PGP Command Line 6.5 Operating instructions

Type
Operating instructions
PGP Command Line
Guide
Version 6.5
COPYRIGHT
Copyright © 1999 Network Associates Technology, Inc. All Rights Reserved. No part of t his publication
may b e reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any
language in any f orm or b y any means w ithout the written permission o f Network Associates
Technology, Inc., or its suppliers or affiliate companies.
PGP*, Version 6.5.1
6-99. Printed i n the U nited States of A merica.
TRADEMARK ATTRIBUTIONS
* ActiveHelp, Bomb Shelter, Building a World of Trust, Ciph erLink, Clean-Up , Cloaking, Compass 7,
CNX, CyberCop, CyberM edia, Data Security Letter, Di scover, Distributed Sniffer System, Dr
Solomon’s, Ent erprise Secure Cast, First A id, ForceField, Gauntlet, GMT, Hunter, ISDN Tel/Scope,
LM 1, LANGuru, Leading Help Desk Technology, Magi c Solutions, MagicSpy, Magi cTree, Magic
Un iversity, MagicWi n , MagicWord, McAfee Associates, Mc Afee, MoneyMagic, More Power To You,
Multimedia Cloaking, NetCrypto, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools,
NetOctopus, NetStalker, Network Associates, Net work General, Network Uptime!, NetXRa y, N uts &
Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good P rivacy), PocketScope, PowerTelnet, Pretty Good
Privacy, PrimeSupport, RecoverKey, RecoverKey-International, ReportMagic, RingFence, Router PM,
Safe & Sound , SalesMagic, Sec ureCast, Servi ce Level Manager, ServiceMagic, Site Meter, Sniffer,
SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR ), SupportMag ic, T-POD,
TeleSniffer, TIS, TMach, TMeg, Trusted Mach, Trusted Mail, T otal Netwo rk Visibility, Total Virus
Defense, Uninstaller, Virex, Virex - PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan,
WebShield, WebSniffer, WebStalker WebWall, and ZAC 2000 are registered trademarks of
Network A ssociates and/or its affiliates in the US and/or other countries. A ll other registered
and unregistered trademarksin this document are the sole property of their respective owner s.
Portions of this software may use pub lic key algorithms described in U.S. Pa tent numbers 4,200,770,
4,218,582, 4,405,829, and 4,424,414, licensed exclusively by Public Key Partners; the IDEA( tm)
cryptographic cipher described in U.S. patent numb er 5,214,703, licensed from Ascom Tech AG; and the
Northern Teleco m Ltd., CAST Encryption Algorithm, licensed from Northern Telecom, Ltd. IDEA is a
trademark of Ascom Tech AG. Network Associates Inc. may h a ve patents a n d/or pending patent
applications coveringsubject matter in thissoftw are or it s documentation; t he furnishing of this soft ware
or documentation does not give y ou any license to t hese patents. The compression code in PGP is by
Mark Adler and Jean-Loup Gailly, used with permissio n from the free Info-ZIP implementation. LDAP
software provided courtesy University of Michigan at Ann Arbor, Copyright © 1 992-1996 Reg ents of the
University of Michigan. All rights reserved. Th is product includes software developed b y the Ap a che
Group for use in the Apache HTTP serv er project (http ://www.apache.org/). Copyright © 1995-1999
The Ap ache Group. All righ ts reserved. See text files included with the software or the PGP web site for
further information.
LIMITED WARRANTY
Limited Warranty. Network Associates warrants that for sixty (60) days from the date of
original purcha se the m edia (for exam ple diskettes) on which the S oftware is contained will be
free from defects in m aterials and work manship .
Custo mer Remedies. Network Associates' and its sup pliers' entire lia bility an d your exclu sive
remedy shall be, at Networ k Associates' option, either (i) return of the purchase price paid for
the license, if any, or (ii) replacement o f the defective media in whic h the Software is co ntained
with a copy on nondefective media. You must return the defective media to Network
Associates at your expense with a c opy o f your receipt. This limited warranty is void if the
defect has resulted from accident, abuse, or misapplication. Any replacement med ia w ill b e
wa rrant e d for the remainder of the ori g inal warr anty period. Outside the United Sta tes, this
remedy is not availableto the extent Network Associates is subjecttorestrictions under United
States export control laws and regulations.
