1SLOGVERIFY(1)            The slogverify utility manual           SLOGVERIFY(1)
2
3
4

NAME

6       slogverify - Verify cryptographically secured logs
7

SYNOPSIS

9       slogverify [arguments]
10

DESCRIPTION

12       The slogverify utility is used to verify the integrity of
13       cryptographically secured logs and to decrypt log entries from with a
14       secure encrypted destination.
15

OPTIONS

17       slogverify <host key file> <input file> <input MAC file> <output file>
18       [bufferSize]
19           <host key file> The name of the file containing the initial host
20           key (key0).
21
22           <input file> The cryptographically secured log file.
23
24           <input MAC file> The file containing the current message
25           authenfication code (MAC) for the input file.
26
27           <output file> The file receiving the plaintext log entries after
28           successful verification and decryption.
29
30           [bufferSize] Optional buffer size. The buffer size can be used for
31           performance adjustments in case the log file to be verified is very
32           large and cannot be processed at once. It is a positive number of
33           log entries that can be held in memory during verification. The
34           default is 1000.
35
36       -i <previous MAC file file> <previous key file> <input file> <current
37       MAC file> <output file> [bufferSize]
38           <previous MAC file file> This is the file containing the MAC from
39           the previous log file.
40
41           <previous key file> This is the file containing the key from the
42           previous log file. In theory, this can be host key key0, but using
43           key key0 might generates warnings, as the gap between the first log
44           entry ever (log entry 0) and the first log entry of the current log
45           file might be large.
46
47           <input file> This is the file containing the current log data.
48
49           <current MAC file> This is the file containing the MAC of the
50           current log input file.
51
52           <output file> Decrypted log data will be written into this file.
53
54           [bufferSize] Optional buffer size. The buffer size can be used for
55           performance adjustments in case the log file to be verified is very
56           large and cannot be processed at once. It is a positive number of
57           log entries that can be held in memory during verification. The
58           default is 1000.
59

FILES

61       /usr/bin/slogverify
62
63       /etc/syslog-ng.conf
64

SEE ALSO

66       syslog-ng.conf(5)
67
68           Note
69           For the detailed documentation of see The syslog-ng Administrator
70           Guide[1]
71
72           If you experience any problems or need help with syslog-ng, visit
73           the syslog-ng mailing list[2].
74
75           For news and notifications about of syslog-ng, visit the syslog-ng
76           blogs[3].
77

AUTHOR

79       This manual page was written by the Airbus Secure Logging Team
80       <secure-logging@airbus.com>.
81

NOTES

84        1. The syslog-ng Administrator Guide
85           https://www.balabit.com/documents/syslog-ng-ose-latest-guides/en/syslog-ng-ose-guide-admin/html/index.html
86
87        2. syslog-ng mailing list
88           https://lists.balabit.hu/mailman/listinfo/syslog-ng
89
90        3. syslog-ng blogs
91           https://syslog-ng.org/blogs/
92
93
94
953.27                              04/30/2020                     SLOGVERIFY(1)
Impressum