PGP Command Line 10.0 User guide

Category
Software
Type
User guide
PGP® Command Line 10.0
User's Guide
Version Information
PGP Command Line User's Guide. PGP Command Line Version 10.0.0. Released March 2010.
Copyright Information
Copyright © 1991-2010 by PGP Corporation. All Rights Reserved. No part of this document can be reproduced or transmitted in any form or by any
means, electronic or mechanical, for any purpose, without the express written permission of PGP Corporation.
Trademark Information
PGP, Pretty Good Privacy, and the PGP logo are registered trademarks of PGP Corporation in the US and other countries. IDEA is a trademark of Ascom
Tech AG. Windows and ActiveX are registered trademarks of Microsoft Corporation. AOL is a registered trademark, and AOL Instant Messenger is a
trademark, of America Online, Inc. Red Hat and Red Hat Linux are trademarks or registered trademarks of Red Hat, Inc. Linux is a registered trademark
of Linus Torvalds. Solaris is a trademark or registered trademark of Sun Microsystems, Inc. AIX is a trademark or registered trademark of International
Business Machines Corporation. HP-UX is a trademark or registered trademark of Hewlett-Packard Company. SSH and Secure Shell are trademarks of
SSH Communications Security, Inc. Rendezvous and Mac OS X are trademarks or registered trademarks of Apple Computer, Inc. All other registered
and unregistered trademarks in this document are the sole property of their respective owners.
Licensing and Patent Information
The IDEA cryptographic cipher described in U.S. patent number 5,214,703 is licensed from Ascom Tech AG. The CAST-128 encryption algorithm,
implemented from RFC 2144, is available worldwide on a royalty-free basis for commercial and non-commercial uses. PGP Corporation has secured a
license to the patent rights contained in the patent application Serial Number 10/655,563 by The Regents of the University of California, entitled Block
Cipher Mode of Operation for Constructing a Wide-blocksize block Cipher from a Conventional Block Cipher. Some third-party software included in PGP
Universal Server is licensed under the GNU General Public License (GPL). PGP Universal Server as a whole is not licensed under the GPL. If you would
like a copy of the source code for the GPL software included in PGP Universal Server, contact PGP Support (https://support.pgp.com). PGP Corporation
may have patents and/or pending patent applications covering subject matter in this software or its documentation; the furnishing of this software or
documentation does not give you any license to these patents.
Acknowledgments
This product includes or may include:
-- The Zip and ZLib compression code, created by Mark Adler and Jean-Loup Gailly, is used with permission from the free Info-ZIP implementation,
developed by zlib (http://www.zlib.net
). -- Libxml2, the XML C parser and toolkit developed for the Gnome project and distributed and copyrighted under
the MIT License found at http://www.opensource.org/licenses/mit-license.html
. Copyright © 2007 by the Open Source Initiative. -- bzip2 1.0, a freely
available high-quality data compressor, is copyrighted by Julian Seward, © 1996-2005. -- Application server (http://jakarta.apache.org/
), web server
(http://www.apache.org/
), Jakarta Commons (http://jakarta.apache.org/commons/license.html) and log4j, a Java-based library used to parse HTML,
developed by the Apache Software Foundation. The license is at www.apache.org/licenses/LICENSE-2.0.txt
. -- Castor, an open-source, data-binding
framework for moving data from XML to Java programming language objects and from Java to databases, is released by the ExoLab Group under an
Apache 2.0-style license, available at http://www.castor.org/license.html
. -- Xalan, an open-source software library from the Apache Software
Foundation that implements the XSLT XML transformation language and the XPath XML query language, is released under the Apache Software
License, version 1.1, available at http://xml.apache.org/xalan-j/#license1.1
. -- Apache Axis is an implementation of the SOAP ("Simple Object Access
Protocol") used for communications between various PGP products is provided under the Apache license found at
http://www.apache.org/licenses/LICENSE-2.0.txt
. -- mx4j, an open-source implementation of the Java Management Extensions (JMX), is released under
an Apache-style license, available at http://mx4j.sourceforge.net/docs/ch01s06.html
. -- jpeglib version 6a is based in part on the work of the
Independent JPEG Group. (http://www.ijg.org/
) -- libxslt the XSLT C library developed for the GNOME project and used for XML transformations is
distributed under the MIT License http://www.opensource.org/licenses/mit-license.html
. -- PCRE Perl regular expression compiler, copyrighted and
distributed by University of Cambridge. ©1997-2006. The license agreement is at http://www.pcre.org/license.txt
. -- BIND Balanced Binary Tree Library
and Domain Name System (DNS) protocols developed and copyrighted by Internet Systems Consortium, Inc. (http://www.isc.org
) -- Free BSD
implementation of daemon developed by The FreeBSD Project, © 1994-2006. -- Simple Network Management Protocol Library developed and
copyrighted by Carnegie Mellon University © 1989, 1991, 1992, Networks Associates Technology, Inc, © 2001- 2003, Cambridge Broadband Ltd. ©
2001- 2003, Sun Microsystems, Inc., © 2003, Sparta, Inc, © 2003-2006, Cisco, Inc and Information Network Center of Beijing University of Posts and
Telecommunications, © 2004. The license agreement for these is at http://net-snmp.sourceforge.net/about/license.html. -- NTP version 4.2
developed
by Network Time Protocol and copyrighted to various contributors. -- Lightweight Directory Access Protocol developed and copyrighted by OpenLDAP
Foundation. OpenLDAP is an open-source implementation of the Lightweight Directory Access Protocol (LDAP). Copyright © 1999-2003, The
OpenLDAP Foundation. The license agreement is at http://www.openldap.org/software/release/license.html
. Secure shell OpenSSH developed by
OpenBSD project is released by the OpenBSD Project under a BSD-style license, available at http://www.openbsd.org/cgi-
bin/cvsweb/src/usr.bin/ssh/LICENCE?rev=HEAD. -- PC/SC Lite is a free implementation of PC/SC, a specification for SmartCard integration is released
under the BSD license. -- Postfix, an open source mail transfer agent (MTA), is released under the IBM Public License 1.0, available at
http://www.opensource.org/licenses/ibmpl.php
. -- PostgreSQL, a free software object-relational database management system, is released under a
BSD-style license, available at http://www.postgresql.org/about/licence
. -- PostgreSQL JDBC driver, a free Java program used to connect to a
PostgreSQL database using standard, database independent Java code, (c) 1997-2005, PostgreSQL Global Development Group, is released under a
BSD-style license, available at http://jdbc.postgresql.org/license.html
. -- PostgreSQL Regular Expression Library, a free software object-relational
database management system, is released under a BSD-style license, available at http://www.postgresql.org/about/licence
. -- 21.vixie-cron is the Vixie
version of cron, a standard UNIX daemon that runs specified programs at scheduled times. Copyright © 1993, 1994 by Paul Vixie; used by permission. -
- JacORB, a Java object used to facilitate communication between processes written in Java and the data layer, is open source licensed under the GNU
Library General Public License (LGPL) available at http://www.jacorb.org/lgpl.html
. Copyright © 2006 The JacORB Project. -- TAO (The ACE ORB) is an
open-source implementation of a CORBA Object Request Broker (ORB), and is used for communication between processes written in C/C++ and the
data layer. Copyright (c) 1993-2006 by Douglas C. Schmidt and his research group at Washington University, University of California, Irvine, and
Vanderbilt University. The open source software license is available at http://www.cs.wustl.edu/~schmidt/ACE-copying.html
. -- libcURL, a library for
downloading files via common network services, is open source software provided under a MIT/X derivate license available at
http://curl.haxx.se/docs/copyright.html
. Copyright (c) 1996 - 2007, Daniel Stenberg. -- libuuid, a library used to generate unique identifiers, is released
under a BSD-style license, available at http://thunk.org/hg/e2fsprogs/?file/fe55db3e508c/lib/uuid/COPYING
. Copyright (C) 1996, 1997 Theodore Ts'o. --
libpopt, a library that parses command line options, is released under the terms of the GNU Free Documentation License available at
http://directory.fsf.org/libs/COPYING.DOC
. Copyright © 2000-2003 Free Software Foundation, Inc. -- gSOAP, a development tool for Windows clients to
communicate with the Intel Corporation AMT chipset on a motherboard, is distributed under the gSOAP Public License version 1.3b, available at
4
http://www.cs.fsu.edu/~engelen/license.html. -- Windows Template Library (WTL) is used for developing user interface components and is distributed
under the Common Public License v1.0 found at http://opensource.org/licenses/cpl1.0.php
. -- The Perl Kit provides several independent utilities used to
automate a variety of maintenance functions and is provided under the Perl Artistic License, found at
http://www.perl.com/pub/a/language/misc/Artistic.html
. -- rEFIt - libeg, provides a graphical interface library for EFI, including image rendering, text
rendering, and alpha blending, and is distributed under the license found at
http://refit.svn.sourceforge.net/viewvc/*checkout*/refit/trunk/refit/LICENSE.txt?revision=288
. Copyright (c) 2006 Christoph Pfisterer. All rights reserved.
