Here's a draft PGP FAQ for alt.security.pgp.  I'd better post this soon as I'm
getting buried in FAQ's via email...  
  
                        PGP Frequently Asked Questions  
                        ==============================  
                                (Draft version)  
  
    - What is PGP?  
    - Where can I get PGP?  
    - Where can I get/publish PGP keys?  
  
What is PGP?  
============  
  
In brief:  
  
PGP (Pretty Good Privacy) is a freeware RSA public-key encryption package for 
Unix, MSDOS, OS/2, the Amiga, the Atari ST, and VMS.  It protects E-mail and  
files, letting you communicate securely with people you've never met, with no 
secure channels needed for prior exchange of keys.  
  
PGP has sophisticated key management, an RSA/conventional-key hybrid  
encryption scheme, data authentication via digital signatures, and data  
compression before encryption.  The C source for PGP code is available for  
free use by anyone.  
  
In more detail:  
  
This note assumes you are familiar with PGP (Pretty Good Privacy), the  
freeware public key cryptographic software package.  
  
Philip Zimmermann is under threat of lawsuit from the RSA patent holders,  
Public Key Partners, if he distributes or updates PGP again.  Zimmermann has  
abided by that condition and has not distributed PGP since the threat was  
made.  So any enhancements for PGP have to be developed by other people,  
preferably outside the reach of US patent law.  The RSA patent does not apply 
outside the USA.  Accordingly, PGP Version 2.0 was developed by a team of  
software engineers in Europe and New Zealand, with design guidance from  
Philip Zimmermann.  It was released September 3 by Branko Lankester in  
Amsterdam and Peter Gutmann in New Zealand.  
  
The new version has many ergonomic improvements, much better key management,  
faster and better conventional cryptography, faster public key cryptography,  
and faster and better data compression.  It also has been ported to SPARC  
Unix, Ultrix, VAX/VMS, Commodore Amiga, Atari ST, OS/2, and of course it  
still runs on MSDOS.  
  
The RSA math functions are about 2.28 times as fast (as measured on an MSDOS  
system).  The new signature hashing algorithm is MD5.  The new compression  
routines are similar in functionality to those used in PKZIP, and were  
developed in C by a French team.  The new faster conventional cipher, called  
IDEA (International Data Encryption Algorithm), was developed at ETH in  
Zurich by James L. Massey and Xuejia Lai.  Preliminary evidence suggests that 
IDEA may be more resistant than the DES to Biham & Shamir's highly successful 
differential cryptanalysis attack.  Biham and Shamir have tried  
unsuccessfully to find any weaknesses in the IDEA cipher.  
  
The keys on the public keyring retain their certifying signatures while on  
the keyring, and can be automatically checked for tampering by PGP before  
using the keys.  They can be individually copied off the keyring along with  
their attached signature certificates, in ASCII form suitable for emailing.  
Each key may have several attached certifying signatures.  User ID's and  
passwords can be revised by the key owner.  When a user ID is modified for a  
key, new certifying signatures must be created for that key.  
  
The ASCII transport armor changed from uuencoded form to another ASCII  
radix-64 representation similar to that used by the Internet PEM standard.  
This makes PGP messages more resistant to mutilation by strange email  
gateways.  
  
The new PGP is more usable in batch mode, returning error result codes to the 
DOS shell.  It can also be used to some extent in a pipeline filter mode for  
Unix.  
  
There are too many ergonomic improvements to list here.  One example is a  
built-in Unix-style "more" function, to optionally display deciphered  
plaintext directly on your screen without writing any plaintext to disk.  
Also, all the PGP user messages and prompts can be displayed in German,  
Dutch, Spanish, French, Italian, and Russian.  
  
There are other improvements in the area of key management.  Zimmermann's new 
key management is even more uniquely suited to socially decentralized  
environments, rather than to monolithic corporate or government institutions. 
  
Where can I get PGP?  
====================  
  
  PGP is slowly becoming available on more and more sites worldwide.  If you  
can't find a copy locally, you could try the following:  
  
PGP via FidoNet  
---------------  
  
  Due to FidoNet's distributed nature, there isn't really one location where  
everyone can get a copy.  However it is being distributed extensively over  
the net - if you can't get a copy locally, bug your sysop to bring one in!  
  
PGP by ftp  
----------  
  
  PGP is available for ftp from the following sites:  
  
    garbo.uwasa.fi (128.214.87.1) /pub/pc/encryption    (DOS and OS/2)  
                                  /pub/unix/encryption  
                                    
    kauri.vuw.ac.nz (130.195.11.3) /pub/ms-dos/Encryption (all versions)  
                                   Note: NZ users only.  
                                     
    ghost.dsi.unimi.it (???)       /pub/crypt  
  
    ftp.uni-kl.de                  /pub/atari/incoming  
  
Remember to chose *binary* mode when retrieving the files!  
  
PGP via Compuserve  
------------------  
  
  PGP is available in the the Compuserve IBMSYS forum, just type "go ibmsys" t
get there.  Then when you get the following:  
  
    IBM Sys/Utilities Forum Menu  
  
     1 INSTRUCTIONS  
  
     2 MESSAGES  
     3 LIBRARIES (Files)  
     4 CONFERENCING (0 participating)  
  
     5 ANNOUNCEMENTS from sysop  
     6 MEMBER directory  
     7 OPTIONS for this forum  
  
Choose 3, the files area.  This will give the following menu:  
  
    IBM Sys/Utilities ForumLibraries Menu  
  
     0 General [S]  
     1 DOS Utilities [S]  
     2 OS/2 Utilities [S]  
     3 General Utils [S]  
     4 Multitasking [S]  
     5 DOS Shells/Mgrs [S]  
     6 File Utilities [S]       <- PGP is in here  
     7 Desktop Utils [S]  
     8 Demos [S]  
     9 Disk Library [S]  
  
Choose 6, the file utlities area.  This will bring up the following menu:  
  
    IBM Sys/Utilities Forum Library 6  
  
    File Utilities [S]  
  
     1 BROWSE Files  
     2 DIRECTORY of Files  
  
     3 UPLOAD a File (FREE)  
     4 DOWNLOAD a file to your Computer  
  
     5 LIBRARIES  
  
>From here you can either browse the files (use the keyword 'PGP'), or  
download them.  The source code is PGP20S.ZIP, the MSDOS executable is  
PGP20.ZIP.  
  
PGP via BIX  
-----------  
  
  PGP is available in the Security/listings area.  If someone could provide  
more details on this I'd be grateful.  
  
Where can I get/publish PGP keys?  
=================================  
  
  The following is the README file from a PGP keyserver run by Felipe  
Rodriquez  at utopia.hacktic.nl:  
  
----------------------------------------------------------------------------- 
Beware of unsigned keys, these could be forgeries from an attacker wanting  
access to your information. Always be sure your keys are certified by several 
people.  
----------------------------------------------------------------------------- 
  
                      PGP-SERVER POLICIES  
  
You can send your PGP public-keys to pgp-keys@utopia.hacktic.nl  
  
Your key will be added to our public keyring.  In order to certify your key,  
so that other people know that the key is actually yours, make sure it is  
signed by other people before sending it in.  It is advisable to have your  
key signed by as many people as possible, before sending your key to our  
key-server.  Make sure that the people that sign your key are 100% sure of  
the fact that the key is yours.  
  
Keys will only be signed by me if I'm 100% sure about the sender of the key.  
This requires a voice validation of your key's ASCII-armor.  I will NOT sign  
ANY keys that I don't trust 100%.  E-Mail is subject to many types of forgery 
and is not a secure channel for verification.  Verification can only be done  
by you reading to me some indicated characters in your keys ASCII armor,  
either over the phone, or by visiting me personally.  
  
For a pgp-server to work, it is absolutely crucial to keep the above stated  
points in mind.  Security is your responsability, if you want other persons  
to trust your key, see to it that it is signed by a lot of people that are  
competent in key-managment.  
  
If you don't want your key to be signed then that's your responsibility.  
You'd make it easy for any attacker to forge a key that is supposed to be  
yours.  All users of the hacktic-PGP server are advised _not_ to use any  
unsigned keys.  
  
        Felipe Rodriquez, key-manager@utopia.hacktic.nl  
                          nonsenso@utopia.hacktic.nl  
--  
    pgut1@cs.aukuni.ac.nz || peterg@kcbbs.gen.nz || peter@nacjack.gen.nz  
                           (In order of preference)
------------------------------------------------------------------------------