How to decrypt a file encrypted on different openssl version and different os? [closed]
I encrypt a file on server A.
uname -a
Linux hwy 4.9.0-8-amd64 #1 SMP Debian 4.9.130-2 (2018-10-27) x86_64 GNU/Linux
openssl version
OpenSSL 1.1.0f 25 May 2017
key="xxxxxxxx"
openssl enc -des3 -a -salt -in /tmp/wp.sql -k ${key} -out /tmp/wp.sql.asc
To push the file to server B, and decrypt it on sever B.
uname -a
Linux localhost.localdomain 2.6.32-042stab132.1 #1 SMP Wed Jul 11 13:51:30 MSK 2018 x86_64 x86_64 x86_64 GNU/Linux
openssl version
OpenSSL 1.0.2k-fips 26 Jan 2017
To decrypt it on server B.
key="xxxxxxxx"
openssl enc -d -des3 -a -salt -k ${key} -in /tmp/wp.sql.asc -out /tmp/wp.sql
It encounter error info:
bad decrypt
139640119146384:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:592:
How can i decrypt the file on my server B?
Should i upgrade openssl's version on server B from 1.0.2k-fips
to 1.1.0f
?
openssl
closed as off-topic by gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia Dec 9 '18 at 21:25
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "Questions about general computing hardware and software are off-topic for Stack Overflow unless they directly involve tools used primarily for programming. You may be able to get help on Super User." – gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia
If this question can be reworded to fit the rules in the help center, please edit the question.
add a comment |
I encrypt a file on server A.
uname -a
Linux hwy 4.9.0-8-amd64 #1 SMP Debian 4.9.130-2 (2018-10-27) x86_64 GNU/Linux
openssl version
OpenSSL 1.1.0f 25 May 2017
key="xxxxxxxx"
openssl enc -des3 -a -salt -in /tmp/wp.sql -k ${key} -out /tmp/wp.sql.asc
To push the file to server B, and decrypt it on sever B.
uname -a
Linux localhost.localdomain 2.6.32-042stab132.1 #1 SMP Wed Jul 11 13:51:30 MSK 2018 x86_64 x86_64 x86_64 GNU/Linux
openssl version
OpenSSL 1.0.2k-fips 26 Jan 2017
To decrypt it on server B.
key="xxxxxxxx"
openssl enc -d -des3 -a -salt -k ${key} -in /tmp/wp.sql.asc -out /tmp/wp.sql
It encounter error info:
bad decrypt
139640119146384:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:592:
How can i decrypt the file on my server B?
Should i upgrade openssl's version on server B from 1.0.2k-fips
to 1.1.0f
?
openssl
closed as off-topic by gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia Dec 9 '18 at 21:25
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "Questions about general computing hardware and software are off-topic for Stack Overflow unless they directly involve tools used primarily for programming. You may be able to get help on Super User." – gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia
If this question can be reworded to fit the rules in the help center, please edit the question.
add a comment |
I encrypt a file on server A.
uname -a
Linux hwy 4.9.0-8-amd64 #1 SMP Debian 4.9.130-2 (2018-10-27) x86_64 GNU/Linux
openssl version
OpenSSL 1.1.0f 25 May 2017
key="xxxxxxxx"
openssl enc -des3 -a -salt -in /tmp/wp.sql -k ${key} -out /tmp/wp.sql.asc
To push the file to server B, and decrypt it on sever B.
uname -a
Linux localhost.localdomain 2.6.32-042stab132.1 #1 SMP Wed Jul 11 13:51:30 MSK 2018 x86_64 x86_64 x86_64 GNU/Linux
openssl version
OpenSSL 1.0.2k-fips 26 Jan 2017
To decrypt it on server B.
key="xxxxxxxx"
openssl enc -d -des3 -a -salt -k ${key} -in /tmp/wp.sql.asc -out /tmp/wp.sql
It encounter error info:
bad decrypt
139640119146384:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:592:
How can i decrypt the file on my server B?
Should i upgrade openssl's version on server B from 1.0.2k-fips
to 1.1.0f
?
openssl
I encrypt a file on server A.
uname -a
Linux hwy 4.9.0-8-amd64 #1 SMP Debian 4.9.130-2 (2018-10-27) x86_64 GNU/Linux
openssl version
OpenSSL 1.1.0f 25 May 2017
key="xxxxxxxx"
openssl enc -des3 -a -salt -in /tmp/wp.sql -k ${key} -out /tmp/wp.sql.asc
To push the file to server B, and decrypt it on sever B.
uname -a
Linux localhost.localdomain 2.6.32-042stab132.1 #1 SMP Wed Jul 11 13:51:30 MSK 2018 x86_64 x86_64 x86_64 GNU/Linux
openssl version
OpenSSL 1.0.2k-fips 26 Jan 2017
To decrypt it on server B.
key="xxxxxxxx"
openssl enc -d -des3 -a -salt -k ${key} -in /tmp/wp.sql.asc -out /tmp/wp.sql
It encounter error info:
bad decrypt
139640119146384:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:592:
How can i decrypt the file on my server B?
Should i upgrade openssl's version on server B from 1.0.2k-fips
to 1.1.0f
?
openssl
openssl
edited Dec 8 '18 at 19:48
Amol
527214
527214
asked Nov 28 '18 at 12:14
it_is_a_literatureit_is_a_literature
3721962152
3721962152
closed as off-topic by gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia Dec 9 '18 at 21:25
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "Questions about general computing hardware and software are off-topic for Stack Overflow unless they directly involve tools used primarily for programming. You may be able to get help on Super User." – gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia
If this question can be reworded to fit the rules in the help center, please edit the question.
closed as off-topic by gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia Dec 9 '18 at 21:25
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "Questions about general computing hardware and software are off-topic for Stack Overflow unless they directly involve tools used primarily for programming. You may be able to get help on Super User." – gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia
If this question can be reworded to fit the rules in the help center, please edit the question.
add a comment |
add a comment |
1 Answer
1
active
oldest
votes
The default hash used in 1.1 is SHA256 where as 1.0 uses MD5. Try using the flag -md sha256 with your decrypt command
add a comment |
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
The default hash used in 1.1 is SHA256 where as 1.0 uses MD5. Try using the flag -md sha256 with your decrypt command
add a comment |
The default hash used in 1.1 is SHA256 where as 1.0 uses MD5. Try using the flag -md sha256 with your decrypt command
add a comment |
The default hash used in 1.1 is SHA256 where as 1.0 uses MD5. Try using the flag -md sha256 with your decrypt command
The default hash used in 1.1 is SHA256 where as 1.0 uses MD5. Try using the flag -md sha256 with your decrypt command
edited Feb 15 at 9:57
answered Dec 1 '18 at 7:25
AmolAmol
527214
527214
add a comment |
add a comment |