PGP Command Line - Freeware User’s · PDF filePGP Command Line - Freeware User’s Guide ... * Network Associates, PGP, ... This is a good description of network security systems

Embed Size (px)

Citation preview

  • PGP Command Line -Freeware

    Users Guide

    Version 6.5

  • COPYRIGHT

    Copyright 1999 Networks Associates Technology, Inc. All Rights Reserved. No part of this publicationmay be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into anylanguage in any form or by any means without the written permission of Network AssociatesTechnology, Inc., or its suppliers or affiliate companies.

    PGP*, Version 6.5.2

    9-99. Printed in the United States of America.

    TRADEMARK ATTRIBUTIONS

    * Network Associates, PGP, PGP (Pretty Good Privacy), and Pretty Good Privacy are registeredtrademarks of Network Associates and/or its affiliates in the US and/or other countries. Allother registered and unregistered trademarks in this document are the sole property of theirrespective owners.

    Portions of this software may use public key algorithms described in U.S. Patent numbers 4,200,770,4,218,582, 4,405,829, and 4,424,414, licensed exclusively by Public Key Partners; the IDEA(tm)cryptographic cipher described in U.S. patent number 5,214,703, licensed from Ascom Tech AG; and theNorthern Telecom Ltd., CAST Encryption Algorithm, licensed from Northern Telecom, Ltd. IDEA is atrademark of Ascom Tech AG. Network Associates Inc. may have patents and/or pending patentapplications covering subject matter in this software or its documentation; the furnishing of this softwareor documentation does not give you any license to these patents. The compression code in PGP is byMark Adler and Jean-Loup Gailly, used with permission from the free Info-ZIP implementation. LDAPsoftware provided courtesy University of Michigan at Ann Arbor, Copyright 1992-1996 Regents of theUniversity of Michigan. All rights reserved. This product includes software developed by the ApacheGroup for use in the Apache HTTP server project (http://www.apache.org/). Copyright 1995-1999The Apache Group. All rights reserved. See text files included with the software or the PGP web site forfurther information.

  • LIMITED WARRANTY

    Limited Warranty. Network Associates warrants that for sixty (60) days from the date oforiginal purchase the media (for example diskettes) on which the Software is contained will befree from defects in materials and workmanship.

    Customer Remedies. Network Associates' and its suppliers' entire liability and your exclusiveremedy shall be, at Network Associates' option, either (i) return of the purchase price paid forthe license, if any, or (ii) replacement of the defective media in which the Software is containedwith a copy on nondefective media. You must return the defective media to NetworkAssociates at your expense with a copy of your receipt. This limited warranty is void if thedefect has resulted from accident, abuse, or misapplication. Any replacement media will bewarranted for the remainder of the original warranty period. Outside the United States, thisremedy is not available to the extent Network Associates is subject to restrictions under UnitedStates export control laws and regulations.

    Warranty Disclaimer. To the maximum extent permitted by applicable law, and except for thelimited warranty set forth herein, THE SOFTWARE IS PROVIDED ON AN AS IS BASISWITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. WITHOUT LIMITING THEFOREGOING PROVISIONS, YOU ASSUME RESPONSIBILITY FOR SELECTING THESOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATIONOF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITINGTHE FOREGOING PROVISIONS, NETWORK ASSOCIATES MAKES NO WARRANTYTHAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OROTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. TOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, NETWORK ASSOCIATESDISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOTLIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR APARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THESOFTWARE AND THE ACCOMPANYING DOCUMENTATION. SOME STATES ANDJURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THEABOVE LIMITATION MAY NOT APPLY TO YOU. The foregoing provisions shall beenforceable to the maximum extent permitted by applicable law.

  • LICENSE AGREEMENT

    NOTICE TO ALL USERS: FOR THE SPECIFIC TERMS OF YOUR LICENSE TO USE THESOFTWARE THAT THIS DOCUMENTATION DESCRIBES, CONSULT THE README.1ST,LICENSE.TXT, OR OTHER LICENSE DOCUMENT THAT ACCOMPANIES YOURSOFTWARE, EITHER AS A TEXT FILE OR AS PART OF THE SOFTWARE PACKAGING. IFYOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH THEREIN, DO NOT INSTALLTHE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE PLACE OFPURCHASE FOR A FULL REFUND.

    Export of this software and documentation may be subject to compliance with the rules and regulationspromulgated from time to time by the Bureau of Export Administration, United States Department ofCommerce, which restrict the export and re-export of certain products and technical data.

    Network Associates, Inc. (408) 988-3832 main3965 Freedom CircleSanta Clara, CA 95054http://[email protected]* is sometimes used instead of the for registered trademarks to protect marks registered outside of theU.S.

  • Table of Contents

    Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ixOrganization of this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix

    Conventions used in this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix

    How to contact Network Associates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x

    Customer service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x

    Year 2000 compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x

    Network Associates training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x

    Comments and feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x

    Recommended reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x

    Chapter 1. Introducing PGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Using PGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    A quick overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    Basic steps for using PGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

    Chapter 2. Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Starting PGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    Location of PGP files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    PGPPATH: Set the pathname for PGP . . . . . . . . . . . . . . . . . . . . . . . . . . 18

    Making PGP compatible with PGP 2.6.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

    Making and exchanging keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

    Key concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

    Making a key pair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

    Protecting your keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

    Distributing your public key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    Summary of key server commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    Creating a passphrase that you will remember . . . . . . . . . . . . . . . . . . . . . . . 24

    PGPs command line options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

    Entering PGP configuration parameters on the command line . . . . . . 27

    Common PGP functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

    Creating, disabling, reenabling, and revoking a key . . . . . . . . . . . . . . 27

    Encrypting and decrypting messages . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    Users Guide v

  • Table of Contents

    Wiping your disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

    Signing messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

    Specifying file types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

    Key maintenance commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

    Creating signature certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

    Summary of commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

    Cancelling an operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

    Chapter 3. Advanced Topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Identifying your home directory: HOME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

    Using PGP non-interactively from UNIX shell scripts or MSDOSbatch files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

    Suppressing unnecessary questions: BATCHMODE . . . . . . . . . . . . . . 33

    Eliminating confirmation questions: FORCE . . . . . . . . . . . . . . . . . . . . 34

    Understanding PGP exit status codes . . .