PGP*, V ersion 6.5.1
6-99. Printed i n the United States of America.
TRADEMARK ATTRIBUTIONS
* ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, Compass 7,
CNX, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr
Solomon’s, Enterprise Secure Cast, First Aid , ForceField, Gauntlet, GMT, Hunter, ISDN Tel/ Scope,
LM 1, LANGuru, Leading Help Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic
University, MagicWin, MagicWord, McAfee Associates, McAfee, MoneyMagic, M ore Power To You,
Multimedia Cloaking, NetCrypto, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools,
NetOctopus, NetStalker, Network Associates, Netw ork General, Network Uptime!, NetXRay, Nuts &
Bolts, PC Medic, PCNotary, PGP, PGP (PrettyGood Privacy), PocketScope, PowerTelnet, Pretty Good
Privacy, PrimeSupport, RecoverKey, RecoverKey -International, ReportMagic, RingFence, Router PM,
Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer,
SniffMaster, SniffNet, Stalker, Statistical Information Re trieval (SIR), Sup portMagic, T-POD,
TeleSniffer, TIS, TM ach, TMeg , Trusted Mach, Trusted Mail, Total Network Visibility, Total Virus
Defense, Uninstaller, Virex, Virex-PC , Virus Fo rum, ViruScan, VirusScan, VShield, WebScan,
WebShield, WebSniffer, WebStalker WebWall, and ZAC 2000 are registered trademarks of
Network A ssociates and/or its affiliates in the US and/or other countries. A ll other registered
and unregistered trademarks inthis document are the sole property of their respective owners.
LIMITED WARRANTY
Limited Warranty. Network A ssociates warrants that for sixty (60) days from the date of
original purchasethe media (forexamp le diskettes) on which the Software is contained will be
free from defects in materials and workmanship.
Customer Remedies. Network Associates' a nd its su ppliers'entire liabilityand your exclu sive
remedy shall be, at Network Associates'option, either (i) return of the purchase price paid for
the license, if any, or (ii)replacement of the defectivemedia in which the Software is contained
with a copy on nondefective media. You must return the defective media to Network
Associates at your expense with a copy of your receipt. This limited warranty is void if the
defect has resulted from accident, abuse, or misapplication. Any replacement media will be
warranted for the r emainder of the original warranty period. Outside the United States, this
remedyis not availableto the extentNetworkAssociatesis subjectto restrictionsunder United
States export c ontrol laws and regulations.
Warranty Disclaimer. To the maximum extent permitted by applicable law, and except fo r the
limited warranty set forth herein, THE SOFTWARE IS PROVIDED ON AN "AS IS" BASIS
WITHOUT WARRANTYOF ANY KIND, EXPRESS OR IMPL IED. W ITHOUTLIMITING THE
FOREGOING PROVISIONS, YOU ASSUME RESPONSIBILITY FOR SELECTING THE
SOFTWARE TO ACHIEVE YOUR INTENDED RES ULTS, AND FOR THE INSTALLATION
OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. W ITHOUT LIMITING
THE FOREGOING PROVISIONS, NETWORK ASSOCIATES MAKES NO WARRANTY
THATTHESOFTWAREWILLBEERROR-FREEORFREEFROMINTERRUPTIONSOR
OTHER FAILURES OR T HAT THE SOFTWARE W ILL MEET YOUR REQUIREMENTS. T O
THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, NETWORKASSOCIATES
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULARPURPOSE, AND NONINFRINGEMENTWITH RESPECT TO THE
SOFTWARE AND THE ACCOMPANYING DOCUMENTATION. SOME STATES AND
JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THE
ABOVE LIMITATION MAY NOT APPLY TO YOU. The foregoing provis ions shall be
enforceable to the maximum extent permitted by applicable law.
LICENSE AGREEMENT
NOTICE TO ALL USERS: FOR THE SPECIFIC TERMS OF YOUR LICENSE TO USE THE
SOFTWARE THAT THIS DOCUMENTATION DESCRIBES, CONSULT THE README.1ST,
LICENSE.TXT, OR OTHER LICENSE DOCUMENT THAT ACCOMPANIES YOUR
SOFTWARE,EITHER AS A TEXT FILE OR AS PART OF THE SOFTWARE PACKAGING. IF
YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH THEREIN, DO NOT INSTALL
THE SOFTWARE.IF APPLIC ABLE,YOU MAYRETURN THE PRODUCT TO THEPLACE OF
PURCHASE FOR A FULL REFUND.
Export of this software and documentation may be subject to compliance with the rules and regulations
promulgated fromtime to time by the Bureau of Export Administration, United States Department of
Commerce, which restrict the export and re-export of certain products and technical data.
Network Associates, Inc.(408) 988-3832 main
3965 Freedom C ircle
Santa Clara, CA 95054
http://www.nai.com
info@nai.com
* is sometimes used instead of the ® for registered trademarks to protect marks registered outside of the
Decrypting a message and vi ewing plaintext output on your screen . 26
Decrypting a message and renaming the plain text filenam e output . . 26
Decrypting a message and recovering the origi nal plaintext
This Guide is divided into the following chapters:
• Chapter 1, “Introducing PGP” This chapter provides an introduction to
using PGP Command Line software.
• Chapter 2, “Getting Started” This chapter describes how to start and stop
PGP, how to make and exchange keys, and how to perform common PGP
functions f rom the command line.
• Chapter 3, “Advanced Topics” This chapter describes how to use PGP
non-interactively from UNIX shell scripts and MSDOS batch files, how to
use PGP as a UNIX-style filter, and how to encrypt and transmit binary
data.
• Chapter 4, “PGP’s ConfigurationFile” This chapter introduces you to
PGP’s configuration file a nd the configuration parameters in that f ile .
Conventions used in this Guide
The following describes the conventions used in this guide:
BoldMenus, fields, options , and bu ttonsare in bold
typeface. An example follows:
Select the Clear option from the Editmenu.
Sans-serif
font
Keystrokes
Variables
Pathnames, filenames, icon names, screen text,
and special keys on the key board are s how n in
a sans-serif font.
Keystrokesthat you enter are shown in bold
sans-serif type.
Command-linetextforwhichyoumustsupply
a value is shown in italic sans-serif type.
User Guideix
Preface
How to contact Network Associates
Customer service
To order products or obtain product information, contact the Network
Associates C ustomer Care department at (408) 988-3832 or write to the
following address:
Network Associates,Inc.
McCandless Towers
3965 Freedom Circle
Santa Clara, CA 95054-1203
U.S.A.
Technical sup port
Network Associates is famous for its dedicationto customer satisfaction. We
have continued this t radition by making our site on the World Wide Web a
valuable resource for answers to t echnical support issues. We encourage you
to make this your first stop for answers to frequently asked questions, for
updatestoNetworkAssociatessoftware,andforaccessto NetworkAssociates
news and encryption information
.
World Wide Webhttp://www.nai.com
Technical Support for your PGP product is also available thr ough these
channels:
Phone
EmailPGPSupport@pgp.com
To provide the answers you need quickly and efficiently, the Network
Associates technical support staff needs some informationabout your
computer and your s o ftware. Please have this information ready befo re you
call:
If the automatedservices do not havethe answers you need, contactNetwork
Associates at one of the following numbers Monday through Friday between
6:00
A.M. and 6:00 P.M. Pacifictime.
Phone(408) 988-3832
xPGP CommandLine
(408) 988-3832
To provide the answers you need quickly and efficiently, the Network
Associates technical support staff needs some informationabout your
computer and your s o ftware. Please have this information ready befo re you
call:
• Product name and version number
• Computer brand and model
• Any additional hardware or peripherals connected to your computer
• Operating system type and version numbers
• Network type and version, if applicable
• Content of any status or error message displayed on screen, or appearing
in a log file (not all products produce log files)
• Email application and version (if theproblem involves using PGP with an
email product, for example, the E udora plug-in)
• Specific s teps to reproduce the problem
Year 2000 Compliance
Preface
InformationregardingNAI productsthat areYear 2000 compliant and its Year
2000 standards and testing models m ay be obtained from NAI’s website at
http://www.nai.com/y2k
. For further information, email y2k@nai.com.
Network Associates training
For informationabout schedulingon-sitetrainingfor any NetworkAssociates
product, call (800) 338-8754.
Comments and feedback
Network A ssociates appreciates your comments and feedback, but incurs no
obligation to you for information you submit. Please address your comments
about PGP product documentation to: Network Associates, Inc., 3965
Freedom Circle Santa Clara, CA 95054-1203 U.S.A.. You can also e-mail
comments to tns_documentation@nai.com.
User Guidexi
Preface
Recommended Readings
Non-Technica l and beginning technicalbooks
• Whitfield Diffie and Susan Eva Landau, “Privacy on the Line,” MIT Press;
ISBN: 0262041677
This book is a discussion of the history and policy surrounding
cryptography and communications security.It is an excellent read, even for
beginners and n on -technical people, but with information that even a lot o f
experts don't know.
• David Kahn, “The Codebreakers” Scribn er; ISBN: 0684831309
This book is a history of codes and code breakers from the time of the
Egyptians to the endofWWII. Kahn firstwrote it in the sixties, and there is
a revised edition published i n 1996. This book won't teach you anything
about how cryptography is done, but it has been the inspiration of the
whole modern generation of cryptographers.
• Charlie Kaufman, Radia Perlman, and Mike Spencer, “Network Security:
Private Communica tion in a Public World,” Prentice H all; ISBN:
0-13-061466-1
This is a good description of network security systems and protocols,
includingdescriptionsofwhatworks,whatdoesn'twork,andwhy.
Published in 1995, so itdoesn't have many of the latest advances, b ut is still
a g ood book. It also contains one of the most clear descriptionsof how DES
works of any book written.
Intermediatebooks
• Bruce Schneier, “Applied Cryptography: P rotocols, Algorithms, and
SourceCode in C,” John Wiley & S ons ; ISBN: 0-471-12845-7
This is a good beginning technical book on how a lot of cryptography
works. If you want to become an expert, this is the place to start.
• Alfred J. Menezes, Paul C. van O orschot, and Scott Vanstone,
“Handbook of Applied Cryptography,” CRC Press; ISBN: 0-8493-8523-7
This is the technical book you should get after Schneier. There is a lot of
heavy-dutymathin this book, but it is nonethelessusable for those who do
not understand the math.
• Richard E. Smith,“InternetCryptography,” Addison-Wesley Pu b Co;
ISBN: 020192480
This book describes how many Internetsecurity protocols. M ost
importantly, it describes how systems that are designed well nonetheless
end up with flaws through careless operation. This book is light on math,
and heavy on practical information.
xiiPGP Command Line
• William R. Cheswick and Steven M. Bellovin, “Firewalls and Internet
Security: Repelling the Wily Hacker” Addison-Wesley Pub Co;
ISBN: 0201633574
This book is written by two senior researcher at AT&T Bell Labs, about
their experiences maintaining and redesigning AT&T's Internet
connection. Very readable.
Advanced books
•Neal Koblitz, “A Course in Number Theory and Cryptography”
Springer-Verlag; ISBN: 0-387-94293-9
An excellent graduate-level mathematics textbook on number theory and
cryptography.
• Eli Biham and Adi Shamir, “Differential Cryptanalysis of the Data
Encryption Standard,” Springer-Verlag; ISBN: 0-387-97930-1
This book describes the techniqueof differential cryptanalysisas applied to
DES. It is an excellent book for le arning about this technique.
Preface
User Guidexiii
Preface
xivPGPCommand Line
1Introducing PGP
Welcome to PGP. With PGP, you can easily and securely protect the privacy
of yourdata by encryptingit so that onlyintended individualscan rea d it.You
can also digitally sign information, which ensures it’s authenticity.
Using PGP
This command line version of PGP is designed for two broad types of
applications: transferring information securely between batch servers and
integration into automated processes.
• A fina ncialinstitution can usePGP to securely tr ansferfiles from one office
to another. Files are encrypted to the receiving server’s key and ftp to a
directory on a remote server. The remote server periodically examines its
receiving directory. When the remote server identifies newly transferred
files, it decr ypts the files a nd sends them to their final destination.
• UNIX and Windows develop ers can use this product to secure financial
transactions that users make on the internet. For example, if you sell
products o n your website, you c an include PGP in your scripts to
automatically encrypt a customer’s order and credit card information for
storage or transfer to a secure machine.
1
The term MSDOS batch files refers to a W indows NT commandprompt. The
term MSDOS means the command prompt window that exists in Windows
NT.
A quick overview
PGP is based on a widely accepted encryption technology known as public key
cryptography in which two complementary keys, called a key pair,areusedto
maintain secure communications. One of the keys is d esignated as a private k ey
to which only you have access and the other is a public k ey w hich you freely
exchange with other PGP users. Both your private and your public keys are
stored in keyring files.
For a comprehensive overview of PGP encryption technology, refer to “AnIntroduction to Cryptography,” which is included with the product.
User Guide1
Introducing PGP
Basic steps for using PGP
This section takes a quick look at the procedures you normally follow in the
course of using P GP . For details concerning any of these procedures, refer to
the appropriate chapters in this book.
1. Install PGP on your computer. Refer to the documentation included with
PGP for complete installation instructions.
2. Create a private and public key pair.
Before you c a n begin using PGP, you need to generate a key pair. A PGP
key pair is composed of a private key to which only you have access and a
public key that y ou can copy and make freely available to everyone with
whom you exchange information.
You can create a new key pa ir any time after you have finished the PGP
installation procedure.
For more information about creating a private and public ke y pair, referto
“Making a key pair” on page 8
3. Exchange public keys with others.
Afteryou have createda key pair, youcan begin correspondingwith other
PGP u sers. You will need a copy of their public key and they will need
yours. Your public key is j ust a block of text, so it’s quiteeasy to trade keys
with someone. You can include your publickey in an emailmessage, copy
it to a file, or post it on a public or corporate key server where anyone can
get a copy when they need it.
For more informationabout exchanging public keys, refer to and “Making
and Exchanging Keys”on page 7 and “Distributing your public key” on
page 11.
4. V alidate public keys.
Once you have a copy of someone’s public key, you can add it to your
public keyring. You should then check to m ake sure that the key has not
been tampered with and that it really belongs to t he purpo rted owner. You
do this by comparing the unique fingerprint on your copy of someone’s
public key to the fingerprint on that person’s original key.
Youcan also ac cept a key as valid based onthe presence o f a signaturefrom
a trusted introducer. PGP users often have other trusted users sign their
public keys to further attest to their authenticity. For instance, you might
send a trusted colleaguea copyof your publickey with a request that h e or
she certify and return it so you can include the signature when you post
your key on a public key server. Using PGP, when someone gets a copy of
yourpublickey,theydon’thaveto check thekey’sauthenticitythemselves,
2PGPCommand Line
Introducing PGP
but can instead rely on how well they trust the person(s) who signed your
key. PGP provides themea ns for estab lishing thislevel of validityfor each
of t he public keys you add to you r public keyring. This means that when
you get a key from someone whose key is signed by a trusted introducer,
you can be fairly sure that the key belongs to the purported user.
Your Security Officer c an act as a trusted introducer, and you may then
trust any keys signed by the corporate key to be valid keys. If you wo rk for
a large company with several locations, you may have regional
introducers, and your Security Officer may be a meta-introducer, or a
trusted introducer of trusted introducers.
When you are sur e that you have a valid public key, you sign it to indicate
that you feel the key is safe to use. In addition, you can grant the owner of
the key a level of trust indicating how much confidence you have in that
person to vouch for the authenticity of someone else’s p ublic key.
5. Encrypt and sign your email and files .
After you have generated your key pair and have exchang ed public keys,
you can begin encrypting and signing email messages and files.
6. Dec rypt and verify your email and files.
When someone sends you encrypted data, you can decrypt the contents
and verify any appended signature to make sure that the data originated
with the alleged sender and that it has not been altered.
7. Wipe files.
When you need to permanently delete a file, you can use the wipe
command to ensure that the file is unrecoverable. The file is immediately
overwritten so that it cannot be retrieved using disk recovery software.
User Guide3
Introducing PGP
4PGPCommand Line
2Getting Started
This chapter covers the following topics:
• Starting and quitting PGP
• Making and exchanging k ey pairs
• Perfor ming common PGP functions from the command line
• Viewing PGP’s online User Guide
Starting PGP
To start PGP, enter the following at the command line:
pgp
You can perform all PGP functions from the command line.
Location of PGP files
In UNIX:
2
The first time you start PGP, the software checks to see if the environment
variable PGPPATH is defined. If PGPPATH is defined, the s oftware puts t he
PGP preferences file, keyring files, pgp.cfg, and the randseed file in the
%PGPPATH% directory.
If PGPPATH is not defined, the software checks to see if the environment
variable USERPROFILE is defined. If USERPROFILE is d efined, the software
puts the files in the %USERPROFILE%\Application Data\pgp directory.
If USERPROFILE is not defined,the softwareputs the files in
%SYSTEMROOT%\pgp.
In Windows NT:
The first time you start PGP, the software checks to see if the environment
variable PGPPATH is defined. If PGPPATH is defined, the s oftware puts t he
pgp.cfg in the %P GP PATH% directory.
If PGPPATH is not defined, the software checks to see if the environment
variable USERPROFILE is defined. If USERPROFILE is d efined, the software
puts the pgp.cfg f ile in the %USERPROFILE%\Application Data\pgp
directory.
User Guide5
Loading...
+ 44 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.