X-Git-Url: https://git.gag.com/?a=blobdiff_plain;f=man%2Famcrypt.8;h=41b351234bd13f91302a9faf5a599dac7954c33b;hb=94a044f90357edefa6f4ae9f0b1d5885b0e34aee;hp=07fab4ab5587493e1b645c1ee020193a01ea8b4f;hpb=d3b2175e084f88c8736ad7073eacbf4670147aec;p=debian%2Famanda diff --git a/man/amcrypt.8 b/man/amcrypt.8 index 07fab4a..41b3512 100644 --- a/man/amcrypt.8 +++ b/man/amcrypt.8 @@ -1,17 +1,17 @@ .\" Title: amcrypt .\" Author: -.\" Generator: DocBook XSL Stylesheets v1.72.0 -.\" Date: 06/06/2007 +.\" Generator: DocBook XSL Stylesheets v1.73.2 +.\" Date: 03/31/2008 .\" Manual: .\" Source: .\" -.TH "AMCRYPT" "8" "06/06/2007" "" "" +.TH "AMCRYPT" "8" "03/31/2008" "" "" .\" disable hyphenation .nh .\" disable justification (adjust text to left margin only) .ad l .SH "NAME" -amcrypt \- reference crypt program for Amanda symmetric data encryption +amcrypt - reference crypt program for Amanda symmetric data encryption .SH "SYNOPSIS" .HP 8 \fBamcrypt\fR @@ -24,12 +24,12 @@ requires \fBuuencode\fR and \fBgpg\fR -to work. Aespipe is available from -\fI\%http://loop\-aes.sourceforge.net\fR +to work\. Aespipe is available from +\fI\%http://loop-aes.sourceforge.net\fR .PP \fBamcrypt\fR -will search for the aespipe program in the following directories: /usr/bin:/usr/local/bin:/sbin:/usr/sbin. +will search for the aespipe program in the following directories: /usr/bin:/usr/local/bin:/sbin:/usr/sbin\. .PP \fBamcrypt\fR @@ -37,37 +37,38 @@ calls \fBamaespipe\fR and pass the \fBpassphrase\fR -through file descriptor 3. The passphrase should be stored in ~amanda/.am_passphrase. +through file descriptor 3\. The passphrase should be stored in ~amanda/\.am_passphrase\. .SH "HOW TO CREATE ENCRYPTION KEYS FOR AMCRYPT" .PP -1. Create 65 random encryption keys and encrypt those keys using gpg. Reading from /dev/random may take indefinitely long if kernel's random entropy pool is empty. If that happens, do some other work on some other console (use keyboard, mouse and disks). +1\. Create 65 random encryption keys and encrypt those keys using gpg\. Reading from /dev/random may take indefinitely long if kernel\'s random entropy pool is empty\. If that happens, do some other work on some other console (use keyboard, mouse and disks)\. .PP -head \-c 2925 /dev/random | uuencode \-m \- | head \-n 66 | tail \-n 65 \e | gpg \-\-symmetric \-a > ~amanda/.gnupg/am_key.gpg +head \-c 2925 /dev/random | uuencode \-m \- | head \-n 66 | tail \-n 65 \e | gpg \-\-symmetric \-a > ~amanda/\.gnupg/am_key\.gpg .PP -This will ask for a passphrase. Remember this passphrase as you will need it in the next step. +This will ask for a passphrase\. Remember this passphrase as you will need it in the next step\. .PP -2. Store the passphrase inside the home\-directory of the AMANDA\-user and protect it with proper permissions: +2\. Store the passphrase inside the home\-directory of the AMANDA\-user and protect it with proper permissions: .sp .RS 4 .nf -echo my_secret_passphrase > ~amanda/.am_passphrase -chown amanda:disk ~amanda/.am_passphrase -chmod 700 ~amanda/.am_passphrase +echo my_secret_passphrase > ~amanda/\.am_passphrase +chown amanda:disk ~amanda/\.am_passphrase +chmod 700 ~amanda/\.am_passphrase .fi .RE .SH "KEY AND PASSPHRASE" .PP \fBamcrypt\fR -uses the same key to encrypt and decrypt data. +uses the same key to encrypt and decrypt data\. .PP -It is very important to store and protect the key and the passphrase properly. Encrypted backup data can +It is very important to store and protect the key and the passphrase properly\. Encrypted backup data can \fBonly\fR -be recovered with the correct key and passphrase. +be recovered with the correct key and passphrase\. .SH "SEE ALSO" .PP \fBamanda\fR(8), \fBamanda.conf\fR(5), \fBaespipe\fR(1), \fBamaespipe\fR(8), -\fBgpg\fR(1) +\fBgpg\fR(1), +\fBhttp://wiki.zmanda.com\fR()