файл конфигурации для rsync в режиме демона (configuration file for rsync in daemon mode)
AUTHENTICATION STRENGTH
The authentication protocol used in rsync is a 128 bit MD4 based
challenge response system. This is fairly weak protection, though
(with at least one brute-force hash-finding algorithm publicly
available), so if you want really top-quality security, then I
recommend that you run rsync over ssh. (Yes, a future version of
rsync will switch over to a stronger hashing method.)
Also note that the rsync daemon protocol does not currently
provide any encryption of the data that is transferred over the
connection. Only authentication is provided. Use ssh as the
transport if you want encryption.
You can also make use of SSL/TLS encryption if you put rsync
behind an SSL proxy.