SLOGVERIFY(1) The slogverify utility manual SLOGVERIFY(1)
NAME
slogverify - Verify cryptographically secured logs
SYNOPSIS
slogverify [arguments]
DESCRIPTION
The slogverify utility is used to verify the integrity of
cryptographically secured logs and to decrypt log entries from with a
secure encrypted destination.
OPTIONS
slogverify <host key file> <input file> <input MAC file> <output file>
[bufferSize]
<host key file> The name of the file containing the initial host
key (key0).
<input file> The cryptographically secured log file.
<input MAC file> The file containing the current message
authenfication code (MAC) for the input file.
<output file> The file receiving the plaintext log entries after
successful verification and decryption.
[bufferSize] Optional buffer size. The buffer size can be used for
performance adjustments in case the log file to be verified is very
large and cannot be processed at once. It is a positive number of
log entries that can be held in memory during verification. The
default is 1000.
-i <previous MAC file file> <previous key file> <input file> <current
MAC file> <output file> [bufferSize]
<previous MAC file file> This is the file containing the MAC from
the previous log file.
<previous key file> This is the file containing the key from the
previous log file. In theory, this can be host key key0, but using
key key0 might generates warnings, as the gap between the first log
entry ever (log entry 0) and the first log entry of the current log
file might be large.
<input file> This is the file containing the current log data.
<current MAC file> This is the file containing the MAC of the
current log input file.
<output file> Decrypted log data will be written into this file.
[bufferSize] Optional buffer size. The buffer size can be used for
performance adjustments in case the log file to be verified is very
large and cannot be processed at once. It is a positive number of
log entries that can be held in memory during verification. The
default is 1000.
FILES
/usr/bin/slogverify
/etc/syslog-ng.conf
SEE ALSO
syslog-ng.conf(5)
Note
For the detailed documentation of see The syslog-ng Administrator
Guide[1]
If you experience any problems or need help with syslog-ng, visit
the syslog-ng mailing list[2].
For news and notifications about of syslog-ng, visit the syslog-ng
blogs[3].
AUTHOR
This manual page was written by the Airbus Secure Logging Team
<secure-logging@airbus.com>.
COPYRIGHT
NOTES
1. The syslog-ng Administrator Guide
https://www.balabit.com/documents/syslog-ng-ose-latest-guides/en/syslog-ng-ose-guide-admin/html/index.html
2. syslog-ng mailing list
https://lists.balabit.hu/mailman/listinfo/syslog-ng
3. syslog-ng blogs
https://syslog-ng.org/blogs/
3.27 06/16/2020 SLOGVERIFY(1)