home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Ian & Stuart's Australian Mac: Not for Sale
/
Another.not.for.sale (Australia).iso
/
hold me in your arms
/
PGP 2.6
/
pgp2.6 Doc
/
PGPDOC2.TXT
< prev
next >
Wrap
Text File
|
1994-05-22
|
116KB
|
2,532 lines
Phil's Pretty Good Software
Presents
=======
PGP(tm)
=======
Pretty Good(tm) Privacy
Public Key Encryption for the Masses
-------------------------
PGP(tm) User's Guide
Volume II: Special Topics
-------------------------
by Philip Zimmermann
Revised 22 May 94
PGP Version 2.6 - 22 May 94
Software by
Philip Zimmermann, and many others.
Synopsis: PGP(tm) uses public-key encryption to protect E-mail and
data files. Communicate securely with people you've never met, with
no secure channels needed for prior exchange of keys. PGP is well
featured and fast, with sophisticated key management, digital
signatures, data compression, and good ergonomic design.
Software and documentation (c) Copyright 1990-1994 Philip Zimmermann.
All rights reserved. For information on PGP licensing, distribution,
copyrights, patents, trademarks, liability limitations, and export
controls, see the "Legal Issues" section. Distributed by the
Massachusetts Institute of Technology.
Contents
========
Quick Overview
Special Topics
Selecting Keys via Key ID
Separating Signatures from Messages
Decrypting the Message and Leaving the Signature on it
Sending ASCII Text Files Across Different Machine Environments
Leaving No Traces of Plaintext on the Disk
Displaying Decrypted Plaintext on Your Screen
Making a Message For Her Eyes Only
Preserving the Original Plaintext Filename
Editing Your User ID or Pass Phrase
Editing the Trust Parameters for a Public Key
Checking If Everything is OK on Your Public Key Ring
Verifying a Public Key Over the Phone
Handling Large Public Keyrings
Using PGP as a Unix-style Filter
Suppressing Unnecessary Questions: BATCHMODE
Force "Yes" Answer to Confirmation Questions: FORCE
PGP Returns Exit Status to the Shell
Environmental Variable for Pass Phrase
Setting Configuration Parameters: CONFIG.TXT
TMP - Directory Pathname for Temporary Files
LANGUAGE - Foreign Language Selector
MYNAME - Default User ID for Making Signatures
TEXTMODE - Assuming Plaintext is a Text File
CHARSET - Specifies Local Character Set for Text Files
ARMOR - Enable ASCII Armor Output
ARMORLINES - Size of ASCII Armor Multipart Files
KEEPBINARY - Keep Binary Ciphertext Files After Decrypting
COMPRESS - Enable Compression
COMPLETES_NEEDED - Number of Completely Trusted Introducers Needed
MARGINALS_NEEDED - Number of Marginally Trusted Introducers Needed
CERT_DEPTH - How Deep May Introducers Be Nested
BAKRING - Filename for Backup Secret Keyring
PUBRING - Filename for Your Public Keyring
SECRING - Filename for Your Secret Keyring
RANDSEED - Filename for Random Number Seed
PAGER - Selects Shell Command to Display Plaintext Output
SHOWPASS - Echo Pass Phrase to User
TZFIX - Timezone Adjustment
CLEARSIG - Enable Signed Messages to be Encapsulated as Clear Text
VERBOSE - Quiet, Normal, or Verbose Messages
INTERACTIVE - Ask for Confirmation for Key Adds
NOMANUAL - Let PGP Generate Keys Without the Manual
A Peek Under the Hood
Random Numbers
PGP's Conventional Encryption Algorithm
Data Compression
Message Digests and Digital Signatures
Compatibility with Previous Versions of PGP
Vulnerabilities
Compromised Pass Phrase and Secret Key
Public Key Tampering
"Not Quite Deleted" Files
Viruses and Trojan Horses
Physical Security Breach
Tempest Attacks
Protecting Against Bogus Timestamps
Exposure on Multi-user Systems
Traffic Analysis
Cryptanalysis
Legal Issues
Trademarks, Copyrights, and Warranties
Patent Rights on the Algorithms
Licensing and Distribution
Export Controls
Philip Zimmermann's Legal Situation
Where to Get a Commercial Version of PGP
Reporting PGP Bugs
Computer-Related Political Groups
Recommended Readings
To Contact the Author
Appendix A: Where to Get PGP
Quick Overview
==============
Pretty Good(tm) Privacy (PGP), from Phil's Pretty Good Software, is a
high security cryptographic software application for MSDOS, Unix,
VAX/VMS, and other computers. PGP combines the convenience of the
Rivest-Shamir-Adleman (RSA) public key cryptosystem with the speed of
conventional cryptography, message digests for digital signatures,
data compression before encryption, good ergonomic design, and
sophisticated key management.
This volume II of the PGP User's Guide covers advanced topics about
PGP that were not covered in the "PGP User's Guide, Volume I:
Essential Topics". You should first read the Essential Topics
volume, or this manual won't make much sense to you. Reading this
Special Topics volume is optional, except for the legal issues
section, which everyone should read.
Special Topics
===============
Selecting Keys via Key ID
-------------------------
In all commands that let the user type a user ID or fragment of a
user ID to select a key, the hexadecimal key ID may be used instead.
Just use the key ID, with a prefix of "0x", in place of the user ID.
For example:
pgp -kv 0x67F7
This would display all keys that had 67F7 as part of their key IDs.
This feature is particularly useful if you have two different keys
from the same person, with the same user ID. You can unambiguously
pick which key you want by specifying the key ID.
Separating Signatures from Messages
-----------------------------------
Normally, signature certificates are physically attached to the text
they sign. This makes it convenient in simple cases to check
signatures. It is desirable in some circumstances to have signature
certificates stored separately from the messages they sign. It is
possible to generate signature certificates that are detached from
the text they sign. To do this, combine the 'b' (break) option with
the 's' (sign) option. For example:
pgp -sb letter.txt
This example produces an isolated signature certificate in a file
called "letter.sig". The contents of letter.txt are not appended to
the signature certificate.
After creating the signature certificate file (letter.sig in the
above example), send it along with the original text file to the
recipient. The recipient must have both files to check the signature
integrity. When the recipient attempts to process the signature
file, PGP notices that there is no text in the same file with the
signature and prompts the user for the filename of the text. Only
then can PGP properly check the signature integrity. If the
recipient knows in advance that the signature is detached from the
text file, she can specify both filenames on the command line:
pgp letter.sig letter.txt
or: pgp letter letter.txt
PGP will not have to prompt for the text file name in this case.
A detached signature certificate is useful if you want to keep the
signature certificate in a separate certificate log. A detached
signature of an executable program is also useful for detecting a
subsequent virus infection. It is also useful if more than one party
must sign a document such as a legal contract, without nesting
signatures. Each person's signature is independent.
If you receive a ciphertext file that has the signature certificate
glued to the message, you can still pry the signature certificate
away from the message during the decryption. You can do this with
the -b option during decrypt, like so:
pgp -b letter
This decrypts the letter.pgp file and if there is a signature in it,
PGP checks the signature and detaches it from the rest of the
message, storing it in the file letter.sig.
Decrypting the Message and Leaving the Signature on it
------------------------------------------------------
Usually, you want PGP to completely unravel a ciphertext file,
decrypting it and checking the nested signature if there is one,
peeling away the layers until you are left with only the original
plaintext file.
But sometimes you want to decrypt an encrypted file, and leave the
inner signature still attached, so that you are left with a decrypted
signed message. This may be useful if you want to send a copy of a
signed document to a third party, perhaps re-enciphering it. For
example, suppose you get a message signed by Charlie, encrypted to
you. You want to decrypt it, and, leaving Charlie's signature on it,
you want to send it to Alice, perhaps re-enciphering it with Alice's
public key. No problem. PGP can handle that.
To simply decrypt a message and leave the signature on it intact,
type:
pgp -d letter
This decrypts letter.pgp, and if there is an inner signature, it is
left intact with the decrypted plaintext in the output file.
Now you can archive it, or maybe re-encrypt it and send it to someone
else.
Sending ASCII Text Files Across Different Machine Environments
--------------------------------------------------------------
You may use PGP to encrypt any kind of plaintext file, binary 8-bit
data or ASCII text. Probably the most common usage of PGP will be for
E-mail, when the plaintext is ASCII text.
ASCII text is sometimes represented differently on different
machines. For example, on an MSDOS system, all lines of ASCII text
are terminated with a carriage return followed by a linefeed. On a
Unix system, all lines end with just a linefeed. On a Macintosh, all
lines end with just a carriage return. This is a sad fact of life.
Normal unencrypted ASCII text messages are often automatically
translated to some common "canonical" form when they are transmitted
from one machine to another. Canonical text has a carriage return
and a linefeed at the end of each line of text. For example, the
popular KERMIT communication protocol can convert text to canonical
form when transmitting it to another system. This gets converted
back to local text line terminators by the receiving KERMIT. This
makes it easy to share text files across different systems.
But encrypted text cannot be automatically converted by a
communication protocol, because the plaintext is hidden by
encipherment. To remedy this inconvenience, PGP lets you specify
that the plaintext should be treated as ASCII text (not binary data)
and should be converted to canonical text form before it gets
encrypted. At the receiving end, the decrypted plaintext is
automatically converted back to whatever text form is appropriate for
the local environment.
To make PGP assume the plaintext is text that should be converted to
canonical text before encryption, just add the "t" option when
encrypting or signing a message, like so:
pgp -et message.txt her_userid
This mode is automatically turned off if PGP detects that the
plaintext file contains what it thinks is non-text binary data.
For PGP users that use non-English 8-bit character sets, when PGP
converts text to canonical form, it may convert data from the local
character set into the LATIN1 (ISO 8859-1 Latin Alphabet 1) character
set, depending on the setting of the CHARSET parameter in the PGP
configuration file. LATIN1 is a superset of ASCII, with extra
characters added for many European languages.
Leaving No Traces of Plaintext on the Disk
------------------------------------------
After PGP makes a ciphertext file for you, you can have PGP
automatically overwrite the plaintext file and delete it, leaving no
trace of plaintext on the disk so that no one can recover it later
using a disk block scanning utility. This is useful if the plaintext
file contains sensitive information that you don't want to keep
around.
To wipe out the plaintext file after producing the ciphertext file,
just add the "w" (wipe) option when encrypting or signing a message,
like so:
pgp -esw message.txt her_userid
This example creates the ciphertext file "message.pgp", and the
plaintext file "message.txt" is destroyed beyond recovery.
Obviously, you should be careful with this option. Also note that
this will not wipe out any fragments of plaintext that your word
processor might have created on the disk while you were editing the
message before running PGP. Most word processors create backup
files, scratch files, or both. Also, it overwrites the file only
once, which is enough to thwart conventional disk recovery efforts,
but not enough to withstand a determined and sophisticated effort to
recover the faint magnetic traces of the data using special disk
recovery hardware.
Displaying Decrypted Plaintext on Your Screen
---------------------------------------------
To view the decrypted plaintext output on your screen (like the
Unix-style "more" command), without writing it to a file, use the -m
(more) option while decrypting:
pgp -m ciphertextfile
This displays the decrypted plaintext display on your screen one
screenful at a time.
Making a Message For Her Eyes Only
----------------------------------
To specify that the recipient's decrypted plaintext will be shown
ONLY on her screen and will not be saved to disk, add the -m option:
pgp -sem message.txt her_userid
Later, when the recipient decrypts the ciphertext with her secret key
and pass phrase, the plaintext will be displayed on her screen but
will not be saved to disk. The text will be displayed as it would if
she used the Unix "more" command, one screenful at a time. If she
wants to read the message again, she will have to decrypt the
ciphertext again.
This feature is the safest way for you to prevent your sensitive
message from being inadvertently left on the recipient's disk. This
feature was added at the request of a user who wanted to send
intimate messages to his lover, but was afraid she might accidentally
leave the decrypted messages on her husband's computer.
Note that this feature will not prevent a clever and determined
person from finding a way to save the decrypted plaintext to disk--
it's to help prevent a casual user from doing it inadvertently.
Preserving the Original Plaintext Filename
------------------------------------------
Normally, PGP names the decrypted plaintext output file with a name
similar to the input ciphertext filename, but dropping the
extension. Or, you can override that convention by specifying an
output plaintext filename on the command line with the -o option.
For most E-mail, this is a reasonable way to name the plaintext file,
because you get to decide its name when you decipher it, and your
typical E-mail messages often come from useless original plaintext
filenames like "to_phil.txt".
But when PGP encrypts a plaintext file, it always saves the original
filename and attaches it to the plaintext before it compresses and
encrypts the plaintext. Normally, this hidden original filename is
discarded by PGP when it decrypts, but you can tell PGP you want to
preserve the original plaintext filename and use it as the name of
the decrypted plaintext output file. This is useful if PGP is used
on files whose names are important to preserve.
To recover the original plaintext filename while decrypting, add
the -p option, like so:
pgp -p ciphertextfile
I usually don't use this option, because if I did, about half of my
incoming E-mail would decrypt to the same plaintext filenames of
"to_phil.txt" or "prz.txt".
Editing Your User ID or Pass Phrase
-----------------------------------
Sometimes you may need to change your pass phrase, perhaps because
someone looked over your shoulder while you typed it in.
Or you may need to change your user ID, because you got married and
changed your name, or maybe you changed your E-mail address. Or
maybe you want to add a second or third user ID to your key, because
you may be known by more than one name or E-mail address or job
title. PGP lets you attach more than one user ID to your key, any
one of which may be used to look up your key on the key ring.
To edit your own userid or pass phrase for your secret key:
pgp -ke userid [keyring]
PGP prompts you for a new user ID or a new pass phrase.
The optional [keyring] parameter, if specified, must be a public
keyring, not a secret keyring. The userid field must be your own
userid, which PGP knows is yours because it appears on both your
public keyring and your secret keyring. Both keyrings will be
updated, even though you only specified the public keyring.
The -ke command works differently depending on whether you use it on
a public or secret key. It can also be used to edit the trust
parameters for a public key.
Editing the Trust Parameters for a Public Key
---------------------------------------------
Sometimes you need to alter the trust parameters for a public key on
your public key ring. For a discussion on what these trust
parameters mean, see the section "How Does PGP Keep Track of Which
Keys are Valid?" in the Essential Topics volume of the PGP User's
Guide.
To edit the trust parameters for a public key:
pgp -ke userid [keyring]
The optional [keyring] parameter, if specified, must be a public
keyring, not a secret keyring.
Checking If Everything is OK on Your Public Key Ring
----------------------------------------------------
Normally, PGP automatically checks any new keys or signatures on your
public key ring and updates all the trust parameters and validity
scores. In theory, it keeps all the key validity status information
up to date as material is added to or deleted from your public key
ring. But perhaps you may want to explicitly force PGP to perform a
comprehensive analysis of your public key ring, checking all the
certifying signatures, checking the trust parameters, updating all
the validity scores, and checking your own ultimately-trusted key
against a backup copy on a write-protected floppy disk. It may be a
good idea to do this hygienic maintenance periodically to make sure
nothing is wrong with your public key ring. To force PGP to perform
a full analysis of your public key ring, use the -kc (key ring check)
command:
pgp -kc
You can also make PGP check all the signatures for just a single
selected public key by:
pgp -kc userid [keyring]
For further information on how the backup copy of your own key is
checked, see the description of the BAKRING parameter in the
configuration file section of this manual.
Verifying a Public Key Over the Phone
-------------------------------------
If you get a public key from someone that is not certified by anyone
you trust, how can you tell if it's really their key? The best way
to verify an uncertified key is to verify it over some independent
channel other than the one you received the key through. One
convenient way to tell, if you know this person and would recognize
them on the phone, is to call them and verify their key over the
telephone. Rather than reading their whole tiresome (ASCII-armored)
key to them over the phone, you can just read their key's
"fingerprint" to them. To see this fingerprint, use the -kvc
command:
pgp -kvc userid [keyring]
This will display the key with the 16-byte digest of the public key
components. Read this 16-byte fingerprint to the key's owner on the
phone, while she checks it against her own, using the same -kvc
command at her end.
You can both verify each other's keys this way, and then you can sign
each other's keys with confidence. This is a safe and convenient way
to get the key trust network started for your circle of friends.
Note that sending a key fingerprint via E-mail is not the best way to
verify the key, because E-mail can be intercepted and modified. It's
best to use a different channel than the one that was used to send
the key itself. A good combination is to send the key via E-mail,
and the key fingerprint via a voice telephone conversation. Some
people distribute their key fingerprint on their business cards,
which looks really cool.
If you don't know me, please don't call me to verify my key over the
phone-- I get too many calls like that. Since every PGP user has a
copy of my public key, no one could tamper with all the copies that
are out there. The discrepancy would soon be noticed by someone who
checked it from more than one source, and word would soon get out on
the Internet.
Handling Large Public Keyrings
------------------------------
PGP was originally designed for handling small personal keyrings for
keeping all your friends on, like a personal rolodex. A couple
hundred keys is a reasonable size for such a keyring. But as PGP has
become more popular, people are now trying to add other large
keyrings to their own keyring. Sometimes this involves adding
thousands of keys to your keyring. PGP, in its present form, cannot
perform this operation in a reasonable period of time, while you wait
at your keyboard. Not for huge keyrings.
You may want to add a huge "imported" keyring to your own keyring,
because you are only interested in a few dozen keys on the bigger
keyring you are bringing in. If that's all you want from the other
keyring, it would be more efficient if you extract the few keys you
need from the big foreign keyring, and then add just these few keys
to your own keyring. Use the -kx command to extract them from the
foreign keyring, specifying the keyring name on the command line.
Then add these extracted keys to your own keyring.
The real solution is to improve PGP to use advanced database
techniques to manage large keyrings efficiently. Until this happens,
you will just have to use smaller keyrings, or be patient.
Using PGP as a Unix-style Filter
--------------------------------
Unix fans are accustomed to using Unix "pipes" to make two
applications work together. The output of one application can be
directly fed through a pipe to be read as input to another
application. For this to work, the applications must be capable of
reading the raw material from "standard input" and writing the
finished output to "standard output". PGP can operate in this mode.
If you don't understand what this means, then you probably don't need
this feature.
To use a Unix-style filter mode, reading from standard input and
writing to standard output, add the -f option, like so:
pgp -feast her_userid <inputfile >outputfile
This feature makes it easier to make PGP work with electronic mail
applications.
When using PGP in filter mode to decrypt a ciphertext file, you may
find it useful to use the PGPPASS environmental variable to hold the
pass phrase, so that you won't be prompted for it. The PGPPASS
feature is explained below.
Suppressing Unnecessary Questions: BATCHMODE
----------------------------------------------
With the BATCHMODE flag enabled on the command line, PGP will not ask
any unnecessary questions or prompt for alternate filenames. Here
is an example of how to set this flag:
pgp +batchmode cipherfile
This is useful for running PGP non-interactively from Unix shell
scripts or MSDOS batch files. Some key management commands still
need user interaction even when BATCHMODE is on, so shell scripts may
need to avoid them.
BATCHMODE may also be enabled to check the validity of a signature on
a file. If there was no signature on the file, the exit code is 1.
If it had a signature that was good, the exit code is 0.
Force "Yes" Answer to Confirmation Questions: FORCE
----------------------------------------------------
This command-line flag makes PGP assume "yes" for the user response
to the confirmation request to overwrite an existing file, or when
removing a key from the keyring via the -kr command. Here is an
example of how to set this flag:
pgp +force cipherfile
or:
pgp -kr +force Smith
This feature is useful for running PGP non-interactively from a Unix
shell script or MSDOS batch file.
PGP Returns Exit Status to the Shell
------------------------------------
To facilitate running PGP in "batch" mode, such as from an MSDOS
".bat" file or from a Unix shell script, PGP returns an error exit
status to the shell. An exit status code of zero means normal exit,
while a nonzero exit status indicates some kind of error occurred.
Different error exit conditions return different exit status codes to
the shell.
Environmental Variable for Pass Phrase
--------------------------------------
Normally, PGP prompts the user to type a pass phrase whenever PGP
needs a pass phrase to unlock a secret key. But it is possible to
store the pass phrase in an environmental variable from your
operating system's command shell. The environmental variable PGPPASS
can be used to hold the pass phrase that PGP will attempt to use
first. If the pass phrase stored in PGPPASS is incorrect, PGP
recovers by prompting the user for the correct pass phrase.
For example, on MSDOS, the shell command:
SET PGPPASS=zaphod beeblebrox for president
would eliminate the prompt for the pass phrase if the pass phrase
were indeed "zaphod beeblebrox for president".
This dangerous feature makes your life more convenient if you have to
regularly deal with a large number of incoming messages addressed to
your secret key, by eliminating the need for you to repeatedly type
in your pass phrase every time you run PGP.
I added this feature because of popular demand. However, this is a
somewhat dangerous feature, because it keeps your precious pass
phrase stored somewhere other than just in your brain. Even worse,
if you are particularly reckless, it may even be stored on a disk on
the same computer as your secret key. It would be particularly
dangerous and stupid if you were to install this command in a batch
or script file, such as the MSDOS AUTOEXEC.BAT file. Someone could
come along on your lunch hour and steal both your secret key ring and
the file containing your pass phrase.
I can't emphasize the importance of this risk enough. If you are
contemplating using this feature, be sure to read the sections
"Exposure on Multi-user Systems" and "How to Protect Secret Keys from
Disclosure" in this volume and in the Essential Topics volume of the
PGP User's Guide.
If you must use this feature, the safest way to do it would be to
just manually type in the shell command to set PGPPASS every time you
boot your machine to start using PGP, and then erase it or turn off
your machine when you are done. And you should definitely never do
it in an environment where someone else may have access to your
machine. Someone could come along and simply ask your computer to
display the contents of PGPPASS.
Setting Configuration Parameters: CONFIG.TXT
============================================
PGP has a number of user-settable parameters that can be defined in a
special configuration text file called "config.txt", in the directory
pointed to by the shell environmental variable PGPPATH. Having a
configuration file enables the user to define various flags and
parameters for PGP without the burden of having to always define
these parameters in the PGP command line.
Configuration parameters may be assigned integer values, character
string values, or on/off values, depending on what kind of
configuration parameter it is. A sample configuration file is
provided with PGP, so you can see some examples.
In the configuration file, blank lines are ignored, as is anything
following the '#' comment character. Keywords are not
case-sensitive.
Here is a short sample fragment of a typical configuration file:
# TMP is the directory for PGP scratch files, such as a RAM disk.
TMP = "e:\" # Can be overridden by environment variable TMP.
Armor = on # Use -a flag for ASCII armor whenever applicable.
# CERT_DEPTH is how deeply introducers may introduce introducers.
cert_depth = 3
If some configuration parameters are not defined in the configuration
file, or if there is no configuration file, or if PGP can't find the
configuration file, the values for the configuration parameters
default to some reasonable value.
Note that it is also possible to set these same configuration
parameters directly from the PGP command line, by preceding the
parameter setting with a "+" character. For example, the following
two PGP commands produce the same effect:
pgp -e +armor=on message.txt smith
or: pgp -ea message.txt smith
The following is a summary of the various parameters than may be
defined in the configuration file.
TMP - Directory Pathname for Temporary Files
--------------------------------------------
Default setting: TMP = ""
The configuration parameter TMP specifies what directory to use for
PGP's temporary scratch files. The best place to put them is on a
RAM disk, if you have one. That speeds things up quite a bit, and
increases security somewhat. If TMP is undefined, the temporary
files go in the current directory. If the shell environmental
variable TMP is defined, PGP instead uses that to specify where the
temporary files should go.
