Skip site navigation (1)Skip section navigation (2)

FreeBSD Manual Pages

  
 
  

home | help
slogverify(1)		  The slogverify manual	page		 slogverify(1)

NAME
       slogverify --- Verifies cryptographically secured logs.

Synopsis
	      slogverify [options] [arguments]

Description
       The slogverify utility is used to verify	the integrity of cryptographi-
       cally  secured  logs and	to decrypt log entries produced	in a syslog-ng
       OSE secure logging environment.

	      	Normal mode: slogverify	-k <host key file> -m <input MAC file>
		<input file> <output file> [buffers]

	      	Iterative mode:	slogverify -i -p <previous host	key> -r	 <pre-
		vious  MAC>  -m	 <current  MAC>	 <input	 file>	<output	 file>
		[buffers]

Arguments
	      	input file

	      An encrypted log file from the syslog-ng OSE secure logging  en-
	      vironment	that is	verified.

	      	output file

	      The  file	that contains the plain	text log entries after decryp-
	      tion and verification.

	      	buffers

	      Optional number of input buffers.	The number of buffers  can  be
	      used for performance adjustments in case the log file to be ver-
	      ified  is	 very  large  and cannot be processed at once. It is a
	      positive number of log entries that can be held in memory	during
	      verification. The	minimum	number if 10 and the maximum number is
	      4294967295. If this argument is not supplied the default of 1000
	      is used.

Options
	      	--iterative or -i

	      Iterative	mode. This is useful in	case the log files are period-
	      ically copied from the system on which they where	 generated  to
	      central  collector.  As log rotation, i.e. overwriting log files
	      in order to preserve space cannot	be done	in  a  secure  logging
	      environment,  the	iterative mode can be used instead. This works
	      as follows: If a certain storage limit is	reached	the  log  file
	      together	with  the  host	 key and the MAC file is copied	to new
	      destination and the old file is  deleted.	 The  verification  is
	      then performed in	iterations, i.e. separately for	each file that
	      was  retrieved from the log host.	For this to work, it is	impor-
	      tant to always retrieve  the  corresponding  host	 key  and  MAC
	      files.  The  process  can	 be  automated,	for example by calling
	      slogverify in iterative mode from	a script.

	      	--key-file or -k

	      The initial host key (k0). This option is	used  in  normal  mode
	      only.

	      	--mac-file or -m

	      The current MAC file used.

	      	--prev-key-file	or -p

	      The host key corresponding to the	previous log file. This	option
	      can  be used in iterative	mode only. In theory, this can be ini-
	      tial host	key (k0) but using this	key might  generate  warnings,
	      as  the  gap  between the	first log entry	ever (log entry	0) and
	      the first	log entry of the current log file might	be large.

	      	--prev-mac-file	or -r

	      The MAC file from	the previous log file. This option can only be
	      used in iterative	mode.

	      	--help or -h

	      Display a	help message.

Files
       /usr/bin/slogverify

       /etc/syslog-ng.conf

Additional Information
	      	The syslog-ng.conf manual page

	      	The secure-logging manual page

4.9.0			       03 September 2025		 slogverify(1)

Want to link to this manual page? Use this URL:
<https://man.freebsd.org/cgi/man.cgi?query=slogverify&sektion=1&manpath=FreeBSD+Ports+15.0>

home | help