Working through a backup solution and could use some security assistance. Please see below.
The process
For our editing business, we have an offsite backup server that we update nightly using rsync over SSH. The backup script:
- Wakes the remote machine
- Mounts the encrypted volumes
- Analyzes the files on the local RAID array compared to the individual LUKS encrypted disks on the backup machine
- Splits them up to fit on those backup drives with as little data transfer as possible
- Rsync's
- Dismounts the encrypted volumes
- Conducts SMART tests to round things out
- Puts the remote machine to sleep
The problem
As the process stands now, all data transfer is encrypted, and the drives themselves are encrypted (other than the system itself) with the password for LUKS sent in via the remote server. This is mostly secure, but theoretically a malicious staff member at the remote site could break into the system and monitor the traffic by something like:
- Booting into single user mode
- Change root password
- Boot normally
- Log in as root
- Change password file back, and hide traces
- Monitor all going-ons, file names, access file systems when the script remotes in and mounts the drives
Is there a way to overcome this, or detect these types of on-site attacks, without rewriting everything to encrypt before sending to the remote server (which would make our process much more disk and/or bandwidth intensive, we're talking many TBs of data).
Thanks.