TSM Encryption security gap?

2016-01-07 Thread Roger Deschner
We are starting to make more use of TSM Encryption. There is a
combination of features that appears to leave a security gap.

We have decided to use ENCRYPTKEY GENERATE, because it provides what is
in effect encryption key escrow. We require key escrow whenever
encryption is used for university data - it's surprising how many times
encryption keys get lost. We also use PASSWORDACCESS GENERATE, in order
to enable automatic scheduled backups.

The gap is in restore. If I have an encrypted drive, whose contents are
backed up using TSM encryption, and then I unplug that drive thinking it
is secure, it is not. Anyone who can boot the machine can restore
everything from the encrypted drive, without entering any key or
password, due to PASSWORDACCESS GENERATE.

We are thinking of instructing users to always do a complete shutdown
(not sleep or hibernate), and to encrypt their boot drive if they have
any sensitive data, even if that data resides somewhere other than the
boot drive. However, this is herding cats. It's unlikely to be followed
in all cases.

A possible solution would be to require re-entry of the TSM password to
restore encrypted data, if both ENCRYPTKEY GENERATE and PASSWORDACCESS
GENERATE are in effect.

Am I understanding this correctly? Is there something I am missing here?

Roger Deschner  University of Illinois at Chicago rog...@uic.edu
==I have not lost my mind -- it is backed up on tape somewhere.=


Re: Old Technote: TSM encryption compliance with FIPS 140-2

2015-03-16 Thread Del Hoobler
Hi Ruth,

You did it the correct way.
I have also reached out to the team to get your comment
sent to the owner of that specific technote.


Del






ADSM: Dist Stor Manager ADSM-L@VM.MARIST.EDU wrote on 03/12/2015
05:56:34 PM:

 From: Mitchell, Ruth Slovik rmi...@illinois.edu
 To: ADSM-L@VM.MARIST.EDU
 Date: 03/12/2015 05:57 PM
 Subject: Old Technote: TSM encryption compliance with FIPS 140-2
 Sent by: ADSM: Dist Stor Manager ADSM-L@VM.MARIST.EDU

 Hi All,

 I know we all grapple with outdated online documentation from time
 to time. Does anyone have a suggestion for the best way to request
 IBM update an out of date technote? I've already submitted feedback
 via the 'rate this page' link. Is it better to open a service
 request? To me that seems like overkill.

 The page in question is,  http://www-01.ibm.com/support/docview.wss?
 uid=swg21442342, last updated in 2012. We'd like to point customers
 to a current IBM page for this type of information, but such out of
 date details aren't very helpful.

 Thanks in advance for recommendations.

 Ruth
 U of I, Urbana, IL



Re: Old Technote: TSM encryption compliance with FIPS 140-2

2015-03-16 Thread Mitchell, Ruth Slovik
Hi Del,

That's very much appreciated!

Best,
Ruth
U of I, Urbana, IL

-Original Message-
From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf Of Del 
Hoobler
Sent: Monday, March 16, 2015 5:57 AM
To: ADSM-L@VM.MARIST.EDU
Subject: Re: [ADSM-L] Old Technote: TSM encryption compliance with FIPS 140-2

Hi Ruth,

You did it the correct way.
I have also reached out to the team to get your comment sent to the owner of 
that specific technote.


Del






ADSM: Dist Stor Manager ADSM-L@VM.MARIST.EDU wrote on 03/12/2015
05:56:34 PM:

 From: Mitchell, Ruth Slovik rmi...@illinois.edu
 To: ADSM-L@VM.MARIST.EDU
 Date: 03/12/2015 05:57 PM
 Subject: Old Technote: TSM encryption compliance with FIPS 140-2 Sent 
 by: ADSM: Dist Stor Manager ADSM-L@VM.MARIST.EDU

 Hi All,

 I know we all grapple with outdated online documentation from time to 
 time. Does anyone have a suggestion for the best way to request IBM 
 update an out of date technote? I've already submitted feedback via 
 the 'rate this page' link. Is it better to open a service request? To 
 me that seems like overkill.

 The page in question is,  http://www-01.ibm.com/support/docview.wss?
 uid=swg21442342, last updated in 2012. We'd like to point customers to 
 a current IBM page for this type of information, but such out of date 
 details aren't very helpful.

 Thanks in advance for recommendations.

 Ruth
 U of I, Urbana, IL



Old Technote: TSM encryption compliance with FIPS 140-2

2015-03-12 Thread Mitchell, Ruth Slovik
Hi All,

I know we all grapple with outdated online documentation from time to time. 
Does anyone have a suggestion for the best way to request IBM update an out of 
date technote? I've already submitted feedback via the 'rate this page' link. 
Is it better to open a service request? To me that seems like overkill.

The page in question is,  
http://www-01.ibm.com/support/docview.wss?uid=swg21442342, last updated in 
2012. We'd like to point customers to a current IBM page for this type of 
information, but such out of date details aren't very helpful.

Thanks in advance for recommendations.

Ruth
U of I, Urbana, IL


Re: More tsm encryption questions

2012-03-23 Thread Bill Boyer
Depends on your goal for encryption. If you need it for encrypting during
transport ( or maybe use SSL ), encrypted data at rest on your storage, data
is encrypted on the tapes going offsite,... Yeah the key is in the TSM DB,
but your need to restore/rebuild TSM to be able to get it. Just dumping out
the tape isn't going to get you any eye-readable material. Don't know if the
auditors or lawyers would accept it, but it's better than nothing. I've
referred to it in the past as the cheap managers' encryption scheme. If you
really need to lock it down, then hardware encryption is the way to go with
an external key manager, but that co$t$, is vender specific as you need TKLM
if you use IBM hardware and you can't mix it if you go to a recovery site.

So it depends on what you're trying to accomplish  and the budget you have.

-Original Message-
From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf Of
Steven Langdale
Sent: Thursday, March 22, 2012 5:10 PM
To: ADSM-L@VM.MARIST.EDU
Subject: Re: [ADSM-L] More tsm encryption questions

Well, there you go. you're spot on there Bill!

I'm struggling to see what use generate is,  What't the point of encrypting
the data when the key is handed out whenever a restore is performed?

That must be why I've only ever used encryptkey save in the past.


On 22 March 2012 19:57, Bill Boyer bjdbo...@comcast.net wrote:

 With the ENCRYPTKEY GENERATE specified the client creates the key at
 the beginning of the backup and that key is kept with the data stream
 stored on the TSM server. When you restore this the key in the data
 stream is used. I believe they also refer to this as transparent
encryption.

 The include.encrypt will only effect future backups, not any backups
 already encrypted and stored on the TSM server.


 Bill Boyer
 There are 10 kinds of people in the world. Those that understand
 binary and those that don't. - ??




 -Original Message-
 From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf
 Of Steven Langdale
 Sent: Thursday, March 22, 2012 2:21 PM
 To: ADSM-L@VM.MARIST.EDU
 Subject: Re: [ADSM-L] More tsm encryption questions

 They restored because the client had an encryption key, delete that,
 or possibly the encryptiontype line and you will be prompted for it.

 As for testing to see if they ARE encrypted, i think the client may
 say with a q backup (but not sure).  The test I used was to try a
 restore after I had removed the key file.

 One aside, if you are using tape technology that compresses, the
 compression will do down the drain.

 Steven



 On 22 March 2012 18:01, Lee, Gary g...@bsu.edu wrote:

  Ok.  Think I have encryption working.
 
  Tried the following experiment.
 
  1. Added these lines to dsm.opt
 
  encryptiontype aes128
  encryptkey generate
  include.encrypt c:\Documents and Settings\glee.BSU\My
  Documents\crypt\...\*
 
  2. did an incremental backup to pick up the crypt folder just
  created and filled.
 
  3. deleted all files starting with phon
 
  4.  restored files starting with phon back to crypt folder, .  Went
well.
 
  5. commented all encryption related lines out of dsm.opt.
 
  6. removed phone* from crypt folder again.
 
  7. restored phone* back to crypt folder.
 
  I thought that with encryption lines removed from dsm.opt, either
  the encrypted files wouldn't restore, or would be restored as garbage.
  Not so. Restored perfectly.
 
  What have I missed?
  Also, is there a way to verify that the specified files are truly
  encrypted?
 
  Thanks again for the assistance.
 
 
 
 
  Gary Lee
  Senior System Programmer
  Ball State University
  phone: 765-285-1310
 
 



More tsm encryption questions

2012-03-22 Thread Lee, Gary
Ok.  Think I have encryption working.

Tried the following experiment.

1. Added these lines to dsm.opt

encryptiontype aes128
encryptkey generate
include.encrypt c:\Documents and Settings\glee.BSU\My Documents\crypt\...\*

2. did an incremental backup to pick up the crypt folder just created and 
filled.

3. deleted all files starting with phon

4.  restored files starting with phon back to crypt folder, .  Went well.

5. commented all encryption related lines out of dsm.opt.

6. removed phone* from crypt folder again.

7. restored phone* back to crypt folder.

I thought that with encryption lines removed from dsm.opt, either the  
encrypted files wouldn't restore, or would be restored as garbage.  Not so. 
Restored perfectly.

What have I missed?
Also, is there a way to verify that the specified files are truly encrypted?

Thanks again for the assistance.




Gary Lee
Senior System Programmer
Ball State University
phone: 765-285-1310

 

Re: More tsm encryption questions

2012-03-22 Thread Steven Langdale
They restored because the client had an encryption key, delete that, or
possibly the encryptiontype line and you will be prompted for it.

As for testing to see if they ARE encrypted, i think the client may say
with a q backup (but not sure).  The test I used was to try a restore after
I had removed the key file.

One aside, if you are using tape technology that compresses, the
compression will do down the drain.

Steven



On 22 March 2012 18:01, Lee, Gary g...@bsu.edu wrote:

 Ok.  Think I have encryption working.

 Tried the following experiment.

 1. Added these lines to dsm.opt

 encryptiontype aes128
 encryptkey generate
 include.encrypt c:\Documents and Settings\glee.BSU\My
 Documents\crypt\...\*

 2. did an incremental backup to pick up the crypt folder just created and
 filled.

 3. deleted all files starting with phon

 4.  restored files starting with phon back to crypt folder, .  Went well.

 5. commented all encryption related lines out of dsm.opt.

 6. removed phone* from crypt folder again.

 7. restored phone* back to crypt folder.

 I thought that with encryption lines removed from dsm.opt, either the
  encrypted files wouldn't restore, or would be restored as garbage.  Not
 so. Restored perfectly.

 What have I missed?
 Also, is there a way to verify that the specified files are truly
 encrypted?

 Thanks again for the assistance.




 Gary Lee
 Senior System Programmer
 Ball State University
 phone: 765-285-1310




Re: More tsm encryption questions

2012-03-22 Thread Bill Boyer
With the ENCRYPTKEY GENERATE specified the client creates the key at the
beginning of the backup and that key is kept with the data stream stored on
the TSM server. When you restore this the key in the data stream is used. I
believe they also refer to this as transparent encryption.

The include.encrypt will only effect future backups, not any backups already
encrypted and stored on the TSM server.


Bill Boyer
There are 10 kinds of people in the world. Those that understand binary and
those that don't. - ??




-Original Message-
From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf Of
Steven Langdale
Sent: Thursday, March 22, 2012 2:21 PM
To: ADSM-L@VM.MARIST.EDU
Subject: Re: [ADSM-L] More tsm encryption questions

They restored because the client had an encryption key, delete that, or
possibly the encryptiontype line and you will be prompted for it.

As for testing to see if they ARE encrypted, i think the client may say with
a q backup (but not sure).  The test I used was to try a restore after I had
removed the key file.

One aside, if you are using tape technology that compresses, the compression
will do down the drain.

Steven



On 22 March 2012 18:01, Lee, Gary g...@bsu.edu wrote:

 Ok.  Think I have encryption working.

 Tried the following experiment.

 1. Added these lines to dsm.opt

 encryptiontype aes128
 encryptkey generate
 include.encrypt c:\Documents and Settings\glee.BSU\My
 Documents\crypt\...\*

 2. did an incremental backup to pick up the crypt folder just created
 and filled.

 3. deleted all files starting with phon

 4.  restored files starting with phon back to crypt folder, .  Went well.

 5. commented all encryption related lines out of dsm.opt.

 6. removed phone* from crypt folder again.

 7. restored phone* back to crypt folder.

 I thought that with encryption lines removed from dsm.opt, either the
 encrypted files wouldn't restore, or would be restored as garbage.
 Not so. Restored perfectly.

 What have I missed?
 Also, is there a way to verify that the specified files are truly
 encrypted?

 Thanks again for the assistance.




 Gary Lee
 Senior System Programmer
 Ball State University
 phone: 765-285-1310




Re: More tsm encryption questions

2012-03-22 Thread Steven Langdale
Well, there you go. you're spot on there Bill!

I'm struggling to see what use generate is,  What't the point of encrypting
the data when the key is handed out whenever a restore is performed?

That must be why I've only ever used encryptkey save in the past.


On 22 March 2012 19:57, Bill Boyer bjdbo...@comcast.net wrote:

 With the ENCRYPTKEY GENERATE specified the client creates the key at the
 beginning of the backup and that key is kept with the data stream stored on
 the TSM server. When you restore this the key in the data stream is used. I
 believe they also refer to this as transparent encryption.

 The include.encrypt will only effect future backups, not any backups
 already
 encrypted and stored on the TSM server.


 Bill Boyer
 There are 10 kinds of people in the world. Those that understand binary
 and
 those that don't. - ??




 -Original Message-
 From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf Of
 Steven Langdale
 Sent: Thursday, March 22, 2012 2:21 PM
 To: ADSM-L@VM.MARIST.EDU
 Subject: Re: [ADSM-L] More tsm encryption questions

 They restored because the client had an encryption key, delete that, or
 possibly the encryptiontype line and you will be prompted for it.

 As for testing to see if they ARE encrypted, i think the client may say
 with
 a q backup (but not sure).  The test I used was to try a restore after I
 had
 removed the key file.

 One aside, if you are using tape technology that compresses, the
 compression
 will do down the drain.

 Steven



 On 22 March 2012 18:01, Lee, Gary g...@bsu.edu wrote:

  Ok.  Think I have encryption working.
 
  Tried the following experiment.
 
  1. Added these lines to dsm.opt
 
  encryptiontype aes128
  encryptkey generate
  include.encrypt c:\Documents and Settings\glee.BSU\My
  Documents\crypt\...\*
 
  2. did an incremental backup to pick up the crypt folder just created
  and filled.
 
  3. deleted all files starting with phon
 
  4.  restored files starting with phon back to crypt folder, .  Went well.
 
  5. commented all encryption related lines out of dsm.opt.
 
  6. removed phone* from crypt folder again.
 
  7. restored phone* back to crypt folder.
 
  I thought that with encryption lines removed from dsm.opt, either the
  encrypted files wouldn't restore, or would be restored as garbage.
  Not so. Restored perfectly.
 
  What have I missed?
  Also, is there a way to verify that the specified files are truly
  encrypted?
 
  Thanks again for the assistance.
 
 
 
 
  Gary Lee
  Senior System Programmer
  Ball State University
  phone: 765-285-1310
 
 



Re: More tsm encryption questions

2012-03-22 Thread Prather, Wanda
I'm struggling to see what use generate is,  What't the point of encrypting 
the data when the key is handed out whenever a restore is performed?
Well, it prevents anybody who doesn't have access to the console of that 
machine from restoring the data, esp. to a different machine.
If you don't use generate, then the backup can't be run by the scheduler 
because there is no one there to answer the prompt for the key.

If you want to do a manual backup and supply the ken, specify encryptkey prompt.

Here is info you can use to verify whether the data is encrypted:
http://adsm.org/lists/html/ADSM-L/2009-03/msg00425.html


That must be why I've only ever used encryptkey save in the past.


On 22 March 2012 19:57, Bill Boyer bjdbo...@comcast.net wrote:

 With the ENCRYPTKEY GENERATE specified the client creates the key at 
 the beginning of the backup and that key is kept with the data stream 
 stored on the TSM server. When you restore this the key in the data 
 stream is used. I believe they also refer to this as transparent encryption.

 The include.encrypt will only effect future backups, not any backups 
 already encrypted and stored on the TSM server.


 Bill Boyer
 There are 10 kinds of people in the world. Those that understand 
 binary and those that don't. - ??




 -Original Message-
 From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf 
 Of Steven Langdale
 Sent: Thursday, March 22, 2012 2:21 PM
 To: ADSM-L@VM.MARIST.EDU
 Subject: Re: [ADSM-L] More tsm encryption questions

 They restored because the client had an encryption key, delete that, 
 or possibly the encryptiontype line and you will be prompted for it.

 As for testing to see if they ARE encrypted, i think the client may 
 say with a q backup (but not sure).  The test I used was to try a 
 restore after I had removed the key file.

 One aside, if you are using tape technology that compresses, the 
 compression will do down the drain.

 Steven



 On 22 March 2012 18:01, Lee, Gary g...@bsu.edu wrote:

  Ok.  Think I have encryption working.
 
  Tried the following experiment.
 
  1. Added these lines to dsm.opt
 
  encryptiontype aes128
  encryptkey generate
  include.encrypt c:\Documents and Settings\glee.BSU\My 
  Documents\crypt\...\*
 
  2. did an incremental backup to pick up the crypt folder just 
  created and filled.
 
  3. deleted all files starting with phon
 
  4.  restored files starting with phon back to crypt folder, .  Went well.
 
  5. commented all encryption related lines out of dsm.opt.
 
  6. removed phone* from crypt folder again.
 
  7. restored phone* back to crypt folder.
 
  I thought that with encryption lines removed from dsm.opt, either 
  the encrypted files wouldn't restore, or would be restored as garbage.
  Not so. Restored perfectly.
 
  What have I missed?
  Also, is there a way to verify that the specified files are truly 
  encrypted?
 
  Thanks again for the assistance.
 
 
 
 
  Gary Lee
  Senior System Programmer
  Ball State University
  phone: 765-285-1310
 
 



Re: Verifying IBM TSM Encryption types

2011-08-02 Thread Richard Sims
On Aug 1, 2011, at 10:59 PM, terrance wrote:

 So What you mean is TSM server don't has its own encryption instead help by 
 the driver or client side encryption?
 ...

The Administrator's Guide for your given TSM release will describe encryption 
opportunities available from the standpoint of the TSM server.  The server 
developers don't waste time creating functionality which is provided by other 
means, such as tape drives (let the hardware do the work) or the client (where 
data must be secure in network conveyance and disk storage pool residency).  
Certainly, it's possible to encrypt data twice, just as it can be subjected to 
multiple phases of processing performing compression in passing data.

   Richard Sims


Verifying IBM TSM Encryption types

2011-08-02 Thread terrance
1)Any prerequisite or condition require before the data been encrypted such as 
according to my understanding, TSM is a storage manager server, so any driver 
or software need to install or configure to enable the encryption method either 
by client side or driver side?

2) According to the information I found that EKM must be installed before 
configure the TSM with LME and SME. So in this stage how can i verify or 
justify the EKM is installed in TSM server?

+--
|This was sent by terrancey...@yahoo.com via Backup Central.
|Forward SPAM to ab...@backupcentral.com.
+--


Verifying IBM TSM Encryption types

2011-08-02 Thread terrance
I checked my TSM server with this command
q devclass Device name f=d
and it shows the Driver Encryption is set ON.
So I know that my TSM server is using AME method to encrypt the data
But any prerequisite and configure steps to achieve it?

+--
|This was sent by terrancey...@yahoo.com via Backup Central.
|Forward SPAM to ab...@backupcentral.com.
+--


Verifying IBM TSM Encryption types

2011-08-01 Thread terrance
How can I retrieve all the information about the what kind of encryption method 
or type is using on my TSM server?
What I mean is how to check the backup data and store into a tape whether 
encrypted or not?
Isn't it related to the default encrypted method AES 128 or alternative 
encrypted method DES56?
Or else it is related to the AME, LME or SME?
Please proivde me the method or command even the file's path to verify or 
justify the information above.
Thank you.

