issue87:securite
Différences
Ci-dessous, les différences entre deux révisions de la page.
Les deux révisions précédentesRévision précédenteProchaine révision | Révision précédente | ||
issue87:securite [2015/01/08 15:02] – d52fr | issue87:securite [2015/01/10 19:04] (Version actuelle) – auntiee | ||
---|---|---|---|
Ligne 4: | Ligne 4: | ||
I should also mention that not all of these are open source, but all are free to use.** | I should also mention that not all of these are open source, but all are free to use.** | ||
+ | |||
+ | Avec la possible disparition de Truecrypt, je pensais que le moment était venu de chercher une application de chiffrement similaire. Après un certain temps, il est devenu clair que Truecrypt est particulier car, d' | ||
+ | |||
+ | Ubuntu est très bon pour chiffrer les disques et les partitions avec ses outils de chiffrement intégrés. ENCFS est utile pour chiffrer les dossiers et les fichiers. AESCrypt facilite le chiffrement d'un fichier à transmettre à quelqu' | ||
+ | |||
+ | Je dois aussi vous dire qu' | ||
**AESCrypt | **AESCrypt | ||
AESCrypt requires you to go to www.aescrypt.com/ | AESCrypt requires you to go to www.aescrypt.com/ | ||
+ | |||
+ | AESCrypt nécessite que vous alliez à www.aescrypt.com/ | ||
** I have pretty much copied the commands and description from the relevant part of the manual on the website. Suppose you have a file called " | ** I have pretty much copied the commands and description from the relevant part of the manual on the website. Suppose you have a file called " | ||
Ligne 22: | Ligne 30: | ||
You can do all sorts of whizzy things with piping and scripts but there are other tools which, it seems to me me, are better at encrypting multiple files. I should also mention that when you encrypt a file using AESCrypt, it does not delete the original but creates an encrypted file of the same name. If you would like more information then please do go to the above website where there is more information than you can shake a stick at.** | You can do all sorts of whizzy things with piping and scripts but there are other tools which, it seems to me me, are better at encrypting multiple files. I should also mention that when you encrypt a file using AESCrypt, it does not delete the original but creates an encrypted file of the same name. If you would like more information then please do go to the above website where there is more information than you can shake a stick at.** | ||
+ | |||
+ | J'ai copié pas mal des commandes et leur description depuis la partie correspondante du manuel sur le site Web. Supposez que vous ayez un fichier nommé « motsdepasse.txt » que vous aimeriez chiffrer en utilisant le mot de passe « pommes ». Vous entreriez la commande suivante : | ||
+ | |||
+ | aescrypt -e -p pommes motsdepasse.txt | ||
+ | |||
+ | C'est tout ! Le programme a créé un fichier dont le nom est « motsdepasse.txt.aes ». Quand vous voudrez dechiffrer le fichier « motsdepasse.txt.aes », vous entrerez la commande suivante : | ||
+ | |||
+ | aescrypt -d -p pommes motsdepasse.txt.aes | ||
+ | |||
+ | Comment faire si vous voulez juste déchiffrer le fichier pour l' | ||
+ | |||
+ | aescrypt -d -o - motsdepasse.txt.aes | ||
+ | |||
+ | Vous pouvez faire des tas de choses techniques comme mettre en pipe et écrire des scripts, mais il y a d' | ||
**ENCFS | **ENCFS | ||
Ligne 29: | Ligne 51: | ||
Simple example follows; change the file path names as required: | Simple example follows; change the file path names as required: | ||
- | $ mkdir / | + | $ mkdir / |
- | **$ mkdir / | + | $ mkdir / |
+ | |||
+ | $ encfs / | ||
+ | |||
+ | ENCFS | ||
+ | |||
+ | ENCFS est dans les dépôts Ubuntu, aussi l' | ||
+ | Il fonctionne différemment, | ||
+ | |||
+ | Un exemple simple suit ; changez les noms des chemins suivant votre cas : | ||
+ | |||
+ | $ mkdir / | ||
+ | |||
+ | $ mkdir / | ||
$ encfs / | $ encfs / | ||
- | Volume key not found, creating new encrypted volume. | + | **Volume key not found, creating new encrypted volume. |
Password: [password entered here] | Password: [password entered here] | ||
Ligne 46: | Ligne 81: | ||
$ fusermount -u / | $ fusermount -u / | ||
+ | |||
+ | La clé du volume n' | ||
+ | |||
+ | Password : [Entrez votre mot de passe ici] | ||
+ | |||
+ | Verify : [Entrez votre mot de passe ici] | ||
+ | |||
+ | Le dossier avec point de montage peut être utilisé normalement dans votre gestionnaire de fichiers. | ||
+ | |||
+ | Pour verrouiller le point de montage quand vous avez fini de l' | ||
+ | |||
+ | $ fusermount -u / | ||
**Tomb | **Tomb | ||
Ligne 55: | Ligne 102: | ||
cd to the Tomb directory | cd to the Tomb directory | ||
- | sudo tomb dig -s 100 secret.tomb** | + | sudo tomb dig -s 100 secret.tomb |
- | **sudo tomb forge secret.tomb.key | + | sudo tomb forge secret.tomb.key |
sudo tomb lock secret.tomb -k secret.tomb.key | sudo tomb lock secret.tomb -k secret.tomb.key | ||
Ligne 72: | Ligne 119: | ||
sudo tomb slam all** | sudo tomb slam all** | ||
+ | |||
+ | Tomb | ||
+ | |||
+ | Tomb peut ête téléchargé depuis www.dyne.org/ | ||
+ | |||
+ | Au travail ! Une fois le fichier compressé téléchargé, | ||
+ | |||
+ | cd vers le répertoire Tomb | ||
+ | |||
+ | sudo tomb dig -s 100 secret.tomb | ||
+ | |||
+ | sudo tomb forge secret.tomb.key | ||
+ | |||
+ | sudo tomb lock secret.tomb -k secret.tomb.key | ||
+ | |||
+ | Pour l' | ||
+ | |||
+ | sudo tomb open secret.tomb -k secret.tomb.key | ||
+ | |||
+ | Et après utilisation : | ||
+ | |||
+ | sudo tomb close | ||
+ | |||
+ | Ou, si ça presse : | ||
+ | |||
+ | sudo tomb slam all | ||
**I have found that if you want to have secret.tomb in another location you have to use the full file path. The same goes for the key. For example; If you are using Office365 (Outlook 2013), click on the three blue dots at bottom left of the window. Click on Folders. You will now see everything in the left-hand pane in a folder view. If you expand the folder which your Inbox was recovered into, you will see your old calendar and contacts there. Drag contacts from this contacts folder and drop them into your current contacts folder. | **I have found that if you want to have secret.tomb in another location you have to use the full file path. The same goes for the key. For example; If you are using Office365 (Outlook 2013), click on the three blue dots at bottom left of the window. Click on Folders. You will now see everything in the left-hand pane in a folder view. If you expand the folder which your Inbox was recovered into, you will see your old calendar and contacts there. Drag contacts from this contacts folder and drop them into your current contacts folder. | ||
Ligne 80: | Ligne 153: | ||
There is much more on the website about Tomb which I recommend anyone interested to read: www.dyne.org/ | There is much more on the website about Tomb which I recommend anyone interested to read: www.dyne.org/ | ||
+ | |||
+ | J'ai trouvé que si vous voulez que secret.tomb soit dans un autre emplacement, | ||
+ | |||
+ | tomb open / | ||
+ | |||
+ | Il y a beaucoup plus sur le site Web à propos de Tomb et je recommande à chaque personne intéressée de le lire : www.dyne.org/ | ||
**This next bit is not really anything to do with encryption. As I said at the outset, I am quite lazy, I do not remember long commands very well and am always looking to find easy ways to do things. So I found a really useful utility called pdmenu. You can use it to create a menu of commands in a terminal window. Scroll up and down the menu using the cursor keys and the Enter key to run a command. It is available in the repositories and: | **This next bit is not really anything to do with encryption. As I said at the outset, I am quite lazy, I do not remember long commands very well and am always looking to find easy ways to do things. So I found a really useful utility called pdmenu. You can use it to create a menu of commands in a terminal window. Scroll up and down the menu using the cursor keys and the Enter key to run a command. It is available in the repositories and: | ||
Ligne 88: | Ligne 167: | ||
The first four lines set up how the window will look.** | The first four lines set up how the window will look.** | ||
+ | |||
+ | Le point suivant n'a pas grand chose à voir avec le chiffrement. Comme je l'ai dit en introduction, | ||
+ | |||
+ | sudo apt-get-install pdmenu | ||
+ | |||
+ | vous le met à disposition en une ou deux minutes. Il génère un fichier pdmenurc par défaut appelé / | ||
+ | |||
+ | Les 4 premières lignes définissent l' | ||
**exec – tells pdmenu that it is going to run a command | **exec – tells pdmenu that it is going to run a command | ||
Ligne 101: | Ligne 188: | ||
exec: | exec: | ||
exec: | exec: | ||
+ | |||
+ | exec - indique à pdmenu qu'il va lancer une commande | ||
+ | |||
+ | les « : » servent de séparateurs entre les parties de l' | ||
+ | |||
+ | open tomb est le nom qui sera affiché | ||
+ | |||
+ | p dit à pdmenu d' | ||
+ | |||
+ | la commande est la dernière partie de l' | ||
+ | |||
+ | exec: | ||
+ | exec: | ||
**The two above commands will display Tetris for Terminals with no flag so / | **The two above commands will display Tetris for Terminals with no flag so / | ||
Ligne 107: | Ligne 207: | ||
The foregoing is not an exhaustive list of encryption methods but the uncertainty surrounding Truecrypt made me revisit what was available. I am certain that my computer is not impregnable but I am also certain that I have made the data on my computer available to only a very few people who might have some specialised skills. If my computer were to be stolen or lost, although someone may use the hardware, I can be relatively sure that they will not use the data stored on it.** | The foregoing is not an exhaustive list of encryption methods but the uncertainty surrounding Truecrypt made me revisit what was available. I am certain that my computer is not impregnable but I am also certain that I have made the data on my computer available to only a very few people who might have some specialised skills. If my computer were to be stolen or lost, although someone may use the hardware, I can be relatively sure that they will not use the data stored on it.** | ||
+ | |||
+ | La première des deux commandes ci-dessus affichera Tetris pour Terminal, sans flag, aussi / | ||
+ | |||
+ | Je trouve que pdmenu est très souple ; il peut lancer des menus imbriqués et il enlève le souci de retenir de longues syntaxes de commande. | ||
+ | |||
+ | Ce présent aperçu n'est pas une liste exhaustive des méthodes de chiffrement, |
issue87/securite.1420725750.txt.gz · Dernière modification : 2015/01/08 15:02 de d52fr