It turns out to be rediculously easy. I plan to use it so that the backup machine can log into the server without a password, but not the other way around.
It turns out to be rediculously easy. I plan to use it so that the backup machine can log into the server without a password, but not the other way around.
Isn’t that insecure? If someone got into the backup server somehow, they’d have full access to the webserver.
That’s definitely true. Well now I don’t know what to do. I was planning on minimizing damage from a webserver breach. I suppose it’s better to have the backup connect to the webserver though, seeing as how it’s completely behind a NAT. If someone can break into a machine that’s firewalled and behind a NAT, I don’t really see what I could have done in the first place.EDIT: Not full – if I configure it correctly the backup user should only have read access to the hosted files and no privileges.
FORESIGHT!! WHOO!