* [pbs-devel] [PATCH docs] encryption: add best practice for storing master key
@ 2020-11-10 11:04 Dylan Whyte
2020-11-10 11:57 ` [pbs-devel] applied: " Dietmar Maurer
0 siblings, 1 reply; 2+ messages in thread
From: Dylan Whyte @ 2020-11-10 11:04 UTC (permalink / raw)
To: pbs-devel
Further clarify that the paperkey should be a last resort
recovery option, after a password manager and usb drive.
Signed-off-by: Dylan Whyte <d.whyte@proxmox.com>
---
docs/backup-client.rst | 15 ++++++++++-----
1 file changed, 10 insertions(+), 5 deletions(-)
diff --git a/docs/backup-client.rst b/docs/backup-client.rst
index 1ef42898..125c1fbc 100644
--- a/docs/backup-client.rst
+++ b/docs/backup-client.rst
@@ -367,11 +367,16 @@ To set up a master key:
and needs to be restored, this will not be possible as the encryption key will be
lost along with the broken system.
-In preparation for the worst case scenario, you should consider keeping a paper
-copy of your master key locked away in a safe place. The ``paperkey`` subcommand
-can be used to create a QR encoded version of your master key. The following
-command sends the output of the ``paperkey`` command to a text file, for easy
-printing.
+It is recommended that you keep your master key safe, but easily accessible, in
+order for quick disaster recovery. For this reason, the best place to store it
+is in your password manager, where it is immediately recoverable. As a backup to
+this, you should also save the key to a USB drive and store that in a secure
+place. This way, it is detached from any system, but is still easy to recover
+from, in case of emergency. Finally, in preparation for the worst case scenario,
+you should also consider keeping a paper copy of your master key locked away in
+a safe place. The ``paperkey`` subcommand can be used to create a QR encoded
+version of your master key. The following command sends the output of the
+``paperkey`` command to a text file, for easy printing.
.. code-block:: console
--
2.20.1
^ permalink raw reply [flat|nested] 2+ messages in thread
* [pbs-devel] applied: [PATCH docs] encryption: add best practice for storing master key
2020-11-10 11:04 [pbs-devel] [PATCH docs] encryption: add best practice for storing master key Dylan Whyte
@ 2020-11-10 11:57 ` Dietmar Maurer
0 siblings, 0 replies; 2+ messages in thread
From: Dietmar Maurer @ 2020-11-10 11:57 UTC (permalink / raw)
To: Proxmox Backup Server development discussion, Dylan Whyte
applied, thanks.
But I wonder if it would be better to create an extra subsection
about "Storing Encryption Keys", because it basically applied to both
- normal encryption keys
- and the master key
> On 11/10/2020 12:04 PM Dylan Whyte <d.whyte@proxmox.com> wrote:
>
>
> Further clarify that the paperkey should be a last resort
> recovery option, after a password manager and usb drive.
>
> Signed-off-by: Dylan Whyte <d.whyte@proxmox.com>
> ---
> docs/backup-client.rst | 15 ++++++++++-----
> 1 file changed, 10 insertions(+), 5 deletions(-)
>
> diff --git a/docs/backup-client.rst b/docs/backup-client.rst
> index 1ef42898..125c1fbc 100644
> --- a/docs/backup-client.rst
> +++ b/docs/backup-client.rst
> @@ -367,11 +367,16 @@ To set up a master key:
> and needs to be restored, this will not be possible as the encryption key will be
> lost along with the broken system.
>
> -In preparation for the worst case scenario, you should consider keeping a paper
> -copy of your master key locked away in a safe place. The ``paperkey`` subcommand
> -can be used to create a QR encoded version of your master key. The following
> -command sends the output of the ``paperkey`` command to a text file, for easy
> -printing.
> +It is recommended that you keep your master key safe, but easily accessible, in
> +order for quick disaster recovery. For this reason, the best place to store it
> +is in your password manager, where it is immediately recoverable. As a backup to
> +this, you should also save the key to a USB drive and store that in a secure
> +place. This way, it is detached from any system, but is still easy to recover
> +from, in case of emergency. Finally, in preparation for the worst case scenario,
> +you should also consider keeping a paper copy of your master key locked away in
> +a safe place. The ``paperkey`` subcommand can be used to create a QR encoded
> +version of your master key. The following command sends the output of the
> +``paperkey`` command to a text file, for easy printing.
>
> .. code-block:: console
>
> --
> 2.20.1
>
>
>
> _______________________________________________
> pbs-devel mailing list
> pbs-devel@lists.proxmox.com
> https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2020-11-10 11:57 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-11-10 11:04 [pbs-devel] [PATCH docs] encryption: add best practice for storing master key Dylan Whyte
2020-11-10 11:57 ` [pbs-devel] applied: " Dietmar Maurer
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox