coliny

Members
  • Posts

    10
  • Joined

  • Last visited

Converted

  • Gender
    Undisclosed

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

coliny's Achievements

Noob

Noob (1/14)

0

Reputation

  1. Ah OK, so the docker config is stored on flash - and yes, a grep in /boot shows my password in all its plain text glory :-). The obvious question then is, will 6.4 support the flash drive itself being encrypted?
  2. For clarity, will this protect passwords specified in the _configuration_ of a docker. So, for example, the seafile docker requires the administrator's password as a parameter to the docker, so it is entered in plaintext in the docker configuration screen? I understand (assume) I will be able to mount a volume on a share backed by an encrypted drive. I can't figure out where the a docker's configuration is stored. If it is on the usb key itself then I guess it won't be protected. Same question for things like the Community Application plugins (specifically the rclone one).
  3. Okeydokes - I appreciate the sentiment (software engineer myself) :-).
  4. Thanks for the reply. I guess I will hold off running to vanilla debian or openmediavault then :-). Any ETA on the rc?
  5. Hi all, I can see from searching that a number of times the question of securing either shares or the pool itself has come up, but I can't find any definitive answers on whether it is possible or how to achieve it. This is all about reducing the risk if a thief walks off with the disks. At the moment, should somebody walk off with my disks they have access to: - some private ssh keys - rclone config containing the keys for my encrypted offsite cloud backup - plex usernames (and passwords?) - backups of the various people that use my server as a target - and so on. I could solve each of those individually, by using VMs that encrypt the boot disk for example, but that means losing the [fantastic] benefit of the rclone plugins and dockers. At which point unRAID simply becomes a storage pool and disk health notifier (although it has my gmail one-time password in it!). I don't actually have any shares other than those used by the docker and VMs. My server is in the house so entering the crypt key on boot up is perfect for my needs. How do you all handle this?
  6. Hi, following your excellent tutorial at https://cyanlabs.net/tutorials/the-complete-unraid-reverse-proxy-duck-dns-dynamic-dns-and-letsencrypt-guide/ I now have Seafile installed. How do I go about backing up the database/data directories? Thanks!
  7. Thanks Kenji - that's much more elegant - thanks.
  8. Actually, it is a little more complicated because ssh really doesn't work well unless the keys are user read/write only. Unfortunately, extFat or Fat32 (I forget which) doesn't allow you to change them, so some hoops need to be jumped through. (self promotion) I hastily blogged about it at https://colinyates.co.uk/posts-output/2016-12-08-unraid-and-ssh-keys/. Upgrades and clarifications welcome.
  9. Thanks @itimpi. Anecdotally they seem to persist, but good to know it is by design. Thanks again.
  10. Hi, I searched, but couldn't find an answer to these questions: - are unRAID's SSH keys persisted across reboots and unRAID upgrades? - is unRAID's authorised_hosts persisted across reboots and unRAID upgrades? Essentially I use unRAID to rsync out to clients so I add unRAID's public key to the client's authorized-hosts. Likewise, I SSH into unRAID a far bit and copy my public key to unRAID's authorized-users and I want to ensure this will persist across reboots and upgrades. Any suggestions? Thanks!