08-01-2002
it's the 2nd one. i need to retrieve it later. i really didn't want to get a prompt from the user, since it'd be better to prompt the password and lose the encryption. what do you think of getting the key from something in the system, like the current dir or the output of uname -s. would it still be secure? what i'm doing here is to store some irc nickname passwords in a file and when we login the perl script auto identifies the user.
any ideas for secure automation?
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi
I'm trying to work out the best method for creating a backup under SCO OpenServer. I would like to perform unattended backups to tape of various file systems, possibly using a script etc.
So far I've looked at the Backup Manager that comes with SCO and that cannot perform unattended... (2 Replies)
Discussion started by: synamics
2 Replies
2. UNIX for Dummies Questions & Answers
My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies
3. UNIX for Dummies Questions & Answers
Hi All,
I have got two files.
File A with 50000 records and
File B with some 500 million records.
I need to extract the mapping data (common data) from both the files.
There should be definitely many ways :) though I have a way which is definitely not optimzed and takes a longer time... (2 Replies)
Discussion started by: matrixmadhan
2 Replies
4. Programming
Hi,
I am working with solaris 9 and I am using jre1.6. In my application,I am using java and C++ in my application.Basically we are using the java for front end and C/C++ for back hand.So I have to call the C/C++ source code form java code.we are using native methods for it..
So application... (1 Reply)
Discussion started by: smartgupta
1 Replies
5. UNIX for Dummies Questions & Answers
Hi all,
I'd like to use the encryption method used to generate the /etc/shadow passwords.
The goal is to write a script that get a plain-text password as argument and returns an encrycped one.
Can you help me, please? (10 Replies)
Discussion started by: nisant
10 Replies
6. Shell Programming and Scripting
Hi Gurus,
VARIABLE=john_*_has_*_s
i want to replace the * with digits 09100 and 0010101
to print the john_09100_has_0010101_s
Thanks (3 Replies)
Discussion started by: SeenuGuddu
3 Replies
7. Solaris
After a memory upgrade all network interfaces are misconfigued. How do i resolve this issue. Below are some out puts.thanks.
ifconfig: plumb: SIOCLIFADDIF: eg000g0:2: no such interface
# ifconfig eg1000g0:2 plumb
ifconfig: plumb: SIOCLIFADDIF: eg1000g0:2: no such interface
# ifconfig... (2 Replies)
Discussion started by: andersonedouard
2 Replies
8. Shell Programming and Scripting
Hi All, i believe this is not very efficient. another method would be appreciated for these. basically i read a file with tab delimited column and pass the column to another perl script.
while read line
do
timestamp=`echo "$line"|awk -F"\t" '{print $1}'`
severity=`echo... (15 Replies)
Discussion started by: ryandegreat25
15 Replies
9. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
LEARN ABOUT REDHAT
losetup
LOSETUP(8) MAINTENANCE COMMANDS LOSETUP(8)
NAME
losetup - set up and control loop devices
SYNOPSIS
losetup [ -e encryption ] [ -o offset ] loop_device file
losetup [ -d ] loop_device
DESCRIPTION
losetup is used to associate loop devices with regular files or block devices, to detach loop devices and to query the status of a loop
device. If only the loop_device argument is given, the status of the corresponding loop device is shown.
OPTIONS
-d detach the file or device associated with the specified loop device.
-e encryption
enable data encryption. The following keywords are recognized:
NONE use no encryption (default).
XOR use a simple XOR encryption.
DES use DES encryption. DES encryption is only available if the optional DES package has been added to the kernel. DES encryption
uses an additional start value that is used to protect passwords against dictionary attacks.
-o offset
the data start is moved offset bytes into the specified file or device.
RETURN VALUE
losetup returns 0 on success, nonzero on failure. When losetup displays the status of a loop device, it returns 1 if the device is not con-
figured and 2 if an error occurred which prevented losetup from determining the status of the device.
FILES
/dev/loop0,/dev/loop1,... loop devices (major=7)
EXAMPLE
If you are using the loadable module you must have the module loaded first with the command
# insmod loop.o
The following commands can be used as an example of using the loop device.
dd if=/dev/zero of=/file bs=1k count=100
losetup -e des /dev/loop0 /file
Password:
Init (up to 16 hex digits):
mkfs -t ext2 /dev/loop0 100
mount -t ext2 /dev/loop0 /mnt
...
umount /dev/loop0
losetup -d /dev/loop0
If you are using the loadable module you may remove the module with the command
# rmmod loop
RESTRICTION
DES encryption is painfully slow. On the other hand, XOR is terribly weak.
AUTHORS
Original version: Theodore Ts'o <tytso@athena.mit.edu>
Original DES by: Eric Young <eay@psych.psy.uq.oz.au>
Linux Nov 24 1993 LOSETUP(8)