home *** CD-ROM | disk | FTP | other *** search
/ Hacker Chronicles 2 / HACKER2.BIN / 1094.2W93358A.TXT < prev    next >
Text File  |  1993-12-24  |  4KB  |  83 lines

  1.                     Guide to PGP Operations in a Secure Environment
  2.  
  3. The following document provides a series of notes and examples which are designed
  4. to help the PGP novice user to properly maintain and care for public keys in a
  5. secure environment using the PGP utility software.
  6.  
  7. Item     Activity              Operative Command     Results/Disposition
  8.   No.  
  9.        1 Install System                              Set DOS PATH command in
  10.                                                      AUTOEXEC.BAT so that DOS can
  11.                                                      always find PGP; Set the DOS
  12.  
  13.  
  14.                                                      ENV variable TZ=-3 (EST). Set
  15.                                                      the DOS Env. Variable PGPPATH
  16.                                                      to the drive and sub-directory
  17.                                                      where you have your keyrings.
  18.                                                      This will make PGP available
  19.                                                      all the time.
  20.  
  21.        2 REBOOT                Ctrl-Alt-Del          Required to make DOS Changes
  22.                                                      (Item 1) work.
  23.  
  24.        3 Generate Secret Key   PGP -kg               System will create public and
  25.                                                      private keyrings in
  26.                                                      subdirectory specified by
  27.                                                      PGPPATH as specified in (1)
  28.  
  29.        4 Create Public Key     PGP -kxa <user id>    This command will extract a
  30.                                <keyfile>             "Public Key" from your keyring
  31.                                                      and put it in <keyfile>.
  32.                                                      Specify the <user id> to be
  33.                                                      extracted.  To get ready to
  34.                                                      send out you public key: give
  35.                                                      your own user id. Save
  36.                                                      <keyfile>.
  37.  
  38.        5 Note: At this point you can send a message to someone and include your
  39.          Public Key.  After you have done that, then THEY will be able to send
  40.          you a PGP crypted message.
  41.  
  42.        6 Received Message      Ah Ha!                Save this message.  You will
  43.          containing Public                           need to process this using
  44.          Key for a remote                            PGP, shortly.
  45.          correspondent.
  46.  
  47. **************************************************************************************
  48.            ACTIVITY               EVENT              ACTION TAKEN BY PGP
  49. **************************************************************************************
  50.  
  51.        7 Add Public Key(s) to  PGP <filename>        PGP will add any key(s) found
  52.          your keyring                                in <filename> to your Keyring
  53.  
  54.                                New Key, without      PGP will ask if you want to
  55.                                authenticating        Authenticate these keys.  You
  56.                                signature(s)          would only do this if you have
  57.                                                      personnally received the key
  58.                                                      directly from a trusted
  59.                                                      person.
  60.  
  61.                                New Key, with  Known  ?? Does PGP Authenticate the k
  62.                                Authenticating
  63.                                Signatures
  64.  
  65.                                New Key, with a bad ??
  66.                                signature
  67.  
  68.                                New key with 1 good ??
  69.                                and 1 bad signature
  70.  
  71.                                Existing key, with    PGP will check the new key to
  72.                                no signature          be sure it matches the old key
  73.  
  74.                                New key matches       No action
  75.                                existing key
  76.  
  77.                                New key not same as   ??
  78.                                old key
  79.  
  80. **********************************************************************
  81.                    
  82. END
  83.