summaryrefslogtreecommitdiffstats
path: root/README
diff options
context:
space:
mode:
authorWerner Koch <wk@gnupg.org>1998-06-25 13:08:18 +0200
committerWerner Koch <wk@gnupg.org>1998-06-25 13:08:18 +0200
commit248f46c5d363c41ae2401891c9c6df6d9bfc5ee9 (patch)
treec4029a21e5794fdc111e934e7e0fb5b7e239f61d /README
parentnearly ready for 0.3.0 (diff)
downloadgnupg2-248f46c5d363c41ae2401891c9c6df6d9bfc5ee9.tar.xz
gnupg2-248f46c5d363c41ae2401891c9c6df6d9bfc5ee9.zip
0.3 readyV0-3-0
Diffstat (limited to 'README')
-rw-r--r--README34
1 files changed, 16 insertions, 18 deletions
diff --git a/README b/README
index 18f8b9ac1..aeec18eb1 100644
--- a/README
+++ b/README
@@ -1,8 +1,12 @@
GNUPG - The GNU Privacy Guard
-------------------------------
+ Version 0.3
- THIS IS ALPHA SOFTWARE, YOU MAY ENCOUNTER SOME BUGS.
+
+ As you can see from the version number, the program may have some
+ bugs and some features may not work at all - please report this to
+ the mailing list.
On a Linux box (version 2.x.x, alpha or x86 CPU) it should
work reliably. You may create your key on such a machine and
@@ -21,27 +25,22 @@
Please subscribe to g10@net.lut.ac.uk by sending a mail with
the word "subscribe" in the body to "g10-request@net.lut.ac.uk".
+ This mailing is closed (only subscribers can post) to avoid spam.
See the file COPYING for copyright and warranty information.
Due to the fact that GNUPG does not use use any patented algorithm,
it cannot be compatible with old PGP versions, because those use
IDEA (which is patented worldwide) and RSA (which is patented in
- the United States until Sep 20, 2000). I'm sorry about this, but
- this is the world we have created (e.g. by using proprietary software).
+ the United States until Sep 20, 2000).
- Because the OpenPGP standard is still a draft, GNUPG now interoperates
- with it and PGP 5. The MUA Mutt will soon support GNUPG; it has a
- mode to fallback to another program if the received message has been
- created with RSA or IDEA.
+ GNUPG is in most aspects compatible with other OpenPGP implementations.
- The default algorithms used by GNUPG are ElGamal for public-key
- encryption and signing; Blowfish with a 128 bit key for protecting
- the secret-key components, conventional and session encryption;
- RIPE MD-160 to create message digest. DSA, SHA-1, CAST and TIGER are
- also implemented, but not used by default. I decided not
- to use DSA as the default signing algorithm, because it allows only
- for 1024 bit keys and this may not be enough in a couple of years.
+ The default algorithms are now DSA and ELGamal. ELGamal for signing
+ is still available, but due to the larger size of such signatures it
+ is depreciated (Please note that the GNUPG implementation of ElGamal
+ signatures is *not* insecure). Symmetric algorithms are: Blowfish
+ and CAST5, Digest algorithms are MD5, RIPEMD160, SHA1 and TIGER/192.
@@ -321,8 +320,6 @@
-----------
This is work in progress, so you may find duplicated code fragments,
ugly data structures, weird usage of filenames and other things.
- I will run "indent" over the source when making a real distribution,
- but for now I stick to my own formatting rules.
The primary FTP site is "ftp://ftp.guug.de/pub/gcrypt/"
The primary WWW page is "http://www.d.shuttle.de/isil/crypt/gnupg.html"
@@ -330,7 +327,8 @@
If you like, send your keys to <gnupg-keys@isil.d.shuttle.de>; use
"gpg --export --armor | mail gnupg-keys@isil.d.shuttle.de" to do this.
- Please direct bug reports to <gnupg-bugs@isil.d.shuttle.de> or better
- post them to the mailing list <g10@net.lut.ac.uk>.
+ Please direct bug reports to <gnupg-bugs@gnu.org> or better
+ post them to the mailing list <g10@net.lut.ac.uk> (this is a closed list,
+ please subscribe before posting).