PGP, however, is based on a public key cryptography system, which means that it works quite differently. Instead of having one key that needs to be kept a secret, everyone has two different keys, only one of which is a secret. One key is called your private key and one key is called your public key. Your private key is secret, known only to you. Your public key you show to the world, you give it away to everyone. Then, when you want to send an encrypted message to someone you first encrypt it in their public key (which they've let you and anyone else see). Then you give them the encrypted message and they decrypt it using their own secret key, the key that only they know about. So for example if Matthew wants to send Stan an encrypted message Matthew first encrypts his message with Stan's public key and sends that encrypted message to Stan. Stan then uses his own private key to decrypt the message and can read what Matthew sent him.
add pgpat the athena prompt. You'll want to do this any time you want to read or send encrypted messages, but you only need to do it once per login session. To make yourself a set of pgp keys (a public and private key pair) type:
cd mkdir .pgp echo TMP = \"/var/tmp\" > $HOME/.pgp/config.txt fs sa .pgp system:anyuser none pgp -kgAfter that last command you'll be asked a number of questions.
pgp -kxa $USER $HOME/Public/plan cd $HOME/Public mv plan.asc plan ln -s $HOME/Public/plan $HOME/.planAnother option is to place your key on a pgp public key server. There is a popular one at http://pgp.ai.mit.edu. The instructions there should explain how to use it.
pgp -f smeorb | moreYou will be asked for your passphrase so your secret key can be used to decrypt the message. (Remember not to type your PGP password over an unencrypted connection).
If you receive the file as email and you use mh (inc, show, etc.), xmh, or exmh to read your email then you may view the message by typing:
show | pgp -f | moreIf you use emacs to read your mail there is a program called mailcrypt that you can use, but it is not covered in this version of this document.
finger kretch@monk.mit.edu > coppetishwhere you substitute their username for kretch.
Their public key can be added to your keyring by typing:
pgp -ka coppetishYou will be asked if you want to certify the key yourself. Answer "no" for now -- that's the default.
Now their key should be on your key ring. You can check the contents of your key ring by typing:
pgp -kv
Let's say you've added the key for Fred F. Sipb <sipbtest@mit.edu>. Now you may encrypt the file called hoffmannesque for Fred Sipb by typing:
pgp -ea hoffmannesque sipbtestand an encrypted version of the file will be stored in hoffmannesque.asc. For reasons described in the Athena security section you should compose the unencrypted text file on the local disk of the machine you're using and not in your AFS home directory. This means calling the file something like /var/tmp/message or /tmp/message but not /mit/user/message. The encrypted file you may store in your AFS home directory if you feel like keeping it. Do not forget to erase the unencrypted file you wrote on the local machine when you're done or others may be able to read it later!
If you wish to send the encrypted file in email you may place it in an emacs buffer with the C-x i command.
The MIT network is divided up into many subnets. Each of these subnets usually corresponds to a set of IP addresses that start with 18.xxx. For example all the addresses that start with 18.239 belong to the same subnet. These subnets are usually ethernet networks and because of the way ethernet is designed, any computer on an ethernet subnet can read the all the traffic on that subnet. This means that if I have a computer on the network in MacGregor I can read all the information that goes to or from any other computer on the MacGregor network.
Becuase many Athena services are run on servers on non-local subnets, lots of data that you use is sent across your local subnet so that it can get to you. For example, because the files in my home directory are stored on a server in building 37, they need to be sent across the MacGregor subnet for me to read them in my room at MacGregor.
Athena uses a system called Kerberos to provide security in a situation like this. Kerberos can make sure that the person who claims to be sending data is actually that person and it can also encrypt data so that it can not be read by a malicious user. Many applications however do not make use of the encryption that kerberos can provide. These include:
pgp -hand you can get help for key mangement commands by typing:
pgp -kThese are also good ways to find out about some of the other pgp features. You can also look at the pgp man page by typing:
man pgpand there are also books available on PGP. Additionally you can stop by the SIPB office (w20-557) to ask questions.