Re: Backup encryption key

2009-04-29 Thread Shachar Shemesh
Yuval Hager wrote: בThursday 23 April 2009, נכתב על ידי Yuval Hager: On Thursday 23 April 2009, Shachar Shemesh wrote: I should point out one huge disadvantage of storing binary diffs when using encrypted systems. There is no (practical) way to erase old backups. Your backup storage siz

Re: Backup encryption key

2009-04-29 Thread Yuval Hager
בThursday 23 April 2009, נכתב על ידי Yuval Hager: > On Thursday 23 April 2009, Shachar Shemesh wrote: > > I should point out one huge disadvantage of storing binary diffs when > > using encrypted systems. There is no (practical) way to erase old > > backups. Your backup storage size is bound to be

Re: Backup encryption key

2009-04-25 Thread Dotan Cohen
> its a standard application, but I do understand your point.  if you > "insist", you can install the App on a U3 disc format.  this way it > will run from the USB without the need to reinstall it. > Then how would you connect to a Linux machine? > as for the app: > - http://www.download3k.com/In

Re: Backup encryption key

2009-04-25 Thread Dotan Cohen
> This one runs in kernel space and plants itself beneath the keyboard > driver, so it can capture everything and is almost undetectable. And Windows will run that as a "portable app", ie, no installation required? A malicious entity can just run that on any public computer and collect info? > Th

Re: Backup encryption key

2009-04-25 Thread Dotan Cohen
> I can write a Windows key logger in about half an hour, and I don't think > you would need admin in order to run it (making it run in other people's > session is another matter). > I see. Coming from the Linux world, I just figured that if it was doable then someone had already made such a tool

Re: Backup encryption key

2009-04-25 Thread Shachar Shemesh
Dotan Cohen wrote: Try this: http://amecisco.com/iks2000.htm It's a limited demo version, but enough to give you an idea. Thanks, Shahar. It seems that this is something that the computer admin must install, not a "portable app" or something similar. So, so long as I trust the admin (for

Re: Backup encryption key

2009-04-25 Thread Dotan Cohen
> Try this: > http://amecisco.com/iks2000.htm > It's a limited demo version, but enough to give you an idea. > Thanks, Shahar. It seems that this is something that the computer admin must install, not a "portable app" or something similar. So, so long as I trust the admin (for instance, at the Tec

Re: Backup encryption key

2009-04-25 Thread Shahar Tamir
On Saturday 25 April 2009, 13:11, Dotan Cohen wrote: > Really? Should I be worried? For that matter, do you have the address > of some keylogging software that I could play with in a virtual > Windows machine? I have googled just now, but I cannot find anything > that doesn't cost money. I will be

Re: Backup encryption key

2009-04-25 Thread Dotan Cohen
> Easy, > 1. connect the USB > 2. Run the TrueCrypt (http://www.truecrypt.org/) This is the problematic step. If you came to my computer with your USB key and asked to install a program so that you could use your key, I would not let you. Nor could you use it at a public facility such as a library

Re: Backup encryption key

2009-04-24 Thread nir grinberg
Easy, 1. connect the USB 2. Run the TrueCrypt (http://www.truecrypt.org/) 3. Mount the un-partitioned disk (on the USB) drive. I will be asked for the password in the mounting process. [10 seconds, so far] Unless the station has something that will copy the disk, while connected; the password by

Re: Backup encryption key

2009-04-24 Thread Dotan Cohen
> Nice add-on, i initially partitioned the disk and left the > TrueCrypt.exe in it.  I can come to any computer, connect the drive > via its USB, run the application and get the data (password etc). > That sounds like it depends upon the application being already installed on the computer. How do

Fwd: Backup encryption key

2009-04-24 Thread nir grinberg
1. I use external drive 2. Using TrueCrypt I mount the external drive, encrypt its content and password-protected it. 3. I backup all my data to this drive. 4. Data is encrypted, password protected and on un-recognized drive. Once the drive is connected to a PC, you need to re-mount it using TrueC

Re: Backup encryption key

2009-04-24 Thread Diego Iastrubni
On Friday 24 April 2009 09:34:40 you wrote: > P.s. > Blowfish? In this day and age? Twofish, I stand corrected. Their specks are very confusing: * They claim that the transport is based on https * They claim that the encryption key is stored on my computer, but i see no documentation on the lo

Re: Backup encryption key

2009-04-23 Thread Shachar Shemesh
Before I begin, I should point out that I never brought my company's service up in this thread. Yes, rsyncrypto is my project, and it is a major part of the service Lingnu is offering, but it is open source, comes built in as part of Debian and Ubuntu, and you can use it without paying me or Li

Re: Backup encryption key

2009-04-23 Thread Dotan Cohen
> Asking for password in one shell line: > > read -r -s -p "SubVersion password for user \"$USERNAME\": " DEPLOY_PWD > > No biggy :) > I know that it is not difficult, but it remains my motivation for treating myself to learn Python. One of these days. -- Dotan Cohen http://what-is-what.com htt

Re: Backup encryption key

2009-04-23 Thread Amos Shapira
2009/4/23 Dotan Cohen : > Actually, I am aware of that problem. I had considered writing a shell > script to automatically add the date and ask for the password, but > decided that will be my opportunity to learn python instead. So until > I have a spare day to get into Python I'm doing it this way

Re: Backup encryption key

2009-04-23 Thread Diego Iastrubni
As someone who tried to convince his boss to use Shachar's product, I can tell you that there are companies (in israel!) who sell a competing product, which is closed source, but: * works with a nice Java Based web interface, * it has a CLI version (works on 64 bit as well) * it's incremental

Re: Backup encryption key

2009-04-23 Thread Yuval Hager
On Thursday 23 April 2009, Oleg Goldshmidt wrote: > Yuval Hager writes: > > Well, I was looking for a more streamlined solution. Something that is: > > 1) automatic > > 2) offsite (e.g. online) > > 3) bandwidth and space efficient (due to (2) above) > > 4) (opt.) encrypted > > 5) incremental > > A

Re: Backup encryption key

2009-04-23 Thread Yuval Hager
On Thursday 23 April 2009, Shachar Shemesh wrote: > I should point out one huge disadvantage of storing binary diffs when > using encrypted systems. There is no (practical) way to erase old > backups. Your backup storage size is bound to be ever increasing. This > is because the only way to create

Re: Backup encryption key

2009-04-23 Thread Dotan Cohen
>> Actually, I do not automate it. This is the command that I use to make >> the tarball: >> $ tar -zcvf - /home/user/ | openssl des3 -salt -k PASSWORD | dd of=DATE.tbz >> >> And this one to decrypt it: >> $ dd if=DATE.tbz | openssl des3 -d -k PASSWORD | tar zvxf - > > So you password appears in cl

Re: Backup encryption key

2009-04-23 Thread Oleg Goldshmidt
Yuval Hager writes: > Well, I was looking for a more streamlined solution. Something that is: > 1) automatic > 2) offsite (e.g. online) > 3) bandwidth and space efficient (due to (2) above) > 4) (opt.) encrypted > 5) incremental A combination of tar (that can do incremental backups) and scp or s

Re: Backup encryption key

2009-04-23 Thread Oleg Goldshmidt
Dotan Cohen writes: >> How do you use the password in an automated backup then? >> > > Actually, I do not automate it. This is the command that I use to make > the tarball: > $ tar -zcvf - /home/user/ | openssl des3 -salt -k PASSWORD | dd of=DATE.tbz > > And this one to decrypt it: > $ dd if=DATE

Re: Backup encryption key

2009-04-23 Thread Shachar Shemesh
Yuval Hager wrote: Thanks. I probably wasn't clear on (5). I would like to be able to go back in time when I restore. AFAIK, rsync* solutions are mirroring the current state only, where rdiff-backup and duplicity does allow time travel. There is still the original question about the key hand

Re: Backup encryption key

2009-04-23 Thread Dotan Cohen
> Thanks. I probably wasn't clear on (5). I would like to be able to go back > in time when I restore. I think that you will have to wait for Stephen Hawkins to recover before that will be possible. > AFAIK, rsync* solutions are mirroring the current > state only, where rdiff-backup and duplicity

Re: Backup encryption key

2009-04-23 Thread Yuval Hager
On Thursday 23 April 2009, Shachar Shemesh wrote: > Yuval Hager wrote: > > On Thursday 23 April 2009, Dotan Cohen wrote: > >>> How do you use the password in an automated backup then? > >> > >> Actually, I do not automate it. This is the command that I use to make > >> the tarball: > >> $ tar -zcvf

Re: Backup encryption key

2009-04-23 Thread Shachar Shemesh
Yuval Hager wrote: On Thursday 23 April 2009, Dotan Cohen wrote: How do you use the password in an automated backup then? Actually, I do not automate it. This is the command that I use to make the tarball: $ tar -zcvf - /home/user/ | openssl des3 -salt -k PASSWORD | dd of=DATE.tbz An

Re: Backup encryption key

2009-04-23 Thread Yuval Hager
On Thursday 23 April 2009, Dotan Cohen wrote: > > How do you use the password in an automated backup then? > > Actually, I do not automate it. This is the command that I use to make > the tarball: > $ tar -zcvf - /home/user/ | openssl des3 -salt -k PASSWORD | dd > of=DATE.tbz > > And this one to de

Re: Backup encryption key

2009-04-23 Thread Dotan Cohen
> How do you use the password in an automated backup then? > Actually, I do not automate it. This is the command that I use to make the tarball: $ tar -zcvf - /home/user/ | openssl des3 -salt -k PASSWORD | dd of=DATE.tbz And this one to decrypt it: $ dd if=DATE.tbz | openssl des3 -d -k PASSWORD |

Re: Backup encryption key

2009-04-23 Thread Shachar Shemesh
Yuval Hager wrote: On Thursday 23 April 2009, Dotan Cohen wrote: I've been considering encrypting my backups (e.g. using duplicity), but I am always afraid to lose the backup key when I lose the data I need to restore. This has the unfortunate implications of practically having no backups at

Re: Backup encryption key

2009-04-23 Thread Yuval Hager
On Thursday 23 April 2009, Dotan Cohen wrote: > > I've been considering encrypting my backups (e.g. using duplicity), but > > I am always afraid to lose the backup key when I lose the data I need > > to restore. This has the unfortunate implications of practically having > > no backups at all. > >

Re: Backup encryption key

2009-04-23 Thread Dotan Cohen
> I've been considering encrypting my backups (e.g. using duplicity), but I am > always afraid to lose the backup key when I lose the data I need to > restore. This has the unfortunate implications of practically having no > backups at all. > > I'd like to ask the list, when you backup your data (a

Re: Backup encryption key

2009-04-23 Thread Shachar Shemesh
Yuval Hager wrote: Hi, I've been considering encrypting my backups (e.g. using duplicity), but I am always afraid to lose the backup key when I lose the data I need to restore. This has the unfortunate implications of practically having no backups at all. I'd like to ask the list, when you

Backup encryption key

2009-04-23 Thread Yuval Hager
Hi, I've been considering encrypting my backups (e.g. using duplicity), but I am always afraid to lose the backup key when I lose the data I need to restore. This has the unfortunate implications of practically having no backups at all. I'd like to ask the list, when you backup your data (and