Difference between revisions of "Privacy:PGP"

From Technologia Incognita
Jump to: navigation, search
m (a few more subjects I could think of)
(How to add another person's key from the file)
 
(20 intermediate revisions by 3 users not shown)
Line 2: Line 2:
 
Why do you need PGP? - [http://www.pgpi.org/doc/whypgp/en/ by Phil Zimmerman] ([http://www.pgpi.org/doc/whypgp/nl/ dutch version])
 
Why do you need PGP? - [http://www.pgpi.org/doc/whypgp/en/ by Phil Zimmerman] ([http://www.pgpi.org/doc/whypgp/nl/ dutch version])
  
== Clients ==
+
PGP section in cryptoparty handbook - [http://mirror-de.cryptoparty.is/handbook/chapter_06_email_encryption/chapter_06_email_encryption.html Chapter 6 Email Encryption]
  
* Thunderbird with enigmail - graphical use interface, easy to use
+
LifeHacker: http://lifehacker.com/how-to-encrypt-your-email-and-keep-your-conversations-p-1133495744
* GPG command line client - easy to use if you prefer commandline stuff
+
 
* Kleopatra - slowwwww, deinstalled it
+
More education: tips, video & podcast: http://brakeingsecurity.com/video-using-gpg-and-pgp // http://traffic.libsyn.com/brakeingsecurity/GPG-PGP-video.mp4
 +
 
 +
 
 +
=== Clients ===
 +
 
 +
* [https://www.mozilla.org/en-US/thunderbird Thunderbird] with [https://addons.mozilla.org/en-US/thunderbird/addon/enigmail/ enigmail] - graphical use interface, easy to use
 +
* [http://gnupg.org/ GPG] command line client - easy to use if you prefer commandline stuff
 +
* [http://www.kde.org/applications/utilities/kleopatra/ Kleopatra] - slowwwww, deinstalled it
 
* ...
 
* ...
  
== Getting started ==
+
=== Level of safety ===
 +
* The encrypted message/file is considered safe
 +
** if your private key isn't compromised (duh)
 +
** and given that your key is strong enough
  
=== Create a new key ===
+
* PGP is not anonymous
Examples Thunderbird and commandline
+
** Sender and receiver IDs are known. Including names if the keys are uploaded to key servers
  
=== Send your public key to a key server ===
+
* Signing keys of your friends
 +
** Pro: build a web of trust
 +
** Con: everyone can see your network
  
 +
=== Experiences ===
  
=== Share your public key with friends ===
+
* phicoh
 +
** gpg1.4 and nmh. Nmh is a command line mail clinet. Some script integrating nmh and gpg can be found at http://faculty.cs.niu.edu/~rickert/mh/
 +
*** it lacks the possibility to reply on a pgp encrypted mail
  
=== Sign keys of your friends ===
+
[[Category:Privacy]]
* How to
 
* Pros and cons
 
  
=== Sign and encrypt your e-mail ===
+
=== How to replace your current key with a stronger one ===
 +
Narya: this was something I couldn't find easily, so therefore I post it here.
  
=== Encrypt files ===
+
I had generated a new stronger key with Thunderbird/enigmail. Choosing which key to use from the commandline is easy (flag -u YOURPGPID). My Thunderbird client, however, had switched completely to the new key. I actually wanted to send around an e-mail with my new key first, signed by my old key. Couldn't find the right option in Thunderbird anywhere. This is how it was solved (quite easy, but you need to know where to look):
 +
* Close Thunderbird
 +
* Make a backup of ~/.thunderbird/some-code-here/prefs.js
 +
* Search in the prefs.js file for "pgpkeyId" and change the identifier into the identifier of the key you want to use
 +
* Start Thunderbird, et voila
 +
* Sign your new key with your old key
 +
* Now you can send a signed e-mail (signed with your old key) to your friends with your new public key, do the above again, fill in your new identifier... and live happily ever after
  
== What else? ==
+
==More command line tips==
  
=== Add/remove e-mail adresses to your key ===
+
http://www.laurencegellert.com/2011/04/gnupg-howto-tutorial-notes/
  
=== Sub keys ===
+
===How to add second email address to your key ===
  
=== Renew key ===
+
http://superuser.com/questions/293184/one-gnupg-pgp-key-pair-two-emails
* How to renew key from the command line - http://www.g-loaded.eu/2010/11/01/change-expiration-date-gpg-key/
 
  
=== Revoke key ===
+
===How to export your key to key-servers===
  
=== Expired key ===
+
to push your keyring changes to the key server.
  
=== What if you lose your private key or your key gets compromised? ===
+
$ gpg --keyserver pool.sks-keyservers.net --send-key xyxyxyxy
  
=== I have created a key pair ages ago that can now be cracked easily. How to upgrade? ===
+
To test if it's there: https://sks-keyservers.net/i/
  
== Technical details ==
+
===How to add another person's key from the server if i trust them===
  
=== How does it work (in normal English) ===
+
* to make it easier, search for their key from one of the key servers : pool.sks-keyservers.net or ''http://pgp.mit.edu''
  
=== How does it work (the gory details) ===
+
gpg --keyserver pgp.mit.edu --search $USER
  
[[Category:Privacy]]
+
===How to add another person's key from the file===
 +
 +
gpg --import public.key
 +
 
 +
===Encrypt & send from the terminal===
 +
 
 +
gpg --recipient johndoe@server.com --encrypt testfile.txt
 +
(makes testfile.txt.gpg)
 +
 
 +
===Decrypt on the terminal===
 +
 
 +
gpg -d $FILENAME
 +
 
 +
==Related TechInc content==
 +
 
 +
[[Privacy_Software_Workshop_Series]]
 +
 
 +
{{#ask: [[Category:Events]] [[Category:Privacy]]| ? Date=|format=ul}}

Latest revision as of 14:47, 8 July 2016

Start using PGP

Why do you need PGP? - by Phil Zimmerman (dutch version)

PGP section in cryptoparty handbook - Chapter 6 Email Encryption

LifeHacker: http://lifehacker.com/how-to-encrypt-your-email-and-keep-your-conversations-p-1133495744

More education: tips, video & podcast: http://brakeingsecurity.com/video-using-gpg-and-pgp // http://traffic.libsyn.com/brakeingsecurity/GPG-PGP-video.mp4


Clients

  • Thunderbird with enigmail - graphical use interface, easy to use
  • GPG command line client - easy to use if you prefer commandline stuff
  • Kleopatra - slowwwww, deinstalled it
  • ...

Level of safety

  • The encrypted message/file is considered safe
    • if your private key isn't compromised (duh)
    • and given that your key is strong enough
  • PGP is not anonymous
    • Sender and receiver IDs are known. Including names if the keys are uploaded to key servers
  • Signing keys of your friends
    • Pro: build a web of trust
    • Con: everyone can see your network

Experiences

  • phicoh
    • gpg1.4 and nmh. Nmh is a command line mail clinet. Some script integrating nmh and gpg can be found at http://faculty.cs.niu.edu/~rickert/mh/
      • it lacks the possibility to reply on a pgp encrypted mail

How to replace your current key with a stronger one

Narya: this was something I couldn't find easily, so therefore I post it here.

I had generated a new stronger key with Thunderbird/enigmail. Choosing which key to use from the commandline is easy (flag -u YOURPGPID). My Thunderbird client, however, had switched completely to the new key. I actually wanted to send around an e-mail with my new key first, signed by my old key. Couldn't find the right option in Thunderbird anywhere. This is how it was solved (quite easy, but you need to know where to look):

  • Close Thunderbird
  • Make a backup of ~/.thunderbird/some-code-here/prefs.js
  • Search in the prefs.js file for "pgpkeyId" and change the identifier into the identifier of the key you want to use
  • Start Thunderbird, et voila
  • Sign your new key with your old key
  • Now you can send a signed e-mail (signed with your old key) to your friends with your new public key, do the above again, fill in your new identifier... and live happily ever after

More command line tips

http://www.laurencegellert.com/2011/04/gnupg-howto-tutorial-notes/

How to add second email address to your key

http://superuser.com/questions/293184/one-gnupg-pgp-key-pair-two-emails

How to export your key to key-servers

to push your keyring changes to the key server.

$ gpg --keyserver pool.sks-keyservers.net --send-key xyxyxyxy

To test if it's there: https://sks-keyservers.net/i/

How to add another person's key from the server if i trust them

  • to make it easier, search for their key from one of the key servers : pool.sks-keyservers.net or http://pgp.mit.edu
gpg --keyserver pgp.mit.edu --search $USER

How to add another person's key from the file

gpg --import public.key

Encrypt & send from the terminal

gpg --recipient johndoe@server.com --encrypt testfile.txt 
(makes testfile.txt.gpg)

Decrypt on the terminal

gpg -d $FILENAME

Related TechInc content

Privacy_Software_Workshop_Series