mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-09-19 20:44:47 -04:00
preparation rst conversion
This commit is contained in:
parent
bdda0ae8dc
commit
d7d03089f8
6 changed files with 27 additions and 27 deletions
|
@ -66,7 +66,7 @@ any GNU/Linux system with the following procedure.
|
|||
supported message digest algorithms can be found with `openssl
|
||||
list-message-digest-algorithms`.
|
||||
|
||||
5. Read the `backup-header`. You'll need some of this information later. The
|
||||
4. Read the `backup-header`. You'll need some of this information later. The
|
||||
file will look similar to this:
|
||||
|
||||
[user@restore ~]$ cat backup-header
|
||||
|
@ -80,7 +80,7 @@ any GNU/Linux system with the following procedure.
|
|||
**Note:** If you see `version=2` here, go to [Emergency Backup Recovery -
|
||||
format version 2](/doc/backup-emergency-restore-v2/) instead.
|
||||
|
||||
6. Verify the integrity of the `private.img` file which houses your data.
|
||||
5. Verify the integrity of the `private.img` file which houses your data.
|
||||
|
||||
[user@restore ~]$ cd vm1/
|
||||
[user@restore vm1]$ openssl dgst -sha512 -hmac "$backup_pass" private.img.000
|
||||
|
@ -100,7 +100,7 @@ any GNU/Linux system with the following procedure.
|
|||
complete list of supported message digest algorithms can be found with
|
||||
`openssl list-message-digest-algorithms`.
|
||||
|
||||
7. Decrypt the `private.img` file.
|
||||
6. Decrypt the `private.img` file.
|
||||
|
||||
[user@restore vm1]$ find -name 'private.img.*[0-9]' | sort -V | xargs cat | openssl enc -d -md MD5 -pass pass:"$backup_pass" -aes-256-cbc -out private.img.dec
|
||||
|
||||
|
@ -110,7 +110,7 @@ any GNU/Linux system with the following procedure.
|
|||
complete list of supported cipher algorithms can be found with `openssl
|
||||
list-cipher-algorithms`.
|
||||
|
||||
8. Decompress the decrypted `private.img` file.
|
||||
7. Decompress the decrypted `private.img` file.
|
||||
|
||||
[user@restore vm1]$ zforce private.img.dec
|
||||
private.img.dec -- replaced with private.img.dec.gz
|
||||
|
@ -124,19 +124,19 @@ any GNU/Linux system with the following procedure.
|
|||
[user@restore vm1]$ mv private.img.dec private.img.dec.bz2
|
||||
[user@restore vm1]$ bunzip2 private.img.dec.bz2
|
||||
|
||||
9. Untar the decrypted and decompressed `private.img` file.
|
||||
8. Untar the decrypted and decompressed `private.img` file.
|
||||
|
||||
[user@restore vm1]$ tar -xvf private.img.dec
|
||||
vm1/private.img
|
||||
|
||||
10. Mount the private.img file and access your data.
|
||||
9. Mount the private.img file and access your data.
|
||||
|
||||
[user@restore vm1]$ sudo mkdir /mnt/img
|
||||
[user@restore vm1]$ sudo mount -o loop vm1/private.img /mnt/img/
|
||||
[user@restore vm1]$ cat /mnt/img/home/user/your_data.txt
|
||||
This data has been successfully recovered!
|
||||
|
||||
11. Success! If you wish to recover data from more than one VM in your backup,
|
||||
10. Success! If you wish to recover data from more than one VM in your backup,
|
||||
simply repeat steps 5--9 for each additional VM.
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue