Result for 030E90FF60083CA5537F72A4ADE3A44473473EDD

Query result

Key Value
FileName./usr/share/pki/kra/conf/CS.cfg
FileSize21733
MD5CAB9759BC6EA704A98D0EC916BF0C294
SHA-1030E90FF60083CA5537F72A4ADE3A44473473EDD
SHA-2569CBFD041C7C6EC2813F025FAAA1FC98A2F03DB5B42BC24503ED425276D1996EC
SSDEEP384:uDR+F17NqXlTXOrkw9JHru9CfWIMLYNT8AEU9mJCV+zCa2Nhtn7ozO6oBxsWLfOf:Zrk4JHru9CfWIMLYR8dUwJCV+zCa2NhS
TLSHT187A2A3AB5766AC31458B4A62F02430063961F18DA195740977FF42EABF8F4CD43BB37A
hashlookup:parent-total3
hashlookup:trust65

Network graph view

Parents (Total: 3)

The searched file hash is included in 3 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize183436
MD5D9B3DAF7049A06147415CA7852AC98CC
PackageDescriptionCertificate System - Data Recovery Manager Certificate System (CS) is an enterprise software system designed to manage enterprise Public Key Infrastructure (PKI) deployments. . The Data Recovery Manager (DRM) is an optional PKI subsystem that can act as a Key Recovery Authority (KRA). When configured in conjunction with the Certificate Authority (CA), the DRM stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the DRM which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. . Note that the DRM archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamepki-kra
PackageSectionjava
PackageVersion10.9.4-1
SHA-1A89D8D3C31C6794B36623AD0502D081A0A71BF32
SHA-2569F75F6419605C1D66C300917E294E8AE6C07D5B5F6907EE601BB0F50316316ED
Key Value
FileSize190772
MD5212BFB86EF3D39C3A0749BDFA72B7E97
PackageDescriptionCertificate System - Data Recovery Manager Certificate System (CS) is an enterprise software system designed to manage enterprise Public Key Infrastructure (PKI) deployments. . The Data Recovery Manager (DRM) is an optional PKI subsystem that can act as a Key Recovery Authority (KRA). When configured in conjunction with the Certificate Authority (CA), the DRM stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the DRM which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. . Note that the DRM archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys.
PackageMaintainerDebian FreeIPA Team <pkg-freeipa-devel@alioth-lists.debian.net>
PackageNamepki-kra
PackageSectionjava
PackageVersion10.9.4-1
SHA-1569220DF5674F2768EAAC854750FE002DF1A43B9
SHA-256E97851D816694CF099265E724CA12FB70A0D3E796D7FAB91216CDEE72AB73FD9
Key Value
MD5CF318AAA540AFDC9E6B9BE28B6563DAE
PackageArchnoarch
PackageDescriptionThe Key Recovery Authority (KRA) is an optional PKI subsystem that can act as a key archival facility. When configured in conjunction with the Certificate Authority (CA), the KRA stores private encryption keys as part of the certificate enrollment process. The key archival mechanism is triggered when a user enrolls in the PKI and creates the certificate request. Using the Certificate Request Message Format (CRMF) request format, a request is generated for the user's private encryption key. This key is then stored in the KRA which is configured to store keys in an encrypted format that can only be decrypted by several agents requesting the key at one time, providing for protection of the public encryption keys for the users in the PKI deployment. Note that the KRA archives encryption keys; it does NOT archive signing keys, since such archival would undermine non-repudiation properties of signing keys.
PackageMaintainerFedora Project
PackageNamepki-kra
PackageRelease3.fc33
PackageVersion10.9.4
SHA-10733D0B79BC12513749233C2891283EC4913705C
SHA-256F56147499F09A238BFAE627ED1462E6321C2A0D603790733D1C962CB5263D88A