How to decrypt a file encrypted on different openssl version and different os? [closed]












1















I encrypt a file on server A.



uname -a
Linux hwy 4.9.0-8-amd64 #1 SMP Debian 4.9.130-2 (2018-10-27) x86_64 GNU/Linux

openssl version
OpenSSL 1.1.0f 25 May 2017

key="xxxxxxxx"
openssl enc -des3 -a -salt -in /tmp/wp.sql -k ${key} -out /tmp/wp.sql.asc


To push the file to server B, and decrypt it on sever B.



uname -a
Linux localhost.localdomain 2.6.32-042stab132.1 #1 SMP Wed Jul 11 13:51:30 MSK 2018 x86_64 x86_64 x86_64 GNU/Linux

openssl version
OpenSSL 1.0.2k-fips 26 Jan 2017


To decrypt it on server B.



key="xxxxxxxx"
openssl enc -d -des3 -a -salt -k ${key} -in /tmp/wp.sql.asc -out /tmp/wp.sql


It encounter error info:



bad decrypt
139640119146384:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:592:


How can i decrypt the file on my server B?
Should i upgrade openssl's version on server B from 1.0.2k-fips to 1.1.0f ?










share|improve this question















closed as off-topic by gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia Dec 9 '18 at 21:25


This question appears to be off-topic. The users who voted to close gave this specific reason:


  • "Questions about general computing hardware and software are off-topic for Stack Overflow unless they directly involve tools used primarily for programming. You may be able to get help on Super User." – gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia

If this question can be reworded to fit the rules in the help center, please edit the question.





















    1















    I encrypt a file on server A.



    uname -a
    Linux hwy 4.9.0-8-amd64 #1 SMP Debian 4.9.130-2 (2018-10-27) x86_64 GNU/Linux

    openssl version
    OpenSSL 1.1.0f 25 May 2017

    key="xxxxxxxx"
    openssl enc -des3 -a -salt -in /tmp/wp.sql -k ${key} -out /tmp/wp.sql.asc


    To push the file to server B, and decrypt it on sever B.



    uname -a
    Linux localhost.localdomain 2.6.32-042stab132.1 #1 SMP Wed Jul 11 13:51:30 MSK 2018 x86_64 x86_64 x86_64 GNU/Linux

    openssl version
    OpenSSL 1.0.2k-fips 26 Jan 2017


    To decrypt it on server B.



    key="xxxxxxxx"
    openssl enc -d -des3 -a -salt -k ${key} -in /tmp/wp.sql.asc -out /tmp/wp.sql


    It encounter error info:



    bad decrypt
    139640119146384:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:592:


    How can i decrypt the file on my server B?
    Should i upgrade openssl's version on server B from 1.0.2k-fips to 1.1.0f ?










    share|improve this question















    closed as off-topic by gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia Dec 9 '18 at 21:25


    This question appears to be off-topic. The users who voted to close gave this specific reason:


    • "Questions about general computing hardware and software are off-topic for Stack Overflow unless they directly involve tools used primarily for programming. You may be able to get help on Super User." – gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia

    If this question can be reworded to fit the rules in the help center, please edit the question.



















      1












      1








      1


      2






      I encrypt a file on server A.



      uname -a
      Linux hwy 4.9.0-8-amd64 #1 SMP Debian 4.9.130-2 (2018-10-27) x86_64 GNU/Linux

      openssl version
      OpenSSL 1.1.0f 25 May 2017

      key="xxxxxxxx"
      openssl enc -des3 -a -salt -in /tmp/wp.sql -k ${key} -out /tmp/wp.sql.asc


      To push the file to server B, and decrypt it on sever B.



      uname -a
      Linux localhost.localdomain 2.6.32-042stab132.1 #1 SMP Wed Jul 11 13:51:30 MSK 2018 x86_64 x86_64 x86_64 GNU/Linux

      openssl version
      OpenSSL 1.0.2k-fips 26 Jan 2017


      To decrypt it on server B.



      key="xxxxxxxx"
      openssl enc -d -des3 -a -salt -k ${key} -in /tmp/wp.sql.asc -out /tmp/wp.sql


      It encounter error info:



      bad decrypt
      139640119146384:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:592:


      How can i decrypt the file on my server B?
      Should i upgrade openssl's version on server B from 1.0.2k-fips to 1.1.0f ?










      share|improve this question
















      I encrypt a file on server A.



      uname -a
      Linux hwy 4.9.0-8-amd64 #1 SMP Debian 4.9.130-2 (2018-10-27) x86_64 GNU/Linux

      openssl version
      OpenSSL 1.1.0f 25 May 2017

      key="xxxxxxxx"
      openssl enc -des3 -a -salt -in /tmp/wp.sql -k ${key} -out /tmp/wp.sql.asc


      To push the file to server B, and decrypt it on sever B.



      uname -a
      Linux localhost.localdomain 2.6.32-042stab132.1 #1 SMP Wed Jul 11 13:51:30 MSK 2018 x86_64 x86_64 x86_64 GNU/Linux

      openssl version
      OpenSSL 1.0.2k-fips 26 Jan 2017


      To decrypt it on server B.



      key="xxxxxxxx"
      openssl enc -d -des3 -a -salt -k ${key} -in /tmp/wp.sql.asc -out /tmp/wp.sql


      It encounter error info:



      bad decrypt
      139640119146384:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:592:


      How can i decrypt the file on my server B?
      Should i upgrade openssl's version on server B from 1.0.2k-fips to 1.1.0f ?







      openssl






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Dec 8 '18 at 19:48









      Amol

      527214




      527214










      asked Nov 28 '18 at 12:14









      it_is_a_literatureit_is_a_literature

      3721962152




      3721962152




      closed as off-topic by gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia Dec 9 '18 at 21:25


      This question appears to be off-topic. The users who voted to close gave this specific reason:


      • "Questions about general computing hardware and software are off-topic for Stack Overflow unless they directly involve tools used primarily for programming. You may be able to get help on Super User." – gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia

      If this question can be reworded to fit the rules in the help center, please edit the question.







      closed as off-topic by gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia Dec 9 '18 at 21:25


      This question appears to be off-topic. The users who voted to close gave this specific reason:


      • "Questions about general computing hardware and software are off-topic for Stack Overflow unless they directly involve tools used primarily for programming. You may be able to get help on Super User." – gre_gor, Temani Afif, sideshowbarker, Matthieu Brucher, Robert Columbia

      If this question can be reworded to fit the rules in the help center, please edit the question.
























          1 Answer
          1






          active

          oldest

          votes


















          3





          +200









          The default hash used in 1.1 is SHA256 where as 1.0 uses MD5. Try using the flag -md sha256 with your decrypt command






          share|improve this answer
































            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            3





            +200









            The default hash used in 1.1 is SHA256 where as 1.0 uses MD5. Try using the flag -md sha256 with your decrypt command






            share|improve this answer






























              3





              +200









              The default hash used in 1.1 is SHA256 where as 1.0 uses MD5. Try using the flag -md sha256 with your decrypt command






              share|improve this answer




























                3





                +200







                3





                +200



                3




                +200





                The default hash used in 1.1 is SHA256 where as 1.0 uses MD5. Try using the flag -md sha256 with your decrypt command






                share|improve this answer















                The default hash used in 1.1 is SHA256 where as 1.0 uses MD5. Try using the flag -md sha256 with your decrypt command







                share|improve this answer














                share|improve this answer



                share|improve this answer








                edited Feb 15 at 9:57

























                answered Dec 1 '18 at 7:25









                AmolAmol

                527214




                527214

















                    Popular posts from this blog

                    Contact image not getting when fetch all contact list from iPhone by CNContact

                    count number of partitions of a set with n elements into k subsets

                    A CLEAN and SIMPLE way to add appendices to Table of Contents and bookmarks