EnglishFrenchSpanish

OnWorks favicon

wa_keyring - Online in the Cloud

Run wa_keyring in OnWorks free hosting provider over Ubuntu Online, Fedora Online, Windows online emulator or MAC OS online emulator

This is the command wa_keyring that can be run in the OnWorks free hosting provider using one of our multiple free online workstations such as Ubuntu Online, Fedora Online, Windows online emulator or MAC OS online emulator

PROGRAM:

NAME


wa_keyring - WebAuth keyring manipulation tool

SYNOPSIS


wa_keyring [-hv] -f file command [arg ...]

wa_keyring -f keyring add valid-after

wa_keyring -f keyring gc oldest-valid-after-to-keep

wa_keyring -f keyring list

wa_keyring -f keyring remove id

DESCRIPTION


wa_keyring is a command line tool to manage WebAuth key ring files, which contain the
private AES keys used by mod_webauth and mod_webkdc. It supports the following individual
commands:

add valid-after
Adds a new key to the key ring. valid-after uses the format:

nnnn[s|m|h|d|w]

to indicate a time relative to the current time. The units for the time are specified
by appending a single letter. That letter can be any of s, m, h, d, or w, which
correspond to seconds, minutes, hours, days, and weeks respectively.

For example: 10d is 10 days from the current time, and -60d is 60 days before the
current time.

gc oldest-valid-after-to-keep
Garbage collects (removes) old keys on the key ring. Any keys with a valid-after date
older then the specified time will be removed from the key ring.

The format for oldest-valid-after-to-keep is the same as valid-after from the add
command. Note that this means that times given to the gc command should generally be
negative, to remove keys that have expired in the past.

list
Lists all the keys in the key ring. By default, a brief listing is used, but a
verbose listing can be requested with the -v option.

The following fields are present in a short listing:

id The index/position of the key in the key ring.

Created
The date the key was created.

Valid after
The date at which the key becomes valid (in other words, the point at which the
WebAuth server will start using it to encrypt and decrypt new data).

Fingerprint
The MD5 digest of the key data. Used to compare keys in two key rings.

The following fields are present in the long listing:

Key-Id
The index/position of the key in the key ring.

Created
The date the key was created.

Valid-After
The date at which the key becomes valid (in other words, the point at which the
WebAuth server will start using it to encrypt and decrypt new data).

Key-Type
The type of key. Currently, AES is the only supported key type.

Key-Size
Length in bytes of the key.

Fingerprint
The MD5 digest of the key data. Used to compare keys in two key rings.

remove id
Remove the key with ID id from the key ring.

For any of the commands that change the keyring, wa_keyring must have write access to the
directory containing the keyring, since keyrings are updated by writing out the new file
to a separate name and then atomically replacing the file.

Ownership (user and group) of the existing keyring file will be preserved if possible
without overwriting the existing file. Permissions will also be preserved, with the
exception that permissions will not be copied to the new file if the old file was group-
readable or group-writable and setting the group ownership failed.

EXAMPLES


Add a key to the keyring valid as of the current time:

wa_keyring -f keyring add 0d

Add a key to the keyring that will be valid three days from now:

wa_keyring -f keyring add 3d

Remove keys from the key ring that became invalid more than 90 days ago:

wa_keyring -f keyring gc -90d

Remove the first key in the keyring.

wa_keyring -f keyring remove 0

Display a verbose listing of all of the keys in the key ring:

wa_keyring -f keyring -v list

Note that a WebAuth server will normally manage its keyring file by itself, and wa_keyring
is normally only used for debugging purposes. However, if you are setting up a load-
balanced pool of servers that need to all share the same keys, turn off automatic keyring
handling by putting the line:

WebAuthKeyringAutoUpdate off

to your Apache configuration, running a script periodically from cron on one server that
does something like:

wa_keyring -f keyring gc -90d
wa_keyring -f keyring add 2d

and then copying (in a secure manner!) the new keyring file to all of the other servers.

Use wa_keyring online using onworks.net services


Free Servers & Workstations

Download Windows & Linux apps

  • 1
    oStorybook
    oStorybook
    oStorybook l'outil privil�gi� des
    �crivains. ATTENTION : voir sur
    http://ostorybook.tuxfamily.org/v5/
    --en_EN oStorybook the right tool for
    writers. WARNIN...
    Download oStorybook
  • 2
    Asuswrt-Merlin
    Asuswrt-Merlin
    Asuswrt-Merlin is a third party
    firmware for select Asus wireless
    routers. Based on the Asuswrt firmware
    developed by Asus, it brings tweaks, new
    features and ...
    Download Asuswrt-Merlin
  • 3
    Atom
    Atom
    Atom is a text editor that's
    modern, approachable and full-featured.
    It's also easily customizable- you
    can customize it to do anything and be
    able to ...
    Download Atom
  • 4
    Osu!
    Osu!
    Osu! is a simple rhythm game with a well
    thought out learning curve for players
    of all skill levels. One of the great
    aspects of Osu! is that it is
    community-dr...
    Download Osu!
  • 5
    LIBPNG: PNG reference library
    LIBPNG: PNG reference library
    Reference library for supporting the
    Portable Network Graphics (PNG) format.
    Audience: Developers. Programming
    Language: C. This is an application that
    can also...
    Download LIBPNG: PNG reference library
  • 6
    Metal detector based on  RP2040
    Metal detector based on RP2040
    Based on Raspberry Pi Pico board, this
    metal detector is included in pulse
    induction metal detectors category, with
    well known advantages and disadvantages.
    RP...
    Download Metal detector based on RP2040
  • More »

Linux commands

Ad