+--
|This was sent by terrancey...@yahoo.com via Backup Central.
|Forward SPAM to ab...@backupcentral.com.
+--


Re: Verifying IBM TSM Encryption types

2011-08-01 Thread Richard Sims
TSM client encryption can be verified per IBM Technote 1303197.
Tape drive encryption is a hardware topic addressed by the documentation for 
the particular drive model, as in recent 3592 model variants.

Richard Sims


Re: Verifying IBM TSM Encryption types

2011-08-01 Thread Grigori Solonovitch
In addition - in case of using TDP for Oracle you can inspect TSM Server logs 
for TDP nodes. I think for other TDPs it is the same.
Be careful with encryption for TDP backups - some additional configuration 
efforts are required .


From: ADSM: Dist Stor Manager [ADSM-L@VM.MARIST.EDU] On Behalf Of Richard Sims 
[r...@bu.edu]
Sent: Monday, August 01, 2011 8:10 PM
To: ADSM-L@VM.MARIST.EDU
Subject: Re: [ADSM-L] Verifying IBM TSM Encryption types

TSM client encryption can be verified per IBM Technote 1303197.
Tape drive encryption is a hardware topic addressed by the documentation for 
the particular drive model, as in recent 3592 model variants.

Richard Sims


Please consider the environment before printing this Email.

CONFIDENTIALITY AND WAIVER: The information contained in this electronic mail 
message and any attachments hereto may be legally privileged and confidential. 
The information is intended only for the recipient(s) named in this message. If 
you are not the intended recipient you are notified that any use, disclosure, 
copying or distribution is prohibited. If you have received this in error 
please contact the sender and delete this message and any attachments from your 
computer system. We do not guarantee that this message or any attachment to it 
is secure or free from errors, computer viruses or other conditions that may 
damage or interfere with data, hardware or software.


Verifying IBM TSM Encryption types

2011-08-01 Thread terrance
So What you mean is TSM server don't has its own encryption instead help by the 
driver or client side encryption?
1) What i mean is that when data store inside the storage, any encryption step 
will run in this stage before it backup into a tape?

2) Will it possible a TSM server using both encryption such as driver 
encryption (AME, LME or SME) and client side encryption?

For example, when a client submit a data or info to the storage, the data was 
encrypted and stored in the storage. After that when backup is start, the data 
will encrypted second time and stored into a tape by the driver.
so does it make sense?

+--
|This was sent by terrancey...@yahoo.com via Backup Central.
|Forward SPAM to ab...@backupcentral.com.
+--


Anyone doing TSM Encryption on TS1120's in a 3494 tape library??

2007-12-05 Thread William Boyer
Looking for help...TSM 5.4.1.1 on WIndows2003 running the latest IBM tape 
driver. The library and drives are at the latest firmware
as of about 2-weeks ago. The drives have application encryption enabled. This 
was done through the CE interface on the back of the
drives. A query of the drive VPD data from the library console shows 
application encryption is enabled.

When we enable encryption in TSM  UPD DEVC 3592 DRIVEENCRYPTION=ON, we get 
ANR8985E message when mounting scratch tapes. Using the
NTUTIL command and specifying that you want 59: Get encryption State it shows:

Encryption capable: True
Encryption method: None (0)
Encryption state: Off (0)

We rebooted the TSM server after making the encryption changes to the drives.

Could really use some help on thiscalling IBM and trying to figure out 
where to start is it a TSM issue...driverhardware
configuraiton..???

Bill Boyer
Select * from USERS where CLUE0
0 rows returned


Re: Anyone doing TSM Encryption on TS1120's in a 3494 tape library??

2007-12-05 Thread Strand, Neil B.
I have the EKM set up doing library managed encryption.  It works well
once it is set up and takes any TSM dependencies out of the picture.  It
also allows me to push off most of the encryption maintenance to our
security group.
IBM's encryption expertise for open systems has been underwhelming.
I am using EKM on AIX.  It should work on Windows if you get the correct
java and configurations.


Neil Strand
Storage Engineer - Legg Mason
Baltimore, MD.
(410) 580-7491
Whatever you can do or believe you can, begin it.
Boldness has genius, power and magic.


-Original Message-
From: ADSM: Dist Stor Manager [mailto:[EMAIL PROTECTED] On Behalf Of
William Boyer
Sent: Wednesday, December 05, 2007 9:56 AM
To: ADSM-L@VM.MARIST.EDU
Subject: [ADSM-L] Anyone doing TSM Encryption on TS1120's in a 3494 tape
library??

Looking for help...TSM 5.4.1.1 on WIndows2003 running the latest IBM
tape driver. The library and drives are at the latest firmware as of
about 2-weeks ago. The drives have application encryption enabled. This
was done through the CE interface on the back of the drives. A query of
the drive VPD data from the library console shows application encryption
is enabled.

When we enable encryption in TSM  UPD DEVC 3592 DRIVEENCRYPTION=ON, we
get ANR8985E message when mounting scratch tapes. Using the NTUTIL
command and specifying that you want 59: Get encryption State it shows:

Encryption capable: True
Encryption method: None (0)
Encryption state: Off (0)

We rebooted the TSM server after making the encryption changes to the
drives.

Could really use some help on thiscalling IBM and trying to figure
out where to start is it a TSM issue...driverhardware
configuraiton..???

Bill Boyer
Select * from USERS where CLUE0
0 rows returned

IMPORTANT:  E-mail sent through the Internet is not secure. Legg Mason 
therefore recommends that you do not send any confidential or sensitive 
information to us via electronic mail, including social security numbers, 
account numbers, or personal identification numbers. Delivery, and or timely 
delivery of Internet mail is not guaranteed. Legg Mason therefore recommends 
that you do not send time sensitive 
or action-oriented messages to us via electronic mail.

This message is intended for the addressee only and may contain privileged or 
confidential information. Unless you are the intended recipient, you may not 
use, copy or disclose to anyone any information contained in this message. If 
you have received this message in error, please notify the author by replying 
to this message and then kindly delete the message. Thank you.


Re: LTO4 and TSM Encryption of Storage Pool Volumes and DB Backup Tapes

2007-08-14 Thread Strand, Neil B.
Kelly,
I'm using TS1120 drives and wrestled with the same issues.  I ended
up using system encryption with the EKM because:

1. It provides the greatest level of granularity - Individual tape
drives and volumes may be designated for encryption
2. TSM is oblivious to this type of encryption thus limiting any
incompatabilities and avoiding the situatiion you describe.
3. Management of the encryption keys can be performed by our security
group with minimal interaction with TSM
4. Other applications can use the encrypted tape drives (with
appropriate library partitioning).
5. It simplifies any data sharing with partners - we can create a tape
with a unique key for that business partner or read a tape from a
business partner with their key.  All without regard to TSM.

