<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://miguelangel.torresegea.es/wiki/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://miguelangel.torresegea.es/wiki/feed.php">
        <title>miguel angel torres egea</title>
        <description></description>
        <link>https://miguelangel.torresegea.es/wiki/</link>
        <image rdf:resource="https://miguelangel.torresegea.es/wiki/_media/wiki:dokuwiki-128.png" />
       <dc:date>2026-05-23T16:28:11+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/criptografia:gpg:start?rev=1478894117&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/criptografia:pass?rev=1749543935&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/criptografia:wireguard:start?rev=1737045377&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/criptografia:ecryptfs?rev=1686748181&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/criptografia:luks?rev=1731919458&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/criptografia:john:start?rev=1528018759&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://miguelangel.torresegea.es/wiki/_media/wiki:dokuwiki-128.png">
        <title>miguel angel torres egea</title>
        <link>https://miguelangel.torresegea.es/wiki/</link>
        <url>https://miguelangel.torresegea.es/wiki/_media/wiki:dokuwiki-128.png</url>
    </image>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/criptografia:gpg:start?rev=1478894117&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2016-11-11T19:55:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>GPG</title>
        <link>https://miguelangel.torresegea.es/wiki/criptografia:gpg:start?rev=1478894117&amp;do=diff</link>
        <description>GPG

manejo llaves

generar contraseña (se recomienda el máximo disponible, 4096bits):

$ gpg --gen-key

entra en modo comando gpg, múltiples acciones disponibles:

$ gpg --edit-key &lt;UID&gt;

exporta clave pública, para repartir, formato binario:

$ gpg --export UID</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/criptografia:pass?rev=1749543935&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-06-10T08:25:35+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>pass</title>
        <link>https://miguelangel.torresegea.es/wiki/criptografia:pass?rev=1749543935&amp;do=diff</link>
        <description>pass

	*  gestión de contaseñas desde CLI multiplataforma (no-win)
	*  &lt;https://www.passwordstore.org/&gt;

dudas

	*  clientes GUI
	*  plugin ZSH

init

	*  crear clave GPG pública-privada
		*  
gpg --gen-key


	*  inicializar repositorio (con el nombre o fingerprint usado en la clave GPG)</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/criptografia:wireguard:start?rev=1737045377&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-01-16T16:36:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wireguard</title>
        <link>https://miguelangel.torresegea.es/wiki/criptografia:wireguard:start?rev=1737045377&amp;do=diff</link>
        <description>wireguard

	*  Raspberry 4 (192.168.24.70) -&gt; VPN Wireguard + DNS -&gt; pivpn basado en wireguard

simple network interface


wg genkey &gt; private
wg pubkey &lt; private # client

sudo ip link add dev wg0 type wireguard
ip address add dev wg0 192.168.2.1/24
sudo wg set wg0 private-key ./private
sudo ip link set wg0 up

wg

# machine A
wg set wg0 peer &lt;PUB-KEY-MACHINE-B&gt; allowed-ips 10.0.0.1/32 endpoint &lt;IP-MACHINE-B&gt;:&lt;PORT&gt;

#machine B
wg set wg0 peer &lt;PUB-KEY-MACHINE-A&gt; allowed-ips 10.0.0.2/32 endpoin…</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/criptografia:ecryptfs?rev=1686748181&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-06-14T13:09:41+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ecryptfs</title>
        <link>https://miguelangel.torresegea.es/wiki/criptografia:ecryptfs?rev=1686748181&amp;do=diff</link>
        <description>ecryptfs

related

	*  
apt install ecryptfs-utils

		*  &lt;https://ostechnix.com/how-to-encrypt-directories-with-ecryptfs-in-linux/&gt; Práctico!!
		*  &lt;https://www.howtoforge.com/how-to-encrypt-directories-partitions-with-ecryptfs-on-debian-squeeze&gt;
		*  &lt;https://wiki.debian.org/TransparentEncryptionForHomeFolder&gt;
		*  &lt;https://linux.die.net/man/7/ecryptfs&gt;
		*  &lt;https://wiki.archlinux.org/index.php/ECryptfs&gt;

cli

	*  setup:
sudo mount -t ecryptfs ~/SECRET/ ~/SECRET/

	*  mount:
sudo mount -t ecry…</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/criptografia:luks?rev=1731919458&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-11-18T08:44:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Encriptació particions amb Luks</title>
        <link>https://miguelangel.torresegea.es/wiki/criptografia:luks?rev=1731919458&amp;do=diff</link>
        <description>Encriptació particions amb Luks

recepta

setup


lsblk --fs
sudo cryptsetup luksFormat /dev/sdbX # elimina les dades existents
sudo cryptsetup luksOpen /dev/sdbX &lt;NOM_LOGIC&gt;
mkfs.ext4 /dev/mapper/&lt;NOM_LOGIC&gt;


mount &amp; umount


#sudo cryptsetup luksOpen /dev/sdb1 &lt;NOM_LOGIC&gt; 	# demana contraseña
sudo cryptsetup open /dev/sdbX &lt;NOM_LOGIC&gt; 	# demana contraseña
sudo mount /dev/mapper/&lt;NOM_LOGIC&gt; /path/to/mount_point
sudo umount /path/to/mount_point
sudo cryptsetup close &lt;NOM_LOGIC&gt;</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/criptografia:john:start?rev=1528018759&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-06-03T09:39:19+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>john the ripper</title>
        <link>https://miguelangel.torresegea.es/wiki/criptografia:john:start?rev=1528018759&amp;do=diff</link>
        <description>john the ripper

la versión Jumbo tiene utilidades añadidas (crack de zip/rar/7z...)

descarga

	*  compilado: &lt;http://download.openwall.net/pub/projects/john/&gt;

compilación

procesamiento en paralelo


## Uncomment the TWO lines below for MPI (can be used together with OMP as well)
## If you experience problems with MPI_Barrier, remove -DJOHN_MPI_BARRIER
## If you experience problems with MPI_Abort, remove -DJOHN_MPI_ABORT
CC = mpicc -DHAVE_MPI -DJOHN_MPI_BARRIER -DJOHN_MPI_ABORT
MPIOBJ = john-…</description>
    </item>
</rdf:RDF>
