chiark / gitweb /
initial checkin; mostly complete
[distorted-backup] / rfreezefs.8
CommitLineData
99248ed2
MW
1.TH rfreezefs 8 "October 2011" "distorted.org.uk backup"
2.SH NAME
3rfreezefs \- freeze a filesystem safely
4.SH SYNOPSIS
5.B rfreezefs
6.RB [ \-n ]
7.RB [ \-a
8.IR address ]
9.RB [ \-p
10.IR loport [\fB\- hiport ]]
11.I filesystem
12\&...
13.SH DESCRIPTION
14The
15.B rfreezefs
16program freezes one or more mounted filesystems for a period of time,
17and then thaws them. For more detail on what this means, why you'd want
18to, and how you might go about using
19.B rfreezefs
20to do it, see below.
21.PP
22The following command-line options are recognized.
23.TP
24.B "\-h, \-\-help"
25Writes a help message to standard output, and exits with status 0.
26.TP
27.B "\-v, \-\-version"
28Writes the version number to standard output, and exits with status 0.
29.TP
30.B "\-u, \-\-usage"
31Writes a command-line usage synopsis to standard output, and exits with
32status 0.
33.TP
34.BI "\-a, \-\-address=" address
35Listen only for incoming connections to the given
36.IR address .
37The default is to listen for connections to any local address.
38.TP
39.B "\-n, \-\-not-really"
40Don't actually freeze or thaw any filesystems; instead, write messages
41to standard error explaining what would be done.
42.TP
43.BI "\-p, \-\-port-range=" loport\fR[ \- hiport \fR]]
44Listen for incoming connections on a port between
45.I loport
46and
47.IR hiport .
48If
49.I hiport
50is omitted, listen for connections only on
51.IR loport .
52The default is to allow the kernel a free choice of local port number.
53.PP
54The
55.I filesystem
56arguments name the filesystems to be frozen. There must be at least one
57such argument. It's conventional to name the filesystem mount points,
58though actually any file or directory in the filesystem will do. The
59files are opened read-only.
60.PP
61The
62.B rfreezefs
63program starts, parses its command line, opens the named files, and
64creates a listening TCP socket according to the command-line options.
65It then prints a sequence of lines to standard output, which may have
66one of the following forms.
67.TP
68.BI "PORT " port
69Announces the TCP
70.I port
71number on which that
72.B rfreezefs
73is listening for incoming connections.
74.TP
75.BI "TOKEN " label " " token
76Declares a `token': a randomly chosen string which is to be used in the
77network connection. The token's value is
78.IR token :
79token values are a sequence of non-whitespace printable ASCII
80characters, but their precise structure is not specified. The token
81value will have the meaning given by the
82.IR label ,
83which is one of the token labels described below.
84.TP
85.B READY
86Marks the end of the lines and announces that
87.B rfreezefs
88is ready to accept connections.
89.PP
90These lines may be sent in any order, except that
91.B READY
92is always last. There may be many
93.B TOKEN
94lines.
95.PP
96Network communications use a simple plain-text line-oriented protocol.
97Each line consists of a token, optionally followed by a carriage return
98(code 13), followed by a linefeed (code 10). No other whitespace is
99permitted. The tokens allowed are precisely those announced in the
100.B TOKEN
101lines written to
102.BR rfreezefs 's
103standard output. Furthermore, only certain tokens are valid at
104particular points in the protocol. For reference, the token labels, and
105the meanings of the corresponding tokens, are as follows.
106.TP
107.B FREEZE
108Sent by a client to freeze the filesystems. This must be the first
109token transmitted by the client. On receipt,
110.B rfreezefs
111will close its listening socket and any other client connections. It
112will then freeze the filesystems.
113.TP
114.B FROZEN
115Sent by
116.B rfreezefs
117to indicate successful freezing of the filesystem.
118.TP
119.B KEEPALIVE
120Sent periodically by the client to prevent filesystems being thawed due
121to a timeout. No explicit acknowledgement is sent.
122.TP
123.B THAW
124Sent by the client to request thawing of the filesystems.
125.TP
126.B THAWED
127Sent by
128.B rfreezefs to indicate successful thawing of the filesystems in response to
129.BR THAW .
130.PP
131The high-level structure of the protocol is then as follows: the client
132sends
133.BR FREEZE ;
134the server freezes and responds with
135.BR FROZEN ;
136the client optionally sends
137.B KEEPALIVE
138at intervals; the client finally sends
139.BR THAW ;
140and the server responds with
141.B THAWED
142and drops the connection.
143.PP
144If sufficient time passes without
145.B rfreezefs
146receiving either
147.B THAW
148or
149.B KEEPALIVE
150tokens, or an invalid token is received, or it receives one of a number
151of signals, currently
152.BR SIGINT ,
153.BR SIGQUIT ,
154.BR SIGTERM ,
155.BR SIGHUP ,
156.BR SIGALRM ,
157.BR SIGILL ,
158.BR SIGSEGV ,
159.BR SIGBUS ,
160.BR SIGFPE ,
161or
162.BR SIGABRT ,
163.B rfreezefs
164will thaw the filesystems and report a failure.
165.PP
166Diagnostics are reported to standard error. Exit statuses have specific
167meanings:
168.TP
169.B 0
170Successful completion. Filesystems were frozen and thawed as required.
171.TP
172.B 1
173Problem with command-line arguments. No filesystems were frozen.
174.TP
175.B 2
176Environmental problem, typically a system call failure: e.g., a file
177failed to open, or there was a problem with the network communications.
178Either no filesystems were frozen, or all filesystems were successfully
179thawed again.
180.TP
181.B 3
182Timeout or invalid data. Either no connections containing the cookie
183were made in time, or no data was received for a long enough period
184after the filesystems were frozen, or an invalid token was received. In
185the first case, no filesystems were frozen; in the other two cases, the
186filesystems were successfully thawed.
187.TP
188.B 4
189Crash. The
190.B rfreezefs
191program received a fatal signal after it had started to freeze
192filesystems. Under these circumstances, it thaws the filesystems,
193removes the signal handler, and sends itself the signal again, but if
194that doesn't work then
195.B rfreezefs
196exits with this status code. All frozen filesystems were successfully
197thawed again.
198.TP
199.B 112
200Failure during filesystem thaw (mnemonic: European emergency number).
201Some filesystems
202.I failed
203to thaw, and are still frozen. You might have some joy with
204.BR SysRq-j ,
205though in the author's experience that doesn't work and you'll probably
206have to reboot. At least your filesystems are consistent...
207.SS Background
208When frozen, a filesystem's backing block device is put in a consistent
209state (as if unmounted), and write operations to it are delayed until
210the filesystem is thawed again. In the meantime, it's possible to take
211a consistent snapshot of the block device. When a filesystem is
212directly mounted on an LVM logical volume, the kernel detects this
213situation and automatically freezes the filesystem while the snapshot is
214being prepared. If the logical volume and filesystem are on separate
215hosts, though, the filesystem must be frozen manually, which is why
216.B rfreezefs
217is useful.
218.PP
219The idea is to run
220.B rfreezefs
221using
222.BR ssh (1)
223or
224.BR userv (1),
225or some other means of acquiring the necessary privilege level. You
226read the port number and tokens, connect to the socket, and send the
227.B FREEZE
228token followed by a newline. You now wait to receive the
229.B FROZEN
230token from
231.BR rfreezefs .
232Once you have received this, the filesystems are frozen: you can safely
233take snapshots. If this will take an extended amount of time, you
234should send
235.B KEEPALIVE
236tokens to the connection at intervals in order to prevent
237.B rfreezefs
238from timing out and thawing the filesystems (but see the
239.B "Security notes"
240below). When your snapshot is prepared, sent the
241.B THAW
242token, and wait for the
243.B THAWED
244token in response. If this is received, the snapshot was completed
245successfully and the filesystems are properly thawed again. If you
246don't receive the
247.B THAWED
248token then something bad might have happened (e.g., the filesystem might
249have been prematurely thawed) and the snapshot is suspect. If the exit
250status is 112 then at least one filesystem is still frozen and some
251emergency action is needed. If you can't retrieve the exit status then
252it's possible that your transport is blocked for trying to write to the
253frozen filesystem (this especially likely if
254.B /
255or
256.B /var
257is frozen) and you should react as if the status was 112.
258.SS Security notes
259The
260.B rfreezefs
261program uses randomly chosen tokens to form a simple code which is
262revealed to the caller. It is assumed that this information is kept
263secret from adversaries, e.g., by ensuring that it is only transmitted
264over local pipes (as used by
265.BR userv (1))
266and/or secure network transports such as SSH (see
267.BR ssh (1)).
268The author believes that the worst possible outcome is that the host
269wedges up because an important filesystem is frozen, and
270.B rfreezefs
271therefore strives to prevent that from happening. In particular,
272cryptographic transport implementations such as SSH may attempt to log
273messages to frozen filesystems or otherwise wedge themselves:
274.B rfreezefs
275deliberately uses only kernel-implemented transports for its
276communication needs once the filesystems are frozen.
277.PP
278Most of the tokens are used at most once in the protocol. In
279particular, the
280.B FROZEN
281token can't be sent by an adversary in advance of the filesystem being
282frozen, since (under the assumption that the tokens are kept secret) it
283only revealed in the clear after a successful freeze. Similarly, the
284.B THAWED
285token is only transmitted if the filesystems are thawed as a result of a
286.B THAW
287request (rather than a dropped connection, timeout, or some other
288problem). If the client only sends the
289.B THAW
290request once its snapshot is complete, then a
291.B THAWED
292response indicates that the filesystems remained frozen until the
293snapshot was indeed completed and therefore the snapshot is consistent.
294.PP
295The exception is the
296.B KEEPALIVE
297token, which may be sent repeatedly. After it is first revealed, an
298adversary can hijack the connection and replay the
299.B KEEPALIVE
300token to keep the filesystems frozen indefinitely. You can recover from
301this by severing the connection somehow, or by sending
302.B rfreezefs
303a signal. It is therefore recommended that
304.B KEEPALIVE
305tokens not be sent unless necessary. The timeout is currently set to
30660s, which ought to be adequate for most snapshot mechanisms.
307.SH BUGS
308There ought to be a better one-time-token protocol for keepalives. I
309want to keep cryptography out of this program, though.
310.SH SEE ALSO
311.BR fsfreeze (8),
312.BR random (4),
313.BR lvm (8),
314.BR ssh (1),
315.BR userv (1).
316.SH AUTHOR
317Mark Wooding, <mdw@distorted.org.uk>