Warranty Disclaimer. To the maximum extent permitted by applicable law, and except for t he
limit ed warranty set forth her e in, TH E SOFTWARE IS PROVIDED ON AN "AS IS" BASIS
WITHOUT WARRAN TY OF ANYKIND, EXPRESS OR IMPLIED.W ITHOUT LIMITING THE
FOREGOING PROVISIONS, YOU ASSUME RESPONSIBILITY FOR SELECT ING THE
SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION
OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING
THE FOREGOING P ROVISIONS, NETWORK ASSOCIATES MAKES NO W ARRANTY
THATTHESOFTWAREWILLBEERROR-FREEORFREEFROMINTERRUPTIONSOR
OTHER FAILURES OR THAT THE SOFTW ARE WILL MEET YOUR REQUIREMEN TS. TO
THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, NETWORK ASSOCIATES
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE
SOFTWARE AND THE ACCOMPANY ING DOCUMENTATION. SOME STATES AND
JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IM PLIED WA RRANTIES, S O THE
ABOVE LIMITATION MAY NOT APPLY TO YOU. T he fo reg oing provisions shall be
enforceable to the m aximum ex tent perm itted by applicable law.
LICENSE AGREEMENT
NOTICE TO ALL USERS: FOR THE SPECIFIC TERMS OF YOUR LICENSE TO USE THE
SOFTWARE THAT THIS DOCUMENTATION DESCRIBES, CONSULT THE REA DME.1ST,
LICENSE.TXT, OR OTHER LICENSE DOCUMENT THAT ACCOMPANIES YOUR
SOFTWARE, EITHER AS A TEXT FILE OR AS PART OF THE SOFTWARE PACKAGING. IF
YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH THEREIN, DO NOT INSTALL
THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THEPRODUCT TO THE PLACE OF
PURC HASE FOR A FULL R EFUND.
Export of this software and documentation may be subject to c ompliance with the rules and regulations
promulgated from time to time by the Bureau of Export Administration, United States Department of
Commerce, whic h restrict the export and re-export of c ertain products a nd technical data.
Network Associat es, Inc. (408) 988-3832 main
3965 Freedom Circle
Santa Clara, CA 95054
http://www.nai.com
info@nai.com
* is sometimes used instead of the ® for registered trademarks to p rotect mark s regist ered outside of the
U.S.
iv Product Name
User Guide v
Table of Contents
Preface.....................................................ix
OrganizationofthisGuide........................................ ix
ConventionsusedinthisGuide ................................... ix
HowtocontactNetworkAssociates.................................x
Customerservice ............................................x
Technicalsupport ...........................................x
Year 2000 Compliance . . . .................................... xi
NetworkAssociatestraining.................................. xi
Commentsandfeedback..................................... xi
RecommendedReadings ....................................xii
Chapter1. IntroducingPGP ...................................1
UsingPGP ......................................................1
Aquickoverview.................................................1
BasicstepsforusingPGP ....................................2
Chapter2. GettingStarted ....................................5
StartingPGP ....................................................5
LocationofPGPfiles .............................................5
PGPPATH:SetthepathnameforPGP ...........................6
MakingPGPcompatiblewithPGP2.6.2..............................6
MakingandExchangingKeys ......................................7
Keyconcepts....................................................7
Makingakeypair ................................................8
Protectingyourkeys ............................................10
Distributingyourpublickey ......................................11
Summaryofkeyservercommands ................................11
Creating a passphrase that you will remember .......................12
PGPscommandlineoptions .....................................13
EnteringPGPconfigurationparametersonthecommandline......15
Table of Contents
vi PGP Command Line
CommonPGPfunctions..........................................15
Creating,disabling,reenabling,andrevokingakey ..............15
Encryptinganddecryptingmessages ..........................16
Wipingyourdisk ...........................................17
Signingmessages ..........................................17
Specifyingfiletypes.........................................17
Keymaintenancecommands .................................18
Creatingsignaturecertificates ................................19
Summaryofcommands ..........................................20
Cancellinganoperation ..........................................20
Chapter3. AdvancedTopics..................................21
Identifyingyourhomedirectory:HOME.............................21
Using PGP non-interactively from UNIX shell scripts or MSDOS
batchfiles ...................................................21
Suppressing unnecessary questions: BATCHMODE ..............21
Eliminatingconfirmationquestions:FORCE ....................22
UnderstandingPGPexitstatuscodes..........................22
UsingPGPasaUNIX-stylefilter ...................................22
Encryptingandtransmittingbinarydata ............................23
Sending binary data files in ASCII-armored format without
encryptionorsignature....................................23
DecryptingASCII-armoredmessages ..........................24
SendingapublickeyinASCII-armoredformat...................24
SendingASCIItextfilestodifferentmachineenvironments ............24
ManagingSignatureCertificates...................................25
Creatingseparatesignaturecertificateandtextfiles..............25
Receivingseparatesignaturecertificateandtextfiles ............25
FileManagementCommands .....................................26
Decrypting a message and viewing plaintext output on your screen . 26
Decrypting a message and renaming the plaintext filename output . . 26
Decrypting a message and recovering the original plaintext
filename ................................................26
Deletingakeyfromthekeyserver.............................26
Encryptingforviewingbyrecipientonly........................27
Storingsignedfiles:Signingafilewithoutencrypting ............27
Wipingyourdisk ...........................................27
User Guide vii
Table of Contents
KeyManagementCommands .....................................28
Editing your user ID or passphrase, or making an existing key
yourdefaultsigningkey ...................................28
Editingthetrustparametersforapublickey ....................28
Verifyingthecontentsofyourpublickeyring ...................29
Verifyingapublickeyoverthephone ..........................29
Selecting keys using the key ID . . .............................30
PGPPASS:Storeyourpassphrase.............................30
PGPPASSFD...............................................31
Chapter4. PGPsConfigurationFile ...........................33
LearningaboutPGPsconfigurationfile:pgp.cfg.....................33
ARMOR:ASCII-armoroutput .................................34
ARMORLINES:SizeofASCIIarmormultipartfiles................34
CERT_DEPTH:Depthofintroducersbenested ..................35
CLEARSIG: Signed message readable with human eyes ..........35
COMMENT:ASCIIarmorcomment.............................36
COMPATIBLE: Enable user-interface compatibility with PGP 2.6.2 . . 36
COMPLETES_NEEDED: Number of completely trusted
introducersneeded .......................................36
COMPRESS: Compression before encryption . . .................37
CIPHERNUM ...............................................37
ENCRYPTTOSELF: Encrypt to self .............................37
FASTKEYGEN:Fastkeygeneration............................37
HASHNUM .................................................37
INTERACTIVE:Confirmationforkeyadds ......................38
KEYSERVER_URL ..........................................38
MARGINALS_NEEDED: Number of marginally trusted
introducersneeded .......................................38
MYNAME:DefaultuserIDforsignatures........................38
PAGER:Shellcommandtodisplayplaintextoutput ..............39
PGP_MIME ................................................39
PGP_MIMEPARSE..........................................39
PUBRING: Filename for your public keyring .....................39
RANDOMDEVICE . ..........................................40
RANDSEED: Filename for random number seed .................40
Table of Contents
viii PGP Command Line
SECRING:Filenameforyoursecretkeyring .....................40
SHOWPASS:Echopassphrasetouser .........................40
TMP:Directorypathnamefortemporaryfiles ....................41
TEXTMODE:Assumeplaintextisatextfile......................41
TZFIX:Timezoneadjustment .................................41
VERBOSE:Quiet,normal,orverbosemessages .................42
AppendixA. ExitAndErrorCodes..............................43
Index.......................................................45
User Guide ix
Preface
Organization of this Guide
Th is Guide is divide d into the following chapters:
Chapter 1, “Introducing PGP This chapter provides an introduction to
using PGP Command Lin e software.
Chapter 2, “Getting Started” This chapter describes how to start and stop
PGP, how to make and ex change keys, a nd ho w to pe rform common PGP
functions f rom the command line.
Chapter 3, “Advanced Topics” This chapter describes how to use PGP
non-int eractively fro m UNIX she ll sc ripts and MSDOS batch files , how to
use PGP as a UN I X-style filte r, and how to encrypt and transmit binary
data.
Chapter 4, “PGP’s Configuration File” This chapter introduces you to
PGP’s configuration file and the co nf iguration parameters in that file.
Conventions used in this Guide
The following describes the conventions used in this guide:
Bold M e nus, fie lds, op tions , a nd buttons are in bold
typeface. An example follows:
Select the Clear option from the Edit menu.
Sans-serif
font
Pathnames, filenames, icon na mes, scree n text ,
and special keys on the keyboard are s how n in
a sans-serif font.
Keystrokes
Keystrokes that you enter are shown in bold
sans-serif type.
Variables
Command-linetext forwhichyoumustsupply
a value is shown in italic sans-serif type.
Preface
x PGP Command Line
How to contact Network Associates
Customer service
To order products or obtain product information, contact the Network
Assoc iates Customer Care department at (408) 988-3832 or write to the
following address:
Network Associates, Inc.
McCandless Tow e rs
3965 Freedom Circle
Santa Clara, CA 95054-1203
U.S .A.
Technical support
Network Associates is famous for its ded ication to customer satisfaction. We
have continued this tradition by m aking o u r site on th e Wor ld Wide Web a
valuable resource for answers to t echnical support issues. We encourage you
to make this your first stop for answers to frequently asked questi ons, for
updates toNetworkAssociatessoftware, and foraccessto NetworkAssociates
news and encryption information
.
Technical Support for your PG P pr o duct is also available through these
cha nne ls:
To provide t he answers you need quickly and efficiently, the Network
Associates technical support staff needs some information about your
computer and y our so ftware. Please have this information ready before you
call:
If the automated services do not have the answers you need, c ontact N etwork
Associates at one of the following numbers Monday through Frid ay between
6:00
A. M. and 6:00 P.M. Pacific time.
World Wide Web http://www.nai.com
Phone
(408) 988-3832
Email PGPSuppor[email protected]om
Phone (408) 988-3832
User Guide xi
Preface
To provide t he answers you need quickly and efficiently, the Network
Associates technical support staff needs some information about your
computer and y our so ftware. Please have this information ready before you
call:
Product name and version number
Computer brand and m odel
Any additional hardware or perip herals connected to your c omputer
Operating system type and version num bers
Network type and versio n, if applicable
Content of any status or error message displayed on screen, or appearing
in a log file (no t all pr oducts produce lo g files)
Ema il application and version (if the problem invo lves using PG P with an
email product, for example, the E udora plug-in)
Specific s t eps to r eproduce the problem
Year 2000 Compliance
Inform ationregarding NAIproducts that areYear2000compliant anditsYear
2000 standards and testing models may be obtained from NAI’s website at
http://www.nai.c om/y2k
. For furth er i nformation, email y2k@nai.com.
Network Associates training
For information about scheduling on-site training for any Network A ssociates
product, call (800) 338-8754.
Comments and feedback
Network Associates appreciates y our comments and feedback, but incurs no
obligation to you for information you submit. Please address your comments
about PGP product d ocumentation to: Network A ssociates, Inc., 3965
Freedom Circle Santa Clara, CA 95054-1203 U.S.A.. You can also e-mail
comments to tns_docum entation@nai.c om.
Preface
xii PGP Command Line
Recommended Readings
Non-Technical and beginning technical books
W hitfield D iffie and Susan Ev a Landau, “Priv acy on the Line, MIT Press;
ISBN: 0262041677
This book is a d iscussion of the history and policy surrounding
cryptography and c ommunicati onss e curity.It is an e xc e lle nt read, ev e n for
beginners a nd non-technical people, but w ith information that even a lotof
experts don't know.
David Kahn, “ The Codebrea kers” Scribner; ISBN: 0684831309
This book is a history of codes and code breakers from the time of the
Egyptians to the end of WWII. Kahn first wrote it in the sixties, and there is
a revised edition publ ished in 1996. This book won't teach you anything
about how cryptography i s done, but it has been the inspiration of the
whole modern generation of cryptographers.
Charlie Kaufman, Radia Perlman, and Mike Spencer, Network Security:
Private Communication in a Public World,” P rentice H all; ISBN:
0-13-061466-1
This is a g ood description of network security systems and protocols,
includingdescriptionsofwhatworks,whatdoesn'twork,andwhy.
Published in 1995, so it do e sn't ha ve many o f t he latest advances, but is still
a g ood book. It also contains one of the m ost clear descriptionsof how DES
works of any book written.
Intermediate books
Bruce Schn eier, “Applied Cryptography : Protocols, Algorithms, and
Source Code in C,” John Wiley & Sons ; ISBN: 0-471-12845-7
This is a good beginning technical book on how a lot of cryptography
works. If you w ant to become an expert, this is the place to start.
Alfred J. Menezes, Paul C. van O o rschot, and Scott Vanstone,
“Handbook of Appl ied Cryptography,” CRC Press; ISBN: 0-8493-8523-7
Th is is the technical book you should ge t after Schneier. There is a lot of
heavy-duty math inthisbook,but it is nonetheless usable for those who do
not und e rs tand the math.
Richard E. Smith, “Internet Cryptography, Addison-Wesley P u b Co;
ISBN: 020192480
This book describes how many Internet security protocols. M ost
importantly, it describes how systems that are designed well nonetheless
end up with f laws t hrough c ar e less operation. This book is light on math,
and heavy on practical information.