LANGUAGE - Foreign Language Selector
------------------------------------
Default setting: LANGUAGE = "en"
PGP displays various prompts, warning messages, and advisories to the
user on the screen. For example, messages such as "File not found.",
or "Please enter your pass phrase:". These messages are normally in
English. But it is possible to get PGP to display its messages to
the user in other languages, without having to modify the PGP
executable program.
A number of people in various countries have translated all of PGP's
display messages, warnings, and prompts into their native languages.
These hundreds of translated message strings have been placed in a
special text file called "language.txt", distributed with the PGP
release. The messages are stored in this file in English, Spanish,
Dutch, German, French, Italian, Russian, Latvian, and Lithuanian.
Other languages may be added later.
The configuration parameter LANGUAGE specifies what language to
display these messages in. LANGUAGE may be set to "en" for English,
"es" for Spanish, "de" for German, "nl" for Dutch, "fr" for French,
"it" for Italian, "ru" for Russian, "lt3" for Lithuanian, "lv" for
Latvian, "esp" for Esperanto. For example, if this line appeared in
the configuration file:
LANGUAGE = "fr"
PGP would select French as the language for its display messages.
The default setting is English.
When PGP needs to display a message to the user, it looks in the
"language.txt" file for the equivalent message string in the selected
foreign language and displays that translated message to the user.
If PGP can't find the language string file, or if the selected
language is not in the file, or if that one phrase is not translated
into the selected language in the file, or if that phrase is missing
entirely from the file, PGP displays the message in English.
To conserve disk space, most foreign translations are not included
in the standard PGP release package, but are available separately.
MYNAME - Default User ID for Making Signatures
----------------------------------------------
Default setting: MYNAME = ""
The configuration parameter MYNAME specifies the default user ID to
use to select the secret key for making signatures. If MYNAME is not
defined, the most recent secret key you installed on your secret key
ring will be used. The user may also override this setting by
specifying a user ID on the PGP command line with the -u option.
TEXTMODE - Assuming Plaintext is a Text File
--------------------------------------------
Default setting: TEXTMODE = off
The configuration parameter TEXTMODE is equivalent to the -t command
line option. If enabled, it causes PGP to assume the plaintext is a
text file, not a binary file, and converts it to "canonical text"
before encrypting it. Canonical text has a carriage return and a
linefeed at the end of each line of text.
This mode will be automatically turned off if PGP detects that the
plaintext file contains what it thinks is non-text binary data. If
you intend to use PGP primarily for E-mail purposes, you should turn
TEXTMODE=ON.
For VAX/VMS systems, the current version of PGP defaults TEXTMODE=ON.
For further details, see the section "Sending ASCII Text Files Across
Different Machine Environments".
CHARSET - Specifies Local Character Set for Text Files
------------------------------------------------------
Default setting: CHARSET = NOCONV
Because PGP must process messages in many non-English languages with
non-ASCII character sets, you may have a need to tell PGP what local
character set your machine uses. This determines what character
conversions are performed when converting plaintext files to and from
canonical text format. This is only a concern if you are in a
non-English non-ASCII environment.
The configuration parameter CHARSET selects the local character set.
The choices are NOCONV (no conversion), LATIN1 (ISO 8859-1 Latin
Alphabet 1), KOI8 (used by most Russian Unix systems), ALT_CODES
(used by Russian MSDOS systems), ASCII, and CP850 (used by most
western European languages on standard MSDOS PCs).
LATIN1 is the internal representation used by PGP for canonical text,
so if you select LATIN1, no conversion is done. Note also that PGP
treats KOI8 as LATIN1, even though it is a completely different
character set (Russian), because trying to convert KOI8 to either
LATIN1 or CP850 would be futile anyway. This means that setting
CHARSET to NOCONV, LATIN1, or KOI8 are all equivalent to PGP.
If you use MSDOS and expect to send or receive traffic in western
European languages, set CHARSET = "CP850". This will make PGP
convert incoming canonical text messages from LATIN1 to CP850 after
decryption. If you use the -t (textmode) option to convert to
canonical text, PGP will convert your CP850 text to LATIN1 before
encrypting it.
For further details, see the section "Sending ASCII Text Files Across
Different Machine Environments".
ARMOR - Enable ASCII Armor Output
---------------------------------
Default setting: ARMOR = off
The configuration parameter ARMOR is equivalent to the -a command
line option. If enabled, it causes PGP to emit ciphertext or keys in
ASCII Radix-64 format suitable for transporting through E-mail
channels. Output files are named with the ".asc" extension.
If you intend to use PGP primarily for E-mail purposes, you should
turn ARMOR=ON.
For further details, see the section "Sending Ciphertext Through
E-mail Channels: Radix-64 Format" in the Essential Topics volume.
ARMORLINES - Size of ASCII Armor Multipart Files
------------------------------------------------
Default setting: ARMORLINES = 720
When PGP creates a very large ".asc" radix-64 file for sending
ciphertext or keys through the E-mail, it breaks the file up into
separate chunks small enough to send through Internet mail
utilities. Normally, Internet mailers prohibit files larger than
about 50000 bytes, which means that if we restrict the number of
lines to about 720, we'll be well within the limit. The file chunks
are named with suffixes ".as1", ".as2", ".as3", ...
The configuration parameter ARMORLINES specifies the maximum number
of lines to make each chunk in a multipart ".asc" file sequence. If
you set it to zero, PGP will not break up the file into chunks.
Fidonet email files usually have an upper limit of about 32K bytes,
so 450 lines would be appropriate for Fidonet environments.
For further details, see the section "Sending Ciphertext Through
E-mail Channels: Radix-64 Format" in the Essential Topics volume.
KEEPBINARY - Keep Binary Ciphertext Files After Decrypting
----------------------------------------------------------
Default setting: KEEPBINARY = off
When PGP reads a ".asc" file, it recognizes that the file is in
radix-64 format and will convert it back to binary before processing
as it normally does, producing as a by-product a ".pgp" ciphertext
file in binary form. After further processing to decrypt the ".pgp"
file, the final output file will be in normal plaintext form.
You may want to delete the binary ".pgp" intermediate file, or you
may want PGP to delete it for you automatically. You can still rerun
PGP on the original ".asc" file.
The configuration parameter KEEPBINARY enables or disables keeping
the intermediate ".pgp" file during decryption.
For further details, see the section "Sending Ciphertext Through
E-mail Channels: Radix-64 Format" in the Essential Topics volume.
COMPRESS - Enable Compression
-----------------------------
Default setting: COMPRESS = on
The configuration parameter COMPRESS enables or disables data
compression before encryption. It is used mainly for debugging PGP.
Normally, PGP attempts to compress the plaintext before it encrypts
it. Generally, you should leave this alone and let PGP attempt to
compress the plaintext.
COMPLETES_NEEDED - Number of Completely Trusted Introducers Needed
------------------------------------------------------------------
Default setting: COMPLETES_NEEDED = 1
The configuration parameter COMPLETES_NEEDED specifies the minimum
number of completely trusted introducers required to fully certify a
public key on your public key ring. This gives you a way of tuning
PGP's skepticism.
For further details, see the section "How Does PGP Keep Track of
Which Keys are Valid?" in the Essential Topics volume.
MARGINALS_NEEDED - Number of Marginally Trusted Introducers Needed
------------------------------------------------------------------
Default setting: MARGINALS_NEEDED = 2
The configuration parameter MARGINALS_NEEDED specifies the minimum
number of marginally trusted introducers required to fully certify a
public key on your public key ring. This gives you a way of tuning
PGP's skepticism.
For further details, see the section "How Does PGP Keep Track of
Which Keys are Valid?" in the Essential Topics volume.
CERT_DEPTH - How Deep May Introducers Be Nested
-----------------------------------------------
Default setting: CERT_DEPTH = 4
The configuration parameter CERT_DEPTH specifies how many levels deep
you may nest introducers to certify other introducers to certify
public keys on your public key ring. For example, If CERT_DEPTH is
set to 1, there may only be one layer of introducers below your own
ultimately-trusted key. If that were the case, you would be required
to directly certify the public keys of all trusted introducers on
your key ring. If you set CERT_DEPTH to 0, you could have no
introducers at all, and you would have to directly certify each and
every key on your public key ring in order to use it. The minimum
CERT_DEPTH is 0, the maximum is 8.
For further details, see the section "How Does PGP Keep Track of
Which Keys are Valid?" in the Essential Topics volume.
BAKRING - Filename for Backup Secret Keyring
--------------------------------------------
Default setting: BAKRING = ""
All of the key certification that PGP does on your public key ring
ultimately depends on your own ultimately-trusted public key (or
keys). To detect any tampering of your public key ring, PGP must
check that your own key has not been tampered with. To do this, PGP
must compare your public key against a backup copy of your secret key
on some tamper-resistant media, such as a write-protected floppy
disk. A secret key contains all the information that your public key
has, plus some secret components. This means PGP can check your
public key against a backup copy of your secret key.
The configuration parameter BAKRING specifies what pathname to use
for PGP's trusted backup copy of your secret key ring. On MSDOS, you
could set it to "a:\secring.pgp" to point it at a write-protected
backup copy of your secret key ring on your floppy drive. This check
is performed only when you execute the PGP -kc option to check your
whole public key ring.
If BAKRING is not defined, PGP will not check your own key against
any backup copy.
For further details, see the sections "How to Protect Public Keys
from Tampering" and "How Does PGP Keep Track of Which Keys are
Valid?" in the Essential Topics volume.
PUBRING - Filename for Your Public Keyring
------------------------------------------
Default setting: PUBRING = "$PGPPATH/pubring.pgp"
You may want to keep your public keyring in a directory separate from
your config.txt file in the directory specified by your $PGPPATH
environmental variable. You may specify the full path and filename
for your public keyring by setting the PUBRING parameter. For
example, on an MSDOS system, you might want to keep your public
keyring on a floppy disk by:
PUBRING = "a:pubring.pgp"
This feature is especially handy for specifying an alternative
keyring on the command line.
SECRING - Filename for Your Secret Keyring
------------------------------------------
Default setting: SECRING = "$PGPPATH/secring.pgp"
You may want to keep your secret keyring in a directory separate from
your config.txt file in the directory specified by your $PGPPATH
environmental variable. This comes in handy for putting your secret
keyring in a directory or device that is more protected than your
public keyring. You may specify the full path and filename for your
secret keyring by setting the SECRING parameter. For example, on an
MSDOS system, you might want to keep your secret keyring on a floppy
disk by:
SECRING = "a:secring.pgp"
RANDSEED - Filename for Random Number Seed
------------------------------------------
Default setting: RANDSEED = "$PGPPATH/randseed.bin"
You may want to keep your random number seed file (for generation of
session keys) in a directory separate from your config.txt file in
the directory specified by your $PGPPATH environmental variable.
This comes in handy for putting your random number seed file in a
directory or device that is more protected than your public keyring.
You may specify the full path and filename for your random seed file
by setting the RANDSEED parameter. For example, on an MSDOS system,
you might want to keep it on a floppy disk by:
RANDSEED = "a:randseed.bin"
PAGER - Selects Shell Command to Display Plaintext Output
---------------------------------------------------------
Default setting: PAGER = ""
PGP lets you view the decrypted plaintext output on your screen (like
the Unix-style "more" command), without writing it to a file, if you
use the -m (more) option while decrypting. This displays the
decrypted plaintext display on your screen one screenful at a time.
If you prefer to use a fancier page display utility, rather than
PGP's built-in one, you can specify the name of a shell command that
PGP will invoke to display your plaintext output file. The
configuration parameter PAGER specifies the shell command to invoke
to display the file. For example, on MSDOS systems, you might want
to use the popular shareware program "list.com" to display your
plaintext message. Assuming you have a copy of "list.com", you may
set PAGER accordingly:
PAGER = "list"
However, if the sender specified that this file is for your eyes
only, and may not be written to disk, PGP always uses its own
built-in display function.
For further details, see the section "Displaying Decrypted Plaintext
on Your Screen".
SHOWPASS - Echo Pass Phrase to User
-----------------------------------
Default setting: SHOWPASS = off
Normally, PGP does not let you see your pass phrase as you type it
in. This makes it harder for someone to look over your shoulder
while you type and learn your pass phrase. But some typing-impaired
people have problems typing their pass phrase without seeing what
they are typing, and they may be typing in the privacy of their own
homes. So they asked if PGP can be configured to let them see what
they type when they type in their pass phrase.
The configuration parameter SHOWPASS enables PGP to echo your typing
during pass phrase entry.
TZFIX - Timezone Adjustment
---------------------------
Default setting: TZFIX = 0
PGP provides timestamps for keys and signature certificates in
Greenwich Mean Time (GMT), or Coordinated Universal Time (UTC), which
means the same thing for our purposes. When PGP asks the system for
the time of day, the system is supposed to provide it in GMT.
But sometimes, because of improperly configured MSDOS systems, the
system time is returned in US Pacific Standard Time time plus 8
hours. Sounds weird, doesn't it? Perhaps because of some sort of US
west-coast jingoism, MSDOS presumes local time is US Pacific time,
and pre-corrects Pacific time to GMT. This adversely affects the
behavior of the internal MSDOS GMT time function that PGP calls.
However, if your MSDOS environmental variable TZ is already properly
defined for your timezone, this corrects the misconception MSDOS has
that the whole world lives on the US west coast.
The configuration parameter TZFIX specifies the number of hours to
add to the system time function to get GMT, for GMT timestamps on
keys and signatures. If the MSDOS environmental variable TZ is
defined properly, you can leave TZFIX=0. Unix systems usually
shouldn't need to worry about setting TZFIX at all. But if you are
using some other obscure operating system that doesn't know about
GMT, you may have to use TZFIX to adjust the system time to GMT.
On MSDOS systems that do not have TZ defined in the environment, you
should make TZFIX=0 for California, -1 for Colorado, -2 for Chicago,
-3 for New York, -8 for London, -9 for Amsterdam. In the summer,
TZFIX should be manually decremented from these values. What a mess.
It would be much cleaner to set your MSDOS environmental variable TZ
in your AUTOEXEC.BAT file, and not use the TZFIX correction. Then
MSDOS gives you good GMT timestamps, and will handle daylight savings
time adjustments for you. Here are some sample lines to insert into
AUTOEXEC.BAT, depending on your time zone:
For Los Angeles: SET TZ=PST8PDT
For Denver: SET TZ=MST7MDT
For Arizona: SET TZ=MST7
(Arizona never uses daylight savings time)
For Chicago: SET TZ=CST6CDT
For New York: SET TZ=EST5EDT
For London: SET TZ=GMT0BST
For Amsterdam: SET TZ=MET-1DST
For Moscow: SET TZ=MSK-3MSD
For Aukland: SET TZ=NZT-13
CLEARSIG - Enable Signed Messages to be Encapsulated as Clear Text
------------------------------------------------------------------
Default setting: CLEARSIG = on
Normally, unencrypted PGP signed messages have a signature
certificate prepended in binary form. Also, the signed message is
compressed, rendering the message unreadable to casual human eyes,
even though the message is not actually encrypted. To send this
binary data through a 7-bit E-mail channel, radix-64 ASCII armor is
applied (see the ARMOR parameter). Even if PGP didn't compress the
message, the ASCII armor would still render the message unreadable to
human eyes. The recipient must use PGP to strip the armor off and
decompress it before reading the message.
If the original plaintext message is in text (not binary) form, there
is a way to send a signed message through an E-mail channel in such a
way that the signed message is not compressed and the ASCII armor is
applied only to the binary signature certificate, but not to the
plaintext message. The CLEARSIG flag provides this useful feature,
making it possible to generate a signed message that can be read with
human eyes, without the aid of PGP. Of course, you still need PGP to
actually check the signature.
The CLEARSIG flag is preset to "on" beginning with PGP version 2.5.
To enable the full CLEARSIG behavior, the ARMOR and TEXTMODE flags
must also be turned on. Set ARMOR=ON (or use the -a option), and set
TEXTMODE=ON (or use the -t option). If your config file has CLEARSIG
turned off, you can turn it back on again directly on the command
line, like so:
pgp -sta +clearsig=on message.txt
This message representation is analogous to the MIC-CLEAR message type
used in Internet Privacy Enhanced Mail (PEM). It is important to
note that since this method only applies ASCII armor to the binary
signature certificate, and not to the message text itself, there is
some risk that the unarmored message may suffer some accidental
molestation while en route. This can happen if it passes through
some E-mail gateway that performs character set conversions, or in
some cases extra spaces may be added to or stripped from the ends of
lines. If this occurs, the signature will fail to verify, which may
give a false indication of intentional tampering. But since PEM
lives under a similar vulnerability, it seems worth having this
feature despite the risks.
Beginning with PGP version 2.2, trailing blanks are ignored on each
line in calculating the signature for text in CLEARSIG mode.
VERBOSE - Quiet, Normal, or Verbose Messages
--------------------------------------------
Default setting: VERBOSE = 1
VERBOSE may be set to 0, 1, or 2, depending on how much detail you
want to see from PGP diagnostic messages. The settings are:
0 - Display messages only if there is a problem. Unix fans wanted
this "quiet mode" setting.
1 - Normal default setting. Displays a reasonable amount of detail
in diagnostic or advisory messages.
2 - Displays maximum information, usually to help diagnose problems
in PGP. Not recommended for normal use. Besides, PGP doesn't have
any problems, right?
INTERACTIVE - Ask for Confirmation for Key Adds
-----------------------------------------------
Default Setting: INTERACTIVE = off
Enabling this mode will mean that if you add a key file containing
multiple keys to your key ring, PGP will ask for confirmation for
each key before adding it to your key ring.
NOMANUAL - Let PGP Generate Keys Without the Manual
---------------------------------------------------
Default Setting: NOMANUAL = off
It is important that the freeware version of PGP not be distributed
without the user documentation, which normally comes with it in the
standard release package. This manual contains important information
for using PGP, as well as important legal notices. But some people
have distributed previous versions of PGP without the manual, causing
a lot of problems for a lot of people who get it. To discourage the
distribution of PGP without the required documentation, PGP has been
changed to require the PGP User's Guide to be found somewhere on your
computer (like in your PGP directory) before PGP will let you generate
a key pair. However, some users like to use PGP on tiny palmtop
computers with limited storage capacity, so they like to run PGP
without the documentation present on their systems. To satisfy these
users, PGP can be made to relax its requirement that the manual be
present, by enabling the NOMANUAL flag on the command line during key
generation, like so:
pgp -kg +nomanual
The NOMANUAL flag can only be set on the command line, not in the
config file. Since you must read this manual to learn how to do
enable this override feature, I hope this will still be effective in
discouraging the distribution of PGP without the manual.
A Peek Under the Hood
=====================
Let's take a look at a few internal features of PGP.
Random Numbers
--------------
PGP uses a cryptographically strong pseudorandom number generator for
creating temporary conventional session keys. The seed file for this
is called "randseed.bin". It too can be kept in whatever directory
is indicated by the PGPPATH environmental variable. If this random
seed file does not exist, it is automatically created and seeded with
truly random numbers derived from timing your keystroke latencies.
This generator reseeds the disk file each time it is used by mixing
in new key material partially derived with the time of day and other
truly random sources. It uses the conventional encryption algorithm
as an engine for the random number generator. The seed file contains
both random seed material and random key material to key the
conventional encryption engine for the random generator.
This random seed file should be at least slightly protected from
disclosure, to reduce the risk of an attacker deriving your next or
previous session keys. The attacker would have a very hard time
getting anything useful from capturing this random seed file, because
the file is cryptographically laundered before and after each use.
Nonetheless, it seems prudent to at least try to keep it from falling
into the wrong hands.
If you feel uneasy about trusting any algorithmically derived random
number source however strong, keep in mind that you already trust the
strength of the same conventional cipher to protect your messages.
If it's strong enough for that, then it should be strong enough to
use as a source of random numbers for temporary session keys. Note
that PGP still uses truly random numbers from physical sources
(mainly keyboard timings) to generate long-term public/secret key
pairs.
PGP's Conventional Encryption Algorithm
---------------------------------------
As described earlier, PGP "bootstraps" into a conventional single-key
encryption algorithm by using a public key algorithm to encipher the
conventional session key and then switching to fast conventional
cryptography. So let's talk about this conventional encryption
algorithm. It isn't the DES.
The Federal Data Encryption Standard (DES) used to be a good
algorithm for most commercial applications. But the Government never
did trust the DES to protect its own classified data, because the DES
key length is only 56 bits, short enough for a brute force attack.
Also, the full 16-round DES has been attacked with some success by
Biham and Shamir using differential cryptanalysis, and by Matsui
using linear cryptanalysis.
The most devastating practical attack on the DES was described at the
Crypto '93 conference, where Michael Wiener of Bell Northern Research
presented a paper on how to crack the DES with a special machine. He
has fully designed and tested a chip that guesses 50 million DES keys
per second until it finds the right one. Although he has refrained
from building the real chips so far, he can get these chips
manufactured for $10.50 each, and can build 57000 of them into a
special machine for $1 million that can try every DES key in 7 hours,
averaging a solution in 3.5 hours. $1 million can be hidden in the
budget of many companies. For $10 million, it takes 21 minutes to
crack, and for $100 million, just two minutes. With any major
government's budget for examining DES traffic, it can be cracked in
seconds. This means that straight 56-bit DES is now effectively dead
for purposes of serious data security applications.
A possible successor to DES may be a variation known as "triple DES",
which uses two DES keys to encrypt three times, achieving an
effective key space of 112 bits. But this approach is three times
slower than normal DES. A future version of PGP may support triple
DES as an option.
PGP does not use the DES as its conventional single-key algorithm to
encrypt messages. Instead, PGP uses a different conventional
single-key block encryption algorithm, called IDEA(tm).
For the cryptographically curious, the IDEA cipher has a 64-bit block
size for the plaintext and the ciphertext. It uses a key size of 128
bits. It is based on the design concept of "mixing operations from
different algebraic groups". It runs much faster in software than
the DES. Like the DES, it can be used in cipher feedback (CFB) and
cipher block chaining (CBC) modes. PGP uses it in 64-bit CFB mode.
The IPES/IDEA block cipher was developed at ETH in Zurich by James L.
Massey and Xuejia Lai, and published in 1990. This is not a
"home-grown" algorithm. Its designers have a distinguished
reputation in the cryptologic community. Early published papers on
the algorithm called it IPES (Improved Proposed Encryption Standard),
but they later changed the name to IDEA (International Data
Encryption Algorithm). So far, IDEA has resisted attack much better
than other ciphers such as FEAL, REDOC-II, LOKI, Snefru and Khafre.
And recent evidence suggests that IDEA is more resistant than the DES
to Biham & Shamir's highly successful differential cryptanalysis
attack. Biham and Shamir have been examining the IDEA cipher for
weaknesses, without success. Academic cryptanalyst groups in
Belgium, England, and Germany are also attempting to attack it, as
well as the military services from several European countries. As
this new cipher continues to attract attack efforts from the most
formidable quarters of the cryptanalytic world, confidence in IDEA is
growing with the passage of time.
Every once in a while, I get a letter from someone who has just
learned the awful truth that PGP does not use pure RSA to encrypt
bulk data. They are concerned that the whole package is weakened if
we use a hybrid public-key and conventional scheme just to speed
things up. After all, a chain is only as strong as its weakest
link. They demand an explanation for this apparent "compromise" in
the strength of PGP. This may be because they have been caught up in
the public's reverence and awe for the strength and mystique of RSA,
mistakenly believing that RSA is intrinsically stronger than any
conventional cipher. Well, it's not.
People who work in factoring research say that the workload to
exhaust all the possible 128-bit keys in the IDEA cipher would equal
the factoring workload to crack a 3100-bit RSA key, which is quite a
bit bigger than the 1024-bit RSA key size that most people use for
high security applications. Given this range of key sizes, and
assuming there are no hidden weaknesses in the conventional cipher,
the weak link in this hybrid approach is in the public key algorithm,
not the conventional cipher.
It is not ergonomically practical to use pure RSA with large keys to
encrypt and decrypt long messages. A 1024-bit RSA key would decrypt
messages about 4000 times slower than the IDEA cipher. Absolutely no
one does it that way in the real world. Many people less experienced
in cryptography do not realize that the attraction of public key
cryptography is not because it is intrinsically stronger than a
conventional cipher-- its appeal is because it helps you manage keys
more conveniently.
Not only is RSA too slow to use on bulk data, but it even has certain
weaknesses that can be exploited in some special cases of particular
kinds of messages that are fed to the RSA cipher. These special
cases can be avoided by using the hybrid approach of using RSA to
encrypt random session keys for a conventional cipher. So the bottom
line is this: Using pure RSA on bulk data is the wrong approach,
period. It's too slow, it's not stronger, and may even be weaker. If
you find a software application that uses pure RSA on bulk data, it
probably means the implementor does not understand these issues.
Data Compression
----------------
PGP normally compresses the plaintext before encrypting it. It's too
late to compress it after it has been encrypted; encrypted data is
incompressible. Data compression saves modem transmission time and
disk space and more importantly strengthens cryptographic security.
Most cryptanalysis techniques exploit redundancies found in the
plaintext to crack the cipher. Data compression reduces this
redundancy in the plaintext, thereby greatly enhancing resistance to
cryptanalysis. It takes extra time to compress the plaintext, but
from a security point of view it seems worth it, at least in my
cautious opinion.
Files that are too short to compress or just don't compress well are
not compressed by PGP.
If you prefer, you can use PKZIP to compress the plaintext before
encrypting it. PKZIP is a widely-available and effective MSDOS
shareware compression utility from PKWare, Inc. Or you can use ZIP,
a PKZIP-compatible freeware compression utility on Unix and other
systems, available from Jean-Loup Gailly. There is some advantage in
using PKZIP or ZIP in certain cases, because unlike PGP's built-in
compression algorithm, PKZIP and ZIP have the nice feature of
compressing multiple files into a single compressed file, which is
reconstituted again into separate files when decompressed. PGP will
not try to compress a plaintext file that has already been
compressed. After decrypting, the recipient can decompress the
plaintext with PKUNZIP. If the decrypted plaintext is a PKZIP
compressed file, PGP automatically recognizes this and advises the
recipient that the decrypted plaintext appears to be a PKZIP file.
For the technically curious readers, the current version of PGP uses
the freeware ZIP compression routines written by Jean-loup Gailly,
Mark Adler, and Richard B. Wales. This ZIP software uses
functionally-equivalent compression algorithms as those used by
PKWare's new PKZIP 2.0. This ZIP compression software was selected
for PGP mainly because of its free portable C source code
availability, and because it has a really good compression ratio, and
because it's fast.
Peter Gutmann has also written a nice compression utility called
HPACK, available for free from many Internet FTP sites. It encrypts
the compressed archives, using PGP data formats and key rings. He
wanted me to mention that here.
Message Digests and Digital Signatures
--------------------------------------
To create a digital signature, PGP encrypts with your secret key.
But PGP doesn't actually encrypt your entire message with your secret
key-- that would take too long. Instead, PGP encrypts a "message
digest".
The message digest is a compact (128 bit) "distillate" of your
message, similar in concept to a checksum. You can also think of it
as a "fingerprint" of the message. The message digest "represents"
your message, such that if the message were altered in any way, a
different message digest would be computed from it. This makes it
possible to detect any changes made to the message by a forger. A
message digest is computed using a cryptographically strong one-way
hash function of the message. It would be computationally infeasible
for an attacker to devise a substitute message that would produce an
identical message digest. In that respect, a message digest is much
better than a checksum, because it is easy to devise a different
message that would produce the same checksum. But like a checksum,
you can't derive the original message from its message digest.
A message digest alone is not enough to authenticate a message. The
message digest algorithm is publicly known, and does not require
knowledge of any secret keys to calculate. If all we did was attach
a message digest to a message, then a forger could alter a message
and simply attach a new message digest calculated from the new
altered message. To provide real authentication, the sender has to
encrypt (sign) the message digest with his secret key.
A message digest is calculated from the message by the sender. The
sender's secret key is used to encrypt the message digest and an
electronic timestamp, forming a digital signature, or signature
certificate. The sender sends the digital signature along with the
message. The receiver receives the message and the digital
signature, and recovers the original message digest from the digital
signature by decrypting it with the sender's public key. The
receiver computes a new message digest from the message, and checks
to see if it matches the one recovered from the digital signature. If
it matches, then that proves the message was not altered, and it came
from the sender who owns the public key used to check the signature.
A potential forger would have to either produce an altered message
that produces an identical message digest (which is infeasible), or
he would have to create a new digital signature from a different
message digest (also infeasible, without knowing the true sender's
secret key).
Digital signatures prove who sent the message, and that the message
was not altered either by error or design. It also provides
non-repudiation, which means the sender cannot easily disavow his
signature on the message.
Using message digests to form digital signatures has other advantages
besides being faster than directly signing the entire actual message
with the secret key. Using message digests allows signatures to be
of a standard small fixed size, regardless of the size of the actual
message. It also allows the software to check the message integrity
automatically, in a manner similar to using checksums. And it allows
signatures to be stored separately from messages, perhaps even in a
public archive, without revealing sensitive information about the
actual messages, because no one can derive any message content from a
message digest.
The message digest algorithm used here is the MD5 Message Digest
Algorithm, placed in the public domain by RSA Data Security, Inc.
MD5's designer, Ronald Rivest, writes this about MD5:
"It is conjectured that the difficulty of coming up with two messages
having the same message digest is on the order of 2^64 operations,
and that the difficulty of coming up with any message having a given
message digest is on the order of 2^128 operations. The MD5
algorithm has been carefully scrutinized for weaknesses. It is,
however, a relatively new algorithm and further security analysis is
of course justified, as is the case with any new proposal of this
sort. The level of security provided by MD5 should be sufficient for
implementing very high security hybrid digital signature schemes
based on MD5 and the RSA public-key cryptosystem."
Compatibility with Previous Versions of PGP
===========================================
PGP version 2.6 can read anything produced by versions 2.3, 2.3a, 2.4,
or 2.5. However, because of a negotiated agreement between MIT and
RSA Data Security, PGP 2.6 will change its behavior slightly on 1
September 1994, triggered by a built-in software timer. On that date,
version 2.6 will start producing a new and slightly different data
format for messages, signatures and keys. PGP 2.6 will still be able
to read and process messages, signatures, and keys produced under the
old format, but it will generate the new format. This incompatible
change is intended to discourage people from continuing to use the
older (2.3a and earlier) versions of PGP, which Public Key Partners
contends infringes its RSA patent (see the section on Legal Issues).
PGP 2.4, distributed by Viacrypt (see the section Where to Get a
Commercial Version of PGP) avoids infringement through Viacrypt's
license arrangement with Public Key Partners. PGP 2.5 and 2.6 avoid
infringement by using the RSAREF(TM) Cryptographic Toolkit, under
license from RSA Data Security, Inc.
Outside the United States, the RSA patent is not in force, so PGP
users there are free to use implementations of PGP that do not rely on
RSAREF and its restrictions. Hopefully, implementors of PGP versions
outside the US will also switch to the new format, whose detailed
description is available from MIT. If everyone upgrades before 1
September 1994, no one will experience any discontinuity in
interoperability.
This format change beginning with 2.6 is similar to the process that
naturally happens when new features are added, causing older versions
of PGP to be unable to read stuff from the newer PGP, while the newer
version can still read the old stuff. The only difference is that
this is a "legal upgrade", instead of a technical one. It's a
worthwhile change, if it can achieve peace in our time.
According to ViaCrypt, which sells a commercial version of PGP,
ViaCrypt PGP will evolve to maintain interoperability with new
freeware versions of PGP.
There is a another change that effects interoperability with earlier
versions of PGP. Unfortunately, due to data format limitations
imposed by RSAREF, PGP 2.5 and 2.6 cannot interpret any messages or
signatures made with PGP version 2.2 or earlier. Since we had no
choice but to use the new data formats, because of the legal
requirement to switch to RSAREF, we can't do anything about this
problem.
Beginning with version 2.4 (which was ViaCrypt's first version)
through at least 2.6, PGP does not allow you to generate RSA keys
bigger than 1024 bits. The upper limit was always intended to be
1024 bits. But because of a bug in earlier versions of PGP, it was
possible to generate keys larger than 1024 bits. These larger keys
caused interoperability problems between different older versions of
PGP that used different arithmetic algorithms with different native
word sizes. On some platforms, PGP choked on the larger keys. In
addition to these older key size problems, the 1024-bit limit is now
enforced by RSAREF. A 1024-bit key is very likely to be well out of
reach of attacks by major governments.
In general, there is compatibility from version 2.0 upwards through
2.4. Because new features are added, older versions may not always be
able to handle some files created with newer versions. Because of
massive changes to all the algorithms and data structures, PGP version
2.0 (and later) is not even slightly compatible with PGP version 1.0,
which no one uses anymore anyway.
Vulnerabilities
===============
No data security system is impenetrable. PGP can be circumvented in
a variety of ways. In any data security system, you have to ask
yourself if the information you are trying to protect is more
valuable to your attacker than the cost of the attack. This should
lead you to protecting yourself from the cheapest attacks, while not
worrying about the more expensive attacks.
Some of the discussion that follows may seem unduly paranoid, but
such an attitude is appropriate for a reasonable discussion of
vulnerability issues.
Compromised Pass Phrase and Secret Key
--------------------------------------
Probably the simplest attack is if you leave your pass phrase for
your secret key written down somewhere. If someone gets it and also
gets your secret key file, they can read your messages and make
signatures in your name.
Don't use obvious passwords that can be easily guessed, such as the
names of your kids or spouse. If you make your pass phrase a single
word, it can be easily guessed by having a computer try all the words
in the dictionary until it finds your password. That's why a pass
phrase is so much better than a password. A more sophisticated
attacker may have his computer scan a book of famous quotations to
find your pass phrase. An easy to remember but hard to guess pass
phrase can be easily constructed by some creatively nonsensical
sayings or very obscure literary quotes.
For further details, see the section "How to Protect Secret Keys from
Disclosure" in the Essential Topics volume of the PGP User's Guide.
Public Key Tampering
--------------------
A major vulnerability exists if public keys are tampered with. This
may be the most crucially important vulnerability of a public key
cryptosystem, in part because most novices don't immediately
recognize it. The importance of this vulnerability, and appropriate
hygienic countermeasures, are detailed in the section "How to Protect
Public Keys from Tampering" in the Essential Topics volume.
To summarize: When you use someone's public key, make certain it has
not been tampered with. A new public key from someone else should be
trusted only if you got it directly from its owner, or if it has been
signed by someone you trust. Make sure no one else can tamper with
your own public key ring. Maintain physical control of both your
public key ring and your secret key ring, preferably on your own
personal computer rather than on a remote timesharing system. Keep a
backup copy of both key rings.
"Not Quite Deleted" Files
-------------------------
Another potential security problem is caused by how most operating
systems delete files. When you encrypt a file and then delete the
original plaintext file, the operating system doesn't actually
physically erase the data. It merely marks those disk blocks as
deleted, allowing the space to be reused later. It's sort of like
discarding sensitive paper documents in the paper recycling bin
instead of the paper shredder. The disk blocks still contain the
original sensitive data you wanted to erase, and will probably
eventually be overwritten by new data at some point in the future.
If an attacker reads these deleted disk blocks soon after they have
been deallocated, he could recover your plaintext.
In fact this could even happen accidentally, if for some reason
something went wrong with the disk and some files were accidentally
deleted or corrupted. A disk recovery program may be run to recover
the damaged files, but this often means some previously deleted files
are resurrected along with everything else. Your confidential files
that you thought were gone forever could then reappear and be
inspected by whomever is attempting to recover your damaged disk.
Even while you are creating the original message with a word
processor or text editor, the editor may be creating multiple
temporary copies of your text on the disk, just because of its
internal workings. These temporary copies of your text are deleted
by the word processor when it's done, but these sensitive fragments
are still on your disk somewhere.
Let me tell you a true horror story. I had a friend, married with
young children, who once had a brief and not very serious affair.
She wrote a letter to her lover on her word processor, and deleted
the letter after she sent it. Later, after the affair was over, the
floppy disk got damaged somehow and she had to recover it because it
contained other important documents. She asked her husband to
salvage the disk, which seemed perfectly safe because she knew she
had deleted the incriminating letter. Her husband ran a commercial
disk recovery software package to salvage the files. It recovered
the files alright, including the deleted letter. He read it, which
set off a tragic chain of events.
The only way to prevent the plaintext from reappearing is to somehow
cause the deleted plaintext files to be overwritten. Unless you know
for sure that all the deleted disk blocks will soon be reused, you
must take positive steps to overwrite the plaintext file, and also
any fragments of it on the disk left by your word processor. You can
overwrite the original plaintext file after encryption by using the
PGP -w (wipe) option. You can take care of any fragments of the
plaintext left on the disk by using any of the disk utilities
available that can overwrite all of the unused blocks on a disk. For
example, the Norton Utilities for MSDOS can do this.
Even if you overwrite the plaintext data on the disk, it may still be
possible for a resourceful and determined attacker to recover the
data. Faint magnetic traces of the original data remain on the disk
after it has been overwritten. Special sophisticated disk recovery
hardware can sometimes be used to recover the data.
Viruses and Trojan Horses
-------------------------
Another attack could involve a specially-tailored hostile computer
virus or worm that might infect PGP or your operating system. This
hypothetical virus could be designed to capture your pass phrase or
secret key or deciphered messages, and covertly write the captured
information to a file or send it through a network to the virus's
owner. Or it might alter PGP's behavior so that signatures are not
properly checked. This attack is cheaper than cryptanalytic attacks.
Defending against this falls under the category of defending against
viral infection generally. There are some moderately capable
anti-viral products commercially available, and there are hygienic
procedures to follow that can greatly reduce the chances of viral
infection. A complete treatment of anti-viral and anti-worm
countermeasures is beyond the scope of this document. PGP has no
defenses against viruses, and assumes your own personal computer is a
trustworthy execution environment. If such a virus or worm actually
appeared, hopefully word would soon get around warning everyone.
Another similar attack involves someone creating a clever imitation
of PGP that behaves like PGP in most respects, but doesn't work the
way it's supposed to. For example, it might be deliberately crippled
to not check signatures properly, allowing bogus key certificates to
be accepted. This "Trojan horse" version of PGP is not hard for an
attacker to create, because PGP source code is widely available, so
anyone could modify the source code and produce a lobotomized zombie
imitation PGP that looks real but does the bidding of its diabolical
master. This Trojan horse version of PGP could then be widely
circulated, claiming to be from me. How insidious.
You should make an effort to get your copy of PGP from a reliable
source, whatever that means. Or perhaps from more than one
independent source, and compare them with a file comparison utility.
There are other ways to check PGP for tampering, using digital
signatures. If someone you trust signs the executable version of
PGP, vouching for the fact that it has not been infected or tampered
with, you can be reasonably sure that you have a good copy. You
could use an earlier trusted version of PGP to check the signature on
a later suspect version of PGP. But this will not help at all if
your operating system is infected, nor will it detect if your
original copy of PGP.EXE has been maliciously altered in such a way
as to compromise its own ability to check signatures. This test also
assumes that you have a good trusted copy of the public key that you
use to check the signature on the PGP executable.
Physical Security Breach
------------------------
A physical security breach may allow someone to physically acquire
your plaintext files or printed messages. A determined opponent
might accomplish this through burglary, trash-picking, unreasonable
search and seizure, or bribery, blackmail or infiltration of your
staff. Some of these attacks may be especially feasible against
grassroots political organizations that depend on a largely volunteer
staff. It has been widely reported in the press that the FBI's
COINTELPRO program used burglary, infiltration, and illegal bugging
against antiwar and civil rights groups. And look what happened at
the Watergate Hotel.
Don't be lulled into a false sense of security just because you have
a cryptographic tool. Cryptographic techniques protect data only
while it's encrypted-- direct physical security violations can still
compromise plaintext data or written or spoken information.
This kind of attack is cheaper than cryptanalytic attacks on PGP.
Tempest Attacks
---------------
Another kind of attack that has been used by well-equipped opponents
involves the remote detection of the electromagnetic signals from
your computer. This expensive and somewhat labor-intensive attack is
probably still cheaper than direct cryptanalytic attacks. An
appropriately instrumented van can park near your office and remotely
pick up all of your keystrokes and messages displayed on your
computer video screen. This would compromise all of your passwords,
messages, etc. This attack can be thwarted by properly shielding all
of your computer equipment and network cabling so that it does not
emit these signals. This shielding technology is known as "Tempest",
and is used by some Government agencies and defense contractors.
There are hardware vendors who supply Tempest shielding commercially,
although it may be subject to some kind of Government licensing. Now
why do you suppose the Government would restrict access to Tempest
shielding?
Protecting Against Bogus Timestamps
-----------------------------------
A somewhat obscure vulnerability of PGP involves dishonest users
creating bogus timestamps on their own public key certificates and
signatures. You can skip over this section if you are a casual user
and aren't deeply into obscure public key protocols.
There's nothing to stop a dishonest user from altering the date and
time setting of his own system's clock, and generating his own public
key certificates and signatures that appear to have been created at a
different time. He can make it appear that he signed something
earlier or later than he actually did, or that his public/secret key
pair was created earlier or later. This may have some legal or
financial benefit to him, for example by creating some kind of
loophole that might allow him to repudiate a signature.
A remedy for this could involve some trustworthy Certifying Authority
or notary that would create notarized signatures with a trustworthy
timestamp. This might not necessarily require a centralized
authority. Perhaps any trusted introducer or disinterested party
could serve this function, the same way real notary publics do now.
A public key certificate could be signed by the notary, and the
trusted timestamp in the notary's signature would have some legal
significance. The notary could enter the signed certificate into a
special certificate log controlled by the notary. Anyone can read
this log.
The notary could also sign other people's signatures, creating a
signature certificate of a signature certificate. This would serve
as a witness to the signature the same way real notaries do now with
paper. Again, the notary could enter the detached signature
certificate (without the actual whole document that was signed) into
a log controlled by the notary. The notary's signature would have a
trusted timestamp, which might have greater credibility than the
timestamp in the original signature. A signature becomes "legal" if
it is signed and logged by the notary.
This problem of certifying signatures with notaries and trusted
timestamps warrants further discussion. This can of worms will not
be fully covered here now. There is a good treatment of this topic
in Denning's 1983 article in IEEE Computer (see references). There
is much more detail to be worked out in these various certifying
schemes. This will develop further as PGP usage increases and other
public key products develop their own certifying schemes.
Exposure on Multi-user Systems
------------------------------
PGP was originally designed for a single-user MSDOS machine under
your direct physical control. I run PGP at home on my own PC, and
unless someone breaks into my house or monitors my electromagnetic
emissions, they probably can't see my plaintext files or secret keys.
But now PGP also runs on multi-user systems such as Unix and VAX/VMS.
On multi-user systems, there are much greater risks of your plaintext
or keys or passwords being exposed. The Unix system administrator or
a clever intruder can read your plaintext files, or perhaps even use
special software to covertly monitor your keystrokes or read what's
on your screen. On a Unix system, any other user can read your
environment information remotely by simply using the Unix "ps"
command. Similar problems exist for MSDOS machines connected on a
local area network. The actual security risk is dependent on your
particular situation. Some multi-user systems may be safe because
all the users are trusted, or because they have system security
measures that are safe enough to withstand the attacks available to
the intruders, or because there just aren't any sufficiently
interested intruders. Some Unix systems are safe because they are
only used by one user-- there are even some notebook computers
running Unix. It would be unreasonable to simply exclude PGP from
running on all Unix systems.
PGP is not designed to protect your data while it is in plaintext
form on a compromised system. Nor can it prevent an intruder from
using sophisticated measures to read your secret key while it is
being used. You will just have to recognize these risks on
multi-user systems, and adjust your expectations and behavior
accordingly. Perhaps your situation is such that you should consider
running PGP only on an isolated single-user system under your direct
physical control. That's what I do, and that's what I recommend.
Traffic Analysis
----------------
Even if the attacker cannot read the contents of your encrypted
messages, he may be able to infer at least some useful information by
observing where the messages come from and where they are going, the
size of the messages, and the time of day the messages are sent.
This is analogous to the attacker looking at your long distance phone
bill to see who you called and when and for how long, even though the
actual content of your calls is unknown to the attacker. This is
called traffic analysis. PGP alone does not protect against traffic
analysis. Solving this problem would require specialized
communication protocols designed to reduce exposure to traffic
analysis in your communication environment, possibly with some
cryptographic assistance.
Cryptanalysis
-------------
An expensive and formidable cryptanalytic attack could possibly be
mounted by someone with vast supercomputer resources, such as a
Government intelligence agency. They might crack your RSA key by
using some new secret factoring breakthrough. Perhaps so, but it is
noteworthy that the US Government trusts the RSA algorithm enough in
some cases to use it to protect its own nuclear weapons, according to
Ron Rivest. And civilian academia has been intensively attacking it
without success since 1978.
Perhaps the Government has some classified methods of cracking the
IDEA(tm) conventional encryption algorithm used in PGP. This is
every cryptographer's worst nightmare. There can be no absolute
security guarantees in practical cryptographic implementations.
Still, some optimism seems justified. The IDEA algorithm's designers
are among the best cryptographers in Europe. It has had extensive
security analysis and peer review from some of the best cryptanalysts
in the unclassified world. It appears to have some design advantages
over the DES in withstanding differential cryptanalysis, which has
been used to crack the DES.
Besides, even if this algorithm has some subtle unknown weaknesses,
PGP compresses the plaintext before encryption, which should greatly
reduce those weaknesses. The computational workload to crack it is
likely to be much more expensive than the value of the message.
If your situation justifies worrying about very formidable attacks of
this caliber, then perhaps you should contact a data security
consultant for some customized data security approaches tailored to
your special needs. Boulder Software Engineering, whose address and
phone are given at the end of this document, can provide such
services.
In summary, without good cryptographic protection of your data
communications, it may have been practically effortless and perhaps
even routine for an opponent to intercept your messages, especially
those sent through a modem or E-mail system. If you use PGP and
follow reasonable precautions, the attacker will have to expend far
more effort and expense to violate your privacy.
If you protect yourself against the simplest attacks, and you feel
confident that your privacy is not going to be violated by a
determined and highly resourceful attacker, then you'll probably be
safe using PGP. PGP gives you Pretty Good Privacy.
Legal Issues
============
Trademarks, Copyrights, and Warranties
--------------------------------------
"Pretty Good Privacy", "Phil's Pretty Good Software", and the "Pretty
Good" label for computer software and hardware products are all
trademarks of Philip Zimmermann and Phil's Pretty Good Software. PGP
is (c) Copyright Philip R. Zimmermann, 1990-1994. All rights
reserved. Philip Zimmermann also holds the copyright for the PGP
User's Manual, as well as any foreign language translations of the
manual or the software, and all derivative works. All rights
reserved.
