From owner-freebsd-questions@FreeBSD.ORG Tue Feb 6 01:13:24 2007 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 62BF816A400 for ; Tue, 6 Feb 2007 01:13:22 +0000 (UTC) (envelope-from mike@sentex.net) Received: from smarthost2.sentex.ca (smarthost2.sentex.ca [205.211.164.50]) by mx1.freebsd.org (Postfix) with ESMTP id 3322813C441 for ; Tue, 6 Feb 2007 01:13:21 +0000 (UTC) (envelope-from mike@sentex.net) Received: from BLUELAPIS.sentex.ca (cage.simianscience.com [64.7.134.1]) by smarthost2.sentex.ca (8.13.8/8.13.8) with SMTP id l161DL1O073143; Mon, 5 Feb 2007 20:13:21 -0500 (EST) (envelope-from mike@sentex.net) From: Mike Tancsa To: "Dak Ghatikachalam" Date: Mon, 05 Feb 2007 20:13:26 -0500 Message-ID: References: <20070205180250.b665f278.wmoran@collaborativefusion.com> In-Reply-To: X-Mailer: Forte Agent 1.93/32.576 English (American) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Cc: freebsd-questions@freebsd.org Subject: Re: Question:encryption tool X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Feb 2007 01:13:24 -0000 On Mon, 5 Feb 2007 18:21:18 -0500, in sentex.lists.freebsd.questions you wrote: > >Thanks a lot, Our current backup system is veritas netbackup, and = changing >that to entire bacula is best thing for me, > >But the making the decision about switching to bacula was above my pay >grade. I hardly see that happen anytime soon. > >so they wanted me encrypt these files, that is on the backup location >before the netbackup scheduler picks up these files. If you just want to encrypt the files with a password, openssl works well and can be found pretty well on any platform. [cage]% echo "this is a test" | openssl enc -aes-128-cbc -base64 -k pass U2FsdGVkX1+gkWRJo5W7PGBLpilZmlEx3+cKML+32to=3D [cage]% [cage]% [cage]% echo "U2FsdGVkX1+gkWRJo5W7PGBLpilZmlEx3+cKML+32to=3D" | openssl aes-128-cbc -d -base64 -k pass this is a test [cage]% But you really want to take a look at /usr/ports/security/gnupg. It seems all a bit confusing at first, but its a much better way to encrypt data and manage who has access to decode files without having to use a common passphrase. It as well will work across multiple platforms=20 ---Mike -------------------------------------------------------- Mike Tancsa, Sentex communications http://www.sentex.net Providing Internet Access since 1994 mike@sentex.net, (http://www.tancsa.com)