I. rhel1 -- 192.168.10.1 -- decryption end of the file
Rhel2 -- 192.168.10.2 -- encrypted file segment
Ii. rhel1 configuration is as follows:
1. Check whether the required software package is installed (installed by default ):
650) This. width = 650; "Title =" 1.png" src = "http://s3.51cto.com/wyfs02/M01/4B/74/wKioL1Qsy93hm_9uAAAu_9sB49k667.jpg" alt = "wkiol1qsy93hm_9uaaau_9sb49k667.jpg"/>
2. Generate a key:
650) This. width = 650; "Title =" 1.png" src = "http://s3.51cto.com/wyfs02/M02/4B/74/wKioL1QszI6waHdpAAAczHPCprA738.jpg" alt = "wkiol1qszi6wahdpaaaczhpcpra738.jpg"/>
3. view the generated key:
650) This. width = 650; "Title =" 1.png" src = "http://s3.51cto.com/wyfs02/M02/4B/72/wKiom1QszLHRu0IVAACDepfsTKs236.jpg" alt = "wkiom1qszlhru0ivaacdepfstks236.jpg"/>
4. Export the public key file and view it:
650) This. width = 650; "Title =" 1.png" src = "http://s3.51cto.com/wyfs02/M00/4B/74/wKioL1QszsODVXO6AAB70WYmYcE311.jpg" alt = "wkiol1qszsodvxo6aab70wymyce311.jpg"/>
5. Send the public key to rhel2:
650) This. width = 650; "Title =" 1.png" src = "http://s3.51cto.com/wyfs02/M01/4B/74/wKioL1Qsz3jTO2EAAAAqvWe0XPc724.jpg" alt = "wkiol1qsz3jto2eaaaaqvwe0xpc724.jpg"/>
3. Configure rhel2 as follows:
1. Import the public key file sent by RHEL:
650) This. width = 650; "Title =" 1.png" style = "float: none;" src = "http://s3.51cto.com/wyfs02/M01/4B/72/wKiom1Qs0DLCrMzvAABDRzRaUpE251.jpg" alt = "wkiom1qs0dlcrmzvaabdrzraupe251.jpg"/>
650) This. width = 650; "Title =" 2.png" style = "float: none;" src = "http://s3.51cto.com/wyfs02/M02/4B/74/wKioL1Qs0GDSU2ICAAAjvLZ5zmw988.jpg" alt = "wkiol1qs0gdsu2icaaajvlz5zmw988.jpg"/>
2. view the imported public key:
650) This. width = 650; "Title =" 1.png" src = "http://s3.51cto.com/wyfs02/M02/4B/72/wKiom1Qs0GfiUJisAAC7KRDSTbU848.jpg" alt = "wkiom1qs0gfiujisaac7krdstbu848.jpg"/>
4. file encryption on rhel2:
1. Copy passwd to TMP and encrypt it:
650) This. width = 650; "Title =" 1.png" src = "http://s3.51cto.com/wyfs02/M00/4B/72/wKiom1Qs0STDE64NAABDye5SyEk441.jpg" alt = "wkiom1qs0stde64naabdye5syek441.jpg"/>
650) This. width = 650; "Title =" 1.png" src = "http://s3.51cto.com/wyfs02/M01/4B/72/wKiom1Qs0cCBPrdAAAIL5lvwB2E574.jpg" alt = "wkiom1qs0ccbprdaaail5lvwb2e574.jpg"/>
2. view the encrypted file:
650) This. width = 650; "Title =" 1.png" src = "http://s3.51cto.com/wyfs02/M02/4B/74/wKioL1Qs0iryPg3PAACABci8-xc230.jpg" alt = "wKioL1Qs0iryPg3PAACABci8-xc230.jpg"/>
3. Send the encrypted file passwd. ASC to rhel1:
650) This. width = 650; "Title =" 1.png" src = "http://s3.51cto.com/wyfs02/M02/4B/72/wKiom1Qs0lrx6p4tAAF8FiSAGbY786.jpg" alt = "wkiom1qs0lrx6p4taaf8fisagby786.jpg"/> 5. decrypt the passwd. ASC file on rhel1:
1. decrypt the passwd. ASC file:
650) This. width = 650; "Title =" 1.png" src = "http://s3.51cto.com/wyfs02/M02/4B/72/wKiom1Qs0wHBuS98AABvFTOW_8M900.jpg" alt = "wkiom1qs0whbus98aabvftow_8m900.jpg"/>
2. Enter the decryption password:
650) This. width = 650; "Title =" 1.png" src = "http://s3.51cto.com/wyfs02/M00/4B/74/wKioL1Qs05mxZ0jEAADzoy6w6dg658.jpg" alt = "wkiol1qs05mxz0jeaadzoy6w6dg658.jpg"/>
This article is from the "O & M learning" blog. For more information, contact the author!
GPG implements encryption, decryption, and transmission of files