[slightly re-arranged segments below]

On Sat, Sep 25 2021 at 09:03:37 PM, Default User <hunguponcont...@gmail.com> 
wrote:
>
> In Vorta, under the "Sources" tab, there is an area (window) for input
> into which you can type or paste text, such as:
>
> **/.cache
>
> to denote exclusions, that is, things you do not want to back up.
> This is from /home/debian_user/.config/backintime/config:
>
> . . .
> profile1.snapshots.exclude.1.value=.gvfs
> profile1.snapshots.exclude.2.value=.cache/*
> profile1.snapshots.exclude.3.value=.thumbnails*
> profile1.snapshots.exclude.4.value=.local/share/[Tt]rash*
> profile1.snapshots.exclude.5.value=*.backup*
> profile1.snapshots.exclude.6.value=*~
> profile1.snapshots.exclude.7.value=.dropbox*
> profile1.snapshots.exclude.8.value=/proc/*
> profile1.snapshots.exclude.9.value=/sys/*
> profile1.snapshots.exclude.10.value=/dev/*
> profile1.snapshots.exclude.11.value=/run/*
> profile1.snapshots.exclude.12.value=/etc/mtab
> profile1.snapshots.exclude.13.value=/var/cache/apt/archives/*.deb
> profile1.snapshots.exclude.14.value=lost+found/*
> profile1.snapshots.exclude.15.value=/tmp/*
> profile1.snapshots.exclude.16.value=/var/tmp/*
> profile1.snapshots.exclude.17.value=/var/backups/*
> profile1.snapshots.exclude.18.value=.Private
> . . .
>
> Of course that is expressed in backintime's own configuration
> "language", and would probably need to be translated into borgbackup's
> equivalent "language".
> ...
> And that isn't even (afaik) Fnmatch!
> (BTW, I have read what you referenced as ' Run "borg help patterns" '.
> I'm afraid it wasn't very helpful to me.)

I mean you should run the command "borg help patterns" (without quotes)
from a terminal.  That produces detailed explanation of what kinds of
patterns borg supports, including examples.  The same content is also
available in the borg-patterns manpage.

It also mentions the --dry-run option that you can use to try your
patterns out.  fnmatch is similar to shell pattern matching, like the
backintime configuration fragment you've shown above.  You can take
those as-is if you want all of those to apply.  The patterns above that
start with / will not apply to your scenario, where you're backing up
/home/debian-user.

>> [https://defuse.ca/audits/encfs.htm] talks about issues with encfs
>> design.  There is nothing backintime can do to fix those.
>>
>> borg can encrypt its backup images, and it recommendeds enabling that.
>> So an adversary would not get access to the encfs ciphertext directly.
>> They could get access to borg ciphertext instead, which may or may not
>> be vulnerable to the same problems.  AFAIK there hasn't been a security
>> audit of borgbackup itself.  The page at
>> https://borgbackup.readthedocs.io/en/stable/internals/security.html#borgcrypto
>> describes the design of borg security.
>>
>
> I shall take for granted that backintime developers do not code encfs.
> Fine.  But after 7 years (at least), why haven't they replaced encfs
> with a "safer" encryption scheme, or at least just removed it and
> simply not replaced it at all?  IMHO, either option would seem far
> better than the status quo.

I had misunderstood the scenario.  I'd read it as you using backintime
to backup encfs-encrypted content, not realizing that backintime uses
encfs to provide encrypted backups.

-- 
regards,
kushal

Reply via email to