'\" t .\" Title: slogkey .\" Author: [see the "Author" section] .\" Generator: DocBook XSL Stylesheets vsnapshot .\" Date: 01/25/2024 .\" Manual: The slogkey manual page .\" Source: 4.6 .\" Language: English .\" .TH "SLOGKEY" "1" "01/25/2024" "4\&.6" "The slogkey manual page" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ .\" http://bugs.debian.org/507673 .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ .ie \n(.g .ds Aq \(aq .el .ds Aq ' .\" ----------------------------------------------------------------- .\" * set default formatting .\" ----------------------------------------------------------------- .\" disable hyphenation .nh .\" disable justification (adjust text to left margin only) .ad l .\" ----------------------------------------------------------------- .\" * MAIN CONTENT STARTS HERE * .\" ----------------------------------------------------------------- .SH "NAME" slogkey \- Manage cryptographic keys for use with \fBsyslog\-ng\fR secure logging .SH "SYNOPSIS" .HP \w'\fBslogkey\fR\ 'u \fBslogkey\fR [options] [arguments] .SH "DESCRIPTION" .PP The \fBslogkey\fR utility is used to manage cryptographic keys for use with the secure logging module of \fBsyslog\-ng\fR\&. Use this utility to create a master key, derive a host key to be used by a secure logging configuration and to display the current sequence counter of a key\&. The options determine the operating mode and are mutually exclusive\&. .SH "ARGUMENTS" .PP The arguments depend on the operating mode\&. .PP \fBMaster key generation\fR .RS 4 Call sequence: slogkey \-\-master\-ḱey .sp : The name of the file to which the master key will be written\&. .RE .PP \fBHost key derivation\fR .RS 4 Call sequence: slogkey \-\-derive\-key .sp : The master key from which the host key will be derived\&. .sp : The MAC address of the host on which the key will be used\&. Instead of the MAC address, any other string that uniquely identifies a host can be supplied, e\&.g\&. the company inventory number\&. .sp : The serial number of the host on which the key will be used\&. Instead of the serial number, any other string that uniquely identifies a host can be supplied, e\&.g\&. the company inventory number\&. .sp : The name of the file to which the host key will be written\&. .sp NOTE: The newly created host key has its counter set to 0 indicating that it represents the initial host key k0\&. This host key must be kept secret and not be disclosed to third parties\&. It will be required to successfully decrypt and verify log archives processed by the secure logging environment\&. As each log entry will be encrypted with its own key, a new host key will be created after successful processing of a log entry and will replace the previous key\&. Therefore, the initial host key needs to be stored in a safe place before starting the secure logging environment, as it will be deleted from the log host after processing of the first log entry\&. .RE .PP \fBSequence counter display\fR .RS 4 Call sequence: slogkey \-\-counter .sp : The host key file from which the sequence will be read\&. .RE .SH "OPTIONS" .PP \fB\-\-master\-key\fR or \fB\-m\fR .RS 4 Generates a mew master key\&. is the name of the file storing the newly generated master key\&. .RE .PP \fB\-\-derive\-key\fR or \fB\-d\fR .RS 4 Derive a host key using a previously generated master key\&. .RE .PP \fB\-\-counter\fR or \fB\-c\fR .RS 4 Display the current log sequence counter of a key\&. .RE .PP \fB\-\-help\fR or \fB\-h\fR .RS 4 Display a help message\&. .RE .SH "FILES" .PP /usr/bin/slogkey .PP /etc/syslog\-ng\&.conf .SH "SEE ALSO" .PP \fBsyslog\-ng\&.conf\fR(5) .PP \fBsecure\-logging\fR(7) .if n \{\ .sp .\} .RS 4 .it 1 an-trap .nr an-no-space-flag 1 .nr an-break-flag 1 .br .ps +1 \fBNote\fR .ps -1 .br .PP For the detailed documentation of see \m[blue]\fB\fBThe syslog\-ng Administrator Guide\fR\fR\m[]\&\s-2\u[1]\d\s+2 .PP If you experience any problems or need help with syslog\-ng, visit the \m[blue]\fB\fBsyslog\-ng mailing list\fR\fR\m[]\&\s-2\u[2]\d\s+2\&. .PP For news and notifications about of syslog\-ng, visit the \m[blue]\fB\fBsyslog\-ng blogs\fR\fR\m[]\&\s-2\u[3]\d\s+2\&. .PP For specific information requests related to secure logging send a mail to the Airbus Secure Logging Team \&. .sp .5v .RE .SH "AUTHOR" .PP This manual page was written by the Airbus Secure Logging Team \&. .SH "COPYRIGHT" .SH "NOTES" .IP " 1." 4 \fBThe syslog-ng Administrator Guide\fR .RS 4 \%https://www.balabit.com/documents/syslog-ng-ose-latest-guides/en/syslog-ng-ose-guide-admin/html/index.html .RE .IP " 2." 4 \fBsyslog-ng mailing list\fR .RS 4 \%https://lists.balabit.hu/mailman/listinfo/syslog-ng .RE .IP " 3." 4 \fBsyslog-ng blogs\fR .RS 4 \%https://syslog-ng.org/blogs/ .RE