-
Notifications
You must be signed in to change notification settings - Fork 937
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refine ssh config: no need to backup keys #295
Conversation
What's happening with this? I would really se this merged since I don't want to shared my keys with a third-party. |
Yes and I use that to not sync my .ssh folder, but this pull request selectively syncs just the ssh config, not the private keys to a third party. Which is why I'm wondering about the status of this, since I'd like to sync my ssh config, but not my keys. |
You can use this ssh config to overwrite mackup's without a problem, like @vitorgalvao suggested. |
Again, i'd like to sync my ssh config, but mackup syncs my private keys along with it. Which is rather unsettling behavior, since those keys are private and mackup stores them by default in Dropbox unencrypted. Now of course I could run my own fork of mackup, as with all open source software. But I believe that instead of making changes to just my own copy, everyone could benefit from the added security that selectively syncing the ssh config without the keys would entail. Ping @nkcfan to please rebase on current master to make it easily mergeable. |
Merged, so this is now the default =) [application]
name = SSH
[configuration_files]
.ssh |
(will release tonight) |
thanks! |
Thank you @lra |
Now backup will not sync my private keys, but
I have a pull request about this, #976. |
@lra - I am attempting to sync .ssh folder and created the config file like you mentioned above and used 'mackup backup' and received the following error: |
I noticed that the config file is symlinked. I installed mackup using homebrew and I am assuming there is a file path issue.. |
It is safer to prevent any the credential keys shared or backed up. Normally if computer changed, the user should generate new keys instead of reusing existing ones.