diff options
Diffstat (limited to 'tools/rscryutil.1')
-rw-r--r-- | tools/rscryutil.1 | 205 |
1 files changed, 0 insertions, 205 deletions
diff --git a/tools/rscryutil.1 b/tools/rscryutil.1 deleted file mode 100644 index c5083ee..0000000 --- a/tools/rscryutil.1 +++ /dev/null @@ -1,205 +0,0 @@ -.\" Man page generated from reStructuredText. -. -.TH RSCRYUTIL 1 "2013-04-15" "" "" -.SH NAME -rscryutil \- Manage Encrypted Log Files -. -.nr rst2man-indent-level 0 -. -.de1 rstReportMargin -\\$1 \\n[an-margin] -level \\n[rst2man-indent-level] -level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] -- -\\n[rst2man-indent0] -\\n[rst2man-indent1] -\\n[rst2man-indent2] -.. -.de1 INDENT -.\" .rstReportMargin pre: -. RS \\$1 -. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] -. nr rst2man-indent-level +1 -.\" .rstReportMargin post: -.. -.de UNINDENT -. RE -.\" indent \\n[an-margin] -.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] -.nr rst2man-indent-level -1 -.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] -.in \\n[rst2man-indent\\n[rst2man-indent-level]]u -.. -.SH SYNOPSIS -.INDENT 0.0 -.INDENT 3.5 -.sp -.nf -.ft C -rscryutil [OPTIONS] [FILE] ... -.ft P -.fi -.UNINDENT -.UNINDENT -.SH DESCRIPTION -.sp -This tool performs various operations on encrypted log files. -Most importantly, it provides the ability to decrypt them. -.SH OPTIONS -.INDENT 0.0 -.TP -.B \-d, \-\-decrypt -Select decryption mode. This is the default mode. -.TP -.BI \-W, \-\-write\-keyfile \ <file> -Utility function to write a key to a keyfile. The key can be obtained -via any method. -.TP -.B \-v, \-\-verbose -Select verbose mode. -.TP -.B \-f, \-\-force -Forces operations that otherwise would fail. -.TP -.BI \-k, \-\-keyfile \ <file> -Reads the key from <file>. File _must_ contain the key, only, no headers -or other meta information. Keyfiles can be generated via the -\fI\-\-write\-keyfile\fP option. -.TP -.BI \-p, \-\-key\-program \ <path\-to\-program> -In this mode, the key is provided by a so\-called "key program". This program -is executed and must return the key to (as well as some meta information) -via stdout. The core idea of key programs is that using this interface the -user can implement as complex (and secure) method to obtain keys as -desired, all without the need to make modifications to rsyslog. -.TP -.BI \-K, \-\-key \ <KEY> -TESTING AID, NOT FOR PRODUCTION USE. This uses the KEY specified -on the command line. This is the actual key, and as such this mode -is highly insecure. However, it can be useful for intial testing -steps. This option may be removed in the future. -.TP -.BI \-a, \-\-algo \ <algo> -Sets the encryption algorightm (cipher) to be used. See below -for supported algorithms. The default is "AES128". -.TP -.BI \-m, \-\-mode \ <mode> -Sets the ciphermode to be used. See below for supported modes. -The default is "CBC". -.TP -.BI \-r, \-\-generate\-random\-key \ <bytes> -Generates a random key of length <bytes>. This option is -meant to be used together with \fI\-\-write\-keyfile\fP (and it is hard -to envision any other valid use for it). -.UNINDENT -.SH OPERATION MODES -.sp -The operation mode specifies what exactly the tool does with the provided -files. The default operation mode is "dump", but this may change in the future. -Thus, it is recommended to always set the operations mode explicitely. If -multiple operations mode are set on the command line, results are -unpredictable. -.SS decrypt -.sp -The provided log files are decrypted. Note that the \fI.encinfo\fP side files -must exist and be accessible in order for decryption to to work. -.SS write\-keyfile -.sp -In this mode no log files are processed; thus it is an error to specify -any on the command line. The specified keyfile is written. The key itself -is obtained via the usual key commands. If \fI\-\-keyfile\fP is used, that -file is effectively copied. -.sp -For security reasons, existing key files are _not_ overwritten. To permit -this, specify the \fI\-\-force\fP option. When doing so, keep in mind that lost -keys cannot be recovered and data encrypted with them may also be considered -lost. -.sp -Keyfiles are always created with 0400 permission, that is read access for only -the user. An exception is when an existing file is overwritten via the -\fI\-\-force\fP option, in which case the former permissions still apply. -.SH EXIT CODES -.sp -The command returns an exit code of 0 if everything went fine, and some -other code in case of failures. -.SH SUPPORTED ALGORITHMS -.sp -We basically support what libgcrypt supports. This is: -.INDENT 0.0 -.INDENT 3.5 -3DES -CAST5 -BLOWFISH -AES128 -AES192 -AES256 -TWOFISH -TWOFISH128 -ARCFOUR -DES -SERPENT128 -SERPENT192 -SERPENT256 -RFC2268_40 -SEED -CAMELLIA128 -CAMELLIA192 -CAMELLIA256 -.UNINDENT -.UNINDENT -.SH SUPPORTED CIPHER MODES -.sp -We basically support what libgcrypt supports. This is: -.INDENT 0.0 -.INDENT 3.5 -ECB -CFB -CBC -STREAM -OFB -CTR -AESWRAP -.UNINDENT -.UNINDENT -.SH EXAMPLES -.sp -\fBrscryutil logfile\fP -.sp -Decrypts "logfile" and sends data to stdout. -.sp -\fBrscryutil \-\-generate\-random\-key 16 \-\-keyfile /some/secured/path/keyfile\fP -.sp -Generates random key and stores it in the specified keyfile. -.SH LOG SIGNATURES -.sp -Encrypted log files can be used together with signing. To verify such a file, -it must be decrypted first, and the verification tool \fBrsgtutil(1)\fP must be -run on the decrypted file. -.SH SECURITY CONSIDERATIONS -.sp -Specifying keys directly on the command line (\fI\-\-key\fP option) is very -insecure and should -not be done, except for testing purposes with test keys. Even then it is -recommended to use keyfiles, which are also easy to handle during testing. -Keep in mind that command history is usally be kept by bash and can also -easily be monitored. -.sp -Local keyfiles are also a security risk. At a minimum, they should be -used with very restrictive file permissions. For this reason, -the \fIrscryutil\fP tool creates them with read permissions for the user, -only, no matter what umask is set to. -.sp -When selecting cipher algorithms and modes, care needs to be taken. The -defaults should be reasonable safe to use, but this tends to change over -time. Keep up with the most current crypto recommendations. -.SH SEE ALSO -.sp -\fBrsgtutil(1)\fP, \fBrsyslogd(8)\fP -.SH COPYRIGHT -.sp -This page is part of the \fIrsyslog\fP project, and is available under -LGPLv2. -.SH AUTHOR -Rainer Gerhards <rgerhards@adiscon.com> -.\" Generated by docutils manpage writer. -. |