Replies: 1 comment 1 reply
-
|
Having a unique key passphrase hard-coded in a backup script or easily accessible in an unlocked keyring is a problem if an attacker has access to your machine (like e.g. via a trojan). Having an unprotected borg key (no passphrase) and a trojan would be an equivalent problem. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
I've been struggling with automating borg backups for a while. For the longest time I've either used unencrypted repositories (for local backups) or
repokeywith a strong password (for offsites), but I've always had trouble with the latter because it requires me to input a password every time I backup, which means I typically do it by hand, so not frequently enough.So let's fix this.
I think I found a hack that could work. The basic principle I'm thinking of is to use a remote repository with in
keyfilemode (so the key is stored locally) with an empty passphrase, but with an encrypted backup.I think the following would get me what I want:
at this point, the remote server should have a backup of the local keyfile in
/srv/borg/encrypted-key-backupbut that key should be password protected, while the local server has a passwordless keyfile.Therefore, now, this should just work without a password:
... while still being able to survive a complete server loss.
What am I doing wrong?
Beta Was this translation helpful? Give feedback.
All reactions