-- Java Radius Client, used to authenticate PGP Universal Web Messenger users via Radius, is distributed under the Lesser General Public License
(LGPL) found at http://www.gnu.org/licenses/lgpl.html
. -- Yahoo! User Interface (YUI) library version 2.5.2, a Web UI interface library for AJAX.
Copyright (c) 2009, Yahoo! Inc. All rights reserved. Released under a BSD-style license, available at http://developer.yahoo.com/yui/license.html. --
JSON-lib version 2.2.1, a Java library used to convert Java objects to JSON (JavaScript Object Notation) objects for AJAX. Distributed under the Apache
2.0 license, available at http://json-lib.sourceforge.net/license.html
. -- EZMorph, used by JSON-lib, is distributed under the Apache 2.0 license, available
at http://ezmorph.sourceforge.net/license.html
. -- Apache Commons Lang, used by JSON-lib, is distributed under the Apache 2.0 license, available at
http://commons.apache.org/license.html
. -- Apache Commons BeanUtils, used by JSON-lib, is distributed under the Apache 2.0 license, available at
http://commons.apache.org/license.html
. -- SimpleIni is an .ini format file parser and provides the ability to read and write .ini files, a common
configuration file format used on Windows, on other platforms. Distributed under the MIT License found at http://www.opensource.org/licenses/mit-
license.html. Copyright 2006-2008, Brodie Thiesfield. -- uSTL provides a small fast implementation of common Standard Template Library functions and
data structures and is distributed under the MIT License found at http://www.opensource.org/licenses/mit-license.html
. Copyright (c) 2005-2009 by
Mike Sharov <[email protected]
>. -- Protocol Buffers (protobuf), Google's data interchange format, are used to serialize structure data in
the PGP SDK. Distributed under the BSD license found at http://www.opensource.org/licenses/bsd-license.php. Copyright 2008
Google Inc. All rights
reserved.
Additional acknowledgements and legal notices are included as part of the PGP Universal Server.
Export Information
Export of this software and documentation may be subject to compliance with the rules and regulations promulgated from time to time by the Bureau
of Export Administration, United States Department of Commerce, which restricts the export and re-export of certain products and technical data.
Limitations
The software provided with this documentation is licensed to you for your individual use under the terms of the End User License Agreement provided
with the software. The information in this document is subject to change without notice. PGP Corporation does not warrant that the information meets
your requirements or that the information is free of errors. The information may include technical inaccuracies or typographical errors. Changes may be
made to the information and incorporated in new editions of this document, if and when made available by PGP Corporation.
i
Contents
PGP Command Line Basics 1
Important Concepts 1
Getting Started 2
Installation 5
Overview 5
System Requirements 6
Windows 7 and Vista 6
Windows Server 2003 7
Windows XP 8
Windows 2000 9
IBM AIX 10
HP-UX 11i 10
Solaris 9 and 10 10
Red Hat Enterprise Linux and Fedora Core 10
Mac OS X 11
Installing on AIX 11
Installing on AIX 11
Changing the Home Directory on AIX 12
Uninstalling on AIX 13
Installing on HP-UX 13
Installing on HP-UX 13
Changing the Home Directory on HP-UX 14
Installing to a Non-Default Directory on HP-UX 14
Uninstalling on HP-UX 15
Installing on Mac OS X 15
Installing on Mac OS X 15
Changing the Home Directory on Mac OS X 16
Uninstalling on Mac OS X 16
Installing on Red Hat Enterprise Linux or Fedora Core 17
Installing on Red Hat Enterprise Linux or Fedora Core 17
Changing the Home Directory on Linux or Fedora Core 18
Uninstalling on Linux or Fedora Core 18
Installing on Solaris 19
Installing on Solaris 19
Changing the Home Directory on Solaris 20
Uninstalling on Solaris 20
Installing on Windows 21
PGP Command Line for Windows and PGP Desktop on the Same System 21
To Install on Windows 21
Changing the Home Directory on Windows 22
Uninstalling on Windows 23
ii
PGP® Command Line 10.0 Contents
Licensing 25
Overview 25
License Recovery 26
Using a License Number 27
Using a License Authorization 28
Re-Licensing 29
Through a Proxy Server 30
The Command-Line Interface 33
Overview 33
Flags and Arguments 35
Flags 35
Arguments 36
Configuration File 38
Keyserver Configuration File Settings 42
Environment Variables 43
Standard Input, Output, and Error 44
Redirecting an Existing File 44
Entering Data 45
Specifying a Key 46
'Secure' Options 46
Passphrases 47
First Steps 49
Overview 49
Creating Your Keypair 50
Protecting Your Private Key 52
Distributing Your Public Key 52
Posting Your Public Key to a Keyserver 53
Exporting Your Public Key to a Text File 54
Getting the Public Keys of Others 54
Finding a Public Key on a Keyserver 54
Importing a Public Key from a Keyserver 55
Verifying Keys 56
Cryptographic Operations 59
Overview 60
Commands 60
--armor (-a) 60
--clearsign 62
--decrypt 64
--detached (-b) 66
--dump-packets, --list-packets 67
iii
PGP® Command Line 10.0 Contents
--encrypt (-e) 68
--export-session-key 72
--list-sda 73
--list-archive 73
--sign (-s) 74
--symmetric (-c) 76
--verify 77
Key Listings 79
Overview 79
Commands 80
--fingerprint 80
--fingerprint-details 81
--list-key-details 82
--list-keys (-l) 83
--list-keys-xml 84
--list-sig-details 85
--list-sigs 86
--list-userids 86
Working with Keyservers 87
Overview 87
Commands 88
--keyserver-disable 88
--keyserver-recv 89
--keyserver-remove 90
--keyserver-search 90
--keyserver-send 91
--keyserver-update 92
Managing Keys 95
Overview 97
Commands 97
--add-adk 97
--add-photoid 98
--add-preferred-cipher 98
--add-preferred-compression-algorithm 99
--add-preferred-email-encoding 100
--add-preferred-hash 100
--add-revoker 101
--add-userid 101
--cache-passphrase 102
--change-passphrase 103
--clear-key-flag 104
--disable 104
iv
PGP® Command Line 10.0 Contents
--enable 105
--export, --export-key-pair 105
--export-photoid 108
--gen-key 108
--gen-revocation 111
--gen-subkey 111
--get-email-encoding 112
--import 113
--join-key 114
--join-key-cache-only 118
--key-recon-send 119
--key-recon-recv-questions 120
--key-recon-recv 121
--remove 122
--remove-adk 122
--remove-all-adks 123
--remove-all-photoids 123
--remove-all-revokers 124
--remove-expiration-date 124
--remove-key-pair 125
--remove-photoid 125
--remove-preferred-cipher 126
--remove-preferred-compression-algorithm 126
--remove-preferred-email-encoding 127
--remove-preferred-hash 127
--remove-preferred-keyserver 128
--remove-revoker 128
--remove-sig 129
--remove-subkey 129
--remove-userid 130
--revoke 130
--revoke-sig 131
--revoke-subkey 132
--send-shares 132
--set-expiration-date 133
--set-key-flag 133
--set-preferred-ciphers 134
--set-preferred-compression-algorithms 134
--set-preferred-email-encodings 135
--set-preferred-hashes 136
--set-preferred-keyserver 136
--set-primary-userid 137
--set-trust 137
--sign-key 138
--sign-userid 139
--split-key 140
v
PGP® Command Line 10.0 Contents
Working with Email 145
Overview 145
Encrypt Email 147
Sign Email 148
Decrypt Email 148
Verify Email 149
Annotate Email 149
Working with a PGP Key Management Server 151
Overview 152
New Terms and Concepts 152
Relationship with a PGP KMS 153
Authentication for PGP KMS Operations 153
--create-mak 155
--import-mak 156
--export-mak 157
--export-mak-pair 157
--request-cert 158
--edit-mak 159
--search-mak 160
--delete-mak 161
--create-mek-series 161
--edit-mek-series 162
--search-mek-series 163
--delete-mek-series 164
--create-mek 165
--import-mek 165
--export-mek 166
--edit-mek 167
--search-mek 168
--create-msd 168
--export-msd 169
--edit-msd 170
--search-msd 171
--delete-msd 172
--create-consumer 172
--search-consumer 173
Miscellaneous Commands 175
Overview 175
Commands 176
--create-keyrings 176
--help (-h) 177
--license-authorize 177
vi
PGP® Command Line 10.0 Contents
--purge-all-caches 177
--purge-keyring-cache 177
--purge-passphrase-cache 178
--speed-test 178
--version 178
--wipe 179
--check-sigs 180
--check-userids 180
Options 183
Using Options 183
Boolean Options 184
--alternate-format 184
--annotate 184
--archive 185
--banner 186
--biometric 186
--buffered-stdio 186
--compress, --compression 187
--details 187
--email 188
--encrypt-to-self 188
--eyes-only 188
--fast-key-gen 189
--fips-mode, --fips 189
--force (-f) 189
--halt-on-error 190
--keyring-cache 190
--large-keyrings 190
--license-recover 191
--local-mode 191
--marginal-as-valid 191
--master-key 192
--pass-through 192
--passphrase-cache 192
--photo 192
--quiet (-q) 193
--recursive 193
--reverse-sort, --reverse 193
--sda 193
--skep 194
--text-mode, --text (-t) 194
--truncate-passphrase 195
--verbose (-v) 195
--warn-adk 195
--wrapper-key 196
--xml 196
Integer Options 197
vii
PGP® Command Line 10.0 Contents
--3des 197
--aes128, --aes192, --aes256 197
--bits, --encryption-bits 198
--blowfish 198
--bzip2 199
--cast5 199
--creation-days 199
--expiration-days 200
--idea 200
--index 200
--keyring-cache-timeout 201
--keyserver-timeout 201
--md5 202
--passphrase-cache-timeout 202
--partitioned 202
--pgp-mime 203
--ripemd160 203
--sha, --sha256, --sha384, --sha512 204
--signing-bits 205
--skep-timeout 205
--threshold 205
--trust-depth 206
--twofish 206
--wipe-input-passes 206
--wipe-overwrite-passes 207
--wipe-passes 207
--wipe-temp-passes 207
--zip 207
--zlib 208
Enumeration Options 208
--auto-import-keys 208
--cipher 209
--compression-algorithm 209
--compression-level 210
--email-encoding 210
--enforce-adk 211
--export-format 211
--hash 212
--import-format 213
--input-cleanup 213
--key-flag 214
--key-type 215
--manual-import-key-pairs 215
--manual-import-keys 215
--overwrite 216
--sig-type 216
--sort-order, --sort 216
--tar-cache-cleanup 217
--target-platform 218
viii
PGP® Command Line 10.0 Contents
--temp-cleanup 218
--trust 218
String Options 219
--city, --common-name, --contact-email, --country 219
--comment 219
--creation-date 219
--default-key 220
--expiration-date 220
--export-passphrase 221
--home-dir 221
--local-user (-u), --user 221
--license-name, --license-number, --license-organization, --license-email 222
--new-passphrase 223
--organization, --organizational-unit 223
--output (-o) 223
--output-file 224
--passphrase 224
--preferred-keyserver 224
--private-keyring 225
--proxy-passphrase, --proxy-server, --proxy-username 225
--public-keyring 226
--recon-server 226
--regular-expression 226
--random-seed 227
--root-path 227
--share-server 227
--state 227
--status-file 228
--symmetric-passphrase 228
--temp-dir 229
List Options 229
--additional-recipient 229
--adk 229
--input (-i) 230
--question / --answer 230
--keyserver 231
--recipient (-r) 231
--revoker 232
--share 232
File Descriptors 233
--auth-passphrase-fd, auth-passphrase-fd8 233
--export-passphrase-fd, --export-passphrase-fd8 234
--new-passphrase-fd, --new-passphrase-fd8 234
--passphrase-fd, --passphrase-fd8 234
--proxy-passphrase-fd, --proxy-passphrase-fd8 234
--symmetric-passphrase-fd, --symmetric-passphrase-fd8 235
ix
PGP® Command Line 10.0 Contents
Lists 237
Basic Key List 237
The Default Key Column 238
The Algorithm Column 238
The Type Column 239
The Size/Type Column 239
The Flags Column 240
The Key ID Column 241
The User ID Column 242
Detailed Key List 242
Main Key Details 244
Subkey Details 251
ADK Details 253
Revoker Details 253
Key List in XML Format 254
Elements with fixed settings 258
X.509 Signatures 260
Detailed Signature List 261
Usage Scenarios 267
Secure Off-Site Backup 267
PGP Command Line and PGP Desktop 268
Compression Saves Money 268
Surpasses Legal Requirements 269
Quick Reference 271
Commands 271
Options 275
Environment Variables 280
Configuration File Variables 280
Codes and Messages 283
Messages Without Codes 283
Messages With Codes 284
Parser 284
Keyrings 285
Wipe 286
Encrypt 287
Sign 287
Decrypt 287
Speed Test 288
Key edit 288
Keyserver 295
x
PGP® Command Line 10.0 Contents
Key Reconstruction 296
Licensing 297
PGP Universal Server 298
General 298
Exit Codes 307
Frequently Asked Questions 309
Key Used for Encryption 309
"Invalid" Keys 310
Maximum File Size 311
Programming and Scripting Languages 312
File Redirection 312
Protecting Passphrases 312
Searching for Data on a PGP KMS 315
Overview 315
Keyword Listing 316
Example Searches 318
More About Types 319
Time Fields 319
Boolean Values 319
Open PGP Algorithms 319
Open PGP Key Usage Flags 320
Key Modes 320
Index 321
1
This chapter describes some important PGP Command Line concepts and gives
you a high-level overview of the things you need to do to set up and use PGP
Command Line.
In This Chapter
Important Concepts................................................................................... 1
Getting Started .......................................................................................... 2
Important Concepts
The following concepts are important for you to understand:
PGP Command Line: A software product from PGP Corporation that
automates the processes of encrypting/signing, decrypting/verifying, and
file wiping; it provides a command-line interface to PGP technology.
command-line interface: An interface where you type commands at a
command prompt. PGP Command Line uses a command-line interface.
keyboard input: PGP Command Line was designed so that all relevant
information can be entered at the command line, thus requiring no further
input from the keyboard to implement the commands.
scripting: PGP Command Line commands can be easily inserted into
scripts to be used for automating tasks. For example, if your company
regularly copies a large database to an off-site backup and then stores it
there, PGP Command Line commands can be added to the script that does
this so that the database is encrypted before it is transmitted to the off-site
location and then decrypted when it arrives. PGP Command Line
commands are easily added to shell scripts or scripts written with scripting
languages (such as Perl or Python, for example).
environment variables: Environment variables control various aspects of
PGP Command Line behavior; for example, the location of the PGP
Command Line home directory. Environment variables are established on
the computer running PGP Command Line.
1
PGP Command Line Basics
2
PGP® Command Line 10.0 PGP Command Line Basics
configuration file variables: When PGP Command Line starts, it reads the
configuration file, which includes special configuration variables and values
for each variable. These settings affect how PGP Command Line operates.
Configuration file variables can be changed permanently by editing the
configuration file or overridden on a temporary basis by specifying a value
for a configuration file variable on the command line.
Self-Decrypting Archives (SDAs): PGP Command Line lets you create
SDAs, compressed and conventionally encrypted archives that require a
passphrase to decrypt. SDAs contain an executable for the target platform,
which means the recipient of an SDA does not need to have any PGP
software installed to open the archive. You can thus securely transfer data
to recipients with no PGP software installed. You will have to communicate
the passphrase of the SDA to the recipient, however.
Additional Decryption Key (ADK): PGP Command Line supports the use
of an ADK, which is an additional key to which files or messages are
encrypted, thus allowing the keeper of the ADK to retrieve data or
messages as well as the intended recipient. Use of an ADK ensures that
your corporation has access to all its proprietary information even if
employee keys are lost or become unavailable.
PGP Zip archives: The PGP Zip feature lets you encrypt/sign groups of files
or entire directories into a single compressed archive file. The archive
format is tar and the supported compression formats are Zip, BZip2, and
Zlib.
Getting Started
Now that you know a little bit about PGP Command Line, let’s go deeper into
what you need to do to get started using it:
1 Install PGP Command Line. Specific instructions for installing PGP
Command Line on the supported platforms are in Installation.
2 License the software. PGP Command Line functionality is extremely
limited until you license the software. Refer to Licensing for more
information.
3 Create your default key pair. Most PGP Command Line operations require
a key pair (a private key and a public key). Refer to Creating Your Keypair for
more information.
4 Protect your private key. Because your private key can decrypt your
protected data, it is important that you protect it. Do not write down or tell
someone the passphrase. It is a good idea to keep your private key on a
machine that only you can access, and in a directory that is not accessible
from the network. Also, you should make a backup of the private key and
store it in a secure location. Refer to Protecting Your Private Key for more
information.
3
PGP® Command Line 10.0 PGP Command Line Basics
5 Exchange public keys with others. In order to encrypt data to someone
you need their public key; and they need yours to encrypt data to you. Refer
to Getting the Public Keys of Others for more information about how to
obtain public keys.
6 Verify the public keys you get from the keyserver. Once you have a
copy of someone’s public key, you add it to your public keyring. When you
get someone’s public key, you should make sure that it has not been
tampered with and that it really belongs to the purported owner. You do
this by comparing the unique fingerprint on your copy of someone’s public
key to the fingerprint on that person’s original key. For more information
about validity and trust, refer to An Introduction to Cryptography (it was put
onto your computer during installation). For instructions how to verify
someone’s public key, see --fingerprint (page 80).
7 Start securing your data. After you have generated your key pair and have
obtained public keys, you can begin encrypting, signing, decrypting, and
verifying your data.
5
This chapter lists the system requirements for, and tells you how to install PGP
Command Line onto, the six supported platforms: AIX, HP-UX, Mac OS X, Linux,
Solaris, and Windows. It also includes uninstall instructions.
In This Chapter
Overview....................................................................................................5
System Requirements ...............................................................................6
Installing on AIX .......................................................................................11
Installing on HP-UX ..................................................................................13
Installing on Mac OS X.............................................................................15
Installing on Red Hat Enterprise Linux or Fedora Core............................17
Installing on Solaris ..................................................................................19
Installing on Windows..............................................................................21
Overview
PGP Command Line can be installed on these platforms:
Windows 7 (32- and 64-bit), Windows Vista (32- and 64-bit), Windows
Server 2003 (SP 1), Windows XP (32- and 64-bit), Windows 2000 (SP 4)
HP-UX 11i and above (PA-RISC and Itanium)
IBM AIX 5.3 and 6.1
RedHat Enterprise Linux 3.0 and above (x86 only and x86_64)
Fedora Core 3 and above (x86_64 only)
Sun Solaris 9 (SPARC only) and Solaris 10 (SPARC, x86, and x86_64
Apple Mac OS X 10.5.x and 10.6.x (Intel-based systems only)
PGP Command Line uses a specific directory for the application data such as the
configuration file, and a specific directory (called the home directory) for the files
it creates, such as keyring files.
On any UNIX system, the application data and the home directory are identical
and they are configured through the $HOME environment variable. For more
information, refer to the installation instructions for the specific UNIX platform.
2
Installation
6
PGP® Command Line 10.0 Installation
On Windows, the application data directory is used to store data such as the
configuration file PGPprefs.xml. The home directory is called “My
Documents” and is used to store keys. These two directories can be named
differently, depending on the specific version on Windows. For more
information, see To Install on Windows (on page 21).
Note: You can also use the --home-dir option on the command line to
specify a different home directory. Using this option affects only the
command it is used in and does not change the PGP_HOME_DIR
environment variable.
Using --home-dir on the command line overrides the current setting of the
PGP_HOME_DIR environment variable.
System Requirements
In general, system requirements for PGP Command Line are the same as the
system requirements for the host operating system.
In addition to the hard drive space required by the base operating system, PGP
Command Line requires additional space for both the data on which
cryptographic operations (such as encryption, decryption, signing, and verifying)
will be applied and temporary files created in the process of performing those
operations.
For a given file being encrypted or decrypted, PGP Command Line can require
several times the size of the original file in free hard drive space (depending on
how much the file was compressed), enough to hold both the original file or files
and the final file resulting from the encryption or decryption operation.
In cases where PGP Zip functionality is used on a file, PGP Command Line may
also require several times the size of the original file or files in free hard drive
space, enough to hold the original file, a temporary file created when handling
the archive, and the final file resulting from the encryption or decryption
operation. Make sure you have adequate free hard drive space on your system
before using PGP Command Line.
Windows 7 and Vista
Component Requirement
Computer
and
processor
PC with 1 GHz 32-bit (x86) processor
Memory 1 gigabyte (GB) of RAM or higher recommended (64 MB
minimum supported; may limit performance and some
features)
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339

PGP Command Line 10.0 User guide

Category
Software
Type
User guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI