PGP 5.5 Installation Manual

Page 1
PGP

Installation Guide

Page 2
Copyright © 1990-1998 Network Associates, Inc. and its Affiliated Companies. All Rights Reserved.
PGP*, Version 6.0.2 for Windows 95, 98, and NT, and Macintosh 11-98. Printed in the United States of America. PGP,Pretty Good,andPretty Good Privacyare registeredtrademarks of NetworkA ssociates,
Inc. and/or its Affiliated Comp anies in the US and other countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners.
Portions of this software may use public key algorithms described in U.S. Patent numbers 4,200,770, 4,218,582, 4,405,829, and 4,424,414, licensed exclusively by Public Key Partners; the IDEA(tm) cryptographic cipher described in U.S. patent num ber 5,214,703, licensed from Ascom Tech AG; and the Northern Telecom Ltd., CAST Encryption Algorithm, licensed from NorthernTelecom,Ltd. IDEAis a trademarkof AscomTech AG. NetworkAssociatesInc. may have patents and/or pending patent applications covering subject matter in this software or its documentation; the furnishing of this software or documentation does not give you any license to these patents. The compression code in PGP is by Mark Adler and Jean-Loup Gailly, used with permission fro m the free Info-ZIP implementation. LDAP software provided courtesyUniversity of Michigan at Ann Arbor, Copyright © 1992-1996 Regents of the University of Michigan. All rights reserved. This product includes software developed by the Apache Group for use in the Apache HTTP server project (http://www.apache.org/). Copyright©1995-1997 The ApacheGroup.Allrights reserved. See textfilesincluded with the softwareor the PGP web site for further information. This softwareis based in part on the work of the Independent JPEG Group. Soft TEMPEST font courtesy of Ross Anderson and Marcus Kuhn.
The software provided with this documentationis licensed to you for your individual use under the terms of the End User License Agreement and Limited Warranty provided with the software. The information in this document is subject to change without notice. Network Associates Inc. does not warrant that the information meets your requirements or that the information is free of errors. The information may include technical ina ccuracies or typographical errors. Changes may be made to the information and incorporated in new editions of this document, if and when made available by Network Associates I nc.
Export of this software and documentation may be subjectto compliance with the rules and regulations promulgated from time to time by the Bureau of Export Administration, United States Department of Commerce, which restrict the export and re-export of certain products and technical data.
Network Associates, Inc. (408) 988-3832 main 3965 Freedom Circle (408) 970-9727 fax Santa Clara, CA 95054 http://www.nai.com
info@nai.com
* is sometimes used instead of the ® for registered trademarks to protect marks registeredoutside of the U.S.
Page 3
LIMITED WARRANTY
Limited Warranty.
Network Associateswarrants that for sixty (60) days from the date of originalpurchasethemedia (forexample diskettes)on whichthe Softwareis containedwill be free from defects in m aterials and workmanship.
CustomerRemedies.
Network Associates' and its suppliers' entire liabilit y a nd your exclusive remedyshallbe, atNetworkAssociates' option, either(i)return of the purchaseprice paid for the license, if any, or (ii) replacement of the defe ctivemedia in which the Software is contained with a copy on nondefective media. You must return the defective media to Network Associates at your expense with a copy of your receipt. This limited warranty is void if the defect has resulted from accident, abuse, or m isapplication. Any replacement media will be warranted for the remainder of the original warranty period. Outside the United States, this remedyis notavailableto theextent NetworkAssociatesis subjectto restrictionsunder United States export control laws and regulations.
Warranty Disclaimer.
To themaximum extentper m itted by applicable law,andexceptfor the limited warranty set forth herein, THE SOFTWARE IS PROVIDED ON AN "AS IS" BASIS WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED . WITHOUT LIMITING THE FOREGOING PROVISIONS, YOU ASSUME RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOINGPROVISIONS, NETWORK ASSOCIATES MAKES NO WARRANTY THATTHESOFTWAREWILLBEERROR-FREEORFREEFROMINTERRUPTIONSOR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, NETWORK ASSOCIATES DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE ACCOMPANYING DOCUMENTATION. SOME STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPL IED WARRANTIES, SO THE ABOVE LIMITATION MA Y NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law.
Page 4
Page 5

Table of Contents

Chapter1. Introduction ........................................7
HowtoContactNetworkAssociates,Inc. .............................7
Customerservice .............................................7
Technicalsupport ............................................7
NetworkAssociatestraining ........................................8
Yourfeedbackiswelcome..........................................8
Relatedreading ...................................................9
Chapter2. InstallingPGP .....................................11
Systemrequirements .............................................11
Compatibilitywithotherversions...............................12
Upgradingfromapreviousversion.........................12
InstallingPGPVersion6.0forWindows95,98,andNT .................14
InstallingPGPVersion6.0forMacintosh.............................17
Index.......................................................19
Installation Guide v
Page 6
Table of Contents
vi PGP
Page 7

1Introduction

Welcome to PGP software! This Quick Start guide provides genera l information about PGP and describes the system requirements and installation instructions necessary to successfullyrun it.

How to Contact Network Associates, Inc.

Customer service

To order products or obtain product information, contact the Network Associates Customer Care department.
You can contact Customer Care at one of the following numbers Monday through Friday between 6:00
Phone (408) 988-3832
Or write to:
Network Associates, Inc. 3965 Freedom Circle Santa Clara, CA 95054 U.S.A.
A.M. and 6:00 P.M. Pacific time.
1

Technical support

Network Associatesis famous for its dedicationto customer satisfaction. We have continued this tradition by making our site on the World Wide Web a valuable resource for answers to technical support issues. We encourage you to make this your first stop for answers to frequently asked questions, for updatesto NetworkAssociatessoftware,andfor accessto NetworkAssociates news and encryption information
World Wide W eb http://www.nai.com
Technical Support for your PGP product is also available through these channels:
Phone Email PGPSupport@pgp.com
.
(408) 988-3832
Installation Guide 7
Page 8
Introduction
To provide the answers you need quickly and efficiently, the Network Associates technical support staff needs some information about your computer and your so ftware. Please have this information ready before you call:
•PGPproductname
• PGP product version
• Computer platform and C PU type
• Amount of available memory (RAM)
• Operating system and version and type of network
• Contentofanystatusor error message displayed on screen orappearingin a log file (not all products produc e log files)
• Email application and version (if the prob lem involve s using PGP with an email product, for example, the Eudora plug-in)

Network Associates training

For informationaboutschedulingon-site training foranyNetworkAssociates product, call (800) 338-8754.

Your feedback is welcome

We continually enhancePGPproductsandwelcomecustomerfeedback as we design new versions. We appreciate your interestin PGP products and your thoughts on product content and functionality . Feedback like yours helps us to develop richer and easier- to- use software and services. While we cannot incorporate all suggestions, we will give your input serious conside ration as we develop future products.
8PGP
Page 9

Relate d read i ng

Here are some documents that you may find helpful in understanding cryptography:
Non-Technica l and beginning technica l books
•“Cryptography for the Internet,” by Philip R. Zimmermann. Sc ientific American, October 1998. This article,writtenby PGP’s creator,is a tutorial onvariouscryptographic protocolsand algorithms, manyofwhich happen to be used by PGP.
•“Privacy on the Line,” by Whitfield Diffie and Susan Eva Landau. MIT Press; ISBN: 0262041677. This book is a discussion of the history and policy surrounding cryptography and communications security. It is an excellent read, even for beginners and non-technical people, and contains information that even a lo t of experts don't know.
•“TheCodebreakers,”by David Kahn. Scribner;ISBN: 0684831309. This book is a history of codes and code breakers from the time of the Egyptians to the end of WWII. Kah n first wrote it in the sixties, and published a revised edition in 1996. This book won't teach you anything about how cryptography is accomplished, but it has been the inspirationof the whole modern generation of cryptographers.
Introduction
“Network Security: Private Communi cation in a Public World,” by Charlie Kaufman, Radia Perlman, a nd Mike Spencer. Pr entice Hall; ISBN : 0-13-061466-1. This is a good description of network security systems and protocols, including descriptions of what works, what doesn't work, and why. Published in 1995, it doesn't have many of the lat est technological advances, but is still a good book. It also contains one of the most clear descriptions of how DES works of any book written.
Intermediatebooks
“AppliedCryptography: Protocols, Algorithms, andSourceCodein C,”byBruce Schneier.John Wiley &Sons;ISBN: 0-471-12845-7.Thisis a good beginning technical book on howalotofcryptographyworks. Ifyouwantto become an expert, this is the place to start.
•“Handbook of Applied Cryptography,”byAlfredJ.Menezes,PaulC.van Oorschot, and Scott Vanstone. CRC Press; ISBN: 0-8493-8523-7. This is the technicalbook you should read after Schneier’s book. There is a lot of heavy-dutymath in thisbook, but it is nonethelessusable for thosewhod o not u nderstand the math.
Installation Guide 9
Page 10
Introduction
•“Internet Cryptography,” by Richard E. Smith. Addison-Wesley Pub Co; ISBN: 0201924803. This book describes how many Internet security protocols work. Most importantly,it describes how systems that are designed well nonetheless end up with flaws through careless operation. This book is light on math, and heavy on practical information.
•“Firewalls and Internet Security: Repelling the Wily Hacker,” by William R. Cheswickand Steven M. Bellovin. Addison-Wesley Pub Co; ISBN:
0201633574. This book is written by two senior researchers at AT&T Bell Labs and is about their experiences maintaining and redesigning AT &T's Internet connection. Very readable.
Advanced books
•“A Course in Number Theory and Cryptography,” by Neal K oblitz. Springer-Verlag; ISBN: 0-387-94293-9. An excellent graduate-level mathematics textbook on number theory and cryptography.
•“DifferentialCryptanalysisofthe Data EncryptionStandard,” byEliBiham and Adi Shamir. Springer-Verlag;ISBN: 0-387-97930-1. This book describesthe technique of differential cryptanalys is as applied to DES. It is an excellent book for learning about this technique.
10 PGP
Page 11

2Installing PGP

This chapter describes how to ins tall PGP for Windows and PGP for Macintosh software. Before you begin installing PGP , however, be sure to review the system r equirements outlined below.

System requirements

To install PGP on a Windows 95, 98, or NT system, you must have:
Windows 95, 98, or N T
•16MBRAM
• 15MBharddiskspace
To install PGP on a Macintosh system, you must have:
Macintosh IIci or later model with 68030 or higher
System software 7.5.5 or later
•8MBRAM
2
• 10MBharddiskspace
68K Macs must be running Apple’s CFM 68K 4.0 o r higher. The PGP installer installs this if necessary.
Installation Guide 11
Page 12
Installing PGP

Compatibil ity with other versions

PGP has gone through many revisions since it was released by Phil Zimmermann as a freeware product in 1991. Although this version of PGP represents a significant rewrite of the original program and incorporates a completely new user interface, it has been designed to be compatible with earlier versions o f PGP. This means that you can exchange secure email with people who are still using these older versions of the product:
PGP 2.6 (Distributed by MIT)
PGP 2.7.1 for the Macintosh (Released by ViaCrypt)
PGP 4.0 (Released by ViaCrypt)
PGP 4.5 (Released by PGP, Inc.)
PGP fo r Personal Privacy, Version 5.0 - 5.5
PGP for Business Security or PGP for Email and Files Version 5.5
NOTE:PGPproducts Version5.0andlater may requiretheRSA add-on for backward compatibility.
Upgrading from a previous version
If you are upgrading from a previous version of PG P (from PGP, Inc., Network Associates,Inc. or ViaCrypt), you may want to remove the old program file s before installing PGP to f ree up some disk space. However, you shouldbe carefulnottodeletetheprivateand publickeyring filesusedtostore any keys you have created or collected while using the previous version. When you install PGP, you are given the option of retaining your existing privateandpublickeyrings,soyoudon’thavetogotothetroubleof importing all of your old keys. To upgrade from a previous version, follow the appropriate steps listed next.
To upgrade from PGP Version 2.6.2 or 2.7.1
1. Exit all programs or open applications.
2. Make backups of your old PGP keyrings on another volume. In PGP for Windows versions 2.6.2 and 2.7.1, your public keys are stored in the file titled “pubring.pgp” and your private keys are stored in the file titled “secring.pgp”.In versions 5.x - 6.0, your public keys are stored in the file titled “pubring.pkr” and your private keys are stored in the file titled“secring.skr”.
12 PGP
Page 13
Installing PGP
TIP: Maketwoseparatebackupsofyourkeyringsontotwo different floppydisks justtobesafe.Be especially careful not to lose your pr ivate keyring; ot herwise you will never be able to decrypt anyemailmessagesorfile attachmentsencryptedwiththe lostkeys. Store the keyrings in a secure place where only you have access to them.
3. When you have successfully backed u p your old keyrings, remove or archive the (old) PGP software. You have two options here:
Manually delete the entire old PGP folder and all of its contents; or
Manually delete the old PGP program and archive the remaining
files, especially the configuration and keyring files.
NOTE: If you obtain a copy of the patched PGP 2.6.4 version, your old software will be able to read the RSA keys on the new 6.0 keyrings and will not fail when it encounters the new Diffie-Hellman/DSS format ke ys. You ca n download this patch from the Network Associates Website.
4. Install PGP Version 6.0 using the provided Installer.
5. Restart your computer.
To upgrade from PGP Version 4.x or 5.x
If you are upgrading from PGP Version 4.x or 5.x, follow the installation instructio ns outlined in “To install PGP forWindows” on page 14 or “To
install PGP for Macintosh” on page 17.
Installation Guide 13
Page 14
Installing PGP

Installing PGP Version 6.0 for Windows 95, 98, and NT

You can install the PGP software froma CD-ROM or from your company file server. The self-extracting file, SETUP.EXE, automatically extracts and steps you through the installation. After you install the software,you can create your p riv a te and public key pair an d begin using PGP. Refer to the PGPWinUsersGuide.pdf f ile include d with the program for instructions on PGP.
To install PGP for Windows, start your computer and carefully follow the steps outlined below.
To install PGP for Windows
1. Exit all programs currently running on your computer.
2. To install from a CD-ROM, insert it into the CD-ROM drive. The Setup program automatically starts. If, however, the Setup program
does not initiate, double-click SETUP.EXE in the PGP product folder on the CD-ROM.
14 PGP
To install from your company file serv er, contact your security officer for information about the server from which to download PGP. Log on to the server.
Double-click SETUP.EXE in the PGP product folder to start the Setup program.
The PGP Installation screen appears.
3. Review the instructionsinthe PGP Welcomedialogbox, then click Next. The Network Associates license agreement appears.
Page 15
Installing PGP
4. Review the license agreement in formation, then click Yes to accept the licensing terms.
The Setup program searches for o pen programs and prompts you to close them.
If you have PGP version 4.x or 5.x cur rently installe d, the PGP setup program prompts you to uninstall the old PGP files. Click Yes to automatically uninstall the old version.
5. Register your product by entering your name and company name in the User Information dialog box.
6. Click N ext.
7. Click Browse to navigate to a destination directory for your PGP files, then click Next.
The Select Components dialog box appears, as shown in Figure 2-1.
Figure 2-1. PGP for Windows Select Components dialog box
Installation Guide 15
Page 16
Installing PGP
8. Clear the components that you do not want to install. By default, each option is selected. Your installation options are:
PGP 6.0 Program Files (required). To installthePGP program, this
option must be selected.
PGP 6.0 Eudora Plugin. Select this option if you want to integrate
PGP functionality with your Qualcomm Eudora email program. PGP 6.0 supports Eudora versions 3.05 and l ater.
PGP 6.0 MicrosoftExchange/Outlook Plugin. Select this option if
you want to integrate PGP functionality with your Microsoft Exchange/Outlook email program. PGP 6.0 supports Outlook 97 and 98.
PGP 6.0 MicrosoftOutlookExpressPlugin.Select this option if you
want to integrate PGP functionality with your M icrosoft Outlook Express email program. PGP 6.0 supports the version that is included with Internet Explorer v ersions 4.01 and later.
PGP 6.0 User’s Manual(Adobe Acrobatformat).Select this option
to install the P GP User’s Guide.
PGPdiskforWindows 95 and NT. Select this option to install the
PGPdisk program. PGPdisk is an easy-to-use encryption application that enables you to s et aside an area of disk space for storing your sensitive data.
16 PGP
9. Click Next. The Check Setup In formation dialog box appears.
10. Review the installation settings,then click Next. The PGP files are copied to the computer.
11. If you have keyrings on your computer from a previous version of PGP, click Yes to use your existing keyrings.
A br o wse dialog box appears. Browse to locate your public keyring, Pubring.pkr, and your private keyring, Secring.skr.
12. Select “Yes, I want to view the Readme file”, then click Finish to complete the installation.
13. To launch PGPkeys immediately after the installation,select “Yes, I want to run PGPkeys.”
14. Click Finish to complete the PGP installation.
Page 17

Installing PGP Version 6.0 for Macintosh

You can install the PGP software froma CD-ROM or from your company file server. The Installer program ( ) automatically extracts and steps you through the installation. After you install the software, you can create your private and public key pair and begin using PGP. Refer to the PGPMacUsersGuide.pdf file included with the p rogram for instructions on using PGP.
To install PGP for Macintosh, ca refully follow the steps outlined below.
To install PGP for Macintosh
1. Q u it all applicat ions running on your computer.
2. To install from a CD-ROM, insert it into the CD-ROM drive. To install from your company file serv er, contact your security officer
for information about the server from which to download PGP. Log on to the server.
3. Double-click the installation icon ( ) to start the Installer program.
Installing PGP
The PGP Installation screen appears.
4. Click C ontinue. The Network Associates license agreement appears.
5. Review the license agreement information, then click Accept to continue the installation.
The PGP Release Notes appear.
6. Review the releasenotes for known issues and export restrictions, then click Continue.
Installation Guide 17
Page 18
Installing PGP
The installation screen appears, as shown in Figure 2-2.
Figure 2-2. PGP for Mac in tosh Installation screen
7. Se lect a type of installation:
•EasyInstall.Choose E asy Install to perform a full installation of
PGP.
Custom Install.Choose Custom Install to install PGP with
user-definable options. You are prompted to choose the components that you want to install.
18 PGP
Uninstall. Choose Uninstall to remove all PGP program
components from the system.
8. Se lect a location for your PGP f iles, then click Install. A w arning screen appears advising you to close all open applications.
9. Close open applications, then click Continue. The PGP files are copied to the computer.
10. Click Restart to reboot the computer. The computer restarts. PGP is now installed on the computer.
Page 19

Index

C
compatibility
versions of PGP 12
Customer Care
contacting 7
F
feedbackto Network Associates8
I
installing
PGP 11 PGPdisk
for windows 16
M
Macintosh
system requirements 11
N
Network Associates
contacting
Customer Care 7
training8
Network Associates feedback 8
P
PGP
compatibility 12 installing 11 Macintosh 17 platforms supported 11 system requirements 11 upgrading from a pre vio us versio n 12 upgrading from Network Associates 12
upgrading from ViaCrypt 12 versions of, compatible 12 Windows 95, 98 & NT 14
PGPdisk
for Windows 16
R
related
reading 9
S
setup.exe
installing PGP 14
system requirements
for PGP 11
T
Technical 7 technical support
e-mail address 7 information needed from user 8 online 7
training for N et work Associates products 8
scheduling 8
U
upgrading
from ViaCrypt 12
V
ViaCrypt
upgrading from 12
Installation Guide 19
Loading...