Enter Password For The Encrypted File Setup Configurator 360 2007 Activation

0 views
Skip to first unread message
Message has been deleted

Rhonda Brazler

unread,
Jul 11, 2024, 4:49:01 AM7/11/24
to khalpartmehlrea

I think it is likely you have an unencrypted config file at ../rclone.conf - there is no way rclone can access an encrypted config without the correct password, so I think you must have an alternate unencrypted config.

Thank you for the quick reply. So at least my setup was not completely wrong, I guess .
I did that now. Was not sure about this due to the #!bin/echo....
Beginner mistake I guess but now I am getting

Enter Password For The Encrypted File Setup Configurator 360 2007 activation


Download Zip https://tweeat.com/2yK0vW



It asked for the password of the gpg key. So I unlocked it in the terminal and then once I do pass rclone/config again it gives the password but I am wondering if it asks for the password when it is called by the script.

working so that I can then later on use that command with "copy" or "sync" instead of "ls" in another script that I have yet to write for unattended backups with encrypted config so that I do not have to enter my configuration password but it gets passed to the command using the --password-command flag and retrieving the rclone configuration password from the passwordstore application.

What I am however trying to do is not store it in clear text but retrieve it from a password manager application called passwordstore ( ) which is possible according to the rclone documentation. I setup passwordstore but I am failing to retrieve the password from it.

An alternate means of supplying the password is to provide a script which will retrieve the password and print on standard output. This script should have a fully specified path name and not rely on any environment variables. The script is supplied either via --password-command="..."command line argument or via the RCLONE_PASSWORD_COMMAND environment variable.
One useful example of this is using the passwordstore application to retrieve the password:

If the passwordstore password manager holds the password for the rclone configuration, using the script method means the password is primarily protected by the passwordstore system, and is never embedded in the clear in scripts, nor available for examination using the standard commands available. It is quite possible with long running rclone sessions for copies of passwords to be innocently captured in log files or terminal scroll buffers, etc. Using the script method of supplying the password enhances the security of the config password considerably.

I may be doing this completely wrong...
rclone by itself works, passwordsstore (alias pass) works by itself, but not sure how to get rclone to retrieve the password from passwordstore. I thought I needed a script so I wrote the rclone-pass.sh but not sure of what needs to go in the script...

TACACS works OK, my question was more related to rhe correct syntax for adding the authentication key as part of the server definition, using the newer IOS. Just out of interest did you get the same message when entering the key as pary of the server-private line? On the model I have running 16.9.3 I do.

It is apparent that someone at Cisco has gone as far as implementing the warning message for the TACACS key, but no means to use a better encryption algorithm for the key storage. I would like to know:

stewart-ian, I second your questions. I'm struggling with the same issue on a new 4331 router. If there is a new way to enter the syntax, that would be my preferred path. However, I'm not finding any way to do so.

The warning message displayed when entering a plaintext password for TACACS+ (and RADIUS, and username ... password command) is truly confusing - it seems to suggest that the CLI won't accept plaintext passwords in the future, or that the command syntax will be changing. None of this is true, fortunately :)

What it says is this: At some point in the future, IOS-XE won't store plaintext passwords in running-config or startup-config anymore. It will only store hashed passwords (for authentication purposes when the knowledge of the password plaintext isn't needed anymore) and securely encrypted passwords (for those passwords whose original plaintext still needs to be recoverable). This requires that the password is either already hashed/encrypted at the time you enter it in CLI, or that your switch is configured with strong password encryption so that after you enter the password in plaintext, IOS-XE is immediately able to encrypt it and store in the configuration in the encrypted form. However, IOS-XE will still accept plaintext passwords entered in a CLI, it just won't store them as plaintext in the configuration.

The key config-key password-encryption command will prompt you for a master key that will subsequently be used to encrypt all passwords in the configuration where this encryption is supported, including TACACS+ keys. The encryption of these passwords will be the enabled using the password encryption aes command - without this command, the master key may be configured but will not be used to protect the passwords in the configuration.

This will break a programmatic configuration push by several different scripting tools, and provides nothing helpful to indicate how to get around it or why the error appears.

Worse yet, in 16.9.5 (on 3650s) it looks like you can use "key config-key password-encrypt mypasswordhere" in a script, but it won't work, it won't error, it just won't work, and all keys it generates are still under the old scheme, it only seems to work from the CLI by hand. So to baseline a device, we have to run that command by hand, then we can push out the rest by script.

Even worse, it looks like RADIUS (802.1x/DOT1X) breaks if you do use "password encryption aes" and have FIPS enabled, oh you can have type 7 passwords and issue the command, but it will leave them type 7 and it will still work, but when you remove them and re-add them they will become type 6, and will no longer work. When I say they don't work, I mean requests don't even get sent to the RADIUS server anymore. I've packet captured the VLAN traffic from a switch upstream and there is nothing going to port 1812, 1813, 1645, and 1646 from the device with type 6 RADIUS passwords after the device switches to type 6 RADIUS passwords.

If I remove the "password encryption aes", command, remove the RADIUS server entry with the type 6 passwords and re-add it right back in the exact same way, they go in as type 7 again, and RADIUS works perfect again.

When I go to restore the backup of current config to a replacement 60F, the password is too long for the password field! 15 characters can be entered into the password field when restoring but the password is much bigger than that.

If you're talking about the "Password" to restore a saved encrypted config, that's just for the config file encryption you used when you backuped the config at the original box. That password is different from the admin login password, which is in the config file.
If you're seeing the hashed ENC password for the admin in the config file, you didn't use a password to encrypt the config file when you backed it up. If it was encrypted, you wouldn't be able to find/location the password because the entire file is encrypted.
So you just need to empty out the password box when you restore it.

The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.

Is there a quick and simple way to delete the cli configuration and set a new password? I believe the only thing I had set was a scheduled backup, which appears to have not been running correctly, so attempting to get in there to check it but unable to do so at the moment.

Is what you are looking for.
This can happen on older versions of the CLI tools incorrectly calculating the key if none where set. You may want to also try upgrading to the latest using the package managers as described in Using the Jamf Pro Server Tools Command-Line Interface

I ran into a situation in which resetting the password would work until the following time you launched server-tools.jar. Not sure what the cause was, but have seen it happen during upgrade--very annoying. I contacted support about it and was given this info, which really fixes it for me:

Do I run this command and then delete the tools.yaml file? i am on a windows system, does the same command apply to that? if so do i change the path to any directory? I'm also trying to get into the CLI but unable to without the config pwd.

Sorry that I never saw your response! I never found that command to be helpful. Even if you reset your password, the server tools will never allow it to work on the following launch. The command may work on Linux hosts, but does not on Windows hosts.

In my case, and over a period of a couple years with perhaps a dozen upgrades to different servers completed, it has never functioned for me. Instead, the file deletion I detailed above seems to be the only thing that helps me.

Jamf's purpose is to simplify work by helping organizations manage and secure an Apple experience that end users love and organizations trust. Jamf is the only company in the world that provides a complete management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy. Learn about Jamf.

This site contains User Content submitted by Jamf Nation community members. Jamf does not review User Content submitted by members or other third parties before it is posted. All content on Jamf Nation is for informational purposes only. Information and posts may be out of date when you view them. Jamf is not responsible for, nor assumes any liability for any User Content or other third-party content appearing on Jamf Nation.

Hello, we have a team of 5 and recently installed Plastic Cloud on each of our computers. No problems. We generated an encryption key. On first pull request, the Plastic Client asks for the Encryption Key. We put it in and all is good.

7fc3f7cf58
Reply all
Reply to author
Forward
0 new messages