Solved

Encrypting a shell script

Posted on 2009-06-29
10
689 Views
Last Modified: 2013-12-26
Im looking for a FREE way to encrypt a shell script so that it cant be read but will still be able to be executed. Ive tried shc but i get an error:
 shc -f scriptname.sh
./scriptname.sh.x

./scriptname.sh.x has expired
Please contact your provider
0
Comment
Question by:linuxpig
  • 3
  • 3
  • 3
  • +1
10 Comments
 
LVL 7

Expert Comment

by:unSpawn
ID: 24739867
The "has expired. Please contact your provider." informational message just means an an expiration date was set and says nothing about the License of Shc, the generic shell script compiler (http://www.datsi.fi.upm.es/~frosal/). (Please note obfuscating a shell script does not keep users with sufficient access rights from retrieving the password/passphrase anyway.)
0
 
LVL 61

Expert Comment

by:gheist
ID: 24740292
Binary is more protected - it does not need read access for execution, but anyway - trust models serve better than storing passwords.
0
 

Author Comment

by:linuxpig
ID: 24741227
Well, its not passwords in the script im looking to protect at this time, although for furture reference i may need that. But Unspawn, i received that message on a script i wrote, right after i downloaded the shc gz file, untarred it, ran make, make install and then ran shc -f script.sh. I also tried shc -r -f script.sh and shc -r -T -f script.sh.
So i wondered if there was something wrong with the gz file i downloaded, but it did this after re-downloading the gz file. So i ask if there is another way to do this, encrypting shell scripts, or if there is something im doing wrong with shc.
Thanks you!
0
 
LVL 16

Expert Comment

by:ai_ja_nai
ID: 24743433
>encrypt a shell script so that it cant be read but will still be able to be executed
Why don't you just get rid of read and write permissions for everybody?

chmod go-rw shellscript.sh
0
 
LVL 61

Expert Comment

by:gheist
ID: 24743531
read permission is essential for executing shell script. also it cannot have suid bit.

have a look at sudo option - a protected user dir containing unsafe scripts, and users allowed only to call scripts, not read.
0
Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 

Author Comment

by:linuxpig
ID: 24745110
Permission and sudo wont work here as this script will be used in other servers in the future, so an actual encryption will have to work. As i have said, shc look like it may be the solution but im having issues with it.
 
So if someone know how to resolve it or knows of another way, please let me know.
0
 
LVL 61

Expert Comment

by:gheist
ID: 24745273
Trust scheme like Kerberos.
"encrypted" which decrypts in memory image is piece of cake to snoop.
0
 
LVL 7

Expert Comment

by:unSpawn
ID: 24747412
>So i wondered if there was something wrong with the gz file i downloaded
Probably something wrong with how you executed it. It works as advertised: 'echo -en '#!/bin/sh\necho hello world!\nexit 0\n' > match && ./shc -v -f match -e 01/12/2010 && ./match.x'.
0
 

Author Comment

by:linuxpig
ID: 24762045
Can you give me the steps on how/where you downloaded it, untarred it and then executed it, this way i can make sure the instructions im using on the internet arent faulty
0
 
LVL 7

Accepted Solution

by:
unSpawn earned 125 total points
ID: 24762501
The download page is what I posted in my first comment. If I'm not mistaken the tarball comes with a ready-to-run binary "shc". Delete it, then run 'make clean && make'. The example command to verify it runs OK I have posted in my second comment.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

If you use Adobe Reader X it is possible you can't open OLE PDF documents in the standard. The reason is the 'save box mode' in adobe reader X. Many people think the protected Mode of adobe reader x is only to stop the write access. But this fe…
Little introduction about CP: CP is a command on linux that use to copy files and folder from one location to another location. Example usage of CP as follow: cp /myfoder /pathto/destination/folder/ cp abc.tar.gz /pathto/destination/folder/ab…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now