Initial commit
This commit is contained in:
commit
ee1d292475
159 changed files with 4867 additions and 0 deletions
372
static/talks/gnupg.html
Normal file
372
static/talks/gnupg.html
Normal file
|
@ -0,0 +1,372 @@
|
|||
<html>
|
||||
<hr>
|
||||
<font size="+2"></font><div align="CENTER">
|
||||
<font size="+2"><br>
|
||||
<br>
|
||||
<br>
|
||||
<br>
|
||||
GnuPG - sicherer E-Mail Verkehr<br>
|
||||
<br>
|
||||
</font><font size="-1"><br>
|
||||
Norbert Tretkowski<br>
|
||||
Debian Entwickler<br>
|
||||
nobse@debian.org<br>
|
||||
</font></div>
|
||||
<br>
|
||||
(page 1)<br>
|
||||
<hr>
|
||||
<div align="LEFT">
|
||||
<font size="-3"></font><font size="+2"><br>
|
||||
Klassische Kryptographie Programme</font><font size="-3"><br>
|
||||
</font><br>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Kommunikationspartner müssen vor der Kommunikation geheime Schlüssel austauschen
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Lästig wenn sie sehr weit auseinander leben
|
||||
</ul>
|
||||
</div>
|
||||
<br>
|
||||
(page 2)<br>
|
||||
<hr>
|
||||
<div align="LEFT">
|
||||
<font size="-3"></font><font size="+2"><br>
|
||||
Abhilfe</font><font size="-3"><br>
|
||||
</font><br>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Whitfield Diffie und Martin Hellmann entwickelten 1976 das asymetrische Verfahren
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Bei diesem hat jeder Benutzer zwei Schlüssel
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<ul>
|
||||
<li>einen öffentlichen (den er verbreitet)
|
||||
</ul>
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<ul>
|
||||
<li>einen privaten (der geheim bleiben muss)
|
||||
</ul>
|
||||
</ul>
|
||||
</div>
|
||||
<br>
|
||||
(page 3)<br>
|
||||
<hr>
|
||||
<div align="LEFT">
|
||||
<font size="-3"></font><font size="+2"><br>
|
||||
Wie's funktioniert</font><font size="-3"><br>
|
||||
</font><br>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Jemand will mir eine verschlüsselte E-Mail schicken
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Diese Person holt sich meinen öffentlichen Schlüssel von einem Keyserver
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Nachricht wird mit dem eben geholten Key verschlüsselt
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Nur der Besitzer des entsprechenden privaten Keys kann die Nachricht entschlüsseln
|
||||
</ul>
|
||||
</div>
|
||||
<br>
|
||||
(page 4)<br>
|
||||
<hr>
|
||||
<div align="LEFT">
|
||||
<font size="-3"></font><font size="+2"><br>
|
||||
Populärste Implementation</font><font size="-3"><br>
|
||||
</font><br>
|
||||
<br>
|
||||
Bisher PGP, aber<br>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Problem: CAF
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Source Code nicht verfügbar
|
||||
</ul>
|
||||
<br>
|
||||
<br>
|
||||
Abhilfe: GnuPG<br>
|
||||
</div>
|
||||
<br>
|
||||
(page 5)<br>
|
||||
<hr>
|
||||
<div align="LEFT">
|
||||
<font size="-3"></font><font size="+2"><br>
|
||||
Anlegen eines neuen Keys (1)</font><font size="-3"><br>
|
||||
</font><br>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Aufruf: `gpg --gen-key`
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Standardeinstellungen übernehmen
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<ul>
|
||||
<li>Algorithmus
|
||||
<li>Schlüssellänge
|
||||
<li>Gültigkeitsdauer
|
||||
</ul>
|
||||
</ul>
|
||||
</div>
|
||||
<br>
|
||||
(page 6)<br>
|
||||
<hr>
|
||||
<div align="LEFT">
|
||||
<font size="-3"></font><font size="+2"><br>
|
||||
Anlegen eines neuen Keys (2)</font><font size="-3"><br>
|
||||
</font><br>
|
||||
<br>
|
||||
<ul>
|
||||
<li>User-ID für den Schlüssel wählen
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<ul>
|
||||
<li>Name, z.B. 'Norbert Tretkowski'
|
||||
</ul>
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<ul>
|
||||
<li>Kommentar, z.B. 'nobse'
|
||||
</ul>
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<ul>
|
||||
<li>E-Mail Adresse, z.B. 'nobse@debian.org'
|
||||
</ul>
|
||||
</ul>
|
||||
</div>
|
||||
<br>
|
||||
(page 7)<br>
|
||||
<hr>
|
||||
<div align="LEFT">
|
||||
<font size="-3"></font><font size="+2"><br>
|
||||
Anlegen eines neuen Keys (3)</font><font size="-3"><br>
|
||||
</font><br>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Passphrase eingeben
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<ul>
|
||||
<li>Der private Schlüssel wird nicht im Klartext gespeichert
|
||||
</ul>
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<ul>
|
||||
<li>Wird nur bei Bedarf entschlüsselt
|
||||
</ul>
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<ul>
|
||||
<li>Passphrase darf niemals über eine unsichere Verbindung eingegeben werden
|
||||
</ul>
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Nach Eingabe der Passphrase wird Schlüsselpaar generiert
|
||||
</ul>
|
||||
</div>
|
||||
<br>
|
||||
(page 8)<br>
|
||||
<hr>
|
||||
<div align="LEFT">
|
||||
<font size="-3"></font><font size="+2"><br>
|
||||
Hinzufügen zusätzlicher User-ID's</font><font size="-3"><br>
|
||||
</font><br>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Hinzufügen weiterer E-Mail Adressen möglich
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Befehl 'adduid' auf der Schlüsselmanagement Console
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Erneute Abfrage von Name, Kommentar und E-Mail Adresse
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Löschen einer User-ID: 'deluid'
|
||||
</ul>
|
||||
</div>
|
||||
<br>
|
||||
(page 9)<br>
|
||||
<hr>
|
||||
<div align="LEFT">
|
||||
<font size="-3"></font><font size="+2"><br>
|
||||
Revoke Zertifikat</font><font size="-3"><br>
|
||||
</font><br>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Revoke Zertifikat zum ungültig erklären eines Schlüssels
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Aufruf: 'gpg --gen-revoke <user-id>
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Zertifikat wird ausgegeben
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<ul>
|
||||
<li>Speichern des Zertifikats auf einer Floppy
|
||||
</ul>
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<ul>
|
||||
<li>Ausdrucken des Zertifikats
|
||||
</ul>
|
||||
</ul>
|
||||
</div>
|
||||
<br>
|
||||
(page 10)<br>
|
||||
<hr>
|
||||
<div align="LEFT">
|
||||
<font size="-3"></font><font size="+2"><br>
|
||||
Keys auf einen Keyserver</font><font size="-3"><br>
|
||||
</font><br>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Uploaden des Keys<font size="-2">
|
||||
</ul>
|
||||
$ gpg --keyserver keys.de.pgp.net --send-key <user-id><br>
|
||||
gpg: success sending to `keys.de.pgp.net' (status=200)<br>
|
||||
</font><font size="-1"><br>
|
||||
<ul>
|
||||
<li>Aktualisieren des Keys durch erneutes Uploaden
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Loeschen eines Keys nicht moeglich
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Holen eines Keys</font><font size="-2">
|
||||
</ul>
|
||||
$ gpg --keyserver keys.de.pgp.net --recv-key <user-id><br>
|
||||
</font></div>
|
||||
<br>
|
||||
(page 11)<br>
|
||||
<hr>
|
||||
<div align="LEFT">
|
||||
<font size="-3"></font><font size="+2"><br>
|
||||
Verschlüsseln und entschlüsseln</font><font size="-3"><br>
|
||||
</font><br>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Verschluesseln einer Datei<font size="-2">
|
||||
</ul>
|
||||
$ gpg -a -r <user-id oder key-id> -e <dateiname><br>
|
||||
</font><font size="-1"><br>
|
||||
<ul>
|
||||
<li>Neu Datei <dateiname.asc>
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Entschluesseln via</font><font size="-2">
|
||||
</ul>
|
||||
$ gpg -d <dateiname><br>
|
||||
</font></div>
|
||||
<br>
|
||||
(page 12)<br>
|
||||
<hr>
|
||||
<div align="LEFT">
|
||||
<font size="-3"></font><font size="+2"><br>
|
||||
Signieren und Prüfen</font><font size="-3"><br>
|
||||
</font><br>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Signieren einer Datei<font size="-2">
|
||||
</ul>
|
||||
$ gpg -clearsign [-u <user-id>] <dateiname><br>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Pruefen einer Signatur</font><font size="-2">
|
||||
</ul>
|
||||
$ gpg -verify <dateiname><br>
|
||||
</font><font size="-1"><br>
|
||||
<ul>
|
||||
<li>Pruefen und ausgeben</font><font size="-2">
|
||||
</ul>
|
||||
$ gpg -d <dateiname><br>
|
||||
</font></div>
|
||||
<br>
|
||||
(page 13)<br>
|
||||
<hr>
|
||||
<div align="LEFT">
|
||||
<font size="-3"></font><font size="+2"><br>
|
||||
Unterschreiben von Schlüsseln</font><font size="-3"><br>
|
||||
</font><br>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Nur bei
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<ul>
|
||||
<li>Vorlage des Fingerprints
|
||||
<li>Vorlage des Personalausweis oder Reisepass
|
||||
</ul>
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Importieren des Schlüssels
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Aufruf: 'gpg --sign-key <user-id>'
|
||||
</ul>
|
||||
<br>
|
||||
<ul>
|
||||
<li>Key exportieren und an Besitzer schicken
|
||||
</ul>
|
||||
(page 14)<br>
|
||||
</body>
|
||||
</html>
|
||||
<!--
|
||||
FILE ARCHIVED ON 14:25:48 Jan 03, 2005 AND RETRIEVED FROM THE
|
||||
INTERNET ARCHIVE ON 10:25:20 May 11, 2024.
|
||||
JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE.
|
||||
|
||||
ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C.
|
||||
SECTION 108(a)(3)).
|
||||
-->
|
||||
<!--
|
||||
playback timings (ms):
|
||||
captures_list: 0.8
|
||||
exclusion.robots: 0.23
|
||||
exclusion.robots.policy: 0.217
|
||||
esindex: 0.01
|
||||
cdx.remote: 8.358
|
||||
LoadShardBlock: 633.455 (3)
|
||||
PetaboxLoader3.datanode: 66.978 (4)
|
||||
PetaboxLoader3.resolve: 641.132 (2)
|
||||
load_resource: 78.289
|
||||
-->
|
Loading…
Add table
Add a link
Reference in a new issue