Franco Masotti 3 years ago
parent 75e9f178ec
commit 6d13ae7a6c
  1. 8
      _posts/2019-02-23-my-backup-system.md

@ -1,7 +1,7 @@
---
title: My backup system
tags: [bash, shell, backup, rsync, LUKS, cryptsetup, sync, shred]
updated: 2019-06-20 19:06
updated: 2019-06-20 19:17
description: A detailed exaplanation of my backup system which is both encrypted and unencrypted for different purposes.
---
@ -85,17 +85,17 @@ I also keep two different types of incremental backups. It's not exactly the *3
# chown 700 backup_{root,data}{_enc,}
# popd
3. Shred, partition, format and mount the unencrypted hard disks. You should use
3. Partition, format and mount the unencrypted hard disks. You should use
fstab instead of mounting the filesystems manually
# shred /dev/sd{x,y} -n1 --random-source=/dev/urandom --verbose
# fdisk /dev/sd{x,y}
# mkfs.ext4 /dev/sd{x,y}1
# mount /dev/sd{x,y}1 /mnt/backup_{root,data}
4. Partition and format the encrypted backups as written in the [Arch Wiki page](https://wiki.archlinux.org/index.php?title=Dm-crypt/Device_encryption&oldid=557648#Encryption_options_with_dm-crypt).
4. Shred, partition and format the encrypted backups as written in the [Arch Wiki page](https://wiki.archlinux.org/index.php?title=Dm-crypt/Device_encryption&oldid=557648#Encryption_options_with_dm-crypt).
We will use some non-default options to make the encryption stronger
# shred /dev/sd{x,y} -n1 --random-source=/dev/urandom --verbose
# fdisk /dev/sd{w,z}
# cryptsetup -v --type luks2 --cipher aes-xts-plain64 --key-size 512 --hash sha512 --iter-time 5000 --use-urandom --verify-passphrase luksFormat /dev/sd{w,z}1

Loading…
Cancel
Save