1 .\"Generated by db2man.xsl. Don't modify this, modify the source.
10 .de Sp \" Vertical space (when we can't use .PP)
16 .ie \\n(.$>=3 .ne \\$3
20 .TH "AMCRYPT" 8 "" "" ""
22 amcrypt - reference crypt program for Amanda symmetric data encryption
34 to work. Aespipe is available from
35 : http://loop-aes.sourceforge.net
38 will search for the aespipe program in the following directories: /usr/bin:/usr/local/bin:/sbin:/usr/sbin.
39 \fBamcrypt\fR calls \fBamaespipe\fR and pass the
40 \fBpassphrase\fR through file descriptor 3.
41 The passphrase should be stored in ~amanda/.am_passphrase.
42 .SH "HOW TO CREATE ENCRYPTION KEYS FOR AMCRYPT"
44 1. Create 65 random encryption keys and encrypt those keys using gpg. Reading
45 from /dev/random may take indefinitely long if kernel's random entropy pool
46 is empty. If that happens, do some other work on some other console (use
47 keyboard, mouse and disks).
49 head -c 2925 /dev/random | uuencode -m - | head -n 66 | tail -n 65 \ | gpg --symmetric -a > ~amanda/.gnupg/am_key.gpg
51 This will ask for a passphrase. Remember this passphrase as you will need it in the next step.
53 2. Store the passphrase inside the home-directory of the AMANDA-user and protect it with proper permissions:
56 echo my_secret_passphrase > ~amanda/.am_passphrase
57 chown amanda:disk ~amanda/.am_passphrase
58 chmod 700 ~amanda/.am_passphrase
60 .SH "KEY AND PASSPHRASE"
63 uses the same key to encrypt and decrypt data.
65 It is very important to store and protect the key and the passphrase
66 properly. Encrypted backup data can \fBonly\fR be recovered with the correct key and