qvm-backup-restore: verify integrity of backup by comparing with volumes in current system #6386
Labels
C: core
P: default
Priority: default. Default priority for new issues, to be replaced given sufficient information.
The problem you're addressing (if any)
Qubes backups are susceptible from silent data corruption in the process of backing up volumes.
Describe the solution you'd like
Qubes should allow users to verify integrity of backup by comparing with the latest snapshot (revision) of volumes that predates the backup in current system.
Where is the value to a user, and who might that user be?
Users can rely on a more robust backup mechanism.
Describe alternatives you've considered
Actually restore them and verify manually.
This is error-prone and can expose users to exploits from malicious VMs. Also, this is not an option if the user does not have enough disk space.
Additional context
This issue concerns only with data corruption happening during the backup process. If something tampered with the encrypted backup result,
scrypt
would detect it.Relevant documentation you've consulted
Related, non-duplicate issues
The text was updated successfully, but these errors were encountered: