summaryrefslogtreecommitdiff
path: root/security/pgpin/files/CHANGES
blob: db78bb936a47dc37ca2ff714815c99811dd510af (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
20010322:
  - Protect against the Czech attack of modified secret key files. (Cool!)
  - Protect against MPI computing errors. (more programm errors than Bellcore)

20001006:
  - Alter the ARJ signature to the current version.
  - Prevent automatic renaming of command line arguments
    used for file names (+batchmode).

199990902:
  - Up to 32bit KeyID can be selected.
  - Allow batchmode to revoke certificates (and keys :-{).

199971007:
  - Bugfix of the previous bugfix. I'm an idiot unable to program in C.
  - language.txt (German part) brushed up.

199971006:
  - Bugfix of ordinary PGP: -kc failed to deal correctly w/ DSS signatures.

199970905:
  - Bugfix: Compile under MSDOS and OSF.
  - Corrected some spelling errors.
  - ESC is plain text, too.
  - Somewhat more verbose output.
  - 8192 bit RSA support

199970828:
  - Certificates of unknown pubkeys are suppressed.
    (New Option UNKNOWN_CERTS (On/Off))
  - pgp -kvv shows the quality of user identification.

199970729:
  - Bugfix: Validity period is read correctly from the key ring.

199970529:
  - Certificates from revoked keys are invalid.

199970513:
  - Certificates from unknown users are handled correctly.

199970512:
  - Certificate revocations are correctly handled and displayed.

199970418:
  - support of a separate "encrypt to self" id
  - certificates signed with compromised keys are invalid now
  - support of certificate revocation certificates:
    You can revoke your ID without loosing your key.

199970404:
  - try the corresponding key, if the key of the wrong purpose is used,
    so 'pgp -se file myname -u myname' will automatically choose the right
    keys.
  - SIGN keys can be used to decrypt, but PGP will warn the user.
  - The language modul could not distinguish two strings, so changed them.
  - Recommendations for key generating changed: Larger keys, userid options.

199970403:
  - 2.6.3ia patch included
  - bugfixes

199970402:
  - While certifying a key the certifier can specify how (s)he checked
    the user's real identity. (This question is quite different to
    the question whether the key was presented by this person or not!)
  - SIGN keys cannot encrypt.
  - SIGN keys cannot decrypt (so you can't read it!)
  - ENCR keys cannot sign or certify.
  - Signatures or certificates by ENCR keys are invalid. (even self signed)
  - Signatures or certificates are invalid, if their timestamp is not covered
    by the validity period of the public key. (too young or too old)
  - Expired keys are kept but marked. (same for keys valid in future)
  - Purpose and expire of a key are set while generating the key.
    It is derived from the userid as described in the policy of the IN-CH.

References:
  http://www.in-ca.individual.net/
  ftp://ftp.iks-jena.de/pub/mitarb/lutz/crypt/software/pgp/
    Diffs and full source (tgz)
    *.asc are detached signatures.

Contributors:
  Matthias Bruestle for the myetsid feature.
  Lutz Donnerhacke for the pgp2.6.3in development.
  Ingmar Camphausen, Thomas Roessler, a.o. for extensive testing.

Todo:
  - New trust models for revoked certificates.
  - Time stamping features (using the Eternity Logfile:
                            http://www.iks-jena.de/mitarb/lutz/logfile/)
  - Support of EBP and PGP5.0 features.
  - Better internal key management for faster access.
  - Direct support for keyserver issues.