Warning, /utilities/kgpg/doc/index.docbook is written in an unsupported language. File is not indexed.

0001 <?xml version="1.0" ?>
0002 <!DOCTYPE book PUBLIC "-//KDE//DTD DocBook XML V4.5-Based Variant V1.1//EN" "dtd/kdedbx45.dtd" [
0003   <!ENTITY % addindex "IGNORE">
0004   <!ENTITY % English "INCLUDE">
0005 ]>
0006 
0007 <book id="kgpg" lang="&language;">
0008 
0009 <bookinfo>
0010 <title>The &kgpg; Handbook</title>
0011 
0012 <authorgroup>
0013 <author>
0014 <firstname>Jean-Baptiste</firstname>
0015 <surname>Mardelle</surname>
0016 <affiliation>
0017 <address><email>bj@altern.org</email></address>
0018 </affiliation>
0019 </author>
0020 <author>
0021 <firstname>Rolf Eike</firstname>
0022 <surname>Beer</surname>
0023 <affiliation>
0024 <address><email>kde@opensource.sf-tec.de</email></address>
0025 </affiliation>
0026 </author>
0027 
0028 <!-- TRANS:ROLES_OF_TRANSLATORS -->
0029 
0030 </authorgroup>
0031 
0032 <copyright>
0033 <year>2002</year>
0034 <year>2007</year>
0035 <year>2008</year>
0036 <year>2009</year>
0037 <year>2010</year>
0038 <holder>Jean-Baptiste Mardelle</holder>
0039 <holder>Rolf Eike Beer</holder>
0040 </copyright>
0041 
0042 <legalnotice>&FDLNotice;</legalnotice>
0043 
0044 <date>2016-10-10</date>
0045 <releaseinfo>Applications 16.12</releaseinfo>
0046 
0047 <abstract>
0048 <para>
0049 &kgpg; is a simple graphical interface for GnuPG (<ulink
0050 url="https://gnupg.org">https://gnupg.org</ulink>).
0051 </para>
0052 </abstract>
0053 
0054 <keywordset>
0055 <keyword>KDE</keyword>
0056 <keyword>KGpg</keyword>
0057 <keyword>encryption</keyword>
0058 <keyword>gpg</keyword>
0059 <keyword>pgp</keyword>
0060 <keyword>security</keyword>
0061 </keywordset>
0062 
0063 </bookinfo>
0064 
0065 <chapter id="introduction">
0066 <title>Introduction</title>
0067 
0068 
0069 <para>&kgpg; is a simple interface for GnuPG, a powerful encryption utility. GnuPG (also known as gpg) is included in most distributions and should be installed on your system. You can get the latest version on <ulink
0070 url="https://gnupg.org">https://gnupg.org</ulink>.</para>
0071 
0072 <para>With &kgpg; you will be able to encrypt and decrypt your files and emails, allowing much more secure communications. A mini howto on encryption with gpg is available on <ulink url="https://www.gnupg.org/documentation/howtos.en.html">GnuPG's web site</ulink>.
0073 </para>
0074 
0075 <para>With &kgpg;, you don't need to remember gpg's command lines and options. Almost everything can be done with a few mouse clicks.
0076 </para>
0077 </chapter>
0078 
0079 <chapter id="getting-started">
0080 <title>Getting Started</title>
0081 
0082 <para>Here is a list of &kgpg;'s main components:</para>
0083 
0084 <variablelist>
0085 
0086 <varlistentry>
0087 <term>System Tray Icon </term>
0088 <listitem>
0089 
0090 <screenshot>
0091 <screeninfo>&kgpg; system tray applet</screeninfo>
0092 <mediaobject>
0093 <imageobject>
0094 <imagedata fileref="systray.png" format="PNG"/></imageobject>
0095 </mediaobject>
0096 </screenshot>
0097 
0098 <para>
0099 When you start &kgpg;, a system tray icon will appear. A &LMB;
0100 click will open the Key Manager window, while a &RMB; click will open a menu allowing quick access to some important features. If you prefer other options you can change the &LMB; action to show the editor or completely disable the system tray icon using the <link linkend="conf-misc">settings dialog</link>.
