linux operating commands and unix operating commands

Disk encryption driver hole exposes encryption key


 
Thread Tools Search this Thread
# 1  
Old 01-14-2009
Disk encryption driver hole exposes encryption key

See today's DHS DailyOpen Source Infrastructure Report (DOSIR) for information regarding potentialdisk encryption compromise as well as a countermeasure which has already beeninstalled in one product.  Is it the onewhich you are using? 


The report isavailable at http://www.dhs.gov/xlibrary/assets/D...2009-01-14.pdffor the next two weeks.  Later, it can befound at http://www.hspig.org/phpbb/viewforum.php?f=20.

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Private and public key encryption

Hi, we have private and public key, encrypt file using public and want to decrypt using private key. can you please advise below commands are correct or other remedy if unix have? encrypt -a arcfour -k publickey.asc -i TESTFILE.csv -o TESTFILE00.csv decrypt -a arcfour -k privatekey.asc... (2 Replies)
Discussion started by: rizwan.shaukat
2 Replies

2. Cybersecurity

How to protect Linux by full disk encryption?

Hello, you may know that linux root password can be resetted (example from rescue mode), so this means linux server offers no protection against access of data when you get somehow remote or physical access to server? So my question is how i can full encrypt linux webserver disk so no one can... (1 Reply)
Discussion started by: postcd
1 Replies

3. Cybersecurity

File encryption tools with MAC address as an encryption key

Hi all, I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS. For example: when A wants to send file to B A will encrypt the file with B's computer MAC/IP address as an encryption key This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies

4. Linux

It is possible to find out when a particular encryption key was imported in linux

Hi All, In linux server some encryption keys were imported using gpg command. I want to know when those keys was imported. Is there any way to get when the encryption keys were imported? Thanks in advance.. :rolleyes: (1 Reply)
Discussion started by: latika
1 Replies

5. Shell Programming and Scripting

Perl and encryption

Basically, I'm wondering if there's an easy way to encrypt the password to a username and store it in MySQL. But being able to authenticate to it. (3 Replies)
Discussion started by: adelsin
3 Replies

6. UNIX for Dummies Questions & Answers

Remove VI encryption key from file

Hi There, I have set encryption key to my file using :X command. Now that I no more need encryption key to the file, I just want to delete/remove the encryption key. I have gone through many source but in vain. None of the source provided me with the solution that I am looking for. I... (2 Replies)
Discussion started by: grc
2 Replies

7. UNIX for Dummies Questions & Answers

VIM: Encryption key.

I'm having one doubt about the VIM ENCRYPTION key. I having a text file, I encrypted that file using :X vim -x filename Now, where the encrypted key is stored (path). Whether it stored in a separate file or the text file itself. If I open a the file it asked Encryption key. How it compare... (1 Reply)
Discussion started by: ungalnanban
1 Replies

8. UNIX for Dummies Questions & Answers

File encryption/Key encryption ????

My dilemma, I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies

9. Programming

Encryption Tutorials

Hi , I would like to know how to write encrytion functions in c++ in linux environment.so would like u get some tutorials on the topic. Can anyone help (1 Reply)
Discussion started by: wojtyla
1 Replies

10. Shell Programming and Scripting

encryption is possible??

NEED expertise help for this topic!!! Question 1: Is encryption possible for the shell scriping programing? shadow the scriping file, do think is impossible... Question2: built a simple program with the simplicity function that allow user change settings by enter corret name and... (3 Replies)
Discussion started by: trynew
3 Replies
Login or Register to Ask a Question
SMBTA-UTIL(8)						    System Administration tools 					     SMBTA-UTIL(8)

NAME
smbta-util - control encryption in VFS smb_traffic_analyzer SYNOPSIS
smbta-util smbta-util [COMMANDS...] DESCRIPTION
This tool is part of the samba(1) suite. smbta-util is a tool to ease the configuration of the vfs_smb_traffic_analyzer module regarding data encryption. The user can generate a key, install a key (activating encryption), or uninstall a key (deactivating encryption). Any operation that installs a key will create a File containing the key. This file can be used by smbta-tool on other machines to install the same key from the file. COMMANDS
-h Show a short help text on the command line. -f KEYFILE Open an existing keyfile, read the key from the file, and install the key, activating encryption. -g KEYFILE Generate a new random key, install the key, activate encryption, and store the key into the file KEYFILE. -u Uninstall the key, deactivating encryption. -s Check if a key is installed. -c KEYFILE Create a KEYFILE from an installed key. VERSION
This man page is correct for version 3.4 of the Samba suite. AUTHOR
The original version of smbta-util was created by Holger Hetterich. The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed. Samba 3.6 03/29/2010 SMBTA-UTIL(8)