Sponsored Content
Full Discussion: Linux Encryption methods
Special Forums Cybersecurity Linux Encryption methods Post 302818033 by landossa on Thursday 6th of June 2013 11:49:53 PM
Old 06-07-2013
Yes in theory I agree with you both. Smilie

Lets just say that I am trying to meet compliance so that I can say the drive is encrypted, and get a check in the box.

So if there is a tool which can achieve the type of 'compliance' I am looking for, I would be interested in hearing about it.
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

File encryption/Key encryption ????

My dilemma, I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies

2. UNIX for Dummies Questions & Answers

What are the best ways to get info on the encryption methods used on my laptop?

I have a laptop running ubuntu 10.10. In Gparted I see numerous partitions. This was installed 'I believe' using the 'encrypt home folder' option using the install disk. I am trying to determine 'as a matter of fact' since I did not do the install, which partitions are in fact encrypted, and... (0 Replies)
Discussion started by: Marcus Aurelius
0 Replies

3. Linux

It is possible to find out when a particular encryption key was imported in linux

Hi All, In linux server some encryption keys were imported using gpg command. I want to know when those keys was imported. Is there any way to get when the encryption keys were imported? Thanks in advance.. :rolleyes: (1 Reply)
Discussion started by: latika
1 Replies

4. UNIX for Advanced & Expert Users

yum provides methods

What is the difference between these yum provides and whatprovides methods? I know provides and whatprovides give the same results, but different methods of */ and \* give different results. Also whether you put */ and \* in front of the string or behind the string give different results. I have... (0 Replies)
Discussion started by: cokedude
0 Replies

5. Ubuntu

help regarding encryption and decryption of files on linux

we are to develope a project on linux whose aim is to automatically encrypt files after logoff and to decrypt them using password after log in this is to be made by chging source code of linux ........... can any one help me on this???? (1 Reply)
Discussion started by: vyom
1 Replies

6. Cybersecurity

File encryption tools with MAC address as an encryption key

Hi all, I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS. For example: when A wants to send file to B A will encrypt the file with B's computer MAC/IP address as an encryption key This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies

7. Cybersecurity

How to protect Linux by full disk encryption?

Hello, you may know that linux root password can be resetted (example from rescue mode), so this means linux server offers no protection against access of data when you get somehow remote or physical access to server? So my question is how i can full encrypt linux webserver disk so no one can... (1 Reply)
Discussion started by: postcd
1 Replies

8. UNIX for Beginners Questions & Answers

Encryption in Linux?

Hi, we have a brand new Centos 6.8 build, and after some discussion it seems that there is some interest in securing the entire system using whole disk encryption. What is/are the best option/s, and is this something that can be done after Centos is installed (like for example PGP WDE in Windows... (2 Replies)
Discussion started by: xdawg
2 Replies
SLAPSCHEMA(8C)															    SLAPSCHEMA(8C)

NAME
slapschema - SLAPD in-database schema checking utility SYNOPSIS
/usr/sbin/slapschema [-afilter] [-bsuffix] [-c] [-ddebug-level] [-fslapd.conf] [-Fconfdir] [-g] [-HURI] [-lerror-file] [-ndbnum] [-oop- tion[=value]] [-ssubtree-dn] [-v] DESCRIPTION
Slapschema is used to check schema compliance of the contents of a slapd(8) database. It opens the given database determined by the data- base number or suffix and checks the compliance of its contents with the corresponding schema. Errors are written to standard output or the specified file. Databases configured as subordinate of this one are also output, unless -g is specified. Administrators may need to modify existing schema items, including adding new required attributes to objectClasses, removing existing required or allowed attributes from objectClasses, entirely removing objectClasses, or any other change that may result in making perfectly valid entries no longer compliant with the modified schema. The execution of the slapschema tool after modifying the schema can point out inconsistencies that would otherwise surface only when inconsistent entries need to be modified. The entry records are checked in database order, not superior first order. The entry records will be checked considering all (user and operational) attributes stored in the database. Dynamically generated attributes (such as subschemaSubentry) will not be considered. OPTIONS
-a filter Only check entries matching the asserted filter. For example slapschema -a "(!(entryDN:dnSubtreeMatch:=ou=People,dc=example,dc=com))" will check all but the "ou=People,dc=example,dc=com" subtree of the "dc=example,dc=com" database. Deprecated; use -H ldap:///???(filter) instead. -b suffix Use the specified suffix to determine which database to check. The -b cannot be used in conjunction with the -n option. -c Enable continue (ignore errors) mode. -d debug-level Enable debugging messages as defined by the specified debug-level; see slapd(8) for details. -f slapd.conf Specify an alternative slapd.conf(5) file. -F confdir specify a config directory. If both -f and -F are specified, the config file will be read and converted to config directory format and written to the specified directory. If neither option is specified, an attempt to read the default config directory will be made before trying to use the default config file. If a valid config directory exists then the default config file is ignored. -g disable subordinate gluing. Only the specified database will be processed, and not its glued subordinates (if any). -H URI use dn, scope and filter from URI to only handle matching entries. -l error-file Write errors to specified file instead of standard output. -n dbnum Check the dbnum-th database listed in the configuration file. The config database slapd-config(5), is always the first database, so use -n 0 The -n cannot be used in conjunction with the -b option. -o option[=value] Specify an option with a(n optional) value. Possible generic options/values are: syslog=<subsystems> (see `-s' in slapd(8)) syslog-level=<level> (see `-S' in slapd(8)) syslog-user=<user> (see `-l' in slapd(8)) -s subtree-dn Only check entries in the subtree specified by this DN. Implies -b subtree-dn if no -b nor -n option is given. Deprecated; use -H ldap:///subtree-dn instead. -v Enable verbose mode. LIMITATIONS
For some backend types, your slapd(8) should not be running (at least, not in read-write mode) when you do this to ensure consistency of the database. It is always safe to run slapschema with the slapd-bdb(5), slapd-hdb(5), and slapd-null(5) backends. EXAMPLES
To check the schema compliance of your SLAPD database after modifications to the schema, and put any error in a file called errors.ldif, give the command: /usr/sbin/slapcat -l errors.ldif SEE ALSO
ldap(3), ldif(5), slapd(8) "OpenLDAP Administrator's Guide" (http://www.OpenLDAP.org/doc/admin/) ACKNOWLEDGEMENTS
OpenLDAP Software is developed and maintained by The OpenLDAP Project <http://www.openldap.org/>. OpenLDAP Software is derived from Uni- versity of Michigan LDAP 3.3 Release. OpenLDAP 2.4.28 2011/11/24 SLAPSCHEMA(8C)
All times are GMT -4. The time now is 03:38 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy