My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
HI,
I'm trying to encrypt a file and i'll FTP it to a external server.When i encrypt it using the command
gpg -e -r 'recipient name' <filename>
its asking me for public keys.Is there a way to encrypt without having to give the public keys?
or if i need to give public keys
i... (1 Reply)
Hi,
I'm trying to decrypt a gpg file thorugh a shell script. But i' could'nt. My script is ,
-sh-3.1$ cat test_gpg.sh
#!/bin/ksh
echo " Hello, iam testing GPG"
gpg prabhu.txt.gpg <<EOF
prompt prabhu
EOF
exit 0
The file i'm trying to decrypt is prabhu.txt.gpg and my passphrase is... (1 Reply)
Hi,
I have a requirement to encrypt a file using gpg with a public key. However when i encrypt a file, i get a question like 'Do you want to go ahead with unverified user?' . when i press 'y' file is encrypted.
I am not able to automate this job because of this interactive mode. Could... (3 Replies)
Hi All,
I am working on Solaris 10 OS on X4170M2 server. I have some .gpg encrypted files and i want to decrypt them but i dont know how to install the binary of gpg.
Here is the binary in system :
root@ecmstest # ls -larth
total 1273904
-rw-r--r-- 1 root root 3.5M Oct 14 ... (1 Reply)
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Hello All,
Is there a way to determine how many public keys are embedded or used to encrypt in a GPG file with out decrypting the actual encrypted file. I know i can see the keys & email id's used when we decrypt it, but curious to find a command if any to know with out decrypting the actual file... (2 Replies)
Hi. I'm hitting issues using gpg to encrypt a text file on Linux.
gpg -c --passphrase 123 --cipher-algo AES256 test
gpg: cancelled by user
gpg: error creating passphrase: Operation cancelled
gpg: symmetric encryption of `test' failed: Operation cancelled
In this case the file test just... (3 Replies)
Hi Friends,
There are some 7 years script in out linux server. I am trying to understand them since Linux Server changed(A).
Below line in one of the encrypting script. Here scenario is encrypting bank files in our (A) server and doing Secure Copy to Server (B).
GPG -v --batch --yes --armor... (1 Reply)
Discussion started by: johnsnow
1 Replies
LEARN ABOUT LINUX
rpmkeys
RPMKEYS(8) System Manager's Manual RPMKEYS(8)NAME
rpmkeys - RPM Keyring
SYNOPSIS
rpmkeys {--import|--checksig}
DESCRIPTION
The general forms of rpm digital signature commands are
rpmkeys --import PUBKEY ...
rpmkeys {-K|--checksig} PACKAGE_FILE ...
The --checksig option checks all the digests and signatures contained in PACKAGE_FILE to ensure the integrity and origin of the package.
Note that signatures are now verified whenever a package is read, and --checksig is useful to verify all of the digests and signatures
associated with a package.
Digital signatures cannot be verified without a public key. An ASCII armored public key can be added to the rpm database using --import.
An imported public key is carried in a header, and key ring management is performed exactly like package management. For example, all cur-
rently imported public keys can be displayed by:
rpm -qa gpg-pubkey*
Details about a specific public key, when imported, can be displayed by querying. Here's information about the Red Hat GPG/DSA key:
rpm -qi gpg-pubkey-db42a60e
Finally, public keys can be erased after importing just like packages. Here's how to remove the Red Hat GPG/DSA key
rpm -e gpg-pubkey-db42a60e
SEE ALSO popt(3),
rpm(8),
rpmdb(8),
rpmsign(8),
rpm2cpio(8),
rpmbuild(8),
rpmspec(8),
rpmkeys --help - as rpm supports customizing the options via popt aliases it's impossible to guarantee that what's described in the manual
matches what's available.
http://www.rpm.org/ <URL:http://www.rpm.org/>
AUTHORS
Marc Ewing <marc@redhat.com>
Jeff Johnson <jbj@redhat.com>
Erik Troan <ewt@redhat.com>
Panu Matilainen <pmatilai@redhat.com>
Red Hat, Inc 29 October 2010 RPMKEYS(8)