stcconfig cipherdisable

Disable the use of a symmetric encryption cipher algorithm for data encryption on an STC link. All data transmitted over the STC link will be encrypted using the cipher that is both enabled and that offers the highest level of security. For example, if AES 192 and AES 256 are enabled, and AES 128 is disabled, AES 256 will be used. You can use the command stcconfig ciphershow to show which ciphers are currently enabled and the command stc status to display the cipher that is currently being used.

NOTE   Performance is reduced for larger ciphers.

Syntax

stcconfig cipherdisable {-id <cipher_ID> | -all} [-force]

Argument(s) Shortcut Description
-all -a

Disable all ciphers.

This argument is available only if you are using Luna HSM Client 10.2.0 or older.

-force -f

Force the action without prompting for confirmation.

This argument is available only if you are using Luna HSM Client 10.2.0 or older.

-id <cipher_ID> -id Specifies the numerical identifier of the cipher you want to allow or disallow, as listed by stcconfig ciphershow

Example

lunacm:> stcconfig ciphershow

This table lists the ciphers supported for STC links to the current slot.
Enabled ciphers are accepted during STC link negotiation with a client.
If all ciphers are disabled, STC links to the partition are not encrypted.
STC Encryption: On

 Cipher ID    Cipher Name                              Enabled
 __________________________________________________________________

 1            AES 128 Bit with Cipher Block Chaining   No

 2            AES 192 Bit with Cipher Block Chaining   Yes

 3            AES 256 Bit with Cipher Block Chaining   Yes

Command Result : No Error



lunacm:> stcconfig cipherdisable -id 3

AES 256 Bit with Cipher Block Chaining is now disabled for the current slot.

Command Result : No Error