diff options
author | Werner Koch <[email protected]> | 2003-01-07 10:05:38 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2003-01-07 10:05:38 +0000 |
commit | 8602e35feb1e2ee33e7746809c50bd726722864d (patch) | |
tree | 97dee478ef8c1794ee316d60fe166fc7b55c2fb0 | |
parent | * Broken links resulting from revised web site filesystem structure (diff) | |
download | gnupg-8602e35feb1e2ee33e7746809c50bd726722864d.tar.gz gnupg-8602e35feb1e2ee33e7746809c50bd726722864d.zip |
Preparing a release candidate.
-rw-r--r-- | AUTHORS | 4 | ||||
-rw-r--r-- | ChangeLog | 6 | ||||
-rw-r--r-- | NEWS | 2 | ||||
-rw-r--r-- | configure.ac | 5 | ||||
-rw-r--r-- | doc/ChangeLog | 4 | ||||
-rw-r--r-- | doc/gpg.texi | 190 | ||||
-rw-r--r-- | g10/ChangeLog | 6 | ||||
-rw-r--r-- | g10/keydb.c | 2 | ||||
-rw-r--r-- | g10/openfile.c | 2 |
9 files changed, 158 insertions, 63 deletions
@@ -31,6 +31,10 @@ Jacobo Tarri'o Barreiro <[email protected]> Translations [gl] Janusz Aleksander Urbanowicz <[email protected]> Translations [po] +Jedi Lin <[email protected]> Translations [zh-tw] + +Jouni Hiltunen <[email protected]> Translations [fi] + Magda Procha'zkova' <[email protected]> Translations [cs] Michael Roth <[email protected]> Assignment @@ -1,3 +1,9 @@ +2003-01-07 Werner Koch <[email protected]> + + Released 1.2.2rc1. + + * configure.ac (ALL_LINGUAS): Added fi and zh_TW. + 2003-01-06 David Shaw <[email protected]> * NEWS: Add notes about disabled keys and trustdb tweaks. @@ -25,6 +25,8 @@ Noteworthy changes in version 1.2.2 (unreleased) * Minor trustdb changes to make the trust calculations match common usage. + * New translations: Finnish and Traditional Chinese. + Noteworthy changes in version 1.2.1 (2002-10-25) ------------------------------------------------ diff --git a/configure.ac b/configure.ac index ae03f979c..700c8a510 100644 --- a/configure.ac +++ b/configure.ac @@ -24,13 +24,14 @@ AC_PREREQ(2.52) # Remember to change the version number immediately *after* a release # and remove the "-cvs" or "rc" suffix immediately *before* a release. -AC_INIT(gnupg, 1.2.2-cvs, [email protected]) +AC_INIT(gnupg, 1.2.2rc1, [email protected]) # Set development_version to yes if the minor number is odd or you # feel that the default check for a development version is not # sufficient. development_version=no -ALL_LINGUAS="ca cs da de eo el es et fr gl id it ja nl pl pt_BR pt sv tr" +ALL_LINGUAS="ca cs da de eo el es et fi fr gl id it ja + nl pl pt_BR pt sv tr zh_TW" PACKAGE=$PACKAGE_NAME VERSION=$PACKAGE_VERSION diff --git a/doc/ChangeLog b/doc/ChangeLog index 20d4bcf7f..94fa19e34 100644 --- a/doc/ChangeLog +++ b/doc/ChangeLog @@ -1,3 +1,7 @@ +2003-01-07 David D. Scribner <[email protected]> + + * faq.raw: Update to version 1.6.1. Applied by Werner Koch + 2003-01-06 David Shaw <[email protected]> * DETAILS: Document disabled flag in capabilities field. diff --git a/doc/gpg.texi b/doc/gpg.texi index fd20c2ae6..b75c0cf5d 100644 --- a/doc/gpg.texi +++ b/doc/gpg.texi @@ -477,6 +477,15 @@ Create ASCII armored output. @item -o, ---output @code{file} Write output to @code{file}. +@item ---no-mangle-dos-filenames +@itemx ---mangle-dos-filenames +The Windows version of GPG replaces the extension of an output +filename to avoid problems with filenames containing more than one +dot. This is not necessary for newer Windows version and such +---no-mangle-dos-filenames can be used to switch this feature off and +have GPG append the new extension. This otion has no effect on +non-windows platforms. + @item -u, ---local-user @code{name} Use @code{name} as the user ID to sign. This option is silently ignored for the list commands, @@ -598,12 +607,24 @@ don't want to keep your secret keys (or one of them) online but still want to be able to check the validity of a given recipient's or signator's key. +@item ---trust-model @code{classic|always} +Set what trust model GnuPG should follow. The models are: + +@table @asis +@item classic +This is the regular web-of-trust as used in PGP and GnuPG. + +@item always +Skip key validation and assume that used keys are always fully +trusted. You won't use this unless you have installed some external +validation scheme. This option also suppresses the "[uncertain]" tag +printed with signature checks when there is no evidence that the user +ID is bound to the key. + +@end table + @item ---always-trust -Skip key validation and assume that used keys are always fully trusted. -You won't use this unless you have installed some external validation -scheme. This option also suppresses the "[uncertain]" tag printed -with signature checks when there is no evidence that the user ID -is bound to the key. +Identical to `---trust-model always' @item ---keyserver @code{name} Use @code{name} as your keyserver. This is the server that ---recv-keys, @@ -633,21 +654,19 @@ keyserver types, some common options are: @table @asis @item include-revoked -When searching for a key, include keys that are marked on the -keyserver as revoked. Note that this option is always set when using -the NAI HKP keyserver, as this keyserver does not differentiate -between revoked and unrevoked keys. When using the LDAP keyserver, -this applies to both searching (---search-keys) and receiving -(---recv-keys). +When searching for a key with ---search-keys, include keys that are +marked on the keyserver as revoked. Note that this option is always +set when using the NAI HKP keyserver, as this keyserver does not +differentiate between revoked and unrevoked keys. @item include-disabled -When receiving or searching for a key, include keys that are marked on -the keyserver as disabled. Note that this option is not used with HKP -keyservers, as they do not support disabling keys. +When searching for a key with ---search-keys, include keys that are +marked on the keyserver as disabled. Note that this option is not +used with HKP keyservers. @item include-subkeys -When receiving a key, include subkeys in the search. Note that this -option is not used with HKP keyservers, as they do not support +When receiving a key, include subkeys as potential targets. Note that +this option is not used with HKP keyservers, as they do not support retrieving keys by subkey id. @item use-temp-files @@ -879,34 +898,53 @@ Force to write the version string in clear text signatures. Use this to overwrite a previous ---no-version from a config file. -@item -N, ---notation-data @code{name=value} +@item ---sig-notation @code{name=value} +@itemx ---cert-notation @code{name=value} +@itemx -N, ---notation-data @code{name=value} Put the name value pair into the signature as notation data. -@code{name} must consist only of alphanumeric characters, digits -or the underscore; the first character must not be a digit. -@code{value} may be any printable string; it will be encoded in UTF8, -so you should check that your ---charset is set correctly. -If you prefix @code{name} with an exclamation mark, the notation -data will be flagged as critical (rfc2440:5.2.3.15). +@code{name} must consist only of printable characters or spaces, and +must contain a '@@' character. This is to help prevent pollution of +the IETF reserved notation namespace. The ---expert flag overrides the +'@@' check. @code{value} may be any printable string; it will be +encoded in UTF8, so you should check that your ---charset is set +correctly. If you prefix @code{name} with an exclamation mark, the +notation data will be flagged as critical (rfc2440:5.2.3.15). +---sig-notation sets a notation for data signatures. --cert-notation +sets a notation for key signatures (certifications). ---notation-data +sets both. + +There are special codes that may be used in notation names. "%k" will +be expanded into the key ID of the key being signed, "%K" for the long +key ID of the key being signed, "%f" for the key fingerprint of the +key being signed, "%s" for the key ID of the key making the signature, +"%S" for the long key ID of the key making the signature, and "%%" +results in a single "%". %k, %K, and %f are only meaningful when +making a key signature (certification). @item ---show-notation -Show key signature notations in the ---list-sigs or --check-sigs -listings. +Show signature notations in the ---list-sigs or --check-sigs listings +as well as when verifying a signature with a notation in it. @item ---no-show-notation -Do not show key signature notations in the ---list-sigs or --check-sigs -listings. +Do not show signature notations. + +@item ---sig-policy-url @code{string} +@itemx ---cert-policy-url @code{string} +@itemx ---set-policy-url @code{string} +Use @code{string} as Policy URL for signatures (rfc2440:5.2.3.19). If +you prefix it with an exclamation mark, the policy URL packet will be +flagged as critical. ---sig-policy-url sets a a policy url for data +signatures. ---cert-policy-url sets a policy url for key signatures +(certifications). -set-policy-url sets both. -@item ---set-policy-url @code{string} -Use @code{string} as Policy URL for signatures (rfc2440:5.2.3.19). -If you prefix it with an exclamation mark, the policy URL -packet will be flagged as critical. +The same %-expandos used for notation data are available here as well. @item ---show-policy-url -Show any policy URLs set in the ---list-sigs or --check-sigs listings. +Show policy URLs in the ---list-sigs or --check-sigs listings as well +as when verifying a signature with a policy URL in it. @item ---no-show-policy-url -Do not show any policy URLs set in the ---list-sigs or --check-sigs -listings. +Do not show policy URLs. @item ---set-filename @code{string} Use @code{string} as the name of file which is stored in @@ -960,18 +998,16 @@ The default cipher is CAST5. This cipher is also used for conventional encryption if ---cipher-algo is not given. @item ---s2k-digest-algo @code{name} -Use @code{name} as the digest algorithm used to mangle the -passphrases. The default algorithm is RIPE-MD-160. -This digest algorithm is also used for conventional -encryption if ---digest-algo is not given. +Use @code{name} as the digest algorithm used to mangle the passphrases. +The default algorithm is SHA-1. This digest algorithm is also used +for conventional encryption if ---digest-algo is not given. @item ---s2k-mode @code{n} -Selects how passphrases are mangled. If @code{n} is 0 -a plain passphrase (which is not recommended) will be used, -a 1 (default) adds a salt to the passphrase and -a 3 iterates the whole process a couple of times. -Unless ---rfc1991 is used, this mode is also used -for conventional encryption. +Selects how passphrases are mangled. If @code{n} is 0 a plain +passphrase (which is not recommended) will be used, a 1 adds a salt to +the passphrase and a 3 (the default) iterates the whole process a +couple of times. Unless ---rfc1991 is used, this mode is also used for +conventional encryption. @item ---simple-sk-checksum Secret keys are integrity protected by using a SHA-1 checksum. This @@ -985,13 +1021,14 @@ happen is to change the passphrase on the key (even changing it to the same value is acceptable). @item ---compress-algo @code{n} -Use compression algorithm @code{n}. Default is 2 which is RFC1950 -compression. You may use 1 to use the old zlib version (RFC1951) which -is used by PGP. 0 disables compression. The default algorithm may give -better results because the window size is not limited to 8K. If this -is not used the OpenPGP behavior is used, i.e. the compression -algorithm is selected from the preferences; note, that this can't be -done if you do not encrypt the data. +Use compression algorithm @code{n}. The value 2 is RFC1950 ZLIB +compression. The value 1 is RFC-1951 ZIP compression which is used by +PGP. 0 disables compression. If this option is not used, the default +behavior is to examine the recipient key preferences to see which +algorithms the recipient supports. If all else fails, ZIP is used for +maximum compatibility. Note, however, that ZLIB may give better +compression results if that is more important, as the compression +window size is not limited to 8k. @item ---disable-cipher-algo @code{name} Never allow the use of @code{name} as cipher algorithm. @@ -1094,9 +1131,9 @@ Resets the ---pgp2 option. Set up all options to be as PGP 6 compliant as possible. This restricts you to the ciphers IDEA (if the IDEA plugin is installed), 3DES, and CAST5, the hashes MD5, SHA1 and RIPEMD160, and the -compression algorithms none and ZIP. This also disables making -signatures with signing subkeys as PGP 6 does not understand -signatures made by signing subkeys. +compression algorithms none and ZIP. This also disables +---throw-keyid, and making signatures with signing subkeys as PGP 6 +does not understand signatures made by signing subkeys. This option implies `---disable-mdc --no-comment --escape-from-lines ---force-v3-sigs --no-ask-sig-expire --compress-algo 1' @@ -1113,6 +1150,15 @@ TWOFISH. @item ---no-pgp7 Resets the ---pgp7 option. +@item ---pgp8 +Set up all options to be as PGP 8 compliant as possible. PGP 8 is a +lot closer to the OpenPGP standard than previous versions of PGP, so +all this does is disable ---throw-keyid and set --escape-from-lines and +---compress-algo 1. The allowed algorithms list is the same as --pgp7. + +@item ---no-pgp8 +Resets the ---pgp8 option. + @item ---openpgp Reset all packet, cipher and digest options to OpenPGP behavior. Use this option to reset all previous options like ---rfc1991, @@ -1221,7 +1267,11 @@ enter batch mode. Suppress the warning about "using insecure memory". @item ---no-permission-warning -Suppress the warning about unsafe file permissions. +Suppress the warning about unsafe file permissions. Note that the +file permission checks that GnuPG does are not intended to be +authoritative, rather they simply warn about certain common permission +problems. Do not assume that the lack of a warning means that your +system is secure. @item ---no-mdc-warning Suppress the warning about missing MDC integrity protection. @@ -1344,10 +1394,14 @@ Experimental use only. Sets up a named group, which is similar to aliases in email programs. Any time the group name is a receipient (-r or ---recipient), it will be expanded to the values specified. + The values are @code{key IDs} or fingerprints, but any key description is accepted. Note that a value with spaces in it will be treated as two different values. Note also there is only one level of expansion -- you cannot make an group that points to another group. +- you cannot make an group that points to another group. When used +from the command line, it may be necessary to quote the argument to +this option to prevent the shell from treating it as multiple +arguments. @item ---preserve-permissions Don't change the permissions of a secret keyring back to user @@ -1539,6 +1593,30 @@ If you are going to verify detached signatures, make sure that the program knows about it; either be giving both filenames on the command line or using @samp{-} to specify stdin. +@majorheading INTEROPERABILITY WITH OTHER OPENPGP PROGRAMS +GnuPG tries to be a very flexible implementation of the OpenPGP +standard. In particular, GnuPG implements many of the "optional" +parts of the standard, such as the RIPEMD/160 hash, and the ZLIB +compression algorithms. It is important to be aware that not all +OpenPGP programs implement these optional algorithms and that by +forcing their use via the ---cipher-algo, --digest-algo, +---cert-digest-algo, or --compress-algo options in GnuPG, it is +possible to create a perfectly valid OpenPGP message, but one that +cannot be read by the intended recipient. + +For example, as of this writing, no version of official PGP supports +the BLOWFISH cipher algorithm. If you use it, no PGP user will be +able to decrypt your message. The same thing applies to the ZLIB +compression algorithm. By default, GnuPG will do the right thing and +create messages that are usable by any OpenPGP program. Only override +this safe default if you know what you are doing. + +If you absolutely must override the safe default, you are far better +off using the ---pgp2, --pgp6, or --pgp7 options. These options are +safe as they do not force any particular algorithms in violation of +OpenPGP, but rather reduce the available algorithms to a "PGP-safe" +list. + @majorheading BUGS On many systems this program should be installed as setuid(root). This is necessary to lock memory pages. Locking memory pages prevents the diff --git a/g10/ChangeLog b/g10/ChangeLog index bf741797a..a111af56c 100644 --- a/g10/ChangeLog +++ b/g10/ChangeLog @@ -5702,9 +5702,9 @@ Sat Jan 16 09:27:30 CET 1999 Werner Koch <[email protected]> * g10.c: New option --keyserver * mainproc.c (check_sig_and_print): Hook to import a pubkey. - * pref.c pref.h : Removed + * pref.c, pref.h : Removed - * hkp.c hkp.h: New + * hkp.c, hkp.h: New Wed Jan 13 14:10:15 CET 1999 Werner Koch <[email protected]> @@ -7228,7 +7228,7 @@ Thu Feb 12 22:24:42 1998 Werner Koch (wk@frodo) * pubkey-enc.c (get_session_key): rewritten - Copyright 1998,1999,2000,2001,2002 Free Software Foundation, Inc. + Copyright 1998,1999,2000,2001,2002,2003 Free Software Foundation, Inc. This file is free software; as a special exception the author gives unlimited permission to copy and/or distribute it, with or without diff --git a/g10/keydb.c b/g10/keydb.c index d06454fc2..d6ecb1957 100644 --- a/g10/keydb.c +++ b/g10/keydb.c @@ -1,5 +1,5 @@ /* keydb.c - key database dispatcher - * Copyright (C) 2001, 2002 Free Software Foundation, Inc. + * Copyright (C) 2001, 2002, 2003 Free Software Foundation, Inc. * * This file is part of GnuPG. * diff --git a/g10/openfile.c b/g10/openfile.c index 144118d34..0abff5d5e 100644 --- a/g10/openfile.c +++ b/g10/openfile.c @@ -1,5 +1,5 @@ /* openfile.c - * Copyright (C) 1998, 1999, 2000, 2001 Free Software Foundation, Inc. + * Copyright (C) 1998, 1999, 2000, 2001, 2003 Free Software Foundation, Inc. * * This file is part of GnuPG. * |