<div dir="ltr">As an alternative to DRS, when it comes to restoring messages in Unity Connection, would COBRAS export/import work?<div><br></div><div>COBRAS export has a schedule feature, where you can run it as often as you like, and for only certain mailboxes (E.g., Executive leadership, department mailboxes, etc.).</div><div><br></div><div>Read a little more about COBRAS export schedule here:</div><div><br></div><div><a href="http://www.ciscounitytools.com/Applications/General/COBRAS/Help/COBRAS_Briefcase/COBRAS_Briefcase.htm#_Toc383446513">http://www.ciscounitytools.com/Applications/General/COBRAS/Help/COBRAS_Briefcase/COBRAS_Briefcase.htm#_Toc383446513</a><br></div><div><br></div><div>I haven't seen anyone doing this, I just know that it's out there. Does anyone have any experience with setting up COBRAS to run on a schedule, exporting all or specific mailboxes, and then restoring messages?</div><div><br></div><div><br></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Fri, Apr 15, 2016 at 5:25 PM, Pete Brown <span dir="ltr"><<a href="mailto:jpb@chykn.com" target="_blank">jpb@chykn.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div dir="ltr">
<div style="font-size:12pt;color:#000000;background-color:#ffffff;font-family:Calibri,Arial,Helvetica,sans-serif">
<p>They're definitely covering the bases on this one. There are a total of 6 Cisco Bug IDs directly related to this. Looks like one for each file on each product that would have contained the plaintext random key. <span style="font-family:Calibri,Arial,Helvetica,sans-serif,'Apple Color Emoji','Segoe UI Emoji',NotoColorEmoji,'Segoe UI Symbol','Android Emoji',EmojiSymbols;font-size:16px">I
guess it was only a matter of time. As much as I hate to see this particular door closed, </span><span style="font-family:Calibri,Arial,Helvetica,sans-serif,'Apple Color Emoji','Segoe UI Emoji',NotoColorEmoji,'Segoe UI Symbol','Android Emoji',EmojiSymbols;font-size:16px">I
understand and agree with the logic behind it.</span><span style="font-family:Verdana,Arial,Helvetica,sans-serif;font-size:13.3333px;line-height:18.6667px"></span></p>
<p><br>
</p>
<p><a href="http://www.securityfocus.com/bid/83103/discuss" title="http://www.securityfocus.com/bid/83103/discuss
Ctrl+Click or tap to follow the link" target="_blank">http://www.securityfocus.com/bid/83103/discuss</a></p>
<p><br>
</p>
<p>To those in the DRS group, I apologize for any headache this has caused. But please do not put any additional restrictions in place to unlocking backup data. As customers, we have a legitimate need to access data from backups without having to perform
a full restore. Some customers do not have the resources necessary to stand up sandbox environments for restores. Even if they do, an engineer should not have to spend an entire day restoring a system in order to fulfill a voicemail extraction request from
legal. That's the reason this program was written to begin with. DRS Message Fisher wasn't updated with an option to open encrypted backup sets by inputting the cluster security password.</p>
<p><br>
</p>
<p>Thanks,</p>
<p>Pete</p>
<p><a href="http://www.securityfocus.com/bid/83103/discuss" target="_blank"></a></p>
<div style="margin-bottom:20px;overflow:auto;width:100%;text-indent:0px">
<table cellspacing="0" style="width:90%;overflow:auto;padding-top:20px;padding-bottom:20px;margin-top:20px;border-top-width:1px;border-top-style:dotted;border-top-color:rgb(200,200,200);border-bottom-width:1px;border-bottom-style:dotted;border-bottom-color:rgb(200,200,200);background-color:rgb(255,255,255)">
<tbody>
<tr valign="top" style="border-spacing:0px">
<td colspan="2" style="vertical-align:top;padding:0px;display:table-cell">
<div></div>
<div style="color:rgb(0,120,215);font-weight:normal;font-size:21px;font-family:wf_segoe-ui_light,'Segoe UI Light','Segoe WP Light','Segoe UI','Segoe WP',Tahoma,Arial,sans-serif;line-height:21px">
<a href="http://www.securityfocus.com/bid/83103/discuss" style="text-decoration:none" target="_blank">Multiple Cisco Unified Products CVE-2016-1319 Information Disclosure Vulnerability</a></div>
<div style="margin:10px 0px 16px;color:rgb(102,102,102);font-weight:normal;font-family:wf_segoe-ui_normal,'Segoe UI','Segoe WP',Tahoma,Arial,sans-serif;font-size:14px;line-height:14px">
<a href="http://www.securityfocus.com" target="_blank">www.securityfocus.com</a></div>
<div style="display:block;color:rgb(102,102,102);font-weight:normal;font-family:wf_segoe-ui_normal,'Segoe UI','Segoe WP',Tahoma,Arial,sans-serif;font-size:14px;line-height:20px;max-height:100px;overflow:hidden">
SecurityFocus is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide the Internet's largest and most comprehensive database of computer security knowledge and resources to the public. It
also hosts the BUGTRAQ mailing list.</div>
</td>
</tr>
</tbody>
</table>
</div>
<br>
<br>
<p></p>
<br>
<br>
<div style="color:rgb(0,0,0)">
<hr style="display:inline-block;width:98%">
<div dir="ltr"><font face="Calibri, sans-serif" color="#000000" style="font-size:11pt"><b>From:</b> Pete Brown <<a href="mailto:jpb@chykn.com" target="_blank">jpb@chykn.com</a>><br>
<b>Sent:</b> Friday, April 15, 2016 3:42 PM<br>
<b>To:</b> <a href="mailto:cisco-voip@puck.nether.net" target="_blank">cisco-voip@puck.nether.net</a><br>
<b>Subject:</b> DRS Backup Decrypter - Decrypt Failure After Patching</font>
<div> </div>
</div><div><div class="h5">
<div>
<div style="font-size:12pt;color:#000000;background-color:#ffffff;font-family:Calibri,Arial,Helvetica,sans-serif">
<p>Looks like the party is going to be over for decrypting backup sets without requiring the cluster security password...</p>
<p><br>
</p>
<p><a href="https://quickview.cloudapps.cisco.com/quickview/bug/CSCuv85926" title="https://quickview.cloudapps.cisco.com/quickview/bug/CSCuv85926
Ctrl+Click or tap to follow the link" target="_blank">https://quickview.cloudapps.cisco.com/quickview/bug/CSCuv8592</a><br>
</p>
<p><br>
</p>
<p>All encrypted DRS backup sets until now have contained a plaintext copy of the randomly generated backup key. It lists the known affected releases as 10.5(2.12901.1), but this goes all the way from 8.0 to 11.5 and affects CUCM, UCON and UCCX. This is
how the decrypter has been able to decrypt backup sets without the cluster security password.</p>
<p><br>
</p>
<p>Once this is patched, you may no longer be able to decrypt backups even if you type in the correct password. If you run into this, please let me know and I'll work on an update.</p>
<p><br>
</p>
<p>Thanks,</p>
<p>Pete</p>
</div>
</div>
</div></div></div>
</div>
</div>
<br>_______________________________________________<br>
cisco-voip mailing list<br>
<a href="mailto:cisco-voip@puck.nether.net">cisco-voip@puck.nether.net</a><br>
<a href="https://puck.nether.net/mailman/listinfo/cisco-voip" rel="noreferrer" target="_blank">https://puck.nether.net/mailman/listinfo/cisco-voip</a><br>
<br></blockquote></div><br></div>