McAfee MEJCAE-AM-DA Product Guide - Page 105

RANDOM-DEVICE, Default Value, RANDSEED, Notes, REVERSE, RSAVER

Page 105 highlights

Using the Configuration File Learning about the configuration file RANDOM-DEVICE (UNIX only.) Identifies the system entropy pool, /dev/random. E-Business Server tries to open this device to acquire entropy, and if that fails, will try to acquire entropy from user keystrokes. Default Value RANDOM-DEVICE = /dev/random RANDSEED The random number seed file, randseed.rnd, is used to generate session keys. You may want to keep your random number seed file in a more secure directory or device (this file generally resides in the directory specified by your PGPPATH environmental variable). Use the RANDSEED parameter to identify the full path and filename for your random seed file. Default Value Unix RANDSEED = "/randseed.rnd" Windows NT RANDSEED = "\Profiles\All Users\Application Data\Network Associates\pgp" Windows 2000 RANDSEED = "\Application Data\Network Associates\pgp\randseed.rnd" Notes The , and portions of the paths must be replaced with the value of the current environment variables of the same names. REVERSE When set to on, the REVERSE parameter reverses the sorting order set by the SORT parameter during --key-list displays. Default Value REVERSE = off RSAVER The RSAVER parameter has been deprecated. Previously, this option specified the type of RSA key you could generate. In the current version, you can create a key of any key type (DSS, RSAv4 or RSA Legacy) during key generation. Use of this setting in the configuration file or as a +OPTION is deprecated. SDA is only supported for compatibility purposes.Creating Self-Decrypting Archives (SDAs) on page 63Default Value SECRING You may want to keep your secret keyring in a directory separate from your E-Business Server configuration file (that is, the directory specified by your PGPPATH environmental variable or the PGPPATH parameter). Use the SECRING parameter to identify the full path and filename for your secret keyring. Default Value Unix SECRING = "/secring.skr" Windows NT SECRING = "\Personal\pgp\secring.skr" Windows 2000 SECRING = "\My Documents\pgp\secring.skr" 103 E-Business Server™ 8.6 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

103
E-Business Server
8.6
Product Guide
Using the Configuration File
Learning about the configuration file
RANDOM-DEVICE
(UNIX only.) Identifies the system entropy pool,
/dev/random
. E-Business Server tries to open this device to
acquire entropy, and if that fails, will try to acquire entropy from user keystrokes.
Default Value
RANDOM-DEVICE = /dev/random
RANDSEED
The random number seed file,
randseed.rnd
, is used to generate session keys. You may want to keep your
random number seed file in a more secure directory or device (this file generally resides in the directory
specified by your
PGPPATH
environmental variable).
Use the
RANDSEED
parameter to identify the full path and filename for your random seed file.
Default Value
Unix
RANDSEED = “<PGPPATH>/randseed.rnd”
Windows NT
RANDSEED = “<SYSTEMROOT>\Profiles\All Users\Application Data\Network Associates\pgp”
Windows 2000
RANDSEED = “<ALLUSERSPROFILE>\Application Data\Network Associates\pgp\randseed.rnd”
Notes
The
<PGPPATH>
,
<ALLUSERSPROFILE>
and
<SYSTEMROOT>
portions of the paths must be replaced with the value of
the current environment variables of the same names.
REVERSE
When set to
on
, the
REVERSE
parameter reverses the sorting order set by the
SORT
parameter during
--key-list
displays.
Default Value
REVERSE = off
RSAVER
The
RSAVER
parameter has been deprecated. Previously, this option specified the type of RSA key you could
generate. In the current version, you can create a key of any key type (DSS, RSAv4 or RSA Legacy) during
key generation.
Use of this setting in the configuration file or as a +OPTION is deprecated.
SDA
is only supported for compatibility
purposes.
Creating Self-Decrypting Archives (SDAs)
on page 63
Default Value
SECRING
You may want to keep your secret keyring in a directory separate from your E-Business Server configuration
file (that is, the directory specified by your
PGPPATH
environmental variable or the
PGPPATH
parameter). Use
the
SECRING
parameter to identify the full path and filename for your secret keyring.
Default Value
Unix
SECRING = “<PGPPATH>/secring.skr”
Windows NT
SECRING = “<USERPROFILE>\Personal\pgp\secring.skr”
Windows 2000
SECRING = “<USERPROFILE>\My Documents\pgp\secring.skr”