Sponsored Content
Top Forums Shell Programming and Scripting Bash Script to decrypt encrypt log and archive Post 302559287 by cdc01 on Monday 26th of September 2011 04:06:46 PM
Old 09-26-2011
Bash Script to decrypt encrypt log and archive

Hi

Please see if you have come across any aprts of this. I can read, integrate and syntehsixe. Any help you could offer me would be super. thanks in advance!


Good day.


Thank you for your response in this matter. Here are some further details:

1) scripting is to be in BASH shell programming

2) when targeting a named directory, based on filtering, we will need to:
a) identify the .pgp extension files present (there may be a timestamp before or after the .pgp)
b) archive the received file (.pgp)
c) decrypt the file using GPG (we have the priv key)
d) put the file back into the same directory and archive it as well
Log all activities, delete gpg file from directory only if successful in decrypting

3) when targeting another directory, we will need to
a) archive the file(s) pre-encryption. (based on location (file name) and then on extension
b) may or may not need to timestamp it
c) encrypt the files separately. Here: depending on the directory that the file is present it will be encrypted with a certain key
(a hierarchy of folders will be scanned)
d) may need to timestamp it here (not sure yet if timestamp is needed before or after encryption)
e) archive the encrypted files
f) be sure the new files are in the same directory as the original ones
g) delete the original files from the directory (this may be done by GPG but im not sure), but only delete if the encryption was successful
h) may need to change the rights of the new file
i) log all steps performed or failed on.


4) For each of the archivings done, every week (MON 00:01) a new tarball should be created. Not sure progamatically
what is simpler, but weekly or some like variation (ideally start new MON 00:01 AM) may be the best

As well, it is important to check that the file is not in use when going to encrypt it, or decrypt it.
Not sure what method is best to verify if the file is in use, but this should be checked as well.

thanks for your help in advance!
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Encrypt & Decrypt a String

Hi Everybody, I have a script that telnet another system. For some reasons, this is should be done by "root", so the root password has been written explicitly in this script, which mean any body read this script will know the root password of the other system. I think the solution is to write... (6 Replies)
Discussion started by: aldowsary
6 Replies

2. Shell Programming and Scripting

encrypt and decrypt password

how do i encrypt and decrypt a password (2 Replies)
Discussion started by: sanwish
2 Replies

3. Shell Programming and Scripting

Encrypt and Decrypt script

Dear Experts, I am using one script name :volume.sh and its written in bash shell script. I just want to encrypt the script so that any one else cannot see it. please tell me the commands how to encrypt the script as well as to decrypt it. Regards, SHARY (9 Replies)
Discussion started by: shary
9 Replies

4. Shell Programming and Scripting

How to encrypt and decrypt a file

How to encrypt and decrypt a file using unix Command? Can any one help me? (2 Replies)
Discussion started by: laknar
2 Replies

5. Shell Programming and Scripting

Encrypt and decrypt a string

Hi, I want to encrypt and decrypt a string(database password) which will be used in my scripts. encrypt the string while storing in a file and while using it in other scripts it should decrypt. i tried below method. As it can decrypt easily, it is not recommended. encrypt=`perl -e 'print unpack... (5 Replies)
Discussion started by: rohan10k
5 Replies

6. Shell Programming and Scripting

Encrypt and Decrypt

I have script for all oracle prod db. I have hard coded the username / password. I need a mechanism to encode and decode the username / password in a shell script. Another challenge is I use the username and password in a Select command for oracle DB. How can call the decrypted... (2 Replies)
Discussion started by: ilugopal
2 Replies

7. Shell Programming and Scripting

Encrypt Password file and decrypt in a shell script

Hi All, I have stored Oracle database passwords in a hidden file - .pass_file. My shell script reads the hidden file, gets the password and then logs in to the Oracle database and runs some SQL script. My requirement is: I need to provide the shell script to be executed by someone else. So,... (1 Reply)
Discussion started by: sunpraveen
1 Replies

8. Shell Programming and Scripting

Encrypt and decrypt a password in shell script

Hi All, very good morning all. I am trying to connect to informatica repository by using shell script. I have written pmrep connect command in the script file. But i need to provide repository, domain ,username and password to connect. Username and password are hard coded in the script... (8 Replies)
Discussion started by: SekhaReddy
8 Replies

9. Shell Programming and Scripting

Encrypt and decrypt the password in a Shell Script

Hello, I have the following UNIX shell script which connects to the teradata database and executes the SQL Queries. For this, I am passing database name, username and password. I don't want to reveal my password to anyone. So, is there any way that I can encrypt my password and read the... (2 Replies)
Discussion started by: ronitreddy
2 Replies

