<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Encryption Questions in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198831#M96226</link>
    <description>Thanks Andy, Steve,&lt;BR /&gt;&lt;BR /&gt;Thank you both for your help.  I think I can figure it out from here.   (But dont worry, if I cant, I'll be back)&lt;BR /&gt;&lt;BR /&gt;Dave.</description>
    <pubDate>Mon, 14 Sep 2009 20:51:05 GMT</pubDate>
    <dc:creator>The Brit</dc:creator>
    <dc:date>2009-09-14T20:51:05Z</dc:date>
    <item>
      <title>Encryption Questions</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198825#M96220</link>
      <description>I notice that when defining Keys for use with backups, the keys are stored in the "Key Storage Table" as logicals, and that the logicals can be Process, Job, Group or System level logicals.&lt;BR /&gt;&lt;BR /&gt;   I have three main questions.&lt;BR /&gt;&lt;BR /&gt;1.    Does this mean that a backup tape must be restored (and decrypted) on the same node that backed it up??&lt;BR /&gt;&lt;BR /&gt;2.    How do the Keys survive across system boots??    Are they stored in a file somewhere??&lt;BR /&gt;&lt;BR /&gt;3.    If the answer to Q1 is "yes", then is it likely that there will be a "/Cluster" option in a future release??&lt;BR /&gt;&lt;BR /&gt;thanks.&lt;BR /&gt;&lt;BR /&gt;Dave.&lt;BR /&gt;</description>
      <pubDate>Mon, 14 Sep 2009 10:51:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198825#M96220</guid>
      <dc:creator>The Brit</dc:creator>
      <dc:date>2009-09-14T10:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Questions</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198826#M96221</link>
      <description>1: No.  If the key is known, the data can be decrypted.  That sort of thing would greatly reduce the ability to decrypt data during DT recovery.&lt;BR /&gt;&lt;BR /&gt;2: Loaded keys do not "survive" reboot.  Required keys need to be reloaded upon each reboot.  "The key is available for use until the system is rebooted" (or until cleared).&lt;BR /&gt;&lt;BR /&gt;3: Ask HP.&lt;BR /&gt;&lt;BR /&gt;Here's the (old) read of the topic:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://h71000.www7.hp.com/doc/82final/6477/6477pro.pdf" target="_blank"&gt;http://h71000.www7.hp.com/doc/82final/6477/6477pro.pdf&lt;/A&gt;</description>
      <pubDate>Mon, 14 Sep 2009 12:02:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198826#M96221</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2009-09-14T12:02:07Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Questions</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198827#M96222</link>
      <description>We use a keys.com to define encryption keys.  You'll need to save your key(s) for worst case scenario.  The logicals are disabled in an encrypted state and don't appear in plain text.  &lt;BR /&gt;&lt;BR /&gt;Your alternative is a manual process to define keys on following reboot.  Define the the process and define who will access the key file.  &lt;BR /&gt;&lt;BR /&gt;Would anyone else use Encryption in Save_Set_Manager?  &lt;BR /&gt;&lt;BR /&gt;Andy Bustamante</description>
      <pubDate>Mon, 14 Sep 2009 15:39:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198827#M96222</guid>
      <dc:creator>Andy Bustamante</dc:creator>
      <dc:date>2009-09-14T15:39:29Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Questions</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198828#M96223</link>
      <description>Andy,&lt;BR /&gt;    would you be prepared to share the "keys.com" script?, either here, or privately.   I can be contacted at; &lt;BR /&gt;&lt;BR /&gt;baxterd at TESSCO dot com.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;Dave.</description>
      <pubDate>Mon, 14 Sep 2009 16:36:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198828#M96223</guid>
      <dc:creator>The Brit</dc:creator>
      <dc:date>2009-09-14T16:36:15Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Questions</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198829#M96224</link>
      <description>I'm putting up an obviously sanitized example.  Depending on system, we either call keys.com from systartup_vms.com, or from a captive operator menu which submits encrypted backup jobs. Depending on the system we directly create encrypted backups or use save_set_manager to copy save sets then create encrypted copies of save_set(s) on disk.  &lt;BR /&gt;&lt;BR /&gt;Don't forget to include your key(s) in off site planning and work out recovery.&lt;BR /&gt;&lt;BR /&gt;Andy</description>
      <pubDate>Mon, 14 Sep 2009 20:30:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198829#M96224</guid>
      <dc:creator>Andy Bustamante</dc:creator>
      <dc:date>2009-09-14T20:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Questions</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198830#M96225</link>
      <description>It's just a DCL wrapper around a wad of ENCRYPT /CREATE_KEY commands, really.  &lt;BR /&gt;&lt;BR /&gt;That DCL might be loaded in from external media, or decrypted from disk storage or otherwise.&lt;BR /&gt;&lt;BR /&gt;I might look to use a USB key disk here (or a removable storage brick) that's connected and mounted and accessed only during a typical sequenced bootstrap.  With a clone located offsite.</description>
      <pubDate>Mon, 14 Sep 2009 20:46:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198830#M96225</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2009-09-14T20:46:53Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Questions</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198831#M96226</link>
      <description>Thanks Andy, Steve,&lt;BR /&gt;&lt;BR /&gt;Thank you both for your help.  I think I can figure it out from here.   (But dont worry, if I cant, I'll be back)&lt;BR /&gt;&lt;BR /&gt;Dave.</description>
      <pubDate>Mon, 14 Sep 2009 20:51:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198831#M96226</guid>
      <dc:creator>The Brit</dc:creator>
      <dc:date>2009-09-14T20:51:05Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Questions</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198832#M96227</link>
      <description>See above.</description>
      <pubDate>Mon, 14 Sep 2009 20:51:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/encryption-questions/m-p/5198832#M96227</guid>
      <dc:creator>The Brit</dc:creator>
      <dc:date>2009-09-14T20:51:50Z</dc:date>
    </item>
  </channel>
</rss>

