[Winpt-commits] r224 - in trunk: . Doc

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Sun Jun 4 12:13:21 CEST 2006


Author: twoaday
Date: 2006-06-04 12:13:20 +0200 (Sun, 04 Jun 2006)
New Revision: 224

Modified:
   trunk/AUTHORS
   trunk/Doc/winpt.texi
   trunk/NEWS
   trunk/configure.ac
Log:


Modified: trunk/AUTHORS
===================================================================
--- trunk/AUTHORS	2006-06-02 08:00:43 UTC (rev 223)
+++ trunk/AUTHORS	2006-06-04 10:13:20 UTC (rev 224)
@@ -23,9 +23,6 @@
 Janne Bergmann <fixme>
 GNU G++ patches to allow to compile WinPT with the GNU toolchain.
 
-Kurt Fitzner
-MyGPGME patches for Borland C++ and project files for it.
-
 wptTrayPop.cpp - Prasenjeet Dutta
 wptNLS.cpp - Ulrich Drepper <ulrich at cygnus.com>
 rmd160.c, random.c - Free Software Foundation <fsf at gnu.org>, 

Modified: trunk/Doc/winpt.texi
===================================================================
--- trunk/Doc/winpt.texi	2006-06-02 08:00:43 UTC (rev 223)
+++ trunk/Doc/winpt.texi	2006-06-04 10:13:20 UTC (rev 224)
@@ -24,7 +24,54 @@
 recommend. The program also works on NT/95/ME but there is no support
 for these OS versions any longer.
 
+ at section A short Introduction
+WinPT is a graphical GnuPG front-end which resides in the task bar.
+It is divided into several, so-called, managers. There is a manager
+for the keyring, for files and for smart cards. The aim of the program
+is to secure email communication and to perform file encryption.
 
+ at subsection What is GnuPG
+GnuPG is a tool for secure communication and data storage.
+It can be used to encrypt data and to create digital signatures.
+It includes an advanced key management facility and is compliant
+with the proposed Internet standard as described in RFC2440.
+
+ at subsection The Web of Trust
+For a detailled description of these and other GnuPG topics, I
+recommend the available literature at http://www.gnupg.org. But
+at least a general overview should be given here.
+
+The certification scheme of OpenPGP does not base on a hirachical
+approach. Instead it uses a combination of ownertrust and direct
+key certification. Here is an example with Alice, Bob, Carol and Dave.
+
+Alice knows Bob and checked the fingerprint of Bob's key when he
+met him personally. Thus she knows that the key really belongs to
+its owner and he trusts Bob to certify other keys. Then she issued
+a signature on Bob's key. Bob knows Carol and also checked her identity.
+Then he signed her key. Alice does not know Carol, but he knows Bob
+and Bob trusts Carol. And because Alice trusts Bob, at a level she
+decided before, he also trusts Carol. It's a transitiv relation.
+Dave is isolated and does not know anybody from the mentioned persons,
+thus he is not in the WoT.
+Another very important point is, that the signer can decide,
+after the certification, how much he trusts the key owner to
+certify other keys.
+
+It is very important to check the identify of a key owner. Mostly
+this is done by comparing the fingerprint, which were submitted
+by phone or written down at a personal meeting, with the fingerprint
+of the key in the keyring. Please bear in mind that anybody can create
+a key with an email address and a specific name. Thus it is not
+recommend to sign keys without doing this check before!
+
+The fingerprint of the key is hexadecial (160-bit) sequence divided
+into 10 groups of 4 hex digits. You can get the fingerprint of a key
+by opening the key property dialog. There you can mark the fingerprint
+and copy it to the clipboard.
+
+Example: 1D75 8108 5BC9 D9FB E78B  2078 ED46 81C9 BF3D F9B4
+
 @section Installation of the Program
 
 It is always recommend to use the latest version of the program. You
@@ -32,6 +79,8 @@
 Download the zip file with the binaries inside and unpack them in
 a folder. All files need to be in the same folder, so if you change
 the folder don't forget to move all files.
+You should also download and verify the signature of the packet to 
+make sure that the release is really authentic.
 
 To activate the program you just need to start WinPT.exe. You should
 now see a little (golden key) icon in the taskbar which indicates that 
@@ -68,8 +117,7 @@
 
 To enable keyring backups, the user can either decide to use the
 GPG home directory as the backup folder or any other folder. In
-the latter case, a folder needs to be chosen. If the backup should
-also include the secret keyring, please check the corresponding box.
+the latter case, a folder needs to be chosen.
 
 
 @section The First Start
@@ -110,9 +158,33 @@
 or to search for a given pattern.
 
 @subsection Retrieve a key by Key ID
+The best way to fetch a key from the server is by the key ID.
+Just enter the key ID, it is always a good idea to prefix it
+with 0x and click the "Receive" button.
 
+An example:
+
+pattern: 0xBF3DF9B4
+
+[Receive]
+
+
 @subsection Retrieve a key by its email address
+If you only know the email address from your partner, you can
+enter it instead of the key ID. It is unlikely but possible
+that there are more keys with the same address. In this situation,
+WinPT will warn you that multiple keys were imported. The difference
+to the search function is, that the keys were dirctly fetched and
+not displayed as a key result list.
 
+
+An example:
+
+pattern: name_of_friend@@gmx.net
+
+[Receive]
+
+
 @subsection Search for a key by pattern
 If you want to communicate with a new mail partner and you are
 not sure about the key ID, it can be useful to search for his
@@ -120,7 +192,7 @@
 
 An example:
 
-pattern: twoaday@@freakmail.de
+pattern: winpt@@windows-privacy-tray.com
 
 [Search]
 
@@ -131,8 +203,79 @@
 to your keyring. Now you can encrypt data with this key, for
 example an email.
 
- at section Adding new elements to your key
+ at subsection Sending a Key to the Keyserver
+After you generated a new key pair, it is a good idea to send your
+key to the keyserver to make it available for other users. If you
+issue a signature, the key ID is part of the signature and people can 
+automatically retrieve your key when they try to verify the signature.
 
+Actually, the action is performed in the Key Manager and not in the
+keyserver dialog. Just open the Key Manager, select the key you want
+to send right-click on it and chose "Send to Keyserver" in the popup
+menu. Then a message box with the result is shown.
+
+ at subsection Add, Delete or Edit a Keyserver Entry
+The keyserver dialog allow to change the existing keyserver entries,
+to delete them or to add new entries. Just right click on a selected
+item and a popup menu will be shown with ("Edit", "Remove" and "New").
+
+ at section Using the Clipboard
+A major aim from the first day was, that the program does not
+depend on a special mailer client. For this reason it uses the
+clipboard to encrypt and/or sign data.
+For the examples, let's assume that you want to write a new
+mail or that you received a mail protected by GnuPG.
+
+ at subsection Encrypt Data in the Clipboard
+Just copy the text from the mailer window into the clipboard.
+This is usually done by CTRL+C, make sure you really selected
+all portions of the text. Then right-click on the tray icon
+and select Clipboard->Encryption. Now a dialog is shown to
+select the recipients. This means you need to select all
+keys which should be able to decrypt the mail. Confirm with "OK".
+GnuPG now encrypts the data with the selected recipients. At the
+end a message box with the result is shown. Now the clipboard should 
+contain the encrypted data. Just paste it into the mailer window.
+The output should contain a header and a footer
+"BEGIN PGP MESSAGE" and "END PGP MESSAGE.
+
+ at subsection Decrypt/Verify Data from the Clipboard
+
+ at subsection Sign the Clipboard
+
+ at section The Key Manager
+This part of the program is propably most important for many users.
+It contains function to manage your keyring and to perform actions
+which are required and/or useful in the OpenPGP environment.
+
+ at subsection Tips
+
+ at itemize @bullet
+
+ at item
+If you want to import quickly a key from a into the keyring, just
+drag and drop the file into the Key Manager window. Then the import
+procedure will be automatically started.
+
+ at item
+Key which were fetched from keyservers often contain a lot of,
+maybe obsolete, self signatures, if you want to get rid of them
+you can use the Key Edit->Clean feature. Just start the edit
+dialog and select the clean command. That's it.
+
+ at item
+The keyserver dialog does not allow to import a key directly
+via an URL, as an alternative you may use the "Import HTTP..."
+feature in the Key Manager. With it you can directly fetch keys
+from the web (Example: http://www.users.my-isp.de/~joe/gpg-keys.asc).
+
+ at item
+To customize the parameters of the generated key, you can use
+the expert key generation. It allows you to set the public key
+algorithm and/or the size of the key directly.
+
+ at end itemize
+
 @subsection Adding a new secondary key
 
 For most users the existing keys in the key pair are enough

Modified: trunk/NEWS
===================================================================
--- trunk/NEWS	2006-06-02 08:00:43 UTC (rev 223)
+++ trunk/NEWS	2006-06-04 10:13:20 UTC (rev 224)
@@ -834,3 +834,8 @@
 
 (0.12.3)
 * Fix sigv due to missing patch.
+
+
+Noteworthy changes in version 1.0.0 (2006-06-XX)
+================================================
+

Modified: trunk/configure.ac
===================================================================
--- trunk/configure.ac	2006-06-02 08:00:43 UTC (rev 223)
+++ trunk/configure.ac	2006-06-04 10:13:20 UTC (rev 224)
@@ -15,7 +15,7 @@
 
 # Version number: Remember to change it immediately *after* a release.
 #                 Add a "-cvs" prefix for non-released code.
-AC_INIT(WinPT, 0.12.3, http://www.winpt.org)
+AC_INIT(WinPT, 1.0.0pre0-cvs, http://www.winpt.org)
 NEED_GPG_VERSION=1.4.2
 NEED_GPGME_API=1
 NEED_GPGME_VERSION=1.1.1



More information about the Winpt-commits mailing list