Re: [rdiff-backup-users] Prevent rdiff-backup from deleting?

2011-11-15 Thread Grant
>> Because of this, I think there is a gaping security hole in any
>> automated rdiff-backup scheme that pushes backups to the server.
>> Pulling to the backup server eliminates this problem, but if the
>> backup server is compromised, the infiltrator has root read access to
>> each system being backed up and can thereby compromise each of those
>> systems as well.
>>
>> Is rdiff-backup ill-suited to automated backups?
>
> This topic has been discussed here many a time.
> There is always a trade-off between security and ease of use.
> If you do push-style backups, having root access on the main system gives an
> attacker access to the backup system, so the backup has to be considered
> compromised when the main system is compromised. Depending on what purpose
> you keep backups for, this may not be what you want.
>
> If you do pull-style backups, and the backup system is compromised, the
> attacker indeed has root access to all backed up systems (possibly more than
> one). If you do pull-style backups and the main system is compromised, you
> could restore from a 'clean' increment.
>
> However, a compromised main system can go unnoticed for weeks or even
> months. So backups may have become compromised as well, and when keeping
> less history than this detection period, there would be no way to go back to
> a clean state after that time. Again, it all depends on the exact use of the
> backup tool. You could e.g. use rdiff-backup for user's files, and some
> other tool for system backups.
>
> All in all, this is not very specific to rdiff-backup. Other push or pull
> style backups have the same 'problems'.
>
> The method I prefer is having a backup server that is not reachable from the
> outside. Currently a box behind a NAT gateway, but could as well be a fully
> firewalled IP address with only outgoing traffic allowed to the hosts that
> are to be backed up. (Possibly even one at a time.)

The downside of pull-style backups is that if the backup server is
compromised, the backed-up systems can be compromised easily since the
infiltrator would have root read access to those systems.  Your
solution is to make it harder for the backup server to be compromised.
 That sounds pretty good, but how do you access that system remotely?

- Grant


> Any automated system can be fooled when not supervised properly ;-)
>
>
> --
> Maarten

___
rdiff-backup-users mailing list at rdiff-backup-users@nongnu.org
https://lists.nongnu.org/mailman/listinfo/rdiff-backup-users
Wiki URL: http://rdiff-backup.solutionsfirst.com.au/index.php/RdiffBackupWiki


Re: [rdiff-backup-users] Prevent rdiff-backup from deleting?

2011-11-15 Thread Sarel Botha
A simple solution is to edit the python source code for rdiff-backup on 
the backup server and restrict what it will accept for the 
--remove-older-than argument.


You could also have two different versions of rdiff-backup on the backup 
server. One accessed remotely that has this option completely disabled 
(by editing the source). The other version would be the original code 
but can only be accessed from the local backup server.


Sarel

On 11/14/2011 9:03 PM, Grant wrote:
The problem is that I run rdiff-backup in a crontab and one of the 
commands there includes --remove-older-than. That's a very creative 
solution though. Because of this, I think there is a gaping security 
hole in any automated rdiff-backup scheme that pushes backups to the 
server. Pulling to the backup server eliminates this problem, but if 
the backup server is compromised, the infiltrator has root read access 
to each system being backed up and can thereby compromise each of 
those systems as well. Is rdiff-backup ill-suited to automated 
backups? - Grantolutionsfirst.com.au/index.php/RdiffBackupWiki 


___
rdiff-backup-users mailing list at rdiff-backup-users@nongnu.org
https://lists.nongnu.org/mailman/listinfo/rdiff-backup-users
Wiki URL: http://rdiff-backup.solutionsfirst.com.au/index.php/RdiffBackupWiki


Re: [rdiff-backup-users] Prevent rdiff-backup from deleting?

2011-11-15 Thread Maarten Bezemer


On Mon, 14 Nov 2011, Grant wrote:


Because of this, I think there is a gaping security hole in any
automated rdiff-backup scheme that pushes backups to the server.
Pulling to the backup server eliminates this problem, but if the
backup server is compromised, the infiltrator has root read access to
each system being backed up and can thereby compromise each of those
systems as well.

Is rdiff-backup ill-suited to automated backups?


This topic has been discussed here many a time.
There is always a trade-off between security and ease of use.
If you do push-style backups, having root access on the main system gives 
an attacker access to the backup system, so the backup has to be 
considered compromised when the main system is compromised. Depending on 
what purpose you keep backups for, this may not be what you want.


If you do pull-style backups, and the backup system is compromised, the 
attacker indeed has root access to all backed up systems (possibly more 
than one). If you do pull-style backups and the main system is 
compromised, you could restore from a 'clean' increment.


However, a compromised main system can go unnoticed for weeks or even 
months. So backups may have become compromised as well, and when keeping 
less history than this detection period, there would be no way to go back 
to a clean state after that time. Again, it all depends on the exact use 
of the backup tool. You could e.g. use rdiff-backup for user's files, and 
some other tool for system backups.


All in all, this is not very specific to rdiff-backup. Other push or pull 
style backups have the same 'problems'.


The method I prefer is having a backup server that is not reachable from 
the outside. Currently a box behind a NAT gateway, but could as well be a 
fully firewalled IP address with only outgoing traffic allowed to the 
hosts that are to be backed up. (Possibly even one at a time.)


Any automated system can be fooled when not supervised properly ;-)


--
Maarten

___
rdiff-backup-users mailing list at rdiff-backup-users@nongnu.org
https://lists.nongnu.org/mailman/listinfo/rdiff-backup-users
Wiki URL: http://rdiff-backup.solutionsfirst.com.au/index.php/RdiffBackupWiki


Re: [rdiff-backup-users] Prevent rdiff-backup from deleting?

2011-11-14 Thread Grant
> I think (but haven't tried) you could alter the rdiff-backup option text
> like this (this is under Ubuntu 10.04, the location might differ with
> another OS):
>
> sed -i 's/remove-older-than/remove-older-thax/g'
> /usr/share/pyshared/rdiff_backup/*.py
>
> So unless an infiltrator knew the new command name (remove-older-thax in the
> example above), they couldn't use it.

The problem is that I run rdiff-backup in a crontab and one of the
commands there includes --remove-older-than.  That's a very creative
solution though.

Because of this, I think there is a gaping security hole in any
automated rdiff-backup scheme that pushes backups to the server.
Pulling to the backup server eliminates this problem, but if the
backup server is compromised, the infiltrator has root read access to
each system being backed up and can thereby compromise each of those
systems as well.

Is rdiff-backup ill-suited to automated backups?

- Grant


>> I'm using rdiff-backup in an automated "push" arrangement with access
>> to the backup server provided via SSH keys and restricted to the
>> rdiff-backup command like command="rdiff-backup --server".  I think an
>> infiltrator could delete a compromised machine's backups from the
>> backup server like this:
>>
>> rdiff-backup --remove-older-than 1s backup@12.34.56.78::/path/to/backup
>>
>> Is there any way to prevent something like that from happening?
>>
>> - Grant

___
rdiff-backup-users mailing list at rdiff-backup-users@nongnu.org
https://lists.nongnu.org/mailman/listinfo/rdiff-backup-users
Wiki URL: http://rdiff-backup.solutionsfirst.com.au/index.php/RdiffBackupWiki


Re: [rdiff-backup-users] Prevent rdiff-backup from deleting?

2011-11-14 Thread Dominic Raferd
I think (but haven't tried) you could alter the rdiff-backup option text 
like this (this is under Ubuntu 10.04, the location might differ with 
another OS):


sed -i 's/remove-older-than/remove-older-thax/g' 
/usr/share/pyshared/rdiff_backup/*.py


So unless an infiltrator knew the new command name (remove-older-thax in 
the example above), they couldn't use it.


Dominic

On 11/11/2011 20:51, Grant wrote:

I'm using rdiff-backup in an automated "push" arrangement with access
to the backup server provided via SSH keys and restricted to the
rdiff-backup command like command="rdiff-backup --server".  I think an
infiltrator could delete a compromised machine's backups from the
backup server like this:

rdiff-backup --remove-older-than 1s backup@12.34.56.78::/path/to/backup

Is there any way to prevent something like that from happening?

- Grant

___
rdiff-backup-users mailing list at rdiff-backup-users@nongnu.org
https://lists.nongnu.org/mailman/listinfo/rdiff-backup-users
Wiki URL: http://rdiff-backup.solutionsfirst.com.au/index.php/RdiffBackupWiki



___
rdiff-backup-users mailing list at rdiff-backup-users@nongnu.org
https://lists.nongnu.org/mailman/listinfo/rdiff-backup-users
Wiki URL: http://rdiff-backup.solutionsfirst.com.au/index.php/RdiffBackupWiki


[rdiff-backup-users] Prevent rdiff-backup from deleting?

2011-11-11 Thread Grant
I'm using rdiff-backup in an automated "push" arrangement with access
to the backup server provided via SSH keys and restricted to the
rdiff-backup command like command="rdiff-backup --server".  I think an
infiltrator could delete a compromised machine's backups from the
backup server like this:

rdiff-backup --remove-older-than 1s backup@12.34.56.78::/path/to/backup

Is there any way to prevent something like that from happening?

- Grant

___
rdiff-backup-users mailing list at rdiff-backup-users@nongnu.org
https://lists.nongnu.org/mailman/listinfo/rdiff-backup-users
Wiki URL: http://rdiff-backup.solutionsfirst.com.au/index.php/RdiffBackupWiki