1
0
mirror of https://github.com/Spearfoot/FreeNAS-scripts synced 2025-12-06 01:23:19 +00:00

Changed encryption/decryption examples

This commit is contained in:
Keith Nash
2021-03-08 21:10:51 -06:00
committed by GitHub
parent 862784e5b6
commit 9601c07cfe

View File

@@ -98,13 +98,17 @@ The script uses `tar` to store the configuration and password secret seed files
`openssl enc -e -aes-256-cbc -md sha512 -salt -S "$(openssl rand -hex 4)" -pass file:[passphrase_file] -in [tarball] -out [encrypted_tarball]`
To decrypt the email attachment, use this command on your FreeNAS system:
`openssl enc -d -aes-256-cbc -md sha512 -pass file:[passphrase_file] -in [encrypted_file] -out [unencrypted_file]`
For version 12.x of FreeNAS we add the new OpenSSL v1.1.1 options `-pbkdf2` and `-iter` thus:
`openssl enc -e -aes-256-cbc -md sha512 -pbkdf2 -iter 128000 -salt -S "$(openssl rand -hex 8)" -pass file:[passphrase_file] -in [tarball] -out [encrypted_tarball]`
To decrypt the email attachment, use this command on your FreeNAS system:
`openssl enc -d -aes-256-cbc -md sha512 -pass file:[passphrase_file] -in [encrypted_file] -out [unencrypted_file]`
`openssl enc -d -aes-256-cbc -md sha512 -pbkdf2 -iter 128000 -pass file:[passphrase_file] -in [encrypted_file] -out [unencrypted_file]`
In the above commands:
* `passphrase_file` is a file containing the same passphrase you configured on your FreeNAS server