Skip to content

Commit e7b9761

Browse files
authored
Added additional OpenSSL command example
1 parent f575d9c commit e7b9761

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

README.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -88,13 +88,17 @@ The script uses `tar` to store the configuration and password secret seed files
8888

8989
`openssl enc -e -aes-256-cbc -md sha512 -salt -S "$(openssl rand -hex 4)" -pass file:[passphrase_file] -in [tarball] -out [encrypted_tarball]`
9090

91-
To decrypt the email attachment, use this command:
91+
To decrypt the email attachment, use this command on your FreeNAS system:
9292

9393
`openssl enc -d -aes-256-cbc -md sha512 -pass file:[passphrase_file] -in [encrypted_file] -out [unencrypted_file]`
9494

95-
NOTE: Be sure to use a version of OpenSSL matching that used by FreeNAS. FreeNAS version 11.2U8, for example, uses OpenSSL version 1.0.2q-freebsd.
95+
Note that the command above is specific to the version of OpenSSL used by FreeNAS. FreeNAS version 11.2U8, for example, uses OpenSSL version 1.0.2q-freebsd.
9696

97-
Where:
97+
You will almost certainly have to use alternative commands for other OpenSSL versions. Here is a working example for OpenSSL 1.1.1.g-2 on Arch Linux (thanks to FreeNAS forum member Dice):
98+
99+
`openssl enc -aes-256-cbc -md sha512 -pbkdf2 -iter 10 -pass file:[passphrase_file] -in [encrypted_file] -out [unencrypted_file]`
100+
101+
In the above commands:
98102
* `passphrase_file` is a file containing the same passphrase you configured on your FreeNAS server
99103
* `encrypted_file` is your locally-saved copy of the email attachment
100104
* `unencrypted_file` is the unencrypted contents of the email attachment

0 commit comments

Comments
 (0)