e.,
|
As for the key algorithms, you should stick with the default (i.e.,
|
||||||
DSA signature and ElGamal encryption). An ElGamal signing key has
|
DSA signature and ElGamal encryption). An ElGamal signing key has
|
||||||
@ -285,15 +282,15 @@ you could search in the mailing list archive.
|
|||||||
|
|
||||||
If you do a 'gpg --help', you will get two separate lists. The first
|
If you do a 'gpg --help', you will get two separate lists. The first
|
||||||
is a list of commands. The second is a list of options. Whenever you
|
is a list of commands. The second is a list of options. Whenever you
|
||||||
run GPG, you [H B]must[H /B] pick exactly one command (with one exception,
|
run GPG, you [H b]must[H /b] pick exactly one command (with one exception,
|
||||||
see below). You [H B]may[H /B] pick one or more options. The command should,
|
see below). You [H b]may[H /b] pick one or more options. The command should,
|
||||||
just by convention, come at the end of the argument list, after all
|
just by convention, come at the end of the argument list, after all
|
||||||
the options. If the command takes a file (all the basic ones do),
|
the options. If the command takes a file (all the basic ones do),
|
||||||
the filename comes at the very end. So the basic way to run gpg is:
|
the filename comes at the very end. So the basic way to run gpg is:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg [--option something] [--option2] [--option3 something] --command file
|
$ gpg [--option something] [--option2] [--option3 something] --command file
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
Some options take arguments. For example, the --output option (which
|
Some options take arguments. For example, the --output option (which
|
||||||
can be abbreviated as -o) is an option that takes a filename. The
|
can be abbreviated as -o) is an option that takes a filename. The
|
||||||
@ -306,37 +303,37 @@ you could search in the mailing list archive.
|
|||||||
followed by the file you wish to encrypt. Therefore in this example
|
followed by the file you wish to encrypt. Therefore in this example
|
||||||
the command-line issued would be:
|
the command-line issued would be:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg -r alice -o secret.txt -e test.txt
|
$ gpg -r alice -o secret.txt -e test.txt
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
If you write the options out in full, it is easier to read:
|
If you write the options out in full, it is easier to read:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg --recipient alice --output secret.txt --encrypt test.txt
|
$ gpg --recipient alice --output secret.txt --encrypt test.txt
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
If you're encrypting to a file with the extension ".txt", then you'd
|
If you're encrypting to a file with the extension ".txt", then you'd
|
||||||
probably expect to see ASCII-armored text in the file (not binary),
|
probably expect to see ASCII-armored text in the file (not binary),
|
||||||
so you need to add the --armor (-a) option, which doesn't take any
|
so you need to add the --armor (-a) option, which doesn't take any
|
||||||
arguments:
|
arguments:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg --armor --recipient alice --output secret.txt --encrypt test.txt
|
$ gpg --armor --recipient alice --output secret.txt --encrypt test.txt
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
If you imagine square brackets around the optional parts, it becomes
|
If you imagine square brackets around the optional parts, it becomes
|
||||||
a bit clearer:
|
a bit clearer:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg [--armor] [--recipient alice] [--output secret.txt] --encrypt test.txt
|
$ gpg [--armor] [--recipient alice] [--output secret.txt] --encrypt test.txt
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
The optional parts can be rearranged any way you want:
|
The optional parts can be rearranged any way you want:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg --output secret.txt --recipient alice --armor --encrypt test.txt
|
$ gpg --output secret.txt --recipient alice --armor --encrypt test.txt
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
If your filename begins with a hyphen (e.g. "-a.txt"), GnuPG assumes
|
If your filename begins with a hyphen (e.g. "-a.txt"), GnuPG assumes
|
||||||
this is an option and may complain. To avoid this you have to either
|
this is an option and may complain. To avoid this you have to either
|
||||||
@ -346,9 +343,9 @@ you could search in the mailing list archive.
|
|||||||
[H B]The exception to using only one command:[H /B] signing and encrypting
|
[H B]The exception to using only one command:[H /B] signing and encrypting
|
||||||
at the same time. For this you can combine both commands, such as in:
|
at the same time. For this you can combine both commands, such as in:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg [--options] --sign --encrypt foo.txt
|
$ gpg [--options] --sign --encrypt foo.txt
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
<Q> I can't delete a user ID on my secret keyring because it has
|
<Q> I can't delete a user ID on my secret keyring because it has
|
||||||
already been deleted on my public keyring. What can I do?
|
already been deleted on my public keyring. What can I do?
|
||||||
@ -423,12 +420,12 @@ you could search in the mailing list archive.
|
|||||||
the one displayed - if not, restrict yourself to plain 7 bit ASCII
|
the one displayed - if not, restrict yourself to plain 7 bit ASCII
|
||||||
and no mapping has to be done.
|
and no mapping has to be done.
|
||||||
|
|
||||||
<Q> How can a get list of key IDs used to encrypt a message?
|
<Q> How can I get list of key IDs used to encrypt a message?
