PG P Win Users Guide
PG P Win Users Guide
Users Guide
Version 7.0
Copyright 1990-2001 Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. PGP*, Version 7.0.3 01-2001. Printed in the United States of America. PGP, Pretty Good, and Pretty Good Privacy are registered trademarks of Network Associates, Inc. and/or its Affiliated Companies in the US and other countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners. Portions of this software may use public key algorithms described in U.S. Patent numbers 4,200,770, 4,218,582, 4,405,829, and 4,424,414, licensed exclusively by Public Key Partners; the IDEA(tm) cryptographic cipher described in U.S. patent number 5,214,703, licensed from Ascom Tech AG; and the Northern Telecom Ltd., CAST Encryption Algorithm, licensed from Northern Telecom, Ltd. IDEA is a trademark of Ascom Tech AG. Network Associates Inc. may have patents and/or pending patent applications covering subject matter in this software or its documentation; the furnishing of this software or documentation does not give you any license to these patents. The compression code in PGP is by Mark Adler and Jean-Loup Gailly, used with permission from the free Info-ZIP implementation. LDAP software provided courtesy University of Michigan at Ann Arbor, Copyright 1992-1996 Regents of the University of Michigan. All rights reserved. This product includes software developed by the Apache Group for use in the Apache HTTP server project (http://www.apache.org/).Balloon help support courtesy of James W. Walker. Copyright 1995-1999 The Apache Group. All rights reserved. See text files included with the software or the PGP web site for further information. This software is based in part on the work of the Independent JPEG Group. Soft TEMPEST font courtesy of Ross Anderson and Marcus Kuhn. Biometric word list for fingerprint verification courtesy of Patrick Juola. The software provided with this documentation is licensed to you for your individual use under the terms of the End User License Agreement and Limited Warranty provided with the software. The information in this document is subject to change without notice. Network Associates Inc. does not warrant that the information meets you requirements or that the information is free of errors. The information may include technical inaccuracies or typographical errors. Changes may be made to the information and incorporated in new editions of this document, if and when made available by Network Associates Inc. Export of this software and documentation may be subject to compliance with the rules and regulations promulgated from time to time by the Bureau of Export Administration, United States Department of Commerce, which restrict the export and re-export of certain products and technical data.
Network Associates, Inc. 3965 Freedom Circle Santa Clara, CA 95054 (972) 308-9960 main http://www.nai.com
* is sometimes used instead of the for registered trademarks to protect marks registered outside of the U.S.
LIMITED WARRANTY Limited Warranty. Network Associates Inc. warrants that the Software Product will perform substantially in accordance with the accompanying written materials for a period of sixty (60) days from the date of original purchase. To the extent allowed by applicable law, implied warranties on the Software Product, if any, are limited to such sixty (60) day period. Some jurisdictions do not allow limitations on duration of an implied warranty, so the above limitation may not apply to you. Customer Remedies. Network Associates Incs and its suppliers entire liability and your exclusive remedy shall be, at Network Associates Incs option, either (a) return of the purchase price paid for the license, if any or (b) repair or replacement of the Software Product that does not meet Network Associates Incs limited warranty and which is returned at your expense to Network Associates Inc. with a copy of your receipt. This limited warranty is void if failure of the Software Product has resulted from accident, abuse, or misapplication. Any repaired or replacement Software Product will be warranted for the remainder of the original warranty period or thirty (30) days, whichever is longer. Outside the United States, neither these remedies nor any product support services offered by Network Associates Inc. are available without proof of purchase from an authorized international source and may not be available from Network Associates Inc. to the extent they subject to restrictions under U.S. export control laws and regulations. NO OTHER WARRANTIES. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, AND EXCEPT FOR THE LIMITED WARRANTIES SET FORTH HEREIN, THE SOFTWARE AND DOCUMENTATION ARE PROVIDED AS IS AND NETWORK ASSOCIATES, INC. AND ITS SUPPLIERS DISCLAIM ALL OTHER WARRANTIES AND CONDITIONS, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, CONFORMANCE WITH DESCRIPTION, TITLE AND NON-INFRINGEMENT OF THIRD PARTY RIGHTS, AND THE PROVISION OF OR FAILURE TO PROVIDE SUPPORT SERVICES. THIS LIMITED WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHERS, WHICH VARY FROM JURISDICTION TO JURISDICTION. LIMITATION OF LIABILITY. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL NETWORK ASSOCIATES, INC. OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL OR EXEMPLARY DAMAGES OR LOST PROFITS WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR ANY OTHER PECUNIARY LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE PRODUCT OR THE FAILURE TO PROVIDE SUPPORT SERVICES, EVEN IF NETWORK ASSOCIATES, INC. HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN ANY CASE, NETWORK ASSOCIATES, INCS CUMULATIVE AND ENTIRE LIABILITY TO YOU OR ANY OTHER PARTY FOR ANY LOSS OR DAMAGES RESULTING FROM ANY CLAIMS, DEMANDS OR ACTIONS ARISING OUT OF OR RELATING TO THIS AGREEMENT SHALL NOT EXCEED THE PURCHASE PRICE PAID FOR THIS LICENSE. BECAUSE SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY, THE ABOVE LIMITATIONS MAY NOT APPLY TO YOU.
Table of Contents
Part I: Overview
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Organization of this Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 How to contact PGP Security and Network Associates . . . . . . . . . . . . . . . . .16 Customer service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Network Associates training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Comments and feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 Recommended readings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 The history of cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 Technical aspects of cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 Politics of cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 Network security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Users Guide
Table of Contents
Table of Contents
Disabling and enabling keys on your PGP keyring . . . . . . . . . . . .59 Examining and setting key properties . . . . . . . . . . . . . . . . . . . . . . . . . . .60 General key properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60 Subkeys properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70 Designated revoker properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73 Additional Decryption Key properties . . . . . . . . . . . . . . . . . . . . . . .75 Adding an X.509 certificate to your PGP key . . . . . . . . . . . . . . . . . . . . . .76 Splitting and rejoining keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81 Creating a split key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81 Rejoining split keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83 Updating your key on a key server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88 Reconstructing your key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
Table of Contents
PGP Freeware
Table of Contents
Table of Contents
Setting VPN options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .185 Setting automatic key renewal values . . . . . . . . . . . . . . . . . . . . . .187 Setting VPN authentication options . . . . . . . . . . . . . . . . . . . . . . . . . . . .188 Setting VPN advanced options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190 Adding and removing Allowed Remote proposals . . . . . . . . . . . .195 Working with IKE and IPsec proposals . . . . . . . . . . . . . . . . . . . . .195
10
PGP Freeware
Part I: Overview
Preface
PGP is part of your organizations security toolkit for protecting one of your most important assets: information. Corporations have traditionally put locks on their doors and file cabinets and require employees to show identification to prove that they are permitted access into various parts of the business site. PGP is a valuable tool to help you protect the security and integrity of your organizations data and messages. For many companies, loss of confidentiality means loss of business. This guide describes how to use PGP Freeware for Windows 95, 98, 2000, Windows NT, and Windows Millennium. PGP Freeware (also referred to in this document simply as PGP) has many new features, which are described in the ReadMe.txt file that accompanies the product. NOTE: If you are new to cryptography and would like an overview of the terminology and concepts you will encounter while using PGP, see An Introduction to Cryptography, which is included with the product.
Users Guide
13
Preface
Part II, Working With Keys This section introduces the important concept of keys, which are fundamental to data encryption. Part II includes the following chapters: Chapter 3, Making and Exchanging Keys, explains the concept of a data encryption key and describes how you create, protect, exchange, and validate keys. Chapter 4, Managing Keys, provides you with more details of key maintenance, including managing your keyring, examining and changing key properties, creating split keys.
Part III Securing Your Files and Communications This section explains how to use your data encryption keys to secure data that you send from or store on your computer. Part III includes the following chapters: Chapter 5, Securing Email, describes how to send encrypted email, and how to decrypt and verify email you receive. Chapter 6, Securing Files, describes how to use PGP to securely maintain files, either for email or for storage on your computer. Chapter 7, Securing Instant Messages,describes how you can use PGPs plug-in for ICQan application for real-time communication over the Internetto secure your instant messages.
14
PGP Freeware
Preface
Part IV, Securing Your Network Communications with PGPnet This section describes the features of PGPnet, a PGP tool that enables you to create Virtual Private Networks (VPNs) with trusted users not directly connected to your network. The chapters of Part IV also guide you through configuring the features of PGPnet to customize the security of your workstation. Part IV includes the following chapters: Chapter 8, PGPnet Basics, gives you an overview of Virtual Private Networks. Chapter 9, A Quick Tour of PGPnet, introduces you to aspects of PGPs user interface that are related to PGPnet. Chapter 10, Configuring PGPnets VPN Feature, describes how to use PGPnet to set up and customize a Virtual Private Network (VPN).
Part V, Appendices and Glossary This section includes information on how to further customize PGP on your computer, as well as troubleshooting tips should you encounter problems using PGP. A Glossary is included as a convenient reference spot where you will find definitions of terms related to network security. Part V includes the following appendices: Appendix A, Setting Options, explains how to use the Options dialog box to create a version of PGP on your computer that best suits your needs. Appendix B, Troubleshooting PGP, guides you in solving problems you may encounter when using PGP. Appendix C, Troubleshooting PGPnet, guides you in solving problems you may encounter when using PGPs PGPnet feature. Appendix D, Transferring Files Between the MacOS and Windows, explains how PGP translates files that are sent between two systems when one system operates using a Mac operating system (OS) and the other system operates using a Windows OS. Appendix E, Biometric Word Lists, explains biometric word lists and how they are used by PGP. Glossary, page 219, provides you with definitions for many terms related to PGP and network security.
Users Guide
15
Preface
Technical support
Network Associates does not provide technical support for freeware products.
16
PGP Freeware
Preface
Recommended readings
This section identifies Web sites, books, and periodicals about the history, technical aspects, and politics of cryptography, as well as trusted PGP download sites.
Users Guide
17
Preface
18
PGP Freeware
Preface
Politics of cryptography
Web sites
www.epic.orgElectronic Privacy Information Center. www.crypto.orgInternet Privacy Coalition. www.eff.orgElectronic Frontier Foundation. www.privacy.orgThe Privacy Page. Great information resource about privacy issues. www.cdt.orgCenter for Democracy and Technology. www.pgp.com/philPhil Zimmermanns home page, his Senate testimony, and so on.
Books
Privacy on the Line: The Politics of Wiretapping and Encryption, Whitfield Diffie and Susan Landau, The MIT Press, 1998, ISBN 0-262-04167-7. This book is a discussion of the history and policy surrounding cryptography and communications security. It is an excellent read, even for beginners and non-technical people. Includes information that even a lot of experts dont know. Technology and Privacy: The New Landscape, Philip Agre and Marc Rotenberg, The MIT Press, 1997;ISBN 0-262-01162-x. Building in Big Brother, The Cryptographic Policy Debate, edited by Lance Hoffman, Springer-Verlag, 1995; ISBN 0-387-94441-9. The Official PGP Users Guide, Philip Zimmermann, The MIT Press, 1995; ISBN 0-262-74017-6. How to use PGP, written in Phils own words. The Code Book: The Evolution of Secrecy from Ancient Egypt to Quantum Cryptography, Simon Singh, Doubleday & Company, Inc., September 2000; ISBN: 0385495323. This book is an excellent primer for those wishing to understand how the human need for privacy has manifested itself through cryptography.
Users Guide
19
Preface
Network security
Books
Building Internet Firewalls, Elizabeth D. Zwicky, D. Brent Chapman, Simon Cooper, and Deborah Russell (Editor), OReilly & Associates, Inc., 2000; ISBN: 1565928717. This book is a practical guide to designing, building, and maintaining firewalls. Firewalls and Internet Security: Repelling the Wily Hacker, William R. Cheswick, Steven M. Bellovin, Addison Wesley Longman, Inc., 1994; ISBN: 0201633574. This book is a practical guide to protecting networks from hacker attacks through the Internet. Hacking Exposed: Network Security Secrets and Solutions, Stuart McClure, Joel Scambray, and George Kurtz, The McGraw-Hill Companies, 1999; ISBN: 0072121270. The state of the art in breaking into computers and networks, as viewed from the vantage point of the attacker and the defender.
20
PGP Freeware
PGP Basics
This chapter provides you with an overview of how PGP Freeware fits into the larger security structure of your organization and how PGP Freeware strengthens that security structure. PGPs features are outlined, and you will get a quick look at the procedures you normally follow in the course of using PGP.
Users Guide
21
PGP Basics
PGP features
PGP offers several features and utilities to help you secure your email, files, disk, and network traffic with encryption and authentication. Here is what you can do with PGP: Encrypt/sign and decrypt/verify within any application. With the PGP menus and email plug-ins, you can access PGP functions while in any application. To learn how to access PGP, see Chapter 2, A Quick Tour of PGP. To learn how to encrypt/sign and decrypt/verify, see Part III: Securing Your Files and Communications. Create and manage keys. Use PGPkeys to create, view, and maintain your own PGP key pair as well as any public keys of other users that you have added to your public keyring. To learn how to create a key pair, see Chapter 3, Making and Exchanging Keys. To learn about managing your keys, see Chapter 4, Managing Keys. Create self-decrypting archives (SDAs). You can create self-decrypting executable files that anyone can decrypt with the proper password. This feature is especially convenient for sending encrypted files to people who do not have PGP installed. For more information about SDAs, see Chapter 6, Securing Files. Permanently erase files, folders, and free disk space. You can use the PGP Wipe utility to thoroughly delete your sensitive files and folders without leaving fragments of their data behind. You can also use PGP Free Space Wiper to erase the free disk space on your hard drive that contains data from previously deleted files and programs. Both utilities ensure that your deleted data is unrecoverable. To learn about file, folder, and free space wiping, see Permanently erasing files and free disk space on page 110. Secure network traffic. You can use PGPnet, a Virtual Private Network (VPN), to communicate securely and economically with other PGPnet users over the internet. To learn more about PGPnet and its components, see Part IV: Securing Your Network Communications with PGPnet.
22
PGP Freeware
PGP Basics
For more information about creating a private and public key pair, refer to Making a key pair on page 34. 3. Exchange public keys with others. After you have created a key pair, you can begin corresponding with other PGP users. You will need a copy of their public key and they will need yours. Your public key is just a block of text, so its quite easy to trade keys with someone. You can include your public key in an email message, copy it to a file, or post it on a public or corporate key server where anyone can get a copy when he or she needs it. For more information about exchanging public keys, refer to Exchanging public keys with others on page 45. 4.Validate public keys. Once you have a copy of someones public key, you can add it to your public keyring. You should then check to make sure that the key has not been tampered with and that it really belongs to the purported owner. You do this by comparing the unique fingerprint on your copy of someones public key to the fingerprint on that persons original key. When you are sure that you have a valid public key, you sign it to indicate that you feel the key is safe to use. In addition, you can grant the owner of the key a level of trust indicating how much confidence you have in that person to vouch for the authenticity of someone elses public key.
Users Guide
23
PGP Basics
For more information about validating your keys, refer to Verifying the authenticity of a key on page 50. 5. Start securing your email and files. After you have generated your key pair and have exchanged public keys, you can begin encrypting, signing, decrypting and verifying your email messages and files. To perform a PGP task, you must select the file or email message that you want to secure and then choose your task (Encrypt, Sign, Decrypt, or Verify) from a PGP menu. PGP menus are available from most applications. To learn how to access a PGP menu, see Chapter 2, A Quick Tour of PGP. For detailed instructions about securing email and files, refer to Part III: Securing Your Files and Communications. For more information about securing your network communications, refer to Part IV: Securing Your Network Communications with PGPnet. 6. Wipe files. When you need to permanently delete a file, you can use the Wipe feature to ensure that the file is unrecoverable. The file is immediately overwritten so that it cannot be retrieved using disk recovery software. For more information about wiping files, refer to Permanently erasing files and free disk space on page 110.
24
PGP Freeware
The way in which you access PGP largely depends on your preferencewhat is easiest at the time. PGP works on the data generated by other applications. Therefore, the appropriate PGP functions are designed to be immediately available to you based on the task you are performing at any given moment.
Start menu
You can start many of the PGP utilities (PGPkeys, PGPtools, PGPtray, PGPnet, and PGP Documentation) from the Start menu (as shown in Figure 2-1, #1). On the Task bar, click the Start button, then click Programs and PGP to access these utilities.
Users Guide 25
PGPtools
If you are using an email application that is not supported by the plug-ins, or if you want to perform PGP functions from within other applications, you can encrypt and sign, decrypt and verify, or securely wipe messages and files directly from PGPtools. You can open PGPtools (as shown in Figure 2-1, #2) from your System tray (as shown in Figure 2-1, #5) or by clicking Start>Programs>PGP>PGPtools.
PGPkeys
encrypt
sign
decrypt/ verify
wipe
Figure 2-2. PGPtools If you are working with text or files, you can encrypt, decrypt, sign, and verify by selecting the text or file and then dragging it onto the appropriate button in PGPtools. If you are working with files, click on the appropriate button in PGPtools to choose a file or select the Clipboard data. When you decrypt a file, a Save As dialog box appears and PGP creates a new plaintext file with a .txt extension; the encrypted file has a .txt.pgp extension.
26
PGP Freeware
PGP has plug-ins for the following email applications: Qualcomm Eudora Microsoft Exchange Microsoft Outlook Microsoft Outlook Express Lotus Notes When a PGP plug-in is installed, Encrypt and Sign buttons appear in your applications toolbar (as shown in Figure 2-1, #3). You click the envelope and lock icon ( ) to indicate that you want to encrypt your message, and the pen and paper icon ( ) to indicate that you want to sign your message. Some applications also have an icon of both a lock and quill, which lets you encrypt and sign at once. For more information about using PGP within email applications, see Chapter 5, Securing Email.
PGPtray
NOTE: You can access many of the main PGP functions by clicking the gray lock icon ( ), which is normally located in the System tray (as shown in Figure 2-1, #5), and then choosing the appropriate menu item.(If you cant find this icon in your System tray, run PGPtray from the Start menu or see Setting general options on page 168 for additional instructions.) This feature gives you immediate access to the PGP functions regardless of which application you are using.
Users Guide
27
NOTE: The look of the PGPtray icon tells you if PGPnet is off or not installed (gray lock on a network), or installed but not working (gray lock on a network with a red X). If you did not install PGPnet, this gray lock icon ( ) will appear in your System tray instead of the PGPnet lock icon. For more information about the lock icons in PGPtray, see PGPtrays icon on page 129.
Taking shortcuts
Although you will find that PGP is quite easy to use, a number of shortcuts are available to help you accomplish your encryption tasks even quicker. For example, while you are managing your keys in the PGPkeys window, you can right-click to perform all the necessary PGP functions rather than accessing them from the menu bar. You can also drag a file containing a key into the PGPkeys window to add it to your keyring. Keyboard shortcuts, or hotkeys, are also available for most menu operations. For information about creating PGP hotkeys, see Setting HotKey options on page 175.
Getting Help
When you choose Help from PGPtray or from the Help menu within PGPkeys, you access the PGP Help system, which provides a general overview and instructions for all of the procedures you are likely to perform. Many of the dialog boxes also have context-sensitive help, which you access by clicking the question mark in the right corner of the window and then pointing to the area of interest on the screen. A short explanation appears.
Users Guide
29
30
PGP Freeware
This chapter describes how to generate the public and private key pairs that you need to correspond with other PGP users. It also explains how to distribute your public key and obtain the public keys of others so that you can begin exchanging private and authenticated email.
Key concepts
PGP is based on a widely accepted and highly trusted public key encryption system, as shown in Figure 3-1, by which you and other PGP users generate a key pair consisting of a private key and a public key. As its name implies, only you have access to your private key, but in order to correspond with other PGP users you need a copy of their public key and they need a copy of yours. You use your private key to sign the email messages and file attachments you send to others and to decrypt the messages and files they send to you. Conversely, you use the public keys of others to send them encrypted email and to verify their digital signatures. public key private key
decryption plaintext
Users Guide
33
IMPORTANT: Although its fun, try not to create more than one key pair unless you need to. When another user wants to send you email, it might confuse them if you have more than one key pair. Also, you might not remember all of the passwords for each key pair.
To create a new key pair: 1. Open PGPkeys. You can open PGPkeys by: Clicking Start>Programs>PGP>PGPkeys Clicking the PGPtray icon ( PGPkeys Clicking ) in the System tray, then selecting
The PGPkeys window (Figure 3-2 on page 35) displays the private and public key pairs you have created for yourself, as well as any public keys of other users that you have added to your public keyring. It is from this window that you will perform all future key management functions.
34
PGP Freeware
The PGP Key Generation Wizard provides some introductory information on the first screen. 3. After you read this information, click Next to advance to the next panel. Click the Expert button if you want to create a custom key. You can choose the type of key to generate, specify a key size, and set an expiration date. If you want to create a custom key, continue with the instructions outlined in To generate a custom key: on page 37. The PGP Key Generation Wizard asks you to enter your name and email address. 4. Enter your name in the Name box and your email address in the Email box. 5. It is not absolutely necessary to enter your real name or even your email address. However, using your real name makes it easier for others to identify you as the owner of your public key. Also, by using your correct email address, you and others can take advantage of the plug-in feature that automatically looks up the appropriate key on your current keyring when you address mail to a particular recipient. Click Next to continue. The PGP Key Generation Wizard asks you to enter a passphrase.
Users Guide
35
6. In the Passphrase dialog box, enter the string of characters or words you want to use to maintain exclusive access to your private key. To confirm your entry, press the TAB key to advance to the next line, then enter the same passphrase again. Normally, as an added level of security, the characters you enter for the passphrase do not appear on the screen. However, if you are sure that no one is watching, and you would like to see the characters of your passphrase as you type, clear the Hide Typing checkbox.
NOTE: Your passphrase should contain multiple words and may include spaces, numbers, and punctuation characters. Choose something that you can remember easily but that others wont be able to guess. The passphrase is case sensitive, meaning that it distinguishes between uppercase and lowercase letters. The longer your passphrase, and the greater the variety of characters it contains, the more secure it is. Strong passphrases include upper and lowercase letters, numbers, punctuation, and spaces but are more likely to be forgotten. See Creating a passphrase that you will remember on page 40, for more information about choosing a passphrase.
WARNING: Unless your administrator has implemented a PGP key reconstruction policy for your company, no one, including Network Associates, can salvage a key with a forgotten passphrase. 7. Click Next to begin the key generation process. The PGP Key Generation Wizard indicates that it is busy generating your key. If you have entered an inadequate passphrase, a warning message appears before the keys are generated and you have the choice of accepting the bad passphrase or entering a more secure one before continuing. For more information about passphrases, see Creating a passphrase that you will remember on page 40. Your mouse movements and keystrokes generate random information that is needed to create a unique key pair. If there is not enough random information upon which to build the key, the PGP Random Data dialog box appears. As instructed in the dialog box, move your mouse around and enter a series of random keystrokes until the progress bar is completely filled in.
36
PGP Freeware
NOTE: PGPkeys continually gathers random data from many sources on the system, including mouse positions, timings, and keystrokes. If the Random Data dialog box does not appear, it indicates that PGP has already collected all the random data that it needs to create the key pair. After the key generation process begins, it may take a while to generate the keys. When the key generation process is complete, the final panel appears. 8. Click Finish. PGP automatically puts your private key on your private keyring and your public key on your public keyring. Once you have created a key pair, you can use PGPkeys to create new key pairs and manage all of your other keys. For instance, this is where you examine the attributes associated with a particular key, specify how confident you are that the key actually belongs to the alleged owner, and indicate how well you trust the owner of the key to vouch for the authenticity of other users keys. For a complete explanation of the key management functions you perform from the PGPkeys window, see Chapter 4.
To generate a custom key: 1. Follow steps 1 - 2 in To create a new key pair: on page 34. 2. At the Key Generation Wizard Welcome screen, click the Expert button to choose the key type, size, and/or an expiration date. The Key Generation Wizard Expert panel appears, as in Figure 3-3 on page 38.
Users Guide
37
Figure 3-3. Key Generation Wizard (Expert Panel) 3. Select a key type from the Key Type box. Choose Diffie-Hellman/DSS if you want to take advantage of many PGP key features including Additional Decryption Key (ADK), designated revoker, multiple encryption subkeys, and photo ID. Choose RSA or RSA Legacy if you plan to correspond with people who are using RSA keys. The RSA key format provides support for PGPs Additional Decryption Key (ADK), designated revoker, multiple encryption subkeys and photo ID features. Previously these features were only available to users with Diffie-Hellman keys. PGP will continue to support users who have RSA keys in the older key format (now called the RSA Legacy key format).
IMPORTANT: The RSA key type is only fully compatible with PGP versions 7.0 and above and other OpenPGP applications. Choose the RSA Legacy key format only if those you communicate with are using older versions of PGP; otherwise choose the new RSA key format. RSA Legacy keys do not support many of the newer PGP key features. 4. Click Next.
38
PGP Freeware
5. In the Key Size box, select a key size from 1024 to 4096 bits for Diffie-Hellman/DSS keys and 1024 to 2048 for RSA keys.
NOTE: A large key size may take a long time to generate, depending on the speed of the computer you are using. The key size corresponds to the number of bits used to construct your digital key. The larger the key, the less chance that someone will be able to crack it, but the longer it takes to perform the decryption and encryption process. You need to strike a balance between the convenience of performing PGP functions quickly with a smaller key and the increased level of security provided by a larger key. Unless you are exchanging extremely sensitive information that is of enough interest that someone would be willing to mount an expensive and time-consuming cryptographic attack in order to read it, you are probably safe using a key composed of 1024 bits.
NOTE: When creating a Diffie-Hellman/DSS key pair, the size of the DSS portion of the key is less than or equal to the size of the Diffie-Hellman portion of the key and is limited to a maximum size of 1024 bits. 6. Indicate when you want your keys to expire. You can either use the default selection, which is Never, or you can enter a specific date after which the keys will expire. Once you create a key pair and have distributed your public key to the world, you will probably continue to use the same keys from that point on. However, under certain conditions you may want to create a special key pair that you plan to use for only a limited period of time. In this case, when the public key expires, it can no longer be used by someone to encrypt mail to you but it can still be used to verify your digital signature. Similarly, when your private key expires, it can still be used to decrypt mail that was sent to you before your public key expired but can no longer be used to sign mail to others. 7. Follow Step 6 through Step 8 on page 36 to complete your key generation. A key pair representing your newly created keys appears in the PGPkeys window. At this point you can examine your keys by checking their properties and the attributes associated with the keys; you may also want to add other email addresses that belong to you. See Changing your key pair on page 41, for details about modifying the information in your key pair.
Users Guide 39
40
PGP Freeware
Users Guide
41
42
PGP Freeware
To send your key to a key reconstruction server: 1. If the Key Reconstruction dialog box opened automatically as you created a key pair, continue with Step 3; otherwise, open PGPkeys and select your key pair. 2. Open the Server/Send To menu and select Reconstruction Server. The Key Reconstruction dialog box appears, as shown in Figure 3-4.
Users Guide
43
3. In the Key Reconstruction dialog box, as shown in Figure 3-4, enter five questions that only you can answer in the Prompt boxes (the default questions are examples only). Choose obscure personal questions with answers that you are not likely to forget. Your questions can be up to 95 characters in length. An example of a good question might be, Who took me to the beach? or Why did Fred leave? An example of a bad question would be, What is my mothers maiden name? or Where did I go to high school?
NOTE: If you prefer, you can also leave the questions blank and simply provide 5 answers. 4. In the Answer boxes, enter the answers to the corresponding questions. Your answers are case sensitive and can be up to 255 characters in length. Use the Hide Answers checkbox to view or hide your answers. 5. Click OK to continue. If the PGP Enter Passphrase for Key dialog box appears, enter the passphrase for your key, then click OK. If the Server User ID and Password dialog box appears, enter your user ID and password to log on to the server. If you do not know your user ID or password, consult your administrator. 6. Click OK. Your private key is then split into five pieces, using Blakely-Shamir key splitting. Three of the five pieces are needed to reconstruct the key. Each piece is then encrypted with the hash, the uniquely identifying number, of one answer. If you know any 3 answers, you can successfully reconstruct the whole key. To learn how to reconstruct your key, see Reconstructing your key on page 90.
44
PGP Freeware
Users Guide
45
To send your public key to a key server: 1. Connect to the Internet. 2. Open PGPkeys. 3. Select the public key to copy to the key server. 4. Open the Server menu, then select the key server on which you want to add your key from the Send To submenu. (The key server at Network Associates is http://keyserver.pgp.com.) PGP lets you know that the keys are successfully copied to the server. Once you place a copy of your public key on a key server, its available to people who want to send you encrypted data or to verify your digital signature. Even if you dont explicitly point people to your public key, they can get a copy by searching the key server for your name or email address. Many people include the Web address for their public key at the end of their email messages. In most cases the recipient can just double-click the address to access a copy of your key on the server. Some people even put their PGP fingerprint on their business cards for easier verification.
To include your public key in an email message: 1. Open PGPkeys. 2. Select your key pair and then choose Copy from the Edit menu. 3. Open the editor you use to compose your email messages, place the cursor in the desired area, and then choose Paste from the Edit menu. In some email applications, you can simply drag your key from PGPkeys into the text of your email message to transfer the key information.
46
PGP Freeware
NOTE: If you are sending your key to colleagues who are using PCs, enter a name of up to eight initial characters and three additional characters for the file type extension (for example, MyKey.txt).
Users Guide
47
To get someones public key from a key server: 1. Open PGPkeys. 2. Choose Search from the Server menu or click the Search button ( PGPkeys. The PGPkeys Search window appears as in Figure 3-5. ) in
3. Choose the server you wish to search from the Search for Keys On menu. 4. Specify your search criteria. You can search for keys on a key server by specifying values for multiple key characteristics. The inverse of most of these operations is also available. For example, you may search using User ID is not Charles as your criteria. 5. Enter the value you want to search for. 6. Click More Choices to add additional criteria to your search; for example, Key IDs with the name Susan created on or before March 5, 1998. 7. To begin the search, click Search. A progress bar appears displaying the status of the search.
NOTE: To cancel a search in progress, click Stop Search. The results of the search appear in the window. 8. To import the keys, drag them to the PGPkeys main window. 9. Click Clear Search to clear your search criteria.
To add a public key from an email message: If you have an email application that is supported by the PGP plug-ins, then click in your email application to extract the senders public key from the email and add it to your public keyring. If you are using an email application that is not supported by the plug-ins, you can add the public key to the keyring by copying the block of text that represents the public key and pasting it into PGPkeys.
Users Guide
49
Importing keys
You can import PGP public keys to your PGP public keyring. Another method for obtaining someones public key is to have that person save it to a file from which you can import it or copy and paste it into your public keyring.
To import a public key: There are three methods of extracting someones public key and adding it to your public keyring: Click on Import from the Keys menu and then navigate to the file where the public key is stored Drag the file containing the public key onto the main PGPkeys window Open the text document where the public key is stored, select the block of text representing the key, and then click on the Edit menu. Go to PGPkeys and choose Paste from the Edit menu to copy the key. The key then shows up as an icon in PGPkeys
50
PGP Freeware
Based on this scenario, you and those with whom you exchange email need a way to determine whether you do indeed have legitimate copies of each others keys. The best way to be completely sure that a public key actually belongs to a particular person is to have the owner copy it to a floppy disk and then physically hand it to you. However, you are seldom close enough to personally hand a disk to someone; you generally exchange public keys via email or get them from a public key server.
In a corporate setting, your corporate Security Officer can act as a trusted introducer, and you may then trust any keys signed by the corporate key to be valid keys. If you work for a large company with several locations, you may have regional introducers, and your Security Officer may be a meta-introducer, or a trusted introducer of trusted introducers.
What is a meta-introducer?
PGP also supports the concept of a meta-introducera trusted introducer of trusted introducers. If you work in a very large company, you might have a regional Security Officer, a trusted introducer, who would sign users keys. You could trust that these keys were valid because the regional Security Officer had performed the actions to ensure validity. The organization may also have a head Security Officer who works with the local Security Officers, so that a person in a West Coast office could trust a person in an East Coast office. This is because both their keys had been signed by their respective regional Security Officers, who in turn had their keys signed by the head Security Officer, who is a meta-introducer. This allows the establishment of a trust hierarchy in the organization.
52
PGP Freeware
Managing Keys
This chapter explains how to examine and manage the keys stored on your keyrings.
Users Guide
53
Managing Keys
54
PGP Freeware
Managing Keys
Keys
A certificate represents an X.509 certificate, a recognized electronic document used to prove identity and public key ownership over a communication network. A clock indicates an expired X.509 certificate. A red X indicates a revoked X.509 certificate. This icon indicates that a photographic user ID accompanies the public key.
Users Guide
55
Managing Keys
Attribute
Description Indicates the level of confidence that the key actually belongs to the alleged owner. The validity is based on who has signed the key and how well you trust the signer(s) to vouch for the authenticity of a key. The public keys you sign yourself have the highest level of validity, based on the assumption that you only sign someones key if you are totally convinced that it is valid. The validity of any other keys, which you have not personally signed, depends on the level of trust you have granted to any other users who have signed the key. If there are no signatures associated with the key, then it is not considered valid, and a message indicating this fact appears whenever you encrypt to the key.
Validity
Validity is indicated by either circle or bar icons, depending upon your Advanced Options Display marginal validity level setting (see Setting advanced options later in this chapter). If not enabled, then validity appears as: a gray circle for invalid keys and marginally valid keys if the Advanced Options Treat marginally valid keys as invalid is set a green circle for valid keys that you do not own a green circle and a user for valid keys that you own In a corporate environment, your security officer may sign users keys with the Corporate Signing Key. Keys signed with the Corporate Signing Key are usually assumed to be completely valid. See Chapter 2, A Quick Tour of PGP, for more information. Shows the number of bits used to construct the key. Generally, the larger the key, the less chance that it will ever be compromised. However, larger keys require slightly more time to encrypt and decrypt data than do smaller keys. When you create a Diffie-Hellman/DSS key, there is one number for the Diffie-Hellman portion and another number for the DSS portion. The DSS portion is used for signing, and the Diffie-Hellman portion for encryption. Describes the type of information displayed in the Keys column: key type, type of ID, or signature type. Shows whether the key has an associated Additional Decryption Key.
Size
Description
Key ID
A unique identifying number associated with each key. This identification number is useful for distinguishing between two keys that share the same user name and email address.
56
PGP Freeware
Managing Keys
Attribute
Description Indicates the level of trust you have granted to the owner of the key to serve as an introducer for the public keys of others. This trust comes into play when you are unable to verify the validity of someones public key for yourself and instead rely on the judgment of other users who have signed the key. When you create a new key pair, these keys are considered implicitly trustworthy, as shown by the striping in the trust and validity bars, or by a green dot and user icon. An empty bar indicates an invalid key or an untrusted user. A half-filled bar indicates a marginally valid key or marginally trusted user. A striped bar indicates a valid key that you own and is implicitly trusted, regardless of the signatures on the key. A full bar indicates a completely valid key or a completely trusted user. When a public key on your keyring is signed by another user, the level of authenticity for that key is based on the trust you have granted to the signer. Use the Key Properties dialog box to assign the signer a level of trustTrusted, Marginal, or Untrusted. Shows the date when the key will expire. Most keys are set to Never; however, there may be instances when the owner of a key wants it to be used for only a fixed period of time. A single key with a clock icon represents a public key or key pair that has expired. Shows the date when the key was originally created. You can sometimes make an assumption about the validity of a key based on how long it has been in circulation. If the key has been in use for a while, it is less likely that someone will try to replace it because there are many other copies in circulation. Never rely on creation dates as the sole indicator of validity.
Trust
Expiration
Creation
Users Guide
57
Managing Keys
To specify your default key pair: 1. Open PGPkeys and highlight the key pair you want to designate as your default key. 2. Choose Set Default from the Keys menu. The selected key pair is displayed in bold type, indicating that it is now designated as your default key pair.
58
PGP Freeware
Managing Keys
To delete a key or signature from your PGP keyring: 1. Open PGPkeys and select the key or signature you want to delete. 2. Choose Delete from the Edit menu or click The Confirmation dialog box appears. 3. Click the OK button. in the PGPkeys toolbar.
To disable a key: 1. Open PGPkeys and select the key you want to disable. 2. Select Disable in the Keys menu. The key is dimmed and is temporarily unavailable for use.
To enable a key: 1. Open PGPkeys and select the key you want to enable. 2. Select Enable in the Keys menu. The key becomes visible and can be used as before.
Users Guide
59
Managing Keys
60
PGP Freeware
Managing Keys
Users Guide
61
Managing Keys
To check a public key with its digital fingerprint: 1. Open PGPkeys and select the public key in which you want to verify. 2. Choose Properties from the Keys menu or click Properties dialog box. to open the
The Properties dialog box opens, as shown in Figure 4-2. 3. Use the series of words or characters displayed in the Fingerprint text box to compare with the original fingerprint. By default, a word list is displayed in the Fingerprint text box (example shown in Figure 4-3). However, you can select the Hexadecimal check box to view the fingerprint in 20 hexadecimal characters (example also shown in Figure 4-3).
Hexadecimal view
Figure 4-3. Fingerprint text box The word list in the fingerprint text box is made up of special authentication words that PGP uses and are carefully selected to be phonetically distinct and easy to understand without phonetic ambiguity. The word list serves a similar purpose as the military alphabet, which allows pilots to convey information distinctly over a noisy radio channel. If youd like to know more about the word hash technique and view the word list, see Appendix E, Biometric Word Lists.
62
PGP Freeware
Managing Keys
To sign someones public key: 1. Open PGPkeys and select the public key which you want to sign. 2. Choose Sign from the Keys menu or click dialog box. to open the Sign Keys
The Sign Keys dialog box appears with the public key and fingerprint displayed in the text box. 3. Click the Allow signature to be Exported checkbox, to allow your signature to be exported with this key. An exportable signature is one that is allowed to be sent to servers and travels with the key whenever it is exported, such as by dragging it to an email message. The checkbox provides a shorthand means of indicating that you wish to export your signature. Or Click the More Choices button to configure options, such as signature type and signature expiration (Figure 4-4).
Users Guide
63
Managing Keys
Figure 4-4. PGP Sign Keys dialog box (More Choices) Choose a signature type to sign the public key with. Your choices are: Non-exportable. Use this signature when you believe the key is valid, but you dont want others to rely on your certification. This signature type cannot be sent with the associated key to a key server or exported in any way. Exportable. Use exportable signatures in situations where your signature is sent with the key to the key server, so that others can rely on your signature and trust your keys as a result. This is equivalent to checking the Allow signature to be exported checkbox on the Sign Keys menu. Meta-Introducer Non-Exportable. Certifies that this key and any keys signed by this key with a Trusted Introducer Validity Assertion are fully trusted introducers to you. This signature type is non-exportable. The Maximum Trust Depth option enables you to identify how many levels deep you can nest trusted-introducers. For example, if you set this to 1, there can only be one layer of introducers below the meta-introducer key.
64
PGP Freeware
Managing Keys
Trusted Introducer Exportable. Use this signature in situations where you certify that this key is valid, and that the owner of the key should be completely trusted to vouch for other keys. This signature type is exportable. You can restrict the validation capabilities of the trusted introducer to a particular email domain.
4. If you want to limit the Trusted Introducers key validation capabilities to a single domain, enter the domain name in the Domain Restriction text box. 5. If you want to assign an expiration date to this signature, enter the date on which you want this signature to expire in the Date text box. Otherwise, the signature will never expire. 6. Click OK. The Passphrase dialog box appears. 7. Enter your passphrase, then click OK. An icon associated with your user name is now included with the public key that you just signed.
Users Guide
65
Managing Keys
To grant trust for a key: 1. Open PGPkeys and select the key for which you want to change the trust level.
NOTE: You must sign the key before you can set the trust level for it. If you have not already signed the key, see Validating a public key on page 51 for instructions. 2. Choose Properties from the Keys menu or click Properties dialog box, as shown in Figure 4-2. to open the
3. Use the Trust Level sliding bar to choose the appropriate level of trust for the key pair.
Figure 4-5. Trust Level dialog box 4. Close the dialog box to accept the new setting.
66
PGP Freeware
Managing Keys
To change your passphrase: 1. Open PGPkeys and select the key for which you want to change the passphrase. Choose Properties from the Keys menu or click Properties dialog box. The Properties dialog box appears, as in Figure 4-2. 2. Click Change Passphrase from the General tab. The Passphrase dialog box appears. to open the
NOTE: If you want to change the passphrase for a split key, you must first rejoin the key shares. Click Join to collect the key shares. See Signing and decrypting files with a split key on page 110 for information about collecting key shares. 3. Enter your current passphrase in the space provided, then click OK. The Confirmed Passphrase dialog box appears. 4. Enter your new passphrase in the first text box. Press the TAB key to advance to the next text box and confirm your entry by entering your new passphrase again. 5. Click OK.
WARNING: If you are changing your passphrase because you feel that your passphrase has been compromised, you should wipe all backup keyrings and wipe your freespace.
Users Guide
67
Managing Keys
To add a new user name or address to your key: 1. Open PGPkeys and select the key pair for which you want to add another user name or address. 2. Choose Add/Name from the Keys menu. The PGP New User Name dialog box appears. 3. Enter the new name and email address in the appropriate fields, and then click OK. The PGP Enter Passphrase dialog box appears. 4. Enter your passphrase, then click OK. The new name is added to the end of the user name list associated with the key. If you want to set the new user name and address as the primary identifier for your key, select the name and address and then choose Set as Primary Name from the Keys menu.
IMPORTANT: When you add or change information in your key pair, always update it on the key server so that your most current key can be available to anyone. See Updating your key on a key server on page 88 for instructions.
68
PGP Freeware
Managing Keys
IMPORTANT: Although you can view the photographic ID accompanied with someones key for verification, you should always check and compare the digital fingerprints. See Verifying someones public key on page 61 for more information about authentication.
To add your photograph to your key: 1. Open PGPkeys and select your key pair and then click Add Photo on the Keys menu. The Add Photo dialog box opens. 2. Drag or paste your photograph onto the Add Photo dialog box or browse to it by clicking Select File.
NOTE: The photograph can be from the Clipboard, a .JPG, or .BMP file. For maximum picture quality, crop the picture to 120x144 pixels before adding it to the Add Photo dialog box. If you do not do this, PGP will scale the picture for you. 3. Click OK. The Passphrase dialog box opens. 4. Enter your passphrase in the space provided, then click OK. Your photographic user ID is added to your public key and is listed in the PGPkeys window.
IMPORTANT: When you add or change information in your key pair always update it on the key server so that your most current key can be available to anyone. See Updating your key on a key server on page 88 for instructions.
Users Guide
69
Managing Keys
To replace your photographic ID: 1. Open PGPkeys and select the photograph which is listed under your key.
your photograph
Figure 4-6. PGPkeys (Example: Photographic User ID) 2. Choose Delete from the Edit menu. 3. Add your new photographic ID using the instructions outlined in To add your photograph to your key: on page 69.
Subkeys properties
To access the Subkeys Properties panel for a particular key, select the desired key and then choose Properties from the Keys menu. The Key Properties dialog box appears. Click the Subkeys tab. The Subkeys panel appears as shown in Figure 4-7.
Managing Keys
To create new subkeys: 1. Open PGPkeys and select your key pair, then click Properties from the Keys menu, or click . The Properties dialog box appears. 2. Click the Subkeys tab. The Subkeys dialog box opens, as shown in Figure 4-8 on page 72.
Users Guide
71
Managing Keys
Figure 4-8. PGP key property page (Subkeys dialog box) 3. To create a new subkey, click New. The New Subkey dialog box opens. 4. Enter a key size from 1024 to 3072 bits, or enter a custom key size from 1024 to 4096 bits. 5. Indicate the start date on which you want your subkey to activate. 6. Indicate when you want your subkey to expire. You can either use the default selection, which is Never, or you can enter a specific date after which the subkey will expire.
NOTE: To avoid confusion when maintaining more than one subkey on your key pair, try not to overlap your subkeys start and expiration dates. 7. Click OK. The Passphrase dialog box appears.
72
PGP Freeware
Managing Keys
8. Enter your passphrase and then click OK. Your new subkey is listed in the Subkey window.
IMPORTANT: When you add or change information in your key pair, always update it on the key server so that your most current key can be available to anyone. See Updating your key on a key server on page 88 for instructions.
Users Guide
73
Managing Keys
The Revokers panel lists any keys that have the ability to revoke your PGP key, and provides a convenient means for updating a revokers key with the Update from Server button. If the key belonging to the revoker is not on your keyring, then Unknown Key followed by the keys' key ID displays instead of the user ID. Highlight the key ID, and click the Update from Server button to search for the key on a key server.
NOTE: This feature is available for Diffie-Hellman/DSS and RSA keys. Key revoking is not supported by RSA Legacy keys.
To add a designated revoker to your key: 1. Open PGPkeys and then select the key pair for which you want to add a revoker. 2. Select Add/Revoker from the Keys menu. A dialog box opens and displays a list of keys. 3. Select the key(s) in the User ID list that you want to appoint as a revoker. 4. Click OK. A confirmation dialog box appears.
74 PGP Freeware
Managing Keys
5. Click OK to continue. The Passphrase dialog box appears. 6. Enter your passphrase, then click OK. 7. The selected key(s) is now authorized to revoke your key. For effective key management, distribute a current copy of your key to the revoker(s) or upload your key to the server. See Distributing your public key on page 45 for instructions.
Revoking a key
If the situation ever arises that you no longer trust your personal key pair, you can issue a revocation to the world telling everyone to stop using your public key. The best way to circulate a revoked key is to place it on a public key server.
To revoke a key: 1. Open PGPkeys and select the key pair you want to revoke. 2. Choose Revoke from the Keys menu. The Revocation Confirmation dialog box appears. 3. Click OK to confirm your intent to revoke the selected key. The PGP Enter Passphrase dialog box appears. 4. Enter your passphrase, then click OK. When you revoke a key, it is marked out with a red X to indicate that it is no longer valid. 5. Send the revoked key to the server so everyone will know not to use your old key.
Users Guide
75
Managing Keys
The ADK panel lists all Additional Decryption Keys (ADKs) for the selected key. ADKs are keys that allow the security officers of an organization to decrypt messages that have been sent to or from people within your organization. There are two types of keys: incoming additional decryption keys and outgoing additional decryption keys. NOTE: Although the security officer should not ordinarily use the Additional Decryption keys, there may be circumstances when it is necessary to recover someones email. For example, if someone is injured and out of work for some time or if email records are subpoenaed by a law enforcement agency and the corporation must decrypt mail as evidence for a court case.
NOTE: The instructions in this section describe how to add an X.509 certificate to your key pair if you are using the Net Tools PKI Server. This process varies between Certificate Authorities and some of the terminology you must use when interacting with your CA is a policy decision. You may need to consult your companys PGP or PKI Administrator for instructions. An X.509 digital certificate is a recognized electronic document used to prove identity and public key ownership over a communication network. You can request an X.509 digital certificate and add it to your key pair using PGP menu options and your companys Certificate Authority (CA) or a public CA (for example, VeriSign). There are four main steps to adding an X.509 certificate to your key pair: 1. Retrieve the Root CA certificate from the CA and add it to your PGP keyring (see Step 1). 2. Enter information about the CA in the CA panel in the Options dialog box (see Step 2).
76
PGP Freeware
Managing Keys
3. Request a certificate from the CA. Your X.509 certificate request is verified and signed by the CA (see Step 3). (The CAs signature on the certificate makes it possible to detect any subsequent tampering with the identifying information or the public key, and it implies that the CA considers the information in the certificate valid.) 4. Retrieve the certificate issued by the CA and add it to your key pair (see Step 4). Each of these four steps is described in greater detail in the following sections.
