Gentoo Archives: gentoo-doc-cvs

From: Josh Saddler <nightmorph@××××××××××××.org>
To: gentoo-doc-cvs@l.g.o
Subject: [gentoo-doc-cvs] cvs commit: gnupg-user.xml
Date: Mon, 16 Jul 2007 03:00:39
Message-Id: E1IAGoz-0004zH-Qc@stork.gentoo.org
1 nightmorph 07/07/16 03:00:25
2
3 Modified: gnupg-user.xml
4 Log:
5 Proper English, grammar, spelling, and some small GuideXML coding style fixes. No content change.
6
7 Revision Changes Path
8 1.42 xml/htdocs/doc/en/gnupg-user.xml
9
10 file : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/gnupg-user.xml?rev=1.42&view=markup
11 plain: http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/gnupg-user.xml?rev=1.42&content-type=text/plain
12 diff : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/gnupg-user.xml?r1=1.41&r2=1.42
13
14 Index: gnupg-user.xml
15 ===================================================================
16 RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/gnupg-user.xml,v
17 retrieving revision 1.41
18 retrieving revision 1.42
19 diff -u -r1.41 -r1.42
20 --- gnupg-user.xml 20 Feb 2007 22:07:04 -0000 1.41
21 +++ gnupg-user.xml 16 Jul 2007 03:00:25 -0000 1.42
22 @@ -1,10 +1,11 @@
23 <?xml version='1.0' encoding="UTF-8"?>
24 <!DOCTYPE guide SYSTEM "/dtd/guide.dtd">
25
26 -<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/gnupg-user.xml,v 1.41 2007/02/20 22:07:04 nightmorph Exp $ -->
27 +<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/gnupg-user.xml,v 1.42 2007/07/16 03:00:25 nightmorph Exp $ -->
28
29 <guide link = "/doc/en/gnupg-user.xml">
30 -<title>GnuPG Gentoo user guide</title>
31 +<title>GnuPG Gentoo User Guide</title>
32 +
33 <author title="Author">
34 <mail link="humpback@g.o">Gustavo Felisberto</mail>
35 </author>
36 @@ -159,12 +160,12 @@
37 <p>
38 Now enter your key passphrase twice. It is a good idea to use a strong password.
39 If someone ever gets hold of your private key and cracks your password, they
40 -will be able to send messages signed by "you" making everyone believe the mails
41 +will be able to send messages signed by "you", making everyone believe the mails
42 were sent by you.
43 </p>
44
45 <p>
46 -Then, GnuPG will generate your key. Moving the mouse or having a mp3 playing in
47 +Next, GnuPG will generate your key. Moving the mouse or having a mp3 playing in
48 the background will help speed up the process because it generates random data.
49 </p>
50
51 @@ -379,7 +380,7 @@
52 <p>
53 You can also send other people's keys that you have signed to the keyserver. We
54 could send Luis Pinto's key to the keyserver. This way someone who trusts
55 -your key can use the signature that you have placed there to trust Luis' key.
56 +your key can use the signature that you have placed there to trust Luis's key.
57 </p>
58
59 </body>
60 @@ -391,7 +392,7 @@
61 <p>
62 Now we are going to search for Gustavo Felisberto's key and add it to the
63 keyring of John Doe (just in case you did not notice Gustavo Felisberto is the
64 -author this guide :) ).
65 +author this guide :)).
66 </p>
67
68 <pre caption="Searching keys from keyservers">
69 @@ -432,10 +433,10 @@
70 <body>
71
72 <p>
73 -There are cases, when working with certain applications, where you use your GPG
74 -key very frequently, which means that you have to type your passphrase a lot of
75 +Sometimes working with certain applications requires you to use your GPG key
76 +very frequently, which means that you have to type your passphrase a lot of
77 times. Several applications used to support a passphrase caching mechanism to
78 -make life easier for users, this however disallowed sharing this cache across
79 +make life easier for users. However, this disallowed sharing this cache across
80 programs (how secure would that be?) and forced applications to reinvent the
81 wheel over and over again.
82 </p>
83 @@ -593,9 +594,9 @@
84 <p>
85 Another nice command is <c>gpg --refresh-keys</c>. This will contact the
86 keyserver defined in the options file and refresh public keys in your local key
87 -ring from there, searching for revoked keys, new id's, new signatures on keys.
88 -You should probably run this once or twice a month so that if someone revokes
89 -his key you will be notified.
90 +ring from there, searching for revoked keys, new IDs, and new signatures on
91 +keys. You should probably run this once or twice a month so that if someone
92 +revokes his key you will be notified.
93 </p>
94
95 </body>
96 @@ -610,14 +611,14 @@
97
98 <p>
99 95% of the time you will use GnuPG with email, signing/encrypting your outgoing
100 -messages and reading signed/encrypted messages. So it is only fair that i talk
101 +messages and reading signed/encrypted messages. So it is only fair that I talk
102 about that first.
103 </p>
104
105 <p>
106 There are two ways two sign/encrypt a email with GnuPG, the old way and the new
107 way :). In the old way messages would appear in plain text, with no possible
108 -formatting and attached files would be unsigned/unencrypted, here is an example
109 +formatting and attached files would be unsigned/unencrypted. Here is an example
110 of a message signed the old way:
111 </p>
112
113 @@ -637,7 +638,7 @@
114 </pre>
115
116 <p>
117 -Messages this way are no good in todays world, where we have nice GUI's and
118 +Messages this way are no good in today's world, where we have nice GUIs and
119 email readers that understand html.
120 </p>
121
122 @@ -645,7 +646,7 @@
123 To solve this an addition to the MIME (Multipurpose Internet Mail Extensions)
124 was created. This adds a field to the email that tells the mail reader that the
125 full content of the message is signed and/or encrypted. The problem with this
126 -is that not all mail readers support this. And some even mess the content,
127 +is that not all mail readers support this. And some even mess up the content;
128 Microsoft's Outlook is famous for not working with this.
129 </p>
130
131 @@ -674,7 +675,7 @@
132 <p>
133 Now you can see the key managing window. From here we see our good key for John
134 Doe. The two trusted keys for Gustavo and Luis, and the untrusted key for Daniel
135 -Robbins ( I still have not given him a call to check his fingerprint :) ).
136 +Robbins (I still have not given him a call to check his fingerprint :)).
137 </p>
138
139 </body>
140 @@ -772,17 +773,17 @@
141 <p>
142 The concept of public key cryptography was originally devised by Whitfield
143 Diffie and Martin Hellman in 1976. When I first heard the words "public key" and
144 -"cryptography" in the same sentence back in '93 I tought to myself that it would
145 -be impossible to do such a thing. In those days there was no Internet (well
146 -there was, but not for me) so I went to the public library and asked for books
147 -on Cryptography. I must say that I was 16 at the time so the clerk there looked
148 -to me in astonishment and brought me a book for children on substitution cyphers
149 -(those where you change a letter for another like the famous Caesar Cypher or
150 -ROT-13 (Tragbb Ebpxf, naq lbh xabj vg vf tbbq orpnhfr lbh ner ernqvat guvf
151 -qbp.), (emerge rotix if you cannot read the preceding text)). I was very upset
152 -with this and started to search for more info. It is good to have mathematicians
153 -in the family, because as soon as I talked to one of them I was introduced to a
154 -new world.
155 +"cryptography" in the same sentence back in '93 I thought to myself that it
156 +would be impossible to do such a thing. In those days there was no Internet
157 +(well there was, but not for me) so I went to the public library and asked for
158 +books on Cryptography. I must say that I was 16 at the time so the clerk there
159 +looked to me in astonishment and brought me a book for children on substitution
160 +cyphers (those where you change a letter for another like the famous Caesar
161 +Cypher or ROT-13 (Tragbb Ebpxf, naq lbh xabj vg vf tbbq orpnhfr lbh ner ernqvat
162 +guvf qbp.), (<c>emerge rotix</c> if you cannot read the preceding text)). I was
163 +very upset with this and started to search for more info. It is good to have
164 +mathematicians in the family, because as soon as I talked to one of them I was
165 +introduced to a new world.
166 </p>
167
168 <p>
169 @@ -838,12 +839,12 @@
170 protocol. For even more info go to the public library and grab a copy of the
171 <uri link="http://www.cacr.math.uwaterloo.ca/hac/">"Handbook of Applied
172 Cryptography"</uri> by Alfred J. Menezes, Paul C. van Oorschot and Scott A.
173 -Vanstone, also this book is available online for free at the above site.
174 +Vanstone. This book is also available online for free at the above site.
175 </p>
176
177 <p>
178 One consequence of the above is that if you cypher a message to me, and you
179 -loose the original uncypherd message you will no longer be able to retrieve it
180 +loose the original uncyphered message you will no longer be able to retrieve it
181 from the cyphered version.
182 </p>
183
184 @@ -865,14 +866,14 @@
185 when you cypher a message to me you sign it with your private key so that, when
186 I receive it, I can first use your public key to check your signature and then
187 use my private key to decypher the message. As you can see we could not do
188 -that in the setup i described before.
189 +that in the setup I described before.
190 </p>
191
192 <p>
193 -Also very important, to sign messages you don't have to cypher them before. So
194 -like that you can create messages that can be read by anyone, but that come with
195 -your "branding". And if any single character is changed in the message it can
196 -(and will) be detected.
197 +It's also very important to sign messages so that you don't have to cypher them
198 +beforehand. Now you can create messages that can be read by anyone, but that
199 +come with your "branding". And if any single character is changed in the message
200 +it can (and will) be detected.
201 </p>
202
203 </body>
204 @@ -882,20 +883,20 @@
205 <body>
206
207 <p>
208 -But lets say that I have no previous contact with you until you send me a
209 -message, how do I get your public key, and how do I really know it is yours?
210 +But let's say that I have no previous contact with you until you send me a
211 +message: how do I get your public key, and how do I really know it is yours?
212 </p>
213
214 <p>
215 To solve this problem public Key Servers were created. When you create your key
216 -pair (Public and Private key) you send your public key to the key server. After
217 +pair (Public and Private key), you send your public key to the key server. After
218 this everyone can retrieve your key from there. This solves the problem of
219 finding the key. But how do I really know that that key is the author's key? For
220 this another concept must be introduced, and that is key signing:
221 </p>
222
223 <p>
224 -Key signing means that, if I have the public key of another person, and I know
225 +Key signing means that if I have the public key of another person, and I know
226 <e>for sure</e> that it is really that persons key (it is my personal friend,
227 someone I know in real life, etc.) I can sign that public key and send it to
228 keyservers, that way I am telling the world: "This key really belongs to the
229 @@ -904,20 +905,20 @@
230 </p>
231
232 <p>
233 -This can sometimes be confusing so lets see a real world situation
234 +This can sometimes be confusing so let's see a real world situation.
235 </p>
236
237 <p>
238 Let's imagine a 3 person situation: John, Mary, and Lisa. John is a good
239 friend of Mary but does not know Lisa; Lisa is a good friend of Mary but
240 does not know John. One day Lisa sends John a signed email. John will fetch
241 -Lisa's Public Key from the keyserver and test the message, if all went ok he
242 +Lisa's Public Key from the keyserver and test the message, if all went ok he
243 will see that whoever wrote that message also created that key. But how do I
244 know it was really the person it claims to be?
245 </p>
246
247 <p>
248 -He then see's that it is signed by Mary, which he can check because he already
249 +He then sees that it is signed by Mary, which he can check because he already
250 has Mary's key and he trusts that key. With this ring of trust he continues to
251 conclude that the email he received was really written by Lisa.
252 </p>
253
254
255
256 --
257 gentoo-doc-cvs@g.o mailing list