Les Mikesell wrote, On 6/1/2007 11:25 AM:
>> A less secure alternative I've thought about is to create an encrypted
>> FS on the remote system that was sent the mount command and
>> passphrase/keyfile before backup and un-mounted when finished. But
>> then there is a window of time that the remo
Kris Jordan wrote:
>> If you can dedicate the remote computer so no one else has root access,
>> a simple approach would be to use one of the transparently encrypted
>> file systems that needs a passphrase at startup to mount, and run an
>> independent instance of backuppc on this machine that
Les Mikesell wrote, On 6/1/2007 9:52 AM:
> If you can dedicate the remote computer so no one else has root access,
> a simple approach would be to use one of the transparently encrypted
> file systems that needs a passphrase at startup to mount, and run an
> independent instance of backuppc on t
James Ward wrote:
> My understanding is that the current Tiger rsync with the -E flag
> will do everything needed to make useful backups with BackupPC? Am I
> wrong?
>
> Thanks in advance,
>
> James
>
>
>
>
The -E flage doesn't work with backuppc - you can either use tar or
forgo the resou
Kris Jordan wrote:
> I thought about doing an rsync to the local system, creating one big tar
> from that, then using rsync's compare-dest to help create incremental
> tar files after that. But this won't take care of delete files by
> itself. Less hard-links would be preserved, but that would
Oooh. Hadn't even thought about doing gpg on the files prior to
transmission. Awesome idea. The side benefit of doing it that way is
that I can have clients off-site that have the key, but I do not. I can
back up their data, they can restore it, all the while I don't have
access to their fi
My understanding is that the current Tiger rsync with the -E flag
will do everything needed to make useful backups with BackupPC? Am I
wrong?
Thanks in advance,
James
-
This SF.net email is sponsored by DB2 Express
Down
Johan Ehnberg wrote, On 6/1/2007 7:35 AM:
> Hi!
>
> This is an interesting scenario. I don't think I've seen it before. I've
> created a system to proxy data on an untrusted network but not with
> change tracking. One short comment first: with rsync over SSH (normal,
> non-daemon operation) you
I think it would be better to change the ping command to the arpping
command. This way you can block ping requests on the clients (which is
safer), and backuppc is still able to check if the pc is alive or not.
It must be said then that backuppc must have access to the arpping
command which is ge
On linux, this model would use the dm-interface. This could be for
example to create a LUKS encrypted partition. It would - per design -
not protect from an on-line attack with admin rights however.
/johan
Tony Shadwick wrote:
> Rsync it to a mac, keep it on a filevaulted volume. That would d
Hi!
This is an interesting scenario. I don't think I've seen it before. I've
created a system to proxy data on an untrusted network but not with
change tracking. One short comment first: with rsync over SSH (normal,
non-daemon operation) you won't need a VPN.
At the end of this document is a "
Rsync it to a mac, keep it on a filevaulted volume. That would do it. :)
FreeBSD has md (memory disk), and you could probably format it with an
encrypted filesystem. Not sure what to tell you so far as Linux goes.
Kris Jordan wrote:
> I'd like to make an off-site backup of my BackupPC data par
12 matches
Mail list logo