Questions tagged [encryption]

Encryption is transforming information through a cipher to protect it from unauthorized access.

Encryption is the process of taking some information (the plain text), and transforming it (usually with a cypher and a key) so that it is secure. Assuming a sufficiently strong cypher and key have been chosen, this cyphertext can be shared widely, without the information being compromised.

The reverse of Encryption is Decryption, where the process is reversed (normally by someone holding the key and cypher details) to return the information.

See the Wikipedia Page for more details.

775 questions
0
votes
0 answers

Token slot_id order changes when restarting

Hello and thanks for taking the time to read this. Issue: I have 4 token devices with the same model and the same name, I rely on the slot id (and the serial) to identify wich one to use. After 5 months working without issue we had to restart the…
LordNeo
  • 113
  • 1
  • 1
  • 6
0
votes
1 answer

How to create a encrypted linux container to deploy web application on external server?

I need to deploy a Rails application to client's on-premises server and I want to prevent the viewing and modification of source code. Client has physical and root access to the server. How can I create a encrypted linux container(VM) that…
0
votes
1 answer

Samba using homes share with an encrypted directory

Originally Posted on SuperUser but realized it should be posted here. I have a Samba fileserver that I set up to access my files over a VPN connection to my house. I configured my VPN client to automatically connect quietly at boot up. I set up the…
0
votes
1 answer

AWS: encrypted ROOT EBS doesn't support t2 instance types

I created an AMI from my web server. Then I copied the snapshot, checking the "encrypted" checkbox. Then I created an AMI from this encrypted snapshot. Then I tried to launch a new instance from this new encrypted AMI. I was stunned to find that t2…
Silly Dude
  • 558
  • 3
  • 9
  • 22
0
votes
1 answer

Fresh Install Linux with Encryption won't boot

I having a problem whereby after I fresh install Debian and enable encryption (Encrypted LVM), it won't boot into the OS, just seeing a black screen. For a test, I also installed Debian without enabling encryption and it boots into the OS no…
rwcommand
  • 163
  • 1
  • 7
0
votes
1 answer

Determining which Ciphers clients are using from RoundCube mail

I have RoundCube installed on RHEL 7 server, and after Qualys vuln check, there are some vulnerabilities with ciphers. After patching, DES & 3DES cannot be used anymore. TLS handshakes cannot be made with devices without AES-128 or newer algorithms…
kd.maxi
0
votes
2 answers

Lets encrypt with lighttpd and wordpress

I am trying to implement let's encrypt with certbot and I am using lighttpd on CentOS 6 So this is my full conf file for my host $SERVER["socket"] == ":443" { ssl.engine = "enable" ssl.pemfile = "/etc/letsencrypt/live/mysite.com/web.pem" …
madeye
  • 103
  • 4
0
votes
1 answer

Server hangs when trying to boot after trying to encrypt /tmp in centos 6.9

I am trying to encrypt the /tmp partition on a server after it had been configured. I wasn't able to setup up encrypt at install as it wouldn't allow for using a random key. Instead, I created the /tmp-tmp LVM formated as ext and of a size 10G. …
0
votes
2 answers

What's the benefit of having a two-tier PKI heirarchy?

According to the way I read the literature, a two-tier PKI heirarchy with an offline root CA provides redundancy and an extra layer of security in case your subordinate CA's private key gets compromised. But how does this work? Let's say I have an…
Wes Sayeed
  • 1,902
  • 6
  • 28
  • 43
0
votes
1 answer

Implications of turning on bitlocker on a server

I have a server which contains some sensitive data and I feel like I should have bitlocker enabled on it. The problem is that the server has many floating licenses installed on it which the PCs on the network connect to from time to time. Also the…
0
votes
3 answers

Windows 10 won't connect to RRAS VPN

Studying MCSA, currently working on a Server 2012 R2 server lab I have set up on a custom built computer. Current configuration, I have a host computer that is just that, a host, with RRAS installed for internal network (which I call my virtual…
Zach85
  • 19
  • 1
  • 1
  • 5
0
votes
2 answers

pix 501 encryption license reduces inside hosts to 10

Possible Duplicate: Can you help me with my software licensing question? I have an unlimted pix 501 with no encryption license installed. I have applied for and received a 3DES license. When I install the 3DES license, the inside hosts goes…
None
0
votes
2 answers

Is it possible to encrypt 'data in use' in Windows Server?

Data can have 3 states (in transit, in use and at rest). I know that for Windows Server, common methods of encryption are: In Transit = IPSEC In Use = ??? At Rest = BitLocker Is it possible to encrypt data that is in use (i.e. in the CPU and…
Techboy
  • 1,550
  • 7
  • 31
  • 49
0
votes
0 answers

Use encrypted eyaml data from puppet file?

I'm storing some sensitive data using eyaml. I have the encryption part working and integrated into my Hiera setup but I'm not sure how to unencrypt from within a puppet file. When I run the following code in puppet: $message =…
Philip Kirkbride
  • 279
  • 2
  • 10
  • 30
0
votes
1 answer

How can encrypting the key increase security level in MariaDB data at rest encryption?

I am following the instructions here to encrypt a database in MariaDB: https://mariadb.com/kb/en/mariadb/data-at-rest-encryption/ Obviously, it requires us to generate a key which will be used to encrypt the database. We can simply provide it with…
bobo
  • 599
  • 2
  • 8
  • 24