Hi,

thanks for your response.

Untrusted clients: the backup clients (computers being backed up) are untrusted 
in the sense that they are considered to be malicious actors trying to 
compromise the openbsd server, trying to get remote access to the OpenBSD 
server, beyond the limited backup they are authorised to do.

Access code: In the example setup I gave (ssh + rrsync + rsnapshot), the access 
code would be the ssh code. I used the terms "access code" in case someone had 
a suggestion for another setup, not using ssh. For example another suggestion 
might be that I run an https web service.

> How exactly do you expect it to be 'robust against an adversary in possession 
> of the access codes'?

Well, that's the point about scripts like rrsync for example: giving ssh access 
to someone, but restricting the actions they can take. I am trying to see if 
there are other solutions I should consider. 

> could be a lot clearer about exactly what this setup is intended to do

I want to give the client the ability to backup their files, but not do 
anything else on the computer, and protect myself against their attempts to 
compromise the machines. This would be the considerations a commercial backup 
service would have.

Thanks




> On 13 Jan 2026, at 01:23, Crystal Kolipe <[email protected]> wrote:
> 
>> I am looking to implement an OpenBSD server as a backup server.
>> 
>> Critically, it will provide backup to untrusted clients, so I need the setup
>> to be robust against an adversary in possession of the access codes.
> 
> To give any meaningful opinion on this, it would help if you could be a lot
> clearer about exactly what this setup is intended to do.
> 
> For example, what does 'untrusted clients' mean in this context?
> 
> How exactly do you expect it to be 'robust against an adversary in possession
> of the access codes'?
> 
> What 'access codes'?

Reply via email to