On Thursday 23 April 2009, Shachar Shemesh wrote:
> Yuval Hager wrote:
> > On Thursday 23 April 2009, Dotan Cohen wrote:
> >>> How do you use the password in an automated backup then?
> >>
> >> Actually, I do not automate it. This is the command that I use to make
> >> the tarball:
> >> $ tar -zcvf - /home/user/ | openssl des3 -salt -k PASSWORD | dd
> >> of=DATE.tbz
> >>
> >> And this one to decrypt it:
> >> $ dd if=DATE.tbz | openssl des3 -d -k PASSWORD | tar zvxf -
> >
> > Well, I was looking for a more streamlined solution. Something that is:
> > 1) automatic
> > 2) offsite (e.g. online)
> > 3) bandwidth and space efficient (due to (2) above)
> > 4) (opt.) encrypted
> > 5) incremental
> >
> > I currently use rdiff-backup, but it does not abide to (3) above. I
> > started looking into duplicity (from the same author), and then thought
> > about description, hence the original post.
>
> http://rsyncrypto.lingnu.com + rsync
>
> Provides 1-5.
>
> Shachar

Thanks. I probably wasn't clear on (5). I would like to be able to go back 
in time when I restore. AFAIK, rsync* solutions are mirroring the current 
state only, where rdiff-backup and duplicity does allow time travel.

There is still the original question about the key handling, I just wanted 
to give a little more context..

--y

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Linux-il mailing list
Linux-il@cs.huji.ac.il
http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il

Reply via email to