On Fri, Nov 11, 2011 at 12:55 PM, Grant <[email protected]> wrote:

[snip]

> The problem with my current push-style layout is that if one of the 3
> machines is compromised, the attacker can delete or alter the backup
> of the compromised machine on the backup server.  I can rsync the
> backups from the backup server to another machine, but if the backups
> are deleted or altered on the backup server, the rsync'ed copy on the
> next machine will also be deleted or altered.

As a final stage in your backup, could you trigger a 'pull'-style
backup copying the data image to a more secure area? How about setting
your backup target on top of lvm, and snapshotting? Some mechanism
could be employed so that the snapshot command is run by a more
restricted user, and done so after, e.g. a certain amount of idle time
in the backup target directory

>
> If I run a pull-style layout and the backup server is compromised, the
> attacker would have root read access to each of the 3 machines, but
> the attacker would already have access to backups from each of the 3
> machines stored on the backup server itself so that's not really an
> issue.  I would also have the added inconvenience of using openvpn or
> ssh -R for my laptop so the backup server can pull from it through any
> router.

Check out freenet6. I use it so that my laptop has a static, global IP
address whether it's on my home network or not. It's quite nice. IPv6
in various applications also solves my other direct-access needs.

>
> What do you think guys?  Are push-style backups flawed and unacceptable?

I imagine you might still want to 'pull' from your backup server; if
someone gets a key that allows them to manipulate the behavior of a
local process that shouldn't normally be manipulated, your
vulnerability surface goes up.

-- 
:wq

Reply via email to