10. UNIX for Beginners Questions & Answers

Encrypt and Decrypt a File with Password

Hello, I have few files on unix which are payroll related and I need them to encrypt with password so others wouldn't see the data. I use ETL tool and would like to know the unix command that does encryption/decryption to use in the ETL. Thank you, Sri (3 Replies)
Discussion started by: eskay
3 Replies
FETCHFILE(7)						 Miscellaneous Information Manual					      FETCHFILE(7)

NAME
O-SAFT / fetchfile DESCRIPTION
Introduction With the server protocol extension O-SAFT (Offer Simple Asynchronous File Transfer) and the matching client fetchfile there is an easy method of retrieving files from a SAFT server. This is a direct analogy to the SMTP and POP or APOP protocol suite in the world of e-mail transfer. Overview: - How does O-SAFT/fetchfile work? - What to do on the client side? - What to do on the server side? - How about security issues? How does O-SAFT/fetchfile work? O-SAFT is an extension to the existing SAFT protocol and allows athenticated clients to retrieve files from a (remote) server. The imple- mention is the server sendfiled and the client fetchfile. O-SAFT uses a dedicated pgp key pair to authenticate the fetchfile session. The private key will be kept on the client side, the public key must tbe present at the server side. For security reasons this will NOT be your regular e-mail pgp key pair, but a separate pair of pgp keys, uniquely assigned for fetchfile transfers. You will have to create a pair of pgp keys for this purpose befor using the fetchfile client for the first time (see below). Fetchfile can provide a directory listing of available files from the server, retrieve files or delete files. After retrieving a file, it will be placed in the regular spool directory, not in the current directory! You will have to use the receive command to transfer the files from the spool directory to your current directory afterwards. If there already exists a regular sendfile spool directory /var/spool/sendfile on the client side it will be used, otherwise a $HOME/.sfspool will be created. Fetchfile will be running without using root permissions on the client side. What to do on the client side? You must have pgp-2.6.x installed and the binaries must be available through your $PATH environment variable. First, and ONLY ONCE before using fetchfile the very first time, you have to create a fetchfile pgp key pair (only pgp-2.6.x is sup- ported!): fetchfile -I Please only hit 'ENTER' when being asked for a pass phrase! This will create a special non-passphrase protected key pair for O-SAFT. After this initialization you will have a file /var/spool/sendfile/$USER/config/public.pgp resp. $HOME/.sfspool/public.pgp Please send this file to root@SAFT-server, who has to save this public key file into the appropiate user configuration directory. Example: sendfile -c 'my O-SAFT puplic key' /var/spool/sendfile/$USER/config/public.pgp root@bofh.belwue.de (This prelimary action will enable you to use the SAFT server and will prevent othes from abusing your name or SAFT-account on the server.) After preparing the pgp keys an both sides, you can invoke fetchfile on a regular basis: fetchfile -l list files on the server fetchfile -a retrieve all files from server fetchfile -daf *aol.com delete all files from the AOL domain There is a detailed description of all capabilities in the fetchfile(1) man page. For configuring the server SAFT account by the client user there are two options: fetchfile -Cw=config fetchfile -Cw=restrictions Using this the two local configuration files will be transfered from the local current directory to the SAFT server. The details of the configuration can be found in the sendfile(1) man page. With using fetchfile -Cr=config fetchfile -Cr=restrictions the files will be retrieved back and will be displayed to STDOUT. What to do on the server side? pgp-2.6.x must be installed. The system adminsitrator needs to run sfdconf -e config add set the following option: fetchfile = on The system administrator must create a user account (if it does not yet exist). This account does not need an interactive login shell and does not need a valid password; the login shell could be /bin/false. The only purpose is to enable the sendfiled to check out the user and to create a local spool directory (this method is well known for creating POP mail accounts). The client user will create the initial pgp key pair and the public key (public.pgp) will be sent to the system administrator of the server. This key has to be placed into the config directory for the particular user. Assuming the user name is bozo, the system adminis- trator will have to type the following (under root permissions): receive -f bozo@* -b bozo public.pgp su bozo cd /var/spool/sendfile/bozo/config receive public.pgp (the first receive resends the file public.pgp from the sender bozo@* to the local user bozo) How about security issues? O-SAFT uses a tcp challenge/response authentication with a pgp signature. This opens the possibility that the session can be attacked through tcp hijacking. We are well aware of this, but tcp hijacking is not easy and only possible if the attacker has direct access to the transport media (e.g. listening on the same ethernet cable/segment) and has access to a set of pretty nice cracker tools. With regular operating system supplied software it is not possible to attack a session. SEE ALSO
sendfile(1), fetchfile(1), sendfiled(8). AUTHOR
Ulli Horlacher - framstag@rus.uni-stuttgart.de translated by andreas@citecs.de 3rd Berkeley Distribution FETCHFILE(7)
All times are GMT -4. The time now is 01:49 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy