Comprehensive data protection for all workloads
Post Reply
JMeixner
Veeam Legend
Posts: 6
Liked: 1 time
Joined: Apr 20, 2021 3:16 pm
Full Name: Jochen (Joe) Meixner
Contact:

Veeam Backup & Replication supported encryption standards and methods

Post by JMeixner »

One of my clients (public sector) has high security requirements for his IT environment – including backup and storage.

I found the following statement from VEEAM about the used encryption standards and methods in Veeam Backup and Replication:

“Veeam Backup & Replication supports the following encryption standards and methods:

Data Encryption

To encrypt data blocks in backup files and files archived to tape, Veeam Backup & Replication uses the 256-bit AES with a 256-bit key length in the CBC-mode. This is designed to support the FIPS 140-2 standard.

As a part of Veeam Backup & Replication’s ability to generate a key based on a password, it uses the Password-Based Key Derivation Function, PKCS #5 version 2.0 as a part of NIST Publication 800-132. Veeam Backup & Replication uses 10,000 HMAC-SHA1 iterations and a 512-bit salt.

Veeam Backup & Replication uses the following hashing algorithms:

For digital signature generation: SHA-1, SHA-256

For HMAC generation: HMAC_SHA1

For random number generation: SHA1

For Microsoft Windows-based repositories and software-based encryption for tapes, Veeam Backup & Replication uses the Windows Crypto API complying with the Federal Information Processing Standards (FIPS 140-2).

Veeam Backup & Replication uses the following cryptographic service providers:

Microsoft Base Cryptographic Provider

Microsoft Enhanced RSA and AES Cryptographic Provider

Microsoft Enhanced Cryptographic Provider

For Linux-based repositories, Veeam Backup & Replication uses a statically linked OpenSSL encryption library, without the FIPS 140-2 support.

Veeam Backup & Replication encrypts stored credentials using the Data Protection API (DPAPI) mechanisms.”

Most of this is fine and compliant with German regulations - all but the usage of SHA-1 and HMAC-SHA1… These are non-collision resistant hash functions and it is possible to hack them (although it costs some time and effort). German regulations recommend not to use these methods...


Does someone have some information if there are changes in the usage of these methods on Veeam’s agenda for future product versions? E.g. the usage of SHA-2 or SHA-3?
Gostev
Chief Product Officer
Posts: 31561
Liked: 6725 times
Joined: Jan 01, 2006 1:01 am
Location: Baar, Switzerland
Contact:

Re: Veeam Backup & Replication supported encryption standards and methods

Post by Gostev »

Anything is possible in the future depending on demand... as of now, SHA-1 is still deemed acceptable, for example for the purpose of the FIPS certification.
Post Reply

Who is online

Users browsing this forum: Semrush [Bot] and 107 guests