* What's this?
-EasyPG is yet another GnuPG interface for Emacs. It consists of three
-parts: transparent file encryption utility, Gnus/PGG backend, and
-elisp library to interact with GnuPG.
+EasyPG is an all-in-one GnuPG interface for Emacs. It has two
+aspects: convenient tools which allow to use GnuPG from Emacs (EasyPG
+Assistant), and a fully functional interface library to GnuPG (EasyPG
+Library).
-* Requirements
+* Features
-** GNU Emacs 21.4 or later
+The EasyPG Assistant provides the following features:
-** XEmacs 21.4 or later
+- Keyring browser.
+- Cryptographic operations on regions.
+- Cryptographic operations on files.
+- Dired integration.
+- Encryption/decryption of *.gpg files.
-** GnuPG 1.4.3 or later
+The EasyPG Library provides the following features:
+
+- The API covers most functions of GnuPG like GPGME.
+- S/MIME support using gpgsm.
+- Designed to avoid potential security pitfalls around Emacs
+
+* Requirements
-** Gnus 5.10.8 or later (optional)
+** GNU Emacs 21.4, XEmacs 21.4, or later
+
+** GnuPG 1.4.3 or later
+ Earlier versions are supported but not recommended.
* Quick start
** Installation
-$ ./configure
-$ sudo make install
+ $ ./configure
+ $ sudo make install
+
+Add the following line to your ~/.emacs
+
+ (require 'epa-setup)
+
+Restart emacs and type `M-x epa- TAB', and you will see a lot of
+commands available. For example,
+
+- To browse your keyring, type `M-x epa-list-keys'
+- To create a cleartext signature of the region, type `M-x epa-sign-region'
+
+You can also do some cryptographic operations from dired.
+
+ M-x dired
+ (mark some files)
+ : e (or M-x epa-dired-do-encrypt)
+ (select recipients by 'm' and click [OK])
+
+* MUA Integration
+
+The EasyPG Library can be used in combination with various MUA (Mail
+User Agents).
+
+** CVS version of Gnus
+
+CVS version of Gnus uses EasyPG by default. To make sure of that,
+check mml2015-use set to 'epg. Other options which affect on the
+EasyPG are
-** Transparent file encryption utility
+ mml2015-signers
+ mml2015-encrypt-to-self
+ mml2015-cache-passphrase
+ mml2015-passphrase-cache-expiry
+ mml2015-verbose
-EasyPG provides transparent file encryption utility similar to
-crypt++, alpaca.el, hedgehog. To try this, add the following line to
-your ~/.emacs and C-x C-f ~/test.txt.gpg.
+NOTE: You don't need pgg-epg.el in this case.
-(require 'epf)
+** PGG based MUA
-** Gnus/PGG backend
+PGG is outdated PGP library used by old Gnus (<= v5.11), MH-E, etc.
-EasyPG provides an implementation of the backend interface of
-Gnus/PGG. To use EasyPG instead of pgg-gpg, install pgg-epg.el and
-add the following line to your ~/.gnus.
+There is a PGG backend written using EasyPG called pgg-epg.el.
+However, EasyPG API is a superset of PGG and pgg-epg.el provides
+nothing but compatibility with PGG.
-(setq pgg-scheme 'epg)
+*** Limitations of PGG
-* Advantages over other competitors
+As I noted "PGG is outdated PGP library" above, PGG has several
+limitations. For example
-There are many competitors of EasyPG such as Mailcrypt, Gnus/PGG,
-gpg.el, etc. EasyPG has some advantages over them.
+- PGG can't handle a message signed with multiple keys.
+- PGG can't prompt a user which key is being used.
+- PGG can't create a binary PGP messages.
+- PGG doesn't provide a way to select keys per cryptographic operation.
+- PGG ignores GnuPG's trust metrics.
-** EasyPG avoides potential security flaws of Emacs
+** SEMI based MUA
-See "Security consideration" section.
+SEMI is the MIME library used by Wanderlust, cmail, T-gnus, etc.
-** GnuPG features are directly accessible from Emacs
+There is an EasyPG capable SEMI library called EMIKO-EasyPG. It can
+be downloaded from the same site of the EasyPG distribution point.
-Other competitors provide only specific features of GnuPG since they
-still support PGP 2.*, 5.*, 6.*. As the name indicates, EasyPG is
-inspired by GPGME (GnuPG Made Easy), and the library interface is
-close to GPGME. With EasyPG you can benefit from a lot of features of
-GnuPG.
+* Security
-* Security consideration
+There are security pitfalls around Emacs. EasyPG is written with
+avoiding them.
-** `call-process-region' writes data in region to a temporary file
+** Passphrase may leak to a temporary file.
-`call-process-region' writes data in region to a temporary file.
-EasyPG does *not* use `call-process-region' to communicate with a gpg
-subprocess.
+The function call-process-region writes data in region to a temporary
+file. If your PGP library used this function, your passphrases would
+leak to the filesystem.
-** `(fillarray string 0)' is not enough to clear passphrases
+The EasyPG Library does not use call-process-region to communicate
+with a gpg subprocess.
-If Emacs crashed and dumps core, passphrase strings in memory are also
-dumped within the core file. `read-passwd' function clears passphrase
-strings by `(fillarray string 0)'. However, Emacs performs compaction
-in gc_sweep phase. If GC happens before `fillarray', passphrase
-strings may be moved elsewhere in memory.
+** Passphrase may be stolen from a core file.
-Fortunately, there is gpg-agent to cache passphrases in more secure
-way, so EasyPG dares *not* to cache passphrase. Elisp programs can
-set `epg-context-passphrase-callback' to cache user's passphrases.
+If Emacs crashes and dumps core, Lisp strings in memory are also
+dumped within the core file. read-passwd function clears passphrase
+strings by (fillarray string 0) to avoid this risk. However, Emacs
+performs compaction in gc_sweep phase. If GC happens before fillarray,
+passphrase strings may be moved elsewhere in memory. Therefore,
+passphrase caching in elisp is generally a bad idea.
+The EasyPG Library dares to disable passphrase caching. Fortunately,
+there is more secure way to cache passphrases - use gpg-agent.