diff options
author | wsha.code+ga@b38779424f41c5701bbe5937340be43ff1474b2d <wsha.code+ga@b38779424f41c5701bbe5937340be43ff1474b2d@web> | 2015-12-14 12:03:23 +0000 |
---|---|---|
committer | admin <admin@branchable.com> | 2015-12-14 12:03:23 +0000 |
commit | 8f82c1aef3c9b503ef4266b563391ae25b161925 (patch) | |
tree | c9a1cfb20097816502c536f5f06c9e42c60c43d3 /doc | |
parent | 74f118ab702e2c3598a1565c129951b03764d11e (diff) |
Added a comment
Diffstat (limited to 'doc')
-rw-r--r-- | doc/forum/Future_proofing___47___disaster_recovery_with_an_encrypted_special_remote/comment_3_27901f1c2c5de211f697972d9b21c104._comment | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/doc/forum/Future_proofing___47___disaster_recovery_with_an_encrypted_special_remote/comment_3_27901f1c2c5de211f697972d9b21c104._comment b/doc/forum/Future_proofing___47___disaster_recovery_with_an_encrypted_special_remote/comment_3_27901f1c2c5de211f697972d9b21c104._comment new file mode 100644 index 000000000..fe0187145 --- /dev/null +++ b/doc/forum/Future_proofing___47___disaster_recovery_with_an_encrypted_special_remote/comment_3_27901f1c2c5de211f697972d9b21c104._comment @@ -0,0 +1,11 @@ +[[!comment format=mdwn + username="wsha.code+ga@b38779424f41c5701bbe5937340be43ff1474b2d" + subject="comment 3" + date="2015-12-14T12:03:22Z" + content=""" +Small update: I have gotten the HMAC and decryption steps to work for shared encryption. I didn't figure out what was wrong with my HMAC command above yet, but I was able to reproduce the special remote's keys in Python using the `hmac` and `hashlib` libraries. I was trying to hash the correct string in the comment above (the full key with the `SHA...` prefix and the file extension suffix). For decryption, I used `gpg` on the encrypted file in the special remote and passed it the cipher from `remote.log` with the first 256 bytes removed as the passphrase (in the format returned by `base64.b64decode()` in Python). + +I still need to figure out how to decrypt the ciphers for `pubkey` and `hybrid`. + +I will try to put together a tip with the steps needed to reproduce special remote keys and to decrypt special remote files using only command line tools after that (assuming I can translate the Python steps back to command line tools; otherwise part of the steps will be in Python). +"""]] |