Do you have technical documentation on how you perform client-side encryption in the CloudBerry Backup client?
My primary concern is this: does CloudBerry have access to the encryption keys? When you specify an encryption key in a Remote Deploy configuration, how is that key transferred to the client? Is it stored in plaintext, or is a key generated from the password (or some other process)?
[reply=“JoeyDumont;d689”] We wouldn’t be in backup business for long if we stored anything in plain text
Upon entering encryption key it is actually immediately encrypted, obfuscated and only then sent to the machine via secure connection.
You can’t really extract the password from the config file in any way.
From this documentation, since CloudBerry controls (it has to, in fact) the AES key used to encrypt the password, it means that CloudBerry has the capability of recovering the encryption passphrase, and, thus, the encryption key. Is this correct?
[reply=“JoeyDumont;2359”] Correct, but that can only happen if you consciously send us the original config file of the plan from your HDD. Even when sending diagnostic info using automated procedure the password string is modified so that it can’t be recovered by anything. It becomes just “*” symbols.
Ok. I’ll just recap to make sure I got everything right.
The password is stored encrypted in the client configuration file, is decrypted at plan execution time by fetching the AES key from CloudBerry’s servers. The key is used locally to encrypt the data that needs to be uploaded during that backup plan’s execution.
Is the password stored in its encrypted form in the Remote Deploy pane of the Management Console, or is it elided from the configuration file completely?