Changes between Version 29 and Version 30 of gpg

Jun 25, 2012, 4:39:54 PM (9 years ago)
Jamie McClelland



  • gpg

    v29 v30  
    1 [[PageOutline]]
    2 = How can I use gpg to both encrypt my email and prove my identity? =
    4 == In plain language, what does it mean to encrypt my email? ==
    6 For most of us, when we first decide we want to encrypt our email, we only think about one half of the equation: scrambling our message in a way that only the intended recipient can read it.
    8 A second, and equally important component that is often over looked is authenticity. If someone sends you a secret message, how do you know it was sent by the person who is claiming to have sent it? A little known fact about the Internet is that forging the from address in an email message is just about as easy as forging the from address on a postal letter.
    10 Encryption (scrambling your message) and authenticity (knowing who really sent the message) are the two pillars of secure communication. You must have both to securely send private messages between two parties.
    12 Therefore, when sending mail that you want to keep private, you will typically want to both encrypt the message ''and'' digitally sign the message. When receiving email using GnuPG you will typically want to de-crypt the message ''and'' verify the signature.
    14 Alternatively, if you want to send message and it's not important to keep it private, but you want the recipient to be sure it is you who is sending it, then you may simply want to digitally sign the message and not encrypt it.
    16 == GnuPG, gpg, OpenPGP, PGP, what does it all mean? ==
    18 There are a lot of confusing acronyms involved in email encryption. Here's a very brief explanation:
    20 GnuPG (also known as GPG) stands for Gnu Privacy Guard ([ GNU] is a project to create an entirely free operating system).
    22 [ GnuPG] is an implementation of the open standard called [RFC:4880 OpenPGP].
    24 An open standard means that a group of people have come together to decide on how to communicate. The OpenPGP folks have defined a way to communicate encrypted information securely.
    26 GnuPG is one program (of many) that uses this open standard. GnuPG is free software and is one of the most popular implementations of OpenPGP.
    28 In list form:
    30  PGP:: is Pretty Good Privacy, which is a corporate trademark held by Symantec at the moment.
    31  OpenPGP:: is the name of the standard that defines the techniques and data structures.
    32  GPG:: is the GNU Privacy Guard, an implementation of using and interfacing with the defined techniques and data structures.
    33  keys:: are mathematical constructs
    34  identities:: are labels that humans can attach to real-world entities
    37 == Public and private keys ==
    39 The technology behind encryption relies on keys. A key is nothing more than a small text file with a lot of random-seeming characters in them. [ Jamie's gpg key] can serve as an example for the curious. In order to use OpenPGP you will need to generate a public/private key pair. That means you will need two keys (two small text files with a lot of random-seeming characters): one that is public and one that is private. These two keys are generated together because they have a special relationship:
    41  * A message encrypted with the public key can only be de-crypted with the private key
    42  * A message signed with the private key can be validated with the public key
    44 As the names imply, the private key should be kept private. It should be saved on your personal computer, preferably one that nobody else has access to. Furthermore, it is typically password-protected, meaning that every time you want to use it, you will need to enter a password. The public key, on the other hand, should be freely given to everyone.
    46 If someone has your public key, then they will be able to send you an encrypted message ''and'' if you send them a signed message, they will be able to verify your signature.
    48 It's important to note: you cannot send someone an encrypted message unless you ''already'' have their public key. In other words, it is not enough that ''you'' know how to use OpenPGP, your intended recipient must also know how to use it, have it setup on their computer, already have a key, and already have given you their public key. Similarly, you cannot verify someone's signature unless you already have a copy of the sender's public key.
    50 = Using GnuPG on a Macintosh Computer =
    52 == How do I use GnuPG with a Macintosh and Thunderbird? ==
    54  * Download and install [ Mac GnuPrivacy Guard], or if you running 10.4 or newer, download and install [ Mac GPG2].
    55  * Follow the [#HowdoIinstallandconfigureEnigmailwithThunderbird directions below to install and configure Enigmail for Thunderbird and generate a private/public key pair].
    57 == How do I use GnuPG with Macintosh, web mail and Firefox? ==
    59  * Download and install [ Mac GnuPrivacy Guard and GPG Keychain Access]. There are several other packages available for download which are not required but you may find useful.
    60  * Run the GPG Keychain Access program and generate a new public/private key (FIXME: we need documentation on how to do this).
    61  * Follow the [#HowdoIinstallandconfigureFireGPGwithFirefox directions below to install and configure FireGPG for Firefox].
    63 = Using GnuPG on a Windows Computer =
    65 == How do I use GnuPG with Windows and Thunderbird? ==
    67  * Download and install [ GnuPG for Windows], which provides the core GnuPG program.
    68  * Follow the [#HowdoIinstallandconfigureEnigmailwithThunderbird directions below to install and configure Enigmail for Thunderbird and generate a private/public key pair].
    70 == How do I use GnuPG with Windows, web mail and Firefox? ==
    72  * Download and install [ Gpg4win], which provides a suite of encryption related packages for Windows, including GnuPG (the core program) and Gnu Privacy Assistant which is used for managing your keys.
    73  * Use GnuPrivacy Assistant to [#HowdoIuseGNUPrivacyAssistanttogenerateaprivatepublickeypair create a private/public key pair].
    74  * Follow the [#HowdoIinstallandconfigureFireGPGwithFirefox directions below to install and configure FireGPG for Firefox].
    76 = Using GnuPG on a GNU/Linux Computer =
    78 Every major GNU/Linux operating system (e.g. [ Ubuntu], [ Debian], [ Fedora], etc) comes by default with GnuPG for their desktop installations. The following directions assume you are using Debian or Ubuntu or another Debian-based Linux installation.
    80 [ Seahorse] is a graphical user interface for managing your keys. It is a useful program to have regardless of whether you use Thuderbird (Icedove) or Firefox (Iceweasel) and webmail. You can install it with:
    82 {{{
    83 sudo aptitude install seahorse
    84 }}}
    86 == How do I use GnuPG with Linux and Thunderbird (Icedove)? ==
    88  * Install Enigmail:
    89 {{{
    90 sudo aptitude install enigmail
    91 }}}
    92  * Restart any Thunderbird (or Icedove) instances.
    93  * Follow the [#HowdoIinstallandconfigureEnigmailwithThunderbird directions below to install and configure Enigmail for Thunderbird and generate a private/public key pair].
    95 == How do I use GnuPG with Linux, web mail and Firefox (Iceweasel)? ==
    97 To use with Firefox/Iceweasel and webmail, follow the [#HowdoIinstallandconfigureFireGPGwithFirefox directions below to install and configure FireGPG for Firefox].
    99 = Specific Programs =
    101 == How do I use GNU Privacy Assistant to generate a private/public key pair? ==
    103  * Launch GNU Privacy Assistant
    104  * When running for the first time, you should be prompted to use the key generation wizard. If you are not prompted to start the wizard, click Keys -> New Key...
    105  * Complete the wizard to generate your key.
    106  * Publish your key. Click Server -> Send keys...
    108 == How do I install and configure Enigmail with Thunderbird? ==
    110  * Download [ Enigmail], a plugin for Thunderbird that provides OpenPGP support. Enigmail has an excellent [ manual to get you started]. Below are the quick and dirty steps:
    111  * [ Install Enigmail].
    112  * [ Create your private/public key].
    113  * Optionally, [ publish your public key].
    114  * [ Practice signing and encrypting your email]
    116 == How do I install and configure FireGPG with Firefox? ==
    118  * Click the [ download FireGPG] button while running Firefox. After installing FireGPG you will need to restart Firefox before you can use FireGPG.
    119  * FIXME: need instructions on using FireGPG to sign, verify and decrypt messages.
    121 == How do I know what version of Thunderbird I'm running? ==
    123 You can see what version of Thunderbird you have by:
    125  * go to Thunderbird
    126  * click on "Help" (File menus at the top)
    127  * "About Mozilla Thunderbird"
    129 = Conclusion =
    130 == What else should I know about GnuPG? ==
    132  * Web of trust. An important concept not covered here is: how do you get other people's public keys? OpenPGP uses a decentralized model of trust called [WikiPedia:Web_of_trust web of trust].
    134  * Transactional data. GnuPG only encrypts the ''body'' of your email message - not the headers. Therefore, when sending email, your email address, the date of the message, the recipient and other information regarding the transport of your message may be sent in the clear. One solution to that problem is to only work with providers that use [ providers that support starttls] (note: May First/People Link, despite not being included in the list, does use starttls).
    136  * Verifying fingerprints. When exchanging public keys, it's important to verify the fingerprints of the keys you are exchanging.
     1This page has moved to [wiki:opengpg].