Language Selection

English French German Italian Portuguese Spanish

The Ultimate Linux Password Management Guide Part 8 gnupg

Filed under
HowTos

This is part 8 of a multi-part article. Part 1 is available here, part 2 is available here, part 3 is available here, part 4 is available here, part 5 is here, part 6 is available here, and part 7 is available here. Part 1 discusses the importance of complex passwords and also discusses some ways to create them in Linux. Part 2 covers the KeepassX, a program with a very nice graphical user interface. Part 3, takes a look at the gpass program which is a nice graphical user interface for the gnome desktop (will work on others too). Part 4 takes a look at the command line pwsafe. Part 5 takes a look at the command line cpm (console password manager). Part 6 takes a look at ked password manager that has both a GTK2 and cli interface. Part 7, we will take a look at gorilla password manager.

In part 8, we will take a look at using gnupg, a common application already included on most Linux distributions for managing passwords.

ABOUT
GnuPG allows you to encrypt and sign your data and communications. It features a versatile key management system as well as access modules for all kind of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of frontend applications and libraries are available. Version 2 of GnuPG also provides support for S/MIME.

FEATURES
GnuPG itself is a commandline tool without any graphical stuff. It is the real crypto engine which can be used directly from a command prompt, from shell scripts or by other programs. Therefore it can be considered as a backend for other applications.
However, even when used on the command line it provides all functionality needed - this includes an interactive menu system. The set of commands of this tool will always be a superset of those provided by any frontends.

ARTICLE OVERVIEW
In this article, I am going to show you some tricks with using gnupg to manage passwords. Of course, you can simply create a text file and encrypt it with gnupg and then unencrypt the file in order to view your password list. However, with more than a couple of passwords, this becomes very cumbersome.

Full Article




More in Tux Machines

Red Hat News

OSS: Blockchain, Innersource, SQL and Clang

  • Banks are turning to open source for blockchain, says Google engineer
    Banks have historically developed all software in-house and maintained a fierce secrecy around their code, but more recently they’ve embraced open-source. They’re likely to use open source for one of the most hotly tipped technologies out there – blockchain.
  • Innersource: How to leverage open source in the enterprise
    Companies of varying sizes across many industries are implementing innersource programs to drive greater levels of development collaboration and reuse. They ultimately seek to increase innovation; reduce time to market; grow, retain, and attract talent; and of course, delight their customers. In this article, I'll introduce innersource and some of its key facets and examine some of the problems that it can help solve. I'll also discuss some components of an innersource program, including metrics.
  • Reflection on trip to Kiel
    On Sunday, I flew home from my trip to Kiel, Germany. I was there for the Kieler Open Source und LinuxTage, September 15 and 16. It was a great conference! I wanted to share a few details while they are still fresh in my mind: I gave a plenary keynote presentation about FreeDOS! I'll admit I was a little concerned that people wouldn't find "DOS" an interesting topic in 2017, but everyone was really engaged. I got a lot of questions—so many that we had to wrap up before I could answer all the questions.
  • A quick tour of MySQL 8.0 roles
    This year at the Percona Live Open Source Database Conference in Dublin, I'll be discussing a new feature introduced in MySQL 8.0: roles. This is a new security and administrative feature that allows database administrators to simplify user management and increases the security of multi-user environments. In database administration, users are granted privileges to access schemas, tables, or columns, depending on the business needs. When many different users require authorization for different sets of privileges, administrators have to repeat the process of granting privileges several times. This is both tedious and error-prone. Using roles, administrators can define sets of privileges for a user category, and then the user authorization becomes a single statement operation. Roles have been on the MySQL community's wish list for a long time. I remember several third-party solutions that tried to implement roles as a hack on top of the existing privileges granting system. I created my own solution many years ago when I had to administer a large set of users with different levels of access. Since then, anytime a new project promised to ease the roles problem, I gave it a try. None of them truly delivered a secure solution, until now.
  • MyDiamo Expands Open Source Database Encryption Offerings to Include PostgreSQL
  • Clang-Refactor Tool Lands In Clang Codebase
    The clang-refactor tool is now living within the LLVM Clang SVN/Git codebase.

Games: Ostriv, Back to Bed, EVERSPACE, Hiveswap: Act 1

Openwashing and Microsoft FUD