[svn] GnuPG - r4043 - trunk/doc

svn author dshaw cvs at cvs.gnupg.org
Tue Mar 7 22:47:37 CET 2006


Author: dshaw
Date: 2006-03-07 22:47:36 +0100 (Tue, 07 Mar 2006)
New Revision: 4043

Modified:
   trunk/doc/ChangeLog
   trunk/doc/gpg.sgml
Log:
* gpg.sgml: Document new way of enabling the PKA functions.  Some minor
other cleanups.


Modified: trunk/doc/ChangeLog
===================================================================
--- trunk/doc/ChangeLog	2006-03-07 20:14:20 UTC (rev 4042)
+++ trunk/doc/ChangeLog	2006-03-07 21:47:36 UTC (rev 4043)
@@ -1,3 +1,8 @@
+2006-03-07  David Shaw  <dshaw at jabberwocky.com>
+
+	* gpg.sgml: Document new way of enabling the PKA functions.  Some
+	minor other cleanups.
+
 2006-03-06  David Shaw  <dshaw at jabberwocky.com>
 
 	* gpg.sgml: Document --auto-key-locate.

Modified: trunk/doc/gpg.sgml
===================================================================
--- trunk/doc/gpg.sgml	2006-03-07 20:14:20 UTC (rev 4042)
+++ trunk/doc/gpg.sgml	2006-03-07 21:47:36 UTC (rev 4043)
@@ -1200,12 +1200,6 @@
 trust database.
 </para></listitem></varlistentry>
 
-<varlistentry><term>pgp+pka</term><listitem><para>
-Same as <term>pka</term> but a valid PKA will increase the trust to full.
-Note, that the option <term>--allow-pka-lookup</term> needs to be
-enabled to actually make this work.
-</para></listitem></varlistentry>
-
 <varlistentry><term>classic</term><listitem><para>
 This is the standard Web of Trust as used in PGP 2.x and earlier.
 </para></listitem></varlistentry>
@@ -1215,29 +1209,20 @@
 Web of Trust.
 </para></listitem></varlistentry>
 
-<varlistentry><term>direct+pka</term><listitem><para>
-Same as <term>direct</term> but a valid PKA will increase the trust to full.
-</para></listitem></varlistentry>
-
 <varlistentry><term>always</term><listitem><para>
 Skip key validation and assume that used keys are always fully
-trusted.  You won't use this unless you have installed some external
-validation scheme.  This option also suppresses the "[uncertain]" tag
-printed with signature checks when there is no evidence that the user
-ID is bound to the key.
+trusted.  You generally won't use this unless you are using some
+external validation scheme.  This option also suppresses the
+"[uncertain]" tag printed with signature checks when there is no
+evidence that the user ID is bound to the key.
 </para></listitem></varlistentry>
 
 <varlistentry><term>auto</term><listitem><para>
 Select the trust model depending on whatever the internal trust
 database says. This is the default model if such a database already
-exists.  Note, this won't enable the PKA sub model.
+exists.
 </para></listitem></varlistentry>
 
-<varlistentry><term>auto+pka</term><listitem><para>
-Select the trust model depending on whatever the internal trust
-database says and enable the PKA sub model.
-</para></listitem></varlistentry>
-
 </variablelist></para></listitem></varlistentry>
 
 <varlistentry>
@@ -1248,9 +1233,8 @@
 
 <varlistentry>
 <term>--auto-key-locate <parameter>parameters</parameter></term>
-
+<term>--no-auto-key-locate</term>
 <listitem><para>
-
 GnuPG can automatically locate and retrieve keys as needed using this
 option.  This happens when encrypting to an email address (in the
 "user at example.com" form), and there are no user at example.com keys on
@@ -1288,16 +1272,6 @@
 
 
 <varlistentry>
-<term>--allow-pka-lookup</term>
-<listitem><para>
-This option enables PKA lookups.  PKA is based on DNS; thus enabling
-this option may disclose information on when and what signatures are verified
-or to whom data is encrypted.  This is similar to the "web bug"
-described for the auto-key-retrieve feature.
-</para></listitem></varlistentry>
-
-
-<varlistentry>
 <term>--keyid-format <parameter>short|0xshort|long|0xlong</parameter></term>
 <listitem><para>
 Select how to display key IDs.  "short" is the traditional 8-character
@@ -1349,7 +1323,7 @@
 keyservers this option is meaningless.  Note also that most keyservers
 do not have cryptographic verification of key revocations, and so
 turning this option off may result in skipping keys that are
-incorrectly marked as revoked.  Defaults to on.
+incorrectly marked as revoked.
 </para></listitem></varlistentry>
 
 <varlistentry>
@@ -1361,14 +1335,38 @@
 </para></listitem></varlistentry>
 
 <varlistentry>
+<term>auto-key-retrieve</term>
+<listitem><para>
+This option enables the automatic retrieving of keys from a keyserver
+when verifying signatures made by keys that are not on the local
+keyring.
+</para><para>
+Note that this option makes a "web bug" like behavior possible.
+Keyserver operators can see which keys you request, so by sending you
+a message signed by a brand new key (which you naturally will not have
+on your local keyring), the operator can tell both your IP address and
+the time when you verified the signature.
+</para></listitem></varlistentry>
+
+<varlistentry>
 <term>honor-keyserver-url</term>
 <listitem><para>
 When using --refresh-keys, if the key in question has a preferred
-keyserver set, then use that preferred keyserver to refresh the key
-from.  Defaults to yes.
+keyserver URL, then use that preferred keyserver to refresh the key
+from.  In addition, if auto-key-retrieve is set, and the signature
+being verified has a preferred keyserver URL, then use that preferred
+keyserver to fetch the key from.  Defaults to yes.
 </para></listitem></varlistentry>
 
 <varlistentry>
+<term>honor-pka-record</term>
+<listitem><para>
+If auto-key-retrieve is set, and the signature being verified has a
+PKA record, then use the PKA information to fetch the key.  Defaults
+to yes.
+</para></listitem></varlistentry>
+
+<varlistentry>
 <term>include-subkeys</term>
 <listitem><para>
 When receiving a key, include subkeys as potential targets.  Note that
@@ -1421,32 +1419,6 @@
 "http_proxy".
 </para></listitem></varlistentry>
 
-<varlistentry>
-<term>auto-key-retrieve</term>
-<listitem><para>
-This option enables the automatic retrieving of keys from a keyserver
-when verifying signatures made by keys that are not on the local
-keyring.
-</para><para>
-Note that this option makes a "web bug" like behavior possible.
-Keyserver operators can see which keys you request, so by sending you
-a message signed by a brand new key (which you naturally will not have
-on your local keyring), the operator can tell both your IP address and
-the time when you verified the signature.
-</para></listitem></varlistentry>
-
-<varlistentry>
-<term>auto-pka-retrieve</term>
-<listitem><para>
-This option enables the automatic retrieving of missing keys through
-information taken from PKA records in the DNS. Defaults to yes.
-Note, that the option <term>--allow-pka-lookup</term> needs to be
-enabled to actually make this work.  
-</para><para>
-By using this option, one may unintentionally disclose information
-similar to the one described for <term>auto-key-retrieve</term>.
-</para></listitem></varlistentry>
-
 </variablelist>
 </para></listitem></varlistentry>
 
@@ -1499,7 +1471,9 @@
 <term>import-minimal</term>
 <listitem><para>
 Import the smallest key possible.  This removes all signatures except
-the most recent self-signature on each user ID.  Defaults to no.
+the most recent self-signature on each user ID.  This option is the
+same as running the --edit-key command "minimize" after import.
+Defaults to no.
 </para></listitem></varlistentry>
 
 </variablelist>
@@ -1552,15 +1526,18 @@
 exported if the user IDs are not usable.  Also, do not export any
 signatures that are not usable.  This includes signatures that were
 issued by keys that are not present on the keyring.  This option is
-the same as running the --edit-key command "clean" before export.
-Defaults to no.
+the same as running the --edit-key command "clean" before export
+except that the local copy of the key is not modified.  Defaults to
+no.
 </para></listitem></varlistentry>
 
 <varlistentry>
 <term>export-minimal</term>
 <listitem><para>
 Export the smallest key possible.  This removes all signatures except
-the most recent self-signature on each user ID.  Defaults to no.
+the most recent self-signature on each user ID.  This option is the
+same as running the --edit-key command "minimize" before export except
+that the local copy of the key is not modified.  Defaults to no.
 </para></listitem></varlistentry>
 
 </variablelist>
@@ -1704,6 +1681,23 @@
 Defaults to no.
 </para></listitem></varlistentry>
 
+<varlistentry>
+<term>pka-lookups</term>
+<listitem><para>
+Enable PKA lookups to verify sender addresses.  Note that PKA is based
+on DNS, and so enabling this option may disclose information on when
+and what signatures are verified or to whom data is encrypted.  This
+is similar to the "web bug" described for the auto-key-retrieve
+feature.
+</para></listitem></varlistentry>
+
+<varlistentry>
+<term>pka-trust-increase</term>
+<listitem><para>
+Raise the trust in a signature to full if the signature passes PKA
+validation.  This option is only meaningful if pka-lookups is set.
+</para></listitem></varlistentry>
+
 </variablelist>
 </para></listitem></varlistentry>
 
@@ -2329,11 +2323,9 @@
 <varlistentry>
 <term>--passphrase-fd &ParmN;</term>
 <listitem><para>
-Read the passphrase from file descriptor &ParmN;. If you use
-0 for &ParmN;, the passphrase will be read from stdin.	This
-can only be used if only one passphrase is supplied.
-<!--fixme: make this print strong-->
-Don't use this option if you can avoid it.
+Read the passphrase from file descriptor &ParmN;.  If you use 0 for
+&ParmN;, the passphrase will be read from stdin.  This can only be
+used if only one passphrase is supplied.
 </para></listitem></varlistentry>
 
 <varlistentry>
@@ -2341,8 +2333,8 @@
 <listitem><para>
 Read the passphrase from file &ParmFile;.  This can only be used if
 only one passphrase is supplied.  Obviously, a passphrase stored in a
-file is of questionable security.  Don't use this option if you can
-avoid it.
+file is of questionable security if other users can read this file.
+Don't use this option if you can avoid it.
 </para></listitem></varlistentry>
 
 <varlistentry>
@@ -2350,7 +2342,8 @@
 <listitem><para>
 Use &ParmString; as the passphrase.  This can only be used if only one
 passphrase is supplied.  Obviously, this is of very questionable
-security.  Don't use this option if you can avoid it.
+security on a multi-user system.  Don't use this option if you can
+avoid it.
 </para></listitem></varlistentry>
 
 <varlistentry>
@@ -3172,12 +3165,6 @@
 be used to override it.</para></listitem>
 </varlistentry>
 <varlistentry>
-<term>http_proxy</term>
-<listitem><para>Only honored when the keyserver-option
-honor-http-proxy is set.</para></listitem>
-</varlistentry>
-
-<varlistentry>
 <term>COLUMNS</term>
 <term>LINES</term>
 <listitem><para>




More information about the Gnupg-commits mailing list