Last updated on August 11, 2020 by Dan Nanni
Some of us have our hard drives at home or on a virtual private server encrypted by Linux Unified Key Setup (LUKS) for security reasons, and these drives can quickly grow to tens or hundreds of GBs in size. So while we enjoy the security of our LUKS device, we may start to think about a possible remote backup solution. For secure off-site backup, we will need something that operates at the block-level of the encrypted LUKS device, and not at the un-encrypted file-system-level. So in the end we find ourselves in a situation where we will need to transfer the entire LUKS device (let's say 200GB for example) each time we want to make a backup. Clearly not feasible. How can we deal with this problem?
This is when a brilliant open-source tool called
bdsync (thanks to Rolf Fokkens) comes to our rescue. As the name implies,
bdsync can synchronize "block devices" over network. For fast synchronization,
bdsync generates and compares MD5 checksums of blocks in the local/remote block devices, and sync only the differences. What
rsync can do at the file system level,
bdsync can do it at the block device level. Naturally, it works with encrypted LUKS devices as well. Pretty neat!
bdsync, the first-time backup will copy the entire LUKS block device to a remote host, so it will take a lot of time to finish. However, after that initial backup, if we make some new files on the LUKS device, the second backup will be finished quickly because we will need to copy only that blocks which have been changed. Classic incremental backup at play!
Bdsync is not included in the standard repositories of Linux distributions. Thus you need to build it from the source. Use the following distro-specific instructions to install
bdsync and its man page on your system.
$ sudo apt-get install git gcc libssl-dev $ git clone https://github.com/rolffokkens/bdsync.git $ cd bdsync $ make $ sudo cp bdsync /usr/local/sbin $ sudo mkdir -p /usr/local/man/man1 $ sudo sh -c 'gzip -c bdsync.1 > /usr/local/man/man1/bdsync.1.gz'
$ sudo yum install git gcc openssl-devel $ git clone https://github.com/rolffokkens/bdsync.git $ cd bdsync $ make $ sudo cp bdsync /usr/local/sbin $ sudo mkdir -p /usr/local/man/man1 $ sudo sh -c 'gzip -c bdsync.1 > /usr/local/man/man1/bdsync.1.gz'
I assume that you have already provisioned a LUKS-encrypted block device as a backup source (e.g.,
/dev/LOCDEV). I also assume that you have a remote host where the source device will be backed up (e.g., as
You need to access the root account on both systems, and set up password-less SSH access from the local host to a remote host. Finally, you need to install
bdsync on both hosts.
To initiate a remote backup process on the local host, we execute the following command as the root:
# bdsync "ssh [email protected]_host bdsync --server" /dev/LOCDEV /dev/REMDEV | gzip > /some_local_path/DEV.bdsync.gz
Some explanations are needed here.
bdsync client will open an SSH connection to the remote host as the root, and execute Bdsync client with
--server option. As clarified,
/dev/LOCDEV is our source LUKS block device on the local host, and
/dev/REMDEV is the target block device on the remote host. They could be
/dev/sda (for an entire disk) or
/dev/sda2 (for a single partition). The output of the local
bdsync client is then piped to
gzip, which creates
DEV.bdsync.gz (so-called binary patch file) in the local host.
The first time you run the above command, it will take very long time, depending on your Internet/LAN speed and the size of
/dev/LOCDEV. Remember that you must have two block devices (
/dev/REMDEV) with the same size.
The next step is to copy the generated patch file from the local host to the remote host. Using
scp is one possibility:
# scp /some_local_path/DEV.bdsync.gz [email protected]_host:/remote_path
The final step is to execute the following command on the remote host, which will apply the patch file to
# gzip -d < /remote_path/DEV.bdsync.gz | bdsync --patch=/dev/DSTDEV
I recommend doing some tests with small partitions (without any important data) before deploying Bdsync with real data. After you fully understand how the entire setup works, you can start backing up real data.
In conclusion, we showed how to use
bdsync to perform incremental backups for LUKS devices. Like
rsync, only a fraction of data, not the entire LUKS device, is needed to be pushed to an off-site backup site at each backup, which saves bandwidth and backup time. Unlike Duplicity, which is file-system-level backup,
bdsync performs backup on encrypted disk block devices. Rest assured that all the data transfer by
bdsync is secured by SSH, on top of the fact that the device itself is encrypted by LUKS. It is also possible to improve this setup by using a dedicated user (instead of the root) who can run
bdsync. We can use
bdsync for any block device, such as LVM volumes or RAID disks, and can easily set up
bdsync to back up local disks on to USB drives as well. As you can see, its possibility is limitless!
Feel free to share your thought.
Please note that this article is published by Xmodulo.com under a Creative Commons Attribution-ShareAlike 3.0 Unported License. If you would like to use the whole or any part of this article, you need to cite this web page at Xmodulo.com as the original source.