Bacula is designed with as much security in mind as
I knew/know about.  Perhaps you haven't yet had the time
to read the manual, but aside from not letting a "user" get access
to the Director, you can encrypt all the communications, you can
also run the FD in backup only mode, and restart it in read/write mode
if you want to restore something.  There are many other things
you can do as well.

In most cases, it is easier to get root access to a Linux
system than it is to exploit a properly configured Bacula,
especially if you are running a web server on your machine.
If a user has root access he doesn't need Bacula
to get what he wants.

If you have some specific suggestions for improving
Bacula's security (and I suspect there are many things
to do, some of which I am implementing now), I suggest
you mention them.

Kern

On 09/06/2013 08:18 PM, stefano scotti wrote:
> 2013/9/6, Kern Sibbald <k...@sibbald.com>:
>> Hello,
>>
>> The only security issue is that a "user" should not have access
>> to the Bacula Director.  Only qualified sys admins should have
>> such access.
>>
>> Best regards,
>> Kern
>>
>>
> That's not true.
>
> There are other security issues related to the fact that TCP bacula
> stream could be altered by malicious attackers using one or more of
> the network attacks known today (and they are a lot).
>
> The problem here is that bacula on client machines has more permission
> than it needs, and this vulnerability could be exploited even if the
> attacker is not able to exploit the bacula server system. This is a
> fact.
>
> And even if it wasn't like that, let's suppose (a false thing) that
> the attack could start only by exploting the bacula server machine.
> Can you please tell me why an exploted system has to have freely
> access to the keys which could exploit every system of its network?
> Is it right to considering Bacula the centralized point of security of
> an entire network system? what if it fails?
>
> Accountability and access control are main security matters, and
> currently Bacula isn't implementing them very well on this specific
> question.
>
> We shouldn't justify the current architecture just because it is
> easier to maintain it in the way it is.
> I'm not saying that designing some sort of criteria which limits
> bacula permissions is an easy task, we everybody know that security
> itself is not an easy task.
>
> But i'm sure of a thing, it could be done, and it could be done well
> if somebody focuses in that.
> I'm sure of another thing, it will never be better if everybody will
> keep saying that nothing can be done about it.
>
> I hope bacula's designer will take care of that, because it IS an issue.
>
> Meanwhile your should, at least, worry about your bacula server and
> your network hardening , because you really need it.
>
> I suggest you the use of VPN tunnels.
>
> ------------------------------------------------------------------------------
> Learn the latest--Visual Studio 2012, SharePoint 2013, SQL 2012, more!
> Discover the easy way to master current and previous Microsoft technologies
> and advance your career. Get an incredible 1,500+ hours of step-by-step
> tutorial videos with LearnDevNow. Subscribe today and save!
> http://pubads.g.doubleclick.net/gampad/clk?id=58041391&iu=/4140/ostg.clktrk
> _______________________________________________
> Bacula-devel mailing list
> Bacula-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/bacula-devel
>


------------------------------------------------------------------------------
Learn the latest--Visual Studio 2012, SharePoint 2013, SQL 2012, more!
Discover the easy way to master current and previous Microsoft technologies
and advance your career. Get an incredible 1,500+ hours of step-by-step
tutorial videos with LearnDevNow. Subscribe today and save!
http://pubads.g.doubleclick.net/gampad/clk?id=58041391&iu=/4140/ostg.clktrk
_______________________________________________
Bacula-devel mailing list
Bacula-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-devel

Reply via email to