Re: utilisateur backup

2002-07-23 Thread Boris Daix
Sam Vilain [EMAIL PROTECTED] writes:

 Boris Daix [EMAIL PROTECTED] wrote:

- Can I safely give an SSH key to my backup user without any
  passphrase so that it could be automated via cron ?

 You can use `ssh-keygen -f single_action_key' to create a key for remote 
 execution of scripts.

 On the remote end, add this key to the `.ssh/authorized_keys' file.  You 
 should add a forced command so that only one command may be executed with 
 that key.

Good, really interesting !

 For rsync(1), you need to capture the exact switches of the rsync server
 command. 

But I use rsync like a remote copy tool (scp), so do I need this ? If
so, I need tips to better understand what follows... :-)

 To do this, you can use this script on the destination server:

 #!/usr/bin/perl
 open CAPTURE, $ENV{HOME}/capture.log;
 print CAPTURE @ARGV\n;
 close CAPTURE;

 Then add --rsync-path=/path/to/script to your rsync command line.  This
 will leave something similar to the following in the destination
 ~/capture.log:

 --server -vlgtpr --partial . yourhost

 So, you would use an authorized_keys entry like this (all one line):

 command=rsync --server -vlogDtpr --partial . 
 yourhost,no-port-forwarding,no-X11-forwarding,no-agent-forwarding,no-pty,1024
  35 23...2334 Server backup key

 For more complete security, you could add a `chroot' jail to the above
 command.

Are jails useful with rsync used like scp ?

- Is amanda appropriate for this task and would it be more secure
  to use it instead ?
- If it is unsecure, how would I do such backups without having to
  enter passpgrase/passwd ?

 System backups are always an easy entry point, very often they contain
 things like secret keys to encryption, etc that will allow a malicious
 user to pretend to be the machine that they have access to the backups of.
  Protect your backups carefully!

Yes, I've crypted them via gpg :-)

 --
Sam Vilain, [EMAIL PROTECTED] WWW: http://sam.vilain.net/
 7D74 2A09 B2D3 C30F F78E  GPG: http://sam.vilain.net/sam.asc
 278A A425 30A9 05B5 2F13

 Real Programmers don't write in Fortran.  Fortran is for wimp   
 engineers who wear white socks.  They get excited over finite state
 analysis and nuclear reactor simulation.


many thanks

-- 
Boris Daix

Feel free to be free, or not to be...


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: utilisateur backup

2002-07-22 Thread Sam Vilain
Boris Daix [EMAIL PROTECTED] wrote:

- Can I safely give an SSH key to my backup user without any
  passphrase so that it could be automated via cron ?

You can use `ssh-keygen -f single_action_key' to create a key for remote 
execution of scripts.

On the remote end, add this key to the `.ssh/authorized_keys' file.  You should 
add a forced command so that only one command may be executed with that key.

For rsync(1), you need to capture the exact switches of the rsync server
command.  To do this, you can use this script on the destination server:

#!/usr/bin/perl
open CAPTURE, $ENV{HOME}/capture.log;
print CAPTURE @ARGV\n;
close CAPTURE;

Then add --rsync-path=/path/to/script to your rsync command line.  This
will leave something similar to the following in the destination
~/capture.log:

--server -vlgtpr --partial . yourhost

So, you would use an authorized_keys entry like this (all one line):

command=rsync --server -vlogDtpr --partial . 
yourhost,no-port-forwarding,no-X11-forwarding,no-agent-forwarding,no-pty,1024 
35 23...2334 Server backup key

For more complete security, you could add a `chroot' jail to the above
command.

- Is amanda appropriate for this task and would it be more secure
  to use it instead ?
- If it is unsecure, how would I do such backups without having to
  enter passpgrase/passwd ?

System backups are always an easy entry point, very often they contain
things like secret keys to encryption, etc that will allow a malicious
user to pretend to be the machine that they have access to the backups of.
 Protect your backups carefully!
--
   Sam Vilain, [EMAIL PROTECTED] WWW: http://sam.vilain.net/
7D74 2A09 B2D3 C30F F78E  GPG: http://sam.vilain.net/sam.asc
278A A425 30A9 05B5 2F13

Real Programmers don't write in Fortran.  Fortran is for wimp   
engineers who wear white socks.  They get excited over finite state
analysis and nuclear reactor simulation.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



utilisateur backup

2002-07-19 Thread Boris Daix
Hi all,

   I'd like to make backup via cron and I saw there were a user 
named backup in passwd file. My problem is that the backups should
travel via LAN to another machine (running Woody too), so that
they backup eachother in fact. I'd like to use rsync to transfer only
changes, with SSH to increase security, but my question is :

   - Can I safely give an SSH key to my backup user without any
 passphrase so that it could be automated via cron ?
   - Is amanda appropriate for this task and would it be more secure
 to use it instead ?
   - If it is unsecure, how would I do such backups without having to
 enter passpgrase/passwd ?

Thanks a lot

-- 
Boris Daix

Feel free to be free, or not to be...


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: utilisateur backup

2002-07-19 Thread Wouter van Gils
Ok, take a look here:

http://freshmeat.net/projects/hdup/?topic_id=42%2C137

(http://www.miek.nl/projects/hdup/hdup.shtml)

I've been using it for quite some time now to transfer backups secure
and encrypted. Take a look.


- Wouter




[On 19 Jul, 2002, Boris Daix wrote in utilisateur backup ...]
 Hi all,
 
I'd like to make backup via cron and I saw there were a user 
 named backup in passwd file. My problem is that the backups should
 travel via LAN to another machine (running Woody too), so that
 they backup eachother in fact. I'd like to use rsync to transfer only
 changes, with SSH to increase security, but my question is :
 
- Can I safely give an SSH key to my backup user without any
  passphrase so that it could be automated via cron ?
- Is amanda appropriate for this task and would it be more secure
  to use it instead ?
- If it is unsecure, how would I do such backups without having to
  enter passpgrase/passwd ?
 
 Thanks a lot
 
 -- 
 Boris Daix
 
   Feel free to be free, or not to be...
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

-- 
~~~
Wouter van Gils -=- [EMAIL PROTECTED]
http://the-construct.cx/
~~~


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: utilisateur backup

2002-07-19 Thread Mathias Palm
On Fri, Jul 19, 2002 at 11:53:58AM +0200, Boris Daix wrote:
 Hi all,
 
I'd like to make backup via cron and I saw there were a user 
 named backup in passwd file. My problem is that the backups should
 travel via LAN to another machine (running Woody too), so that
 they backup eachother in fact. I'd like to use rsync to transfer only
 changes, with SSH to increase security, but my question is :
 
- Can I safely give an SSH key to my backup user without any
  passphrase so that it could be automated via cron ?

I'd say, the security is that of your original account then. Say there
are the computers A and B, where A:backup has got access to B:backup by 
a phraseless ssh-key. You can log on to account A:backup and ssh to
B:backup because of the phraseless key, therefor the maximum of the
security you can achive is the security of account A:backup. 

- Is amanda appropriate for this task and would it be more secure
  to use it instead ?

I am using it to backup a bunch of maschines on one tape also using
cron. I found it easy to configure and am quite satisfied. You can even
configure Amanda in a way that it only transfers changes. On the other
hand, Amanda is meant to dump backups on tapes. I cant tell you if there
is an easy way to reconfigure it.

- If it is unsecure, how would I do such backups without having to
  enter passpgrase/passwd ?
 

What sort of security do you want? Do you want your backups be 
encrypted? Amanda can't do that, to my knowledge. 

Amanda provides some sort of restricted host access. But I cant tell, if
it would retain a determined attacker.

Otherwise I have not heart of exploits of amanda yet. 


 Thanks a lot
 
 -- 
 Boris Daix
 
   Feel free to be free, or not to be...
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: utilisateur backup

2002-07-19 Thread Noah L. Meyerhans
On Fri, Jul 19, 2002 at 03:58:18PM +0200, Mathias Palm wrote:
 - Can I safely give an SSH key to my backup user without any
   passphrase so that it could be automated via cron ?
 
 I'd say, the security is that of your original account then. Say there
 are the computers A and B, where A:backup has got access to B:backup by 
 a phraseless ssh-key. You can log on to account A:backup and ssh to
 B:backup because of the phraseless key, therefor the maximum of the
 security you can achive is the security of account A:backup. 

Uhh, no.  You need to read the docs for sshd.  See, in particular, the
following:
 command=command
 Specifies that the command is executed whenever this key is used
 for authentication.  The command supplied by the user (if any) is
 ignored.  The command is run on a pty if the client requests a
 pty; otherwise it is run without a tty.  If a 8-bit clean channel
 is required, one must not request a pty or should specify no-pty.
 A quote may be included in the command by quoting it with a backĀ­
 slash.  This option might be useful to restrict certain RSA keys
 to perform just a specific operation.  An example might be a key
 that permits remote backups but nothing else.  Note that the
 client may specify TCP/IP and/or X11 forwarding unless they are
 explicitly prohibited.  Note that this option applies to shell,
 command or subsystem execution.

