Sponsored Content
Operating Systems Linux Red Hat Amanda Configuration for Asymmetric encryption Post 302315555 by choogendyk on Tuesday 12th of May 2009 05:08:19 PM
Old 05-12-2009
First off, listing error messages that reference a line of your amanda configuration are pretty useless without context. Please show the block of lines centered around the line referred to in the error message. Quite often a simple typo or syntax error throws off the scanning and you get an error that refers to an adjacent line and is otherwise uninterpretable. Since you had a working configuration and made changes, you should know exactly which lines are at fault. If you post it, someone might spot the error.

There is a document here How To:Set up data encryption - The Open Source Backup Wiki (Amanda, MySQL Backup, BackupPC) that might help. Also, the man page, which is online here amcrypt-ossl-asym.
 

3 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

File encryption/Key encryption ????

My dilemma, I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies

2. Solaris

amanda's amcheck fail in solaris 10

i got this error message when trying to run amcheck on solaris 10 (sparc). bash-3.00$ amcheck DailySet1 Amanda Tape Server Host Check ----------------------------- slot 10:read label `DailySet1-10', date `X'. NOTE: skipping tape-writable test Tape DailySet1-10 label ok NOTE: conf info... (2 Replies)
Discussion started by: conandor
2 Replies

3. Cybersecurity

File encryption tools with MAC address as an encryption key

Hi all, I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS. For example: when A wants to send file to B A will encrypt the file with B's computer MAC/IP address as an encryption key This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
AMAESPIPE(8)						  System Administration Commands					      AMAESPIPE(8)

NAME
amaespipe - wrapper program for aespipe SYNOPSIS
amaespipe DESCRIPTION
amaespipe requires aespipe, uuencode and gpg to work. Aespipe is available from : http://loop-aes.sourceforge.net amaespipe will search for the aespipe program in the following directories: /usr/bin:/usr/local/bin:/sbin:/usr/sbin. amaespipe is called by amcrypt for Amanda data encryption. amaespipe is based on aespipe's bzaespipe program. It calls aespipe to encrypt data using AES256 as the encryption and SHA256 as the hash function. GPG key should be stored in $AMANDA_HOME/.gnupg/am_key.gpg. amaespipe reads passphrase from file descriptor 3. During decryption, amaespipe autodects encryption type and hash function from the encrypted image. SEE ALSO
amanda(8), amanda.conf(5), aespipe(1), amcrypt(8), gpg(1) The Amanda Wiki: : http://wiki.zmanda.com/ AUTHOR
Kevin Till <kevin.till@zmanda.com> Zmanda, Inc. (http://www.zmanda.com) Amanda 3.3.3 01/10/2013 AMAESPIPE(8)
All times are GMT -4. The time now is 02:17 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy