To create the entropy needed for the creation of the keys, you can log on to the server via another terminal window and perform a few tasks or run some commands to generate entropy (otherwise you will have to wait for a long time for this part of the process to finish). Now we need to create the GPG keys that will be used for the encryption and decryption of our data: # gpg2 -full-gen-key Then you should make sure that you can connect to the backup server without using a password: # ssh SSH Passwordless Remote Login Replace with the actual IP of the remote server. If you are running SSH on a different port, then the below command assumes the sshd daemon is listening on port XXXXX in the Debian server. Let’s begin by creating the SSH keys in our RHEL box and transferring them to the Debian backup server. Creating SSH Keys for Passwordless Login to Remote Server Our test environment consists of an RHEL 8 box (to be backed up) and a Debian 11 machine (backup server). Once the installation completes, we will exclusively use sftp in various scenarios, both to back up and restore the data. In theory, many methods for connecting to a file server are supported although only ssh/ scp/ sftp, local file access, rsync, ftp, HSI, WebDAV, and Amazon S3 have been tested in practice so far. To install duplicity in RHEL-based distros, you will have to enable the EPEL repository first (you can omit this step if you’re using Fedora itself): # yum updateįor Debian and derivatives: $ sudo apt update
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |