Secure File Storage Over Non-Trusted FTP? 384
hmckee writes "Does any software exist that enables me to store/backup/sync files from my local computer to a non-trusted FTP site? To accomplish this, I'm using a script to check timestamps, encrypt and sign the files individually, then copy each file to an offsite FTP directory. I've looked over many different tools (Duplicity, Amanda, Bacula, WinSCP, FileZilla) but none of them seem to do exactly what I want: (1) multi-platform (Windows and Linux), stand-alone client (can be run from a portable drive). (2) Secure backup (encrypted and signed) to non-trusted FTP site. (3) Sync individual files without saving to a giant tar file. (4) Securely store timestamps and file names on the FTP server. Any help or info on alternative solutions appreciated."
I knew a guy who always had headaches (Score:4, Insightful)
This guy was always complaining about headaches. He would constantly be pounding his head into his fist and whimper to me that he felt like his head would split open. He took pain killers all the time, and for a long duration was addicted to a certain prescription pain medication. But none of that helped because as soon as the medication started to wear off, the pain would come right back again.
Finally, I had had enough of his complaining. I told him to stop pounding his head with his fist. Whaddayano! His headaches went away in a day.
Moral of the story: Don't try to find workarounds for your problem. Fix the problem.
Re:I knew a guy who always had headaches (Score:5, Funny)
The problem is asking questions to Slashdot?
Re:I knew a guy who always had headaches (Score:4, Informative)
The real problem is not knowing about rsync since it's designed for exactly his problem.
Re:I knew a guy who always had headaches (Score:5, Insightful)
The real problem is not knowing about rsync since it's designed for exactly his problem.
No, rsync isn't a very good solution for a couple of reasons. First, unless there's some capabilities that I'm not aware of, rsync has no encryption capabilities. Given an unencrypted file tree and an encrypted version of the file tree, rsync has no way to compare the two for changes. The only solution to that which I see is to maintain a local encrypted mirror of your file tree. So then you need twice as much space, since you're maintaining two local file trees, and you need a tool to update automatically sync the local file tree and the local encrypted version of the file tree. If you have that tool, then it may work or be hacked to work with a remote file tree, completely removing the need for rsync. Even supposing that you found a tool to do that which won't work with a remote file tree, you're nullifying the primary advantage of rsync.
rsync is designed to do incremental updates. If you have a text file and change one word, rsync doesn't transfer the whole file. It only sends enough info to correctly update the remote file so that it matches the new local file. (Or vice versa, of course.) But when you change a single word and reencrypt a text file, the whole file changes. So rsync will have to transfer the whole file. So will any other solution, of course, but it does mean that rsync loses much of the capability which makes it so valuable.
You could do something like unencrypt the local file tree mirror, rsync with the working file tree, reencrypt the file tree and then rsync the local encrypted tree with the remote encrypted tree mirror, but that's a lot of work and processing power and hardly matches the clean, integrated solution that the article is asking for. It's probably more cumbersome than whatever it is he's doing now.
Re:I knew a guy who always had headaches (Score:4, Informative)
Re:I knew a guy who always had headaches (Score:5, Insightful)
Interesting. Things like this are why I always hedge my bets and say things like "...unless there's some capabilities that I'm not aware of, rsync has no encryption capabilities..."
That being said, I'd be extremely leery of this program. The website says: "Rsyncrypto does, however, do one thing differently. It changes the encryption schema from plain CBC to a slightly modified version. This modification ensures that two almost identical files, such as the same file before an after a change, when encrypted using rsyncrypto and the same key, will produce almost identical encrypted files." I'm far from an expert at crypto but I know enough to be extremly suspicious of that claim. A "slight change" in an encryption algorithm can be enough to transform an algorithm from highly secure to trivially crackable. And I strongly suspect that making similar files produce similar encrypted files means that there's a great deal of info about the unencrypted file suddenly available from examining the encrypted file. I wouldn't trust this without extensive review from some heavy weights in the crypto field.
Re: (Score:3, Informative)
From http://rsyncrypto.lingnu.com/index.php/Algorithm [lingnu.com]: "The entire rsyncrypto can be summarized with one sentence. Rsyncrypto uses the standard CBC encryption mode, except every time the decision function triggers, it uses the original IV for the file instead of the previous cypher block."
So you're basically dividing each file into chunks and encrypting them separately using the standard algorithm. Seems pretty safe to me. The only obvious leakage is that an attacker can tell if two files are substantiall
Re: (Score:3, Insightful)
It might be safe but unless you're quite knowledgeable about encryption, gut feelings about what seems safe aren't very reliable. I still suspect that doing this opens up more areas of attack. Note that I'm making no claims of expertise, so I don't KNOW this to be the case. I'm just saying that I'd be leery.
Re:I knew a guy who always had headaches (Score:5, Informative)
Rsyncrypto is insecure. By resetting to the IV, it opens an information leak similar to the one with ECB mode [wikipedia.org] (see the picture of the penguin on that page).
To see why CBC with occasional reset-to-IV is insecure (regardless of trigger function), consider a long repeating pattern of the same bytes (e.g. the white spaces in the penguin picture). CBC won't encrypt them to the same value (like ECB does), but every time the IV resets the same sequence of encrypted bytes will appear. This pattern is detectable and further the places where this pattern is disrupted is detectable. So going back to the penguin picture, the non-background portions will have a shadow that disrupts the repeating background pattern and revealing the content of the file.
Re:I knew a guy who always had headaches (Score:5, Informative)
Note - I'm the one who designed and wrote rsyncrypto.
Well, no. Two files will likely be encrypted using different session (read - AES) keys, and therefor will not be even remotely similar. One file having two significantly similar areas will show up, however. This case was deemed somewhat remote in my analysis. You are free to perform your own, of course. If you do, please feel free to email me.
The only place where actual data leakage may happen are due to the fact that a persistent attacker can compare cipher texts, and know where the decision function triggered. This is a good point to ask "how much information is gleaned about the file".
I think current rsyncrypto is ok on that front, and future plans include improvements. These improvements, alas, will cost in performance.
Shachar
Re: (Score:3, Interesting)
Here's a review of rsyncrypto [linux.com] that also says it isn't really secure:
Re: (Score:3, Insightful)
I haven't read the page in detail but this appears to be a tutorial on using rsync over ssh. That would encrypt the transmission but it wouldn't result in an encrypted file on the other end. Am I missing something?
Re: (Score:3, Informative)
Re:I knew a guy who always had headaches (Score:4, Insightful)
The real answer to your problem is use a secure protocol like SSH which does everything you just asked for natively.
Does it encrypt and sign the files one-by-one so that the admin of the remote site (who you don't trust) can't read, alter or share them on you?
Re: (Score:3, Interesting)
Gah. I wish people wouldn't keep trying to use public key encryption when it's not needed. Public key encryption is used to get around the key distribution problem. Signing is used because anyone can easily encrypt stuff using your public key and you can't guarantee they are who they say they are.
From what I can tell, he's not sending these files to anyone. He's uploading them and the only person who will access them will be himself. This is exactly what regular, symmetric encryption is for!
Encrypt the file
Re:I knew a guy who always had headaches (Score:4, Insightful)
What's wrong with using a public key for the backups? That's what I do.
If you're using purely symmetric encryption for your backups, you have to store the keys somewhere, and that somewhere has to be online when the backup is generated. Then you have to physically move it somewhere that it's not reachable. It's a manual process.
With a public key system, you can store your private key offline all of the time, and not have to deal with symmetric key management. GPG does that for you.
Where is the downside?
Re: (Score:3, Insightful)
Does it encrypt and sign the files one-by-one so that the admin of the remote site (who you don't trust) can't read, alter or share them on you?
If you don't trust the remote server, why the fuck would you consider using it as a backup site?
There isn't an encryption/protection scheme possible that will prevent the remote admin from outright deleting whatever files on his own filesystem that he wishes to. Oops, no more backups.
Re: (Score:3, Interesting)
Re:I knew a guy who always had headaches (Score:4, Insightful)
The problem is FTP. It is an old deprecated protocol that is inherently insecure and even FTP w/ SSL is simply a work around to a broken problem.
Wow. It might be better to understand the problem before you make suggestions. FTP isn't the problem. FTP is just a way to move files from here to there. It's unsecured and untrusted but, in this case, SO IS THE REPOSITORY. Exactly what benefit do you get from using SSH to securely transfer files to an unsecure location? That's like using an armored truck to move your valuables to the QuickStorage down the road. What's wanted is an automated way to encrypt the files locally, then transfer the encrypted files to an untrusted site. If the files are encrypted, then it doesn't matter that FTP is unsecured.
Re: (Score:3, Insightful)
is the password "cleartext"? Because it is.
Sniffing FTP passwords is a joke!
Re: (Score:2)
Re: (Score:2)
Hey, I'm already doing that! The problem there is putting a Python installation on my portable drive.
Anyway, the parent is absolutely correct about my problem IF I cared that much about my data. I could pay an extra $10 a month for SFTP/SSH service on my hosting account or use Amazon S3, but, really my data just isn't worth that much because it is personal files I already store in two other places.
To me, the problem seems to be if someone has implemented a secure pseudo-filesystem over FTP. I tried looki
Re:I knew a guy who always had headaches (Score:5, Funny)
Re:I knew a guy who always had headaches (Score:5, Funny)
#10,407's got you by 1,132,922 membership points, #1,143,329.
#10,407 and #44,513 both want you off HIS lawn right now.
Sincerely,
Membership Police
Re:I knew a guy who always had headaches (Score:5, Funny)
go home kids. You can come back and play in the morning.
Re:I knew a guy who always had headaches (Score:5, Funny)
In my day we tied an onion to our belts..
Re: (Score:3, Funny)
We were lucky to have onions! And belts? Luxury. But you try telling that to the kids today and they'll never believe you.
Re:I knew a guy who always had headaches (Score:4, Funny)
get offa my lawn!
Re:I knew a guy who always had headaches (Score:5, Informative)
What about Portable Python [portablepython.com]?
If I understand your problem, you want the remote image encrypted, right? In which case SFTP/FTPS is redundant overhead (and whatever data is sent is stored in its plaintext). This is something that might be possible with FUSE (e.g., use the Python-FUSE bindings to construct an FTP client that passes stuff through GnuPG first).
Heh, you'd be surprised how many people around here lack a sense of humour.
Re: (Score:2)
I take that back, it secures the auth bit.
Re:I knew a guy who always had headaches (Score:5, Funny)
You appear to have misspelled "perl".
Re:I knew a guy who always had headaches (Score:5, Insightful)
Yeah, I don't get this guy. First, he says he wants it for his home computer. Then, he says it has to be multi-platform (Windows and Linux) plus stand-alone that can be run from a portable drive.
And I say why? Let's assume for a moment that this guy has two computers at home, one that runs Linux and one that runs Windows. He doesn't need an app that does everything perfectly on both platforms. He just needs an app that does it perfectly on one, and either one is fine really. If he prefers to use his Linux box to coordinate the secure backup to an untrusted FTP site, then he just needs to have his Windows machine send the data unencrypted over to his Linux box -- then his Linux box can just do the bulk of the job. Or if he prefers to do it the other way around and use his Windows machine to do the secure backup to the untrusted site, he can just use that and have his Linux box send the data unencrypted to his windows machine.
And of course, why does it even need to go onto FTP instead of SFTP? Instead of wasting valuable man-hours reinventing SFTP from scratch, or finding someone else that has, he could just pay a few dollars to a provider who will give him SFTP. And if his current Provider won't do that, get an other additional provider that will do it. If backing up is really as important as he seems to make it, then spending a few extra dollars each month shouldn't be a problem.
Re:I knew a guy who always had headaches (Score:4, Informative)
I should have stated that the data wasn't THAT important since it's already backed up in two other places.
I was initially using Amazon S3 to do the backups, but since I had 20 GB of spare storage on my hosting site, I figured someone else must have tried doing the exact same thing because it's the cheapest solution. It didn't take me long to write a small script to encrypt files and send them to the FTP server, another reason I figured someone else may have done this. So, rather than extending the script, I thought I'd "Ask Slashdot" to see if anyone else had completed the exercise.
If it were REALLY important for me to have this storage, I'd go back to using S3 or spring an extra $10 a month to get my account upgraded to use SSH/SFTP.
As it stands now, I may just get a kick out of implementing the project for fun.
Re: (Score:2)
Re:I knew a guy who always had headaches (Score:4, Informative)
You are correct, the access from Windows is really of secondary concern. Still, it would be nice to access the data from work or the wife's computer.
I should have also added that I asked the question to see how much flaming and ridicule I could draw by asking about such a cheap-ass, overly complex solution that is simply solved by SSH/SFTP. :)
Re: (Score:2)
Comment removed (Score:4, Interesting)
Re:I knew a guy who always had headaches (Score:4, Funny)
Worse is it always seems to be written by a guy named Chuck that worked there ages ago and didn't know WTF he was doing.
The best part is everyone loved Chuck and thought he was some tech god. The second you bitch about the beautiful VB Chuck wrote you are now seen as incompetent.
I feel your pain.
Really is a pity (Score:5, Informative)
Re:Really is a pity (Score:5, Informative)
I'd translate "wasn't possible" to "couldn't be bothered". Once SSH installed (and it is there by default in most *nix distros), you have but one 'user' file to configure (to 'jail' you within a certain hierarchy). Ta-da! Change your host and use SFTP.
What's it worth? (Score:2)
I'd translate "wasn't possible" to "couldn't be bothered".
I'd translate it as uneconomic.
Re: (Score:3, Interesting)
I fully agree with this provider. Providing shell access to a shared machine is madness and you cannot provide security for your users this way.
SFTP requires that SSH be running, so there is always a risk of shell access being gained through breaking scponly or whatever other jail you use.
Virtual machines are the only way I know of providing this, and they cost more because of setup / maintenance costs. Failing that, FreeBSD jails, but they are unpopular due to people wanting Linux hosting.
You get what you
Re:Really is a pity (Score:5, Informative)
It is ENTIRELY possible to provide that on any host, regardless of the number of users. All you are asking (correct me if I am wrong) is that the connection between you and the FTP server is secured through SSH or TLS.
That is trivial. Sounds like they cannot be bothered to enact rudimentary security. As a policy in my own systems, and any systems that I pay to use, I demand that any connections that go over untrusted networks be encrypted. There are so many products that help you do this it just makes their refusal all the more ridiculous. I have a product that does not support encrypted connections and I just stunnel to protect it.
Anything less is just reckless. Tell them to protect your connection or you will get another provider. Simple as that.
Re: (Score:2)
They might be telling the truth, depending on how they share the hosts and how they have logins setup.
HTTPS is not possible with virtual hosts (where foo.com and bar.com are both running on 1.2.3.4). The reason being is that the HTTP server doesn't know if you're talking to foo.com or bar.com until after the connection has started, but it needs to send out one of their certificates in order to get the connection started.
I'd guess FTPS has the same issue, as the FTP server won't know what to respond as. SF
Working On Something Similar (Score:4, Interesting)
I'm working on a backup solution that allows people to back up their data to a remote server securely and efficiently. For "efficiently", think rsync: only the differences are sent (and some information necessary to identify what the differences are). For "securely", think assymetric cryptography: your backup is stored in encrypted form, so that only someone who possesses your private key can use it.
All this is currently in very early stages of design. I'd welcome any suggestions for protocols or software I could use. Currently, I am thinking to implement a transactional network block device protocol, and implement the backup protocol on top of that. I still need to decide on a programming language I can use for parts I need to write myself, too (something safe (no buffer overflows, please), yet with byte level access...and no Java or .NET, please).
By the way, this is going to be a commercial product, but the code and the protocols will be open. I'll charge for the storage and bandwidth. :-D
Doesn't sound like it will work (Score:2)
If the backup is going to be stored in encrypted form then how is efficient "rsync-like" difference identification going to be possible?
A small change in a source file will likely change everything following it in the encrypted version.
Re: (Score:2)
``A small change in a source file will likely change everything following it in the encrypted version.''
Yes, of course. This is one of the main challenges. :-D
A solved challenge, mind you (Score:4, Informative)
Rsyncrypto
http://rsyncrypto.lingnu.com/ [lingnu.com]
Encrypts while making the above sentence untrue - a small change in the file results in a (relatively) small change in the cypher text.
It's stable, been around a while, and is written by me :-)
Shachar
P.s.
It is, in fact, written by me for the purpose of a commercial backup service. The software itself, however, is free.
Re: (Score:3, Interesting)
Have you checked out rsyncrypto [lingnu.com]?
Re: (Score:2)
No, but I will. It looks like it could be very useful to me. Thanks for the pointer!
Re: (Score:2)
There's also esync [zexia.co.uk], but as far as I know (I emailed the guy a few years ago) he got swamped with other stuff and never got any further.
There's quite a bit of theory on his pages though. Might be of interest.
Re: (Score:3, Informative)
I've looked at it a while back (I'm the one who wrote rsyncrypto). When compared with rsyncrypto, the main thing I didn't like (aside from the fact there appears to be no implementation... ) is the amount of state stored. Esync actually needs access to the old plain text file in order to work (or a substantially similar state). Rsyncrypto, on the other hand, needs just a few pieces of state per file, that once created never change. These include the symmetric session key and such stuff, and are about 68 byt
Re: (Score:2)
Re: (Score:2)
Here is a suggestion, make sure something forces the user/admin on the client side to back up their encryption keys and settings to either something local or a combination of local and remote that isn't on the same computers being backed up. And make sure this is verified every so often by either requiring a "file" stored on the local backup to make the program work or simply make it refuse to work again without making another updated key and setting backup.
Nothing pisses me off more then walking into a job
Re: (Score:3, Interesting)
Well, I use rsync over SSH (so the network traffic and authentication is encrypted)...
You could potentially use an encrypted disk locally, and rsync the encrypted disk image over (it should still only xfer the changes), assuming you don't trust the target host.
Re: (Score:3, Informative)
GPL3 might be why. He would have to open what he does on his servers to make it work with the GPLv3. That might not be an option for this type of webservice.
If it was GPLv2, it might be a little better of an option except that Rsync wouldn't be able to do incremental backups unless it could decompress/decrypt all the files and then re-encrypt them without damage and when accessed. Storing information in a file index with mapping to the encrypted files would open the encryption to hacking and wouldn't be a g
TrueCrypt (Score:5, Informative)
Re: (Score:2)
I use TrueCrypt on my portable hard drive and tried using it for this application. The problem was that TrueCrypt couldn't create a file system on an FTP server.
I've been using TrueCrypt to encrypt individual files before sending them to the FTP server. I'll have to give it a look again since my version might be a little out of date.
Re: (Score:2)
Does it have be to ftp? (Score:2, Informative)
Re: (Score:2)
I second the recommendation.
Backups are differential on a block level (blocks are a few MB, if I'm not mistaken). File identities and extended attributes are preserved. Upload resume and "on the fly" (i.e., without re-uploading) encryption key changes are supported for a premium (JD Plus service).
I'm not sure how secure the web access interface is, but I think you can disable it.
Re: (Score:2)
I was using Amazon S3 before realizing I was paying double when I had a spare 20 gigabytes on my FTP/HTTP hosting service. I could pay an extra $10 a month to get SFTP/SSH service but I guess I'm being cheap.
I'm also not storing anything so important that I need a technically superior solution.
duplicity + ftplicity (Score:5, Interesting)
duplicity combined with ftplicity:
"Anyone storing data on an unfamiliar FTP server needs to encrypt and sign it to ensure reliable protection against prying eyes and external manipulation. duplicity is just the tool for this, and the ftplicity script from c't magazine makes working with it child's play."
http://www.heise-online.co.uk/security/Backups-on-non-trusted-FTP-servers--/features/79882 [heise-online.co.uk]
http://duplicity.nongnu.org/ [nongnu.org]
Re: (Score:2)
Yes, I've looked at this, but I'm already using a Python script to do most of that. I was hoping to find something with a GUI and that was easier to put on a portable hard drive than Python.
Re:duplicity + ftplicity + Portable python (Score:3, Insightful)
Then you should have put this as a requirement in your query. But I would ask WHY you want a gui? Backups should be set-and-forget! My USB sticks have multi-platform autorun scripts to execute my backup. I only need an interface if I choose to expand or shrink the backup set--I can edit a text file that has the list of what to exclude.
Python is pretty easy to put on a portable hard drive and there ar
Re: (Score:2)
Blame this on my not writing up a really thorough spec for the small summary. You can see some of my other posts for more info, but this was sort of a query to see if anyone had done something similar because it seems like a simple project that might be useful.
As to the GUI, I was thinking it would be nice if it could double as a backup tool and a remote file system tool, ie access the files from another computer.
Re: (Score:2)
Anyone storing data on an unfamiliar FTP server better make sure that is isn't important or private. FTP doesn't encrypt anything, including the user name and password. Simply sniffing either end of the connetion could allow anyone to delete the files, down load them to be cracked on a 2 million node bot net contributing cycles, or even infect the files with something that would notify me when you access them and either send your keys to me or give me access to your system.
And I said me not because I would
The problem with FTP (Score:2)
Ok ftp supports reading chunks of data from files, i.e. byte range n-m.
However it doesn't support (I strongly suspect) _writing_ chunks. Sure you can say, 'REST n' and start writing but I think the file would be truncated.
This means, encrypted images like Truecrypt containers are out,s ince you'd be writing the entire file over and over again.
So you'll have to stay with single files.
vanilla ftp: your password will be in the clear. (Score:4, Insightful)
Re:vanilla ftp: your password will be in the clear (Score:5, Insightful)
This may well mean that despite whatever you do, encypt etc, someone can sniff the password and then simply come in and delete all your files.
i.e, whatever other steps you take, this is inherently worthless.
Hardly. As long as the data is encrypted well enough to stop people from stealing or modifying the data in ways that could have serious privacy and financial implications this is a net gain in data availability.
Even if the chance of someone doing this was as high as 5% over the period in question, it would still mean that there was 95% chance of you having a good off site backup. That is better than nothing as long as you realise that there is still a 5% risk and don't act like it is totally secure.
As a simplified example; if your PC at home is 95% sure of retaining all of its data in the period and your portable USB hard drive is 95% sure of retaining all of the data, the chance of you losing any data at all is 0.0125%. Even with exaggarated risk factors, this is not bad.
Do they have SSH? (Score:2)
If you cannot ssh to the site, then you should find another host.
Manent fits the bill perfectly. (Score:5, Informative)
Manent is an algorithmically strong backup and archival program. It features efficient backup to anything that looks like storage. Currently it supports plain filesystems ("directories"), FTP, and SFTP. Planned are Amazon S3, optical disks, and email (SMTP and IMAP). It can work (making progress towards finishing a backup) over a slow and unreliable network. It can offer online access to the contents of the backup. Backed up storage is completely encrypted. Backup is incremental, including changed parts of large files. Moved, renamed, and duplicate files will not require additional storage. Several computers can use the same storage for backup, automatically sharing data. Both very large and very small files are supported efficiently. Manent does not rely on timestamps of the remote system to detect changes.
Check it out: http://freshmeat.net/projects/manent [freshmeat.net]. It's under active development (the UI and the setup are currently in fetal stage) but the basic functionality is there and is well tested.
Disclaimer: I am the author.
Re: (Score:3, Informative)
The wonders of pipelines (Score:2)
If possible, keep it simple. This is what I do - it is from UNIX, I don't know if Windows can handle it, but probably through a proper UNIX subsystem:
(cd /source/directory;tar cf - *)|ssh user@target '(cd /target/directory;tar xvf -)'
The left side will copy the whole directory tree under /source/directory and put it out on stdout in tar format; the right side will route the stdout to the target machine, where it will be unpacked under the target directory. If you don't want to copy everything, there are way
Give up (Score:2)
I've looked into this in the past. There is nothing better than Duplicity.
I eventually gave up and started backing up my data to servers that I do trust. You should too. You can rent a VPS for only $20 per month. It's just easier and *know* that you're the only one who has root access (assuming that you keep updating your system, of course).
Well, I've also looked into it and found nothing (Score:5, Informative)
Re: (Score:2)
Re: (Score:3, Informative)
No, it's more like someone running around naked outside holding a frosted pane of glass in front of them wondering if maybe they should also build a tool to hold a second pane of frosted glass behind them.
Re: Errr (Score:5, Funny)
Am I the only one thinking this is like someone saying they want privacy then running around butt naked then wondering how they can keep their privacy at the same time.
And the answer of course is security through obscuring. Wear a mask ;-)
(I guess you're not completely naked, but hey, close enough)
Wear a mask (Score:2)
Comment removed (Score:5, Funny)
Re: (Score:2)
Thanks for the suggestion, but my wife will be upset if I start running around the front yard naked. I'll try to come up with something else.
Re:Errr (Score:5, Insightful)
Even if his userid/passwd are compromised, his data wouldn't.
So if someone used his userid/passwd to delete his archive or overwrite it, his data wouldn't be compromised?
Or has the data no value, so the archive can be deleted/corrupted without loss? Then what is the use of archiving it at all?
Re: (Score:2)
That was one scenario I hadn't thought of, but, since this is a copy of data I've already backed up in other places and check nightly, it's not a big deal if someone deletes it. Plus, it's not THAT valuable.
That would be a pain if someone was deleting it everynight. :)
Re:A slight oxymoron here. (Score:5, Insightful)
"secure" and "untrusted" don't go hand in hand. If you want security, don't put things in untrusted spaces. Period.
Are you sure about that? I consider my SSH connections secure even tho' they traverse untrusted links. Same goes for my encrypted mails, https connections to my bank, etc.
Anyway, to the submitter - is areca [sourceforge.net] close to what you want?
Re: (Score:2)
Areca might work, I'll have to give it a spin. Thanks.
Re: (Score:2)
Areca might work, I'll have to give it a spin. Thanks.
No problem. Note that my post is not an endorsement of Areca, I just searched freshmeat for ftp encryption [freshmeat.net] and perused a few of the matches. Have a read through the other results, you might find something else worth looking at.
Not sure what sort of budget/skillset you're working with, but it'd also be pretty trivial to script up a solution that does what you're after too.
Re: (Score:2)
I'm not sure if SSH or HTTPS is a proper connection comparison. SSH attempts to secure the untrusted lines or roads the information is taking when the two endpoint are secure. It doesn't secure the endpoint. Same with HTTPS. From what I gather from the question asked, it seems like he wants to use HTTPS to access a regular HTTP site for some reason.
I'm not really sure why someone would be concerned about securing a link between two point when I can defeat that security at least as one of the end point. It w
Re: (Score:3, Informative)
Lol.. If your going to pay for insecure redundancy, why not consolidate the expense and use a secure solution from the start?
That's assuming a "secure solution" exists. I think I adequately proved that such a "secure solution" is at least as impractical -- it pretty much involves a machine that you've configured running in the apartment of someone you trust not to let it be physically tampered with.
Your missing the point, FTP isn't secure. You transmit the user name and passwords in plain text.
Yeah, I got that. So what?
And even though crypto is pretty good, it isn't fool proof nor it is impossible to break.
Fine then -- so suppose I use your "secure solution" from the start, and I'm using rsync over ssh to a machine in my friend's apartment.
What's to stop them from cracking the SSH?
After checking your credentials, making sure you as well as your server is in the US and under the US's jurisdiction, yes, I probably would. I'm not against a remote backup,
Neither am I.
Suppose for a mome
Re:A slight oxymoron here. (Score:4, Insightful)
"secure" and "untrusted" don't go hand in hand. If you want security, don't put things in untrusted spaces. Period.
I disagree. Everywhere you can store your files should be considered "untrusted". And "securing" the files is what we do to mitigate that reality.
Re:A slight oxymoron here. (Score:5, Insightful)
If you want security, don't put things in untrusted spaces. Period.
Completely, utterly incorrect. It's a sad comment on the ambient understanding of data security that this got modded insightful.
Trust is seldom a good approach to security. Good security is when you can trust nobody and still sleep at night. That means strong encryption. That is exactly the approach implied by the article and it is exactly the right thing to do.
I think it is very unwise to ever assume any level of trust in the storage of backups, certainly offsite backups. The whole idea of backups is that you keep them around for a long time, in several copies and several locations. The more valuable your data, paradoxically, the more copies you need and the more widely dispersed they should be. This is antithetical to maintaining trust. The right way, indeed the only way out of this paradox is strong encryption.
Re: (Score:2)
Untrusted storage site means others can access the files.
Access means they can decrypt them. Given enough cycles, encryption can be broken.
If you want your encrypted files to be secure, keep your keys protected and do not allow access to the files.
IMO, preventing access to the files is priority, encryption is only there in case preventing access fails.
It boils down to acceptable risk.
Re: (Score:3, Interesting)
It depends on what you put behind the word "security".
"Backup" is also "security". And a cheap of-site backup is better than no off-site backup at all.
I have the same need as the submiter as my ISP provides 10 GiB of public web space available only through FTP (r/w), HTTP (r) or HTTP+PHP (r/w). I have the storage, I need the software to use it while hiding backup content from my ISP and from other web eyes.
Re: (Score:3, Insightful)
Access means they can decrypt them. Given enough cycles, encryption can be broken.
What are you talking about? Encryption that can be broken with any feasible level of computing power is worthless. If you're assuming that once the bad guys get your ciphertext they'll be able to decrypt it sooner or later, why encrypt your data at all?
Certainly I'd prefer to have my valuable data stored with both physical security and encryption. But if I had to choose one or the other, I'd definitely choose encryption. If yo
Re:A slight oxymoron here. (Score:4, Insightful)
All encryption can be broken. The solution then, is to ensure that the encryption cannot be broken within a useful timeframe. I really don't care if you manage to decrypt my credit card number if the card has already expired. If I'm having a secret meeting this time tomorrow then the encryption only needs to last just over 24 hours, since by the time you work it out it will be too late.
I actually think you've got it backwards. Encrypt them strongly and you can put the data on a billboard in the centre of picadilly circus and no one will be able to work it out in a useful timeframe. Ever seen Kryptos? http://en.wikipedia.org/wiki/Kryptos [wikipedia.org] The data is public, there are many thousands of people attempting to break it, and yet the hardest section remains unresolved. The acceptable risk is related to the minimum amount of time that you can allow for the code to be broken, which determines how strong you need your encryption.
Re: (Score:3, Insightful)
I think you've missed the point. If you're not allowing access to the files then encryption isn't particularly important now is it?
The whole point of encryption is that you could email it to your arch-nemesis and they would still be unable to decrypt it in a useful time-frame. Take AES with a 256 bit key. That would (on average) take all of the computers in the world millions of years to brute force. It's possible that someone could get lucky, but they'd have to dedicate years of processing time on the off-
Re: (Score:3, Informative)
After thinking about this, I realize that I never should have written "non-trusted" in the description. I was thinking about FTP in the sense that it's inherently non-secure, which would make "non-trusted" redundant. I actually trust the FTP server as much one can be trusted.
This made me think about side question to which others in this thread have alluded: When is FTP as secure as SFTP? When you're on a non-trusted computer. It's a minor issue, but if you're trying to access an encrypted file from a n
Re: (Score:2)
Secondly, to achieve your goal, you would need the modern-day technological equivilent of a '60's-era 'scrambler' telephone device - a coder on your end, and a decoder on the other (in this case, one on the server). I'm not so sure many hosts allow their clients to install programs on their servers (chuckle).
Are you reading the problem being he wants to encrypt -> ftp -> decrypt on the ftp host?
Seems to me like he just wants to encrypt -> ftp the encrypted files onto the ftp host. No decryption required at that end, so no programs to be installed on the ftp host.
The only place requiring decryption would be after pulling the files back off again.
Re: (Score:2)
FTP send your user name and password unencrypted so encrypt->FTP the encrypted files->store on host encrypted wouldn't be secure if I was able to sniff your connection on either side. Unless that is if you don't mind me grabbing your files and attempting to break the encryption or just deleting them for you or maybe even infection them with some sort of trojan or worm so your compromised as soon as you restore the files or open them to browse through them.
FTP on a non trusted site isn't a workable sce
Re: (Score:2)
It does.
The author though doesn't just want to encrypt the file in transit he wants to encrypt & digitally sign the file when it is stored on the ftp server.