Home server backups

1 minute read (251 words)

The setup

  • Ubuntu server domU xen host
    • Ubuntu server xen VM with LUKS full disk encryption
      • docker-compose
        • syncthing with built-in “Staggered File Versioning”

Plan

  • Plug in usb external hdd, with full disk encryption (i.e. a LUKS partition taking up almost all the space, plus a little fat32 with a text file in case anyone finds it and wants to return it).
  • Use LUKS key chaining to be able to unlock the disk without entering a password
  • Use autofs to automatically mount/unmount so that it’s safe to unplug when a backup isn’t running.
  • Use rsync to push all the files from the syncthing data directory onto the usb disk.

Somehow need to make the disk accessible to the VM.

Finding the luks partition when plugged into the host:

tim@spot:~$ sudo fdisk -l
...
Disk /dev/sdc: 931.5 GiB, 1000170586112 bytes, 1953458176 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: dos
Disk identifier: 0x6380ad37

Device Boot Start End Sectors Size Id Type
/dev/sdc1 63 21579 21517 10.5M c W95 FAT32 (LBA)
**/dev/sdc2 21580 1953147527 1953125948 931.3G 83 Linux**

tim@spot:~$ ll /dev/disk/by-uuid/
...
lrwxrwxrwx 1 root root 10 Aug 29 21:51 **6ca09b72-8c9b-4571-8943-9f1d520671ab -> ../../sdc2**

Confirm it’s the luks partition:

tim@spot:~$ sudo cryptsetup luksDump /dev/disk/by-uuid/6ca09b72-8c9b-4571-8943-9f1d520671ab
LUKS header information for /dev/disk/by-uuid/6ca09b72-8c9b-4571-8943-9f1d520671abVersion: 1
Cipher name: aes
Cipher mode: xts-plain64
Hash spec: sha1
...

I’ll update this post with any details as I progress. Don’t hold your breath though!


Tweet This || Post to LinkedIn || Page Source

Subscribe for updates on software development, contracting, side projects, blog posts and who knows what else. Read the archives for an idea of content.

Mailing list powered by the excellent buttondown.email.