First: yes, wide open. Second: Sure, if your network is secure. I initially didn't understand that you were going to limit access. Anyway, trusted host access is a vulnerability. You know your system and situation.
Tim Conway [EMAIL PROTECTED] 303.682.4917 Philips Semiconductor - Longmont TC 1880 Industrial Circle, Suite D Longmont, CO 80501 Available via SameTime Connect within Philips, n9hmg on AIM perl -e 'print pack(nnnnnnnnnnnn, 19061,29556,8289,28271,29800,25970,8304,25970,27680,26721,25451,25970), ".\n" ' "There are some who call me.... Tim?" Philip Mak <[EMAIL PROTECTED]> 12/18/2001 04:50 PM To: Tim Conway/LMT/SC/PHILIPS@AMEC cc: <[EMAIL PROTECTED]> Subject: Re: RSYNC: Backup Solution thoughts... Classification: If I understand correctly, you're saying that if someone manages to gain access to my rsync server, they can read my password files and private keys, right? How would they accomplish gaining access to my rsync server, though? Only my backup server would be authorized to connect to it... I think I *do* want to back up /etc/shadow actually, because this is a full system backup that's meant to be able to be used to restore the system in case of hard drive failure. If I didn't include /etc/shadow, then everyone would lose their passwords. On Tue, 18 Dec 2001 [EMAIL PROTECTED] wrote: > readonly full disk. > rsync yourhost::rootmodule/etc/shadow . > satan -f ./shadow > telnet yourhost > login as user > su - > f*** you over. > > what, no telnet, only ssh? > grab an identity file and ssh in. > > yes, it's bad... at least, exclude secure areas.