summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGravatar wsha.code+ga@b38779424f41c5701bbe5937340be43ff1474b2d <wsha.code+ga@b38779424f41c5701bbe5937340be43ff1474b2d@web>2015-12-14 12:04:46 +0000
committerGravatar admin <admin@branchable.com>2015-12-14 12:04:46 +0000
commit5d56cbc3b96c1d80c33e9b914a977c839ccd0c73 (patch)
treec9a1cfb20097816502c536f5f06c9e42c60c43d3
parent98b1eeb29e9d76ff1ec4f02c91c9b4bb91dd0875 (diff)
removed
-rw-r--r--doc/forum/Future_proofing___47___disaster_recovery_with_an_encrypted_special_remote/comment_4_c6a6f8f50e282ab9b4bc38e19d6d69eb._comment11
1 files changed, 0 insertions, 11 deletions
diff --git a/doc/forum/Future_proofing___47___disaster_recovery_with_an_encrypted_special_remote/comment_4_c6a6f8f50e282ab9b4bc38e19d6d69eb._comment b/doc/forum/Future_proofing___47___disaster_recovery_with_an_encrypted_special_remote/comment_4_c6a6f8f50e282ab9b4bc38e19d6d69eb._comment
deleted file mode 100644
index d98ad8fab..000000000
--- a/doc/forum/Future_proofing___47___disaster_recovery_with_an_encrypted_special_remote/comment_4_c6a6f8f50e282ab9b4bc38e19d6d69eb._comment
+++ /dev/null
@@ -1,11 +0,0 @@
-[[!comment format=mdwn
- username="wsha.code+ga@b38779424f41c5701bbe5937340be43ff1474b2d"
- subject="comment 4"
- date="2015-12-14T12:03:58Z"
- content="""
-Small update: I have gotten the HMAC and decryption steps to work for shared encryption. I didn't figure out what was wrong with my HMAC command above yet, but I was able to reproduce the special remote's keys in Python using the `hmac` and `hashlib` libraries. I was trying to hash the correct string in the comment above (the full key with the `SHA...` prefix and the file extension suffix). For decryption, I used `gpg` on the encrypted file in the special remote and passed it the cipher from `remote.log` with the first 256 bytes removed as the passphrase (in the format returned by `base64.b64decode()` in Python).
-
-I still need to figure out how to decrypt the ciphers for `pubkey` and `hybrid`.
-
-I will try to put together a tip with the steps needed to reproduce special remote keys and to decrypt special remote files using only command line tools after that (assuming I can translate the Python steps back to command line tools; otherwise part of the steps will be in Python).
-"""]]