Provided by: rsyncrypto_1.14-1.2build3_amd64 bug

NAME

       rsyncrypto - rsync friendly encryption

SYNOPSIS

       rsyncrypto [options] srcfile dstfile keyfile key
       rsyncrypto [options] -r srcdir dstdir keysdir key
       rsyncrypto [options] --filelist=file srcdir dstdir keysdir key

DESCRIPTION

       This manual page documents the rsyncrypto command.

       rsyncrypto  is a utility that encrypts a file (or a directory structure) in a way that ensures that local
       changes to the plain text file will result in local changes to the  cipher  text  file.  This,  in  turn,
       ensures  that  doing  rsync  to synchronize the encrypted files to another machine will have only a small
       impact on rsync's wire efficiency.

       rsyncrypto will encrypt files using a symmetric block cipher (AES). Each file is encrypted using a unique
       key. The file key is stored in two locations.  One is the "key"  file,  and  the  second  is  inside  the
       encrypted  file  itself. The second copy is encrypted using a RSA public key, which can be shared for all
       encrypted files.

       Decrypting the file can take place in one of two forms:

       Warm Decryption
              keyfile is used to decrypt srcfile into dstfile.

       Cold Decryption
              If keyfile is lost and key is the private key for the RSA encryption, extract and  create  keyfile
              from the encrypted srcfile, and create both keyfile and dstfile.

       If  both  keyfile  and  the  private key are not available, decryption cannot take place. Typically, this
       means that you would either want to transfer the encrypted files in whatever way (secure or insecure, but
       probably rsync :), and keep the plain text file, as well as the key file, secure. As long  as  you  saved
       the RSA private key, you can reconstruct them both.

ARGUMENTS

       The argument meaning depends on the existence of the -r, --filelist and -d flags.

       srcfile or srcdir
              This  is  the  source  for the operation. This will be the plain text file for encryption, and the
              cipher text file for decryption. If the -r option is given, srcdir is  the  directory  from  which
              files are to be encrypted/decrypted. If the --filelist option is given, srcdir is the directory in
              relation to which the file names given by the filelist file are interpreted. If neither are given,
              srcfile  is  the  file  to  be  encrypted/decrypted.  In any case, src must exist prior to running
              rsyncrypto.

       dstfile or dstdir
              Similar to src, this is the destination of the operation. It will be the plain text to be  created
              if -d was given, or the encrypted file otherwise.

       keyfile or keydir
              The file holding the symmetric key for the encryption, or a directory in which symmetric key files
              reside. If the later, the key files will have the same name as the plain text files.

       key    This  file can either be a X509 certificate holding a public key, or a PEM format private key. The
              private key is never needed unless a cold decryption is required. See the req(1) or x509(1) manual
              pages for more info.

       If dst does not exist, it will be created. The directory in which it is to be created must exist prior to
       running rsyncrypto.

       If encrypting, and a symmetric key for the file is found, the  same  parameters  will  be  used  for  the
       encryption  unless  the  --fr  or  --fk options are used. If that's the case, the key file is going to be
       replaced with the correct parameters.

OPTIONS

       These programs follow the usual GNU command line syntax, with  long  options  starting  with  two  dashes
       (`--').

       -h, --help
              Show summary of options.

       -V, --version
              Print out the current version number.

       -d, --decrypt
              Decrypt  src  into  dst. The default behavior is to encrypt src into dst, and create keyfile if it
              does not exist.

       -r, --recurse
              Recursively encrypt/decrypt an  entire  directory  structure.  All  files  under  srcdir  will  be
              encrypted  to  files of the same name and path (almost, see "--trim") under dstdir. If not already
              there, a key file will be created for each file under keydir.

       --filelist=file
              File is the name of a file (or "-" for stdin) that has a list of files and directories to process.
              If the name matches a directory, the entire directory is encrytped in recursive mode.

              Absolute file names in file are taken literally, but are  stored  as  relative  (stripped  of  the
              leading  slash and drive name where applicable). Relative names are interpreted in relation to the
              directory name given by the srcdir argument.  All  names  are  trimmed  according  to  the  --trim
              option.

              dstdir is interpreted as with the -r option.

              --filelist and -r are mutually exclusive.

              BACKWARDS  INCOMPATIBILITY NOTICE: Up until version 1.12 of rsyncrypto, --filelist did not receive
              any parameters, and the file name to use was taken from the src argument.   This  was  changed  in
              version  1.13  because  the  previous  way  could cause problems when the file list was created in
              relation to a different work directory than the one in use. Pass `.' as  srcdir  to  get  the  old
              semantics.

       -c, --changed
              Check  the  src  and  destination  modified  time  (see  --modify-window)  prior to performing the
              operation. If the modified time is the same, assume that the files are also the same, and skip the
              operation. Notice that unlike rsync, file sizes are not compared. This is because the file size is
              expected to change during the encryption (and thus decryption) operation.

       --risky-writes
              Usually, when rsyncrypto writes a file, it uses a temporary name and moves the file to  its  final
              name when successfully done. This serves two purposes.  During encryption, this prevents the false
              sense  of  security  that  may arise in case of an rsyncrypto interruption by preventing a partial
              file from being present (and in case of an update, by keeping the old backup). This  also  ensures
              that  restarting  rsyncrypto  will enable it to correctly detect whether the operation needs to be
              repeated. During decryption, this prevents overwriting a file until we are certain we can  decrypt
              its source.

              The  main  problem with this approach is that, if the file being written is large, the file system
              needs to have enough space for two copies of it for the duration of the operation. Also,  if  hard
              links are maintained, the default rsyncrypto behavior will break the link.

              Specify  --risky-writes  to  make  rsyncrypto directly overwrite the existing file using the final
              name.

       --modify-window=num
              Only applicable when -c is in effect. When comparing  file  modification  times,  treat  as  equal
              modification times that are num seconds apart. Default value is zero.

              This  option  is most useful when the encrypted file is stored on a FAT file system.  FAT can only
              store modification time with a 2 seconds accuracy.  This  may  result  in  the  modification  time
              changing between original and encrypted file. In such a case, --modify-window=1 should be used.

       --export-changes=logfile
              Whenever  encrypting  or  deleting  a  file, write the file's name to logfile. This allows passing
              logfile to rsync(1) using the --include-from rsync option.

              This option is mostly useful if rsyncrypto is used to repeatedly encrypt a  huge  directory  tree,
              and  then  using rsync to synchronize it remotely. The use of this option allows focusing rsync on
              only those files that are known to have changed, rather than have it send the entire file list  to
              the  remote  machine,  making  the rsync operation faster. It should be noted that rsync version 3
              starts the actual file transfer  while  it  is  still  transferring  the  file  list,  making  the
              performance gain from this option less noticeable.

              When  using  this option in conjunction with rsync, keep in mind that logfile is zeroed out before
              being written into. This means that unless there is  at  least  one  completely  successful  rsync
              operation  for  each rsyncrypto invocation, it is possible to have files that have been changed on
              disk by a previous invocation of rsyncrypto, but were over written by a later  invocation  and  do
              not  show up in the latest version of logfile. In other words, if rsyncrypto is run more than once
              between two completely successful invocations of rsync, it is  possible  for  logfile  not  to  be
              complete. Use this option at your own risk!

              It  is  highly  recommended that you upgrade to rsync version 3 or higher rather than rely on this
              option.

       -n, --name-encrypt=translation_file
              Encrypt the file name. If this option is specified, this means that file names  are  encrypted  as
              well.  This  is  done by changing the name of the encrypted file to a random string of characters,
              and storing the translation in the file given as parameter.  If working in  recursive  mode,  this
              file is automatically also included in the encryption, and is given the fixed name "filemap". This
              is done so that decryption of the file names is possible when the symmetric keys are lost.

       --ne-nesting=num
              When  the  --name-encrypt option is used, by default all mangled file names are stored in a single
              directory. When encrypting large directory trees, this can result in rather big directories. Using
              "--ne-nesting" will split the files to sub directories, according to random bits that are part  of
              the encrypted file name. "num" is the number of directories to nest.

       --trim=num
              Determine  how  many  directory levels to trim from the beginning of the srcdir path when creating
              directories under dstdir. The default value is 1. See THE TRIM OPTION for more details.

       --delete
              When in recursive mode, delete files and directories under dstdir that do not exist under srcdir.

       --delete-keys
              When deleting files, also delete their symmetric key and file name mapping (if  applicable).  When
              only  --delete  is  used,  the  symmetric  key  and  file mapping are kept, so that if the file is
              recreated, it will be rsyncable with the original file. This option implies --delete.

       -bnum --keybits=num
              Specify the block cipher's key size. For AES, these can be 128, 192 or 256.  Note that unless  the
              --fr or --fk options are also specified, this will only affect files for which no keyfile exists.

       --noatime=num
              (Only  on some platforms, most notably Linux). The platform usually keeps track of when files were
              last being accessed. Since rsyncrypto is typically used for backup, it opens the files it encrypts
              with the O_NOATIME option, which is a Linux specific extension that tells the system not to update
              the file's access time. When opening a file where the opening process is not  owned  by  the  file
              owner,  an  attempt  to  open the file with O_NOATIME will cause the open to fail with "permission
              denied".

              num can be one of these options: 0 means do not use O_NOATIME  at  all.   1  (the  default)  means
              attempt to only use O_NOATIME if rsyncrypto thinks it will not cause a permission denied error.  2
              means to use O_NOATIME always.

       --no-archive-mode
              Do not try to preserve timestamps. This option is incompatible with -c.

       --gzip=path
              By default, rsyncrypto will compress the plain text prior to encrypting it. In order not to become
              rsync  unfriendly  due  to  the  compression,  rsyncrypto  will search the path for an instance of
              gzip(1) that supports the --rsyncable option. If the system's default gzip does not  support  this
              option  (all  Debian and derivatives, as well as some others, support it), use this option to tell
              rsyncrypto to use a different instance of gzip. The tests directory of rsyncrypto's source  has  a
              file called "gzip", that does NULL compression by redirecting the input and output to cat(1).

       --roll-win=num, --roll-min=num, --roll-sensitivity=num
              Affects the rolling block algorithm. See NOTES.

       --fk, --fr
              If  command  line, or a version with different defaults, dictate different values for the --roll-*
              options or the -b option, these will only affect files for  which  keyfile  does  not  yet  exist.
              specifying  the  --fk  or  --fr will recreate keyfile if it has values different than those in the
              previous key file.

       -v, --verbose
              Increase verbosity level. Specify several times to be more verbose.

NOTES

       encrypting stdin

       If srcfile is given as `-', the plain text data will be read from stdin.  This  does  not  yet  work  for
       decompression (see BUGS).

       --roll-win=num, --roll-min=num, --roll-sensitivity=num

       These  values  affect  some  of the inner workings of rsyncrypto's decision making.  In particular, these
       affect how rsyncrypto decides when to revert to the IV.

       These options should not be played with unless you understand what you are doing. They are not dangerous,
       in that they will never cause data loss. Any value should still allow decryption of  the  file.  They  do
       have an affect on rsync's efficiency.

       These  options  are  only  there  to  allow  quick response in case a security problem pops up with their
       default values. If that happens, an advisory may come out giving new values to fill in as  a  workaround.
       Until that happens, most users are advised to leave these options alone.

THE TRIM OPTION

       When  running  rsyncrypto  in  recursive  mode,  the directory structure under srcdir is re-created under
       dstdir, with one directory stripped from the path. In other words, if we have a directory structure which
       has:

       a/b/c/file

       running rsyncrypto with srcdir of "a/b", and dstdir of "f" will create "f/b/c/file".

       The --trim options lets the user say how many parts to trim from srcdir when creating  directories  under
       dstdir  and  keydir.  If,  in  the  above  example,  we said --trim=0 then "f/a/b/c/file" would have been
       created. Likewise, if we said --trim=2 then "f/c/file" would have been created.

       It is an error to give a trim value which is higher than  the  number  of  directory  parts  actually  in
       srcdir. In the above example, --trim=3 would result in an error.

SECURITY

       The  roll  values  affect,  to a not totally known degree, how much information is "leaked" between plain
       text and cipher text. The default values are supposed to leak less than 20 bits of aggregated information
       about the plain text file for every 8KB, in the worst case. These values, we  hope,  will  be  considered
       secure  enough  for  most  usages. However, if your country's fate is at stake, use a non-rsync optimized
       encryption, such as the one provided by openssl(1).

EXAMPLES AND TUTORIAL

       Before starting to use rsyncrypto you will need a public key in X509 certificate format. The quickest way
       to generate one of these is using the openssl(1)  package.  To  generate  a  new  1536  bit  RSA  key  as
       "backup.key",  and  store  the  corresponding  unencrypted  public key in "backup.crt", use the following
       command:

              openssl req -nodes -newkey rsa:1536 -x509 -keyout backup.key -out backup.crt

       It does not matter what you answer for the certificate details, or when you set it to expire.  Rsyncrypto
       ignores everything in the certificate but the actual key.

       To encrypt file "data" into "data.enc", storing the file's specific key at "data.key", run:

              rsyncrypto data data.enc data.key backup.crt

       Anywhere  in  these examples that "backup.crt" is used, "backup.key" can be used as well. The above could
       also have "backup.key" as the last argument. If these examples list "backup.key"  specifically,  then  it
       means that "backup.crt" cannot be used instead.

       "data.enc"  will  be created. If "data.key" exists from a previous run, then the newly created "data.enc"
       will have the same symmetric key and other attributes, thus maintaining the  rsync  friendliness  of  the
       encryption. It is therefor important to provide any previous key file for the data if one is available.

       The  command  line  to  decrypt  the file depends on whether you have the key file used when the file was
       encrypted. If you do, then decryption can take place using  only  the  public  key,  with  the  following
       command:

              rsyncrypto -d data.enc data.dec data.key backup.crt

       If  the  key  file was lost, the private key must be used to recover it from the encrypted file using the
       following command:

              rsyncrypto -d data.enc data.dec data.key backup.key

       "data.key" will be created by the above command, as well as "data.dec".

       Use of rsyncrypto to encrypt whole directories is similar, with directory names replacing file  names  in
       the  above  example.  To  encrypt  the  content of a directory called "data" to a directory called "enc",
       storing the symmetric keys in a directory called "keys", run the following command:

              rsyncrypto -r data enc keys backup.crt

       As before the directories "enc" and "keys" will be created if they do not already  exist.  The  directory
       structure  under  "plain"  will  be  duplicated under "enc" and under "keys". That is, if there is a file
       called "foo" under "data", an encrypted files called "foo" will be created under "enc", and  a  key  file
       named  "foo"  will be created under "keys". In other words, the first part of the path to "data/foo" (the
       part that says "data") is eliminated from the path, and this determines the name of the files under "enc"
       and "keys".

       If a different trimming  is  required,  the  --trim  option  can  be  used.  To  have  rsyncrypto  create
       "enc/data/foo" instead of the above, use the following command:

              rsyncrypto -r --trim=0 data enc keys backup.crt

       Instead  of  taking all files from a single directory, it is possible to supply rsyncrypto with a list of
       files and directories which to encrypt. This is done using the --filelist option, like so:

              rsyncrypto --filelist --trim=0 list enc keys backup.crt

       "enc" and "keys" retain the same meaning as before. "list" is a text file with a list, one per  line,  of
       files  to  encrypt.  The  --trim=0  option says that if list contains a line saying "/home/foo/bar" which
       states the name of a file, then an encrypted file called "enc/home/foo/bar" will be created. Without  it,
       the file will be called "enc/foo/bar". Likewise, with --trim=2, the file would be created as "enc/bar".

       It  is  often a problem that the file names are not encrypted. If that is the case, we can ask rsyncrypto
       to encrypt the file names, as well as the actual files. Rsyncrypto does not  actually  encrypt  the  file
       names.  Instead, it replaces the actual file name with a random series of characters. The mapping between
       the actual file name and the garbled name is stored in a mapping file.

              rsyncrypto --name-encrypt=map --trim=0 -r plain enc keys backup.crt

       This will encrypt the "plain" directory structure into enc, exactly as before.  Unlike before, all  files
       will  be  directly  under  the  "enc" directory, and will be named as a meaningless garble. A file called
       "map" will be created under the current directory that contains a map between the  gabled  and  the  real
       name  of the file. In addition, two files, called "enc/filemap" and "keys/filemap", will also be created.
       These are the encrypted and key file corresponding to the "map" file mentioned above. During  decryption,
       if "map" does not exist, it will be created by decrypting "enc/filemap".

       Important  note: When performing file name encryption, it is vitally important to give the correct --trim
       values, both during encryption and during decryption. Failing to do so will cause  rsyncrypto  to  search
       for non-existing file names, and to fail to locate the files to decrypt.

BUGS

       It is not yet possible to decrypt using password protected private key.

       Decrypting from stdin is not yet supported.

SEE ALSO

       rsync(1), gzip(1), openssl(1), x509(1), req(1).

AUTHOR

       rsyncrypto was written by Shachar Shemesh for Lingnu Open Source Consulting ltd.  http://www.lingnu.com

       This manual page was written by Shachar Shemesh <shachar@debian.org>

PROJECT HOMEPAGE

       http://rsyncrypto.lingnu.com

Lingnu Open Source Consulting                   October 22, 2008                                   RSYNCRYPTO(1)