Mark H. Wood
mwood at IUPUI.Edu
Tue Sep 23 15:53:40 CEST 2008
On Tue, Sep 23, 2008 at 09:44:53AM -0400, David Shaw wrote:
> On Sep 22, 2008, at 10:17 AM, Mark H. Wood wrote:
>> On Mon, Sep 22, 2008 at 12:09:00AM -0400, David Shaw wrote:
>>> I'd be content with something that says "List algorithms in the order in
>>> which you'd like to see them used.
>> There's the problem right there. "Used" when? When sending?
>> apparently not. When others send to me? apparently so. Somehow the
>> two cases (I send; I receive) should be disentangled.
> Good point. How about:
> List algorithms in the order in which you'd like to see them used by someone
> else when encrypting a message to you. If you don't include 3DES, GPG will
> add it automatically at the end. Note that there are many factors that go
> into choosing an algorithm (for example, you may not be the only recipient),
> and so the remote OpenPGP application being used to send to you may or may
> not follow your exact chosen order for a given message. However, it will
> only ever choose an algorithm that is on the list of every recipient key.
> See also the INTEROPERABILITY section.
Sounds good to me. It seems to cover what people mostly need to know,
and is compact enough for a man page.
Mark H. Wood, Lead System Programmer mwood at IUPUI.Edu
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 197 bytes
Desc: not available
More information about the Gnupg-users