I currently have one library manager with two library clients at a
single site with a 700TB TS3500 library.
I am expanding to two sites each with a TSM library manager, 8 TSM
library clients, a couple of LAN-Free clients and NDMP backups with a
1.2PB TS3500 library at each site.

I need to be able to recover one site to the other.  Using System level
encryption, I have synchronized keys at both sites, thus greatly
simplyfying recovery efforts.  The synchronized keys also provide a
means of failover protection in that the encryption key may be provided
from any of four key managers - two located at each site to either
library.

TSM database backup will be done direct to tape for offsite and a second
copy to another server for onsite recovery.  The encryption keys are
stored on alternate media which is refreshed whenever there is a key
change.


Cheers,
Neil Strand
Legg Mason
Storage Engineer
(410) 580-7491


-Original Message-
From: ADSM: Dist Stor Manager [mailto:[EMAIL PROTECTED] On Behalf Of
Kelly Lipp
Sent: Monday, August 13, 2007 4:20 PM
To: ADSM-L@VM.MARIST.EDU
Subject: [ADSM-L] LTO4 and TSM Encryption of Storage Pool Volumes and DB
Backup Tapes

Folks,

I'm trying to plug the hole in the system here.  With TSM V5.3.5.2 and
5.4.0.2 LTO4 drives and their encryption functionality can finally be
exploited at the application level.  Within TSM, we use device classes
to enable this.  So I'm thinking one could have one device class
supporting encryption and another not (both in the same library) and
have pools associated with these device classes, blah, blah, blah.  You
get the idea.  Cool, cool.

OK, so now all the encryption keys are stored in the TSM database.  The
problem is I now create an un-encrypted db backup tape to send offsite
with my encrypted volumes and I've a whee bit of a problem.

How are others rectifying this: use System level or library level
instead of or in addition to Application Managed with TSM?  Keep the
backup tape and the storage pool volumes separate (that's gotta be a bad
idea from the get go)?  Other ideas?

Unless I'm missing something, this just can't work well at all.  Perhaps
a switch on the backup db command... (but then who would manage that
key?)

The genesis of this is my attempt to get my hands around AME, SME and
LME.  Whew: you want a headache just start reading about all of that.
And if that's not enough, IBM's Encryption Key Management Java
application is real fun.  The more I read the more I like client side
encryption.  But everyone is screaming to encrypt everything.

Share your thoughts.  I intend to write a short white paper on all of
this once I get my head around it all.

Kelly J. Lipp
VP Manufacturing  CTO
STORServer, Inc.
485-B Elkton Drive
Colorado Springs, CO 80907
719-266-8777
[EMAIL PROTECTED]


IMPORTANT:  E-mail sent through the Internet is not secure. Legg Mason 
therefore recommends that you do not send any confidential or sensitive 
information to us via electronic mail, including social security numbers, 
account numbers, or personal identification numbers. Delivery, and or timely 
delivery of Internet mail is not guaranteed. Legg Mason therefore recommends 
that you do not send time sensitive 
or action-oriented messages to us via electronic mail.

This message is intended for the addressee only and may contain privileged or 
confidential information. Unless you are the intended recipient, you may not 
use, copy or disclose to anyone any information contained in this message. If 
you have received this message in error, please notify the author by replying 
to this message and then kindly delete the message. Thank you.


LTO4 and TSM Encryption of Storage Pool Volumes and DB Backup Tapes

2007-08-13 Thread Kelly Lipp
Folks,
 
I'm trying to plug the hole in the system here.  With TSM V5.3.5.2 and
5.4.0.2 LTO4 drives and their encryption functionality can finally be
exploited at the application level.  Within TSM, we use device classes
to enable this.  So I'm thinking one could have one device class
supporting encryption and another not (both in the same library) and
have pools associated with these device classes, blah, blah, blah.  You
get the idea.  Cool, cool.
 
OK, so now all the encryption keys are stored in the TSM database.  The
problem is I now create an un-encrypted db backup tape to send offsite
with my encrypted volumes and I've a whee bit of a problem.
 
How are others rectifying this: use System level or library level
instead of or in addition to Application Managed with TSM?  Keep the
backup tape and the storage pool volumes separate (that's gotta be a bad
idea from the get go)?  Other ideas?
 
Unless I'm missing something, this just can't work well at all.  Perhaps
a switch on the backup db command... (but then who would manage that
key?)
 
The genesis of this is my attempt to get my hands around AME, SME and
LME.  Whew: you want a headache just start reading about all of that.
And if that's not enough, IBM's Encryption Key Management Java
application is real fun.  The more I read the more I like client side
encryption.  But everyone is screaming to encrypt everything.
 
Share your thoughts.  I intend to write a short white paper on all of
this once I get my head around it all.
 
Kelly J. Lipp
VP Manufacturing  CTO
STORServer, Inc.
485-B Elkton Drive
Colorado Springs, CO 80907
719-266-8777
[EMAIL PROTECTED]
 


Re: Using tsm-encryption and want to change the hostname at the Client

2006-08-04 Thread Alexei Kojenov
 and want to revert.
 
 Alexei
 
 ---
 
 Dear TSmers,
 
 we have tsmserver 5.3.3.2 /solaris and tsm-Client 5.3.4.0 /linux.
 
 On the Client we use tsm-encryption :
 The 'nodename' Option is set in the dsm.sys and also the
 'encryptkey save' OPtion is set  and  'encryptiontype AES128' is also
 
  set.
 
 The inclexc-File contains a line like 'include.encrypt *'
 So far anything runs fine :-)
 
 Problem: Next week we have to change the 'hostname' of that
 
  linux-server.
 
 The Question now is : - if any - what steps are to be done at the
 tsm-Client ?
 ... and even at the tsm-server ?
 The (tsm)nodename won't be changed.
 Do I need the TSM-Client in a manual way give once again the
 encryption-key password to let the encryption-key be generated ?
 Or is there nothing to be done at the Client ?
 
 I have looked throgh the lists and docs and havent't found any
 'procedures' for that scenario - just pointers to dependancies on the
 system's hostname.
 
 Thanks in advance for any hints , recipe or links ... !
 Rainer
 


Re: Using tsm-encryption and want to change the hostname at the Client

2006-08-01 Thread Rainer Wolf

Alexei,
thanks a lot for your detailled explanation  !  It's clearer to me now :-)
... just only two more questions ?
What about the windows-Clients - do I then (when changing the windows 
system-name)
also have to manually remove the  equivalent 'TSM.PWD' entry
in the registry or elsewhere ?
if so: Is that something to be done with the windows registry-editor
or is there a tsm-windows-client function that can do for me the
renaming/refresh of the locally stored tsm-pwds on windows so I can reenter
the (same) encryption key passord once again ?

About the 'using some garbage encryption key' : Isn't that something
where the tsm-client really should say 'NO'
stop backup and generate an error message ?
... preventing the user to have something unrecoverable
- is there an existing apar ?

Best regards
Rainer


Alexei Kojenov schrieb:


Rainer,

Your data is always encrypted with the key generated from the password that
you enter, regardless of the hostname. The hostname is only used to store
the password locally. For example,

1) Let's say the hostname is 'mercury'
2) You run your first backup and are prompted for encryption key password.
Let's say you enter 'secret'
3) The string 'secret' is encrypted with 'mercury' and is stored in TSM.PWD
4) The data are encrypted with 'secret'.
5) On the next backup, the stored password is retrieved from TSM.PWD and
decrypted with 'mercury', and 'secret' is used for data backup.

6) Let's say you change the hostname to 'venus' and delete/rename existing
TSM.PWD
7) TSM prompts you for encryption key password and you enter 'secret'
again.
8) 'secret' is encrypted with 'venus' and is stored in TSM.PWD (note,
TSM.PWD will binary differ from the one from step 3, because the key, which
is dependent on hostname, is different)
9) The data are encrypted with 'secret' (the same as in step 4, regardless
of hostname).
10) On the next backup, stored password is decrypted with 'venus', and the
same password 'secret' is used for backup.

So you shouldn't worry about validity of your old backups as long as you
use the same encryption password and you deleted/renamed TSM.PWD when
changing the hostname.

The problems come when someone changes the hostname bud does not delete
TSM.PWD. In the example above, a backup following the hostname change will
try to decrypt stored password with 'venus' and will get an incorrect
result (because 'secret' was originally encrypted with 'mercury'!), so the
new backups will be using some garbage encryption key, and it would be
really hard to restore the new data correctly if TSM.PWD is lost or if the
restore happens on a different machine.

Alexei


ADSM: Dist Stor Manager ADSM-L@VM.MARIST.EDU wrote on 07/27/2006
06:31:17 AM:



Hi Alexei,

thanks for your hint - now i come with a new question concerning the
'restore' :
Because nothing changes other than the 'hostname' of that linux system


...


... what about the data that has been backed up prior to the time
I rename the hostname and reenter the 'encryption key password' ?

Because I stay with 'encryptkey save' what happens when (some time)
I may do a full restore of the '/home/' -Filespace ?

Because this Filespace '/home/'  has data backed up that is encrypted
with both encryption-key-usage of the old and the new 'hostname'
( but always the same 'tsm-Nodename' )
... will I am able to restore(and decrypt) all of it ?

... i fear to go into problems - Or do I have to start backup again
from 'zero' - for example :
by renaming  the filespace on the server
at the time changing the hostname ?

Thanks again for any hints !
-- that is something really confusing to me :-|

Rainer



Alexei Kojenov schrieb:



Rainer,

You need to make TSM client prompt you for encryption key password on


the


next backup after you changed the hostname. The only way to do this is


to


rename/remove the existing TSM.PWD file (this is the file where TSM


client


stores its passwords). You should rename this file rather than delete


it,


in case you have problems and want to revert.

Alexei

---

Dear TSmers,

we have tsmserver 5.3.3.2 /solaris and tsm-Client 5.3.4.0 /linux.

On the Client we use tsm-encryption :
The 'nodename' Option is set in the dsm.sys and also the
'encryptkey save' OPtion is set  and  'encryptiontype AES128' is also


set.


The inclexc-File contains a line like 'include.encrypt *'
So far anything runs fine :-)

Problem: Next week we have to change the 'hostname' of that


linux-server.


The Question now is : - if any - what steps are to be done at the
tsm-Client ?
... and even at the tsm-server ?
The (tsm)nodename won't be changed.
Do I need the TSM-Client in a manual way give once again the
encryption-key password to let the encryption-key be generated ?
Or is there nothing to be done at the Client ?

I have looked throgh the lists and docs and havent't found any
'procedures' for that scenario - just pointers to dependancies on the
system's hostname.

Thanks in advance for any

Re: Using tsm-encryption and want to change the hostname at the Client

2006-07-31 Thread Alexei Kojenov
Rainer,

Your data is always encrypted with the key generated from the password that
you enter, regardless of the hostname. The hostname is only used to store
the password locally. For example,

1) Let's say the hostname is 'mercury'
2) You run your first backup and are prompted for encryption key password.
Let's say you enter 'secret'
3) The string 'secret' is encrypted with 'mercury' and is stored in TSM.PWD
4) The data are encrypted with 'secret'.
5) On the next backup, the stored password is retrieved from TSM.PWD and
decrypted with 'mercury', and 'secret' is used for data backup.

6) Let's say you change the hostname to 'venus' and delete/rename existing
TSM.PWD
7) TSM prompts you for encryption key password and you enter 'secret'
again.
8) 'secret' is encrypted with 'venus' and is stored in TSM.PWD (note,
TSM.PWD will binary differ from the one from step 3, because the key, which
is dependent on hostname, is different)
9) The data are encrypted with 'secret' (the same as in step 4, regardless
of hostname).
10) On the next backup, stored password is decrypted with 'venus', and the
same password 'secret' is used for backup.

So you shouldn't worry about validity of your old backups as long as you
use the same encryption password and you deleted/renamed TSM.PWD when
changing the hostname.

The problems come when someone changes the hostname bud does not delete
TSM.PWD. In the example above, a backup following the hostname change will
try to decrypt stored password with 'venus' and will get an incorrect
result (because 'secret' was originally encrypted with 'mercury'!), so the
new backups will be using some garbage encryption key, and it would be
really hard to restore the new data correctly if TSM.PWD is lost or if the
restore happens on a different machine.

Alexei


ADSM: Dist Stor Manager ADSM-L@VM.MARIST.EDU wrote on 07/27/2006
06:31:17 AM:

 Hi Alexei,

 thanks for your hint - now i come with a new question concerning the
 'restore' :
 Because nothing changes other than the 'hostname' of that linux system
...
 ... what about the data that has been backed up prior to the time
 I rename the hostname and reenter the 'encryption key password' ?

 Because I stay with 'encryptkey save' what happens when (some time)
 I may do a full restore of the '/home/' -Filespace ?

 Because this Filespace '/home/'  has data backed up that is encrypted
 with both encryption-key-usage of the old and the new 'hostname'
 ( but always the same 'tsm-Nodename' )
 ... will I am able to restore(and decrypt) all of it ?

 ... i fear to go into problems - Or do I have to start backup again
 from 'zero' - for example :
 by renaming  the filespace on the server
 at the time changing the hostname ?

 Thanks again for any hints !
 -- that is something really confusing to me :-|

 Rainer



 Alexei Kojenov schrieb:

  Rainer,
 
  You need to make TSM client prompt you for encryption key password on
the
  next backup after you changed the hostname. The only way to do this is
to
  rename/remove the existing TSM.PWD file (this is the file where TSM
client
  stores its passwords). You should rename this file rather than delete
it,
  in case you have problems and want to revert.
 
  Alexei
 
  ---
 
  Dear TSmers,
 
  we have tsmserver 5.3.3.2 /solaris and tsm-Client 5.3.4.0 /linux.
 
  On the Client we use tsm-encryption :
  The 'nodename' Option is set in the dsm.sys and also the
  'encryptkey save' OPtion is set  and  'encryptiontype AES128' is also
set.
  The inclexc-File contains a line like 'include.encrypt *'
  So far anything runs fine :-)
 
  Problem: Next week we have to change the 'hostname' of that
linux-server.
  The Question now is : - if any - what steps are to be done at the
  tsm-Client ?
  ... and even at the tsm-server ?
  The (tsm)nodename won't be changed.
  Do I need the TSM-Client in a manual way give once again the
  encryption-key password to let the encryption-key be generated ?
  Or is there nothing to be done at the Client ?
 
  I have looked throgh the lists and docs and havent't found any
  'procedures' for that scenario - just pointers to dependancies on the
  system's hostname.
 
  Thanks in advance for any hints , recipe or links ... !
  Rainer
 
 
  --
 

  Rainer Wolf  eMail:
[EMAIL PROTECTED]
  kiz - Abt. Infrastruktur   Tel/Fax:  ++49 731
50-22482/22471
  Universitaet Ulm wwweb:
http://kiz.uni-ulm.de
 
 

 --
 
 Rainer Wolf  eMail:   [EMAIL PROTECTED]
 kiz - Abt. Infrastruktur   Tel/Fax:  ++49 731 50-22482/22471
 Universitaet Ulm wwweb:http://kiz.uni-ulm.de


Re: Using tsm-encryption and want to change the hostname at the Client

2006-07-27 Thread Rainer Wolf

Hi Alexei,

thanks for your hint - now i come with a new question concerning the 'restore' :
Because nothing changes other than the 'hostname' of that linux system ...
... what about the data that has been backed up prior to the time
I rename the hostname and reenter the 'encryption key password' ?

Because I stay with 'encryptkey save' what happens when (some time)
I may do a full restore of the '/home/' -Filespace ?

Because this Filespace '/home/'  has data backed up that is encrypted
with both encryption-key-usage of the old and the new 'hostname'
( but always the same 'tsm-Nodename' )
... will I am able to restore(and decrypt) all of it ?

... i fear to go into problems - Or do I have to start backup again
from 'zero' - for example :
by renaming  the filespace on the server
at the time changing the hostname ?

Thanks again for any hints !
-- that is something really confusing to me :-|

Rainer



Alexei Kojenov schrieb:


Rainer,

You need to make TSM client prompt you for encryption key password on the
next backup after you changed the hostname. The only way to do this is to
rename/remove the existing TSM.PWD file (this is the file where TSM client
stores its passwords). You should rename this file rather than delete it,
in case you have problems and want to revert.

Alexei

---

Dear TSmers,

we have tsmserver 5.3.3.2 /solaris and tsm-Client 5.3.4.0 /linux.

On the Client we use tsm-encryption :
The 'nodename' Option is set in the dsm.sys and also the
'encryptkey save' OPtion is set  and  'encryptiontype AES128' is also set.
The inclexc-File contains a line like 'include.encrypt *'
So far anything runs fine :-)

Problem: Next week we have to change the 'hostname' of that linux-server.
The Question now is : - if any - what steps are to be done at the
tsm-Client ?
... and even at the tsm-server ?
The (tsm)nodename won't be changed.
Do I need the TSM-Client in a manual way give once again the
encryption-key password to let the encryption-key be generated ?
Or is there nothing to be done at the Client ?

I have looked throgh the lists and docs and havent't found any
'procedures' for that scenario - just pointers to dependancies on the
system's hostname.

Thanks in advance for any hints , recipe or links ... !
Rainer


--

Rainer Wolf  eMail:   [EMAIL PROTECTED]
kiz - Abt. Infrastruktur   Tel/Fax:  ++49 731 50-22482/22471
Universitaet Ulm wwweb:http://kiz.uni-ulm.de




--

Rainer Wolf  eMail:   [EMAIL PROTECTED]
kiz - Abt. Infrastruktur   Tel/Fax:  ++49 731 50-22482/22471
Universitaet Ulm wwweb:http://kiz.uni-ulm.de


Re: Using tsm-encryption and want to change the hostname at the Client

2006-07-25 Thread Alexei Kojenov
Rainer,

You need to make TSM client prompt you for encryption key password on the
next backup after you changed the hostname. The only way to do this is to
rename/remove the existing TSM.PWD file (this is the file where TSM client
stores its passwords). You should rename this file rather than delete it,
in case you have problems and want to revert.

Alexei

---

Dear TSmers,

we have tsmserver 5.3.3.2 /solaris and tsm-Client 5.3.4.0 /linux.

On the Client we use tsm-encryption :
The 'nodename' Option is set in the dsm.sys and also the
'encryptkey save' OPtion is set  and  'encryptiontype AES128' is also set.
The inclexc-File contains a line like 'include.encrypt *'
So far anything runs fine :-)

Problem: Next week we have to change the 'hostname' of that linux-server.
The Question now is : - if any - what steps are to be done at the
tsm-Client ?
... and even at the tsm-server ?
The (tsm)nodename won't be changed.
Do I need the TSM-Client in a manual way give once again the
encryption-key password to let the encryption-key be generated ?
Or is there nothing to be done at the Client ?

I have looked throgh the lists and docs and havent't found any
'procedures' for that scenario - just pointers to dependancies on the
system's hostname.

Thanks in advance for any hints , recipe or links ... !
Rainer


--

Rainer Wolf  eMail:   [EMAIL PROTECTED]
kiz - Abt. Infrastruktur   Tel/Fax:  ++49 731 50-22482/22471
Universitaet Ulm wwweb:http://kiz.uni-ulm.de


Using tsm-encryption and want to change the hostname at the Client

2006-07-24 Thread Rainer Wolf

Dear TSmers,

we have tsmserver 5.3.3.2 /solaris and tsm-Client 5.3.4.0 /linux.

On the Client we use tsm-encryption :
The 'nodename' Option is set in the dsm.sys and also the
'encryptkey save' OPtion is set  and  'encryptiontype AES128' is also set.
The inclexc-File contains a line like 'include.encrypt *'
So far anything runs fine :-)

Problem: Next week we have to change the 'hostname' of that linux-server.
The Question now is : - if any - what steps are to be done at the tsm-Client ?
... and even at the tsm-server ?
The (tsm)nodename won't be changed.
Do I need the TSM-Client in a manual way give once again the
encryption-key password to let the encryption-key be generated ?
Or is there nothing to be done at the Client ?

I have looked throgh the lists and docs and havent't found any
'procedures' for that scenario - just pointers to dependancies on the
system's hostname.

Thanks in advance for any hints , recipe or links ... !
Rainer


--

Rainer Wolf  eMail:   [EMAIL PROTECTED]
kiz - Abt. Infrastruktur   Tel/Fax:  ++49 731 50-22482/22471
Universitaet Ulm wwweb:http://kiz.uni-ulm.de


Re: TSM Encryption

2002-09-27 Thread Jelinek, David G.

Unfortunately no, we have been searching and can not find in the HIPAA documentation 
the level of encryption required, just that it is required.

David Jelinek 



 -Original Message-
 I would recommend that you open a requirement against the product for
 stronger encryption.  By the way, what are the HIPAA 
 requirements as they
 relate to data encryption?  Are these well documented?


BEGIN:VCARD
VERSION:2.1
N:Jelinek;David
FN:David G Jelinek (E-mail)
ORG:Central Michigan University;Information Technology
TITLE:Systems Programmer/Staff Specialist
TEL;WORK;VOICE:(989) 774-3258
TEL;WORK;FAX:(989) 774-6652
ADR;WORK;ENCODING=QUOTED-PRINTABLE:;Foust 20;Information Technology=0D=0ACMU;Mount Pleasant;MI;48859;United Sta=
tes of America
LABEL;WORK;ENCODING=QUOTED-PRINTABLE:Foust 20=0D=0AInformation Technology=0D=0ACMU=0D=0AMount Pleasant, MI 48859=
=0D=0AUnited States of America
EMAIL;PREF;INTERNET:[EMAIL PROTECTED]
REV:20020830T181453Z
END:VCARD



TSM Encryption

2002-09-26 Thread Jim Sporer

Does anyone know what level of encryption is done when using the INCLUDE
ENCRYPTION option in your dsm.opt file?  Is it DES, triple DES or what?
Jim Sporer
[EMAIL PROTECTED]



Re: TSM Encryption

2002-09-26 Thread Jim Smith

Jim,

The TSM Backup/Archive client uses 56-bit DES encryption.

Thanks,
Jim Smith
TSM Development


Does anyone know what level of encryption is done when using the INCLUDE
ENCRYPTION option in your dsm.opt file?  Is it DES, triple DES or what?
Jim Sporer
[EMAIL PROTECTED]



Re: TSM Encryption

2002-09-26 Thread Jim Sporer

Jim,
Thanks for the info.
Jim Sporer

At 10:32 AM 9/26/2002 -0700, you wrote:
Jim,

The TSM Backup/Archive client uses 56-bit DES encryption.

Thanks,
Jim Smith
TSM Development

 
Does anyone know what level of encryption is done when using the INCLUDE
ENCRYPTION option in your dsm.opt file?  Is it DES, triple DES or what?
Jim Sporer
[EMAIL PROTECTED]



Re: TSM Encryption

2002-09-26 Thread Jim Sporer

Hello Jim

Follow up question,

Can you ask if there is anyway for us to get clients that do stronger
encryption, eg tripledes?  If not, are there plans in the future to offer
strong encryption?  This relates to the HIPAA requirements that are coming.

Thanks again.
Jim Sporer


At 10:32 AM 9/26/2002 -0700, you wrote:
Jim,

The TSM Backup/Archive client uses 56-bit DES encryption.

Thanks,
Jim Smith
TSM Development

 
Does anyone know what level of encryption is done when using the INCLUDE
ENCRYPTION option in your dsm.opt file?  Is it DES, triple DES or what?
Jim Sporer
[EMAIL PROTECTED]



Re: TSM Encryption

2002-09-26 Thread Jim Smith

Jim,

I would recommend that you open a requirement against the product for
stronger encryption.  By the way, what are the HIPAA requirements as they
relate to data encryption?  Are these well documented?

Thanks,
Jim Smith
TSM development





Hello Jim

Follow up question,

Can you ask if there is anyway for us to get clients that do stronger
encryption, eg tripledes?  If not, are there plans in the future to offer
strong encryption?  This relates to the HIPAA requirements that are
coming.

Thanks again.
Jim Sporer


At 10:32 AM 9/26/2002 -0700, you wrote:
Jim,

The TSM Backup/Archive client uses 56-bit DES encryption.

Thanks,
Jim Smith
TSM Development

 
Does anyone know what level of encryption is done when using the INCLUDE
ENCRYPTION option in your dsm.opt file?  Is it DES, triple DES or what?
Jim Sporer
[EMAIL PROTECTED]



TSM Encryption, Again :)

2002-06-05 Thread Pétur Eyþórsson

Hi everyone.

For those who don't remember this discussion a few months ago here is some
update.

A few months ago we had a chance to offer TSM to one of the largest company
here. Soon it became obvious that security where a large concern to them.
They asked a lot of Encryption questions witch we couldn't answer right
away. So there where some long and helpful discussions about this issue here
on adsm.org.

we gave them the information they wanted and they agreed to take TSM as
there Backup system.

I would like to thank you who answered the pervious posts, a lot of our
success and win are because of your help and ideas.


Now the implementation is well on it's way.

The Security team has been reading up on the security issue in TSM, they
have found that the 56 bit DES encryption protocol isn't good enough for
them.  They want to have 3 DES or AES.

They are willing to implement it them self to TSM if Tivoli will let them.

I have one question for you geniuses out there.

Are there any others who need this kind of security out there?

Any feedback is greatly appreciated




Kvedja/Regards
Petur Eythorsson
Taeknimadur/Technician
IBM Certified Specialist - AIX
Tivoli Storage Manager Certified Professional
Microsoft Certified System Engineer

[EMAIL PROTECTED]

 Nyherji Hf  Simi TEL: +354-569-7700
 Borgartun 37105 Iceland
 URL:http://www.nyherji.is



TSM Encryption Setup Process ??

2002-05-06 Thread Simon Browne

Hi There,

Just wondering if anybody has written or knows of a step-by step guide to
implementing TSM encryption for backup and archive ??

As noticed by somebody else in this list the documentation for this
function in the manuals is extremely light.

Even a quick process outline by someone who has implemented TSM encryption
would be appreciated.

Thanks,
Simon  Browne
Technical Specialist (Storage)
Strategic Outsourcing

IBM (NZ) Ltd.

Telephone: +64 4 5769787 extn. 9787
Facsimile: +64 4 5765808 extn. 5808
IBM e-mail: [EMAIL PROTECTED]

-
The contents of this e-mail are confidential.
If you have received this communication by mistake,
please advise the sender immediately and delete the message and
any attachments.
The views expressed in this e-mail are not necessarily the views of
Westpac Banking Corporation.
Westpac Banking Corporation is incorporated in New South Wales, Australia.
-