pie___ is now known as pie__
{`-`} has joined #nixos-security
{`-`} has joined #nixos-security
{`-`} has joined #nixos-security
{`-`} has joined #nixos-security
ckauhaus has quit [Quit: WeeChat 2.2]
ckauhaus has joined #nixos-security
<ckauhaus> Vulnerability roundup 49 is out: #48775, #48776, #49777
<{^_^}> https://github.com/NixOS/nixpkgs/issues/48775 (by ckauhaus, 4 minutes ago, open): Vulnerability roundup 49 (master)
<{^_^}> https://github.com/NixOS/nixpkgs/issues/48776 (by ckauhaus, 3 minutes ago, open): Vulnerability roundup 49 (release-18.09)
<ckauhaus> key stuff: samba, wpa_supplicant
<pie__> od you guys know anything for a locally encrypted/decrypted remotely stored storage thing? basically encrypted remote backups, but i dont want the keys on the remote server
* pie__ nudges lrvick ?
<pie__> otoh i wonder if i should just have encrypted zfs (?) on both sides and just transfer snapshots periodically.i wonder if there's such a thing as transferring undecrypted zfs sapshots
<flokli> pie__: If it's backups, there's also borg (borgbackup.readthedocs.io). It has a mode where you jail users into a borg serve command limited to a specific path. you can set it up so that the backend doesn't have the keys to decrypt
domenkozar has joined #nixos-security
<lrvick> pie__: look at duplicity
<lrvick> it works like rsync, but can use most cloud storage backends as the remote sided of the command, and pgp encrypts locally before transmitting files
<lrvick> incremental backups too
<pie__> someone recommended me restic, i think it might be a better duplicity?
pie__ has quit [Ping timeout: 252 seconds]
pie__ has joined #nixos-security
pie__ has quit [Ping timeout: 272 seconds]
pie_ has joined #nixos-security
pie_ has quit [Ping timeout: 252 seconds]
pie_ has joined #nixos-security
pie__ has joined #nixos-security
pie_ has quit [Ping timeout: 240 seconds]
pie___ has joined #nixos-security
pie__ has quit [Ping timeout: 245 seconds]