Sponsored Content
Full Discussion: Encryption in Linux?
Top Forums UNIX for Beginners Questions & Answers Encryption in Linux? Post 302991187 by gandolf989 on Tuesday 7th of February 2017 01:58:46 PM
Old 02-07-2017
I have a personal laptop running Ubuntu 16.04 that has an encrypted volume. In addition to that you can change the ssh port to something other than 22. I use a number well over 1,000. You can try port knocking, I haven't tried this yet, I just know its possible. You can also turn off passwords and require public/private key based cert logins. Not to mention close ports and turn off daemons that you are not going to use.

I think disk based encryption is great for laptops. But if this is a server and your server room is secure, you should not need this. What happens when there is an unplanned outage and the person/people with the encryption password are not available? Are you going to write the password on a sticky note on the server??? ;-)
This User Gave Thanks to gandolf989 For This Post:
 

9 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

encryption is possible??

NEED expertise help for this topic!!! Question 1: Is encryption possible for the shell scriping programing? shadow the scriping file, do think is impossible... Question2: built a simple program with the simplicity function that allow user change settings by enter corret name and... (3 Replies)
Discussion started by: trynew
3 Replies

2. UNIX for Dummies Questions & Answers

File encryption/Key encryption ????

My dilemma, I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies

3. Linux

It is possible to find out when a particular encryption key was imported in linux

Hi All, In linux server some encryption keys were imported using gpg command. I want to know when those keys was imported. Is there any way to get when the encryption keys were imported? Thanks in advance.. :rolleyes: (1 Reply)
Discussion started by: latika
1 Replies

4. Ubuntu

help regarding encryption and decryption of files on linux

we are to develope a project on linux whose aim is to automatically encrypt files after logoff and to decrypt them using password after log in this is to be made by chging source code of linux ........... can any one help me on this???? (1 Reply)
Discussion started by: vyom
1 Replies

5. Cybersecurity

Linux Encryption methods

Hi all, I am looking to encrypt a filesystem with a CentOS 6.4 install. However I note that when using LUKS the system does not boot without prompting for the password encryption key. I am looking for an drive/filesystem encryption solution which will allow reboots and shutdown/starts of the... (4 Replies)
Discussion started by: landossa
4 Replies

6. Cybersecurity

File encryption tools with MAC address as an encryption key

Hi all, I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS. For example: when A wants to send file to B A will encrypt the file with B's computer MAC/IP address as an encryption key This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies

7. Cybersecurity

How to protect Linux by full disk encryption?

Hello, you may know that linux root password can be resetted (example from rescue mode), so this means linux server offers no protection against access of data when you get somehow remote or physical access to server? So my question is how i can full encrypt linux webserver disk so no one can... (1 Reply)
Discussion started by: postcd
1 Replies

8. Shell Programming and Scripting

Data Encryption

Using awk or sed command how can i encrypt the characters for a particular column.For every character it should replace the third charter of alphabets.Example replace "A" with "C" and "B" with "D"..like this it should replace for all characters in particular column. Using below command i am able... (3 Replies)
Discussion started by: katakamvivek
3 Replies

9. AIX

Tape Encryption

Hi guys: I've been trying to find information about how to encrypt a backup to tape (I'm using a couple of simple commands: tar, find | backup), I didn't find a real example of how to do that, just a couple of white papers and information about the methods that use the backup,... (5 Replies)
Discussion started by: AixExplorer
5 Replies
DES_CRYPT(3)						     Linux Programmer's Manual						      DES_CRYPT(3)

NAME
des_crypt, ecb_crypt, cbc_crypt, des_setparity, DES_FAILED - fast DES encryption SYNOPSIS
#include <rpc/des_crypt.h> int ecb_crypt(char *key, char *data, unsigned datalen, unsigned mode); int cbc_crypt(char *key, char *data, unsigned datalen, unsigned mode, char *ivec); void des_setparity(char *key); int DES_FAILED(int status); DESCRIPTION
ecb_crypt() and cbc_crypt() implement the NBS DES (Data Encryption Standard). These routines are faster and more general purpose than crypt(3). They also are able to utilize DES hardware if it is available. ecb_crypt() encrypts in ECB (Electronic Code Book) mode, which encrypts blocks of data independently. cbc_crypt() encrypts in CBC (Cipher Block Chaining) mode, which chains together successive blocks. CBC mode protects against insertions, deletions and substitutions of blocks. Also, regularities in the clear text will not appear in the cipher text. Here is how to use these routines. The first argument, key, is the 8-byte encryption key with parity. To set the key's parity, which for DES is in the low bit of each byte, use des_setparity(). The second argument, data, contains the data to be encrypted or decrypted. The third argument, datalen, is the length in bytes of data, which must be a multiple of 8. The fourth argument, mode, is formed by ORing together some things. For the encryption direction OR in either DES_ENCRYPT or DES_DECRYPT. For software versus hardware encryption, OR in either DES_HW or DES_SW. If DES_HW is specified, and there is no hardware, then the encryption is performed in software and the routine returns DESERR_NOHWDEVICE. For cbc_crypt(), the argument ivec is the 8-byte initialization vector for the chaining. It is updated to the next initialization vector upon return. RETURN VALUE
DESERR_NONE No error. DESERR_NOHWDEVICE Encryption succeeded, but done in software instead of the requested hardware. DESERR_HWERROR An error occurred in the hardware or driver. DESERR_BADPARAM Bad argument to routine. Given a result status stat, the macro DES_FAILED(stat) is false only for the first two statuses. VERSIONS
These routines are present in libc 4.6.27 and later, and in glibc 2.1 and later. CONFORMING TO
4.3BSD. Not in POSIX.1-2001. SEE ALSO
des(1), crypt(3), xcrypt(3) COLOPHON
This page is part of release 3.44 of the Linux man-pages project. A description of the project, and information about reporting bugs, can be found at http://www.kernel.org/doc/man-pages/. 2007-05-18 DES_CRYPT(3)
All times are GMT -4. The time now is 06:07 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy