plain source -> encrypted destination: rsync + gpg

Martin Langhoff ml at nzl.com.ar
Thu Jun 26 19:37:09 EST 2003


addady at active.co.il wrote:
> It seems that the --dest-filter patch of Kyle Jones can help you.
> 
> Here is a link
> http://groups.google.com/groups?q=%22--dest-filter%22+group:mailing.unix.rsy
> nc+group:mailing.unix.rsync&hl=en&lr=&ie=UTF-8&group=mailing.unix.rsync&selm
> =b6f55s%24256q%241%40FreeBSD.csie.NCTU.edu.tw&rnum=1

I-n-t-e-r-e-s-t-i-n-g. I am still a bit confused as to why the 
compression happens at the server and not at the client.

In the case where the client starts the transaction to "push" files (or 
push changes, rather) to the untrusted server, running the tool on the 
remote server is self-defeating.

We are planning to use gpg for the purpose, so we could trust the server 
enough to run gpg with our public key. All the server needs is to use 
its own public key instead.

Is this going to be merged into HEAD? Are there any good reasons why for 
not running it on the client?

I have to admit, I am not familiar with the source. Browsing a cvs 
checkout of the HEAD, it seems that I should be looking at sender.c. 
There is exactly one instance of do_open() in send_files().

On the other hand, I don't know the protocol but if the pre-send filter 
changes the filesize in any way, we are toast. Or maybe not?

regards,





martin





More information about the rsync mailing list