Sorry for the late arrival. An opendarwin.org e-mail hiccup ate my subscription.

Kern Sibbald wrote:

Well, I care, and I don't trust DNS at all. From what I read here, IMO the current implementation is nothing like I imagined -- it is not the state of the art in security. With ssh, I generate a public/ private key pair and I am sure that no one that does not have the private key can enter. This is the *minimum* that I expected for the TLS implementation.

I hope this is just a misunderstanding on my part.

The TLS implementation does not, under any circumstances, rely on the security of DNS. It is implemented using standard internet best practices: - The remote host must present a certificate that is signed by a **trusted** certificate authority - The certificate must match the hostname we requested. (eg, Address = fqdn.example.org)
        - The certificate must not have expired.
- The certificate must contain the correct role (ie, server, or client).

This is the standard x509 model, used to secure all SSL sites -- including my bank. I was very careful to adhere to best practices while implementing the TLS support -- we use it to backup highly sensitive billing data.

Jorj Bauer wrote:

All that TLS/SSL does is verify that the certificate is signed properly.
Bacula is then validating the contents of the certificate based on CN.

So if you use your own custom CA, then only certificates which you
signed will be verified. But if you use a public CA, and have the
certificate cut by another authority, then you have to trust that no
public authority (which is listed in your CA directory or CA bundle) has
issued a certificate with the same embedded CN information.

If you do not trust the CAs listed in your CA bundle to correctly issue certificates, then you can't trust "www.hsbc.com" to be HSBC Bank, either.

I don't understand your failure case -- the *entire purpose* of a CA is to sign certificates by validating the requesting party. If a CA issues a duplicate certificate for a given CN to an unverified, untrusted party, then that CA has failed in their primary task. That is to say, your failure case is analogous to providing the private key to an attacker -- of course security fails.

-landonf

Attachment: PGP.sig
Description: This is a digitally signed message part

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys-and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Bacula-users mailing list
Bacula-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-users

Reply via email to