Dec 072017
 
Current freeware release of Phil Zimmerman's Pretty Good Privacy. Secure encryption, authentification for e-mail and files. Freeware for non-commercial use, comparible with commercial version. NOT FOR EXPORT.
File PGP262.ZIP from The Programmer’s Corner in
Category Recently Uploaded Files
Current freeware release of Phil Zimmerman’s Pretty Good Privacy. Secure encryption, authentification for e-mail and files. Freeware for non-commercial use, comparible with commercial version. NOT FOR EXPORT.
File Name File Size Zip Size Zip Type
PGP262I.ASC 293 247 deflated
PGP262I.ZIP 275146 272414 deflated
SETUP.DOC 16253 6690 deflated
TPCREAD.ME 199 165 deflated

Download File PGP262.ZIP Here

Contents of the SETUP.DOC file


-----BEGIN PGP SIGNED MESSAGE-----

Pretty Good Privacy Version 2.6.2
Installation Guide

by Perry Metzger, Colin Plumb, Derek Atkins,
Jeffrey I. Schiller and others

How to Install PGP
==================

The first question is, what platform are you on?

The base PGP 2.6.2 distribution runs on several varieties of Unix,
MS-DOS, OS/2 and VAX VMS (though we haven't compiled it ourselves there
yet). Ports can be expected shortly to the Atari, Amiga, and possibly
other systems. Naturally, installation instructions differ depending on
your hardware. Separate instructions are provided here for MSDOS and
Unix.

See the section below for your system's particular installation
instructions.

If you do not have any of these systems, you will either have to port
the sources to your machine or find someone who has already done so.

########################################################################

For MSDOS Installation
======================

PGP is distributed in a compressed archive format, which keeps all the
relevant files grouped together, and also saves disk space and
transmission time.

The current version, 2.6.2, is archived with the ZIP utility, and the
PGP executable binary release system is in a file named PGP262.ZIP.
This contains the executable program, the user documentation, the RSAREF
license, and a few keys and signatures. There is also a second file
available containing the C and assembly source code, called PGP262S.ZIP.
If you are a programmer, this may be of interest to you. This should be
available from the same source from which you got PGP262.ZIP. If not,
and you want it, see the Licensing and Distribution section of the PGP
User's Guide. There is also an archive PGP262DC.ZIP, which is just the
documentation, if you just want to see a description of PGP or have
misplaced the manual.

You will need PKUNZIP version 2.04g or later to uncompress and split the
PGP262.ZIP archive file into individual files. PKUNZIP is shareware and
is widely available on MSDOS machines.

Each of the ZIP files is actually two nested zip files. Inside
PGP262.ZIP is PGP262I.ZIP, which contains most of the files, and
PGP262I.ASC, which is a PGP signature on PGP262I.ASC. If you have a
previous version of PGP, you can use it to check the signature to see
that the distribution has not been tampered with. Since a PGP signature
protects every last bit in a file from change, a BBS adding an
advertising blurb or recompressing the archive would cause PGP to report
tampering. Thus, only the inner ZIP file is signed.

Create a directory for the PGP files. For this description, let's use
the directory C:\PGP26 as an example, but you should substitute your own
disk and directory name if you use something different. Type these
commands to make the new directory:

c:
md \pgp26

cd \pgp26

Uncompress the distribution file PGP262.ZIP to the directory. For this
example, we will assume the file is on floppy drive A - if not,
substitute your own file location.

pkunzip -d a:pgp262

This will create the file PGP262I.ZIP and PGP262I.ASC. Unzip
PGP262I.ZIP with the command:

pkunzip -d pgp262i

If you omit the -d flag, all the files in the doc subdirectory will be
deposited in the pgp directory. This merely causes clutter.

Keep the PGP262I.ZIP file around. Once you have PGP working you can use
PGP262I.ASC to verify the digital signature on PGP262I.ZIP. It should
come from Jeffrey I. Schiller (whose key is included in keys.asc).


Setting the Environment
-----------------------

Next, you can set an MSDOS "environment variable" to let PGP know where
to find its special files, in case you use it from other than the
default PGP directory. Use your favorite text editor to add the
following lines to your AUTOEXEC.BAT file (usually on your C: drive):

SET PGPPATH=C:\PGP26
SET PATH=C:\PGP26;%PATH%

Substitute your own directory name if different from "C:\PGP26".

The CONFIG.TXT file contains various user-defined preferences for PGP.
For example, you can specify which of your secret keys to implicitly
select for creating digital signatures. See the manual for details on
how to fine-tune your PGP configuration file. The default values in
that file are good enough to get you started.

Another environmental variable you should set in MSDOS is "TZ", which
tells MSDOS what time zone you are in, which helps PGP create GMT
timestamps for its keys and signatures. If you properly define TZ in
AUTOEXEC.BAT, then MSDOS gives you good GMT timestamps, and will handle
daylight savings time adjustments for you. Here are some sample lines
to insert into AUTOEXEC.BAT, depending on your time zone:

For Los Angeles: SET TZ=PST8PDT
For Denver: SET TZ=MST7MDT
For Arizona: SET TZ=MST7
(Arizona never uses daylight savings time)
For Chicago: SET TZ=CST6CDT
For New York: SET TZ=EST5EDT
For London: SET TZ=GMT0BST
For Amsterdam: SET TZ=MET-1DST
For Moscow: SET TZ=MSK-3MSD
For Aukland: SET TZ=NZT-13

Now reboot your system to run AUTOEXEC.BAT, which will set up PGPPATH
and TZ for you.

Generating Your First Key
-------------------------

One of the first things you will want to do to really use PGP (other
than to test itself) is to generate your own key. This is described in
more detail in the "RSA Key Generation" section of the PGP User's Guide.
Remember that your key becomes something like your written signature or
your bank card code number or even a house key - keep it secret and keep
it secure! Use a long, unguessable pass phrase and remember it. Right
after you generate a key, put it on your key rings and copy your secret
keyring (SECRING.PGP) to a blank floppy and write protect the floppy.

If you are a first-time user of PGP, it is a good idea to generate a
short test key, with a short passphrase, to play around with PGP for a
little bit and see how it works, or even more than one so you can
pretend to be sending messages between two different people. Since you
won't be guarding any secrets, this can be short and have a simple pass
phrase. But when you generate your permanent key, that you intend to
give to others so they can send secure messages to you, be much more
careful.

After you generate your own key pair, you can add a few more public keys
to your key ring. A collection of sample public keys is provided with
the release in the file KEYS.ASC. To add them to your public key ring,
see the PGP User's Guide, in the section on adding keys to your key
ring.

Verifying the PGP distribution
------------------------------

Now that you have PGP up and running and have read in the KEYS.ASC file
you can now verify the integrity of the original distribution. To do
this type:

pgp pgp262i.asc

It will inform you that pgp262i.asc contains a signature but no text.
It may then ask you to provide the name of the file that it applies to.
Type in "pgp262i.zip", the internal ZIP file.

PGP should tell you that it has a Good Signature from:

Jeffrey I. Schiller

It will also tell you that it doesn't "trust" my ([email protected]) key.
This is because PGP does not *know* that the enclosed key really belongs
to me. Don't worry about this now. Read the section "How to Protect
Public Keys from Tampering" in Volume 1 of the PGP manual.

READ THE FINE MANUAL (RTFM)
---------------------------

READ THE DOCUMENTATION. At least read Volume I of the PGP User's Guide.
Cryptography software is easy to misuse, and if you don't use it
properly much of the security you could gain by using it will be lost!
You might also be unfamiliar with the concepts behind public key
cryptography; the manual explains these ideas. Even if you are already
familiar with public key cryptography, it is important that you
understand the various security issues associated with using PGP. PGP
may be an unpickable lock, but you have to install it in the door
properly or it won't provide security.

########################################################################
For UNIX:

You likely will have to compile PGP for your system; to do this, first
make sure the unpacked files are in the correct unix textfile format
(the files in pgp262s.zip are in MSDOS CRLF format, so for Unix you must
unpack with "unzip -a"; the tar files pgp262s.tar.Z and pgp262s.tar.gz
use normal Unix line feed conventions).

You will need the RSAREF package written by RSA Data Security. It is
included with the current PGP distribution from MIT. Use this version
as it has been edited for the larger key sizes needed by PGP 2.6.2 as
well as to improve performance.

When you untar pgp262s.tar (either compression format) you will find
that it contains 5 files. pgp262si.tar contains all non-binary files for
PGP including all source code. This tar archive has been created
assuming that you will untar it directly into your PGP 2.6.2 "build"
directory. pgp262si.asc is a detached digital signature of pgp262si.tar
(which you can verify after you have PGP operating, see the section
above titled "Verifying the PGP Distribution"). rsaref.tar contains the
source code for the RSAREF distribution. You should also untar it from
your PGP "build" directory. All RSAREF software will automatically go
into an "rsaref" subdirectory.

cd to rsaref/install/unix and invoke the "make" command there to build
the RSAREF software library.

RSAREF tries to build with the GNU CC compiler by default. If you do
not have the GCC compiler for your platform, you will have to run make
with an option to use the normal CC compiler:

make CC=cc

If your native compiler does not understand prototypes, then this will
fail as well, and you will have to set the PROTOTYPES to 0. You can do
this by running make in this manner:

make CC=cc PROTOTYPES=0

This will try to create an rsaref.a library in the current directory.
One last problem you may have is the lack of a ranlib program on your
platform. You can fix this by adding this to your make line:

RANLIB=true

After RSAREF is successfully built, cd to src (cd ../../../src from the
RSAREF install/unix directory) and invoke "make" there. You will have
to specify your machine platform (make without arguments will give you a
list of choices).

If you don't have an ANSI C compiler you will need the unproto package
written by Wietse Venema. unproto was posted on comp.sources.misc and
can be obtained from the various sites that archive this newsgroup
(volume 23: v23i012 and v23i013) or ftp.win.tue.nl file:
/pub/programming/unproto4.shar.Z Read the file README in the unproto
distribution for instructions on how to use unproto.

If your system doesn't have a target in the makefile you will have to
edit the makefile, make sure you compile for the correct byte order for
your system: define HIGHFIRST if your system is big-endian (eg.
Motorola 68030). There are also some platform-specific parameters in
the include file "platform.h". Some platforms may have to modify this
file.

If you successfully create a target rule for a new platform, please send
the patches to [email protected], so it can be added to the next release.

Note: PGP requires the function memmove. Not all machines have this in
the standard C library. There is an implementation of memmove included
with this distribution. If you find that your platform requires
memmove, but the makefile rule for your platform does not include
memmove (look at the sun4gcc or sun386i rules for an example of how to
include it), please send mail to [email protected], so we can correct the
problem.

If you have any problems, bugs, patches, etc., please send mail to
[email protected]!

If all goes well, you will end up with an executable file called "pgp".

Before you install pgp, run these tests:
(do not create your real public key yet, this is just for testing pgp)

- create a public/secret key pair (enter "test" as userid/password):
pgp -kg

- add the keys from the file "keys.asc" to the public keyring:
pgp -ka keys.asc
pgp will ask if you want to sign the keys you are adding, answer yes
for at least one key.

- do a keyring check:
pgp -kc

- encrypt pgpdoc1.txt:
pgp -e pgpdoc1.txt test -o testfile.pgp

- decrypt this file:
pgp testfile.pgp

this should produce the file "testfile" compare this file with
pgpdoc1.txt

If everything went well, install pgp in a bin directory.

Place the documentation, pgpdoc1.txt and pgpdoc2.txt somewhere where you
can reasonably read it. The software looks for it when running
(especially generating keys), so someplace reasonably obvious would be
good. "pgp -kg" will give you full details if it can't find the
manuals.

Place the man page (pgp.1) in an appropriate spot. If you don't know
anything about how man pages work, you can make the man page look human
readable yourself by typing "nroff -man pgp.1 >pgp.man" and reading
"pgp.man".

Create a subdirectory somewhere in your home directory hierarchy to hold
your public and private key rings and anything else pgp might need (like
the language.txt file). The default name PGP assumes is ~/.pgp. If you
want to use a different name, you must set the environment variable
"PGPPATH" to point to this place before you use the system.

> IMPORTANT: This directory cannot be shared! It will contain your <
> personal private keys! <

If you are installing PGP for yourself, copy the files "language.txt",
"config.txt", and the ".hlp" files from the distribution into this
subdirectory.

If you are installing PGP system-wide, the directory to use is
/usr/local/lib/pgp for the config, language and help files. This can be
changed in fileio.h when compiling. It's the value of PGP_SYSTEM_DIR.

Tell PGP the character set and language you wish to use in the
config.txt file. If you have a terminal that only displays 7-bit ASCII,
use "charset=ascii" to display an approximation (accents are omitted) of
extended characters.

>> IMPORTANT: Please read the sections in the man page and manual <<
>> about vulnerabilities before using this software on a multi- <<
>> user machine! <<

Now, if you haven't done so yet, GO READ THE MANUAL.

########################################################################
For VMS:

PGP/VMS Version 2.6.2
---------------------

***THIS MAY OR MAY NOT WORK***.

The pgp26/vmsbuild contains support files for building a VMS version of
PGP 2.6.2. We at MIT have not tested this code out, but it should work
without too much effort. See the file: vmsbuild/000read.me.

In particular, PGP needs to be linked with the RSAREF library.
David North has provided a build file "vmsbuild/rsabuild.com" that
should help in building RSAREF.

If you can figure out how to compile it, it SHOULD work. One change is
that PGP can now look for support files in a system-wide directory. The
default (PGP_SYSTEM_DIR, defined in fileio.h) is PGP$LIBRARY:, but you
can change that if you like.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBLqmXwsUtR20Nv5BtAQG+rQP+KBJzh22axMqNymQtN55iU+znyJwnaTge
buI7mpZnjUAYBZvOHhxVtUg/5v4PgDISrDnTkne6EZdDNEH5nP9AB8YDOChourKg
drUlhn7NsEyToqDF42rX53kq0kc8P7CWilQvTfti6i8bAGWLAN9dwdq0iwFxRz8I
G8Cql4kIbhA=
=0JzK
-----END PGP SIGNATURE-----


 December 7, 2017  Add comments

Leave a Reply