User Guide xiii
Preface
William R. Cheswick and Steven M. Bellovin, “ F irewalls and Internet
Security: Rep elling the Wily Hacker Addison-Wesley Pub Co;
ISBN: 0201633574
This book is written by two senior researcher at A T&T Bell Labs, about
their experiences maintaining and red e signing AT&T's Internet
connection. Very readable.
Advanced books
Neal Koblitz, “A Course in Number Theory and Cryptography”
Springer-Verlag; ISBN: 0-387-94293-9
An excellent graduate-level mathematics textbook o n number theory and
cryptography.
Eli Biham and Ad i Shamir, “Differe ntial Cr yp tanalysis of the Da ta
Encryption Standard, Springer-Verlag; ISBN: 0-387-97930-1
Th is book describes the technique of differentialcryptanalysis as applied to
DES . It is an excellent bo ok for learni ng about t his te chnique.
Preface
xiv PGP Command Line
1
User Guide 1
1Introducing PGP
Welcome to PGP . With PGP, you can easily and securely protect the privacy
of your data by encrypting it so that only int ended individuals can read it.You
can also digitally sign informat ion, w hich e nsures i t’s au thentic ity.
Using PGP
This command line v ersion of PGP is designed for two broad types of
applications: transferring info rmation se curely between batch servers and
integration into automated processes.
A fina ncial ins titution can use PGP t o securely tr ansfer file s f rom one office
to another. Files are encrypted to the receiving server’s key and ftp to a
directory on a remote server. The remote server periodically examines its
receiving directory. When the remote server i dentifies newly tran sferred
files, it decrypts the files and se nds them to their fina l de stination.
UNIX and Windows developers can use this product to secure financial
transaction s that users make on the in ternet. For example, if you sell
products o n yo ur webs ite, yo u can in clude PGP in your scripts to
automatically encrypt a customer’s order and credit card information for
storage or transfer to a secure machine.
The term MSDOS batch files refers to a Windows NT comman d prompt. The
term MSDOS means th e command prompt window that exists in Windows
NT.
A quick overview
PGP is based on a widely accepted encryption technology kn own as public key
cryptogra phy in which two com plementary keys, called a key pair,areusedto
maintain secure communications. One ofthe keysis designated as a privatekey
to which only you have access and the other is a public key w hich you freely
exchange with other PGP users. Both your private and your publ ic keys are
stored in keyring files.
For a comprehensive overview of PGP encryption technology, refer to “An
Introduction to Cryptography,” which is inc luded w ith the product.
Introducing PGP
2 PGP Command Line
Basic steps for using PGP
Th is s ection takes a quick loo k at the procedures you normally follow in the
course of us ing PGP . F or d etails concerning any of these pr ocedures, refer to
the appropriate chapters in t his book.
1. Install PGP on your computer. Refer to the documen tation includ ed with
PGP for complete installation instructions.
2. Create a private and public key pair.
Before you can begin using PG P, you need t o generate a key pair. A PGP
key pair is c omposed of a private key to which only you h ave ac cess and a
public key that you can copy and make free ly availab le to everyone with
whom you exchan ge information .
You can create a new key pair any time af ter yo u have finis hed the PGP
installation procedure.
For more information about creating a private and pu b lic key pair, refer to
“Making a key pair” on page 8
3. Exchange public keys with o thers.
After you have created a key pair, you can begin correspondin g with other
PGP u sers. Yo u will need a copy of their pu blic key and t hey will need
yours. Your public key is just a block of text, so it ’s quite ea s y to trad e keys
with someone. You can include your public key in an email messag e, copy
it to a file, or post it on a public or corporate key server where anyone can
get a c opy w hen they need it.
For more information about exchanging public keys, refer to and “Making
and Exchanging Keys on page 7 and “ Distributing your public key” on
page 11.
4. Validate p ub lic keys.
Once you have a copy of someone’s public key, you can add it to your
public keyring. You should t he n check to make sure that the key has not
been tampered w ith and that it really belongs to the purported owner. You
do this by comparing the unique fing erprint on your copy of someone’s
public key to the fingerprint on that pers on’s original key .
Youcanalsoaccepta keyas validbased on the presence ofa signaturefrom
a trusted introducer. PGP users often have other trusted users sign their
public keys to further attest to their authenticity. For instance, you might
send a trusted colleague a copy of your public key with a request that he or
she certify and r etur n it so you can include the signature when you post
your key on a public key server. Using PGP, w hen someone gets a copy of
yourpublic key,theydon’thavetocheckthekey’s authenticity themselves,
User Guide 3
Introducing PGP
but c an instead r ely on how well they trust the person(s) who signed your
key. PGP provide s t he means f or establishing this level of validity for each
of t he public keys y ou add to your public keyring. This m e a ns tha t wh e n
you get a key from someone whose key is signed by a trusted introducer,
you can be fairly sure that the key belongs to the purported user.
Your Sec urity Officer can act as a trusted introd ucer, and you may then
trust any keys signed by th e co rporate key t o be valid keys . If you work for
a large company with several locati ons, you may have regional
introducers, and your Security Officer may be a meta-introducer, or a
trusted introducer of trusted introducers.
When you are sur e that you have a valid p ublic key, you sign it to i ndicate
that you feel th e key is safe to use. In addition , you can grant the owner of
the key a level of trust indicating how much confidence you have in th at
person to vouch for the authenticity of someone else’s public key.
5. Encrypt a nd sign yo ur em a il and files .
After you hav e gener ated your key p a ir a nd have ex changed public keys,
you can begin encrypting a nd signing email me ssages and files.
6. Decrypt and ve rify your email a nd files.
When someone sends you encr ypted data, you can decrypt the contents
and verify any appended signature to make sure that the data originated
with the alleged sender and that it has not been altered.
7. Wipe files.
When you nee d to perm anently delete a file, you can use the wip e
command to ensure that the file is unrecoverable. The file is immediately
overwritten so that it cannot be retrieved using disk recovery software.
Introducing PGP
4 PGP Command Line
2
User Guide 5
2Getting Started
Th is chapter covers the following topics:
Starting and quitting PGP
Making and exchanging k ey pairs
Per forming common PGP functions fr om the command line
View ing PGP’s onl ine U ser Guide
Starting PGP
To start PGP, enter the following at the command line:
pgp
You can perform all PGP functions from the command line.
Location of PGP files
In UNIX:
The first time you start PGP, the software checks to see if the environment
variable PGPPATH is defined . If PGPPAT H is de fined, the software puts the
PGP p referenc e s file, ke yring files, pgp.cfg, and the randseed file in the
%PGPPATH% d irec tory .
If PGPPATH is not defined, the software checks to see if the environment
variable USERPROF ILE is d efined. If USERPROFILE is defined, the software
puts the files in the %US ERPROFILE%\Application Data\pgp directory.
If U SERPROFILE is not defined, the software puts the files in
%SYSTEMROOT%\pgp.
In Win dows NT:
The first time you start PGP, the software checks to see if the environment
variable PGPPATH is defined . If PGPPAT H is de fined, the software puts the
pgp.cfg in the %P GP PATH% directory.
If PGPPATH is not defined, the software checks to see if the environment
variable USERPROF ILE is d efined. If USERPROFILE is defined, the software
puts the pgp. cfg file in the %USERPROF ILE%\Applic ation Data\pgp
directory.
Getting Started
6 PGP Command Line
If U SERPROFILE is not defined, the software puts the pgp.cfg file in
%SYSTEMROOT%\pgp.
Th e p reference file is placed in the %US ERPROFILE%\Application Data\pgp
directory, and the preference file identifies where the default keyrings are
placed (normally in the same directory, %USERPROFILE% \Application
Data\pgp).
The randseed file is always placed in the %SYSTEMROOT% directory.
PGPPATH: Set the pathname for PGP
Th is parameter id entifies the location of spe cific PGP f iles:
SET PGPPATH=<PGPpathnam e >
For example:
SET PGPPATH=C:\PGP
PGP needs to kno w where the following file s are located:
Your k ey r ing files pubring.pkr and s ecring.skr
The ran dom numbe r s e ed file randseed.rnd
The PGP configuration file pgp. cfg (or .pgprc)
These files can be kept in any directory. Use the P GPPAT H parameter to
identify their location.
Making PGP compatible with PGP 2.6.2
This version of PGP includes a c ompatible switch that enables user-interfac e
compatibility w ith PGP 2.6. 2. You may re quire this feature for interoperation
with scripts that parse the output or otherwise interact with PGP dialogues.
To act ivate this featur e, add the following line to the configuration file,
pgp.cfg:
COMPATIBLE=on
You can also enter +COMPATIB LE on the command line.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63

PGP Command Line 6.5 Operating instructions

Type
Operating instructions

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI