>>>>> And if I pull, none of my backed-up systems are secure because anyone
>>>>> who breaks into the backup server has root read privileges on every
>>>>> backed-up system and will thereby "gain full root privileges quickly."
>>>>
>>>> IMO that depends on whether you also backup the authentication-related
>>>> files or not. Exclude them from backup, ensure different root passwords
>>>> for all boxes, and now you can limit the infiltration.
>>>
>>> If you're pulling to the backup server, that backup server has to be
>>> able to log in to and read all files on the other servers. Including
>>> e.g. your swap partition and device files.
>>
>> What if I have each system save a copy of everything to be backed up
>> from its own filesystem in a separate directory and change the
>> ownership of everything in that directory so it can be read by an
>> unprivileged backup user?
>
> You've just reinvented the push backup =)
>
> If separate-directory is on the same server, an attacker can log in and
> overwrite all of your files with zeros. Those zeros will be pulled to
> the backup server, destroying your backups.

That's not the case at all.  The zeros would be pulled to the backup
server via rdiff-backup and saved as a new version in the repository.
The backups would be safe.

- Grant


> If separate-directory is on the backup server...

Reply via email to