0101 </para>
0102 <para>Please note that the system tray icon of &kgpg; is marked as &quot;inactive&quot; basically all the time. Since the system tray applet will usually hide inactive icons the one of &kgpg; will not be shown until you explicitly request it. For details please have a look at the &plasma; documentation.
0103 </para>
0104 </listitem>
0105 </varlistentry>
0106 
0107 
0108 <varlistentry>
0109 <term>Key Manager Window</term>
0110 <listitem>
0111 
0112 <screenshot>
0113 <screeninfo>Key manager window</screeninfo>
0114 <mediaobject>
0115 <imageobject>
0116 <imagedata fileref="keymanage.png" format="PNG"/></imageobject>
0117 </mediaobject>
0118 </screenshot>
0119 
0120 <para>That's the central place to manage your keys. To open the <link linkend="keymanager">Key Manager window</link>, click with the &LMB; on &kgpg;'s applet.
0121 You can import, export, sign and edit your keys. Most actions can be performed with a &RMB; click on a key.
0122 </para>
0123 </listitem>
0124 </varlistentry>
0125 
0126 <varlistentry>
0127 <term>Editor Window</term>
0128 <listitem>
0129 
0130 <screenshot>
0131 <screeninfo>Editor window</screeninfo>
0132 <mediaobject>
0133 <imageobject>
0134 <imagedata fileref="editor.png" format="PNG"/></imageobject>
0135 </mediaobject>
0136 </screenshot>
0137 
0138 <para>It's a simple text editor, where you can type or paste text to encrypt/decrypt it. To open the <link linkend="editor">editor</link>, click with the &RMB; on &kgpg;'s applet.
0139 </para>
0140 </listitem>
0141 </varlistentry>
0142 
0143 
0144 <varlistentry>
0145 <term>File manager integration</term>
0146 <listitem>
0147 
0148 <para>&kgpg; is integrated in &konqueror; and &dolphin;. It means that when you right click on a file, you can choose
0149  <menuchoice><guimenu>Actions</guimenu><guimenuitem>Encrypt
0150 File</guimenuitem></menuchoice> to encrypt a file. You can decrypt a file with a &LMB; click.
0151  </para>
0152 </listitem>
0153 </varlistentry>
0154 
0155 </variablelist>
0156 
0157 </chapter>
0158 
0159 <chapter id="using-kgpg">
0160 <title>Using &kgpg;</title>
0161 
0162 <para>
0163 There are two ways to encrypt your data:
0164 <itemizedlist>
0165 <listitem><para>Symmetrical encryption: your data is just encrypted with a password. Anybody who has a computer with gpg can decrypt your message if you give him/her the password. To perform a symmetrical encryption, choose "symmetrical encryption" in the options box when asked to choose an encryption key.</para></listitem>
0166 <listitem><para>Key encryption: you must first create your key pair (secret key and public key) and give a passphrase. Keep your secret key in a safe place, and exchange your public key with your friends. Then, if you want to send an encrypted message to Alex, you must encrypt the message with Alex's public key. To decrypt the message, the recipient will need Alex's secret key and passphrase.</para></listitem>
0167 </itemizedlist>
0168 </para>
0169 <para>Key encryption is a bit more complicated (you must exchange keys with your friends) but safer. Remember that if you encrypt a message with someone else's key, you will not be able to decrypt it. You can only decrypt messages that have been encrypted with your public key.</para>
0170 
0171 <sect1 id="key-generation">
0172 <title>Generating a key</title>
0173 
0174 <para>If you don't have a key, &kgpg; will automatically pop up
0175 the key generation dialog at the first startup. You can also access it
0176 in the Key Manager from
0177 <menuchoice><guimenu>Keys</guimenu><guimenuitem>Generate Key
0178 Pair</guimenuitem></menuchoice>.</para>
0179 
0180 <screenshot>
0181 <screeninfo>Key generation dialog</screeninfo>
0182 <mediaobject>
