Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
network_backup [2014/07/20 23:23] henri [Granting Access with SSH Keys for Testing] |
network_backup [2020/08/20 23:44] (current) henri [LBackup SSH Wrapper] |
||
---|---|---|---|
Line 5: | Line 5: | ||
* Quick overview of network backups : [[screencasts|LBackup screencasts page]]. | * Quick overview of network backups : [[screencasts|LBackup screencasts page]]. | ||
* Different network backup strategies : [[Network Backup Strategies|Push and Pull Network Backup Strategies page]]. | * Different network backup strategies : [[Network Backup Strategies|Push and Pull Network Backup Strategies page]]. | ||
- | * Why LBackup uses openSSH for network backups : [[http://www.openssh.com/faq.html#1.2|Why SSH?]] | + | * Why LBackup uses openSSH for network backups : [[http://www.openssh.com/features.html|Why SSH?]] |
* [[network_backup #ssh_agent_for_unattended_network_backup|SSH agent information for unattended network backups]]. | * [[network_backup #ssh_agent_for_unattended_network_backup|SSH agent information for unattended network backups]]. | ||
* [[http://mah.everybody.org/docs/ssh|What is an SSH agent?]] | * [[http://mah.everybody.org/docs/ssh|What is an SSH agent?]] | ||
* [[http://www.symantec.com/connect/articles/ssh-and-ssh-agent|SSH agent usage]]. | * [[http://www.symantec.com/connect/articles/ssh-and-ssh-agent|SSH agent usage]]. | ||
\\ | \\ | ||
- | |||
- | |||
===== Mac OS X Hard Links ===== | ===== Mac OS X Hard Links ===== | ||
LBackup relies upon [[http://en.wikipedia.org/wiki/Hard_link|hard links]] to reduce disk usage. | LBackup relies upon [[http://en.wikipedia.org/wiki/Hard_link|hard links]] to reduce disk usage. | ||
Line 183: | Line 181: | ||
</file> | </file> | ||
Additional information regarding keeping password authentication enabled but disabling root authentication is available from various sources. Below are just a couple of helpful links relating to such information and discussions : | Additional information regarding keeping password authentication enabled but disabling root authentication is available from various sources. Below are just a couple of helpful links relating to such information and discussions : | ||
- | * [[http://unix.stackexchange.com/questions/99307/permit-root-to-login-via-ssh-only-with-key-based-authentication|Stack Excharge : Permit root to login via SSH- nly with key based authentication]] (website) | + | * [[http://unix.stackexchange.com/questions/99307/permit-root-to-login-via-ssh-only-with-key-based-authentication|Stack Excharge : Permit root to login via SSH only with key based authentication]] (website) |
* [[http://shop.oreilly.com/product/9780596000110.do|SSH, The Secure Shell: The Definitive Guide]] (book) | * [[http://shop.oreilly.com/product/9780596000110.do|SSH, The Secure Shell: The Definitive Guide]] (book) | ||
\\ \\ | \\ \\ | ||
Line 243: | Line 241: | ||
# Step (5) : copy the example file into the recently created /etc/ssh_wrappers directory | # Step (5) : copy the example file into the recently created /etc/ssh_wrappers directory | ||
- | sudo cp /lbackup/example_backup_config/resources/ssh-wrappers/lbackup-wrapper.sh ./ | + | sudo cp /etc/lbackup/example_backup_config/resources/ssh-wrappers/lbackup-wrapper.sh ./ |
# Step (6) : ensure that root is the owner of this file | # Step (6) : ensure that root is the owner of this file |