6.7

Table Of Contents
e Provide the password that you specified when you created the vm-support package.
f Remove the encrypted core dumps, and compress the package again.
vm-support --reconstruct
8 Remove any files that contain confidential information.
Exporting Host Support Bundles With Passwords
(http://link.brightcove.com/services/player/bcpid2296383276001?
bctid=ref:video_export_host_support_bundles_passwords)
Decrypt or Re-Encrypt an Encrypted Core Dump
You can decrypt or re-encrypt an encrypted core dump on your ESXi host by using the crypto-util CLI.
You can decrypt and examine the core dumps in the vm-support package yourself. Core dumps might
contain sensitive information. Follow your organization's security and privacy policy to protect sensitive
information such as keys.
For details about re-encrypting a core dump and other features of crypto-util, see the command-line
help.
Note crypto-util is for advanced users.
Prerequisites
The key that was used to encrypt the core dump must be available on the ESXi host that generated the
core dump.
Procedure
1 Log directly in to the ESXi host on which the core dump happened.
If the ESXi host is in lockdown mode, or if SSH access is disabled, you might have to enable access
first.
2 Determine whether the core dump is encrypted.
Option Description
Monitor core dump
crypto-util envelope describe vmmcores.ve
zdump file
crypto-util envelope describe
--offset 4096 zdumpFile
vSphere Security
VMware, Inc. 177