Re: [rdiff-backup-users] Post-setup questions

2011-08-19 Thread Maarten Bezemer
On Thu, 18 Aug 2011, Grant wrote: If I were to set up a separate user for each pushed backup and one of the systems were compromised, only the compromised system's backups would be accessible to the attacker (read/write unfortunately). No. It would indeed be read/write which is a no-go for

Re: [rdiff-backup-users] Post-setup questions

2011-08-18 Thread Maarten Bezemer
On Mon, 15 Aug 2011, Grant wrote: If someone steals the private keys on the backup server, they already have access to all your files. Although I admit there is a subtle difference between 'all your base are belong to us' and actually using those keys to plant malware on your laptop, but you

Re: [rdiff-backup-users] Post-setup questions

2011-08-18 Thread Grant
If someone has found a way to gain access to the private keys that should only be present on your backup server, then all the data on your backup server should be considered compromised. That could very well include sensitive files that are copies of sensitive files on your 'real' systems. Of

Re: [rdiff-backup-users] Post-setup questions

2011-08-18 Thread Dominic Raferd
On 18/08/11 22:47, Grant wrote: And, looking at the whole subject from a different angle: pushing also has the large drawback that in case your laptop is stolen/lost/whatever, and you use an ssh key for rdiff-backup to connect to your backup server, you risk not only losing your 'real'

Re: [rdiff-backup-users] Post-setup questions

2011-08-15 Thread Maarten Bezemer
On Sun, 14 Aug 2011, Grant wrote: That sounds like a great idea. I'll set up openvpn and switch from pushing to pulling. BTW, is the read-only restriction on the public SSH keys the only advantage of pulling vs. pushing? Are there any drawbacks? In a pull arrangement, if the private keys

Re: [rdiff-backup-users] Post-setup questions

2011-08-15 Thread Grant
That sounds like a great idea.  I'll set up openvpn and switch from pushing to pulling.  BTW, is the read-only restriction on the public SSH keys the only advantage of pulling vs. pushing?  Are there any drawbacks?  In a pull arrangement, if the private keys on the backup server are stolen,

Re: [rdiff-backup-users] Post-setup questions

2011-08-14 Thread Maarten Bezemer
On Sun, 14 Aug 2011, Grant wrote: My laptop is one of the systems I want to back up and when I travel it ends up behind a router I have no control over. Because of this, my systems push to the backup server instead of the backup server pulling from them. Based on the 'security'

Re: [rdiff-backup-users] Post-setup questions

2011-08-14 Thread Jernej Simončič
On Sunday, August 14, 2011, 22:54:18, Maarten Bezemer wrote: So, try to find some more info about openvpn. If the routers allow ssh connections to your backup server, they will most likely also allow an openvpn tunnel. This should work with 99.9% of routers: set up the OpenVPN server at home

Re: [rdiff-backup-users] Post-setup questions

2011-08-14 Thread Maarten Bezemer
On Sun, 14 Aug 2011, Jernej Simoni wrote: This should work with 99.9% of routers: set up the OpenVPN server at home to listen on port 443 TCP (assuming you don't have HTTPS server running - though even that could work, OpenVPN allows you to redirect connections when running in TCP mode; it

Re: [rdiff-backup-users] Post-setup questions

2011-08-14 Thread Jernej Simončič
On Monday, August 15, 2011, 0:19:05, Maarten Bezemer wrote: But keep in mind that tunneling TCP over TCP (when running openvpn in TCP mode) might haunt you badly due to tcp timeout/retransmit settings. I've set up OpenVPN in TCP mode several times for locations that blocked UDP, and so far

Re: [rdiff-backup-users] Post-setup questions

2011-08-14 Thread Grant
My laptop is one of the systems I want to back up and when I travel it ends up behind a router I have no control over.  Because of this, my systems push to the backup server instead of the backup server pulling from them. I'm using openvpn myself for similar tasks, and once setup properly,

Re: [rdiff-backup-users] Post-setup questions

2011-08-14 Thread Grant
In short: try openvpn with udp first, and only go to tcp when all else fails. In that case, however, using a simple SSH tunnel with -R argument would be easier. (laptop sshs into backup server using password or password-protected key; rdiff-backup starts at backup-server connecting to