To add an X.509 certificate to your PGP key pair: NOTE: X.509 authentication certificates are not supported in PGP Freeware. 1. Obtain and add the Root CA certificate to your PGP keyring. To do this, follow these steps: a. Open your Web browser and connect to the CAs enrollment site. If you do not know the URL, consult your companys PGP or PKI administrator. b. Locate and examine the Root CA certificate. This process varies between Certificate Authorities. For example, if your company were using the Net Tools PKI Server, you would click the Download a CA Certificate link, and then click the Examine this Certificate button. c. Copy the key block for the Root CA certificate and paste it into your PGPkeys window. The Import Key dialog box appears and imports the Root CA certificate into your keyring. d. Sign the Root CA certificate with your key to make it valid, then open the Key Properties and set the trust level. Trust must be set on the Root CA. 2. Configure CA panel in the Options dialog box. To do this, follow these steps: a. Select Options from the PGPkeys Edit menu, then select the CA tab. The CA panel appears, as shown in Figure 4-10 on page 78.
Users Guide
77
Managing Keys
Figure 4-10. PGP Options dialog box (CA Panel) b. Enter the CAs URL in the Certificate Authority Identification URL field, for example, https://nnn.nnn.nnn.nnn:nnnnn (this is the same URL you used to retrieve the Root CA). c. If there is a separate URL for retrieving certificate revocation lists (CRLs), enter it in the corresponding field. If you do not know the URL for Revocation, leave this field blank or consult your companys PGP or PKI administrator. d. In the Type box, specify the name of certificate authority you are using. Your choices are: Net Tools PKI VeriSign OnSite Entrust iPlanet CMS Windows 2000
78
PGP Freeware
Managing Keys
e. Click the Select Certificate button, then select the Root CA certificate you just retrieved. The Root Certificate text box displays information on the selected root CA certificate. The terminology for the certificate is a policy decision. Typically, the following terminology is true for X.509 certificates.
Term: CN (Common Name) EMAIL OU (Organizational Unit) O (Organization) L (Locality) Description: Often a description of the type of certificate (e.g., Root). The email address for the certificate holder. The organization to which the certificate belongs (e.g.,Accounting). Typically the name of the company to which the certificate belongs (e.g.,Secure Company). The location of the holder of the certificate (e.g., Santa Clara).
f.
Click OK.
3. Make a certificate request. To do this, follow these steps: a. Right-click on your PGP key pair and select Keys>Add>Certificate from the Keys right-click menu. The Certificate Attributes dialog box appears, as shown in Figure 4-11 on page 79.
Users Guide
79
Managing Keys
b. Verify the certificate attributes; use the Add, Edit, and Remove buttons to make any required changes, and click OK. The PGP Enter Passphrase dialog box appears. c. Enter the passphrase for your key pair, then click OK. The PGP Server Progress bar appears. The certificate request is sent to the CA server. The server authenticates itself to your computer and accepts your request. In a corporate setting, your companys PGP or PKI administrator verifies your information in the request. The identifying information and public key are assembled and then digitally signed with the CAs own certificate to create your new certificate. The administrator sends you an email message stating that your certificate is ready for retrieval. 4. Retrieve your certificate and add it to your key pair. In a corporate setting, your certificate may be retrieved and added to your key pair automatically depending on the settings your administrator has configured. In this case, continue with Step c. If you do not have automatic certificate retrieval configured, you can retrieve your certificate and add it to your keyring manually. To do this, follow these steps: a. In PGPkeys, select the PGP key for which you made the certificate request. b. On the Server menu, select Retrieve Certificate. PGP contacts the CA server and automatically retrieves your new X.509 certificate and adds it to your PGP key. c. If you are running PGPnet, set this certificate as your X.509 authentication key in PGPnet (View>Options> Authentication).
IMPORTANT: When you add or change information in your key pair, always update it on the key server so that your most current key can be available to anyone. See Updating your key on a key server on page 88 for instructions.
80
PGP Freeware
Managing Keys
To create a split key with multiple shares: 1. In PGPkeys, create a new key pair or select an existing key pair that you want to split. To learn how to create a new key pair, see Making a key pair on page 34. 2. On the Keys menu, click Share Split. The Share Split dialog box opens. 3. Add shareholders to the key pair by dragging their keys from PGPkeys to the Shareholder list in the Share Split dialog box. To add a shareholder that does not have a public key, click Add in the Share Split dialog box, enter the persons name and then allow the person to type in their passphrase. 4. When all of the shareholders are listed, you can specify the number of key shares that are necessary to decrypt or sign with this key.
Users Guide
81
Managing Keys
In Figure 4-12, for example, the total number of shares that make up the Group Key is four and the total number of shares required to decrypt or sign is three. This provides a buffer in the event that one of the shareholders is unable to provide his or her key share or forgets the passphrase.
Figure 4-12. Share Split dialog box (Example) By default, each shareholder is responsible for one share. To increase the number of shares a shareholder possesses, click the name in the shareholders list to display it in the text field below. Type the new number of key shares or use the arrows to select a new amount. 5. Click Split Key. A dialog box opens and prompts you to select a directory in which to store the shares. 6. Select a location to store the key shares. The Passphrase dialog box appears. 7. Enter the passphrase for the key you want to split and then click OK. A confirmation dialog box opens.
82
PGP Freeware
Managing Keys
8. Click Yes to split the key. The key is split and the shares are saved in the location you specified. Each key share is saved with the shareholders name as the file name and a .shf extension, as shown in the example below:
9. Distribute the key shares to the owners, then delete the local copies. Once a key is split among multiple shareholders, attempting to sign or decrypt with it will cause PGP to automatically attempt to rejoin the key. To learn how to rejoin a split key to sign or decrypt files, see Signing and decrypting files with a split key on page 110.
Users Guide
83
Managing Keys
To rejoin a split key: 1. Contact each shareholder of the split key. To rejoin key shares locally, the shareholders of the key must be present. To collect key shares over the network, ensure that the remote shareholders have PGP installed and are prepared to send their key share file. Remote shareholders must have: their key share files and passwords a key pair (for authentication to the computer that is collecting the key shares) a network connection the IP address or Domain Name of the computer that is collecting the key shares
2. At the rejoining computer, use Windows Explorer to select the file(s) that you want to sign or decrypt with the split key. 3. Right-click on the file(s) and select Sign or Decrypt from the PGP menu. The PGP Enter Passphrase for Selected Key dialog box appears with the split key selected. 4. Click OK to reconstitute the selected key. The Key Share Collection dialog box appears, as shown in Figure 4-13.
84
PGP Freeware
Managing Keys
Figure 4-13. Key Share Collection dialog box 5. Do one of the following: If you are collecting the key shares locally, click Select Share File and then locate the share files associated with the split key. The share files can be collected from the hard drive, a floppy disk, or a mounted drive. Continue with Step 6. If you are collecting key shares over the network, click Start Network. The Passphrase dialog box opens. In the Signing Key box, select the key pair that you want to use for authentication to the remote system and enter the passphrase. Click OK to prepare the computer to receive the key shares. The status of the transaction is displayed in the Network Shares box. When the status changes to Listening, the PGP application is ready to receive the key shares. At this time, the shareholders must send their key shares. To learn how to send key shares to the rejoining computer, see To send your key share over the network: on page 87. When a share is received, the Remote Authentication dialog box appears, as shown in Figure 4-14.
Users Guide
85
Managing Keys
Figure 4-14. Remote Authentication dialog box If you have not signed the key that is being used to authenticate the remote system, the key will be considered invalid. Although you can rejoin the split key with an invalid authenticating key, it is not recommended. You should verify each shareholders fingerprint and sign each shareholders public key to ensure that the authenticating key is legitimate. Click Confirm to accept the share file. 6. Continue collecting key shares until the value for Total Shares Collected matches the value for Total Shares Needed in the Key Shares Collection dialog box. 7. Click OK. The file is signed or decrypted with the split key.
86
PGP Freeware
Managing Keys
To send your key share over the network: 1. When you are contacted by the person who is rejoining the split key, make sure that you have these items: your key share file and password your key pair (for authentication to the computer that is collecting the key shares) a network connection the IP address or Domain Name of the rejoining computer collecting the key shares
2. Select Send Key Shares on the PGPkeys File menu. The Select Share File dialog box appears. 3. Locate your key share and then click Open. The PGP Enter Passphrase dialog box appears. 4. Enter your passphrase and then click OK. The Send Key Shares dialog box appears, as shown in Figure 4-15 on page 87.
Users Guide
87
Managing Keys
5. Enter the IP address or the Domain Name of the rejoining computer in the Remote Address text box, then click Send Shares. The status of the transaction is displayed in the Network Status box. When the status changes to Connected, you are asked to authenticate yourself to the rejoining computer. The Remote Authentication dialog box appears asking you to confirm that the remote computer is the one to whom you want to send your key share. 6. Click Confirm to complete the transaction. After the remote computer receives your key shares and confirms the transaction, a message box appears stating that the shares were successfully sent. 7. Click OK. 8. Click Done in the Key Shares window when you have completed sending your key share.
88
PGP Freeware
Managing Keys
If your Server settings in the Options dialog box are configured to synchronize keys with the key server when you add names/photos/revokers to your key, your key is automatically updated on the server. If, however, your keys do not automatically synchronize with the server, follow the instructions outlined below to manually update your key on the key server. NOTE: When you delete a key, signature, or user name from a key, it is removed and not recoverable. Signatures and user names can be added again to a key, and an imported public key can be imported again to your keyring. However, a private key that exists only on that keyring cannot be created again, and all messages encrypted to its public key copies can no longer be decrypted.
To remove signatures or user names from your key on a key server: IMPORTANT: This procedure is for removing signatures or user names associated with your key on LDAP key servers only. Additionally, the key server must be configured to allow this action. 1. Open PGPkeys. 2. Choose Search from the Server menu or click The PGPkeys Search window appears. 3. Choose the server you want to search from the Search for Keys On menu. 4. Specify your search criteria to locate your public key: The default is User ID, but you can click the arrows to select Key ID, Key Status, Key Type, Key Size, Creation Date, or Expiration Date. For example, you might search for all keys with the User ID of Fred. 5. To begin the search, click Search. The results of the search appear in the window. 6. Right-click on the key that you want to remove from the server, then select Delete from the right-click menu. The Passphrase dialog box appears. 7. Enter the passphrase for the key you want to remove from the server and then click OK. The Confirmation dialog box appears and the key is removed.
Users Guide 89
Managing Keys
8. Update your key (remove the unwanted signatures or user names). 9. Copy the updated key to the server (see Placing your public key on a key server on page 45 for instructions). If the key server is configured to synchronize keys with other key servers, your key will be updated on the other servers automatically upon synchronization.
WARNING: If you delete your key from a key server, you should be aware that someone who has your public key on their keyring can upload it to the server again. You should check the server periodically to see if the key has reappearedyou may have to delete your key from the server more than once.
To reconstruct your key from a reconstruction server: 1. Open PGPkeys, then select the key that you want to reconstruct. 2. Select Reconstruct Key from the Key menu. If the reconstruction server is a PGP key server, the Server User ID and Password dialog box appears. Enter your user ID and password to log on to the server. 3. Click OK. The Key Reconstruction dialog box appears.
90
PGP Freeware
Managing Keys
4. In the Key Reconstruction dialog box, enter answers in the Answer boxes to their corresponding questions. Keep in mind that your answers are case sensitive. You must be able to answer at least three questions to restore your key. You can use the Hide Answers checkbox to view or hide your answers. 5. Click OK to continue. The PGP Enter Confirmed Passphrase dialog box appears. 6. In the Passphrase box, enter a new string of characters or words you want to use as the new passphrase for your new key pair.
NOTE: Your passphrase should contain multiple words and may include spaces, numbers, and punctuation characters. Choose something that you can remember easily but that others wont be able to guess. The passphrase is case sensitive, meaning that it distinguishes between uppercase and lowercase letters. The longer your passphrase, and the greater the variety of characters it contains, the more secure it is. Strong passphrases include upper and lowercase letters, numbers, punctuation, and spaces but are more likely to be forgotten. See Creating a passphrase that you will remember on page 40, for more information about choosing a passphrase. To confirm your entry, press the TAB key to advance to the next line, then enter the same passphrase again. 7. Click OK. Your key pair is reconstituted and appears in PGPkeys.
Users Guide
91
Managing Keys
92
PGP Freeware
Chapter 5: Securing Email Chapter 6: Securing Files Chapter 7: Securing Your Instant Messages
Securing Email
PGP provides the means for you to securely communicate through your email application with the use of the PGP plug-ins and utilities. This chapter explains how to secure email messages you send to others and decrypt and verify the messages others send to you.
PGP/MIME
If you are using an email application with one of the plug-ins that supports the PGP/MIME standard, and you are communicating with another user whose email application also supports this standard, both of you can automatically encrypt and decrypt your email messages and any attached files when you send or retrieve your email. All you have to do is turn on the PGP/MIME encryption and sign functions from the Email panel of the PGP Options dialog box, which can be opened from PGPtray or within PGPkeys. When you receive email from someone who uses the PGP/MIME feature, the mail arrives with an icon in the message window indicating that it is PGP/MIME encoded. To decrypt the text and file attachments in PGP/MIME encapsulated email and to verify any digital signatures, simply click the lock and quill icon. Attachments are still encrypted if PGP/MIME is not used, but the decryption process is usually more involved for the recipient.
Users Guide
95
Securing Email
96
PGP Freeware
Securing Email
Eudora PGP/MIME Auto-decrypt Encrypt HTML Preserve text formatting Encrypt attachments Encrypt/Sign defaults Yes No Yes Yes
Yes
Yes
No
Yes
Yes
Yes
To encrypt and sign with supported email applications: 1. Use your email application to compose your email message as you normally would.
TIP: If you are sending sensitive email, consider leaving your subject line blank or creating a subject line that does not reveal the contents of your encrypted message. 2. When you have finished composing the text of your email message, click the envelope and lock icon ( ) to encrypt the text of your message, then click the paper and pen icon ( ) to sign your message.
NOTE: If you know that you are going to use PGP/MIME regularly, you can leave this feature turned on by selecting the appropriate settings in the Email panel of the Options dialog box.
Users Guide
97
Securing Email
3. Send your message as you normally do. If you have a copy of the public keys for every one of the recipients, the appropriate keys are automatically used. However, if you specify a recipient for whom there is no corresponding public key or one or more of the keys have insufficient validity, the PGP Recipient Selection dialog box appears (Figure 5-1) so that you can specify the correct key. You can force the PGP Recipient Selection dialog box to appear, even if you have a valid copy of the public keys for every one of the recipients, by holding down the SHIFT KEY when you hit SEND. You should do this if you want to use the Secure Viewer or Conventional Encrypt features and you do not want your message to be sent automatically.
Encryption options
Figure 5-1. PGP Recipient Selection window 4. Drag the public keys for those who are to receive a copy of the encrypted email message into the Recipients list box. You can also double-click any of the keys to move it from one area of the screen to the other. The Validity icon indicates the minimum level of confidence that the public keys in the Recipient list are valid. This validity is based on the signatures associated with the key. See Chapter 4, Managing Keys, for details.
98
PGP Freeware
Securing Email
5. You can choose from the following encryption options depending on the type of data you are encrypting: Secure Viewer. Select this option to protect the data from TEMPEST attacks upon decryption. If you select this option, the decrypted data is displayed in a special TEMPEST attack prevention font that is unreadable to radiation capturing equipment, and cannot be saved in decrypted format. For more information about TEMPEST attacks, see the section on vulnerabilities in An Introduction to Cryptography.
NOTE: The Secure Viewer option may not be compatible with previous versions of PGP. Messages encrypted with this option enabled can be decrypted by previous versions of PGP, however this feature may be ignored. Conventional Encrypt. Select this option to use a common passphrase instead of public key encryption. If you select this option, the message is encrypted using a session key, which encrypts (and decrypts) using a passphrase that you will be asked to choose.
6. Click OK to encrypt and sign your mail. If you have elected to sign the encrypted data, the Signing Key Passphrase dialog box appears, requesting your passphrase before the mail is sent. 7. Enter your passphrase and then click OK.
WARNING: If you do not send your email immediately but instead store it in your outbox, you should be aware that when using some email applications the information is not encrypted until the email is actually transmitted. Before queuing encrypted messages you should check to see if your application does in fact encrypt the messages in your outbox. If it does not, you can use PGPtrays Current Window option to encrypt your messages before queuing them in the outbox.
Users Guide
99
Securing Email
To encrypt and sign email without a PGP plug-in: 1. Use your email application to compose your email message as you normally would. TIP: If you are sending sensitive email, consider leaving your subject line blank or creating a subject line that does not reveal the contents of your encrypted message. 2. When you have finished composing the text of your email message, open PGPtray and select Encrypt, Sign, or Encrypt & Sign from the Current Window menu. Encrypted text appears in your email message window. 3. Continue with Step 3 on page 98 to complete your encrypting and signing task.
100
PGP Freeware
Securing Email
Groups window
To create a group (distribution list): 1. Choose New Group from the Groups menu.
Users Guide
101
Securing Email
2. Enter a name for the group distribution list. Optionally, enter a group description. For example, you can name the group [email protected] with a description of All employees. 3. Click OK to create the distribution list. The group distribution list is added to your keyring and can be viewed in the Groups window.
To add members to a distribution list: 1. In the PGPkeys window, select the users or lists you want to add to your distribution list. 2. Drag the users from the PGPkeys window to the desired distribution list in the Groups window.
To add a distribution list to another distribution list: 1. Select the distribution list that you want to add to another list. 2. Drag the selected list into the list to which it will be added.
To delete members from a distribution list: 1. Within the distribution list, select the member to be deleted. 2. Press the DELETE key. PGP asks you to confirm your choice.
To delete a distribution list: 1. Select the distribution list to be deleted from the Groups window. 2. Press the DELETE key.
102
PGP Freeware
Securing Email
To send encrypted and signed email to a distribution list: 1. Address the mail to your mail distribution list. The name of your encryption distribution list must correspond to the name of the email distribution list. 2. Use your email application to compose your email message just as you normally would. 3. When you have finished composing the text of your email message, open PGPtray and select Encrypt, Sign, or Encrypt & Sign from the Current Window menu. The PGP Key Recipients dialog box appears (Figure 5-1). Select the recipients public keys for the text you are encrypting or signing. The options available are described in To encrypt and sign with supported email applications: on page 97. 4. Send the message.
Users Guide
103
Securing Email
If you are using an email application that is not supported by the PGP plug-ins, you will decrypt and verify your email messages via PGPtray. In addition, if your email includes encrypted file attachments, you must decrypt them separately via PGPtools or PGPtray.
To decrypt and verify from supported email applications: 1. Open your email message just as you normally do. You will see a block of unintelligible ciphertext in the body of your email message. 2. To decrypt and verify the message, click the locked envelope icon ( To decrypt and verify attached files, decrypt them separately using PGPtools or PGPtray. The PGP Enter Passphrase dialog box appears, asking you to enter your passphrase. 3. Enter your passphrase, then click OK. The message is decrypted. If it has been signed and you have the senders public key, a message appears indicating whether the signature is valid. If the message is encrypted with the Secure Viewer option enabled, an advisory message appears. Click OK to continue. The decrypted message appears on a secure PGP screen in a special TEMPEST attack prevention font. 4. You can save the message in its decrypted state, or you can save the original encrypted version so that it remains secure. ).
NOTE: Messages encrypted with the Secure Viewer option enabled cannot be saved in their decrypted state.
104
PGP Freeware
Securing Email
To decrypt and verify from non-supported email applications: 1. Open your email message just as you normally do. You will see a block of unintelligible ciphertext in the body of your email message. 2. In PGPtray, select Current Window>Decrypt/Verify. If the email message includes encrypted file attachments, decrypt them separately with PGPtools or PGPtray. The PGP Enter Passphrase dialog box appears asking you to enter your passphrase. 3. Enter your passphrase, then click OK. The message is decrypted. If it has been signed, a message appears indicating whether the signature is valid. If the message is encrypted with Secure Viewer enabled, an advisory message appears. Click OK to continue. The decrypted message appears on a secure PGP screen in a special TEMPEST attack prevention font. 4. You can save the message in its decrypted state, or you can save the original encrypted version so that it remains secure.
NOTE: Messages encrypted with the Secure Viewer option enabled cannot be saved in their decrypted state.
Users Guide
105
Securing Email
106
PGP Freeware
Securing Files
This chapter describes how to use PGP to securely maintain files. It describes how to use PGP to encrypt, decrypt, sign, and verify files either for email or for secure storage on your computer. It also describes the PGP Wipe and Free Space Wiper functions, which delete files by erasing their contents completely from your computer.
Users Guide
107
Securing Files
Encryption options
Figure 6-1. PGP Key Selection dialog box You select the public keys by dragging them to the Recipients list. You can choose additional encryption options from the lower left menu. The options available to you depend upon the type of data that you are encrypting. Here are the possible options: Text Output. When sending files as attachments with some email applications, you may need to select the Text Output check box to save the file as ASCII text. This is sometimes necessary in order to send a binary file using older email applications. Selecting this option increases the size of the encrypted file by about 30 percent. Wipe Original. Select this check box to overwrite the original document that you are encrypting, so that your sensitive information is not readable by anyone who can access your hard disk. Secure Viewer. Select this check box to protect text from TEMPEST attacks upon decryption. If you select this option, the data is displayed in a special TEMPEST attack prevention font that is unreadable to radiation capturing equipment upon decrypting, and your email cant be saved in decrypted format. For more information about TEMPEST attacks, see the vulnerabilities section in An Introduction to Cryptography. This option is only available when encrypting text or text files. Conventional Encrypt. Select this check box to rely on a common passphrase rather than on public key cryptography. The file is encrypted using a session key, which encrypts (and decrypts) using a passphrase that you are asked to choose.
108
PGP Freeware
Securing Files
Self Decrypting Archive (SDA). Select this check box to create a self decrypting executable file. If you select this option, the file is encrypted using a session key, which encrypts (and decrypts) using a passphrase that you are asked to choose. The resulting executable file can be decrypted by simply double-clicking on it and entering the appropriate passphrase. This option is especially convenient for users who are sending encrypted files to people who do not have PGP software installed. Note that sender and recipient must be on the same operating system.
If you are signing the files, you are asked to supply your passphrase. After encryption, if you look in the folder where the original file was located, you will find a file with the specified name represented by one of three icons:
If you are encrypting or signing a folder, the output may be in a new folder, depending on the options you selected.
Users Guide
109
Securing Files
110
PGP Freeware
Securing Files
To erase the free disk space that contains data from previously deleted files and programs, use PGP Free Space Wiper. To ensure that your deleted data is irrecoverable, erase your free disk space periodically with the Free Space Wiper. To learn how to erase the free disk space on your computer, see Using the PGP Wipe Free Space Wizard to clean free disk space on page 112.
To permanently delete your files and folders: 1. Right-click on the file and then choose Wipe from the menu, or drag the file onto the Wipe button ( ) in PGPtools. A confirmation dialog box appears. 2. Click OK to permanently erase the file. To stop wiping the file before the task is completed, click Cancel.
NOTE: Clicking Cancel during file wipe can leave remnants of the file behind.
IMPORTANT: Many programs automatically save files in progress, so back-up copies of the file you deleted may exist. PGP Security, Inc. recommends that you run the Wipe utility on the back-up copies as well as the original file to thoroughly erase it from your hard disk.
Users Guide
111
Securing Files
Using the PGP Wipe Free Space Wizard to clean free disk space
Use the Wipe Free Space feature available from PGPtools to clean your free disk space. NOTE: For information about starting the PGPtools application, refer to Chapter 2, A Quick Tour of PGP.
To wipe free space on your disks: 1. In PGPtools, click the Freespace Wipe button ( Freespace Wipe Wizard. ) to start the
The PGP Free Space Wiper Welcome screen appears. 2. Read the information carefully, then click Next to advance to the next dialog box. The PGP Free Space Wiper prompts you to select the volume you want to wipe and the number of passes you want to perform. 3. In the Volume box, select the disk or volume that you want PGP to wipe. Then, select the number of passes that you want PGP to perform. The recommended guidelines are: 3 passes for personal use. 10 passes for commercial use. 18 passes for military use. 26 passes for maximum security. NOTE: Commercial data recovery companies have been known to recover data that has been over written up to 9 times. PGP uses highly sophisticated patterns during each wipe to ensure that your sensitive data cannot be recovered. 4. Click Next to continue. The Perform Wipe dialog box opens and displays statistical information about the drive or volume you selected.
112
PGP Freeware
Securing Files
5. Click the Begin Wipe button to start freespace wiping your disk or volume. The PGP Free Space Wiper scans and then wipes leftover fragments from your disk or volume. 6. When the wipe session ends, click Finish. WARNING: Clicking Cancel during file wipe can leave remains of the file on your computer.
To schedule folder and free space wiping: 1. To schedule free space wiping, follow steps 1 - 4 in To wipe free space on your disks:. When the Perform Wipe dialog box opens, click the Schedule button. 2. When the Schedule dialog box appears, click OK to continue. If you are running Windows NT, the Windows NT Confirm Password dialog box appears. Enter your Windows NT login password in the first text box. Press the TAB key to advance to the next text box and confirm your entry by entering your password again. Click OK. The Windows Task Schedule dialog box appears, as shown in Figure 6-2 on page 114.
Users Guide
113
Securing Files
Figure 6-2. Task Schedule dialog box 3. Choose how often you want the task to run from the Schedule Task area. Your choices are: Daily. This option runs your task once at the time you specify on the days you indicate. Click OK to close the dialog box, then enter the time you want to run the task each day in the Start Time text box. Weekly. This option runs your task on a weekly basis at the date and time you specify. Enter the number of weeks you want between each disk wipe in the text box provided, then choose a day from the Schedule Task Weekly list. Monthly. This option runs your task once each month on the day and at the time you specify. Enter the time in the text box provided, then enter the day of the month on which you want the task to run. Click Select Months to specify which months the task will run. Once. This option runs your task exactly once on the date and at the time you specify. Enter the time in the text box provided, then select a month and a date from the lists Run On text box. At System Start up. This option runs your task only upon system start up.
114
PGP Freeware
Securing Files
At Logon. This option runs your task when you log on to your computer. When Idle. This option runs your task when your system is idle for the amount of time you specify in the minutes text box.
4. Enter the time of day that you want the task to start in the Start Time box. 5. Specify how often you want the task to run in the Schedule Task Daily box. 6. Click Advanced to open a dialog box where you can select additional scheduling options, such as the start date, the end date, and the duration of the task. 7. Click OK. A confirmation dialog box appears. Your new PGP folder or free space task is now scheduled. To edit or delete your PGP tasks, use the Windows Task Scheduler.
Users Guide
115
Securing Files
116
PGP Freeware
ICQ (I Seek You) is an internet application that allows you to communicate with friends and colleagues over the Internet in real time. As with any type of communication, especially through Internet-based applications, your conversation is not secure and is subject to eavesdropping. To secure your ICQ communications, PGP offers a powerful integrated plug-in that lets you easily encrypt and decrypt your ICQ messages and exchange PGP keys through ICQ. The PGP plug-in for ICQ allows you to secure your ICQ communications by encrypting your messages before you send them over the Internet, and decrypting and verifying automatically upon opening encrypted instant messages. Since the plug-in uses your PGP key together with your ICQ number to encrypt and secure your ICQ messages, it can automatically verify and decrypt the ICQ messages that are encrypted to your PGP key. When the PGP plug-in for ICQ is installed on your system, the lock icon ( ) and the Send Key button appear in your ICQ Send Online Message dialog box, as shown in Figure 7-1.
encrypt message
Figure 7-1. ICQ Send Online Message dialog box Before you can encrypt an ICQ message, you must obtain the public key of the person for whom you are sending the encrypted message. You can obtain the recipients public key and add it to your PGP keyring through ICQ. See Exchanging public keys in ICQ on page 118 for instructions.
Users Guide
117
To send your PGP public key to someone through ICQ: 1. Double-click on the name of the person in your ICQ Contact List to open the ICQ Send Online Message dialog box, as shown in Figure 7-1. 2. If you want to send a message along with your key, enter the message text just as you normally would. 3. Click the Send Key button. Your PGP public key combined with your ICQ number is sent to the recipient.
118
PGP Freeware
To add a PGP public key to your keyring from an ICQ message: 1. Open the message that contains the PGP key. The senders public key is displayed in the text field of the PGP Select Key dialog box, as shown in Figure 7-2.
Figure 7-2. PGP Select Key dialog box 2. Select the key, and then click Import. The key is imported to your PGP keyring.
To send an encrypted ICQ message: 1. Exchange public keys with the person to whom you want to send secure messages. To learn how to exchange keys using ICQ, see Exchanging public keys in ICQ. 2. Compose the message just as you normally would.
Users Guide
119
NOTE: Formatting in your ICQ message is lost when the message is decrypted. 3. When you are finished composing the message, click the lock icon ( ) which appears on your ICQ Send Online Message dialog box, as shown in Figure 7-1. The message text is encrypted. 4. Click Send.
120
PGP Freeware
Chapter 8: PGPnet Basics Chapter 9: A Quick Tour of PGPnet Chapter 10: Configuring PGPnets VPN Feature
PGPnet Basics
Users Guide
123
PGPnet Basics
124
PGP Freeware
PGPnet Basics
4. Select a method for encrypting and authenticating your data; for example, a shared secret passphrase or an encryption key. (For more information on making keys, refer to Chapter 3, Making and Exchanging Keys.) Once these basic criteria are met, secure communication between your computers can happen automatically. For detailed instructions on how to configure PGPnets VPN feature, refer to Chapter 10, Configuring PGPnets VPN Feature
VPN terms
While VPN communication is fairly simple to set up, the behind-the-scenes negotiations between computers can get a bit more complex. The following is a list of terms and phrases that are used frequently in the context of virtual private networking. You may encounter these terms as you use PGPnet to secure your network communications. Reading this section is optionaldo so if you are interested in learning more about VPN terminology. IPsec (Internet Protocol Security) is a protocol designed as the standard to ensure secure information transfer over insecure networks such as the Internet. A secure host is a machine running PGPnet or another IPsec-compatible peer-to-peer capable client software (that is, software that allows hosts to communicate directly with each other). A gateway is a machine that connects your computer or network to other networks. A secure gateway is a gateway equipped with a firewall or other security software. A secure gateway allows packets through it for authorized parties only. In this instance, an authorized party is anyone with a certificate or passphrase that is acceptable to the gateway. (When you use PGPnet, you can elect to communicate with a host using your PGP key, an X.509 certificate, or a shared passphrase for authentication.) Tunnel mode is a VPN mode used to communicate with hosts or subnets that are behind a secure gateway. Transport mode is a VPN mode used for communications between two secure hosts that do not have a gateway between them (also called peer-to-peer communications).
Users Guide
125
PGPnet Basics
A secure subnet is a subnet (a network that forms part of a larger network) that has up to 254 machines behind it that are generally running PGPnet or a compatible client software. The secure subnet designation allows you (or your administrator, if applicable) to identify a number of machines in the same IP address range that are known to be IPsec-compatible. Note that secure subnets do not have to be behind gateways. An insecure host is a machine that is not running PGPnet or another IPsec-compatible peer-to-peer capable client software. An insecure subnet is one that has up to 254 machines behind it that are not running PGPnet or a compatible client software. A Security Association (SA) is an agreement that summarizes terms for secure communication between two machines. An SA is created the first time a local machine communicates with a remote machine, and it describes how the machines will communicate with one another (for example, the type of encryption, the duration of their association, and the method of authentication). PGPnet records and monitors all SAs that your machine initiates and that other machines initiate with your machine. When an SA that your machine initiated is close to expiration, PGPnet initiates another SA with the remote host.
NOTE: You can view all active SAs on PGPnets Status panel. For more information on the Status panel, see Reviewing the status of existing SAs on page 133. IKE (Internet Key Exchange) is a secure means for exchanging keys over the Internet.
126
PGP Freeware
This chapter gets you started using PGPnet and introduces you to PGPnets user interface.
Displaying PGPnet
There are two ways to display PGPnet: Select Start>Programs>PGP>PGPnet. Or Select from PGPtray in the Windows system tray (PGPtray> PGPnet>Status, VPN, Intruders, or Log).
Users Guide
127
Click here to turn PGPnet on and off (all features) - or use the Enable and Disable options on the file menu.
Exiting PGPnet
Select Exit from the File menu on the PGPnet window, or click the X in the upper-right corner of the PGPnet window.
PGPnet features
To: learn about PGPtrays icon understand the PGPnet window review the status of existing SAs establish and terminate SAs block communications with other machines understand entries on PGPnets Log panel change your secure network interface See: PGPtrays icon on page 129 The PGPnet window (at a glance) on page 130 Reviewing the status of existing SAs on page 133 Establishing and terminating SAs on page 135 Blocking communications with other machines on page 136 Reviewing PGPnets log entries on page 140 Changing your secure network interface: Set Adapter on page 141
128
PGP Freeware
PGPtrays icon
PGPtrays icon tells you the status of PGPnet.
Icon
Description Gray lock. Gray lock on a network. Gray lock on a network with a yellow circle and exclamation mark. Yellow lock on a network with a green network connector.
PGPnet Status PGPnet is off or not installed. PGPnet is installed and on. PGPnet is installed but not working. PGPnet is installed, on, and there are active SAs. The tooltip text reports the number of SAs. When PGPnet is negotiating an SA, the green connector flashes. PGPnet is installed, on, and has detected an intrusion.
Gray lock on a network flashes a red exclamation point. The exclamation point flashes until you move your mouse over the PGPtray icon. When the exclamation point is flashing, click PGPtray to display the Intruders panel (when the IDSs auto block feature is active), or the Log panel (when the IDSs auto block feature is inactive).
Figure 9-2. PGPtrays icon Placing the mouse pointer over the PGPtray icon invokes tool tips that display the status of PGPnet, including descriptions of error messages, such as service not running or driver not installed.
Users Guide
129
The PGPnet menu in PGPtray displays the hosts on the VPN panel. Hosts with SAs have a green dot. To initiate a connection, click on a host without an SA. To terminate an SA, click on a host with an SA.
10.133.12.200 10.133.12.201
Menus
There are three menus on the PGPnet window: File (Save, Export Hosts, Import Hosts, Enable PGPnet, Disable PGPnet, and Exit) View (Status, VPN, Intruders, Log, and Options) Help (Contents and Index and About)
130
PGP Freeware
Panels
There are four panels on the PGPnet window: Status panel. Use to review the status of existing SAs (see Reviewing the status of existing SAs on page 133). VPN panel. Use to add, edit, or remove entries in PGPnets host list, and to manually establish and terminate SAs. Note that once hosts are added to the host list, you can also establish and terminate SAs from PGPmenu in PGPtray. In addition to adding entries to the host list manually, you can drag and drop a PGPnet host list from the desktop to the VPN panel. If a plus sign (+) appears to the left of an entry in the host list, click the plus sign to expand the display and view other entries associated with that entry. To edit a host entry, double-click on the host entry or select the entry and click Properties. Use the Connect and Disconnect button to establish and terminate SAs. (see Establishing and terminating SAs on page 135). Intruders panel. Use to review communications blocked by PGPnets firewall and to add hosts to and remove hosts from the list of blocked hosts (see Blocking communications with other machines on page 136). Log panel. Use to review log entries for diagnostic purposes (see Reviewing PGPnets log entries on page 140).
Users Guide
131
Status bar
Figure 9-4. PGPnets status bar The bottom line of the PGPnet window, the status bar, displays messages that relate to PGPnets status on the left and the number of active SAs on the right. The following messages may appear in the Status bar:
Message: status: On status: Off driver not installed Description: PGPnet is on PGPnet is off The PGPnet driver is not responding to the service. Reboot your system. If the driver still does not respond, reinstall PGPnet. If PGPnet continues to display this message, contact NAI Technical Support. The PGPnet service is not running. Reboot your system. If PGPnet continues to display this message, reinstall PGPnet. If these actions do not resolve this problem, contact NAI Technical Support. The PGPnet service is running but it is not responding to messages from the application. Reboot your system. If PGPnet continues to display this message, reinstall PGPnet. If these actions do not resolve this problem, contact NAI Technical Support.
132
PGP Freeware
10.133.12.200 10.133.12.201
Figure 9-5. The Status panel The Status panel in the PGPnet window lists active PGPnet SAs (see Figure 9-5 on page 133). An SA may be terminated when it reaches a certain byte limit (for example, 4 MBs of data has been transmitted over the SA), or after a specific amount of time. The length of an SA is negotiated when it is initiated. When PGPnet negotiates the SA, it sets an expiration value and automatically creates a new SA when the SA reaches that value and expires. The SA expiration value is user-configurable; for more information, see Setting automatic key renewal values on page 187. If your machine initiated an SA and the SA is about to expire, PGPnet automatically initiates the negotiation of a new SA to replace the expiring SA. As a result, there may be times when the Status panel displays two SAs for the same machine. When you establish an SA with another host, PGPnet uses the most restrictive expiration values set by either of the two hosts. As a result, you may see an SA expire before your maximum expiration value is met because the other host has more restrictive expiration values set. Use the Save feature to save a list of active SAs to a tab-delimited text file. Use the Remove feature to remove an SA. Remove an SA when you think that it has been compromised, if you know that the target host is down, or for any reason that you think the connection should be terminated. Note that if PGPnet is turned off, this button is disabled.
Users Guide
133
Use the Properties feature to view the details of an SA, including IP address, bytes sent, type of encryption, and so on (the Security Association properties dialog). To view details, select the host and click Properties (Figure 9-6). Click the pushpin in the upper right corner to keep the window displayed on your screen. When the window is open, click the X in the upper right corner to close the window or click Close. Use the Auto-Configure feature to configure a host entry based on an existing SA. If the SA is for a configured host, PGPnet imports the SAs authentication key to your PGP keyring, and assigns this key as the authentication key for the configured host. If the SA is for an unconfigured host, PGPnet creates a new secure host entry in the host list, imports the SAs authentication key to your PGPnet keyring, and assigns this key as the authentication key for the configured host. If the SA does not have an associated authentication key (that is, it uses shared secret for authentication), you cannot use this feature.
10.133.12.200
134
PGP Freeware
Figure 9-7. The VPN panel The VPN panel displays secure gateways, subnets, and hosts. If a plus sign (+) appears to the left of an item, click on the plus sign to expand the display and view other entries associated with that item (see Figure 9-7 on page 135). All buttons are disabled if PGPnet is turned off. Use the Connect button to establish an SA with a configured host. Select the host, then click Connect. The Connect button is disabled when an inappropriate host entry is selected (for example, when you select a secure subnet or insecure host that is not behind a gateway). Note that when you connect to an exclusive gateway, all existing SAs for hosts not on the local subnet still exist but become invalid. You can only connect to one exclusive gateway at a time. Click Properties to edit an entry. Use the Disconnect button to terminate an SA with a configured host. Select the host, then click Disconnect.
Users Guide
135
136
PGP Freeware
10.133.12.203 172.28.213.119
Figure 9-8. The Intruders panel Use Properties to view details regarding a blocked host. To do so, select the host and click Properties.
Users Guide
137
Use Remove to remove a host from the list of blocked hosts (see Removing a host from the list of blocked hosts on page 140). Use Add to add a host to the list of blocked hosts (see Blocking a host and tracing the source of communications on page 138). Use DNS Lookup to identify the IP address of a host.
Tracing an attacker
When a host attacks your system and becomes a blocked host, you can use PGPnets Trace Source feature (see Figure 9-10 on page 139) to attempt to discover the following information about the attacker: DNS name, NetBIOS information, TELNET banner, HTTP server version, WHOIS, traceroute, FTP server banner, and SMTP banner. (A banner is a text string that the server software sends to a client when the client first contacts the server. Banners often have information in them that identifies the server or the operating system that the server is running.) If the Trace Source feature identifies the NetBIOS name, it attempts to identify network (MAC) addresses of that computer. If the Trace Source feature successfully identifies the DNS name, it queries the WHOIS database for information on the domain. If it cannot identify the DNS name, it attempts to identity the DNS names of adjacent IP addresses.
138
PGP Freeware
You can use this information to identify and locate the attacker and attempt to shut down the machine or reprimand the attacker. NOTE: To use the trace route feature of Trace Source, you must have Winsock2 installed on your machine. If you are running Windows NT or Windows 2000, you must have Administrator privileges for the trace route feature to work.
To trace the source of the packets from an intruder: 1. Click the host entry on the Intruders panel and click Properties. 2. Click Trace Source. PGPnet displays captured information in the Additional Trace Results box. When the trace is complete, the Trace Source button is reactivated.
Users Guide
139
Figure 9-11. The Log panel The Log panel shows Service, IKE, IPsec, PGP, System, and Intrusion events, when they occurred (date and time), and a description of the event or attack. Use this information to help resolve problems that occur (see Figure 9-11). Intrusion entries are highlighted in red. Use the Show Events check boxes to select the types of events that you want to view. To instruct PGPnet to display a specific kind of event, click the check box next to the event type. All checkboxes are selected by default. Click Advanced to display the IKE log file. Note that when you close the Advanced IKE window, PGPnet does not save the data.
140
PGP Freeware
Click Save to save current log information to a text file. Click Clear to clear current log information from the log file and screen. If you do not want PGPnet to ask you for confirmation each time you clear the log, click Do not ask me this again.
Figure 9-12. TheSet Adapter dialog When you install PGPnet, you select the network interfaces on your computer that you want to secure. Your network interface is usually an Ethernet card or a Dialup or Remote Access WAN adapter (representing your modem). Use PGPnets Set Adapter function (Start>Programs>PGP>Set Adapter) in the following circumstances: When you want to secure a different or additional network interface. When your machine reviews your network protocol and adapter bindings. When this occurs, PGPnet advises you to reboot your system and run PGPnets Set Adapter function to re-secure one or more network interfaces. NOTE: On Windows 2000, Set Adapter displays All Network and Dial-up Adapters. This selection secures all network interfaces.
NOTE: If you secure more than one network interface on Windows 98 systems, multiple PGPnet adapters appear in your Network control panel.
Users Guide
141
WARNING: When PGPnet advises you to run Set Adapter after reboot, it is required. If you do not run Set Adapter when prompted, no network adapters will be secured, and PGPnet will not function.
To secure a different or additional network interface (Windows 95/98): 1. Select Set Adapter from the Start menu (Start>Programs> PGP>Set Adapter). The PGPnet Set Adapter dialog box is displayed on your screen listing all adapters. 2. Select the appropriate network interfaces and click OK. PGPnet prompts you to reboot your machine. 3. Reboot your machine. This is mandatory for any network functionality to occur.
To secure a different or additional network interface (Windows NT): 1. Select Set Adapter from the Start menu (Start>Programs> PGP>Set Adapter). The PGPnet Set Adapter dialog is displayed on your screen listing all adapters. 2. Select the appropriate network interfaces and click OK. PGPnet prompts you to reboot your machine. 3. Reboot your machine. This is mandatory for any network functionality to occur.
To re-secure a network interface after a bindings review (Windows NT): 1. Reboot your machine when prompted. 2. On reboot, Set Adapter will automatically start up and ask you to select an adapter for PGPnet to bind to. 3. Select the appropriate network interface. PGP reviews your machines bindings and prompts you to reboot your machine. 4. Reboot your machine. This is mandatory for any network functionality to occur.
142
PGP Freeware
10
This chapter describes how to configure PGPnets VPN feature. If you are in a corporate environment, your PGP or PGPnet administrator may have already configured this feature for you. The following table identifies topics covered in this chapter.
To learn about: using PGPnets VPN feature using the Add Host Wizard using Expert Mode See: Configuring PGPnets VPN feature on page 144 Using the Add Host Wizard on page 147 Expert Mode: Bypassing the wizard to add hosts, gateways, and subnets on page 155 DNS Lookup: Finding a hosts IP address on page 157 Remote Authentication on page 158
using DNS lookup remote authentication - requiring a host to present a specific key or certificate shared secret acquire virtual identity and exclusive gateway features adding a host adding a subnet or gateway modifying a host, subnet, or gateway entry removing a host, subnet, or gateway entry turning the VPN on and off aggressive mode
Shared Secret on page 158 Acquire Virtual Identity and exclusive gateways on page 160 Adding a host on page 149 Adding a subnet or gateway on page 151 Modifying a host, subnet, or gateway entry on page 154 Removing a host, subnet, or gateway entry on page 154 Enabling/Disabling the VPN feature on page 162 Using Aggressive Mode on page 163
Users Guide
143
To select your authenticating key and/or certificate: 1. Click the View menu on the PGPnet window and select Options. 2. Click the VPN Authentication tab. 3. Select the key and/or the certificate that you will use to authenticate (click Select Key or Select Certificate). Note that the key or certificate must be part of a key pair; you must have the private key.
144 PGP Freeware
4. Click OK. A dialog box asks you to enter the passphrase for the selected key. 5. Enter the passphrase and click OK.
IMPORTANT: If you are creating a VPN connection with another PGPnet host and using PGPkeys for authentication, you must both use the same type of PGP key. You cannot negotiate an SA if one side of the connection uses an RSA key and the other side uses a DH/DSS key.
Users Guide
145
To import a host list: 1. Select Import host from PGPnets File menu. The Select file containing host list dialog box appears. 2. Select the file that contains the host list. The hosts in the host file appear on the VPN panel.
To add a host, subnet, or gateway: 1. Click the VPN tab on the PGPnet window. 2. Click Add. 3. Follow the instructions on the panels of the Add Host wizard. (For more information on adding a host using the Add Host wizard, see Using the Add Host Wizard on page 147.)
Step 4. Establishing an SA
To communicate with the hosts, subnets, and gateways that you added in step 3, you must create Security Associations.
To establish an SA with another host: 1. Verify that each system has a network connection. 2. Install PGPnet on both systems. 3. After installing PGPnet, reboot both systems.
146
PGP Freeware
4. Note the following: If you are using PGP keys or X.509 certificates to authenticate, verify that each system has an authentication key or certificate set on the VPN Authentication panel (View>Options>VPN Authentication). If you are using PGP keys to authenticate, then exchange, sign, and validate the public keys that each system is using for authentication. If you are using X.509 certificates to authenticate, then ensure that the Root CA for the remote partys X.509 certificate exists, is signed, and is fully trusted on both systems. If you are using PGP keys or X.509 certificates to authenticate, at least one user must create an entry in PGPnets host list for the other system (use Add on the VPN panel). If Attempt mode is set (VPN panel), you can now start communicating. If you are using shared secret passphrase for authentication, both users must create an entry in PGPnets host list for the other system, and you must agree on a shared secret passphrase. The passphrase can be a word or phrase. This means that both users have agreed upon terms for communication, e.g., the method of encryption, etc.
5. Select the hosts entry on the VPN panel and click Connect. If the connection is successful, a green dot appears in the SA column.
Users Guide
147
NOTE: You can have a secure gateway and a secure host (which is not behind a gateway) with the same IP address. When this occurs, the host entry is automatically set to Manual connection (that is, you must click the host in PGPtrays PGPnet menu or click Connect on the VPN panel to connect to the host).
148
PGP Freeware
Adding a host
This section describes how to add a host entry to the host list, and how to add a host behind a configured gateway or subnet. These instructions assume that you are using the Add Host Wizard. If the Host/Gateway dialog appears in Step 2, click Use Wizard (lower left corner) to return to the wizard. 1. In the PGPnet main window, click the VPN tab. If you are adding a host behind a configured gateway, select the configured gateway. If you are adding a host behind a configured subnet, select the configured subnet. 2. Click Add. PGPnet displays the Add Host Wizard. Read the first screen and click Next.
Figure 10-3. The Add Host Wizard If you are adding a host or adding a host behind a configured subnet, go to Step 3. If you are adding a host behind a configured gateway, the wizard asks if you want to create a new host entry for a computer or subnet accessed through the selected gateway. To create an entry for a host behind the gateway, select Yes and then click Next.
Users Guide
149
The wizard asks you to select the type of communication you want to configure. Select Host and then click Next. Go to Step 4. 3. The wizard asks if you want to add a host, subnet, or gateway. Click Host and click Next. 4. You can elect to enforce secure communications or allow insecure communications. Click the radio button next to your selection and click Next. 5. Enter a descriptive name for the computer with which you want to communicate. Click Next. 6. Enter either the host domain name or the IP address for the host. Click Next. If you enter a host domain name, the wizard searches for your entry. If the wizard is unable to locate your entry, you must click Back, return to the previous screen, and re-enter the name or IP address. If you elected to allow insecure communications, your entry is added to the host list. If you elected to enforce secure communications, please continue. 7. Select the communication method that you want to use when you communicate with this machine: public-key cryptographic security or shared secret (passphrase-based) security. Click Next. If you selected shared secret security, enter the passphrase. Note that both hosts must configure the same shared secret passphrase. Click Next. 8. Select how you want to connect to this host Automatically (whenever traffic is sent to or received from this host) or Manually (using the Connect button on the Hosts panel). Note that you can change the connection mode for this host entry at any time by clicking the Edit button on the Hosts panel.
150
PGP Freeware
To add a subnet or gateway: 1. In the PGPnet main window, click the VPN tab. If you are adding a subnet behind a configured gateway, select the configured gateway. 2. Click Add. PGPnet displays the Add Host Wizard. Read the first screen and click Next. If you are adding a subnet behind a configured gateway, go to Step 3. Otherwise, go to Step 4. 3. When communicating with a computer or subnet, the computer or subnet can either be directly accessible or it can be on the other side of a secure gateway (such as a firewall). To create an entry for a subnet behind the gateway, select Yes and then click Next. 4. The wizard asks if you want to add a host or subnet (or host, subnet, or gateway). Click Subnet or Gateway and click Next. If you are adding a subnet, go to Step 5. If you are adding a gateway, go to Step 6. 5. You can elect to enforce secure communications or allow insecure communications. Click your selection and click Next. 6. Enter a descriptive name for the computer with which you want to communicate. Click Next. 7. If you are adding a subnet, enter the IP address for the subnet. If you are entering a gateway, enter the gateways Host Domain Name or IP address.
Users Guide
151
8. Select the communication method that you want to use when you communicate with this machine: public-key cryptographic security or shared secret (passphrase-based) security. Click Next. If you selected shared secret security, enter the passphrase. Note that both hosts must configure the same shared secret passphrase. Click Next. If you are adding a subnet, go to Step 9. If you are adding a gateway, go to Step 10.
WARNING: Unlike traditional PGP passphrases, Shared Secret passphrases are stored on your computer unencrypted. This presents a potential security risk. 9. Select how you want to connect to this host: Connect automatically. Select this option if you want PGPnet to connect automatically whenever packets are sent to the host entry. Require manual connection. Select this option if you use your machine from more than one site (for example, a corporate user who uses a laptop at home and at work). This feature allows you to communicate securely with the same hosts from either side of your corporate gateway using either of your machines adapters. Use the Connect button on the VPN panel to connect manually. If you are adding a subnet or a subnet behind a gateway, PGPnet adds the entry to the host list. 10. Enable Virtual Identity retrieval for this gateway. This option appears if you are adding an entry for a gateway.
NOTE: PGPnets Virtual Identity is based on the config-mode draft standard from the IETF IPsec working group. It is also known as phase 1.5 and transaction exchange. This feature is not available on Windows 95. PGPnets Virtual Identity feature can retrieve an IP address and other configuration information for your computer from a secure gateway. Since the gateway gives your machine an address, all of the machines behind that gateway view you as part of their network, and they will communicate with you freely. To connect to a secure gateway which has Virtual Identity retrieval enabled, you must manually click Connect in the VPN panel.
152 PGP Freeware
You can change the Virtual Identity setting of a gateway host entry at any time by clicking Edit on the VPN panel. To use the Virtual Identity feature, click Enable Virtual Identity retrieval for this gateway. If you do not use the Virtual Identity feature, go to Step 12. 11. Create this new gateway entry as an exclusive gateway. This option only appears if you are adding an entry for a gateway. When you connect to an exclusive gateway, PGPnet tunnels all traffic, local and non-local, to this gateway.
NOTE: This feature is not available on Windows 95. Note that once you have added an exclusive gateway, you must click the Connect button on the VPN panel to connect to that gateway. You can change an exclusive gateway to a non-exclusive gateway by editing the host entry on the VPN panel. If you elect to make the entry an exclusive gateway, click Create this new gateway entry as an exclusive gateway. The wizard asks if you want to add an entry for a host or subnet behind the gateway. To do so, click Yes and follow the wizards instructions. 12. Select how you want to connect to this host: Connect automatically. Select this option if you want PGPnet to connect automatically whenever packets are sent to the host entry. Require manual connection. Select this option if you use your machine from more than one site (for example, a corporate user who uses a laptop at home and at work). This feature allows you to communicate securely with the same hosts from either side of your corporate gateway using either of your machines adapters. Use the Connect button on the VPN panel to connect manually.
Users Guide
153
To modify a configuration: 1. Click the VPN tab. 2. Select the host, subnet, or gateway that you want to modify. 3. Click Edit. PGPnet displays the Host/Gateway dialog.
TIP: Instead of selecting the host and clicking Edit, double-click the host in the host list. 4. Make the required edits. 5. Click OK. The PGPnet database is updated immediately. However, if the PGPnet service or driver are not operating normally, the PGPnet database is not updated until they are working properly. This may require a computer reboot.
To remove a host, subnet, or gateway: 1. Click the VPN tab. 2. Select the host, subnet, or gateway that you want to remove. 3. Click Remove.
154
PGP Freeware
Expert Mode: Bypassing the wizard to add hosts, gateways, and subnets
NOTE: If you are in a corporate environment, your PGP administrator may have elected to disable the wizards Expert Mode. When you become familiar with PGPnet, you can use Expert Mode to add and edit hosts, gateways, and subnets quickly. In contrast to the wizard, which walks you through the add process step by step, when PGPnet is in Expert Mode, it presents a single form when you want to add a new entry. NOTE: If you use Expert Mode, remember to select an authentication key or certificate if you have not already done so (View>Options> PGPnet Authentication). To learn how to turn Expert Mode on and off, see Turning Expert Mode on and off on page 156. To learn about the DNS Lookup feature, see DNS Lookup: Finding a hosts IP address on page 157. To learn about Shared Secret, see Shared Secret on page 158. To learn about Remote Authentication, see Remote Authentication on page 158.
Users Guide
155
To turn Expert Mode on: 1. Click the VPN panel. 2. Click Add. 3. Click Use Expert Mode. PGPnet displays the Host/Gateway dialog.
To turn Expert Mode off: 1. Click the VPN panel. 2. Click Add. 3. Click Use Wizard. PGPnet displays the Add Host Wizard.
156
PGP Freeware
To use the DNS Lookup feature: 1. Click Add on PGPnets VPN panel. If the Add Host Wizard appears, click Use Expert Mode. 2. Click DNS Lookup. PGPnet displays the DNS Lookup dialog box.
Figure 10-5. DNS Lookup dialog box 3. Enter the host name of the system in the Host name to lookup field and click Lookup. PGPnet searches for the IP address for the host name that you entered. If PGPnet finds the IP address, it displays the IP address. Click Use to use the IP address in the Host/Gateway dialog. If PGPnet does not find an IP address for the host, it advises you.
TIP: You can enter the host name of the system in the name field of the Host/Gateway dialog box and click DNS Lookup. The Lookup window appears. Click Lookup to look up the IP address of the host name you entered.
Users Guide
157
Shared Secret
WARNING: Unlike traditional PGP passphrases, Shared Secret passphrases are stored on your computer unencrypted. This presents a potential security risk. To avoid this risk, use keys or certificates. To use shared secret passphrase security, both users must create an entry in PGPnets host list for the other system. You must know the other systems host name or IP address, and agree on a shared secret passphrase.
Remote Authentication
Requiring a host to present a specific key or certificate
NOTE: X.509 authentication certificates are not supported in PGP Freeware. The controls in the Remote Authentication section of the Host/Gateway dialog box allow you to require the remote host to present a specific PGP key or X.509 certificate each time the host attempts to establish an SA with your host. If the host attempts to establish a connection and does not present the specified key or certificate, your machine will refuse the connection. The default setting is Any valid key. You can add this requirement when you add a host using Expert Mode, or after you add a host by editing the host entry. NOTE: Require them to present their public key, not your public key.
To require a host to present a specific key or certificate: 1. If you have not already done so, add the host, subnet, or gateway to PGPnet (for instructions, see Adding a host on page 149 and Adding a subnet or gateway on page 151). PGPnet adds an entry to the host list on the VPN panel. 2. Select the entry on the VPN panel and click Properties. PGPnet displays the Host/Gateway dialog box. The Remote Authentication section is at the bottom of the dialog box.
158
PGP Freeware
Figure 10-6. Host/Gateway dialog 3. You can require the host, subnet, or gateway to present a specific PGP key or X.509 certificate to authenticate itself.
NOTE: X.509 authentication certificates are not supported in PGP Freeware. To require a specific PGP key, click PGP Key. PGPnet displays the Select Key dialog box. Click the appropriate key and click OK. PGPnet displays the key in the Remote Authentication box. Click OK to close the Host/Gateway dialog box. To require a specific X.509 certificate, click X.509 Certificate. PGPnet displays the Select X.509 Certificate dialog box. Click the appropriate certificate and click OK. PGPnet displays the certificate in the Remote Authentication box. Click OK to close the Host/Gateway dialog box.
Users Guide
159
IMPORTANT: If you select a specific PGP key or X.509 certificate for a secure subnet entry, all users within that subnet must use the same key to authenticate themselves. All key authentications appear on the Log panel, and each entry displays the key ID.
160
PGP Freeware
Authentication type
NOTE: PGP Freeware implements the Extended Authentication draft standard version 6. To take advantage of the Authentication Type feature, organizations must use a compatible gateway. To change the authentication type you are using for a specific SA, double-click the host on the VPN panel to display the Host/Gateway dialog. The Authentication Type setting appears in the Connection Options section of the dialog. The authentication type settings are: Normal. This is the default setting for Authentication Type. Each side of the SA authenticates itself to the other using either a shared passphrase, key, or certificate. Extended. This is an extension to the Normal setting. When you set Authentication Type to Extended, each side of the SA authenticates itself to the other using either a shared passphrase, key, or certificate. In addition, a legacy authentication exchange occurs which allows authentication via a number of other authentication methods, including RADIUS and SecurID. Hybrid. This is a modification to the Extended setting. This setting eliminates the client authentication via a shared passphrase, key, and certificate, but retains the server side authentication. Thus, this setting relies solely on the Extended authentication process to authenticate the client. For those who want to use legacy authentication, Hybrid is generally the ideal setting; it eliminates the need to establish a shared passphrase or generate a key or certificate. As a result, organizations can use their existing infrastructure of usernames and passwords or SecurID cards to authenticate themselves to the gateway. Note that Hybrid support in gateways is far less common than Normal and Extended authentication.
Users Guide
161
162
PGP Freeware
To use aggressive mode: 1. If you have not already done so, add the host to PGPnets host list (for instructions, see Adding a subnet or gateway on page 151). 2. Select the host on the VPN panel and click Properties to display the Host/Gateway dialog. 3. Click Aggressive. 4. If the following conditions are true, enter your user name to identify yourself to your third-party VPN gateway: You are using a shared passphrase You are using a dynamic IP address for your VPN client
5. Click OK.
Users Guide
163
164
PGP Freeware
Appendix A: Setting Options Appendix B: Troubleshooting PGP Appendix C: Troubleshooting PGPnet Appendix D: Transferring Files between MacOS and Windows Appendix E: Biometric Word List Glossary
Setting Options
A
See: Setting general options on page 168 Setting file options on page 171 Setting email options on page 173 Setting HotKey options on page 175 Setting server options on page 177 Setting CA options on page 181 Setting advanced options on page 181 Setting VPN options on page 185 Setting VPN authentication options on page 188 Setting VPN advanced options on page 190
This chapter describes how to set your PGP options to suit your particular computing environment.
To set: General options File options Email options HotKey options Server options CA options Advanced options VPN options VPN Authentication options VPN Advanced options
Users Guide
167
Setting Options
To set general PGP options: 1. Open the PGP Options dialog box. The Options dialog box opens with the General panel showing (Figure 10-1).
Figure 10-1. PGP Options dialog box (General panel) 2. Select from these PGP options: Encryption Options Always Encrypt to Default Key. When this setting is selected, all the email messages and file attachments you encrypt with a recipients public key are also encrypted to you using your default public key. It is useful to leave this setting turned on so that, subsequently, you have the option of decrypting the contents of any email or files you encrypt.
168
PGP Freeware
Setting Options
Faster Key Generation. When this setting is selected, less time is required to generate a new Diffie-Hellman/DSS key pair. This process is speeded up by using a previously calculated set of prime numbers rather than going through the time-consuming process of creating them from scratch each time a new key is generated. However, remember that fast key generation is only implemented for key sizes above 1024 and below 4096. Although it would be unlikely for anyone to crack your key based on their knowledge of these canned prime numbers, some may want to spend the extra time to create a key pair with the maximum level of security. The general belief in the cryptographic community is that using canned primes provides no decrease in security for the Diffie-Hellman/DSS algorithms. If this feature makes you uncomfortable, you may turn it off.
Show PGPtray Icon. When this checkbox is selected, you can access many PGP utilities through the convenience of PGPtray. Comment Block. You can add your comment text in this area. The text you enter here is always included in messages and files that you encrypt or sign. Comments entered in this field appear below the --BEGIN PGP MESSAGE BLOCK-- text header and PGP version number of each message.
Single Sign-On Cache Passphrases While Logged On. Automatically saves your passphrase in memory until you log off your computer. If you select this option, you are prompted for your passphrase once for each initial signing and decrypting task. You will not be prompted to enter it again for the same task until you log off your computer.
IMPORTANT: When this setting is selected, it is very important that you log off your computer before leaving it unattended. Your passphrase can remain cached for weeks if you never log offanyone could read your encrypted messages or encrypt messages with your key while you are away from your computer. Cache Passphrases For. Automatically saves your passphrase in memory for the specified duration of time (in hours: minutes: seconds). If you select this option, you are prompted for your passphrase once for the initial signing or decrypting task. You are not prompted to enter it again until the allotted time you specify has lapsed. The default setting is 2 minutes.
Users Guide 169
Setting Options
Do not cache passphrase. When this setting is selected, your passphrase is not stored in memory for any amount of time. Therefore, you are required to enter your passphrase for all PGPnet communications, as well as your encrypting, signing, and decrypting tasks. Share Passphrase Cache Among Modules. Automatically saves your passphrase in memory and shares it among other PGP modules. For example, if you enter your passphrase to sign using PGPtools, then you are not prompted for it to decrypt using PGPtray. Select this option with the Cache Passphrases While Logged On option and your passphrase is saved in memory until you log off your computer. Or, select this option with Cache Passphrases For and set the duration for which you want to save your passphrase.
File Wiping Number of Passes. This setting controls how many times the wipe utilities pass over the disk. Warn Before Wiping. When this setting is selected, a dialog box appears before you wipe a file to give you one last chance to change your mind before PGP securely overwrites the contents of the file and deletes it from your computer. Automatically Wipe on Delete. When you delete a file normally by placing it in the Recycle Bin, the name of the file is removed from the file directory, but the data in the file stays on the disk and is still recoverable even after you empty the Recycle Bin. When you enable the Automatically Wipe on Delete option, the Empty Recycle Bin action wipes the contents of the Recycle Bin so that your deleted items can no longer be recovered. Show Progress. Displays a progress bar when wiping files from the Recycle Bin. This option is available when the Automatically Wipe on Delete option is enabled.
3. Click OK to save your changes or choose another tab to continue configuring your PGP options.
170
PGP Freeware
Setting Options
To set PGP file options: 1. Open the PGP Options dialog box and select the Files tab. The Options dialog box opens with the Files panel showing (Figure 10-2).
Users Guide
171
Setting Options
2. Use the buttons listed in the Files panel to set the appropriate location for your public and private keyrings, and/or random seed file: PGP Keyring Files Public Keyring File. Shows the current location and name of the file where the PGP program expects to find your public keyring file. If you plan to store your public keys in a file with a different name or in some other location, you specify this information here. The location you specify can also be used to store all automatic backups of the public keyring. See Setting advanced options on page 181 for more information about backing up your keyrings automatically. Private Keyring File. Shows the current location and name of the file where the PGP program expects to find your private keyring file. If you plan to store your private keys in a file with a different name or in some other location, you must specify this information here. Some users like to keep their private keyring on a floppy disk, which they insert like a key whenever they need to sign or decrypt mail. The location you specify can also be used to store all automatic backups of the public keyring.
PGPnet Keyring Files Public Keyring File. Shows the current location and name of the file where the PGPnet program expects to find your public keyring file. If you plan to store your public keys in a file with a different name or in some other location, you must specify this information here. The location you specify can also be used to store all automatic backups of the public keyring. See Setting advanced options on page 181 for more information about backing up your keyrings automatically. Private Keyring File. Shows the current location and name of the file where the PGPnet program expects to find your private keyring file. If you plan to store your private keys in a file with a different name or in some other location, you specify this information here. Some users like to keep their private keyring on a floppy disk, which they insert like a key whenever they need to sign or decrypt mail. The location you specify can also be used to store all automatic backups of the public keyring. The Use My PGP Keyring Files button enables you to automatically set your PGPnet keyrings to the same keyring files used by the rest of the PGP program.
172
PGP Freeware
Setting Options
Random Seed File Random Seed File. Shows the location of the Random Seed file. Some users may wish to keep their Random Seed file in a secure location to prevent tampering. Given that this method of attack is very difficult, and has been anticipated by PGP, moving the Random Seed file from its default location is of marginal benefit.
3. Click OK to save your changes or choose another tab to continue configuring your PGP options.
To set email options: 1. Open the PGP Options dialog box and select the Email tab. The Options dialog box opens with the Email panel showing (Figure 10-3).
Setting Options
2. Select your email encryption options from the Email panel. Your choices are: Use PGP/MIME when sending mail. If you are using Eudora and you enable this setting, all of your email messages and file attachments are automatically encrypted to the intended recipient. This setting has no effect on other encryptions you perform from the clipboard, or with Windows Explorer and should not be used if you plan to send email to recipients who use email applications that are not supported by the PGP/MIME standard. Using Eudora, attachments will always be encrypted regardless of this setting, but if the recipient does not have PGP/MIME, the decryption process will be more manual. Encrypt new messages by default. If you enable this setting, all of your email messages and file attachments are automatically encrypted. Some email applications cannot support this feature. Sign new messages by default. If you enable this setting, you are prompted to sign all of your email messages. Some email applications cannot support this feature. This setting has no effect on other signatures you add from the clipboard or with Windows Explorer. Automatically decrypt/verify when opening messages. If you enable this setting, all of your email messages and file attachments that are encrypted and/or signed are automatically decrypted and verified. Some email applications cannot support this feature. Always use Secure Viewer when decrypting. If you enable this setting, all of your decrypted email messages are displayed in the Secure Viewer window with a special TEMPEST attack prevention font, and they cant be saved in decrypted format. For more information about TEMPEST attacks, see the vulnerabilities section in An Introduction to Cryptography.
174
PGP Freeware
Setting Options
Word wrap clear-signed messages at column [ ]. This setting specifies the column number where a hard carriage return is used to wrap the text in your digital signature to the next line. This feature is necessary because not all applications handle word wrapping in the same way, which could cause the lines in your digitally signed messages to be broken up in a way that cannot be easily read. The default setting is 70, which prevents problems with most applications.
WARNING: If you change the word-wrap setting in PGP, make sure that it is less than the word-wrap settings in your email application. If you set it to be the same or a greater length, carriage returns may be added that invalidate your PGP signature. 3. Click OK to save your changes or choose another tab to continue configuring your PGP options.
To set HotKey options: 1. Open the PGP Options dialog box and select the HotKeys tab. The Options dialog box opens with the HotKeys panel showing (Figure 10-4 on page 176).
Users Guide
175
Setting Options
Figure 10-4. PGP Options dialog box (HotKeys panel) 2. Select the HotKey options that you want to use from the HotKey panel. Your options are: Purge Passphrase Caches. Select this option to create a hot-key that allows you to delete the cache that contains your PGP decryption passphrase with a key stroke or series of key strokes. The default hot-key for this function is CTRL +F12. Encrypt Current Window. Select this option to create a hot-key that allows you to encrypt all data in the current window with a key stroke or series of key strokes. The default hot-key strokes for this operation is CTRL + SHFT + E. Sign Current Window. Select this option to create a hot-key that allows you to sign the data in the current window with a key stroke or series of key strokes. The default hot-key for this operation is
CTRL + SHFT + S.
Encrypt and Sign Current Window. Select this option to create a hot-key that allows you to both encrypt and sign the data in the current window with a key stroke or series of key strokes. The default hot-key for this operation is CTRL + SHFT + C.
176
PGP Freeware
Setting Options
Decrypt and Verify Current Window. Select this option to create a hot-key that allows you to both decrypt and verify the secure data in the current window with a key or series of key strokes. The default hot-key strokes for this operation is CTRL + SHFT + D. Unmount all PGPdisks (available with PGPdisk installation). Select this option to create a hot-key that allows you to unmount all of your PGPdisks with a key or series of key strokes. The default hot-key strokes for this operation is CTRL + SHFT + U.
3. Click OK to save your changes or choose another tab to continue configuring your PGP options.
To set key server options: 1. Open the PGP Options dialog box and select the Server tab. The Options dialog box opens with the Server panel showing (Figure 10-5).
Users Guide
177
Setting Options
Figure 10-5. PGP Options dialog box (Server panel) 2. To set your server options, use these buttons: New. Adds a new server to your list. Remove. Removes the currently selected server from your list. Edit. Allows you to edit server information for the currently selected server. Set as root. Identifies the root server that is used for specific corporate operations, such as updating group lists, sending group lists, updating introducers, etc. In corporate settings, your Security Officer will have already configured this. Move Up and Move Down. Use these buttons to arrange the servers in order of preference.
178
PGP Freeware
Setting Options
3. Select the options to use when synchronizing your private keyring with your key server(s). Your choices are: Synchronize with server upon Encrypting to unknown keys. Select this option to have PGP automatically look up unknown recipients on the server to locate users that are not on your keyring when encrypting email. Signing keys. Select this option to allow keys to which youre adding your signature first to be updated from the server and then your changes sent to the server upon completion of the update. Adding names/photos/revokers. Select this option to allow keys to which youve added names, photographs, or revokers first to be updated from the server and then your changes sent to the server upon completion of the update. Updating the key beforehand ensures that, for example, the key has not been revoked since you last updated it. Revocations. Select this option to allow keys you revoke first to be updated from the server and then your changes sent to the server upon completion of the update. Verification. Select this option to have PGP automatically search and import from the key server when verifying a signed email message or file for which you do not have the senders public key.
4. Click OK to save your changes or choose another tab to continue configuring your PGP options.
Users Guide
179
Setting Options
To add a key server to the server list: 1. Open the PGP Options dialog box and select the Server tab. 2. Click the New button. The Add New Server dialog box appears. 3. In the Type box, select the type of server to use to access the key server. Your choices are: PGP Keyserver HTTP. Select this option if you are using a Web-based PGP Keyserver to store and retrieve PGPkeys. PGP Keyserver LDAP. Select this option if you are using a PGP Keyserver through LDAP to store and retrieve PGPkeys. PGP Keyserver LDAPS. Select this option if you are using a PGP Keyserver through LDAPS to store and retrieve PGPkeys. PGP Directory LDAP. Select this option if you are using a generic LDAP serversuch as Netscape Directory Server or Microsoft Active Directoryto store and retrieve PGPkeys. PGP Directory LDAPS. Select this option if you are using a generic LDAPS serversuch as Netscape Directory Server or Microsoft Active Directoryto store and retrieve PGPkeys. X.509 Directory LDAP. Select this option if you are using a generic LDAP directory server to store and retrieve X.509 certificates issued by iPlanet CMS or Microsoft Certificate Services. X.509 Directory LDAPS. Select this option if you are using a generic LDAPS directory server to store and retrieve X.509 certificates issued by iPlanet CMS or Microsoft Certificate Services.
4. In the Server Name box, enter the domain name or IP address of the server. For example, server.nai.com or 123.45.67.89 5. Type the port number of the server in the Port box. For example 11371 is used for old-style HTTP key server, 389 is commonly used for LDAP key servers. 6. The Key box is for LDAPS servers. The server key is used by the server to authenticate the connection. (Key information is not displayed until you connect to the server.)
180
PGP Freeware
Setting Options
7. Under Serves Key for Domain, select the Any Domain option to allow PGP to send keys from any domain to this key server. This option is enabled by default. If you want PGP to send only keys from a specific domain to this key server, select the option below Any Domain. Then, enter the domain name in the space provided. For example, if you specify the domain nai.com, only those keys whose email address ends in nai.com will be sent to this server. 8. Select the List in Search Window checkbox if you want this key server listed in the PGPkeys Search window.
Setting CA options
NOTE: X.509 authentication certificates are not supported in PGP Freeware. Use the CA panel to add your X.509 certificate to your PGP key. Before you can add your X.509 certificate however, you must first obtain the Root CA certificate from key server. For instructions about setting CA options and adding your X.509 certificate to your key, see Adding an X.509 certificate to your PGP key on page 76.
To set advanced options: 1. Open the PGP Options dialog box and select the Advanced tab. The Options dialog box opens with the Advanced panel showing (Figure 10-6).
Users Guide
181
Setting Options
Figure 10-6. PGP Options dialog box (Advanced panel) 2. Select your PGP advanced preferences: Encryption Algorithms You can select from these encryption algorithms to use for your encryption operations: CAST (the default). CAST is a 128-bit block cipher. It is a strong, military-grade encryption algorithm, which has a solid reputation for its ability to withstand unauthorized access. AES. (If you want to use AES, then you must make the selection before you generate your keys.) The new Advanced Encryption Standard (AES) chosen by the National Institute of Standards and Technology (NIST) is Rijndael, a block cipher designed by Joan Daemen and Vincent Rijmen. It is considered to be both faster and smaller than its competitors. The key size and block size can be 128-bit, 192-bit, or 256-bit in size and either can be increased by increments of 32 bits. IDEA. (If you want to use IDEA, then you must make the selection before you generate your keys.) IDEA is the algorithm used for all RSA Legacy keys generated by PGP.
182
PGP Freeware
Setting Options
Triple-DES. (If you want to use Triple-DES, then you must make the selection before you generate your keys.) Triple-DES is a U.S. Government algorithm that has withstood the test of time. Its an encryption configuration in which the DES algorithm is used three times with three different keys. Twofish. Twofish is a new 256-bit block cipher, symmetric algorithm created by Bruce Schneier. Twofish is one of five algorithms that the U.S. National Institute of Standards and Technology (NIST) is considering as a replacement for the current Advanced Encryption Standard (AES).
For more information about these algorithms, see The PGP Symmetric algorithms in An Introduction to Cryptography. The Preferred Algorithm choice affects the following: When using conventional encryption, the preferred cipher is used to encrypt. When creating a key, the preferred cipher is recorded as part of the key so that other people will use that algorithm when encrypting to you.
The Allowed Algorithm choice affects the following: When creating a key, the allowed ciphers are recorded as part of the key so that other people will use one of those algorithms when encrypting to you if the preferred algorithm is not available to them.
NOTE: Encrypting to a public key will fail if neither the Preferred Algorithm nor any of the Allowed Algorithms are available to the person encrypting the message.
WARNING: Clear the CAST, IDEA, Twofish, and Triple-DES check boxes only if you have suddenly learned that a particular algorithm is insecure. For example, if you become aware that Triple-DES has been broken, you can deselect that check box and all new keys you generate will have a record that Triple-DES may not be used when encrypting to you.
Users Guide
183
Setting Options
Trust Model For a better understanding of the concepts of trust and validity, see An Introduction to Cryptography. PGP gives you the option to select and/or change how key trust is displayed, and whether or not you wish to be warned whenever you encrypt a message to a public key that has an associated Additional Decryption Key. In the Trust Model section, choose from these options: Display marginal validity level. Use this check box to specify whether to display marginally valid keys as such, or simply to show validity as on or off. Marginal validity appears as bar icons having differing shading patterns. On/off validity appears as circle icons; green for valid, gray for invalid (the key has not been validated; it has not been signed by either a trusted introducer or by you). Treat marginally valid keys as invalid. Use this check box to specify whether to treat all marginally valid keys as invalid. Selecting this option causes the Key Selection dialog box to appear whenever you encrypt to marginally valid keys. Warn when encrypting to an ADK. Use this check box to specify whether to issue a warning whenever an encrypt-to key has an associated Additional Decryption Key.
Export format Compatible: Exports keys in a format compatible with previous versions of PGP. Complete: Exports the new key format, which includes photographic IDs and X.509 certificates.
Automatic keyring back up when PGP closes Select this check box to back up your public and private keyrings automatically when you close PGP. Back up to keyring folder. Select this option to store your keyring back up files in the default PGP keyring folder. Back up to. Select this option to specify the location in which you want to store your backup files.
3. Click OK to save your changes or choose another tab to continue configuring your PGP options.
184
PGP Freeware
Setting Options
To set VPN options: 1. Open the PGP Options dialog box and select the VPN tab. The Options dialog box opens with the VPN panel showing (Figure 10-7).
Figure 10-7. PGP Options dialog box (VPN panel) 2. Choose from the following options: Enable VPN connections Use this feature if you elect to run a different VPN software on your machine. Disabling PGPnets VPN feature provides compatibility with third party VPN software and allows you to use PGPnets Personal Firewall and IDS features.
Users Guide
185
Setting Options
To enable or disable the VPN, click the check box. If the VPN is disabled, a check mark appears in the box. If the VPN is enabled, the box is empty.
Dynamic VPN The Dynamic VPN feature allows you to communicate with anyone else who has PGPnet installed. PGPnet automatically encrypts and establishes an SA without any prior configuration. You do not even need to run PGPnet, as long as the Dynamic VPN Attempt setting is active (box is checked) and your local authentication key is set. For example, assume that your machine, machine1, and your friends machine, machine2, both have PGPnet installed and running, both have the Dynamic VPN Attempt setting active, but neither of you have the other machine configured (that is, you dont have machine2 in your host list, and your friend doesnt have machine1 in his host list). If machine1 contacts machine2, PGPnet discovers that machine2 supports IKE, and, as a result, negotiates an SA. Note that between the time that machine1 begins to communicate with machine2, and the time that the SA is negotiated, your communication is not protected by PGPnet. PGPnet uses the three Dynamic VPN settings (Attempt, Allow, and Require) to control how you communicate with unconfigured hosts: Attempt. If you start to communicate with an unconfigured host (that is, the host is not in the host list and thus, there is no SA), PGPnet allows communications to continue while it attempts to create an SA. If PGPnet cannot negotiate an SA, communication continues insecurely. If PGPnet can negotiate an SA, the communication is encrypted. Note that when communicating with unconfigured hosts, some packets may pass in the clear or unencrypted before the connection is encrypted. This delay is usually about one to three seconds. Allow. This setting allows other hosts to connect to your machine securely, but you do not initiate SAs with unconfigured hosts. Require. Secure communications are required and all insecure traffic is dropped unless the host is configured as insecure.
186
PGP Freeware
Setting Options
Automatic Key Renewal You can change the automatic key renewal values for Setup Keys (IKE) and Primary Keys (IPsec). These keys are responsible for creating your Security Associations. The default settings will work fine for most users. However, if you frequently send or receive large files, you may want to increase the key renewal values to prevent the need for frequent rekeying. Values for Setup Keys (IKE) can be set in time (Duration); values for Primary Keys (IPsec) can be set in time (Duration) or data size (Megabytes). Duration is displayed in the following manner: 2d, 08h, 04m (key expires in 2 days, 8 hours, and 4 minutes) Megabytes is displayed in the following manner: 99 (key expires after 99 megabytes of data are transferred) Note that when you establish an SA with another host, PGPnet uses the most restrictive key renewal values set by either of the two hosts. As a result, you may see an SA expire before your renewal value is met.
WARNING: Lowering the default value for Megabytes may result in multiple rekeyings when transmitting large files, which may, in turn, cause temporary interruption of normal network function. 3. Click OK to save your changes or choose another tab to continue configuring your PGP options.
Users Guide
187
Setting Options
To set automatic renewal values for Primary Keys (IPsec): 1. Display the VPN panel (View>Options). The Automatic Key Renewal information appears in the bottom section of the VPN panel. 2. To set a duration for Primary Keys, select the check box next to Duration. Use the up and down arrows next to the Duration field to set the appropriate time limit or enter a numeric value in each field: d, h, m. 3. To set a data value in Megabytes for Primary Keys, select the check box next to Megabytes. Use the up and down arrows to set the appropriate megabyte limit or enter a numeric value. 4. Click OK.
To set VPN authentication options: NOTE: X.509 authentication certificates are not supported in PGP Freeware. 1. Open the PGP Options dialog box and select the VPN Authentication tab. The Options dialog box opens with the VPN Authentication panel showing (Figure 10-8).
188
PGP Freeware
Setting Options
Figure 10-8. PGP Options dialog box (VPN Authentication panel) 2. Select your VPN authentication options: Authenticating your Connection Select key. Displays a dialog box. Use this dialog box to select your key pair. You must then enter the passphrase for the selected key. Clear Key. Clears the selected key. Select Certificate. Displays a dialog box. Use this dialog box to select your X.509 private certificate on the keyring. You must then enter the passphrase for the selected certificate. Clear Certificate. Clears the selected X.509 certificate.
When you click OK, you are asked to enter the passphrase for the selected authentication key or certificate. Enter the passphrase and click OK. You are asked to enter this passphrase each time you login to PGPnet.
Users Guide
189
Setting Options
Remote Authentication Normally you will want to require a valid authentication key or certificate from configured hosts. To do so, click Require valid remote authentication from configured hosts. Unconfigured hosts may have no prior trust relationship with you. Allowing them to connect with an invalid key or certificate provides encryption of traffic which would otherwise be in the clear. To allow connection from unconfigured hosts with an invalid key or certificate, clear the Require valid remote authentication from unconfigured hosts box. To require valid remote authentication from unconfigured hosts, click Require valid remote authentication from unconfigured hosts.
3. Click OK to save your changes or choose another tab to continue configuring your PGP options.
190
PGP Freeware
Setting Options
To set VPN advanced options: 1. Open the PGP Options dialog box and select the VPN Advanced tab. The Options dialog box opens with the VPN Advanced panel showing (Figure 10-9).
Figure 10-9. PGP Options dialog box (VPN Advanced panel) 2. Select your VPN advanced options: Allowed Remote Proposals The Allowed Remote Proposals portion of this panel identifies the types of ciphers, hashes, compression, and Diffie-Hellman keys that PGPnet allows.
NOTE: Only experienced IPsec users should make any changes to the settings on this panel.
Users Guide
191
Setting Options
Ciphers. Ciphers are algorithms used to encrypt and decrypt. To allow a specific type of cipher (CAST or TripleDES), place a check in the box to the left of the cipher. Check None with extreme caution or not at all, as it tells PGPnet to accept proposals that do not include encryption from other users. Hashes. A hash function takes a variable-sized input string and converts it to a fixed-sized output string. To allow a specific type of hash (SHA-1 or MD5), place a check in the box to the left of the hash function. Check None with extreme caution or not at all, as it tells PGPnet to accept proposals that do not include authentication from other users. Diffie-Hellman. Diffie-Hellman is a key agreement protocol. To allow a specific key size (1024 or 1536), place a check in the box to the left of the key size. Compression. A compression function takes a fixed-sized input and returns a shorter, fixed sized output. There are two types of compression: LZS and Deflate. To allow a specific type of compression, place a check in the box to the left of the compression type.
NOTE: LZS and Deflate increase performance for low-speed communications such as modems and ISDN. LZS and Deflate decrease performance for fast-speed communications (for example, cable modem, DSL, T-1, and T-3). This is due to the overhead of the compression routines. For instructions on how to add and remove allowed remote proposals, see Adding and removing Allowed Remote proposals on page 195. Proposals Use the Proposals portion of the VPN Advanced panel to add, edit, remove, or reorder your existing proposals. The IKE and IPsec proposals tell PGPnet what proposals to make to other users; proposals must be accepted exactly as specified. Note that PGPnet allows a minimum of one and maximum of 16 proposals for both IKE and IPsec proposals.
NOTE: Only experienced IPsec users should make any edits to this panel.
192
PGP Freeware
Setting Options
The types of information used in IKE proposals are: Authentication. Authentication is a means of verifying information, such as identity.There are three types of authentication: shared key (a secret key shared by two or more users), DSS signature (a Digital Signature Standard signature, and RSA signature. Hash. A hash function takes a variable-sized input string and converts it to a fixed-sized output string. There are two types of hash: SHA (Secure Hash Algorithm) and MD5 (Message-Digest Algorithm). Ciphers. Ciphers are algorithms used to encrypt and decrypt. There are two types available: CAST and TripleDES. Diffie-Hellman. Diffie-Hellman is a key agreement protocol. There are two sizes of Diffie-Hellman keys available: 1024 and 1536.
The types of information used in IPsec Proposals are: AH. Enables Authentication Header (AH). AH is included for backward compatibility with older IPsec products. AH does not provide encryption. AH authenticates your IP addresses. This can, however, create problems. Since NAT translates your IP addresses, AH's authentication of your IP address can result in packet authentication failure. To use AH, you must select Ciphers None on the VPN Advanced panel, add an IPsec proposal that includes AH, and move that proposal to the top of the proposals list. There are two types available: SHA and MD5. ESP. Enables Encapsulating Security Payload (ESP), a sub-protocol of IPsec that handles both encryption and authentication. To allow remote proposals to initiate ESP None you must check the Ciphers None check box on the VPN Advanced panel. You must also add a proposal to your IPsec proposals that includes ESP None and move that proposal to the top of your IPsec proposal list. There are three hash types: None, SHA, and MD5. There are three cipher types: None, CAST, and TripleDES. IPPCP. Enables IP Payload Compression Protocol (IPPCP). Use for dial-up connections only. Involves major overhead.
Users Guide
193
Setting Options
To use IPPCP, you must create a new IPsec proposal that includes IPPCP on the VPN Advanced panel, move the proposal to the top of the proposals list, and turn on IPPCP and LZS or Deflate. Deflate has much higher overhead than LZS, so LZS is recommended. Compression algorithms take a fixed-sized input and create a smaller fixed-sized output. If another machine proposes IPPCP to PGPnet, PGPnet accepts the proposal, unless LZS and Deflate are turned off in the Remote Proposals section of the VPN Advanced panel. There are two types of IPPCP: Deflate and LZS.
NOTE: LZS and Deflate increase performance for low-speed communications such as modems and ISDN, and decrease performance for fast-speed communications (for example, cable modem, DSL, T-1, and T-3). This is due to the overhead of the compression routines. For more information on how to add, edit, reorder, or remove IKE and IPsec proposals, see Working with IKE and IPsec proposals on page 195. Perfect Forward Secrecy All IPsec proposals use the same Perfect Forward Secrecy Diffie-Hellman setting: None, 1024, or 1536 bits. If Perfect Forward Secrecy is on, PGPnet generates the keys for a particular connection and then disposes of the key material used to generate the key. If an attacker were able to brute-force attack a specific SA, it would not help the attacker brute-force past or future connections. If PFS is on (that is, you select 1024 or 1536), it must be turned on on all machines that you communicate with. PFS requires additional Diffie-Hellman key exchanges which takes additional processing time. This can become an issue on a gateway that handles hundreds of SA negotiations a minute if everyone is using PFS. If PFS is turned on on your machine but it is off on a gateway, you cannot negotiate an SA with that gateway.
194
PGP Freeware
Setting Options
Default Settings button Use this button to restore the default settings for all fields on this screen. In most cases, the default settings will be sufficient to establish SAs and use PGPnet. 3. Click OK to save your changes or choose another tab to continue configuring your PGP options.
To remove an item from the Allowed Remote Proposals: 1. Display the Options dialog box (View>Options) 2. Click the VPN Advanced tab. 3. Clear the check box to the left of the item. 4. Click OK.
Users Guide
195
Setting Options
Figure 10-10. IKE and IPsec Proposal dialog boxes 5. Click OK. 6. If you are adding an IPsec proposal, select the appropriate Diffie-Hellman setting (None, 1024, and 1536) in the Perfect Forward Secrecy setting. All IPsec proposals use the same Diffie-Hellman setting. 7. Click OK.
To edit an IKE or IPsec proposal: 1. Display the Options dialog box (View>Options). 2. Click the VPN Advanced tab. 3. Select the Proposal. 4. Click Edit. 5. Make the appropriate changes in the IKE or IPsec Proposal dialog box (Figure 10-10 on page 196). 6. Click OK. 7. Review the setting displayed in the Perfect Forward Secrecy box. Note that all IPsec proposals use the same Diffie-Hellman setting. Change the setting if required. 8. Click OK on the VPN Advanced panel.
196
PGP Freeware
Setting Options
To remove an IKE or IPsec proposal: 1. Display the Options dialog box (View>Options). 2. Click the VPN Advanced tab. 3. Click the proposal. 4. Click Remove. 5. Click OK.
To reorder IKE or IPsec proposals: 1. Display the Options dialog box (View>Options). 2. Click the VPN Advanced tab. 3. Select the proposal. 4. To move the proposal up, click Move Up. To move the proposal down, click Move Down. 5. Click OK.
Users Guide
197
Setting Options
198
PGP Freeware
Troubleshooting PGP
B
Solution Use a different key to authenticate the network share file connection, or contact the remote user to assure them that the key youre using is valid. Reinstall PGP.
This appendix presents information about problems you may encounter while using PGP and suggests solutions. The following table lists PGP errors, a possible cause for the error, and a solution.
Error Authentication rejected by remote SKEP connection Cause The user on the remote side of the network share file connection rejected the key that you provided for authentication. Could be the result of an incorrect installation, a system failure, or tampering with your system. The output is larger than the internal buffers can handle.
Cannot perform the requested operation because the output buffer is too small.
If you are encrypting or signing, you may have to break up the message and encrypt/sign smaller pieces at a time. If you are decrypting or verifying, ask the sender to encrypt/sign smaller pieces and re-send them to you. Choose a different key, or generate a new key that can encrypt data. Choose a different key, or generate a new key that can sign data. Check to make sure that the destination address you provided is the correct one. If you are sure of this, check your connection to the network.
Could not encrypt to specified key because it is a sign-only key. Could not sign with specified key because it is an encrypt-only key. Error in domain name systemic
The selected key can only be used for signing. The selected key can only be used for encrypting. The destination address you provided is incorrect, or your network connection is misconfigured.
Users Guide
199
Troubleshooting PGP
Solution If you received the shares from a share file, try choosing a different share file. If you received the shares from the network, you may need to contact the user at the remote location and tell them to send a different set of shares Generate your own pair of keys in PGPkeys. Try re-establishing the connection by repeating the procedure you used to start the connection. If that fails, check your connection to the network. The file is probably corrupt. Try altering your PGP Preferences to use a different file, if possible. Download the freeware version or buy the commercial version of the product. Ask the sender to re-send the message if it's a message that you're working with. If it's your keyring, try restoring from your backup keyring. There is a file that is probably corrupt or missing. It may or may not be the keyring file. Try using a different file name or path, if possible. Double-click on the detached signature file first. You may have the CAPS LOCK on, or you simply may have mis-typed the passphrase. Try again. Close other running programs. If that doesn't work, you may need more memory in your machine.
There are no private keys on your keyring. The network connection to the PGP key server or to the network share file connection has been broken. The program failed to read or write data in a certain file. The product evaluation time has expired.
The action could not be completed due to an invalid file operation. The evaluation time for PGP encrypting and signing has passed. Operation aborted. The keyring contains a bad (corrupted) PGP packet.
The PGP message that you are working with has been corrupted, or your keyring has been corrupted. The program failed to read or write data in a certain file. The signature for the message/file is located in a separate file. The passphrase you entered is incorrect.
The message/data contains a detached signature. The passphrase you entered does not match the passphrase on the key. The PGP library has run out of memory.
200
PGP Freeware
Troubleshooting PGP
Error The specified user ID was not added because it already exists on the selected key. The specified key could not be found on your keyring. The specified input file does not exist. There is not enough random data currently available.
Cause You can't add a User ID to a key if there is one just like it already on the key. The key needed to decrypt the current message is not on your keyring. The file name typed in does not exist. The random number generator needs more input in order to generate good random numbers. The program failed to write data to a certain file. A file that was needed couldn't be opened.
Solution Try adding a different user ID, or delete the matching one first.
Ask the sender of the message to re-send the message and make sure they encrypt the message to your public key. Browse to find the exact name and path of the file you want. When prompted, move the mouse around, or press random keys, in order to generate input.
There was an error during the writing of the keyring or the exported file. There was an error opening or writing the keyring or the output file.
Your hard drive may be full, or if the file is on a floppy, the floppy is not present in the floppy drive. Make sure the settings in your PGP Preferences is correct. If you've recently deleted files in the directory that you installed PGP, you may need to re-install the product. You may have accidentally picked the wrong key. If so, choose a different key to sign. Close other programs that may be accessing the same files as the program you are running. If you keep your keyring files on a floppy disk, make sure that the floppy disk is in the floppy drive.
This key is already signed by the specified signing key. Unable to perform operation because this file is read-only or otherwise protected. If you store your keyring files on removable media the media may not be inserted.
You can't sign a key that you have already signed. A file that was needed is set to read-only or is being used by another program.
Users Guide
201
Troubleshooting PGP
202
PGP Freeware
Troubleshooting PGPnet
This appendix contains explanations for error messages that may appear on PGPnets Log panel, tells you how to solve problems that may occur with PGPnet, and includes additional information about PGPnet features that you can use to troubleshoot problems with PGPnet.
No SPI Found
Report this problem to NAI. Verify that you are using the same shared secret as the other machine.
Compare the other machines configuration with your own configuration (VPN Advanced Options panel).
Users Guide
203
Troubleshooting PGPnet
Cause Cookie is no longer valid between machine A and machine B. One machine is attempting to communicate via an SA that has been terminated. Generally harmless. 1) Routing problem. IP protocols 50 and 51 UDP 500 for IKE. 2) You are sending requests to a machine that is configured incorrectly.
Response timeout
Find out if there is a firewall or Network Address Translation (NAT) device preventing connection. Remove the NAT device. NAT is incompatible with many Internet protocols, including IPsec.
Additional tips
You can use IKE log for troubleshooting. To access the IKE log, click Advanced on the Log panel. In a corporate setting, Administrators can lock their users PGPnet configurations settings. See the PGP Administrators Guide for details. If communications are really slow, check the compression setting on the PGP VPN Advanced panel. You may not want to use compression. Note that compression is only useful for dial-up connections. If you secure more than one network interface on a Windows 98 machine, multiple PGPnet adapters appear in your Network control panel. If you are having trouble creating an SA, use Set Adapter (Start>Programs>PGP>SetAdapter) to ensure that the network interface you are using is secured by PGPnet. If you can create an SA with a machine (a green light appears in the SA column) but you cannot send or receive traffic, make sure PGPnet and your Network Address Translation (NAT) have the same device or adapter. You may be bound to the wrong adapter. Check Set Adapter (Start>Programs>PGP>Set Adapter).
204
PGP Freeware
Troubleshooting PGPnet
Understanding authentication
The VPN Authentication panel controls how you authenticate yourself with other machines. It also controls if other machines, configured or unconfigured, must present valid remote authentication to communicate with your machine. The Remote Authentication option on the Host/Gateway dialog controls how a specific host authenticates itself to your machine.
Users Guide
205
Troubleshooting PGPnet
IMPORTANT: If you select a specific PGP key or X.509 certificate for a secure subnet entry, all users within that subnet must use the same key to authenticate themselves. This would be an unusual configuration. All key authentications appear on the Log panel, and each entry displays the key ID.
206
PGP Freeware
Transferring files to and from MacOS is a classic problem in using almost any kind of data exchange software, such as email applications, FTP, compression utilities, and PGP. This appendix is intended to document how this problem has finally been solved by PGP version 5.5.x and above, and to discuss how to communicate with previous versions of PGP. The MacOS stores files differently from other operating systems. Even the text file format of the MacOS is different. MacOS files are really two files consisting of a Data segment and a Resource segment. In order to send a file from MacOS to Windows without losing data, the two segments must be merged into one. The standard method by which a MacOS file is converted into a single file so that it can be transferred to another Macintosh or PC without losing either of its halves is called MacBinary. The problem is that, without special software, Windows and other platforms cannot inherently understand the MacBinary format. If a situation occurs where the receiving software fails to convert a MacBinary format file into a Windows file, the resulting file is unusable. Third-party utilities exist on Windows to convert it after the fact into a usable file, but that can be rather inconvenient. Versions of PGP prior to 6.0 and many utilities available on the market today generally try to ignore this problem as much as possible and leave all decisions up to the user as to whether or not to encode a file with MacBinary when sending from MacOS. This places the burden of deciding to send with MacBinary, and not risk losing any data, or send without MacBinary, with hope that no important data will be lost on the user, who often has no idea what the correct decision is. The decision should generally be based on whether the file is being sent to Windows or MacOS. But what about if you're sending to both at the same time? There is no good solution to that problem with older versions of PGP and many other utilities. This has resulted in great confusion and inconvenience for users.
Users Guide
207
The reverse, sending a file from Windows to the MacOS, has also been a major problem. Windows uses filename extensions, such as .doc, to identify the type of a file. This is meaningless to the MacOS. These files are sent to a Macintosh computer without any file type or creator information. The process of making them readable after receipt generally involves various arcane motions in the Open dialog of the creator application, or in many cases requires the user to understand MacOS lore of creator and type codes by setting them manually in a third-party utility. Fortunately, the latest version of PGP (versions 5.5 and above) leads the way out of this confusion.
208
PGP Freeware
MacBinary: Smart. There are some very limited cases where this option can be useful when communicating with users who are not using later versions of PGP. This option makes a decision as to whether to encode with MacBinary based on an analysis of the actual data in the file. If the file is one of the following types, it will not be encoded with MacBinary, thereby making it readable on a PC with any version of PGP: PKzip compressed file Lempel-Ziv compressed file MIDI music format file PackIt compressed file GIF graphics file StuffIt compressed file Compactor compressed file Arc compressed file JPEG graphics file
As shown, only a limited selection of files will result in a readable file by old versions of PGP on other platforms using the Smart option. Any other file received on a PC with an older version of PGP will be unreadable without stripping the MacBinary encoding with a third-party utility. Also, the file will not have the correct filename extension on the PC unless that extension was manually added by the user on the sending side. Using Smart mode, the resulting file may not be the same as the original when sent to a Macintosh, because it may lose its creator and type codes. This mode remains in the product mostly due to the fact that it was in PGP Version 5.0 and some users may only have a need to send the above file types. This option is not recommended in most cases. In summary, if you are sending only to versions 6.x or above, always select MacBinary: Yes (the default). Thus, no thought is required if your environment is using PGP version 6.x or above exclusively. When sending to users with older versions, you should select MacBinary: No for cross-platform file types and MacBinary: Yes for files which simply wouldn't be readable to PC users anyway (such as a MacOS application). NOTE: PGP Version 5.0 did not have a MacBinary: No option. In order to send file types without MacBinary, which are not included in the MacBinary: Smart list to a PC using 5.0, the file must be manually set to one of the creator and type codes on the Smart list before sending.
Users Guide
209
Supported applications
The following list of major applications produce documents which are automatically translated by PGP when sent from Windows to MacOS and vice versa. You can add items to this list by editing the PGPMacBinaryMappings.txt file in the \WINDOWS directory. On the Mac side, remove the .txt suffix on the filenamePGPMacBinaryMappings is located in System Folder/Preferences/Pretty Good Preferences. PhotoShop (GIF, native Photoshop documents, TGA, JPEG) PageMaker (Versions 3.X, 4.X, 5.X, 6.X) Microsoft Project (project and template files) FileMaker Pro Adobe Acrobat Lotus 123 Microsoft Word (text, RTF, templates) PGP Microsoft PowerPoint
210 PGP Freeware
StuffIt QuickTime Corel WordPerfect Microsoft Excel (many different types of files) Quark XPress The following general filename extensions are also converted:
.cvs .dl .msp .plt .spc .gz .mpg .mod .pit .arj .fli .pac .pm .sr .vga .dvi .svx .txt .ima .ico .pbm .ppm .sun .eps .iff .pcs .rif .sup .lzh .aif .tar .pak .mac .img .pcx .rle .wmf .Z .zip .pct .tif .cgm .lbm .pgm .shp .flc .exe .au .pic .eps
.hal
.tex .wav .mdi
Users Guide
211
212
PGP Freeware
Users Guide
213
Stewart's scheme for error detection while reading aloud long sequences of bytes via a word list entails using not one, but two lists of words. Each list contains 256 phonetically distinct words, each word representing a different byte value between 0 and 255. The two lists are used alternately for the even-offset bytes and the odd-offset bytes in the byte sequence. For example, the first byte (offset 0 in the sequence) is used to select a word from the even list. The byte at offset 1 is used to select a byte from the odd list. The byte at offset 2 selects a word from the even list again, and the byte at offset 3 selects from the odd list again. Each byte value is actually represented by two different words, depending on whether that byte appears at an even or an odd offset from the beginning of the byte sequence. For example, suppose the word adult and the word amulet each appears in the same corresponding position in the two word lists, position 5. That means that the repeating 3-byte sequence 05 05 05 is represented by the 3-word sequence adult, amulet, adult. This approach makes it easy to detect all three kinds of common errors in spoken data streams: transposition, duplication, and omission. A transposition will result in two consecutive words from the even list followed by two consecutive words from the odd list (or the other way around). A duplication will be detected by two consecutive duplicate words, a condition that cannot occur in a normal sequence. An omission will be detected by two consecutive words drawn from the same list. To facilitate the immediate and obvious detection by a human of any of the three error syndromes described above, without computer assistance, we made the two lists have one obviously different property: The even list contains only two-syllable words, while the odd list contains only three-syllable words. That suggestion came from Patrick Juola, a computational linguist. PGPfone was the application that precipitated the actual development of the word list by Juola and Zimmermann. PGPfone is an application that turns your computer into a secure telephone. We used it to authenticate PGPfone's initial Diffie-Hellman key exchange without using digital signatures and public key infrastructures. We knew we would end up using it for authenticating PGP key fingerprints when we applied it to PGP later. The idea behind building the word lists was to develop a metric to measure the phonetic distance between two words, then use that as a goodness measure to develop a full list. Grady Ward provided us with a large collection of words and their pronunciations, and Patrick Juola used genetic algorithms to evolve the best subset of Ward's list.
214
PGP Freeware
To briefly summarize what he did, he made a large population of guesses and let the population sexually reproduce by exchanging words with other guesses -- and, like biological evolution, the better guesses survived into the next generation. After about 200 generations, the list had mostly stabilized into a best guess, with far greater phonetic distance between the words than what we started with in the initial guess lists. The first major hurdle was the development of the metric. Linguists have studied sound production and perception for decades, and there is a standard feature set used to describe sounds in English. For example, say the words pun, fun, dun, and gun (go ahead, try it), and notice how your tongue keeps moving back in your mouth on each word. Linguists call this the place of articulation, and noises that are very different in this feature sound different to English speakers. Combining the features of all the sounds in a word gives us a representation of the sound of the entire word -- and we can compute the phonetic distance between a pair of words. Actually, it wasn't that simple. We didn't know how to weight the various features, certain word-level features like accents were hard to represent, and the feature-based analysis simply fails for certain sounds. There were also a few other more subtle criteria; for example, we wanted the words to be common enough to be universally recognizable, but not so common as to be boring --and we didn't want confusing words like repeat or begin or error. Some sound features are less perceptible to non-native-English speakers, for example, some Japanese speakers might hear and pronounce r and l the same way. It would be nice if the words were short enough that you could fit enough of them on a small LCD display. Large consonant clusters (corkscrew has five pronounced consonants in a row) are sometimes hard to say, especially to non-English speakers. One way or another, we tried to incorporate all these criteria into a filter on the initial dictionary list or into the distance metric itself. After the computer evolved the winning list, we looked at it. Yes, the words were phonetically distinct. But many of them looked like a computer picked them, not a human. A lot of them were just ugly and dumb. Some were repugnant, and some were bland and wimpy. So we applied some wetware augmentation to the list. Some words were deleted, and replaced by some human-chosen words. We had the computer check the new words against the list to see if they were phonetically distant from the rest of the list. We also tried to make the words not come too close to colliding phonetically with the other words in the larger dictionary, just so that they would not be mistaken for other words not on the list. There were a variety of selection criteria that Juola used in his algorithms. He published a paper on it that goes into more detail. This document is just a brief overview of how we built the list.
Users Guide
215
I'm not entirely happy with the word list. I wish it had more cool words in it, and less bland words. I like words like Aztec and Capricorn, and the words in the standard military alphabet. While we'd like to reserve the right to revise the list at some future time, it's not likely, due to the legacy problems that this initial version will create. This version of the list was last modified in September 1998.
216
PGP Freeware
Two Syllable Word List aardvark adult allow artist baboon bedlamp berserk blowtorch breadline button checkup clamshell cobra cranky cubic dragnet drumbeat edict enlist eyetooth flytrap gazelle goldfish hockey island klaxon miser Neptune offload pheasant prefer puppy ragtime reindeer reward rocker scenic sentence skydive snowcap spaniel spindle standard stopwatch sweatband tempest tracker trouble unearth vapor wallet Zulu absurd afflict alone assume backfield beehive billiard bluebird breakup buzzard chisel classic commence crowfoot dashboard drainage drunken egghead erase facial fracture Geiger gremlin indoors jawbone locale Mohawk newborn optic physique preshrunk python ratchet rematch rhythm ruffled scorecard shadow slingshot snowslide spearhead spyglass stapler stormy swelter tiger transit tumor unwind village watchword accrue ahead ammo Athens backward beeswax bison bombast brickyard cement choking classroom concert crucial deadbolt dreadful Dupont eightball escape fallout framework glitter guidance indulge keyboard lockup mural nightbird orca playhouse printer quadrant rebirth repay ribcage sailboat Scotland shamrock slowdown solo spellbind stagehand steamship sugar tactics tissue trauma tunnel uproot virus wayside acme aimless ancient atlas banjo befriend blackjack bookshelf briefcase chairlift chopper cleanup cowbell crumpled deckhand drifter dwelling endorse exceed flagpole freedom glucose hamlet inverse kickoff merit music Oakland payday Pluto prowler quiver reform retouch ringbolt sawdust seabird showgirl snapline southward spheroid stagnate sterling surmount talon tonic treadmill tycoon upset Vulcan willow adrift Algol apple Aztec beaming Belfast blockade brackish Burbank chatter Christmas clockwork crackdown crusade dogsled dropper eating endow eyeglass flatfoot frighten goggles highchair involve kiwi minnow necklace obtuse peachy preclude pupil quota regain revenge robust scallion select skullcap snapshot soybean spigot stairway stockman suspense tapeworm topmost Trojan uncut upshot waffle woodlark
Users Guide
217
Three Syllable Word List adroitness almighty Apollo atmosphere belowground bottomless Burlington cannonball cellulose clergyman component consensus crossover decadence detergent disable embezzle equipment existence forever getaway guitarist headwaters hurricane indigo insincere Istanbul liberty megaton miracle monument Norwegian Orlando paperweight pedigree pharmacy politeness proximate racketeer replica retrieval sandalwood sensation stethoscope sympathy tolerance trombonist underfoot upcoming visitor whimsical Yucatan
218 PGP Freeware
adviser amulet armistice autopsy bifocals Bradbury businessman Capricorn certify coherence concurrent consulting crucifix December determine disbelief enchanting escapade exodus fortitude glossary hamburger hemisphere hydraulic inertia insurgent Jamaica maritime microscope misnomer mosquito October outfielder paragon Pegasus phonetic positive puberty rebellion reproduce retrospect sardonic sociable stupendous tambourine tomorrow truncated unicorn vacancy vocalist Wichita
aftermath amusement article Babylon bodyguard bravado butterfat caravan chambermaid combustion confidence corporate cumbersome decimal dictator disruptive enrollment Eskimo fascinate frequency gossamer Hamilton hesitate impartial infancy integrate Jupiter matchmaker microwave molasses narrative Ohio Pacific paragraph penetrate photograph potato publisher recipe resistor revenue Saturday souvenir supportive telephone torpedo typewriter unify vagabond voyager Wilmington
aggregate antenna asteroid backwater bookseller Brazilian Camelot caretaker Cherokee commando conformist corrosion customer designing dinosaur distortion enterprise everyday filament gadgetry graduate handiwork hideaway impetus inferno intention leprosy maverick midsummer molecule nebula onlooker pandemic paramount perceptive pioneer processor pyramid recover responsive revival savagery specialist surrender therapist tradition ultimate universe vertigo warranty Wyoming
alkali applicant Atlantic barbecue borderline breakaway candidate celebrate Chicago company congregate councilman Dakota detector direction document equation examine finicky Galveston gravity hazardous holiness inception informant inventive letterhead Medusa millionaire Montana newsletter opulent Pandora passenger performance pocketful provincial quantity repellent retraction revolver scavenger speculate suspicious tobacco travesty undaunted unravel Virginia Waterloo yesteryear
Glossary
AES (Advanced Encryption Standard) NIST approved encryption standards, usually used for the next 20 - 30 years. Rijndael, a block cipher designed by Joan Daemen and Vincent Rijmen, was chosen as the new AES in October 2000. a security protocol that provides authentication services. AH is embedded in the data to be protected. AH can be used either by itself or with Encryption Service Payload (ESP). a set of mathematical rules (logic) used in the processes of encryption and decryption. a set of mathematical rules (logic) used in the processes of message digest creation and key/signature generation. of unknown or undeclared origin or authorship, concealing an entitys identification. develops standards through various Accredited Standards Committees (ASC). The X9 committee focuses on security standards for the financial services industry. binary information that has been encoded using a standard, printable, 7-bit ASCII character set, for convenience in transporting the information through communication systems. In the PGP program, ASCII armored text files are given the default filename extension, and they are encoded and decoded in the ASCII radix-64 format. a separate but integrated user key-pair, comprised of one public key and one private key. Each key is one way, meaning that a key used to encrypt information can not be used to decrypt the same data. the determination of the origin of encrypted information through the verification of someones digital signature or someones public key by checking its unique fingerprint. an electronic document to prove ones access or privilege rights, also to prove one is who they say they are. to convey official sanction, access or legal power to an entity. the Setup Keys (IKE) and Primary Keys (IPsec) are responsible for creating your Security Associations. They are automatically renewed based on the Automatic Key Renewal values that appear on the VPN Options panel for Windows or the VPN Key Refresh option for Mac.
AH (Authentication Header)
Algorithm (encryption)
Algorithm (hash)
Anonymity
ASCII-armored text
Asymmetric keys
Authentication
Authorization certificate
Users Guide
219
Glossary
Backdoor
a cipher design fault, planned or accidental, which allows the apparent strength of the design to be easily avoided by those who know the trick. When the design background of a cipher is kept secret, a back door is often suspected. a backdoor program for Windows 9x written by a group calling themselves the Cult of the Dead Cow. This backdoor allows remote access to the machine once installed, allowing the installer to run commands, get screen shots, modify the registry, and perform other operations. Client programs to access Back Orifice are available for Windows and UNIX. ability to sign documents without knowledge of content, similar to a notary public. a symmetric cipher operating on blocks of plain text and cipher text, usually 64 bits. a trusted third party (TTP) who creates certificates that consist of assertions on various attributes and binds them to an entity and/or to their public key. Microsofts crypto API for Windows-based operating systems and applications. a 64-bit block cipher using 64-bit key, six S-boxes with 8-bit input and 32-bit output, developed in Canada by Carlisle Adams and Stafford Tavares. an electronic document attached to a public key by a trusted third party, which provides proof that the public key belongs to a legitimate owner and has not been compromised. endorsement of information by a trusted entity. to sign another person's public key. one or more trusted individuals who are assigned the responsibility of certifying the origin of keys and adding them to a common database. plaintext converted into a secretive format through the use of an encryption algorithm. An encryption key can unlock the original plaintext from ciphertext. messages that are digitally signed but not encrypted. characters in a human readable form or bits in a machine-readable form (also called plain text).
Back Orifice
Blind signature
Block cipher
CA (Certificate Authority)
CAST
Ciphertext
220
PGP Freeware
Glossary
Compression function
a compression function takes a fixed-sized input and returns a shorter, fixed sized output. a public key that is designated by the security officer of a corporation as the system-wide key that all corporate users trust to sign other keys. encryption that relies on a common passphrase instead of public key cryptography. The file is encrypted using a session key, which encrypts using a passphrase that you will be asked to choose. the art or science of transferring cipher text into plain text without initial knowledge of the key used to encrypt the plain text. same as PKCS #11. the art and science of creating messages that have some combination of being private, signed, unmodified with non-repudiation. a system comprised of cryptographic algorithms, all possible plain text, cipher text, and keys. a method of ensuring information has not been altered by unauthorized or unknown means. a method of unscrambling encrypted information so that it becomes legible again. The recipient's private key is used for decryption. an assault, usually planned, that seeks to disrupt Web access. A denial of service attack overwhelms an Internet server with connection requests that cannot be completed. In so doing, it causes the server to become so busy attempting to respond to the attack that it ignores legitimate requests for connections. a 64-bit block cipher, symmetric algorithm also known as Data Encryption Algorithm (DEA) by ANSI and DEA-1 by ISO. Widely used for over 20 years, adopted in 1976 as FIPS 46. a calculated brute force attack to reveal a password by trying obvious and logical combinations of words. the first public key algorithm, invented in 1976, using discrete logarithms in a finite field. electronic money that is stored and transferred through a variety of complex protocols. an establishment of peer-to-peer confidence. see signature.
Conventional encryption
Cryptanalysis
CRYPTOKI Cryptography
Cryptosystem
Data integrity
Decryption
Dictionary attack
Diffie-Hellman
Digital cash
Users Guide
221
Glossary
DSA (Digital Signature Algorithm) DSS (Digital Signature Standard) ECC (Elliptic Curve Cryptosystem) EES (Escrowed Encryption Standard) Elgamal scheme
a public key digital signature algorithm proposed by NIST for use in DSS. a NIST proposed standard (FIPS) for digital signatures using DSA.
a unique method for creating public key algorithms based on mathematical curves over finite fields or with large prime numbers. a proposed U.S. government standard for escrowing private keys.
used for both digital signatures and encryption based on discrete logarithms in a finite field; can be used with the DSA function. a method of scrambling information to render it unreadable to anyone except the intended recipient, who must decrypt it to read it. IPsec header that encrypts the contents of an IP packet.
Encryption
a uniquely identifying string of numbers and characters used to authenticate public keys. This is the primary means for checking the authenticity of a key. See Key Fingerprint. a U.S. government standard published by NIST.
a combination of hardware and software that protects the perimeter of the public/private network against certain attacks to ensure some degree of security. a one way function that takes an input message of arbitrary length and produces a fixed length digest. a graded series of entities that distribute trust in an organized fashion, commonly used in ANSI X.509 issuing certifying authorities. a common protocol used to transfer documents between servers or from a server to a client. hexadecimal describes a base-16 number system. That is, it describes a numbering system containing 16 sequential numbers as base units (including 0) before adding a new position for the next number. (Note that we're using 16 here as a decimal number to explain a number that would be 10 in hexadecimal.) The hexadecimal numbers are 0-9 and then use the letters A-F.
Hash function
Hierarchical trust
222
PGP Freeware
Glossary
a 64-bit block symmetric cipher using 128-bit keys based on mixing operations from different algebraic groups. Considered one of the strongest algorithms. provides a secure means of key exchange over the Internet. IKE is also a candidate for IPSec security archetecture. The IKE and IPsec proposals tell PGPnet what proposals to make to other users. Proposals must be accepted exactly as specified. PGPnet allows a minimum of one and maximum of 16 proposals for both IKE and IPsec proposals. Implicit trust is reserved for key pairs located on your local keyring. If the private portion of a key pair is found on your keyring, PGP assumes that you are the owner of the key pair and that you implicitly trust yourself. assurance that data is not modified (by unauthorized persons) during storage or transmittal. a person or organization who is allowed to vouch for the authenticity of someones public key. You designate an introducer by signing their public key. a protocol to reduce the size of IP datagrams. This protocol will increase the overall communication performance between a pair of communicating hosts/gateways (nodes) by compressing the datagrams, provided the nodes have sufficient computation power and the communication is over slow or congested links. IPPCP is very useful over slow links such as a modem, but it is not recommended over fast links. the act of inserting a false sender IP address into an Internet transmission in order to gain unauthorized access to a computer system. a TCP/IP layer encryption scheme under consideration within the IETF. responsible for a wide range of standards, like the OSI model and international relationship with ANSI on X.509.
Implicit trust
Integrity
Introducer
IP spoofing
IPsec
a digital code used to encrypt and sign and decrypt and verify messages and files. Keys come in key pairs and are stored on keyrings. a practice where a user of a public key encryption system surrenders their private key to a third party thus permitting them to monitor encrypted communications.
Key escrow/recovery
Users Guide
223
Glossary
Key exchange
a scheme for two or more nodes to transfer a secret session key across an unsecured channel. a uniquely identifying string of numbers and characters used to authenticate public keys. For example, you can telephone the owner of a public key and have him or her read the fingerprint associated with their key so you can compare it with the fingerprint on your copy of their public key to see if they match. If the fingerprint does not match, then you know you have a bogus key. a legible code that uniquely identifies a key pair. Two key pairs may have the same user ID, but they will have different Key IDs. the number of bits representing the key size; the longer the key, the stronger it is. the process and procedure for safely storing and distributing accurate cryptographic keys; the overall process of generating and distributing cryptographic key to authorized recipients in a secure manner. a public key and its complimentary private key. In public-key cryptosystems, like the PGP program, each user has at least one key pair. a set of keys. Each user has two types of keyrings: a private keyring and a public keyring. the process of dividing up a private key into multiple pieces, and share those pieces among a group of people. A designated number of those people must bring their shares of the key together to use the key. a simple protocol that supports access and search operations on directories containing information such as names, phone numbers, and addresses across otherwise incompatible systems over the Internet. a compact distillate of your message or file checksum. It represents your message, such that if the message were altered in any way, a different message digest would be computed from it. a trusted introducer of trusted introducers. originally defined in PEM for authentication using MD2 or MD5. Micalg (message integrity calculation) is used in secure MIME implementations. a freely available set of specifications that offers a way to interchange text in languages with different character sets, and multimedia email among many different computer systems that use Internet mail standards.
Key fingerprint
Key ID
Key length
Key management
Key pair
Keyring
Message digest
224
PGP Freeware
Glossary
preventing the denial of previous commitments or actions. a function of a variable string to create a fixed length value representing the original pre-image, also called message digest, fingerprint, message integrity check (MIC). an easy-to-remember phrase used for better security than a single password; key crunching converts it into a random key. a sequence of characters or a word that a subject submits to a system for purposes of authentication, validation, or verification. for a key agreement protocol based on asymmetric cryptography, the property that ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of the private keys is compromised in the future. an IETF standard (RFC 2015) that provides privacy and authentication using the Multipurpose Internet Mail Extensions (MIME) security content types described in RFC1847, currently deployed in PGP 5.0 and later versions. the IKE negotiation occurs in two phases. Phase 1 authenticates the two parties and sets up a key management Security Association for protecting the data that is passed during the negotiation. In this phase, the key management policy is used to secure the negotiation messages. Phase 2 negotiates data management Security Association, which uses the data management policy to set up IP Security tunnels in the kernel for encapsulating and decapsulating data packets. a set of de facto standards for public key cryptography developed in cooperation with an informal consortium (Apple, DEC, Lotus, Microsoft, MIT, RSA, and Sun) that includes algorithm-specific and algorithm-independent implementation standards. Specifications defining message syntax and other protocols controlled by RSA Data Security Inc. a widely available and accessible certificate system for obtaining an entitys public key with some degree of certainty that you have the right key and that it has not been revoked. normal, legible, un-encrypted, unsigned text. IPsec keys responsible for creating your Security Association. Values can be set in time or data size. the secret portion of a key pair-used to sign and decrypt information. A user's private key should be kept secret, known only to the user.
Passphrase
Password
PGP/MIME
Private key
Users Guide
225
Glossary
Private keyring
a set of one or more private keys, all of which belong to the owner of the private keyring. one of two keys in a key pair-used to encrypt information and verify signatures. A user's public key can be widely disseminated to colleagues or strangers. Knowing a person's public key does not help anyone discover the corresponding private key. a set of public keys. Your public keyring includes your own public key(s). cryptography in which a public and private key pair is used, and no security is needed in the channel itself. an important aspect to many cryptosystems, and a necessary element in generating a unique key(s) that are unpredictable to an adversary. True random numbers are usually derived from analog sources, and usually involve the use of special hardware. retraction of certification or authorization. an IETF document, either FYI (For Your Information) RFC sub-series that are overviews and introductory or STD RFC sub-series that identify specify Internet standards. Each RFC has an RFC number by which it is indexed and by which it can be retrieved (www.ietf.org). a block cipher designed by Joan Daemen and Vincent Rijmen, chosen as the new Advanced Encryption Standard (AES). It is considered to be both faster and smaller than its competitors. The key size and block size can be 128-bit, 192-bit, or 256-bit in size and either can be increased by increments of 32 bits. short for RSA Data Security, Inc.; or referring to the principals - Ron Rivest, Adi Shamir, and Len Adleman; or referring to the algorithm they invented. The RSA algorithm is used in public key cryptography and is based on the fact that it is easy to multiply two large prime numbers together, but hard to factor them out of the product. a relationship between two or more entities that describes how the entities will use security services to communicate securely. see Key Splitting. a means of conveying information from one entity to another such that an adversary does not have the ability to reorder, delete, insert, or read (SSL, IPSec, whispering in someones ear). a public key that has been signed by the corresponding private key for proof of ownership.
Public key
Public keyring
Public-key cryptography
Random number
Rijndael
RSA
SA (Security Association)
self-signed key
226
PGP Freeware
Glossary
session key
the secret (symmetric) key used to encrypt each set of data on a transaction basis. A different session key is used for each communication session. IKE keys responsible for creating your Security Association. Values can be set in time. to apply a signature. a digital code created with a private key. Signatures allow authentication of information by the process of signature verification. When you sign a message or file, the PGP program uses your private key to create a digital code that is unique to both the contents of the message and your private key. Anyone can use your public key to verify your signature. a proposed standard developed by Deming software and RSA Data Security for encrypting and/or authenticating MIME data. S/MIME defines a format for the MIME data, the algorithms that must be used for interoperability (RSA, RC2, SHA-1), and the additional operational concerns such as ANSI X.509 certificates and transport over the Internet. developed by Netscape to provide security and privacy over the Internet. Supports server and client authentication and maintains the security and integrity of the transmission channel. Operates at the transport layer and mimics the sockets library, allowing it to be application independent. Encrypts the entire communication channel and does not support digital signatures at the message level. a.k.a., conventional, secret key, and single key algorithms; the encryption and decryption key are either the same or can be calculated from one another. Two sub-categories exist - Block and Stream. a subkey is a Diffie-Hellman encryption key that is added as a subset to your master key. Once a subkey is created, you can expire or revoke it without affecting your master key or the signatures collected on it. when a hacker takes over a TCP session between two machines. Since most authentication only occurs at the start of a TCP session, this allows the hacker to gain access to a machine. standard, printable, 7-bit ASCII text. recording the time of creation or existence of information.
sign signature
symmetric algorithm
subkey
Text Timestamping
Users Guide
227
Glossary
an IETF draft, version 1 is based on the Secure Sockets Layer (SSL) version 3.0 protocol, and provides communications privacy over the Internet. ISO 10736, draft international standard.
an encryption configuration in which the DES algorithm is used three times with three different keys. a public key is said to be trusted by you if it has been validated by you or by someone you have designated as an introducer. someone whom you trust to provide you with keys that are valid. When a trusted introducer signs another persons key, you trust that the persons key is valid, and you do not need to verify the key before using it. a new 256-bit block cipher, symmetric algorithm created by Bruce Schneier. Twofish is one of five algorithms that the U.S. National Institute of Standards and Technology (NIST) is considering as a replacement for the current Advanced Encryption Standard (AES). a text phrase that identifies a key pair. For example, one common format for a user ID is the owner's name and email address. The user ID helps users (both the owner and colleagues) identify the owner of the key pair. the Setup Keys (IKE) and Primary Keys (IPsec) are responsible for creating your Security Associations. They are automatically renewed based on the VPN Key Refresh values that appear on the VPN Options panel on Mac. indicates the level of confidence that the key actually belongs to the alleged owner. the act of comparing a signature created with a private key to its public key. Verification proves that the information was actually sent by the signer, and that the message has not been subsequently altered by anyone else. PGPnets Virtual Identity is based on the config-mode draft standard from the IETF IPsec working groups. It is also knows as phase 1.5 and transaction exchange. This feature can retrieve an IP address and other configuration information for your computer from a secure gateway. Since the gateway gives your machine an address, all of the machines behind that gateway view you as part of their network and will communicate with you freely.
Trusted
Trusted introducer
Twofish
User ID
Validity
Verification
Virtual Identity
228
PGP Freeware
Glossary
allows private networks to span from the end-user, across a public network (Internet) directly to the Home Gateway of choice, such as your companys Intranet. a distributed trust model used by PGP to validate the ownership of a public key where the level of trust is cumulative, based on the individuals knowledge of the introducers. an ITU-T digital certificate that is an internationally recognized electronic document used to prove identity and public key ownership over a communication network. It contains the issuers name, the users identifying information, and the issuers digital signature, as well as other possible extensions.
Web of trust
X.509
Users Guide
229
Glossary
230
PGP Freeware
Index
A
about PGP 21 PGP keyrings 53 PGP Wipe utility 110 PGPkeys 33 PGPmenu 27 PGPnet 123 PGPtools 26 Virtual Private Networks 124 acquire virtual identity 160 adding 138 a host 149, 155 a photo ID to a key 40 a Root CA certificate to your key 77 a secure gateway 155 a subnet 155 an X.509 cert 181 combining groups 102 email plug-in ICQ plug-in 96 host to list of blocked hosts 138 Advanced button Log panel 204 Advanced Log 140 Advanced options 181 Export format 184 keyring back up 184 Trust Model 184 AES (Advanced Encryption Standard) definition 219
Users Guide 231
AES algorithm 182 Aggressive Mode 163 AH (Authentication Header) definition 219 algorithm AES 182 CAST 182, 220 DES 221 Diffie-Hellman 221 DSA 222 encryption 219 hash 219 IDEA 182, 223 RSA 226 symmetric 227 Triple-DES 183, 228 Twofish 183, 228 Allow dynamic VPN setting 186 Allowed Algorithm 183 Anonymity definition 219 ANSI (American National Standards Institute) definition 219 Any valid key 158 ASCII-armored text definition 219 Asymmetric keys definition 219
Index
attacks man-in-the-middle 50 protecting against by backing up your keys 41 tracing 138 Attempt dynamic VPN setting 186 attributes changing your keyrings 5457 viewing your keyrings 5457 authenticating using PGP keys 188 using X.509 certificates 188 Authentication definition 219 authentication types changing the setting 161 extended 161 hybrid 161 normal 161 Authorization definition 219 Authorization certificate definition 219 Automatic Key Renewal definition 219, 228 automatic key renewal values changing for Setup Keys (IKE) 187 setting for Primary Keys (IPsec) 187
Blind signature definition 220 Block cipher definition 220 blocked host 138 removing from list 138, 140 Blocked Host dialog 138 blocking communications 136, 138
C
CA. See Certificate Authority CAPI (Crypto API) definition 220 CAST algorithm 182 definition 220 Certificate (digital certificate) definition 220 Certificate Authority setting options 181 Certificate server. See key server Certification definition 220 certify definition 220 public keys 23 certifying authority definition 220 changing your passphrase 67 your secure network interface 141 checking authenticity of a key 50 fingerprints 76 ciphers allowing specific within PGPnet 192, 193
B
Back Door definition 220 Back Orifice definition 220
232
PGP Freeware
Index
ciphertext definition 220 clear text definition 220 clearing log information 141 Clear-signed message definition 220 Clipboard using PGP from the 28 comparing key fingerprints 51 compression function allowed within PGPnet 192 definition 221 connecting to exclusive gateways 160 conventional encryption 99, 108 definition 221 corporate signing key 221 creating private and public key pair 3437 recipient groups 101 subkeys 45 cryptanalysis definition 221 cryptography definition 221 CRYPTOKI definition 221 cryptosystem definition 221 custom key creating 37 Customer Service contacting 16
D
data integrity definition 221 decrypting email 103 from the Clipboard 28 ICQ messages 117 using PGPmenu 109 using PGPtray 109 with split keys 110 decryption definition 221 default key pair specifying 58 default settings for PGPnet 195 Deflate compression and PGPnet 192 deleting digital signatures 58 files 110 keys 58 keys from the server 45 recipient groups 102 SAs 133 signatures from server 45 user IDs 58 using Secure Wipe 110 denial of service attack definition 221 DES (Data Encryption Standard) algorithm definition 221 designated revoker properties 73
Users Guide
233
Index
details of blocked host viewing 137 dictionary attack definition 221 Diffie-Hellman algorithm definition 221 Diffie-Hellman/DSS technology keys, creating 38 digital cash definition 221 digital signature and authenticity 51 definition 221 deleting 58 direct trust definition 221 Disable PGPnet 127 disable PGPnet 162 disable VPN 162 disabled Expert Mode 155 disks deleting free space 110 scheduled wiping 113 wiping files from 110 distributing public keys 23, 45 your public keys 45 distribution lists adding members to a group list 102 combining groups 102 creating a group 101 deleting a group 102 deleting a member 102 DNS Lookup finding a hosts IP Address 157
234 PGP Freeware
Intruders panel 138 using 157 DNS Lookup feature 138 DSA (Digital Signature Algorithm) definition 222 DSS (Digital Signature Standard) algorithm definition 222 dynamic VPN settings 186
E
ECC (Elliptic Curve Cryptosystem) definition 222 editing a host entry require a host to present a specific key 158 a host, subnet, or gateway 154 EES (Escrowed Encryption Standard) definition 222 Elgamal scheme definition 222 email adding an email plug-in 96 combining recipient groups 102 copying public keys from 49 creating recipient groups 101 decrypting 103, 104, 105 deleting recipient groups 102 encrypting 24, 95, 103 to groups of people 101 including your public key in 46 receiving private 95 sending private 95 signing 24, 95, 103
Index
using PGP with 29 verifying 103, 104, 105 Enable PGPnet 127 enable PGPnet 162 Enable virtual identity retrieval for this gateway button 153 enable VPN 162 encrypting a copy to your own key 168 email 24, 95, 103, 104, 105 to groups of people 101 from the Clipboard 28 ICQ messages 119 to yourself 168 encryption definition 222 encryption options algorithms 182 email conventional 99 Secure Viewer 99 files conventional 108 Secure Viewer 108 self decrypting archive 109 text output 108 wipe original 108 setting 168 error messages 203 ESP (Encapsulating Security Payload) definition 222 Eudora 96, 104 with PGP/MIME 104 without PGP/MIME 105 Exchange Outlook 96
exchanging public keys 23, 45 obtaining others 4750 via ICQ 118 exclusive gateways connecting to 160 exiting PGPnet 128 Expert Mode disabled by PGP administrator 155 require a host to present a specific key 158 using to add hosts, gateways, and subnets 155 expiration setting key expiration values 187 expiring SAs 126 Explorer using PGP with 27 export format for exporting keys 184 Export host 136 exporting keys, to files 47 Extended authentication 161
F
File menu Disable PGPnet 127 Enable PGPnet 127 files deleting 110 exporting public keys to 47 importing public keys from 50 wiping 110
Users Guide 235
Index
Finder using PGP from 26 fingerprints checking 76 comparing 51 definition 222 FIPS (Federal Information Processing Standard) definition 222 firewall definition 222 folder wiping scheduling 113 forgotten passphrase 42 Free Space Wipe 110 scheduling tasks 113
H
hash functions allowing within PGPnet 192, 193 definition 222 help getting 28 hexadecimal definition 222 hierarchical trust definition 222 Host/Gateway require a host to present a specific key 158 Host/Gateway dialog Aggressive Mode 163 hosts adding 149 displayed on PGPnet menu in PGPtray 130 establishing an SA 135 exporting 136 finding IP Address of 157 importing 136 modifying 154 removing 154 terminating an SA 135 HotKey decrypt and verify current window 177 encrypt and sign current window 176 encrypt current window 176 purge passphrase caches 176 setting your options 175 sign current window 176 unmount all PGPdisks 177
G
gateways definition 125 modifying 154 removing 154 generating key pairs setting options 169 granting trust for key validations 66 group lists 178 groups adding members 102 combining groups 102 creating 101 deleting 102
236
PGP Freeware
Index
Internet Key Exchange. See IKE. introducer definition 223 Intruders panel 131, 136 Properties 137 Invalid cookie 204 Invalid exchange 203 IP Address finding with DNS lookup 157 IP Payload Compression Protocol definition 223 IP Spoofing definition 223 IPsec definition 125, 223 proposals adding 195 definition 223 ISO (International Organization for Standardization) definition 223
I
ICQ decrypting messages 117 encrypting messages 119 exchanging keys 118 IDEA (International Data Encryption Standard) algorithm definition 223 use for encryption 182 IKE (Internet Key Exchange) definition 223 negotiation, description 126 proposals adding 195 definition 223 implicit trust definition 223 Import Host disabled 162 importing hosts into PGPnet 136 public keys, from files 50 initiating an SA 126 an SA from PGPnet menu in PGPtray 130 insecure host definition 126 insecure subnet definition 126 integrity definition 223
K
key escrow/recovery definition 223 key exchange definition 224 key expiration values setting 187 key fingerprint definition 224 key ID definition 224 properties 70
Users Guide
237
Index
key length definition 224 key management definition 224 key pair creating with PGP Key Wizard 3437 definition 224 examining 37 specifying default 58 splitting 45 viewing your 28 key reconstruction server definition 43 restore your key from 90 send your key to 43 key server adding a key server 180 deleting keys 45 getting someones public key from 48 searching 48 sending your public key to 45 set as root 178 setting options 177 synchronizing 179 updating your key on the server 88 using to circulate revoke keys 75 key size Diffie-Hellman portion 39 DSS portion 39 setting 39, 72 trade-offs 39, 72 key splitting or "secret sharing" definition 224
keyrings changing attributes of 5457 definition 224 description of 53 location of 53 storing elsewhere 53 viewing attributes of 5457 keys adding a photo ID 40 backing up 41 checking fingerprints 76 creating 33 definition 223 deleting 58 deleting from server 45 distributing 45 examining 37 granting trust for validations 66 lost 42, 90 managing 53, 167 overview of 33 protecting 41 reappearing on server 90 reconstructing 42, 90 rejoining a split key 83 removing signatures 88 removing user names 88 revoking 75 saving 41 setting size of 39, 72 signing 63 splitting 45 updating on a key server 88 verifying authenticity of 50
238
PGP Freeware
Index
L
LDAP (Lightweight Directory Access Protocol) definition 224 legitimacy determining a keys 50 log information clearing 141 saving 141 Log panel 131 Advanced 140 Show Events 140 Lotus Notes 96 LZS compression and PGPnet 192
N
NAT incompatibility is detected 204 Net Tools PKI Server 78 Network Associates contacting Customer Service 16 training 16 network card, securing 142 No proposal chosen 203 No SA Found 203 No SPI Found 203 non-repudiation definition 225 Normal authentication 161
M
managing keys 53, 167 man-in-the-middle attack 50 MD5 hash and PGPnet 192 message digest definition 224 meta-introducer 52 definition 224 MIC (Message Integrity Check) definition 224 MIME standard definition 224 using to decrypt email 104, 105 using to encrypt email 98 modes expert 155
O
obtaining others public keys 4750 one-way hash definition 225 online help getting 28 opening PGPkeys window 28 options 181 Advanced 181 CA (Certificate Authority) 181 Email 173 encryption 168 File 171
Users Guide 239
Index
General 168 HotKey 175 key generation 169 Server, key server 177 setting 167 VPN 185 VPN advanced 190 VPN authentication 188 Outlook Express 96 overviews key concepts 33 PGP 21
PGP Free Space Wiper using 110 PGP Key Wizard creating key pair 3437 PGP keys using to authenticate a connection 188 using to establish an SA 146 PGP/MIME standard definition 225 overview 95 using to decrypt email 104, 105 using to encrypt email 98 PGPkeys window Creation label 57 examining keys properties 60 Key ID 70 opening 28 Size label 56 Trust label 57 uses 53 Validity label 56 PGPmenu overview 27 using 109 PGPnet Aggressive Mode 163 Allowed Remote Proposals 192, 193 disabling and enabling 162 error messages 203 exiting 128 overview 123 setting proposals 192 starting 127 status bar 132 stopping 127
P
passphrase changing 67 definition 225 forgotten 42, 90 setting 36, 91 suggestions for 36, 91 password definition 225 Perfect Forward Secrecy (PFS) 194 definition 225 PFS. See Perfect Forward Secrecy (PFS) PGP overview 21 setting preferences 28 troubleshooting 199 using from PGPtools window 26 using from the Clipboard 28 using from the Finder 26 using from the System tray 28 using with supported email applications 29
240 PGP Freeware
Index
turning off 127 turning on 127 using PGP keys with 146 viewing the Status panel 133 X.509 80 PGPnet window Advanced panel 190 features of 130 File menu 130 Help menu 130 Intruders panel 131 Log panel 131 Status panel 131 View menu 130 VPN panel 131 PGPtools overview 26 using Free Space Wipe 110 using PGP from PGPtools 26 PGPtray starting 27 using 109 Phase 1 and 2 definition 225 photo ID adding to a key 40 PKCS (Public Key Crypto Standards) definition 225 PKI (Public Key Infrastructure) definition 225 plaintext definition 225 preferences setting 28 preferred algorithm 181, 183
Primary Keys definition 225 private and public key pair creating with PGP Key Wizard 3437 viewing 28 private keyring definition 226 private keys creating with PGP Key Wizard 3437 definition 225 location of 53 protecting 41 storing 41 viewing your 28 Properties Intruders panel 137 Status panel 134 proposals definition 223 setting 192 protecting your keys 41 public keyring definition 226 public keys advantages of sending to key server 45 certifying 23 copying from email messages 49 definition 226 distributing your 45 exchanging with other users 23, 45 exporting to files 47 getting from a key server 48 giving to other users 23, 45 importing from files 50
Users Guide 241
Index
including in an email message 46 location of 53 obtaining others 4750 protecting 41 searching key server 48 sending to key server 45 signing 63 storing 41 trading with other users 23, 45 validating 23 viewing your 28 public-key cryptography definition 226
removing files, using Secure Wipe 110 gateways 154 host from list of blocked hosts 138, 140 hosts 154 key from server 45 SAs 133 subnets 154 require a host to present a specific key 158 Require dynamic VPN setting 186 Response timeout 204 restoring default settings for PGPnet 195 review SA Properties 134 revocation definition 226 revoker viewing key properties 73 revoking keys 75 RFC (Request for Comment) definition 226 Rijndael cipher 182 definition 226 Root CA certificates 77 RSA algorithm definition 226 RSA technology keys, creating 38 running PGP 26, 28 running PGP 28
Q
quitting PGPnet 127, 128
R
random number definition 226 receiving private email 95 recipient groups combining groups 102 creating 101 deleting 102 deleting a group 102 recipients groups of 101 reconstructing your key 42, 90 rejoining a split key 83, 84 remote authentication 158
242
PGP Freeware
Index
S
S/MIME (Secure Multipurpose Mail Extension) definition 227 SA (Security Association) definition 226 establishing with a host 135 establishing with PGP keys 146 expiring 126 initiating 126 initiating and terminating from PGPnet menu in PGPtray 130 Properties 134 removing SAs 133 saving active SAs 133 terminating with a host 135 viewing active SAs 133 viewing expired SAs 133 saving active SAs 133 keys 41 log information 141 scheduling folder wiping 113 free space wiping 113 the Free Space Wiper 113 searching key server 48 secret sharing definition 226 secure channel definition 226 secure gateway definition 125
secure hosts adding 149 definition 125 secure network interface, changing 141 secure subnet definition 126 Secure Viewer email encryption option 97 with previous versions 99 Secure Wipe using 110 securing a network card 142 Security Association. See SA Self Decrypting Archive (SDA) 109 self-signed key definition 226 sending private email 95 session key definition 227 Set Adapter changing your secure network interface 141 Set Shared Passphrase 158 setting automatic key renewal values 187 key expiration values 187 passphrase for a key 36, 91 PGP options 167 Setup Keys definition 227 SHA-1 hash and PGPnet 192 Shared Secret 158
Users Guide
243
Index
shortcuts keyboard hotkeys 29 taking 29 shortcuts, HotKeys 175 Show Events 140 Log panel 140 sign definition 227 signature definition 227 signing 58 email 24, 95, 103 keys 63 meta-introducer, description 52 trusted introducer, description 52 public keys 51, 63 with split keys 110 splitting, keys 45 SSL (Secure Socket Layer) definition 227 starting PGPnet 127 PGPtray 27 status bar 132 Status panel 131 Properties 134 stopping PGPnet 127 storing keys 41 subkey creating new 71 definition 227 expiration 70 properties 70 remove 70
244 PGP Freeware
revoke 70 size 70 validity 70 subnets modifying 154 removing 154 symmetric algorithm definition 227 System tray using PGP from 28
T
tampering protecting your keys against 41 tasks scheduled freespace wiping 113 TCP session hijacking definition 227 TEMPEST attacks see also Secure Viewer terminating an SA from PGPnet menu in PGPtray 130 text definition 227 text output 108 timestamping definition 227 TLS (Transport Layer Security) definition 228 TLSP (Transport Layer Security Protocol) definition 228 Trace Source 138 when blocking communications 136 Trace Source feature 138
Index
tracing attacks Trace Source feature 138 training for Network Associates products 16 scheduling 16 transport mode definition 125 Triple-DES algorithm 183 definition 228 troubleshooting PGP 199 PGPnet 203 trust granting for key validations 66 trusted definition 228 trusted introducer 52 definition 228 tunnel mode definition 125 Twofish algorithm 183 definition 228
V
validating keys granting trust for 66 meta-introducer 52 public keys 23, 51 trusted introducers 52 validity checking a keys 50 definition 228 validity level invalid 184 marginal 184 verification definition 228 verifying authenticity of a key 50 email 103, 104, 105 viewing active SAs 133 attributes of keyrings 5457 details of blocked hosts 137 expired SAs 133 key attributes 37 PGPnet Status panel 133 private and public key pair 28 what you encrypted 168 Virtual Identity definition 228 enabling 153 virtual identity acquiring 160
U
Unequal payload length 203 user ID definition 228 using PGP from the Clipboard 28 from the Finder 26 from the System tray 28 using a third-party VPN device 163 using Free Space Wipe 110, 113
Users Guide
245
Index
VPN (Virtual Private Network) advanced options allowed remote proposals 191 Perfect Forward Secrecy 194 proposals 192 authentication options authenticating your connection 189 remote authentication 190 definition 229 description 124 disabling and enabling 162 dynamic VPN settings 186 enable VPN connections 185 VPN panel in PGPnet 131 VPN panel disabled 162
X
X.509 certificates 181 adding root CA certificates 77 adding to keypair 67 definition 229 using to authenticate a connection 188
W
web of trust definition 229 Windows Explorer using PGP with 27 wiping disks 110, 113 files 110 using Free Space Wipe 110 word wrap 175
246
PGP Freeware