08-23-2012 03:36 AM - edited 03-16-2019 12:50 PM
Hi all,
I would like to know what encryption algorithm the DRS uses when generating the .TAR files.
The Disaster Recovery System Administration Guide for Release 8.6(1) tells me:
Be aware that your backup .tar files are encrypted by a randomly generated password. This password is then encrypted by using the cluster security password and gets saved along with the backup .tar files. You must remember this security password or take a backup immediately after the security password change/reset.
But I can't figure out what algorithm exactly is used to encrypt the TAR-File (e.g. 256-bit AES, 3DES etc.)
Is there anything in the documentation I missed or does anyone can help me with that?
Thank you in advance.
Regards, david.
Solved! Go to Solution.
08-23-2012 06:42 AM
That kind of information for obvious reasons is not published, I recommend you to engage your AM as you might need to sign some NDAs to get that kind of info.
HTH
java
if this helps, please rate
www.cisco.com/go/pdihelpdesk
08-23-2012 04:02 AM
You did not miss anything in the documentation, the encryption method is not published. Why do you need to know how it is encrypted? Are you looking to decrypt the backup and view the contents?
08-23-2012 04:24 AM
Hi Joe,
thank you for your answer.
I'm currently writing an internal security document for one of my customers describing the security relevant parameters of the Voice Infrastructure. That document is needed for the works committee and one part is the backup-system and the encryption method is uses.
So the reason for my question is more political than technical.
Do you have an idea where I can get this information? (PDI?)
Regards, david.
08-23-2012 06:42 AM
That kind of information for obvious reasons is not published, I recommend you to engage your AM as you might need to sign some NDAs to get that kind of info.
HTH
java
if this helps, please rate
www.cisco.com/go/pdihelpdesk
08-23-2012 06:52 AM
Hi javalenc,
I wasn't expecting that this kind of information is kept that strictly confidential.
If my customer insists on that, I would go your recommended way.
Thank you for your help.
Regards, david.
08-23-2012 07:03 AM
Great answer Java (+5). That is the best way to handle this situation.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide