1
0
mirror of https://github.com/5im-0n/sshenc.sh.git synced 2025-08-02 19:30:05 +02:00

update link

This commit is contained in:
s2
2023-01-08 15:54:53 +01:00
parent 4bc407213b
commit 1ae9f9ed50
3 changed files with 7 additions and 7 deletions

View File

@@ -4,13 +4,13 @@
If you received a message from someone that was encrypted with this script, you can decrypt it with your ssh private key using the following command without installing anything: If you received a message from someone that was encrypted with this script, you can decrypt it with your ssh private key using the following command without installing anything:
``` ```
bash <(curl -s https://sshenc.sh/sshenc.sh) -s ~/.ssh/id_rsa < file-containing-the-encrypted-text.txt bash <(curl -s https://github.com/S2-/sshenc.sh/sshenc.sh) -s ~/.ssh/id_rsa < file-containing-the-encrypted-text.txt
``` ```
sshenc.sh uses openssl under the hood, so you need to have that installed in your path to make it work. sshenc.sh uses openssl under the hood, so you need to have that installed in your path to make it work.
## Install ## Install
``` ```
curl -O https://sshenc.sh/sshenc.sh curl -O https://github.com/S2-/sshenc.sh/sshenc.sh
chmod +x sshenc.sh chmod +x sshenc.sh
``` ```
@@ -42,7 +42,7 @@ sshenc.sh -s ~/.ssh/id_rsa < encrypted.txt
Also, a new `-iter` parameter to explicitly specify a given number of iterations on the password in deriving the encryption key was added. Also, a new `-iter` parameter to explicitly specify a given number of iterations on the password in deriving the encryption key was added.
Before OpenSSL 1.1.1 this option was not available. Before OpenSSL 1.1.1 this option was not available.
Since the new parameters are more secure, `sshenc.sh` changed to adopt them, so since 2019-11-26, files encrypted with a previous version of `sshenc.sh` will not decrypt. Since the new parameters are more secure, `sshenc.sh` changed to adopt them, so since 2019-11-26, files encrypted with a previous version of `sshenc.sh` will not decrypt.
To do so, use the prevous `sshenc.sh` script, located at [https://sshenc.sh/sshenc-pre1.1.1.sh](https://sshenc.sh/sshenc-pre1.1.1.sh). To do so, use the prevous `sshenc.sh` script, located at [https://github.com/S2-/sshenc.sh/sshenc-pre1.1.1.sh](https://github.com/S2-/sshenc.sh/sshenc-pre1.1.1.sh).
## License ## License
[MIT](https://opensource.org/licenses/MIT) [MIT](https://opensource.org/licenses/MIT)

View File

@@ -15,7 +15,7 @@ examples:
- decrypt a file - decrypt a file
$me -s ~/.ssh/id_rsa < encrypted.txt $me -s ~/.ssh/id_rsa < encrypted.txt
$me home page: https://sshenc.sh/ $me home page: https://github.com/S2-/sshenc.sh/
EOF EOF
} }
@@ -49,7 +49,7 @@ trap cleanup EXIT
if [[ "${#public_key[@]}" > 0 ]]; then if [[ "${#public_key[@]}" > 0 ]]; then
openssl rand 32 > $temp_file_key openssl rand 32 > $temp_file_key
echo "-- encrypted with https://sshenc.sh/" echo "-- encrypted with https://github.com/S2-/sshenc.sh/"
echo "-- keys" echo "-- keys"
for pubkey in "${public_key[@]}" for pubkey in "${public_key[@]}"
do do

View File

@@ -21,7 +21,7 @@ examples:
- encrypt using multiple public keys (file can be read by any associated private key) - encrypt using multiple public keys (file can be read by any associated private key)
$me -g foo -g bar -p baz -p ~/.ssh/id_rsa.pub < plain-text-file.txt > encrypted.txt $me -g foo -g bar -p baz -p ~/.ssh/id_rsa.pub < plain-text-file.txt > encrypted.txt
$me home page: https://sshenc.sh/ $me home page: https://github.com/S2-/sshenc.sh/
EOF EOF
} }
@@ -102,7 +102,7 @@ fi
if [[ "${#public_key[@]}" > 0 ]]; then if [[ "${#public_key[@]}" > 0 ]]; then
openssl rand 32 > $temp_file_key openssl rand 32 > $temp_file_key
echo "-- encrypted with https://sshenc.sh/" echo "-- encrypted with https://github.com/S2-/sshenc.sh/"
echo "-- keys" echo "-- keys"
for pubkey in "${public_key[@]}" for pubkey in "${public_key[@]}"
do do