3 Prev Chapter 36. The Amanda Manual Pages. Next
5 -------------------------------------------------------------------------------
9 amcrypt
\14 reference crypt program for Amanda symmetric data encryption
17 amcrypt requires aespipe, uuencode and gpg to work. Aespipe is available from
18 http://loop-aes.sourceforge.net
19 amcrypt will search for the aespipe program in the following directories: /usr/
20 bin:/usr/local/bin:/sbin:/usr/sbin.
21 amcrypt calls amaespipe and pass the passphrase through file descriptor 3. The
22 passphrase should be stored in ~amanda/.am_passphrase.
24 How to create encryption keys for amcrypt
26 1. Create 65 random encryption keys and encrypt those keys using gpg. Reading
27 from /dev/random may take indefinitely long if kernel's random entropy pool is
28 empty. If that happens, do some other work on some other console (use keyboard,
30 head -c 2925 /dev/random | uuencode -m - | head -n 66 | tail -n 65 \ | gpg --
31 symmetric -a > ~amanda/.gnupg/am_key.gpg
32 This will ask for a passphrase. Remember this passphrase as you will need it in
34 2. Store the passphrase inside the home-directory of the AMANDA-user and
35 protect it with proper permissions:
37 echo my_secret_passphrase > ~amanda/.am_passphrase
38 chown amanda:disk ~amanda/.am_passphrase
39 chmod 700 ~amanda/.am_passphrase
44 amcrypt uses the same key to encrypt and decrypt data.
45 It is very important to store and protect the key and the passphrase properly.
46 Encrypted backup data can only be recovered with the correct key and
51 amanda(8), amanda.conf(5), aespipe(1), amaespipe(8), gpg(1)
52 -------------------------------------------------------------------------------
55 amcleanup Home amcrypt-ossl