Giter VIP home page Giter VIP logo

Comments (18)

jasonblewis avatar jasonblewis commented on July 17, 2024 3

This is a good idea for security reasons. If an unauthorised user gains access to the machine being backed up, conceivably they could use the local ssh key to gain access to the machine where the backups are being sent

from znapzend.

dunron avatar dunron commented on July 17, 2024 2

Znapzend is great for having local snapshots with progressive thinning. For pulling the snaps to my remote backup server I abandoned the push mechanism and switched to Syncoid.

from znapzend.

sempervictus avatar sempervictus commented on July 17, 2024

+1

from znapzend.

oetiker avatar oetiker commented on July 17, 2024

the problem with this is, that the configuration of what to backup is stored in the properties of the fileset to be backed up ... in keeping with this idea, one might imagine that there could be a setup where the configuration resides inside properties of the fileset receiving the backups ... The way to get such a feature would be a) you create a patch and provide a PR or b) you hire us to implement this for you.

from znapzend.

oetiker avatar oetiker commented on July 17, 2024

if the 'bad' guy gets access to the backup machine, he gets instant access to ALL the servers ...

I think the 'right' way todo this would be to have a special ssh command wrapper that restricts incoming commands and a special switch to znapzend so that it can do only local work PLUS either pull or push the data ... cleanup would happen locally only ....

this would require for znapzend to be installed at both ends ...

from znapzend.

sempervictus avatar sempervictus commented on July 17, 2024

Agreed. Restricted shells for git and sftp may be good reference points
from which to scaffold implementation.

On Fri, May 20, 2016 at 2:46 AM, Tobias Oetiker [email protected]
wrote:

if the 'bad' guy gets access to the backup machine, he gets instant access
to ALL the servers ...

I think the 'right' way todo this would be to have a special ssh command
wrapper on the backup server that restricts incoming commands and a special
switch to znapzend so that it can do only local work PLUS either pull or
push the data ... cleanup would happen locally only ....

this would require for znapzend to be installed at both ends ...


You are receiving this because you commented.
Reply to this email directly or view it on GitHub
#158 (comment)

from znapzend.

Baughn avatar Baughn commented on July 17, 2024

I'd think the "proper" fix for this would be to use ZFS-level ACLs. Once those work on Linux, which may still be a while.

from znapzend.

BotoX avatar BotoX commented on July 17, 2024

Well, right now if somebody breaks into one of your backed-up servers he will get access to all your backups as well as your backup server unless you put all backups in LXC/VZ/chroot containers.
I think keeping the backup server secure is an easier task in general than keeping all production servers secure.

Or did anyone of you implement the restricted shell - maybe possible to run this under a normal user account with fakeroot and special sudoers for ZFS snapshot manipulation?

from znapzend.

sempervictus avatar sempervictus commented on July 17, 2024

from znapzend.

ShaRose avatar ShaRose commented on July 17, 2024

With regards to storing the data on the fileset properties, why not set it up so that if a remote source is specified, it stores the source in a org.znapzend:src_remote property? If that property is valid, it uses that path for the source. Otherwise it can be left off. As for which fileset the property should be set on, it should probably just pick the first specified local destination. That way the command structure stays the same, but still allows the extra features.

from znapzend.

oetiker avatar oetiker commented on July 17, 2024

@ShaRose try an implementation ... good PRs are always welcome

from znapzend.

ser avatar ser commented on July 17, 2024

Any progress on this, guys? It's really worrisome to have a Central Hackers Repository which currently is de facto znapzend backup machine. It's just insane.

from znapzend.

oetiker avatar oetiker commented on July 17, 2024

we setup zones on the target machines, so the 'hacker impact' would be pretty limited ...

from znapzend.

sempervictus avatar sempervictus commented on July 17, 2024

@oetiker: if you mean true Illumos/Solaris/whateveryouprefer zones, that functionality (in terms of resource encapsulation and isolation) isn't easily available in Linux. The machinations which can be cobbled together through namespacing, cgroups, and "fun mount options" still lack the resource and process isolation semantics present in Zones/Jails or full VMs.
Having capabilities permitting control over mounts or nested namespace creation (even unprivileged, relatively to execution context) can lead to the ability to create suid binaries, traverse incomplete isolation implementations, and other silly things. Spender has a great writeup on how most caps lead to root, and i think that was from before Linux namespaces (or their standard inclusion), and especially the "all users can be god in their own little universe" user namespaces. Even pull-based replication can have its dangers - attacker controlled data and metadata may be problematic if the host from which you're pulling was compromised.
It is feasible to create a very restricted namespace or MAC context with bare minimum caps and syscalls permitted, with zfs delegations on the recv targets, for each stakeholder sending data, running something like a "restricted shell" explicitly for recv of the snaps... That seems a bit out of scope for this project, has its own concerns, while pull-based replication is a pretty reasonable feature (comparably) :).

from znapzend.

ShaRose avatar ShaRose commented on July 17, 2024

from znapzend.

oetiker avatar oetiker commented on July 17, 2024

@ShaRose note that znapzend does not operate by number of snapshots but by their age ... excess intermediary snapshots do get removed ...

@sempervictus yes ... on linux this is more complicated ... we are not using OmniOS though so our problem set is slightly different than your ... that said, I am very interested in reviewing a PR for a pull based model.

from znapzend.

sempervictus avatar sempervictus commented on July 17, 2024

@oetiker - might have a bit of time next week. Been a while since i wrote anything in Perl, probably a good way to de-cobweb the braincase a bit.
@ShaRose - neat concept for a data-only attack strategy, probably works against all manner of similar tools.

from znapzend.

stale avatar stale commented on July 17, 2024

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

from znapzend.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.