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg --batch --decrypt --list-only --status-fd 1 2>/dev/null | \
|
$ gpg --batch --decrypt --list-only --status-fd 1 2>/dev/null |
|
||||||
awk '/^\[GNUPG:\] ENC_TO / { print $3 }'
|
awk '/^\[GNUPG:\] ENC_TO / { print $3 }'
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
<Q> I can't decrypt my symmetrical-only (-c) encrypted messages with
|
<Q> I can't decrypt my symmetrical-only (-c) encrypted messages with
|
||||||
a new version of GnuPG.
|
a new version of GnuPG.
|
||||||
@ -450,31 +447,31 @@ you could search in the mailing list archive.
|
|||||||
automated environment is:
|
automated environment is:
|
||||||
|
|
||||||
On a secure machine:
|
On a secure machine:
|
||||||
[H OL]
|
[H ol]
|
||||||
[H LI] If you want to do automatic signing, create a signing subkey
|
[H li] If you want to do automatic signing, create a signing subkey
|
||||||
for your key (use the interactive key editing menu by issueing
|
for your key (use the interactive key editing menu by issueing
|
||||||
the command 'gpg --edit-key keyID', enter "addkey" and select
|
the command 'gpg --edit-key keyID', enter "addkey" and select
|
||||||
the DSA key type).
|
the DSA key type).
|
||||||
[H LI] Make sure that you use a passphrase (needed by the current
|
[H li] Make sure that you use a passphrase (needed by the current
|
||||||
implementation).
|
implementation).
|
||||||
[H LI] gpg --export-secret-subkeys --no-comment foo >secring.auto
|
[H li] gpg --export-secret-subkeys --no-comment foo >secring.auto
|
||||||
[H LI] Copy secring.auto and the public keyring to a test directory.
|
[H li] Copy secring.auto and the public keyring to a test directory.
|
||||||
[H LI] Change to this directory.
|
[H li] Change to this directory.
|
||||||
[H LI] gpg --homedir . --edit foo and use "passwd" to remove the
|
[H li] gpg --homedir . --edit foo and use "passwd" to remove the
|
||||||
passphrase from the subkeys. You may also want to remove all
|
passphrase from the subkeys. You may also want to remove all
|
||||||
unused subkeys.
|
unused subkeys.
|
||||||
[H LI] Copy secring.auto to a floppy and carry it to the target box.
|
[H li] Copy secring.auto to a floppy and carry it to the target box.
|
||||||
[H /OL]
|
[H /ol]
|
||||||
|
|
||||||
On the target machine:
|
On the target machine:
|
||||||
[H OL]
|
[H ol]
|
||||||
[H LI] Install secring.auto as the secret keyring.
|
[H li] Install secring.auto as the secret keyring.
|
||||||
[H LI] Now you can start your new service. It's also a good idea to
|
[H li] Now you can start your new service. It's also a good idea to
|
||||||
install an intrusion detection system so that you hopefully
|
install an intrusion detection system so that you hopefully
|
||||||
get a notice of an successful intrusion, so that you in turn
|
get a notice of an successful intrusion, so that you in turn
|
||||||
can revoke all the subkeys installed on that machine and
|
can revoke all the subkeys installed on that machine and
|
||||||
install new subkeys.
|
install new subkeys.
|
||||||
[H /OL]
|
[H /ol]
|
||||||
|
|
||||||
<Q> Which email-client can I use with GnuPG?
|
<Q> Which email-client can I use with GnuPG?
|
||||||
|
|
||||||
@ -491,30 +488,30 @@ you could search in the mailing list archive.
|
|||||||
The following list is not exhaustive:
|
The following list is not exhaustive:
|
||||||
|
|
||||||
[H pre]
|
[H pre]
|
||||||
MUA OpenPGP ASCII How? (N,P,T)
|
MUA OpenPGP ASCII How? (N,P,T)
|
||||||
---------------------------------------------------------------
|
-------------------------------------------------------------
|
||||||
Calypso N Y P (Unixmail)
|
Calypso N Y P (Unixmail)
|
||||||
Elm N Y T (mailpgp,morepgp)
|
Elm N Y T (mailpgp,morepgp)
|
||||||
Elm ME+ N Y N
|
Elm ME+ N Y N
|
||||||
Emacs/Gnus Y Y T (Mailcrypt,gpg.el)
|
Emacs/Gnus Y Y T (Mailcrypt,gpg.el)
|
||||||
Emacs/Mew Y Y N
|
Emacs/Mew Y Y N
|
||||||
Emacs/VM N Y T (Mailcrypt)
|
Emacs/VM N Y T (Mailcrypt)
|
||||||
Evolution Y Y N
|
Evolution Y Y N
|
||||||
Exmh Y Y N
|
Exmh Y Y N
|
||||||
GNUMail.app Y Y P (PGPBundle)
|
GNUMail.app Y Y P (PGPBundle)
|
||||||
GPGMail Y Y N
|
GPGMail Y Y N
|
||||||
KMail (<=1.4.x) N Y N
|
KMail (<=1.4.x) N Y N
|
||||||
KMail (1.5.x) Y(P) Y(N) P/N
|
KMail (1.5.x) Y(P) Y(N) P/N
|
||||||
Mozilla Y Y P (Enigmail)
|
Mozilla Y Y P (Enigmail)
|
||||||
Mulberry Y Y P
|
Mulberry Y Y P
|
||||||
Mutt Y Y N
|
Mutt Y Y N
|
||||||
Sylpheed Y Y N
|
Sylpheed Y Y N
|
||||||
Sylpheed-claws Y Y N
|
Sylpheed-claws Y Y N
|
||||||
TkRat Y Y N
|
TkRat Y Y N
|
||||||
XEmacs/Gnus Y Y T (Mailcrypt)
|
XEmacs/Gnus Y Y T (Mailcrypt)
|
||||||
XEmacs/Mew Y Y N
|
XEmacs/Mew Y Y N
|
||||||
XEmacs/VM N Y T (Mailcrypt)
|
XEmacs/VM N Y T (Mailcrypt)
|
||||||
XFmail Y Y N
|
XFmail Y Y N
|
||||||
|
|
||||||
N - Native, P - Plug-in, T - External Tool
|
N - Native, P - Plug-in, T - External Tool
|
||||||
[H /pre]
|
[H /pre]
|
||||||
@ -524,22 +521,22 @@ you could search in the mailing list archive.
|
|||||||
for interoperability reasons for your convenience.
|
for interoperability reasons for your convenience.
|
||||||
|
|
||||||
[H pre]
|
[H pre]
|
||||||
MUA OpenPGP ASCII How? (N,P,T)
|
MUA OpenPGP ASCII How? (N,P,T)
|
||||||
---------------------------------------------------------------
|
-------------------------------------------------------------
|
||||||
Apple Mail Y Y P (GPGMail)
|
Apple Mail Y Y P (GPGMail)
|
||||||
Becky2 Y Y P (BkGnuPG)
|
Becky2 Y Y P (BkGnuPG)
|
||||||
Eudora Y Y P (EuroraGPG)
|
Eudora Y Y P (EuroraGPG)
|
||||||
Eudora Pro Y Y P (EudoraGPG)
|
Eudora Pro Y Y P (EudoraGPG)
|
||||||
Lotus Notes N Y P
|
Lotus Notes N Y P
|
||||||
Netscape 4.x N Y P
|
Netscape 4.x N Y P
|
||||||
Netscape 7.x Y Y P (Enigmail)
|
Netscape 7.x Y Y P (Enigmail)
|
||||||
Novell Groupwise N Y P
|
Novell Groupwise N Y P
|
||||||
Outlook N Y P (G-Data)
|
Outlook N Y P (G-Data)
|
||||||
Outlook Express N Y P (GPGOE)
|
Outlook Express N Y P (GPGOE)
|
||||||
Pegasus N Y P (QDPGP,PM-PGP)
|
Pegasus N Y P (QDPGP,PM-PGP)
|
||||||
Pine N Y T (pgpenvelope,(gpg|pgp)4pine)
|
Pine N Y T (pgpenvelope,(gpg|pgp)4pine)
|
||||||
Postme N Y P (GPGPPL)
|
Postme N Y P (GPGPPL)
|
||||||
The Bat! N Y P (Ritlabs)
|
The Bat! N Y P (Ritlabs)
|
||||||
[H /pre]
|
[H /pre]
|
||||||
|
|
||||||
Good overviews of OpenPGP-support can be found at:[H br]
|
Good overviews of OpenPGP-support can be found at:[H br]
|
||||||
@ -566,15 +563,15 @@ you could search in the mailing list archive.
|
|||||||
Most keyservers don't accept a 'bare' revocation certificate. You
|
Most keyservers don't accept a 'bare' revocation certificate. You
|
||||||
have to import the certificate into gpg first:
|
have to import the certificate into gpg first:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg --import my-revocation.asc
|
$ gpg --import my-revocation.asc
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
then send the revoked key to the keyservers:
|
then send the revoked key to the keyservers:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg --keyserver certserver.pgp.com --send-keys mykeyid
|
$ gpg --keyserver certserver.pgp.com --send-keys mykeyid
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
(or use a keyserver web interface for this).
|
(or use a keyserver web interface for this).
|
||||||
|
|
||||||
@ -586,11 +583,11 @@ you could search in the mailing list archive.
|
|||||||
and others. GnuPG will always create and use these files. On unices,
|
and others. GnuPG will always create and use these files. On unices,
|
||||||
the homedir is usually ~/.gnupg; on Windows "C:\gnupg\".
|
the homedir is usually ~/.gnupg; on Windows "C:\gnupg\".
|
||||||
|
|
||||||
If you want to put your keyrings somewhere else, use:
|
If you want to put your keyrings somewhere else, use the option:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
--homedir /my/path/
|
--homedir /my/path/
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
to make GnuPG create all its files in that directory. Your keyring
|
to make GnuPG create all its files in that directory. Your keyring
|
||||||
will be "/my/path/pubring.gpg". This way you can store your secrets
|
will be "/my/path/pubring.gpg". This way you can store your secrets
|
||||||
@ -612,9 +609,9 @@ you could search in the mailing list archive.
|
|||||||
Once their key has been imported, and the package and accompanying
|
Once their key has been imported, and the package and accompanying
|
||||||
signature files have been downloaded, use:
|
signature files have been downloaded, use:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
$ gpg --verify sigfile signed-file
|
$ gpg --verify sigfile signed-file
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
If the signature file has the same base name as the package file,
|
If the signature file has the same base name as the package file,
|
||||||
the package can also be verified by specifying just the signature
|
the package can also be verified by specifying just the signature
|
||||||
@ -623,9 +620,9 @@ you could search in the mailing list archive.
|
|||||||
package named foobar.tar.gz against its detached binary signature
|
package named foobar.tar.gz against its detached binary signature
|
||||||
file, use:
|
file, use:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
$ gpg --verify foobar.tar.gz.sig
|
$ gpg --verify foobar.tar.gz.sig
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
<Q> How do I export a keyring with only selected signatures?
|
<Q> How do I export a keyring with only selected signatures?
|
||||||
|
|
||||||
@ -633,9 +630,9 @@ you could search in the mailing list archive.
|
|||||||
selected from a master keyring (for a club, user group, or company
|
selected from a master keyring (for a club, user group, or company
|
||||||
department for example), simply specify the keys you want to export:
|
department for example), simply specify the keys you want to export:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
$ gpg --armor --export key1 key2 key3 key4 > keys1-4.asc
|
$ gpg --armor --export key1 key2 key3 key4 > keys1-4.asc
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
<Dgpgsplit>
|
<Dgpgsplit>
|
||||||
<Q> I still have my secret key, but lost my public key. What can I do?
|
<Q> I still have my secret key, but lost my public key. What can I do?
|
||||||
@ -648,9 +645,9 @@ you could search in the mailing list archive.
|
|||||||
(it's actually a new option for gpgsplit) and is available with GnuPG
|
(it's actually a new option for gpgsplit) and is available with GnuPG
|
||||||
versions 1.2.1 or later (or can be found in CVS). It works like this:
|
versions 1.2.1 or later (or can be found in CVS). It works like this:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
$ gpgsplit --no-split --secret-to-public secret.gpg >publickey.gpg
|
$ gpgsplit --no-split --secret-to-public secret.gpg >publickey.gpg
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
One should first try to export the secret key and convert just this
|
One should first try to export the secret key and convert just this
|
||||||
one. Using the entire secret keyring should work too. After this has
|
one. Using the entire secret keyring should work too. After this has
|
||||||
@ -675,34 +672,34 @@ you could search in the mailing list archive.
|
|||||||
|
|
||||||
It depends on the PGP version.
|
It depends on the PGP version.
|
||||||
|
|
||||||
[H UL]
|
[H ul]
|
||||||
[H LI]PGP 2.x[H br]
|
[H li]PGP 2.x[H br]
|
||||||
You can't do that because PGP 2.x normally uses IDEA which is not
|
You can't do that because PGP 2.x normally uses IDEA which is not
|
||||||
supported by GnuPG as it is patented (see <Ridea>), but if you have a
|
supported by GnuPG as it is patented (see <Ridea>), but if you have a
|
||||||
modified version of PGP you can try this:
|
modified version of PGP you can try this:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg --rfc1991 --cipher-algo 3des ...
|
$ gpg --rfc1991 --cipher-algo 3des ...
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
Please don't pipe the data to encrypt to gpg but provide it using a
|
Please don't pipe the data to encrypt to gpg but provide it using a
|
||||||
filename; otherwise, PGP 2 will not be able to handle it.
|
filename; otherwise, PGP 2 will not be able to handle it.
|
||||||
|
|
||||||
As for conventional encryption, you can't do this for PGP 2.
|
As for conventional encryption, you can't do this for PGP 2.
|
||||||
|
|
||||||
[H LI]PGP 5.x and higher[H br]
|
[H li]PGP 5.x and higher[H br]
|
||||||
You need to provide two additional options:
|
You need to provide two additional options:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
--compress-algo 1 --cipher-algo cast5
|
--compress-algo 1 --cipher-algo cast5
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
You may also use "3des" instead of "cast5", and "blowfish" does not
|
You may also use "3des" instead of "cast5", and "blowfish" does not
|
||||||
work with all versions of PGP 5. You may also want to put:
|
work with all versions of PGP 5. You may also want to put:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
compress-algo 1
|
compress-algo 1
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
into your ~/.gnupg/options file - this does not affect normal GnuPG
|
into your ~/.gnupg/options file - this does not affect normal GnuPG
|
||||||
operation.
|
operation.
|
||||||
@ -745,9 +742,9 @@ you could search in the mailing list archive.
|
|||||||
There is a script in the tools directory to help you. After you have
|
There is a script in the tools directory to help you. After you have
|
||||||
imported the PGP keyring you can give this command:
|
imported the PGP keyring you can give this command:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
$ lspgpot pgpkeyring | gpg --import-ownertrust
|
$ lspgpot pgpkeyring | gpg --import-ownertrust
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
where pgpkeyring is the original keyring and not the GnuPG keyring
|
where pgpkeyring is the original keyring and not the GnuPG keyring
|
||||||
you might have created in the first step.
|
you might have created in the first step.
|
||||||
@ -759,9 +756,9 @@ you could search in the mailing list archive.
|
|||||||
PGP is not really OpenPGP aware. A workaround is to export the
|
PGP is not really OpenPGP aware. A workaround is to export the
|
||||||
secret keys with this command:
|
secret keys with this command:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
$ gpg --export-secret-keys --no-comment -a your-key-id
|
$ gpg --export-secret-keys --no-comment -a your-KeyID
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
Another possibility is this: by default, GnuPG encrypts your secret
|
Another possibility is this: by default, GnuPG encrypts your secret
|
||||||
key using the Blowfish symmetric algorithm. Older PGPs will only
|
key using the Blowfish symmetric algorithm. Older PGPs will only
|
||||||
@ -769,10 +766,10 @@ you could search in the mailing list archive.
|
|||||||
following method you can re-encrypt your secret gpg key with a
|
following method you can re-encrypt your secret gpg key with a
|
||||||
different algo:
|
different algo:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
$ gpg --s2k-cipher-algo=CAST5 --s2k-digest-algo=SHA1 \
|
$ gpg --s2k-cipher-algo=CAST5 --s2k-digest-algo=SHA1
|
||||||
--compress-algo=1 --edit-key <username>
|
--compress-algo=1 --edit-key <username>
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
Then use passwd to change the password (just change it to the same
|
Then use passwd to change the password (just change it to the same
|
||||||
thing, but it will encrypt the key with CAST5 this time).
|
thing, but it will encrypt the key with CAST5 this time).
|
||||||
@ -781,10 +778,10 @@ you could search in the mailing list archive.
|
|||||||
|
|
||||||
For PGP 6.x the following options work to export a key:
|
For PGP 6.x the following options work to export a key:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
$ gpg --s2k-cipher-algo 3des --compress-algo 1 --rfc1991 \
|
$ gpg --s2k-cipher-algo 3des --compress-algo 1 --rfc1991
|
||||||
--export-secret-keys <key-ID>
|
--export-secret-keys <KeyID>
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
<Doptions>
|
<Doptions>
|
||||||
<Q> GnuPG no longer installs a ~/.gnupg/options file. Is it missing?
|
<Q> GnuPG no longer installs a ~/.gnupg/options file. Is it missing?
|
||||||
@ -817,25 +814,25 @@ you could search in the mailing list archive.
|
|||||||
values, as this will override them in case you have something else set
|
values, as this will override them in case you have something else set
|
||||||
in your options file.
|
in your options file.
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
$ gpg --s2k-cipher-algo cast5 --s2k-digest-algo sha1 --s2k-mode 3 \
|
$ gpg --s2k-cipher-algo cast5 --s2k-digest-algo sha1 --s2k-mode 3
|
||||||
--simple-sk-checksum --edit KeyID
|
--simple-sk-checksum --edit KeyID
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
Turn off some features. Set the list of preferred ciphers, hashes,
|
Turn off some features. Set the list of preferred ciphers, hashes,
|
||||||
and compression algorithms to things that PGP can handle. (Yes, I
|
and compression algorithms to things that PGP can handle. (Yes, I
|
||||||
know this is an odd list of ciphers, but this is what PGP itself uses,
|
know this is an odd list of ciphers, but this is what PGP itself uses,
|
||||||
minus IDEA).
|
minus IDEA).
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
> setpref S9 S8 S7 S3 S2 S10 H2 H3 Z1 Z0
|
> setpref S9 S8 S7 S3 S2 S10 H2 H3 Z1 Z0
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
Now put the list of preferences onto the key.
|
Now put the list of preferences onto the key.
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
> updpref
|
> updpref
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
Finally we must decrypt and re-encrypt the key, making sure that we
|
Finally we must decrypt and re-encrypt the key, making sure that we
|
||||||
encrypt with a cipher that PGP likes. We set this up in the --edit
|
encrypt with a cipher that PGP likes. We set this up in the --edit
|
||||||
@ -843,22 +840,22 @@ you could search in the mailing list archive.
|
|||||||
take effect. You can use the same passphrase if you like, or take
|
take effect. You can use the same passphrase if you like, or take
|
||||||
this opportunity to actually change it.
|
this opportunity to actually change it.
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
> passwd
|
> passwd
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
Save our work.
|
Save our work.
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
> save
|
> save
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
Now we can do the usual export:
|
Now we can do the usual export:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
$ gpg --export KeyID > mypublickey.pgp
|
$ gpg --export KeyID > mypublickey.pgp
|
||||||
$ gpg --export-secret-key KeyID > mysecretkey.pgp
|
$ gpg --export-secret-key KeyID > mysecretkey.pgp
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
Thanks to David Shaw for this information!
|
Thanks to David Shaw for this information!
|
||||||
|
|
||||||
@ -876,15 +873,15 @@ you could search in the mailing list archive.
|
|||||||
|
|
||||||
To setuid(root) permissions on the gpg binary you can either use:
|
To setuid(root) permissions on the gpg binary you can either use:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
chmod u+s /path/to/gpg
|
$ chmod u+s /path/to/gpg
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
or
|
or
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
chmod 4755 /path/to/gpg
|
$ chmod 4755 /path/to/gpg
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
Some refrain from using setuid(root) unless absolutely required for
|
Some refrain from using setuid(root) unless absolutely required for
|
||||||
security reasons. Please check with your system administrator if you
|
security reasons. Please check with your system administrator if you
|
||||||
@ -893,25 +890,26 @@ you could search in the mailing list archive.
|
|||||||
On UnixWare 2.x and 7.x you should install GnuPG with the 'plock'
|
On UnixWare 2.x and 7.x you should install GnuPG with the 'plock'
|
||||||
privilege to get the same effect:
|
privilege to get the same effect:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
filepriv -f plock /path/to/gpg
|
$ filepriv -f plock /path/to/gpg
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
If you can't or don't want to install GnuPG setuid(root), you can
|
If you can't or don't want to install GnuPG setuid(root), you can
|
||||||
use the option "--no-secmem-warning" or put:
|
use the option "--no-secmem-warning" or put:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
no-secmem-warning
|
no-secmem-warning
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
in your ~/.gnupg/options file (this disables the warning).
|
in your ~/.gnupg/options or ~/.gnupg/gpg.conf file (this disables
|
||||||
|
the warning).
|
||||||
|
|
||||||
On some systems (e.g., Windows) GnuPG does not lock memory pages
|
On some systems (e.g., Windows) GnuPG does not lock memory pages
|
||||||
and older GnuPG versions (<=1.0.4) issue the warning:
|
and older GnuPG versions (<=1.0.4) issue the warning:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg: Please note that you don't have secure memory
|
gpg: Please note that you don't have secure memory
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
This warning can't be switched off by the above option because it
|
This warning can't be switched off by the above option because it
|
||||||
was thought to be too serious an issue. However, it confused users
|
was thought to be too serious an issue. However, it confused users
|
||||||
@ -999,9 +997,9 @@ you could search in the mailing list archive.
|
|||||||
GnuPG installation in a recent state anyway. As a workaround, you can
|
GnuPG installation in a recent state anyway. As a workaround, you can
|
||||||
force gpg to use a previous default cipher algo by putting:
|
force gpg to use a previous default cipher algo by putting:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
cipher-algo cast5
|
cipher-algo cast5
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
into your options file.
|
into your options file.
|
||||||
|
|
||||||
@ -1051,11 +1049,11 @@ you could search in the mailing list archive.
|
|||||||
|
|
||||||
This will be fixed after GnuPG has been upgraded to autoconf-2.50.
|
This will be fixed after GnuPG has been upgraded to autoconf-2.50.
|
||||||
Until then, find the line setting CDPATH in the configure script
|
Until then, find the line setting CDPATH in the configure script
|
||||||
and place a:
|
and place an:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
unset CDPATH
|
unset CDPATH
|
||||||
[H /pre]
|
[H /samp]
|
||||||
|
|
||||||
statement below it.
|
statement below it.
|
||||||
|
|
||||||
@ -1064,9 +1062,7 @@ you could search in the mailing list archive.
|
|||||||
There is a small bug in 1.0.6 which didn't parse trust packets
|
There is a small bug in 1.0.6 which didn't parse trust packets
|
||||||
correctly. You may want to apply this patch if you can't upgrade:
|
correctly. You may want to apply this patch if you can't upgrade:
|
||||||
|
|
||||||
[H pre]
|
[H a href=http://www.gnupg.org/developer/gpg-woody-fix.txt]<http://www.gnupg.org/developer/gpg-woody-fix.txt>[H /a]
|
||||||
http://www.gnupg.org/developer/gpg-woody-fix.txt
|
|
||||||
[H /pre]
|
|
||||||
|
|
||||||
<Q> I upgraded to GnuPG version 1.0.7 and now it takes longer to load my
|
<Q> I upgraded to GnuPG version 1.0.7 and now it takes longer to load my
|
||||||
keyrings. What can I do?
|
keyrings. What can I do?
|
||||||
@ -1083,9 +1079,9 @@ you could search in the mailing list archive.
|
|||||||
|
|
||||||
To generate a secret/public keypair, run:
|
To generate a secret/public keypair, run:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg --gen-key
|
$ gpg --gen-key
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
and choose the default values.
|
and choose the default values.
|
||||||
|
|
||||||
@ -1132,16 +1128,16 @@ you could search in the mailing list archive.
|
|||||||
person it says it comes from. You should be very sure that is really
|
person it says it comes from. You should be very sure that is really
|
||||||
that person: You should verify the key fingerprint with:
|
that person: You should verify the key fingerprint with:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg --fingerprint user-id
|
$ gpg --fingerprint KeyID
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
over the phone (if you really know the voice of the other person), at
|
over the phone (if you really know the voice of the other person), at
|
||||||
a key signing party (which are often held at computer conferences),
|
a key signing party (which are often held at computer conferences),
|
||||||
or at a meeting of your local GNU/Linux User Group.
|
or at a meeting of your local GNU/Linux User Group.
|
||||||
|
|
||||||
Hmm, what else. You may use the option "-o filename" to force output
|
Hmm, what else. You may use the option '-o filename' to force output
|
||||||
to this filename (use "-" to force output to stdout). "-r" just lets
|
to this filename (use '-' to force output to stdout). '-r' just lets
|
||||||
you specify the recipient (which public key you encrypt with) on the
|
you specify the recipient (which public key you encrypt with) on the
|
||||||
command line instead of typing it interactively.
|
command line instead of typing it interactively.
|
||||||
|
|
||||||
@ -1175,9 +1171,9 @@ you could search in the mailing list archive.
|
|||||||
You can see the validity (calculated trust value) using this
|
You can see the validity (calculated trust value) using this
|
||||||
command.
|
command.
