The following article shows how to Generate your Encrypted Key in Cloud Backup.
Rackspace will never know your unencrypted (or clear text) passphrase. Your passphrase is encrypted using public/private key pairs. This is the SSL web security standard for transmitting data over secure connections. Only your encrypted passphrase is sent to Rackspace. All communication between your computer and Rackspace servers for Cloud Backup is done over SSL--no one can intercept and read your messages.
You can, however, encrypt your passphrase yourself using the public/private key for your system (and bypass Rackspace's client side encryption library), by using the methods below.
Note: You need to use the public key file from the machine that you are restoring to, performing the cleanup on, etc.
In Linux: /etc/driveclient or /root/driveclient-old
In Windows: C:\Users\[username]\AppData\Local\DriveClient
In Linux: Run the following three commands to generate your own encryption key (prompts for password):
read -s -p "Password:" qpwd
echo echo -n $qpwd | openssl rsautl -encrypt -inkey public-key.pem -pubin | openssl base64
In Windows: Run the following command to generate your own encryption key:
echo|set /p=" mysecretpassword " | openssl rsautl -encrypt -inkey public-key.pem -pubin | openssl base64
© 2011-2013 Rackspace US, Inc.
Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License