Disastry's 2.6.3ia-multi PageJanis Jagars (known to the PGP community as "Disastry") perished on October 31, 2002 while on vacation in Nepal. You can read an obituary by Len Sassaman here. As Disastry's original page (http://disastry.dhs.org/pgp/263multi.htm) has disappeared, I have put together this page in order to make available PGP 2.6.3ia-multi06, the last version of PGP 2.6.3 that Disastry built. Where possible, I have also included links to the other files that were available from Disastry's 2.6.3ia-multi page (in some cases, unfortunately, I haven't been able to find alternate download locations for those files). Those familiar with Disastry's page will notice that I have used much of his original HTML, but have stripped his PGP clear signature for the web page itself. Disastry's detached signatures for the PGP 2.6.3ia-multi files are included within the .ZIP archives themselves. You can download Disastry's PGP keys as ASCII armored (.ASC) files here:
You can also find Disastry's keys on the keyservers with a search. A few of Disastry's other pages are available from this web site: If you know of places on the Net from which Disastry's other files can be downloaded, please feel free to contact me: |
PGP version 2.6.3ia-multi06
1. PGP 2.6.3ia-multi06 is based on 2.6.3(i)a and can use IDEA, CAST5, Blowfish, Twofish, AES(Rijndael) and 3DES ciphers for encryption. It is compatible with PGP 2.6 (when using IDEA),
To make PGP version that is completely free of patented algorithms (IDEA) define DISABLE_IDEA Disabling IDEA cipher will make it incompatible with other PGP 2.6 versions. To change default cipher add one of following lines in file config.txt:
There is also command line options for selecting cipher:
Command line option will override cipher defined in config.txt. Cipher only needs to be selected when encrypting. When decrypting PGP will automatically find what cipher is used. 2. PGP 2.6.3ia-multi06 can use MD5, SHA1, RIPEMD160 and SHA2 (SHA256/384/512)
message digest algorithms for signing.
It is compatible with PGP 2.6 (when using MD5),
To change default message digest algorithm add one of following lines in
file config.txt:
There is also command line options for selecting message digest algorithm:
Command line option will override cipher defined in config.txt. Message digest algorithm only needs to be selected when signing. When verifying signature PGP will automatically find what message digest algorithm is used. 3. This PGP version also supports RSA keys up to 8192 bit.
4. Unlike other PGP 2.6.x version this version will not import v4 signatures made by newer PGP versions into it's keyring. This means that RSA keys signed by DSS/DH keys can be imported and used. DSS/DH keys, DSS v3 signatures and RSA v4 keys also will not be imported. 5. This version supports key expiration time. It allows to set key expiration time (whe generating keys) and shows key expiration time. It also shows signature timetamps. 6. Allows to change "Version: " line. If you don't like that it displays version "PGP 2.6.3ia-multi06"
you can put this line in the config.txt file:
7. Allows to calculate file hash. Now there are -g option that allows to calculate file hash:
8. Allows to hide recipients KeyID and display 64 bit KeyID. With "+throw_keyid" option PGP does not put KeyID into encrypted packets. This option hides the receiver of the message and makes traffic analysis harder. There is also "+random_keyid" option. It works just like "+throw_keyid" but the KeyID is replaced with random value instead of all zeros. There is also "+fake_keyid" option. It works just like "+throw_keyid" but the KeyID is replaced with user selected KeyID instead of all zeros. There is also I added "+long_keyid" option. When it is used pgp displays 64 bit keyids. These options can also be used in config.txt file (without leading "+"). 9. This version can be used everywhere in the world (well.. maybe except some really bad countries) and outside it (orbital stations, Mars bases...) When compiling do not define USA, even if you are in USA.
RSA patent is expired, so there is no need to use RSAREF.
10. PGP 2.6.3ia-multi06 (supports IDEA, CAST5, Blowfish, Twofish, AES(Rijndael), 3DES, MD5, SHA1, RIPEMD160, SHA2(SHA256/384/512)):
Old versions: PGP 2.6.3ia-multi05a (supports IDEA, CAST5, Blowfish, Twofish, AES(Rijndael), 3DES, MD5, SHA1, RIPEMD160, SHA2(SHA256/384/512)):
PGP 2.6.3ia-multi05 (supports IDEA, CAST5, Blowfish, Twofish, AES(Rijndael), 3DES, MD5, SHA1, RIPEMD160, SHA2(SHA256/384/512)):
PGP 2.6.3ia-multi04 (supports IDEA, CAST5, Blowfish, Twofish, AES(Rijndael), 3DES, MD5, SHA1, RIPEMD160):
PGP 2.6.3ia-multi03 (supports IDEA, CAST5, Blowfish, Twofish, AES(Rijndael), 3DES, MD5, SHA1, RIPEMD160):
PGP 2.6.3ia-multi02 (supports IDEA, CAST5, Blowfish, Twofish, AES(Rijndael), 3DES, MD5, SHA1):
PGP 2.6.3ia-multi (supports IDEA, CAST5, Blowfish, AES128(Rijndael), MD5, SHA1):
Really old versions: PGP 2.6.3ia-cb (supports IDEA, CAST5, Blowfish, MD5):
PGP 2.6.3ia-c (supports IDEA, CAST5, MD5):
Original: PGP 2.6.3ia:
My PGP keys:
|
since 29.01.01
(note: updated & revised 25.03.03)