blob: db78bb936a47dc37ca2ff714815c99811dd510af (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
|
20010322:
- Protect against the Czech attack of modified secret key files. (Cool!)
- Protect against MPI computing errors. (more programm errors than Bellcore)
20001006:
- Alter the ARJ signature to the current version.
- Prevent automatic renaming of command line arguments
used for file names (+batchmode).
199990902:
- Up to 32bit KeyID can be selected.
- Allow batchmode to revoke certificates (and keys :-{).
199971007:
- Bugfix of the previous bugfix. I'm an idiot unable to program in C.
- language.txt (German part) brushed up.
199971006:
- Bugfix of ordinary PGP: -kc failed to deal correctly w/ DSS signatures.
199970905:
- Bugfix: Compile under MSDOS and OSF.
- Corrected some spelling errors.
- ESC is plain text, too.
- Somewhat more verbose output.
- 8192 bit RSA support
199970828:
- Certificates of unknown pubkeys are suppressed.
(New Option UNKNOWN_CERTS (On/Off))
- pgp -kvv shows the quality of user identification.
199970729:
- Bugfix: Validity period is read correctly from the key ring.
199970529:
- Certificates from revoked keys are invalid.
199970513:
- Certificates from unknown users are handled correctly.
199970512:
- Certificate revocations are correctly handled and displayed.
199970418:
- support of a separate "encrypt to self" id
- certificates signed with compromised keys are invalid now
- support of certificate revocation certificates:
You can revoke your ID without loosing your key.
199970404:
- try the corresponding key, if the key of the wrong purpose is used,
so 'pgp -se file myname -u myname' will automatically choose the right
keys.
- SIGN keys can be used to decrypt, but PGP will warn the user.
- The language modul could not distinguish two strings, so changed them.
- Recommendations for key generating changed: Larger keys, userid options.
199970403:
- 2.6.3ia patch included
- bugfixes
199970402:
- While certifying a key the certifier can specify how (s)he checked
the user's real identity. (This question is quite different to
the question whether the key was presented by this person or not!)
- SIGN keys cannot encrypt.
- SIGN keys cannot decrypt (so you can't read it!)
- ENCR keys cannot sign or certify.
- Signatures or certificates by ENCR keys are invalid. (even self signed)
- Signatures or certificates are invalid, if their timestamp is not covered
by the validity period of the public key. (too young or too old)
- Expired keys are kept but marked. (same for keys valid in future)
- Purpose and expire of a key are set while generating the key.
It is derived from the userid as described in the policy of the IN-CH.
References:
http://www.in-ca.individual.net/
ftp://ftp.iks-jena.de/pub/mitarb/lutz/crypt/software/pgp/
Diffs and full source (tgz)
*.asc are detached signatures.
Contributors:
Matthias Bruestle for the myetsid feature.
Lutz Donnerhacke for the pgp2.6.3in development.
Ingmar Camphausen, Thomas Roessler, a.o. for extensive testing.
Todo:
- New trust models for revoked certificates.
- Time stamping features (using the Eternity Logfile:
http://www.iks-jena.de/mitarb/lutz/logfile/)
- Support of EBP and PGP5.0 features.
- Better internal key management for faster access.
- Direct support for keyserver issues.
|