So the worst that can happen if the key gets compromised is that the
attacker can trigger a backup of your system.  Conceivably this could be
a DoS, at worst.  But it's a very common setup.  In fact, the standard
method of mirroring Debian involves exactly this type of configuration.

 - Is amanda appropriate for this task and would it be more secure
   to use it instead ?
 
 I am using it to backup a bunch of maschines on one tape also using
 cron. I found it easy to configure and am quite satisfied. You can even
 configure Amanda in a way that it only transfers changes. On the other
 hand, Amanda is meant to dump backups on tapes. I cant tell you if there
 is an easy way to reconfigure it.

Amanda has no security.  It does not encrypt any of the data going out
over the network.  I doesn't support strong host authentication.  It
can't be tunnelled over ssh.  Tunnelling rdump over ssh is way more
secure than amanda.  Running amanda over an IPsec link is a good
approach, and what I use to backup most of my servers.

 Amanda provides some sort of restricted host access. But I cant tell, if
 it would retain a determined attacker.

It supports .amandahosts.  It's similar to .rhosts.  It can also do
kerberos, but most people don't have a kerberos infrastructure.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgp3lZ5wN680J.pgp
Description: PGP signature


Re: utilisateur backup

2002-07-19 Thread Boris Daix
Mathias Palm [EMAIL PROTECTED] writes:

[...]
 I am using it to backup a bunch of maschines on one tape also using
 cron. I found it easy to configure and am quite satisfied. You can even
 configure Amanda in a way that it only transfers changes. On the other
 hand, Amanda is meant to dump backups on tapes. I cant tell you if there
 is an easy way to reconfigure it.

No tape device here.

- If it is unsecure, how would I do such backups without having to
  enter passpgrase/passwd ?
 

 What sort of security do you want? Do you want your backups be 
 encrypted? Amanda can't do that, to my knowledge. 

I'd like network transfers to be inexploitable by other parts : only
admins of both machines should be able to get in backups (that implies
file permissions locally, and encrypted communication between stations).

 Amanda provides some sort of restricted host access. But I cant tell, if
 it would retain a determined attacker.

 Otherwise I have not heart of exploits of amanda yet. 

Lets hope we won't.

 Thanks a lot

Again :-)

[...]

-- 
Boris Daix

Feel free to be free, or not to be...


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: utilisateur backup

2002-07-19 Thread Boris Daix
Noah L. Meyerhans [EMAIL PROTECTED] writes:

[...]
 So the worst that can happen if the key gets compromised is that the
 attacker can trigger a backup of your system.  Conceivably this could be
 a DoS, at worst.  But it's a very common setup.  In fact, the standard
 method of mirroring Debian involves exactly this type of configuration.

What I wonder is how far the backup user can read (or, worst, even write) to
local fs. If it's just able to look at some /home and /var dirs, and
can write only to /var/backups, it would be enough and I'll be quite
confident. But at this time I don't know how to know this.

 - Is amanda appropriate for this task and would it be more secure
   to use it instead ?
 
 I am using it to backup a bunch of maschines on one tape also using
 cron. I found it easy to configure and am quite satisfied. You can even
 configure Amanda in a way that it only transfers changes. On the other
 hand, Amanda is meant to dump backups on tapes. I cant tell you if there
 is an easy way to reconfigure it.

 Amanda has no security.  It does not encrypt any of the data going out
 over the network.  I doesn't support strong host authentication.  It
 can't be tunnelled over ssh.  Tunnelling rdump over ssh is way more
 secure than amanda.  Running amanda over an IPsec link is a good
 approach, and what I use to backup most of my servers.

I don't know IPsec - but I'm too ashame to ask for what it implies
:-)) I'll look for it, but as I won't use amanda ('cause no tape),
backup user may be better if I find what it has access to.

 Amanda provides some sort of restricted host access. But I cant tell, if
 it would retain a determined attacker.

 It supports .amandahosts.  It's similar to .rhosts.  It can also do
 kerberos, but most people don't have a kerberos infrastructure.

 noah

 -- 
  ___
 | Web: http://web.morgul.net/~frodo/
 | PGP Public Key: http://web.morgul.net/~frodo/mail.html 

Thanks

-- 
Boris Daix

Feel free to be free, or not to be...


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]