File and email encryption with GPG4win & Enigmail



Similar documents
GPG4win / Kleopatra Documentation. Secure file and encryption by using GnuPG for Windows

GPG installation and configuration

Encrypting your Communications using PGP

GPG - GNU Privacy Guard

Tutorial: Encrypted with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

SECURE USER GUIDE OUTLOOK 2000

Secure Part II Due Date: Sept 27 Points: 25 Points

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

4. Click Next and then fill in your Name and address. Click Next again.

FRCC Secure Transfer & Storage Infrastructure. Training for new data transfer process

Using Your PGP Tool to Update Your Address Settings for Encrypted Messaging

The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen.

Internet Encryption S/Mime Standard

How to Setup Privacy Guard Encryption.

Using Entrust certificates with Microsoft Office and Windows

Adobe Digital Signatures in Adobe Acrobat X Pro

Account Create for Outlook Express

Djigzo S/MIME setup guide

THUNDERBIRD WORKBOOK

The KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer

Biography of Trainer. Education. Experience. Summary. TLS/SSL : Securing your website PGP : Secure your communication. Topic

Exostar LDAP Proxy / Secure Setup Guide. This document provides information on the following topics:

1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.

Encrypting with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER

LiteCommerce Advanced Security Module. Version 2.8

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

PDG Software. PDG Key Manager User Guide

Secure transaction guidelines for external users with Commission personnel.

PDG Software. Keyman Encryption Guide

Personal Secure Certificate

HW/Lab 1: Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

CBH Provider EDI Browser Manual

INTRODUCTION TO CRYPTOGRAPHY

Instruction Manual for BicDroid QDocument

Getting a Free Comodo Certificate

Document Management Getting Started Guide

Extracting an S/MIME certificate from a digital signature

Instructions for Microsoft Outlook 2003

Steganos Secure Step by Step Instructions. Introduction STEP 1: INSTALLATION

Encrypting Your Using the free COMODO Secure Certificate

Creating Digital Signatures

An Introduction to Secure . Presented by: Addam Schroll IT Security & Privacy Analyst

Microsoft Access Rollup Procedure for Microsoft Office Click on Blank Database and name it something appropriate.

X.509 Certificate Generator User Manual

You may have been given a download link on your trial software . Use this link to download the software.

Ciphermail for Android Quick Start Guide

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

Digital Signatures. To learn more about digital signatures view this White Paper by Adobe.

TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

FRCC Secure Data Transfer. Users Guide V1.0

MessageGuard 3.0 User Guide

Published : License : None

PKI Contacts PKI for Fraunhofer Contacts

Professional Mailbox Software Setup Guide

Installing your Digital Certificate & Using on MS Out Look 2007.

TrustKey Tool User Manual

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on. User Information

Exchange Granular Restore. User Guide

eadvantage Certificate Enrollment Procedures

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec

How to use PGP Encryption with iscribe

Configuring Thunderbird for Flinders Mail at home.

Jumble for Microsoft Outlook

Signing and Encryption with GnuPG

HMRC Secure Electronic Transfer (SET)

IceWarp SSL Certificate Process

The IceWarp SSL Certificate Process

Select Correct USB Driver

Yale Software Library. PGP 9.6 for Windows

ADFS Integration Guidelines

How to use Certificate in Microsoft Outlook

Setting up secure communication with Ericsson. Guideline for Ericsson partners

Exchange Granular Restore Instructional User Guide

BioWin Network Installation

Guide for Securing With WISeKey CertifyID Personal Digital Certificate (Personal eid)

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1

Update Instructions

Apple Mac VPN Service Setting up Remote Desktop

User Guide Using Certificate in Microsoft Outlook Express

Exchange 2003 Mailboxes

Guide Installing Digital Certificates in Outlook 2000

Using TLS Encryption with Microsoft Outlook 2007

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

Encryption. Introduction to using 7-Zip

1.2 Using the GPG Gen key Command

SecureZIP User Guide

Aspera Connect User Guide

MyNetFone Virtual Fax. Virtual Fax Installation

Exchange Granular Restore User Guide

Backing up Microsoft Outlook For the PC Using MS Outlook 2000 Keith Roberts

HP ProtectTools Embedded Security Guide

User Guide May Using Certificates in Outlook Express

How To Set Up Your

Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Gateway

Instructions For Opening UHA Encrypted

Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!

SMS for Outlook. Installation, Configuration and Usage Guide

Transcription:

Protektor Services Windows Manual 11.5 File and email encryption with GPG4win & Enigmail

Introduction, Contact, Legals, License Introduction Protektor Services Manual version 11.5 A new edition of the Protektor Services manual series. Protektor Services wants to assist by providing the right tools to help the people that need them without keeping them in the dark on how things actually work. Protektor Services manual series aims to do this by: Creating user friendly manuals Providing manuals for all major operating systems, it doesn't matter if you use Windows, Apple or Linux. Using only open source or open standards based software and solutions. Releasing the manuals under the Creative Commons Attribution 3.0 Unported License. Intermittent updates to the manuals to keep them current with real life computer systems. Making the source-file of the manuals available on request. In case you have any questions about the manuals do not hesitate to contact me. If you or your organization would like customized manuals or want to receive a full training for your people, do not hesitate to contact me Tom Contact Email: Skype: Website: GPG Key: protektor.services@gmail.com or tom.keunen@gmail.com tomkeunen http://protektor-blog.blogspot.com http://protektor-blog.blogspot.com/p/key.html Acknowledgements I want to thank Nikki for the patience while I am thinking about computer stuff during social time. Legals All trademarks belong to their respected owners. No ownership is claimed by the author. License This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.

Good things to remember Keep your system up to date. Keep your programs up to date. Choose a strong password. Create a user account for daily use. Use anti-virus software Do not forget to make regular backups.

Product Information Website: Version: System: License: http://www.gpg4win.org 2.1.0, Released on March 15, 2011 Windows 2000/XP/Vista/7 Open Source Website: Version: System: License: http://enigmail.mozdev.org/ 1.1.2, Released on June 29, 2010 Windows, Requires Thunderbird Open Source, MPL/GPLv2 What is GPG4win, Enigmail? The makers of GPG4win aim to maintain an up-to-date collection of tools to give the user all the right software for managing keys and encrypting/decrypting text and files. Enigmail is an extension for the Thunderbird email client that provides the encryption, decryption and signing functionality. Why use GPG4win, Enigmail? GPG4win is a Windows collection of software and manuals that replaces the commercial PGP suite. Enigmail will give you access to all the cryptographic features you require for email. How GPG4win, Enigmail work? GPG4win is an installer package that automates the installation of other programs, it makes installations much more user friendly. GPG4win contains more packages but in this manual you will use: GnuPG The core of the suite, GnuPG is the program that deals with the actual cryptographic features for files but also for Enigmail. Kleopatra Kleopatra is the front-end for GnuPG. It acts as the main key manager. Via an icon in the task bar the user gets access to different functions like encrypting and decrypting of text. GPGEx GPGEx is used for encrypting/decrypting files, you access it by right clicking on a file. The enigmail will be installed from within Thunderbird after we have set up GPG4win.

Keys? Symmetric Key Symmetric keys (also known as single-key algorithms) are encryption schemes where one key is being used for encrypting and decrypting. Asymmetric Key Asymmetric cryptography or Public Key cryptography is a design based on the use of a private key and a public key. Both keys are necessary to complete the process of encrypting and decrypting. An easy way to think about it is comparing it to your phone. In order to receive calls you have to give out your telephone number (your public key) but to receive a call you need your phone (your private key). How to use GPG4win? Download the installation package from the website and when finished double click on the icon to install. The installation process is straight forward, the default settings are the correct ones most of the time, the only 2 times you have to interact are in the components page Deselect the checkbox next to GPGOL if you are not using the Outlook email client. Click on Next to continue with the installation.

And when the Define trustable root certificates page comes up. Select the checkbox that you want to skip the configuration. This part of the installer deals with S/mime certificates which is outside the scope of this manual. Click next to continue. The installation process is finished.

Start Kleopatra from the programs list. The main window for key management will appear. If you already have a GPG key you can import it by clicking on the Import certificates icon. If you don't have a key yet please continue.

Click on the File menu and select New Certificate. The Certificate Creation Wizard will guide you through the process. Select Create a personal OpenPGP key pair. Click on Next to continue.

The next step is to provide your details. Enter your Name and your email address. The email address has to be the same as your email program sends out or there might be verification issues with your key pair making it harder to use. Click on Next to continue. You are presented with the details for your certificate, check them carefully. If the details are correct, click on Create Key.

You will need to enter a passphrase. Make sure that you choose a strong passphrase. The wizard will provide some visual help in the form of a quality bar to measure the strength of your chosen passphrase. If you choose a passphrase too short, or not complicated enough, the wizard will kindly offer you a chance to create a stronger passphrase.

You will be asked to re-enter the passphrase. Click on Ok to continue. The key creation is now finished. After your key pair Is created you should make a back up of it. From this window you can also send it to a key server. When you are finished click on Finish to continue. Your key is now ready to be used.

Now that we have created a key pair, let's export your public key so people can communicate with you in a more secure way. Select your key, click on File and select Export Certificates. Give it a more human readable name and for compatibility issues the.asc extension. Click on Save to continue.

If you want to send encrypted files to anybody else you will need their public key. To import this key go to the Kleopatra main window. You can now drag and drop the key file into the main window or select Import Certificates. Browse to where the key you want to import is located. Select it and click on Open.

Kleopatra will present you with a window to let you know you know the import process was successful. Click on Ok to close the window. The key has been imported but is not quite ready to be used. Select the key in the Imported Certificates tab from the Kleopatra main window, click on the Certificates menu and then select Change Owner Trust. The web of trust is important when you use GPG. Read the different trust levels and select accordingly. When you have selected the right level of trust, click on OK. Kleopatra will let you know that the Trust level has changed.

Next we will certify the key. Go back to the main window of Kleopatra. Select the key you wish to certify and click on the certificates menu and select Certify certificate. Select the checkbox for the key you want to certify. Verify the fingerprint with the user and click on Next.

The next window will let you choose the certificate you want to use to certify. Click on Certify to continue. You will be asked to enter your passphrase. After you entered your passphrase click on OK. Kleopatra will let you know that the certification was successful. Click on Finish to continue.

If you know go to the main Kleopatra and select Trusted Certificates tab you will see that the key you just imported is now trusted and ready to be used. Next you will encrypt a file to share with the person you just imported the key from. Go to document you wish to encrypt, right click with your mouse on the file and in the menu you will see the option to Sign and encrypt.

This process only takes a few mouse clicks. Select Sign and Encrypt and click on Next. The signing part of this process is part of what makes up the web of trust.

Next you will have to select the keys you want to use to encrypt this file. Select the key(s), and click on Add. They will be added to the bottom box and when finished selecting the keys, click on Next.

Select the identity you want to sign the file with. Click on Sign & Encrypt to continue. You will need to enter your passphrase. After entering your passphrase click on OK.

GPG will now perform the signing and encrypting. You will be presented with a window to inform you of the operations. Click on Finish to continue. Your encrypted document is now ready to be shared with your contact. As you can see the filename is not encrypted, be aware of this when choosing a filename so you don't divulge any information that might be sensitive.

When you receive an encrypted file and you need to decrypt it the process is even easier. Select the file you want to decrypt, right click and select decrypt and verify from the menu. Kleopatra will give you some options what you can do with the file. Click on Decrypt/Verify to continue. You will need to enter your passphrase. When finished, click on OK.

You will get the status report from Kleopatra. Click OK to continue. Your file is now decrypted. That is all it takes to import keys, to encrypt and decrypt files with GPG4win. This method is suitable for when you want to share files via removable media such as a USB stick. You can also send this encrypted document via email. Next we will be looking at encrypting and decrypting email. For this manual we will work with the Thunderbird email client. If you use another client, chances are that there is a GPG extension available for it that will make it also easy to use. This manual will not go into depth on how to install and configure thunderbird but will focus on using the GPG cryptographic features in a user friendly way. There are many great tutorials available in the internet for general Thunderbird use.

First we will need to install the Enigmail extension. Start Thunderbird and select the Tools menu and click on Add-ons. The Add on menu will appear and search for Enigmail. When found, click on Add to Thunderbird.

Thunderbird will warn you about potential malicious practices. Click on Install Now to continue. Thunderbird will do the installation and when finished ask you to restart Thunderbird. Click on Restart Thunderbird to continue.

Once restarted you will see you now have an OpenPGP menu in Thunderbird. But first we will enable your account to make use of the new features. Select the Tools menu and click on Account settings.

Select the OpenPGP security tab. Select the checkbox to Enable OpenPGP support for this identity. Tick the Use specific OpenPGP key and click on Select Key.

A window will appear that will allow you to select the key you want to use. Select the key and click on OK. You will now return to your Account settings window. Click Ok to close. Your account is now ready to be used. Return to the main window of Thunderbird. Click on Write to start composing a new message that you will encrypt.

Create your message as usual. Before sending your message click on the OpenPGP button in the menu. Select Sign Message and Encrypt Message. For more options such as attaching your public key you can also select the OpenPGP menu.

Nothing seems to have happened. But at the bottom you will see the sign and encrypt buttons are now active. You will be asked to enter your passphrase. When finished, click on OK. When you created your key, the importance of using the right email address was pointed out. Here you can see why this is. Enigmail will check the recipients' email address against the email addresses it has associated with the keys and use the corresponding keys.

Let's write another message but with an email address for the recipient different then the one he or she created their public key with. As before select the sign and encrypt. Since Enigmail doesn't know one of the recipients it will ask you to select the keys you want to use for the signing and encryption of the email. You can now select the key you want to use to encrypt the message. Press OK when finished.

Decrypting a received encrypted message. Select the message. You will see a lot of djibberish on the screen but Enigmail will pick up that this is actually an encrypted message and ask for your passphrase for decryption. Enter your passphrase and click on OK. Your message will now be decrypted.

The decrypted message. That is all there is to do to send and receive encrypted messages. If you want to send attachments to your contacts you can either send previously encrypted files or you can let Enigmail take care of this.

Write your email and attach the files you want to send as usual, select the encrypt option from the OpenPGP button in the menu and when you select send Enigmail will present you with the following options. Select the appropriate action and press Ok to send your message with the attachments encrypted.