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg --list-keys --with-colons
|
$ gpg --list-keys --with-colons
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
If the first field is "pub" or "uid", the second field shows you the
|
If the first field is "pub" or "uid", the second field shows you the
|
||||||
trust:
|
trust:
|
||||||
@ -1193,15 +1189,15 @@ you could search in the mailing list archive.
|
|||||||
for keys for which the secret key is also available.
|
for keys for which the secret key is also available.
|
||||||
r = The key has been revoked
|
r = The key has been revoked
|
||||||
d = The key has been disabled
|
d = The key has been disabled
|
||||||
[H/pre]
|
[H /pre]
|
||||||
|
|
||||||
The value in the "pub" record is the best one of all "uid" records.
|
The value in the "pub" record is the best one of all "uid" records.
|
||||||
You can get a list of the assigned trust values (how much you trust
|
You can get a list of the assigned trust values (how much you trust
|
||||||
the owner to correctly sign another person's key) with:
|
the owner to correctly sign another person's key) with:
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
gpg --list-ownertrust
|
$ gpg --list-ownertrust
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
The first field is the fingerprint of the primary key, the second
|
The first field is the fingerprint of the primary key, the second
|
||||||
field is the assigned value:
|
field is the assigned value:
|
||||||
@ -1213,7 +1209,7 @@ you could search in the mailing list archive.
|
|||||||
keys.
|
keys.
|
||||||
f = Assume that the key holder really knows how to sign keys.
|
f = Assume that the key holder really knows how to sign keys.
|
||||||
u = No need to trust ourself because we have the secret key.
|
u = No need to trust ourself because we have the secret key.
|
||||||
[H/pre]
|
[H /pre]
|
||||||
|
|
||||||
Keep these values confidential because they express your opinions
|
Keep these values confidential because they express your opinions
|
||||||
about others. PGP stores this information with the keyring thus it
|
about others. PGP stores this information with the keyring thus it
|
||||||
@ -1234,24 +1230,24 @@ you could search in the mailing list archive.
|
|||||||
information which is prefixed with information about the checked
|
information which is prefixed with information about the checked
|
||||||
item.
|
item.
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
"key 12345678.3456"
|
"key 12345678.3456"
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
This is about the key with key ID 12345678 and the internal number
|
This is about the key with key ID 12345678 and the internal number
|
||||||
3456, which is the record number of the so called directory record
|
3456, which is the record number of the so called directory record
|
||||||
in the trustdb.
|
in the trustdb.
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
"uid 12345678.3456/ACDE"
|
"uid 12345678.3456/ACDE"
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
This is about the user ID for the same key. To identify the user ID
|
This is about the user ID for the same key. To identify the user ID
|
||||||
the last two bytes of a ripe-md-160 over the user ID ring is printed.
|
the last two bytes of a ripe-md-160 over the user ID ring is printed.
|
||||||
|
|
||||||
[H pre]
|
[H samp]
|
||||||
"sig 12345678.3456/ACDE/9A8B7C6D"
|
"sig 12345678.3456/ACDE/9A8B7C6D"
|
||||||
[H/pre]
|
[H /samp]
|
||||||
|
|
||||||
This is about the signature with key ID 9A8B7C6D for the above key
|
This is about the signature with key ID 9A8B7C6D for the above key
|
||||||
and user ID, if it is a signature which is direct on a key, the user
|
and user ID, if it is a signature which is direct on a key, the user
|
||||||
@ -1290,14 +1286,14 @@ you could search in the mailing list archive.
|
|||||||
<S> ACKNOWLEDGEMENTS
|
<S> ACKNOWLEDGEMENTS
|
||||||
|
|
||||||
Many thanks to Nils Ellmenreich for maintaining this FAQ file for
|
Many thanks to Nils Ellmenreich for maintaining this FAQ file for
|
||||||
a long time, Werner Koch for the original FAQ file, and to all
|
such a long time, Werner Koch for the original FAQ file, and to all
|
||||||
posters to gnupg-users and gnupg-devel. They all provided most
|
posters to gnupg-users and gnupg-devel. They all provided most of
|
||||||
of the answers.
|
the answers.
|
||||||
|
|
||||||
Also thanks to Casper Dik for providing us with a script to generate
|
Also thanks to Casper Dik for providing us with a script to generate
|
||||||
this FAQ (he uses it for the excellent Solaris2 FAQ).
|
this FAQ (he uses it for the excellent Solaris2 FAQ).
|
||||||
|
|
||||||
[H HR]
|
[H hr]
|
||||||
|
|
||||||
Copyright (C) 2000-2002 Free Software Foundation, Inc.,
|
Copyright (C) 2000-2002 Free Software Foundation, Inc.,
|
||||||
59 Temple Place - Suite 330, Boston, MA 02111, USA
|
59 Temple Place - Suite 330, Boston, MA 02111, USA
|
||||||
|
Loading…
x
Reference in New Issue
Block a user