Hello Egoitz,

Is this thread clear? If you have your own dedicated CA, then take care of
her :). This way and having level 4 bacula TLS configured as Josh
explained, then your communication will be "secure" (never say that we are
100% secure...).

Thank you very much Josh.

Best regards,
Ana



On Wed, Sep 30, 2015 at 11:22 AM, Josh Fisher <jfis...@pvct.com> wrote:

>
>
> On 9/30/2015 3:18 AM, Egoitz Aurrekoetxea wrote:
>
> Hi Ana!!
>
> Really thanks for answering my doubts :)
>
> I do answer in black below...
>
> El 30/9/2015, a las 6:24, Ana Emília M. Arruda <emiliaarr...@gmail.com>
> escribió:
>
>
> On Mon, Sep 28, 2015 at 6:20 PM, Egoitz Aurrekoetxea <
> <ego...@ramattack.net>ego...@ramattack.net> wrote:
>
>> Good night,
>>
>
>
> ​Yes, you can have certificates from different CA in each side, you just
> need to inform the CA correctly for peer verification. How did you
> generated your certificates? Do you have a CA and signed them properly?
>
>
> I have an own dedicated CA for Bacula systems. One of the things I was
> trying to get with TLS is the fact that like both sides know the CA public
> key, they to be able to check if the information received in each side
> because of the other side’s sent data in unaltered due to a possible MITM
> issue. I mean, could I with verify peer ensure that if someone tries to do
> a MITM won’t succeed because both sides know the CA allowed to
> be used in signed certs?. So an attacker doing a signed certificate with a
> new CA (CA of the attacker for signing the attacking used certificate)
> won’t be able then to inject content in dir and fd dialogue or fd and sd
> dialogue?.
> Or at least if it does, do each side, the sd, fd or the dir, interrupt the
> connection and stop the job notifying?.
>
>
> Think of it as 5 different security levels.
>
> Level 0:
>    # Data is transmitted as plain text
>     TLS Enable = no
>
> Level 1:
>     # This level allows opportunistic encryption if the peer chooses, or
> the peer can communicate in plain text.
>     TLS Enable = yes
>     TLS Require = no
>     TLS Verify Peer = no
>     TLS Certificate = /etc/bacula/cert.pem
>     TLS Key = /etc/bacula/key.pem
>     TLS CA Certificate File = /path/to/system/cafile
>
> Level 2:
>     # This level requires encryption of data. Any certificate will do,
> even a self-signed certificate.
>     TLS Enable = yes
>     TLS Require = yes
>     TLS Verify Peer = no
>     TLS Certificate = /etc/bacula/cert.pem
>     TLS Key = /etc/bacula/key.pem
>     TLS CA Certificate File = /path/to/system/cafile
>
> Level 3:
>     # This level requires encryption and that the certificate presented by
> the peer be signed by a trusted CA
>     TLS Enable = yes
>     TLS Require = yes
>     TLS Verify Peer = yes
>     TLS Certificate = /etc/bacula/cert.pem
>     TLS Key = /etc/bacula/key.pem
>     TLS CA Certificate File = /path/to/system/cafile
>
> Level 4:
>     # This level requires encryption and that the certificate presented by
> the peer be signed by a trusted CA
>     # and that the certificate have a specific CN
>     TLS Enable = yes
>     TLS Require = yes
>     TLS Verify Peer = yes
>     TLS Allowed CN = "some.client.common.name"
>     TLS Certificate = /etc/bacula/cert.pem
>     TLS Key = /etc/bacula/key.pem
>     TLS CA Certificate File = /path/to/system/cafile
>
>
> As for a MiTM attack, keep in mind that an active attack is harder than a
> passive attack. Even opportunistic encryption with self-signed certs
> protects against passive snooping. Protecting against an active MiTM attack
> requires authentication. Heartbleed bug aside, level 3 means that the
> attacker must somehow acquire certificates signed by a CA in the TLS CA
> Certificate Files of both client and server. Level 4 means that she must
> steal particular certificates. So level 4 makes a MiTM attack very
> difficult.
>
> That said, the real danger is a valid certificate that is stolen or
> compromised. The CA can revoke a certificate, but this does no good
> because, as far as I can tell, Bacula does not check CRLs! Level 3 is not
> very useful without CRL checks. Therefore, always use level 4, at least
> until Bacula supports CRL checks, since then a  can be avoided by removing
> its CN from the TLS Allowed CN list. If you are not wrorried about MiTM
> attacks and just want to prevent snooping, then level 2 will suffice.
>
>
>
>
>
> ------------------------------------------------------------------------------
>
> _______________________________________________
> Bacula-users mailing list
> Bacula-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/bacula-users
>
>
------------------------------------------------------------------------------
_______________________________________________
Bacula-users mailing list
Bacula-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-users

Reply via email to