Secure Encryption Flashcards

1
Q

~/.gnupg

A

Hidden directory in each home with key ring and configuration files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

gpg

A

Generate, list, import, export, revoke.

: decrypt file if public key available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

gpg — Switches.

A

—import: import public key into key ring.
—list-keys: list keys on key ring.
—gen-revoke : Starts revocation process. Requires cause, comment, passphrase for your key to create revocation certificate.
—export: export public key by ID.
—gen-key: starts process for creating public key. Requests kind, size, expiration time, real name, email, comment, passphrase.
—keyserver: used with —send-keys to send keys to key server.
—send-keys:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

gpg - switches

A
  • o: output name (file)
  • r: specify recipient.
  • e: encrypt given file with preceding recipient info with your default public key. combined as -r “” -e
  • a:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

sshd_config

A

In /etc/ssh. Contains configuration information.
HostKey: each line starting describe file location for each encrypted connection possible.
PermitRootLogin: enables SSH login for root if yes.
X11Forwarding: Dictates if X11 windows can be sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

~/.ssh

A

Individual user configuration for ssh. Such as known_hosts, containing IPaddr/hostname, encryption algorithm, and fingerprint.
When creating new key, id_rsa remains on system, id_rsa.pub is sent to system trying to connect. If either differ, no connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

-ssh-keygen

A

Generates ssh keys. Can provide passphrase for key for multi-factor.

  • b: indicate bit length. Default 2048.
  • t: type of encryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ssh-copy-id

A

Will copy public ssh key to another system, set up proper permissions for the authorized_keys file on remote host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ssh-agent

A

Acts as a wrapper around an environment so that it can handle authentication for key files that use passphrases.
Ex: ssh-agent bash sets wrapper around bash.
Use with ssh-add.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ssh-add

A

Adds a passphrase to the ssh-agent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

authorized_keys

A

Within .ssh, stores keys set up by ssh-copy-id, indicates which systems for each fingerprint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ssh

A

-Y: improved security for X11.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly