08-10-2011
It is possible to find out when a particular encryption key was imported in linux
Hi All,
In linux server some encryption keys were imported using gpg command.
I want to know when those keys was imported.
Is there any way to get when the encryption keys were imported?
Thanks in advance..
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi
I recieved a written code which imports an unknown folder.
How can I search the unix file system for this certain folder.
I tried using the 'find' command, but it only works on files, not on folders (2 Replies)
Discussion started by: gilr
2 Replies
2. UNIX for Dummies Questions & Answers
My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies
3. UNIX for Dummies Questions & Answers
I'm having one doubt about the VIM ENCRYPTION key. I having a text file, I encrypted that file using :X vim -x filename Now, where the encrypted key is stored (path). Whether it stored in a separate file or the text file itself. If I open a the file it asked Encryption key. How it compare... (1 Reply)
Discussion started by: ungalnanban
1 Replies
4. UNIX for Dummies Questions & Answers
Hi There,
I have set encryption key to my file using :X command.
Now that I no more need encryption key to the file, I just want to delete/remove the encryption key. I have gone through many source but in vain. None of the source provided me with the solution that I am looking for.
I... (2 Replies)
Discussion started by: grc
2 Replies
5. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
6. Shell Programming and Scripting
Hi All,
I have a XML file which is looks like as below. <<please see the attachment >>
<?xml version="1.0" encoding="UTF-8"?>
<esites>
<esite>
<name>XXX.com</name>
<storeId>10001</storeId>
<module>
... (4 Replies)
Discussion started by: Rajeev_hbk
4 Replies
7. Shell Programming and Scripting
Hi,
Recently we migrated our app from Unix to Linux platform. All our shell scripts which use to work in Unix platform are not working in Linux now.
below is such sample script. I tried removing trailing spaces, but no luck. dear experts kindly help..
#############BEGIN###############
split... (7 Replies)
Discussion started by: laxman_bly
7 Replies
8. UNIX for Advanced & Expert Users
Hi,
we have private and public key, encrypt file using public and want to decrypt using private key. can you please advise below commands are correct or other remedy if unix have?
encrypt -a arcfour -k publickey.asc -i TESTFILE.csv -o TESTFILE00.csv
decrypt -a arcfour -k privatekey.asc... (2 Replies)
Discussion started by: rizwan.shaukat
2 Replies
RPMKEYS(8) System Manager's Manual RPMKEYS(8)
NAME
rpmkeys - RPM Keyring
SYNOPSIS
rpmkeys {--import|--checksig}
DESCRIPTION
The general forms of rpm digital signature commands are
rpmkeys --import PUBKEY ...
rpmkeys {-K|--checksig} PACKAGE_FILE ...
The --checksig option checks all the digests and signatures contained in PACKAGE_FILE to ensure the integrity and origin of the package.
Note that signatures are now verified whenever a package is read, and --checksig is useful to verify all of the digests and signatures
associated with a package.
Digital signatures cannot be verified without a public key. An ASCII armored public key can be added to the rpm database using --import.
An imported public key is carried in a header, and key ring management is performed exactly like package management. For example, all cur-
rently imported public keys can be displayed by:
rpm -qa gpg-pubkey*
Details about a specific public key, when imported, can be displayed by querying. Here's information about the Red Hat GPG/DSA key:
rpm -qi gpg-pubkey-db42a60e
Finally, public keys can be erased after importing just like packages. Here's how to remove the Red Hat GPG/DSA key
rpm -e gpg-pubkey-db42a60e
SEE ALSO
popt(3),
rpm(8),
rpmdb(8),
rpmsign(8),
rpm2cpio(8),
rpmbuild(8),
rpmspec(8),
rpmkeys --help - as rpm supports customizing the options via popt aliases it's impossible to guarantee that what's described in the manual
matches what's available.
http://www.rpm.org/ <URL:http://www.rpm.org/>
AUTHORS
Marc Ewing <marc@redhat.com>
Jeff Johnson <jbj@redhat.com>
Erik Troan <ewt@redhat.com>
Panu Matilainen <pmatilai@redhat.com>
Red Hat, Inc 29 October 2010 RPMKEYS(8)