Sponsored Content
Full Discussion: Apache 2.2 PGP Validation
Top Forums Web Development Apache 2.2 PGP Validation Post 302283875 by otheus on Wednesday 4th of February 2009 09:27:43 AM
Old 02-04-2009
Very detailed instructions are given here: Verifying Apache HTTP Server Releases - The Apache HTTP Server Project

If PGP is too unwieldy for you, just use md5 signatures. For that, you use something like "openssl md5 httpd-source.tgz". That should compare with the md5 signature of the source you download. The signature for version 2.2.11 is found at http://www.apache.org/dist/httpd/htt....11.tar.gz.md5. The other distributions/versions can be found at a similar link.
 

9 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

PGP commands

i have successfully executed a PGP encrytp command with the following: "echo `pgp --encrypt filename --recipient user-key` > $fromDir/.encrypt" However, when i attempt to issue a decrypt command with following: "echo `pgp --decrypt filename --passphrase passphrase`" > $fromDir/.decrypt ... (1 Reply)
Discussion started by: rgard
1 Replies

2. UNIX for Advanced & Expert Users

pgp encryption

Hi I have one script for doing the gpg encryption on linux. The encrytion is doing fine when i am running the script from command prompt on linux The same script when it is triggering from mainframe using sysopts option in NDM(connect direct) the encryption step in the shell script is... (0 Replies)
Discussion started by: Arvind Maurya
0 Replies

3. UNIX for Advanced & Expert Users

Importing PGP keys

I'm hoping someone can help get me moving in the right direction here, so bear with me. I've got 2 RedHat Linux servers, let's call them A & B. - A receives "sensitive" files, which are PGP encrypted, and immediately sends them off to B for decryption/processing/deletion - B needs to make... (1 Reply)
Discussion started by: peteroc
1 Replies

4. Cybersecurity

How to use PGP File Encryption

Hi All, I am new to the concept of encryption and shell and i have been assigned to do pgp encryption of a file before ftping it. I am developing the script using MKS Toolkit on Windows XP and the script will run later on actual unix box. I am going through documents provided by pgp... (2 Replies)
Discussion started by: sandeepb
2 Replies

5. UNIX for Dummies Questions & Answers

PGP Auto Respond

This is relating PGP: I wrote a shell script to encrypt a file: pgpe -r <key> (file) Im looking to automate this but when I run my script it keeps running because it prompts: WARNING: The above key is not trusted to belong to: Do you want to use the key with this name? It's... (1 Reply)
Discussion started by: queenie680
1 Replies

6. HP-UX

PGP query with SDA

Hi I have a requirement to have a script which will encrypt a file on my HPUX server in such a way that the receiver of the file only has to enter a passphrase to decrypt (no swapping of keys, etc.) Ideally, I want to use some free software to perform the task. From what I have read so far, the... (0 Replies)
Discussion started by: errigal
0 Replies

7. Solaris

PGP encryption

Hi, i am trying to encrypt a file using pgp with a recepient's public key. The file is encrypted but the output file has owner & group nobody. i am not able to change it either. Please let me know how to do pgp encryption so that i get the output with owner and group as the same user which runs... (4 Replies)
Discussion started by: renjyverghese
4 Replies

8. Linux

Pgp encryption script

I have file in linux which I need to do the PGP encryption. Through manually I am using this command to do the same gpg -c scsrun.log Enter passphrase : Repeat Passphrase : But how I can achive this using linux script. Thanks How to use code tags (3 Replies)
Discussion started by: mr_harish80
3 Replies

9. Shell Programming and Scripting

PGP generating keys.

Hi Guys, Am facing issue in generating PGP keys. Can you please help me to figure this out?? I fired the below command to generate keys. The log say keys successfully created. But when i tried to list it doesnt shows me the keys created. pgp --gen-key "pgptest<ram@gmail.com>"... (3 Replies)
Discussion started by: Vinoth Kumar G
3 Replies
CONTROL.CTL(5)							File Formats Manual						    CONTROL.CTL(5)

NAME
control.ctl - specify handling of Usenet control messages DESCRIPTION
The file <pathetc in inn.conf>/control.ctl is used to determine what action is taken when a control message is received. If <usecon- trolchan in inn.conf> is ``true'', it is read by the controlchan script, which can be invoked as channel program by innd(8). When con- trol.ctl is modified, controlchan notices this automatically and reload it. If <usecontrolchan in inn.conf> is ``false'', it is read by the parsecontrol script, which is called by all the control scripts. (For an explanation of how the control scripts are invoked, see innd(8).) The file consists of a series of lines; blank lines and lines beginning with a number sign (``#'') are ignored. All other lines consist of four fields separated by a colon: message:from:newsgroups:action The first field is the name of the message for which this line is valid. It should be either the name of the control message or the word ``all'' to mean that it is valid for all messages. The second field is a shell-style pattern that matches the email address of the person posting the message. (The poster's address is first converted to lowercase.) The matching is done using the shell's case statement (or the equivalent); see sh(1) for details. If the control message is ``newgroup'' or ``rmgroup'' then the third field specifies the shell-style pattern that must match the group being created or removed. If the control message is ``checkgroups'' then the third field specifies the shell-style pattern that is used to determine which newsgroups are processed for checking. If the control message is of a different type, then this field is ignored. The fourth field specifies what action to take on control messages that match this line. The following actions are understood: doit The action requested by the control message should be performed. In some cases, the control script will also send mail to <USER specified with --with-news-master at configure>, but if notification of the action should always be sent, doit=mail should be used instead (see below). doifarg If the control message has an argument, this is treated as a ``doit'' action. If no argument was given, it is treated as a ``mail'' entry. This is used in ``sendsys'' entries script so that a site can request its own newsfeeds(5) entry by posting a ``sendsys mysite'' article. On the other hand, sendsys ``bombs'' ask that the entire newsfeeds file be sent to a forged reply-to address; by using ``doifarg'' such messages will not be processed automatically. (Processing ``sendsys'' control messages is still not recom- mended, even with this work-around, unless they are authenticated in some fashion. The risk of having news servers turned into anonymous mail bombing services is too high.) doit=file The action is performed, but a log entry is written to the specified log file, file. If file is the word ``mail'' then the record is mailed. A null string is equivalent to /dev/null (in other words, with a null string, nothing is logged). A pathname that starts with a slash is taken as the absolute filename to use as the log. Otherwise, the log entry is written to <pathlog in inn.conf>/file.log. The log is written by writelog (see newslog(8)). drop No action is taken; the message is ignored. verify-* If the value starts with the string ``verify-'' (for example, ``verify-news.announce.newgroups'') then PGP verification of the con- trol message will be done using the key issued by the ``user'' defined by the rest of the string -- ``news.announce.newsgroups'' in this example. If no logging is specified (with =file mentioned below), notification of successful ``newgroup'' and ``rmgroup'' mes- sages and the output of ``checkgroups'' messages will be mailed to the news administrator. verify-*=file PGP verification is done as for the ``verify-*'' entries, and a log entry is written to the specified file. (In the case of ``checkgroups'' messages, this means the shell script output of the ``checkgroups'' message will be written to that file.) log A one-line log notice is sent to standard error. innd(8) normally directs this to the file <pathlog in inn.conf>/errlog. log=file A log entry is written to the specified log file, file, which is interpreted as described above. mail A mail message is sent to the news administrator. Processing of a ``checkgroups'' message will never actually change the active(5) file. The difference between an action of doit (or ver- ify) and an action of mail for ``checkgroups'' control messages lies only in what mail is sent; doit will mail the news administrator a shell script to create, delete, or modify newsgroups to match the ``checkgroups'' message, whereas mail will just mail the entire message. In either case, the news administrator will have to take action to implement the ``checkgroups'' and if the mail is ignored, nothing will be changed. Lines are matched in order; the last match found in the file is the one that is used. For example, with the following three lines: newgroup:*:*:drop newgroup:group-admin@isc.org:comp.*|humanities.*|misc.*|news.*| rec.*|sci.*|soc.*|talk.*:verify-news.announce.newgroups newgroup:kre@munnari.oz.au:aus.*:mail A newgroup coming from ``group-admin'' at a ISC machine will be honored if it is one of the listed hierarchies and if it has a valid signa- ture with the ``news.announce.newgroups'' key. If ``kre'' posts a newgroup message creating ``aus.foo'', then mail will be sent. All other newgroup messages are ignored. Use of the verify action for processing ``newgroup'', ``rmgroup'', and ``checkgroups'' messages is strongly recommended. Abuse of control messages is rampant, and authentication via PGP signatures is currently the only reliable way to be sure that a control message comes from who it claims to be from. Most major hierarchies are now using PGP-authenticated control messages. In order to use verify actions, the PGP key ring of the news user must be populated with the PGP keys of the hierarchy maintainers whose control messages you want to honor. For more details on PGP-authenticated control messages and the URL for downloading the PGP keys of major hierarchies, see pgpverify(8). Control messages of type ``cancel'' are handled internally by innd(8) and cannot be controlled by any of the mechanisms described here. HISTORY
Written by Rich $alz <rsalz@uunet.uu.net> for InterNetNews. This is revision 1.11.2.1, dated 2000/08/17. SEE ALSO
controlchan(8), inn.conf(5), innd(8), newsfeeds(5), pgpverify(8), scanlogs(8). CONTROL.CTL(5)
All times are GMT -4. The time now is 07:34 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy