3 .\" Author: Kevin Till <kevin.till@zmanda.com>
4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
6 .\" Manual: System Administration Commands
7 .\" Source: Amanda 3.3.3
10 .TH "AMGPGCRYPT" "8" "01/10/2013" "Amanda 3\&.3\&.3" "System Administration Commands"
11 .\" -----------------------------------------------------------------
12 .\" * Define some portability stuff
13 .\" -----------------------------------------------------------------
14 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
15 .\" http://bugs.debian.org/507673
16 .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html
17 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
20 .\" -----------------------------------------------------------------
21 .\" * set default formatting
22 .\" -----------------------------------------------------------------
23 .\" disable hyphenation
25 .\" disable justification (adjust text to left margin only)
27 .\" -----------------------------------------------------------------
28 .\" * MAIN CONTENT STARTS HERE *
29 .\" -----------------------------------------------------------------
31 amgpgcrypt \- reference crypt program for Amanda public\-key data encryption
33 .HP \w'\fBamgpgcrypt\fR\ 'u
34 \fBamgpgcrypt\fR to be called by Amanda only
41 to perform public\-key data encryption on Amanda backup\&.
43 will search for the gpg program in the following directories: /usr/local/bin:/usr/bin:/usr/sbin:/bin:/sbin
47 sets GNUPGHOME to $AMANDA_HOME/\&.gnupg where gpg will look for the gpg keys\&.
49 uses the public key to encrypt the Amanda data and uses the private key to decrypt the Amanda backup data\&. Thus, passphrase is only required at the time of data restore\&.
50 .SH "KEY AND PASSPHRASE"
54 uses the private key to decrypt Amanda backup data\&.
56 It is very important to store, manage and protect the key and the passphrase
57 properly\&. Encrypted backup data can \fBonly\fR be recovered with the correct key and
59 .SH "HOW TO CREATE ENCRYPTION KEYS AND PASSPHRASE FOR AMGPGCRYPT"
61 Store the passphrase that you used in following "gpg \-\-gen\-key" command inside the home\-directory of the AMANDA\-user($amanda_user) and protect it with proper permissions:
63 echo my_secret_passphrase > ~$amanda_user/\&.am_passphrase
64 chown $amanda_user:disk ~$amanda_user/\&.am_passphrase
65 chmod 700 ~$amanda_user/\&.am_passphrase
67 Run "gpg \-\-gen\-key"\&. Below is an example:
70 gpg (GnuPG) 1\&.2\&.6; Copyright (C) 2004 Free Software Foundation, Inc\&.
71 This program comes with ABSOLUTELY NO WARRANTY\&.
72 This is free software, and you are welcome to redistribute it
73 under certain conditions\&. See the file COPYING for details\&.
75 Please select what kind of key you want:
76 (1) DSA and ElGamal (default)
80 DSA keypair will have 1024 bits\&.
81 About to generate a new ELG\-E keypair\&.
82 minimum keysize is 768 bits
83 default keysize is 1024 bits
84 highest suggested keysize is 2048 bits
85 What keysize do you want? (1024)
86 Requested keysize is 1024 bits
87 Please specify how long the key should be valid\&.
88 0 = key does not expire
89 (n) = key expires in n days
90 (n)w = key expires in n weeks
91 (n)m = key expires in n months
92 (n)y = key expires in n years
93 Key is valid for? (0) 6m
94 Key expires at Sun 06 Aug 2006 03:51:25 PM PDT
95 Is this correct (y/n)? y
97 You need a User\-ID to identify your key; the software constructs the user id
98 from Real Name, Comment and Email Address in this form:
99 "Heinrich Heine (Der Dichter) (heinrichh@duesseldorf\&.de)"
103 Comment: gpg keys for backup
104 You selected this USER\-ID:
105 "backup (gpg keys for backup)"
107 Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o
108 You need a Passphrase to protect your secret key\&.
110 We need to generate a lot of random bytes\&. It is a good idea to perform
111 some other action (type on the keyboard, move the mouse, utilize the
112 disks) during the prime generation; this gives the random number
113 generator a better chance to gain enough entropy\&.
115 We need to generate a lot of random bytes\&. It is a good idea to perform
116 some other action (type on the keyboard, move the mouse, utilize the
117 disks) during the prime generation; this gives the random number
118 generator a better chance to gain enough entropy\&.
120 public and secret key created and signed\&.
121 key marked as ultimately trusted\&.
123 pub 1024D/4417A8CB 2006\-02\-07 backup (gpg keys for backup)
124 Key fingerprint = 139C 6369 44FC 7F1A 655C E5E9 7EAA 515A 4417 A8CB
125 sub 1024g/8C3A6A78 2006\-02\-07 [expires: 2006\-08\-06]
129 \fB$AMANDA_HOME/\&.gnupg/pubring\&.gpg\fR
133 encrypt data with this public key along with the cipher algorithm\&.
136 \fB$AMANDA_HOME/\&.gnupg/secring\&.gpg\fR
138 The private/secret key\&. It\*(Aqs only needed during amrecover/amrestore\&. Store and protect it properly during other time\&.
141 \fB$AMANDA_HOME/\&.am_passphrase\fR
143 The passphrase\&. It\*(Aqs only needed during amrecover/amrestore\&. Store and protect it properly during other time\&.
147 Amanda has problem with gpg mdc(modification detection code) in the binary mode\&.
149 calls gpg with mdc disabled
153 \fBamanda.conf\fR(5),
159 : http://wiki.zmanda.com/
162 \fBKevin Till\fR <\&kevin\&.till@zmanda\&.com\&>
164 Zmanda, Inc\&. (http://www\&.zmanda\&.com)