AW: Strong encryption

C.Zimmermann clemens at prz.tu-berlin.de
Wed Jun 5 03:25:08 EST 2002


> 
> If you want them stored on the destination encrypted you

Yes, that´s it. The owner of the source files will be sure, that no one
else can read his files on the destination host.

I thought, rsync only looks at the modification date of a file and
decides whether to backup this file or not. In this case, the backup
could be stored  encrypted.

Bye Clemens




> will need to keep them encrypted on the source.  Rsync won't
> be able to compare an encrypted (cyphertext) file with an 
> unencrypted (plaintext) one.  For rsync to support encryption 
> it would need to be able to decrypt your files and that would 
> be very insecure.
> 
> If you keep the files encrypted on the source and
> destination you might as well use the rsync -w option
> because for encryption to be effective it truly does need to 
> randomize the data rendering the special efficencies of rsync 
> moot.  Additionally, for the class of cyphers you mention to 
> be secure they need long keys that change frequently and are 
> best generated randomly and then encrypted using even more 
> secure cyphers.  This randomness assures that no file will be 
> encrypted to the same cyphertext twice.
> 
> Sorry if i bowled you over on the cyphertext files issues. 
> Hopefully all you needed was a pointer to secure 
> transmission.  If not, a coherent description of why the need 
> for encryption may help us find a way to meet your needs.
> 
> -- 
> ________________________________________________________________
> 	J.W. Schultz            Pegasystems Technologies
> 	email address:		jw at pegasys.ws
> 
> 		Remember Cernan and Schmitt
> 
> 





More information about the rsync mailing list