You could store the password in a file encrypted by crypt(1) get your script to decrypt it as it uses it, not very secure but it would hide the password from the casual observer.
I've used ftp with an input file to give the commands before, e.g.:
And then a script like this:
If you wanted to hide the password then encrypt it into a file using crypt, e.g.:
Changing key to be the decryption key and password to ones of your choice.
The in the above script "PASSWD=whatever" would change to:
The filenames could be made more obscure and as I said the whole thing is not secure but it would hide things a bit...
Hi,
We have a requirement to transfer(FTP) files created in a particular directory (In Solaris) to NT machine. Also this process neeeds to be automated.
I belive a command MAIL in UNIX could be used to find new files created in a directory, but this just sends the file list to the logged user.... (5 Replies)
I'm slowly (very slowly) learning csh and the UNIX underpinnings of Mac OS X so please bear with me.
I want to be able to ftp a file to my personal webspace at work. I can do this by manually going in and doing
ftp host.domain.com
user:
password:
cd /folder
put myfile
etc..
I'd like... (4 Replies)
Hi,
Is is possible when ftp script disconnect by remote server and it can restart to tranfer (such as restart in 10 mins, etc)?
Please help!!!! (1 Reply)
Hi
i need to FTP files from windows to unix(sun) machine using script. what are the scripts commands i need to use to transfer files
Thanks (2 Replies)
Hi,
is it possible to automatically run a script (bash) when an event occurs?
I mean, let's say that I (or one of my users) plug in a flash memory (USB) ... is it possible to run a script every time I do this action (let's say to log user, date and other infos on a file)?
Thanks!
Bye... (5 Replies)
Guy's
We have two AIX servers
Server1 and Server2
and we have created user1 in Server1 and Server2 ...
and .netrc file was confiured under /home/user1 with the below line
machine server2 login user1 password abc1234567
-rw------- 1 user1 staff 159 Sep 28 2004 .netrc
... (7 Replies)
Hi
I am looking for automatic FTP script from UNIX to UNIX servers. I have two problems that anyone may help:
1- The directory where the files have to be FTPed is varied, where it is identified by the date of today (YYYYMMDD)
2- the files come every 15 minutes and named by the time with form... (2 Replies)
Hey Guys,
i need to download files from a ftp-server that not older than $VAR (x) days
eg for seven days
./script 7
or two weeks
./script 14
all files from the last 14 days will download but how i can explain "ftp" this?
sorry for my strange english :/ (2 Replies)
I have automated ftp for different scripts. every script uses different login and passwords for different server. it reads the username and password from netrc.
there is 1 particular script that is failing. this script is failing in FTP step. i have checked the logs it says login failed. but... (5 Replies)
Hello,
I am having trouble calculating some numbers and I was hoping someone could help me solve this.
I have one file with 1 column and what I'm trying to do is add up the lines until a certain value is reach, then jump to where it last finished counting and continue.
so for ex: if I... (27 Replies)
Discussion started by: verse123
27 Replies
LEARN ABOUT PLAN9
crypt
crypt(1)crypt(1)NAME
crypt - encode or decode a file
SYNOPSIS
crypt [password]
The crypt utility encrypts and decrypts the contents of a file. crypt reads from the standard input and writes on the standard output. The
password is a key that selects a particular transformation. If no password is given, crypt demands a key from the terminal and turns off
printing while the key is being typed in. crypt encrypts and decrypts with the same key:
example% crypt key < clear.file > encrypted.file
example% crypt key < encrypted.file | pr
prints the contents of clear.file.
Files encrypted by crypt are compatible with those treated by the editors ed(1), ex(1), and vi(1) in encryption mode.
The security of encrypted files depends on three factors: the fundamental method must be hard to solve; direct search of the key space
must be infeasible; "sneak paths" by which keys or cleartext can become visible must be minimized.
crypt implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack on
such machines are widely known, thus crypt provides minimal security.
The transformation of a key into the internal settings of the machine is deliberately designed to be expensive, that is, to take a substan-
tial fraction of a second to compute. However, if keys are restricted to (say) three lower-case letters, then encrypted files can be read
by expending only a substantial fraction of five minutes of machine time.
Since the key is an argument to the crypt command, it is potentially visible to users executing ps(1) or a derivative command. To minimize
this possibility, crypt takes care to destroy any record of the key immediately upon entry. No doubt the choice of keys and key security
are the most vulnerable aspect of crypt.
/dev/tty for typed key
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
des(1), ed(1), ex(1), ps(1), vi(1), attributes (5)
8 Mar 2005 crypt(1)