MIT may have a copyright on the particular software distribution
package that they distribute from the MIT FTP site. This copyright
on the "compilation" of the distribution package in no way implies
that MIT has a copyright on PGP itself, or its user documentation.
The author assumes no liability for damages resulting from the use of
this software, even if the damage results from defects in this
software, and makes no representations concerning the merchantability
of this software or its suitability for any specific purpose. It is
provided "as is" without express or implied warranty of any kind.
Because certain actions may delete files or render them
unrecoverable, the author assumes no responsibility for the loss or
modification of any data.
Patent Rights on the Algorithms
-------------------------------
The RSA public key cryptosystem was developed at MIT, which holds a
patent on it (U.S. patent #4,405,829, issued 20 Sep 1983). A company
in California called Public Key Partners (PKP) holds the exclusive
commercial license to sell and sub-license the RSA public key
cryptosystem. MIT distributes a freeware version of PGP under the
terms of the RSAREF license from RSA Data Security, Inc. (RSADSI).
Non-US users of earlier versions of PGP should note that the RSA
patent does not apply outside the US, and at least at the time of
this writing, the author is not aware of any RSA patent in any other
country. Federal agencies may use the RSA algorithm, because the
Government paid for the development of RSA with grants from the
National Science Foundation and the Navy. But despite the fact of
Government users having free access to the RSA algorithm, Government
use of PGP has additional restrictions imposed by the agreement I
have with ViaCrypt, as explained later.
I wrote my PGP software from scratch, with my own independently
developed implementation of the RSA algorithm. Before publishing
PGP, I got a formal written legal opinion from a patent attorney with
extensive experience in software patents. I'm convinced that
publishing PGP the way I did does not violate patent law.
Not only did PKP acquire the exclusive patent rights for the RSA
cryptosystem, but they also acquired the exclusive rights to three
other patents covering other public key schemes invented by others at
Stanford University, also developed with federal funding. This
essentially gives one company a legal lock in the USA on nearly all
practical public key cryptosystems. They even appear to be claiming
patent rights on the very concept of public key cryptography,
regardless of what clever new original algorithms are independently
invented by others. I find such a comprehensive monopoly troubling,
because I think public key cryptography is destined to become a
crucial technology in the protection of our civil liberties and
privacy in our increasingly connected society. At the very least,
it places these vital tools at risk by affording to the Government
a single pressure point of influence.
Beginning with PGP version 2.5 (distributed by MIT, the holders of
the original RSA patent), the freeware version of PGP uses the RSAREF
subroutine library to perform its RSA calculations, under the RSAREF
license, which allows noncommercial use in the USA. RSAREF is a
subroutine package from RSA Data Security Inc, that implements the
RSA algorithm. The RSAREF subroutines are used instead of PGP's
original subroutines to implement the RSA functions in PGP. See the
RSAREF license for terms and conditions of use
of RSAREF applications.
PGP 2.5 was released by MIT for a brief test period in May, 1994
before releasing 2.6. Although 2.5 was released under the 16 March,
1994 RSAREF license, which is a perpetual license, it would be better
for users in the United States to upgrade to version 2.6 to facilitate
the demise of PGP 2.3a and earlier versions. Also, PGP 2.5 has bugs
that are corrected in 2.6, and 2.5 will not read the new data format
after September 1, 1994. (See the section on Compatibility with
Previous Versions of PGP.)
The PGP 2.0 release was a joint effort of an international team of
software engineers, implementing enhancements to the original PGP
with design guidance from me. It was released by Branko Lankester in
The Netherlands and Peter Gutmann in New Zealand, out of reach of US
patent law. Although released only in Europe and New Zealand, it
spontaneously spread to the USA without help from me or the PGP
development team.
The IDEA(tm) conventional block cipher used by PGP is covered by a
patent in Europe, held by ETH and a Swiss company called Ascom-Tech
AG. The US Patent number is US005214703, and the European patent
number is EP 0 482 154 B1. IDEA(tm) is a trademark of Ascom-Tech AG.
There is no license fee required for noncommercial use of IDEA.
Commercial users of IDEA may obtain licensing details from Dieter
Profos, Ascom Tech AG, Teleservices Section, Postfach 151, 4502
Solothurn, Switzerland, Tel +41 65 242885, Fax +41 65 235761.
Ascom-Tech AG has granted permission for the freeware version PGP to
use the IDEA cipher in non-commercial uses, everywhere. In the US
and Canada, all commercial or Government users must obtain a licensed
version from ViaCrypt, who has a license from Ascom-Tech for the IDEA
cipher. Ascom-Tech has recently been changing its policies regarding
the use of IDEA in PGP for commercial use outside the US, and that
policy still seems to be in flux.
The ZIP compression routines in PGP come from freeware source code,
with the author's permission. I'm not aware of any patents on the
compression algorithms used in the ZIP routines, but you're welcome to
check into that question yourself.
Licensing and Distribution
--------------------------
In the USA, PGP 2.6 is available from the Massachusetts Institute of
Technology, under the terms of the RSAREF license. I have no
objection to anyone freely using or distributing the freeware version
of PGP, without payment of fees to me, as long as it is for personal
non-commercial use. For commercial use, contact ViaCrypt in Phoenix,
Arizona (phone 602-944-0773). You must keep the copyright, patent,
and trademark notices on PGP and keep all the documentation with it.
NOTE: Regardless of the complexities and partially overlapping
restrictions from all the other terms and conditions imposed by the
various patent and copyright licenses (RSA, RSAREF, and IDEA) from
various third parties, an additional overriding restriction on PGP
usage is imposed by my own agreement with ViaCrypt: The freeware
version of PGP is only for personal, noncommercial use -- all other
users in the USA and Canada must obtain a fully licensed version of
PGP from ViaCrypt.
I had to make an agreement with ViaCrypt in the summer of 1993 to
license the exclusive commercial rights to PGP, so that there would
be a legally safe way for corporations to use PGP without risk of a
patent infringement lawsuit from PKP. For PGP to succeed in the long
term as a viable industry standard, the legal stigma associated with
the RSA patent rights had to be resolved. ViaCrypt had already
obtained a patent license from PKP to make, use, and sell products
that practice the RSA patents. ViaCrypt offered a way out of the
patent quagmire for PGP to penetrate the corporate environment. They
could sell a fully-licensed version of PGP, but only if I licensed it
to them under these terms. So we entered into an agreement to do
that, opening the door for PGP's future in the commercial sector,
which was necessary for PGP's long-term political future.
PGP is not shareware, it's freeware. Published as a community service.
Giving PGP away for free will encourage far more people to use it, which
hopefully will have a greater social impact. This could lead to
widespread awareness and use of the RSA public key cryptosystem.
Feel free to disseminate the complete PGP release package as widely
as possible, but be careful not to violate U.S. export controls if
you live in the USA. Give it to all your friends. If you have
access to any electronic Bulletin Boards Systems, please upload the
complete PGP executable object release package to as many BBS's as
possible. The freeware version of PGP is available in source code
form, and you may disseminate the source release package too, if you've
got it. NOTE: Under no circumstances should PGP be distributed
without the PGP documentation, including this PGP User's Guide and the
RSAREF license agreement.
The PGP version 2.6 executable object release package for MSDOS contains
the PGP executable software, documentation, RSAREF license, sample
key rings including my own public key, and signatures for the software
and this manual, all in one PKZIP compressed file called pgp26.zip. The
PGP source release package for MSDOS contains all the C source files in
one PKZIP compressed file called pgp26src.zip. The filename for the
release package is derived from the version number of the release.
The primary release site for PGP is the Massachusetts Institute of
Technology, at their FTP site "net-dist.mit.edu", in their /pub/PGP
directory. You may obtain free copies or updates to PGP from this
site, or any other Internet FTP site or BBS that PGP has spread to.
Don't ask me for a copy directly from me, especially if you live
outside the US or Canada.
After all this work I have to admit I wouldn't mind getting some fan
mail for PGP, to gauge its popularity. Let me know what you think
about it and how many of your friends use it. Bug reports and
suggestions for enhancing PGP are welcome, too. Perhaps a future PGP
release will reflect your suggestions.
This project has not been funded and the project has nearly eaten me
alive. This means you can't count on a reply to your mail, unless
you only need a short written reply and you include a stamped
self-addressed envelope. But I often do reply to E-mail. Please keep
it in English, as my foreign language skills are weak. If you call
and I'm not in, it's best to just try again later. I usually don't
return long distance phone calls, unless you leave a message that I
can call you collect. If you need any significant amount of my time,
I am available on a paid consulting basis, and I do return those
calls.
The most inconvenient mail I get is for some well-intentioned person
to send me a few dollars asking me for a copy of PGP. I don't send
it to them because I'd rather avoid any legal problems with PKP. Or
worse, sometimes these requests are from foreign countries, and I
would be risking a violation of US cryptographic export control
laws. Even if there were no legal hassles involved in sending PGP to
them, they usually don't send enough money to make it worth my time.
I'm just not set up as a low cost low volume mail order business. I
can't just ignore the request and keep the money, because they
probably regard the money as a fee for me to fulfill their request.
If I return the money, I might have to get in my car and drive down
to the post office and buy some postage stamps, because these
requests rarely include a stamped self-addressed envelope. And I
have to take the time to write a polite reply that I can't do it. If
I postpone the reply and set the letter down on my desk, it might be
buried within minutes and won't see the light of day again for
months. Multiply these minor inconveniences by the number of
requests I get, and you can see the problem. Isn't it enough that
the software is free? It would be nicer if people could try to get
PGP from any of the myriad other sources. If you don't have a modem,
ask a friend to get it for you. If you can't find it yourself, I
don't mind answering a quick phone call.
If anyone wants to volunteer to improve PGP, please let me know. It
could certainly use some more work. Some features were deferred to
get it out the door. A number of PGP users have since donated their
time to port PGP to Unix on Sun SPARCstations, to Ultrix, to VAX/VMS,
to OS/2, to the Amiga, and to the Atari ST. Perhaps you can help
port it to some new environments. But please let me know if you plan
to port or add enhancements to PGP, to avoid duplication of effort,
and to avoid starting with an obsolete version of the source code.
Because so many foreign language translations of PGP have been
produced, most of them are not distributed with the regular PGP
release package because it would require too much disk space.
Separate language translation "kits" are available from a number of
independent sources, and are sometimes available separately from the
same distribution centers that carry the regular PGP release
software. These kits include translated versions of the file
LANGUAGE.TXT, PGP.HLP, and the PGP User's Guide. If you want to
produce a translation for your own native language, contact me first
to get the latest information and standard guidelines, and to find
out if it's been translated to your language already. To find out
where to get a foreign language kit for your language, you might
check on the Internet newsgroups, or get it from Mike Johnson
(mpj@csn.org).
If you have access to the Internet, watch for announcements of new
releases of PGP on the Internet newsgroups "sci.crypt" and PGP's own
newsgroup, "alt.security.pgp". If you want to know where to get PGP,
MIT is the primary FTP distribution site (net-dist.mit.edu). Or ask
Mike Johnson (mpj@csn.org) for a list of Internet FTP sites and BBS
phone numbers.
Future versions of PGP may have to change the data formats for
messages, signatures, keys and key rings, in order to provide
important new features. This may cause backward compatibility
problems with this version of PGP. Future releases may provide
conversion utilities to convert old keys, but you may have to dispose
of old messages created with the old PGP.
Export Controls
---------------
The U.S. Government has made it illegal in most cases to export good
cryptographic technology, and that may include PGP. They regard this
kind of software just like they regard munitions. This is determined
by volatile State Department, Defense Department and Commerce
Department policies, not fixed laws. I will not export this software
out of the US or Canada in cases when it is illegal to do so under US
controls, and I urge other people not to export it on their own.
If you live outside the US or Canada, I urge you not to violate US
export laws by getting any version of PGP in a way that violates
those laws. Since thousands of domestic users got the first version
after its initial publication, it somehow leaked out of the US and
spread itself widely abroad, like dandelion seeds blowing in the
wind.
Starting with PGP version 2.0 through version 2.3a, the release point
of the software has been outside the US, on publicly-accessible
computers in Europe. Each release was electronically sent back into
the US and posted on publicly-accessible computers in the US by PGP
privacy activists in foreign countries. There are some restrictions
in the US regarding the import of munitions, but I'm not aware of any
cases where this was ever enforced for importing cryptographic
software into the US. I imagine that a legal action of that type
would be quite a spectacle of controversy.
ViaCrypt PGP version 2.4 is sold in the United States and Canada and
is not for export. The following language was supplied by the US
Government to ViaCrypt for inclusion in the ViaCrypt PGP
documentation: "PGP is export restricted by the Office of Export
Administration, United States Department of Commerce and the Offices
of Defense Trade Controls and Munitions Control, United States
Department of State. PGP cannot be exported or reexported, directly
or indirectly, (a) without all export or reexport licenses and
governmental approvals required by any applicable laws, or (b) in
violation of any prohibition against the export or reexport of any
part of PGP." The Government may take the position that the freeware
PGP versions are also subject to those controls.
The freeware PGP versions 2.5 and 2.6 were released through a posting
on a controlled FTP site maintained by MIT. This site has
restrictions and limitations which have been used on other FTP sites
to comply with export control requirements with respect to other
encryption software such as Kerberos and software from RSA Data
Security, Inc. I urge you not to do anything which would weaken those
controls or facilitate any improper export of ViaCrypt PGP or the
freeware PGP versions.
Some foreign governments impose serious penalties on anyone inside
their country for merely using encrypted communications. In some
countries they might even shoot you for that. But if you live in
that kind of country, perhaps you need PGP even more.
Philip Zimmermann's Legal Situation
-----------------------------------
At the time of this writing, I am the target of a US Customs criminal
investigation in the Northern District of California. My defense
attorney has been told by the Assistant US Attorney that the area of
law of interest to the investigation has to do with the export
controls on encryption software. The federal mandatory sentencing
guidelines for this offense are 41 to 51 months in a federal prison.
US Customs appears to be taking the position that electronic domestic
publication of encryption software is the same as exporting it. The
prosecutor has issued a number of federal grand jury subpoenas. It
may be months before a decision is reached on whether to seek
indictment. This situation may change at any time, so this
description may be out of date by the time you read it. Watch the
news for further developments. If I am indicted and this goes to
trial, it will be a major test case.
I have a legal defense fund set up for this case. So far, no other
organization is doing the fundraising for me, so I am depending on
people like you to contribute directly to this cause. The fund is run
by my lead defense attorney, Phil Dubois, here in Boulder. Please
send your contributions to:
Philip Dubois
2305 Broadway
Boulder, Colorado 80304 USA
Phone 303-444-3885
E-mail: dubois@csn.org
You can also phone in your donation and put it on Mastercard or Visa.
If you want to be really cool, you can use Internet E-mail to send in
your contribution, encrypting your message with PGP so that no one
can intercept your credit card number. Include in your E-mail
message your Mastercard or Visa number, expiration date, name on the
card, and amount of donation. Then sign it with your own key and
encrypt it with Phil Dubois's public key (his key is included in the
standard PGP distribution package, in the "keys.asc" file). Put a
note on the subject line that this is a donation to my legal defense
fund, so that Mr. Dubois will decrypt it promptly. Please don't send
a lot of casual encrypted email to him -- I'd rather he use his
valuable time to work on my case.
If you want to read some press stories about this case, see the
following references:
1) William Bulkeley, "Cipher Probe", Wall Street Journal, Thursday
April 28th, 1994, front page.
2) John Cary, "Spy vs. Computer Nerd: The Fight Over Data
Security", Business Week, 4 Oct 1993, page 43.
3) Jon Erickson, "Cryptography Fires Up the Feds", Dr. Dobb's
Journal, December 1993, page 6.
4) John Markoff, "Federal Inquiry on Software Examines Privacy
Programs", New York Times, Tuesday 21 Sep 1993, page C1.
5) Kurt Kleiner, "Punks and Privacy", Mother Jones Magazine,
Jan/Feb 1994, page 17.
6) John Markoff, "Cyberspace Under Lock and Key", New York Times,
Sunday 13 Feb 1994.
7) Philip Elmer-DeWitt, "Who Should Keep the Keys", Time, 14 Mar
1994, page 90.
Where to Get a Commercial Version of PGP
----------------------------------------
To get a fully licensed version of PGP for use in the USA or Canada,
contact:
ViaCrypt
2104 West Peoria Avenue
Phoenix, Arizona 85029
Phone: 602-944-0773
Fax: 602-943-2601
E-mail: viacrypt@acm.org
ViaCrypt has a version of PGP for MSDOS, and a number of Unix
platforms. Other versions are under development. If you have a need
to use PGP in a commercial or Government setting, and ViaCrypt has a
version of PGP for your hardware platform, you should get ViaCrypt
PGP.
ViaCrypt has obtained all the necessary licenses from PKP, Ascom-Tech
AG, and Philip Zimmermann to sell PGP for use in commercial or
Government environments. ViaCrypt PGP is every bit as secure as the
freeware PGP, and is entirely compatible in both directions with the
freeware version of PGP. ViaCrypt PGP is the perfect way to get a
fully licensed version of PGP into your corporate environment.
Reporting PGP Bugs
------------------
Bugs in PGP should be reported via E-mail to MIT, the official
distribution site of PGP. The E-mail address for bug reports is
pgp-bugs@mit.edu.
Computer-Related Political Groups
=================================
PGP is a very political piece of software. It seems appropriate to
mention here some computer-related activist groups. Full details on
these groups, and how to join them, is provided in a separate
document file in the PGP release package.
The Electronic Frontier Foundation (EFF) was founded in 1990 to
assure freedom of expression in digital media, with a particular
emphasis on applying the principles embodied in the US Constitution
and the Bill of Rights to computer-based communication. They can be
reached in Washington DC, at (202) 347-5400. Internet E-mail address:
eff@eff.org.
Computer Professionals For Social Responsibility (CPSR) empowers
computer professionals and computer users to advocate for the
responsible use of information technology and empowers all who use
computer technology to participate in public policy debates on the
impacts of computers on society. They can be reached at:
415-322-3778 in Palo Alto, E-mail address cpsr@csli.stanford.edu.
The League for Programming Freedom (LPF) is a grass-roots organization
of professors, students, businessmen, programmers and users dedicated
to bringing back the freedom to write programs. They regard patents
on computer algorithms as harmful to the US software industry. They
can be reached at (617) 433-7071. E-mail address: lpf@uunet.uu.net.
For more details on these groups, see the accompanying document in
the PGP release package.
Recommended Introductory Readings
=================================
1) Bruce Schneier, "Applied Cryptography: Protocols, Algorithms, and
Source Code in C", John Wiley & Sons, 1993
(This book is a watershed work on the subject.)
2) Dorothy Denning, "Cryptography and Data Security", Addison-Wesley,
Reading, MA 1982
3) Dorothy Denning, "Protecting Public Keys and Signature Keys",
IEEE Computer, Feb 1983
4) Martin E. Hellman, "The Mathematics of Public-Key Cryptography,"
Scientific American, Aug 1979
5) Steven Levy, "Crypto Rebels", WIRED, May/Jun 1993, page 54.
(This is a "must-read" article on PGP and other related topics.)
Other Readings
==============
6) Ronald Rivest, "The MD5 Message Digest Algorithm", MIT Laboratory
for Computer Science, 1991
7) Xuejia Lai, "On the Design and Security of Block Ciphers",
ETH Series on Information Processing (Ed. J. L. Massey),
Vol. 1, Hartung-Gorre Verlag, Konstanz, Switzerland, 1992
8) Philip Zimmermann, "A Proposed Standard Format for RSA
Cryptosystems", Advances in Computer Security, Vol III, edited by
Rein Turn, Artech House, 1988
9) Paul Wallich, "Electronic Envelopes", Scientific American, Feb
1993, page 30. (This is an article on PGP)
10) William Bulkeley, "Cipher Probe", Wall Street Journal, 28 April
1994, front page. (This is an article on PGP and Zimmermann)
To Contact the Author
=====================
Philip Zimmermann may be reached at:
Boulder Software Engineering
3021 Eleventh Street
Boulder, Colorado 80304 USA
Internet: prz@acm.org
Phone 303-541-0140 (voice) (10:00am - 7:00pm Mountain Time)
Fax line available, if you arrange it via voice line.
Appendix A: Where to Get PGP
=============================
The following describes how to get the freeware public key
cryptographic software PGP (Pretty Good Privacy) from an anonymous
FTP site on Internet, or from other sources.
PGP has sophisticated key management, an RSA/conventional hybrid
encryption scheme, message digests for digital signatures, data
compression before encryption, and good ergonomic design. PGP is
well featured and fast, and has excellent user documentation. Source
code is free.
The Massachusetts Institute of Technology is the distributor of PGP
version 2.6, for distribution in the USA only. It is available from
"net-dist.mit.edu," a controlled FTP site that has restrictions and
limitations, similar to those used by RSA Data Security, Inc., to comply
with export control requirements. The software resides in the directory
/pub/PGP.
A reminder: Set mode to binary or image when doing an FTP transfer.
And when doing a kermit download to your PC, specify 8-bit binary
mode at both ends.
There are two compressed archive files in the standard release, with
the file name derived from the release version number. For PGP
version 2.6, you must get pgp26.zip which contains the MSDOS binary
executable and the PGP User's Guide, and you can optionally get
pgp26src.zip which contains all the source code. These files can be
decompressed with the MSDOS shareware archive decompression utility
PKUNZIP.EXE, version 1.10 or later. For Unix users who lack an
implementation of UNZIP, the source code can also be found in the
compressed tar file pgp26src.tar.Z.
If you don't have any local BBS phone numbers handy, here is a BBS
you might try. The Catacombs BBS, operated by Mike Johnson in
Longmont, Colorado, has PGP available for download by people in the US
or Canada only. The BBS phone number is 303-772-1062. Mike
Johnson's voice phone number is 303 772-1773, and his email address
is mpj@csn.org. Mike also has PGP available on an Internet FTP site
for users in the US or Canada only; the site name is csn.org, in
directory /mpj/, and you must read the README.MPJ file to get it.
To get a fully licensed version of PGP for use in the USA or Canada,
contact ViaCrypt in Phoenix, Arizona. Their phone number is
602-944-0773. ViaCrypt has obtained all the necessary licenses from
PKP, Ascom-Tech AG, and Philip Zimmermann to sell PGP for use in
commercial or Government environments. ViaCrypt PGP is every bit as
secure as the freeware PGP, and is entirely compatible in both
directions with the freeware version of PGP. ViaCrypt PGP is the
perfect way to get a fully licensed version of PGP into your
corporate or Government environment.
Source and binary distributions of PGP are available from the Canadian
Broadcasting Corporation library, which is open to the public. It has
branches in Toronto, Montreal, and Vancouver. Contact Max Allen, at
+1 416 205-6017 if you have questions.
Here are a few people and their email addresses or phone numbers you
can contact in some countries to get information on local PGP
availability for versions earlier than 2.5:
Peter Gutmann Hugh Kennedy
pgut1@cs.aukuni.ac.nz 70042.710@compuserve.com
New Zealand Germany
Branko Lankester Miguel Angel Gallardo
branko@hacktic.nl gallardo@batman.fi.upm.es
+31 2159 42242 (341) 474 38 09
The Netherlands Spain
Hugh Miller Colin Plumb
hmiller@lucpul.it.luc.edu colin@nyx.cs.du.edu
(312) 508-2727 Toronto, Ontario, Canada
USA
Jean-loup Gailly
jloup@chorus.fr
France