1SLOGVERIFY(1) The slogverify utility manual SLOGVERIFY(1)
2
3
4
6 slogverify - Verify cryptographically secured logs
7
9 slogverify [arguments]
10
12 The slogverify utility is used to verify the integrity of
13 cryptographically secured logs and to decrypt log entries from with a
14 secure encrypted destination.
15
17 slogverify <host key file> <input file> <input MAC file> <output file>
18 [bufferSize]
19 <host key file> The name of the file containing the initial host
20 key (key0).
21
22 <input file> The cryptographically secured log file.
23
24 <input MAC file> The file containing the current message
25 authenfication code (MAC) for the input file.
26
27 <output file> The file receiving the plaintext log entries after
28 successful verification and decryption.
29
30 [bufferSize] Optional buffer size. The buffer size can be used for
31 performance adjustments in case the log file to be verified is very
32 large and cannot be processed at once. It is a positive number of
33 log entries that can be held in memory during verification. The
34 default is 1000.
35
36 -i <previous MAC file file> <previous key file> <input file> <current
37 MAC file> <output file> [bufferSize]
38 <previous MAC file file> This is the file containing the MAC from
39 the previous log file.
40
41 <previous key file> This is the file containing the key from the
42 previous log file. In theory, this can be host key key0, but using
43 key key0 might generates warnings, as the gap between the first log
44 entry ever (log entry 0) and the first log entry of the current log
45 file might be large.
46
47 <input file> This is the file containing the current log data.
48
49 <current MAC file> This is the file containing the MAC of the
50 current log input file.
51
52 <output file> Decrypted log data will be written into this file.
53
54 [bufferSize] Optional buffer size. The buffer size can be used for
55 performance adjustments in case the log file to be verified is very
56 large and cannot be processed at once. It is a positive number of
57 log entries that can be held in memory during verification. The
58 default is 1000.
59
61 /usr/bin/slogverify
62
63 /etc/syslog-ng.conf
64
66 syslog-ng.conf(5)
67
68 Note
69 For the detailed documentation of see The syslog-ng Administrator
70 Guide[1]
71
72 If you experience any problems or need help with syslog-ng, visit
73 the syslog-ng mailing list[2].
74
75 For news and notifications about of syslog-ng, visit the syslog-ng
76 blogs[3].
77
79 This manual page was written by the Airbus Secure Logging Team
80 <secure-logging@airbus.com>.
81
84 1. The syslog-ng Administrator Guide
85 https://www.balabit.com/documents/syslog-ng-ose-latest-guides/en/syslog-ng-ose-guide-admin/html/index.html
86
87 2. syslog-ng mailing list
88 https://lists.balabit.hu/mailman/listinfo/syslog-ng
89
90 3. syslog-ng blogs
91 https://syslog-ng.org/blogs/
92
93
94
953.27 04/30/2020 SLOGVERIFY(1)