From b2df05b763ccecd74d688e16a69e737e932d034b Mon Sep 17 00:00:00 2001 From: s2 Date: Sun, 8 Jan 2023 15:53:21 +0100 Subject: [PATCH] update sshenc.sh url --- README.md | 6 +++--- sshenc-pre1.1.1.sh | 4 ++-- sshenc.sh | 4 ++-- 3 files changed, 7 insertions(+), 7 deletions(-) diff --git a/README.md b/README.md index 043f8ef..ff0964b 100644 --- a/README.md +++ b/README.md @@ -4,13 +4,13 @@ If you received a message from someone that was encrypted with this script, you can decrypt it with your ssh private key using the following command without installing anything: ``` -bash <(curl -s https://sshenc.sh/sshenc.sh) -s ~/.ssh/id_rsa < file-containing-the-encrypted-text.txt +bash <(curl -s https://github.com/S2-/sshenc.shsshenc.sh) -s ~/.ssh/id_rsa < file-containing-the-encrypted-text.txt ``` sshenc.sh uses openssl under the hood, so you need to have that installed in your path to make it work. ## Install ``` -curl -O https://sshenc.sh/sshenc.sh +curl -O https://github.com/S2-/sshenc.shsshenc.sh chmod +x sshenc.sh ``` @@ -42,7 +42,7 @@ sshenc.sh -s ~/.ssh/id_rsa < encrypted.txt Also, a new `-iter` parameter to explicitly specify a given number of iterations on the password in deriving the encryption key was added. Before OpenSSL 1.1.1 this option was not available. Since the new parameters are more secure, `sshenc.sh` changed to adopt them, so since 2019-11-26, files encrypted with a previous version of `sshenc.sh` will not decrypt. -To do so, use the prevous `sshenc.sh` script, located at [https://sshenc.sh/sshenc-pre1.1.1.sh](https://sshenc.sh/sshenc-pre1.1.1.sh). +To do so, use the prevous `sshenc.sh` script, located at [https://github.com/S2-/sshenc.shsshenc-pre1.1.1.sh](https://github.com/S2-/sshenc.shsshenc-pre1.1.1.sh). ## License [MIT](https://opensource.org/licenses/MIT) diff --git a/sshenc-pre1.1.1.sh b/sshenc-pre1.1.1.sh index 72e9609..90ea321 100755 --- a/sshenc-pre1.1.1.sh +++ b/sshenc-pre1.1.1.sh @@ -15,7 +15,7 @@ examples: - decrypt a file $me -s ~/.ssh/id_rsa < encrypted.txt -$me home page: https://sshenc.sh/ +$me home page: https://github.com/S2-/sshenc.sh EOF } @@ -49,7 +49,7 @@ trap cleanup EXIT if [[ "${#public_key[@]}" > 0 ]]; then openssl rand 32 > $temp_file_key - echo "-- encrypted with https://sshenc.sh/" + echo "-- encrypted with https://github.com/S2-/sshenc.sh" echo "-- keys" for pubkey in "${public_key[@]}" do diff --git a/sshenc.sh b/sshenc.sh index 3111008..ad83fe6 100755 --- a/sshenc.sh +++ b/sshenc.sh @@ -21,7 +21,7 @@ examples: - encrypt using multiple public keys (file can be read by any associated private key) $me -g foo -g bar -p baz -p ~/.ssh/id_rsa.pub < plain-text-file.txt > encrypted.txt -$me home page: https://sshenc.sh/ +$me home page: https://github.com/S2-/sshenc.sh EOF } @@ -102,7 +102,7 @@ fi if [[ "${#public_key[@]}" > 0 ]]; then openssl rand 32 > $temp_file_key - echo "-- encrypted with https://sshenc.sh/" + echo "-- encrypted with https://github.com/S2-/sshenc.sh" echo "-- keys" for pubkey in "${public_key[@]}" do