0183 <imageobject>
0184 <imagedata fileref="keygen.png" format="PNG"/></imageobject>
0185 </mediaobject>
0186 </screenshot>
0187 
0188 <para>Simply enter your name, Email address and click
0189 <guibutton>Ok</guibutton>. This will generate a standard gpg key. If
0190 you want more options, you can click on the <guibutton>Expert Mode</guibutton> button, which
0191 will bring up a &konsole; window with all of gpg's options.</para>
0192 <para>Many people play around with their first
0193 key, generate bad user ids, add comments they later regret or simply forget their
0194 passphrase. To avoid such keys to stay valid forever it's usually a good idea
0195 to limit the lifetime to some 12 month. You can modify the lifetime of your
0196 secret keys later using the <link linkend="keyproperties">key properties window</link>.</para>
0197 
0198 </sect1>
0199 
0200 <sect1 id="key-revoke">
0201 <title>Revoking a key</title>
0202 
0203 <para>A key pair that has expired can be brought back into an operational state
0204 as long as you have access to the private key and the passphrase. To
0205 reliably render a key unusable you need to revoke it. Revoking is done by
0206 adding a special revocation signature to the key.</para>
0207 
0208 <para>This revocation signature can be created together with the key. In this
0209 case it is stored in a separate file. This file can later be imported into
0210 the keyring and is then attached to the key rendering it unusable. Please
0211 note that to import this signature to the key no password is required.
0212 Therefore you should store this revocation signature in a safe place,
0213 usually one that is different from you key pair. It is a good advise to
0214 use a place that is detached from your computer, either copy it to an
0215 external storage device like an USB stick or print it out.</para>
0216 
0217 <para>If you have not created such a detached revocation on key creation you can
0218 create such a revocation signature at any time choosing <menuchoice><guimenu>Keys</guimenu>
0219 <guimenuitem>Revoke key</guimenuitem></menuchoice>,
0220 optionally importing it to your keyring immediately.</para>
0221 
0222 </sect1>
0223 
0224 <sect1 id="encryption">
0225 <title>Encrypting Your Data</title>
0226 
0227 <sect2 id="konqui">
0228 
0229 <title>Encrypting a file from &konqueror; or Dolphin</title>
0230 
0231 <para>Click on the file you want to encrypt with the &RMB;. Choose <menuchoice><guimenu>Actions</guimenu><guimenuitem>Encrypt File</guimenuitem></menuchoice> in the pop up menu. You will then be prompted with the Public key selection dialog. Choose the key of the recipient and click <guibutton>Encrypt</guibutton>. The encrypted file will be saved with a <literal
0232 role="extension">.asc</literal> or <literal role="extension">.gpg</literal> extension depending on whether you chose <guilabel>ASCII armored encryption</guilabel> or not. ASCII encrypted files only use readable characters to represent the data resulting in files that are more robust when copied around or sent by mail but are one third larger.</para>
0233 
0234 <screenshot>
0235 <screeninfo>Here is a screen shot of the key selection window</screeninfo>
0236 <mediaobject>
0237 <imageobject>
0238 <imagedata fileref="keys.png" format="PNG"/></imageobject>
0239 </mediaobject>
0240 </screenshot>
0241 
0242 </sect2>
0243 
0244 <sect2 id="drop">
0245 <title>Encrypting a text with &kgpg;'s applet</title>
0246 
0247 <para>You can encrypt the contents of the clipboard by selecting the
0248 <guimenuitem>Encrypt clipboard</guimenuitem> item in applet menu. When you
0249 choose <guimenuitem>Sign clipboard</guimenuitem> then the text will be signed
0250 instead. Both actions will import the current clipboard contents into an
0251 <link linkend="editor">editor window</link>, perform the requested action and
0252 paste the contents back into the editor.</para>
0253 
0254 </sect2>
0255 
0256 <sect2 id="editor">
0257 <title>Encrypting text from &kgpg;'s editor</title>
0258 
0259 <para>This is as simple as clicking on the
0260 <guibutton>Encrypt</guibutton> button. You will then be prompted with
0261 the Public key selection dialog. Choose your key and click
0262 <guibutton>Ok</guibutton>. The encrypted message will
0263 appear in the editor window.</para>
0264 
0265 <para>Usually you can only encrypt files with keys that are trusted by
0266 you. Since you sometimes want to just send a confident note to some random
0267 people you are aware of having a GPG key you can set the option
0268 <guilabel>Allow encryption with untrusted keys</guilabel>.</para>
0269 
0270 <para>To make sure that you can decrypt every file you have encrypted even if
0271 they are encrypted with someone else's key you can use the options
0272 <guilabel>Always encrypt with</guilabel> and <guilabel>Encrypt files with</guilabel>
0273 which are available in the <link linkend="conf-encryption">KGpg configuration</link>.</para>
0274 
0275 <para>For more information on the encryption options <guilabel>ASCII
0276 armor</guilabel>, <guilabel>Allow encryption with untrusted keys</guilabel> and
0277 <guilabel>Symmetrical encryption</guilabel>, please refer to gpg's
0278 documentation or <ulink url="man:gpg">man pages</ulink>.</para>
0279 </sect2>
0280 
0281 </sect1>
0282 
0283 <sect1 id="decryption">
0284 <title>Decrypting Your Data</title>
0285 
0286 
0287 <sect2 id="konq-dec">
0288 <title>Decrypting a file from &konqueror; or &dolphin;</title>
0289 <para><mousebutton>Left</mousebutton> click on the file you want to
0290 decrypt. Enter your passphrase and it will be decrypted. You can also
0291 drag an encrypted text file and drop it into &kgpg;'s editor window. It
0292 will then ask the passphrase and open the decrypted text in &kgpg;'s
0293 editor.  You can even drop remote files ! You can also use the
0294 <menuchoice><guimenu>File</guimenu><guimenuitem>Decrypt
0295 File</guimenuitem></menuchoice> and choose a file to decrypt.</para>
0296 
0297 </sect2>
0298 
0299 <sect2 id="applet-dec">
0300 <title>Decrypting text with &kgpg;'s applet</title>
0301 
0302 <para>You can also decrypt the contents of the clipboard with the
0303 <guimenuitem>Decrypt Clipboard</guimenuitem> menu
0304 entry of the &kgpg; applet. An <link linkend="editor">editor window</link>
0305 will show up with the decrypted text.</para>
0306 
0307 </sect2>
0308 
0309 <sect2 id="editor-dec">
0310 <title>Decrypting a text from the editor</title>
0311 
0312 <para>Copy or Drag and Drop the text you want to decrypt, and click on
0313 the <guibutton>Decrypt</guibutton> button. You will be prompted for the
0314 passphrase.
0315 </para>
0316 </sect2>
0317 
0318 </sect1>
0319 
0320 <sect1 id="manage">
0321 <title>Key Management</title>
0322 
0323 <para>All basic key management options can be performed through
0324 &kgpg;. To open the key management window click the &LMB; on &kgpg;'s applet.
0325 Most options are available with a <mousebutton>right</mousebutton> click on a key.
0326 To import/export public keys, you can use drag
0327 and drop or the Copy/Paste keyboard shortcuts.</para>
0328 
0329 <para>You can export a public key via email, to the clipboard, to a keyserver or to a local file.
0330 Use the options in the export dialog to export everything, export without attributes (photo ids)
0331 or export a clean key &ie; the key itself including its subkeys, but excluding all signatures.
0332 </para>
0333 
0334 <sect2 id="keymanager">
0335 <title>Key Manager</title>
0336 
0337 <screenshot>
0338 <screeninfo>Here's a screen shot of key management</screeninfo>
0339 <mediaobject>
0340 <imageobject>
0341 <imagedata fileref="keymanage.png" format="PNG"/></imageobject>
0342 </mediaobject>
0343 </screenshot>
0344 
0345 <para>In this example you see a key group containing two keys, two key pairs and three public keys. The third column shows the trust you have in the keys. The first key pair is ultimately trusted and is also set as the default key (bold font) while the second one has expired. Two of the public keys are fully trusted while the trust of the last key is marginal. The last key is expanded, showing it's ElGamal subkey, an additional user id, both also with marginal trust, and some of it's signatures.</para>
0346 <para>Signatures allow navigating through your keyring. Double clicking on a signature or a key shown as member of a group will jump directly to the corresponding primary key.</para>
0347 </sect2>
0348 
0349 <sect2 id="keyproperties">
0350 <title>Key properties</title>
0351 
0352 <screenshot>
0353 <screeninfo>The key properties window</screeninfo>
0354 <mediaobject>
0355 <imageobject>
0356 <imagedata fileref="keyprop.png" format="PNG"/></imageobject>
0357 </mediaobject>
0358 </screenshot>
0359 
0360 <para>While the key manager allows you to do general actions with one or multiple keys, key groups or signatures, the key properties window gives you access to a single key. You can reach it by pressing enter in the key manager or double clicking the key.</para>
0361 <para>In this window you can change the key passphrase and expiration of your secret keys. For all keys you can also set the owner trust value.</para>
0362 <para>This value indicates how much you trust the owner of this key to correctly verify the identity of the keys he signs. Taking the owner trust into account gpg creates your own web of trust. You trust the keys you signed. If you assign owner trust to these persons you will also trust the keys they have signed without the need that you first have to sign their keys too.</para>
0363 </sect2>
0364 
0365 <sect2 id="keysigning">
0366 <title>Signing keys</title>
0367 
0368 <para>When you sign a key of someone else (let's call her Alice) you announce that you are sure that this key really belongs to that person and the key can be trusted. Of course you really should have checked that. This usually means that you have to meet Alice, check at least one identity card and get the full key fingerprint or a copy of her key. Then you go home and sign that key. Usually you will later upload the newly signed key to a <link linkend="keyserver">key server</link> so everyone knows you have checked that key and the owner may be trusted. Alice will likely do the same so you both will have your keys signed by the other one. If one of you has no identity card at hand it's no problem if the signing happens in only direction.</para>
0369 
0370 <para>But think about what happens if Alice lives on the other end of the world. You communicate with her regularly but there is no chance you will see her anytime soon. How do you trust her key?</para>
0371 
0372 <para>When you select her key and then choose <guimenuitem>Sign Key...</guimenuitem> you will get the dialog that allows you to choose the options how you would like to sign that key.</para>
0373 
0374 <screenshot>
0375 <screeninfo>Selecting a Secret Key for Signing</screeninfo>
0376 <mediaobject>
0377 <imageobject>
0378 <imagedata fileref="select-secret-key.png" format="PNG"/></imageobject>
0379 </mediaobject>
0380 </screenshot>
0381 
0382 <para>First you can choose the key you will use to sign the key. Then you can enter how carefully you checked that she really is the person she pretends to be. This information will be stored together with the signature so it is a guidance for everyone else who might need that signature (more on this below). And then comes the option that would help you if you can't meet Alice in person: <guilabel>Local signature (cannot be exported)</guilabel>. When you activate that option a special version of a signature will be created that can never even by accident leave you keyring.</para>
0383 
0384 <para>But why is it important how carefully you checked Alice's identity? Who should care? There is a different way to solve your problem with the identity of Alice. If you can't visit Alice anytime soon just think of Trent. You know Trent has a keypair, too. And Trent is a globetrotter, being on a different continent at least twice a month. If you are lucky he will fly close to Alice soon. So you will go and meet with Trent to sign keys. Then you will drop Alice a note that Trent will be at her place soon and ask her if she can meet with him too to sign keys. After all this has happened you know that Trent's key can be trusted and Trent knows that Alice's key can be trusted. If you trust Trent that he has carefully checked Alice's identity then you can also trust her key.</para>
0385 
0386 <para>These relationships between keys and their owners form a so called web of trust. Within that web there are some important values that define how trustworthy a particular key is. The first thing is how carefully the identity of the key owner was checked. That is the value you have seen above in the secret key selection window. For example you will likely know how to verify your local countries identity card but one from a completely different country may be hard to verify. So you could say that you have very carefully checked Trent's identity because you have seen his identity card and it looks very much the same as yours. But Trent, although he has seen both Alice's identity card and driver license might say he has only done casual checking of her identity as he is not absolutely sure about the documents from that part of the world.</para>
0387 
0388 <para>The next important value is how much you trust the other person to verify documents. You know Trent is good at that. But George for example is no one you would call smart. He barely looked at your id card when you met him for key signing. You are sure that George is the person he pretends to be as you checked his documents carefully. But he doesn't seem to really care if he checks other people so you will have a high trust in the key of George but a very low trust in the signatures of George. If you open the <link linkend="keyproperties">properties</link> of a key you will find the field <guilabel>Owner Trust</guilabel>. This is how much you trust the key owner when he signs keys. This value will not be exported, it is completely up to your personal preference.</para>
0389 
0390 <screenshot>
0391 <screeninfo>The key properties window</screeninfo>
0392 <mediaobject>
0393 <imageobject>
0394 <imagedata fileref="keyprop.png" format="PNG"/></imageobject>
0395 </mediaobject>
0396 </screenshot>
0397 
0398 <para>Now you should have an idea how the web of trust is built, what the owner and key trust values are for, and why you always should be very careful when checking identities: other people might rely on you. But one element in the process is still unverified: the email addresses in the keys you signed. Creating a new user identity in your key with the email address of Alice or Trent will only take a few mouse clicks. You have verified that Trent really owns his key. But noone has checked until now that Trent really controls the email addresses of his user identities.</para>
0399 
0400 <para>If you choose <guimenuitem>Sign and Mail User ID...</guimenuitem> from the menu instead you can close that gap. The idea is that you will sign the key as usual and afterwards it will be split into pieces. Every piece will only contain one user identity of Trent's key and your signature to it. This will be encrypted with Trent's key and sent only to the email address given in that identity. Only if Trent can receive this mail and decrypt the message he will be able to import that signature into his key ring. You will not upload your signatures, this is entirely up to him. If your signature will show up on a key server you can be sure that Trent really controls both his key as well as the email address you signed. The signatures you make in this process will also be not part of your keyring. So right after you signed Trent's key it will still be shown as untrusted in your keyring. Once Trent has received your mail and imported your signature into his keyring he can upload them to a keyserver. When you refresh his key from a keyserver you will get the new signatures. While that may sound inconvenient first it makes sure that you will not by accident see one of his identities as trusted that he does not control. Only the signatures that show up on a keyserver are those where everyone, including you, can be sure that he really controls the corresponding email addresses.</para>
0401 
0402 </sect2>
0403 
0404 </sect1>
0405 
0406 <sect1 id="keyserver">
0407 <title>Working with key servers</title>
0408 
0409 <sect2>
0410 <title>Communication with key servers</title>
0411 
0412 <para>The public part of a key pair is usually stored on a key server. These servers allow anyone to search for a key belonging to a specific person or mail address. The signatures are also stored on these servers.</para>
0413 
0414 <screenshot>
0415 <screeninfo>Here's a screen shot of keyserver window.</screeninfo>
0416 <mediaobject>
0417 <imageobject>
0418 <imagedata fileref="keyserver.png" format="PNG"/></imageobject>
0419 </mediaobject>
0420 </screenshot>
0421 
0422 <para>This dialog gives you access to the keyservers. You can search and import keys from a keyserver as well as export keys to a server. An example of searching and importing is when you want to write a mail to someone new. If you would like to encrypt your mail to your contact you can search if he or she has a public key on the key servers. If you have created a new key pair or have signed someone else's key you might want to export the public key (possibly with new signatures) to a keyserver.</para>
0423 <para>Most keyservers synchronize their data between each others so you will get similar search results regardless which server you use. Since there are exceptions of this rule you can choose the keyserver to use in this dialog. It's usually a good idea to choose a default keyserver that is located close to you (i.e. in your country or on your continent) as they usually respond faster to your queries.</para>
0424 <para>Please note that everything you upload to a keyserver usually stays there forever. This is one reason you should usually limit the lifetime of your keys. Also note that the keyservers are sometimes scanned by spammers for email addresses.</para>
0425 </sect2>
0426 
0427 <sect2 id="keyserver-results">
0428 <title>Key server search results</title>
0429 <screenshot>
0430 <screeninfo>This is an example of the results of a keyserver search.</screeninfo>
0431 <mediaobject>
0432 <imageobject>
0433 <imagedata fileref="keyserver-search.png" format="PNG"/></imageobject>
0434 </mediaobject>
0435 </screenshot>
0436 
0437 <para>All results of a search are displayed in this window. This picture shows a search for &quot;@kde.org&quot; addresses which showed up 244 results. Using the search field the displayed list was reduced to a single key. This key has two matches: the primary user id itself matches the search string as well as one of the other user ids.</para>
0438 
0439 <para>You can select one or more keys to import. The ids of those keys are shown in the <guilabel>Keys to import</guilabel> field at the bottom of the window. When you click on <guibutton>Import</guibutton> the key server is contacted again and the keys are fetched into your keyring.</para>
0440 
0441 </sect2>
0442 
0443 </sect1>
0444 
0445 <sect1 id="options">
0446 <title>Configuring &kgpg;</title>
0447 
0448 <para>Configuration is accessible through the &kgpg; applet menu (&RMB;
0449 click on the applet) or through the main menu (
0450 <menuchoice><guimenu>Settings</guimenu><guimenuitem>Configure KGpg</guimenuitem></menuchoice>).
0451 You can set default parameters for encryption, decryption, user interface and applet.
0452 Most encryption options are directly related to gpg and are documented in it's <ulink url="man:gpg">man page</ulink>.</para>
0453 
0454 <sect2 id="conf-encryption">
0455 <title>Encryption</title>
0456 <screenshot>
0457 <screeninfo>A screen shot of the option dialog with encryption tab opened</screeninfo>
0458 <mediaobject>
0459 <imageobject>
0460 <imagedata fileref="options.png" format="PNG"/></imageobject>
0461 </mediaobject>
0462 </screenshot>
0463 <para>Here you can configure special options to be passed to GnuPG to change the encryption behavior. For detailed description please have a look at the GnuPG manual.</para>
0464 <itemizedlist>
0465 <listitem><para><guilabel>ASCII armored encryption</guilabel>: this causes encrypted files to be stored in a format that uses only printable ASCII characters and has short lines. Files stored this way are bigger than the files in binary format but are easier to send &eg; by email.</para></listitem>
0466 <listitem><para><guilabel>Allow encryption with untrusted keys</guilabel>: this allows you to encrypt files with keys that are not trusted by you.</para></listitem>
0467 <listitem><para><guilabel>PGP 6 compatibility</guilabel>: encrypted files are compatible with the older PGP6 standard. This disables certain features so you should only use this if really needed.</para></listitem>
0468 <listitem><para><guilabel>Hide user id</guilabel>: this removes all evidence of the receiver from the encrypted file. In case the transmission is intercepted noone could gain information about the recipient from the file. If the receiver has multiple keys he needs to try which one was used.</para></listitem>
0469 <listitem><para><guilabel>Always encrypt with</guilabel>: all encryptions are additionally encrypted with this key. If you set this to one of your private keys this makes sure you can read all data you encrypted by the price of bigger messages.</para></listitem>
0470 <listitem><para><guilabel>Encrypt files with</guilabel>: behaves like <guilabel>Always encrypt with</guilabel> for file encryption.</para></listitem>
0471 <listitem><para><guilabel>Custom encryption command</guilabel>: if you need to pass some unusual options to GnuPG you can specify the command line here. Most users will not need this.</para></listitem>
0472 <listitem><para><guilabel>Use *.pgp extension for encrypted files</guilabel>: if you check this option encrypted files will be named as the input file with the extension <literal role="extension">.pgp</literal> added, otherwise the extension <literal role="extension">.gpg</literal> is used.</para></listitem>
0473 </itemizedlist>
0474 </sect2>
0475 
0476 <sect2 id="conf-decryption">
0477 <title>Decryption</title>
0478 
0479 <para>Here you can specify a custom decryption command. This option is seldomly needed and only useful for advanced users that know of GnuPGs command line options.</para>
0480 </sect2>
0481 
0482 <sect2 id="conf-appearance">
0483 <title>Appearance</title>
0484 <para>Here you can configure the way &kgpg; looks to you. Possible settings are the colors that reflect the different levels of key trust in the <link linkend="keymanager">key manager</link> and the font settings for the <link linkend="editor">editor</link>.</para>
0485 </sect2>
0486 
0487 <sect2 id="conf-gnupg">
0488 <title>GnuPG Settings</title>
0489 <para>Here you can configure which gpg binary and which <guilabel>configuration file</guilabel> and home folder are used. These values are autodetected on first start and should already work.</para>
0490 <para>Using the <ulink url="man:gpg-agent">GnuPG agent</ulink> makes work with GnuPG more comfortable as you do not need to type in your password for every action. It is cached in memory for a while so any operation that would require a password can immediately be done. Note that this may allow other people to use your private keys if you leave your session accessible to them.</para>
0491 </sect2>
0492 
0493 <sect2 id="conf-keyservers">
0494 <title>Key Servers</title>
0495 <para>Here you can create a list of keyservers that are shown to you when you open the <link linkend="keyserver">key server dialog</link>. If you run GnuPG from the command line only the key server you set as default here will be used.</para>
0496 <para>The protocol used for communication with the key servers is based on &HTTP;, so it makes sense in some environments to <guilabel>honor the &HTTP; proxy when available</guilabel>.</para>
0497 </sect2>
0498 
0499 <sect2 id="conf-misc">
0500 <title>Misc</title>
0501 <para>This section allows the setting of some different features that do not fit into the other sections. You can configure for example to <guilabel>start KGpg automatically at login</guilabel>. The option <guilabel>use mouse selection instead of clipboard</guilabel> changes if selection happens by mouse and pasting by middle mouse button or if all operations are done by keyboard shortcuts.</para>
0502 <para>You can also change if the systray icon of &kgpg; is shown or not and what action happens if the icon is clicked with the &LMB;. If the systray icon is shown closing the &kgpg; window will minimize the application to tray. If the systray icon is not shown &kgpg; will exit when all windows are closed.</para>
0503 </sect2>
0504 
0505 </sect1>
0506 
0507 </chapter>
0508 
0509 
0510 <chapter id="credits">
0511 
0512 <title>Credits and License</title>
0513 
0514 <para>
0515 &kgpg;
0516 </para>
0517 
0518 <para>Program copyright &copy; 2002-2003 Jean-Baptiste Mardelle
0519 <email>bj@altern.org</email>.</para>
0520 
0521 <para>&copy; 2006-2007 Jimmy Gilles
0522 <email>jimmygilles@gmail.com</email></para>
0523 
0524 <para>&copy; 2006,2007,2008,2009,2010 Rolf Eike Beer
0525 <email>kde@opensource.sf-tec.de</email>
0526 </para>
0527 
0528 <!-- TRANS:CREDIT_FOR_TRANSLATORS -->
0529 
0530 &underFDL;               <!-- FDL: do not remove -->
0531 &underGPL;
0532 
0533 </chapter>
0534 
0535 &documentation.index;
0536 
0537 </book>
0538 
0539 <!--
0540 Local Variables:
0541 mode: sgml
0542 sgml-minimize-attributes: nil
0543 sgml-general-insert-case: lower
0544 sgml-intent-step:0
0545 sgml-indent-data:nil
0546 End:
0547 -->