gpg: decrypt_message failed eof
Check very carefully both the name of the file you specified under option (1), the standard formatting of the file name has a gpg suffix which may be a good indicator (although a renamed file would still work provided it is valid as the suffixes are simply there for human readbility).
You can also do some level of checking of the file by using the 'file' command, for example:
[root@rkm-server tmp] # file *
RKMA-Backup-rkm-server.acme.com-20110308190346.tar.gz.gpg: gzip compressed data WRONG, for some reason this appears to be an unencrypted file
[root@rkm-server tmp] # file *
RKMA-Backup-rkm-server.acme.com-20110308190346.tar.gz.gpg: ASCII text WRONG, maybe this file got converted in an FTP BIN/ASCII translation?
[root@rkm-server tmp] # file *
RKMA-Backup-rkm-server.acme.com-20110308190346.tar.gz.gpg: GPG encrypted data RIGHT, for some reason this appears to be an unencrypted file
This command can be used as a good first parse, however even the third file might not be correct if it was truncated and perhaps is missing the last half of itself.
Carefully recopy the rachived, encrypted backup file onto the applinace again to ensure the network file copy did not cause the issue, othwerwise you will need to select an alternative rachive file to restore.
You can run certain validation tests on any archive file against a working, existing system without affecting the running service. At any time you can copy in an archived, encrypted backup file and simply use options (1) and (2) of the RKMARestore.sh command to confirm that you can access and decrypt the archive file. This small test should never take the place of a full disaster recovery test but might be useful for doing an assurnace level test.
Related Articles
User Access Review incorrect value for Rows/Page in RSA Identity Governance & Lifecycle 20Number of Views Bluecoat SSL Visibility "Traffic between Google Chrome and Google services, such as Gmail, can no longer be decrypted by S… 44Number of Views To generate FIPS compliant pkcs12 file using Openssl 37Number of Views The impact on RSA Authentication Manager 8.x of vulnerabilities reported in: OpenSSL Security Advisory - Dec 2015 - False … 66Number of Views aservers occasionally are unable to decrypt tokens from other aservers. 21Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide