
 	Please note: the following is _no longer_ an issue as of
rsync-backup v0.2.5.  This question and


1.	I know ssh very well and it is obvious to me not to use the root 
password for this task. But I can not follow you how it could happen
to wipe out the servers root partition when doing so. What's the
matter?

A.	When using ssh rsa or dsa keys I can force which command gets
run for a given key.  I always force the command to 
"/usr/sbin/rsync-backup-server", so the server side rsync always runs 
chrooted under /backups/the_ip_address_of_the_client/ .

	If someone started up the backup process using a password, the    
server end would no longer be forced to run
/usr/sbin/rsync-backup-server, but would instead run the server side
rsync binary instead.  The client would be syncing up it's files with
the root partition on the server side.  The server side root partition
would be replaced with the clients root partition.  :-(

	As of rsync-backup v0.2.5, the client forces the path to the
rsync binary; the path is forced to /usr/sbin/rsync-backup-server . 
Sneaky, but it works well.  Now, if someone runs the client without
using ssh keys, the root partition of the backup server is no longer in
danger.  The only quirk is that there is no longer a way to specify a
backup name, meaning that all backups will again be placed under their
source IP address (only an issue if you're using named backups).

