Good morning mates,

Apologies for my very very late response….

Just one question for confirming, in Josh’s third point, when sais : 

> Level 3:
>     # This level requires encryption and that the certificate presented by 
> the peer be signed by a trusted CA

It means a CA in CA certificate file OR a public key CA in the “TLS CA 
Certificate Dir”, isn’t it?.


> El 1/10/2015, a las 16:09, Ana Emília M. Arruda <emiliaarr...@gmail.com> 
> escribió:
> 
> Hello Egoitz,
> 
> Is this thread clear? If you have your own dedicated CA, then take care of 
> her :). This way and having level 4 bacula TLS configured as Josh explained, 
> then your communication will be "secure" (never say that we are 100% 
> secure...).
> 


Thank you so much :) :) to all of you mates, you have helped me tons of it :) 
:) :) really :) :)


> Thank you very much Josh.
> 
> Best regards,
> Ana
> 
> 
> 
> On Wed, Sep 30, 2015 at 11:22 AM, Josh Fisher <jfis...@pvct.com 
> <mailto:jfis...@pvct.com>> wrote:
> 
> 
> On 9/30/2015 3:18 AM, Egoitz Aurrekoetxea wrote:
>> Hi Ana!!
>> 
>> Really thanks for answering my doubts :)
>> 
>> I do answer in black below...
>> 
>>> El 30/9/2015, a las 6:24, Ana Emília M. Arruda <emiliaarr...@gmail.com 
>>> <mailto:emiliaarr...@gmail.com>> escribió:
>>> 
>>> 
>>> On Mon, Sep 28, 2015 at 6:20 PM, Egoitz Aurrekoetxea < 
>>> <mailto:ego...@ramattack.net>ego...@ramattack.net 
>>> <mailto:ego...@ramattack.net>> wrote:
>>> Good night,
>>> 
>>> 
>>> ​Yes, you can have certificates from different CA in each side, you just 
>>> need to inform the CA correctly for peer verification. How did you 
>>> generated your certificates? Do you have a CA and signed them properly?
>> 
>> I have an own dedicated CA for Bacula systems. One of the things I was 
>> trying to get with TLS is the fact that like both sides know the CA public 
>> key, they to be able to check if the information received in each side 
>> because of the other side’s sent data in unaltered due to a possible MITM 
>> issue. I mean, could I with verify peer ensure that if someone tries to do a 
>> MITM won’t succeed because both sides know the CA allowed to 
>> be used in signed certs?. So an attacker doing a signed certificate with a 
>> new CA (CA of the attacker for signing the attacking used certificate) won’t 
>> be able then to inject content in dir and fd dialogue or fd and sd dialogue?.
>> Or at least if it does, do each side, the sd, fd or the dir, interrupt the 
>> connection and stop the job notifying?.
>> 
> 
> Think of it as 5 different security levels.
> 
> Level 0: 
>    # Data is transmitted as plain text
>     TLS Enable = no
> 
> Level 1:
>     # This level allows opportunistic encryption if the peer chooses, or the 
> peer can communicate in plain text.
>     TLS Enable = yes
>     TLS Require = no
>     TLS Verify Peer = no
>     TLS Certificate = /etc/bacula/cert.pem
>     TLS Key = /etc/bacula/key.pem
>     TLS CA Certificate File = /path/to/system/cafile
> 
> Level 2:
>     # This level requires encryption of data. Any certificate will do, even a 
> self-signed certificate.
>     TLS Enable = yes
>     TLS Require = yes
>     TLS Verify Peer = no
>     TLS Certificate = /etc/bacula/cert.pem
>     TLS Key = /etc/bacula/key.pem
>     TLS CA Certificate File = /path/to/system/cafile
> 
> Level 3:
>     # This level requires encryption and that the certificate presented by 
> the peer be signed by a trusted CA
>     TLS Enable = yes
>     TLS Require = yes
>     TLS Verify Peer = yes
>     TLS Certificate = /etc/bacula/cert.pem
>     TLS Key = /etc/bacula/key.pem
>     TLS CA Certificate File = /path/to/system/cafile
> 
> Level 4:
>     # This level requires encryption and that the certificate presented by 
> the peer be signed by a trusted CA
>     # and that the certificate have a specific CN
>     TLS Enable = yes
>     TLS Require = yes
>     TLS Verify Peer = yes
>     TLS Allowed CN = "some.client.common.name 
> <http://some.client.common.name/>"
>     TLS Certificate = /etc/bacula/cert.pem
>     TLS Key = /etc/bacula/key.pem
>     TLS CA Certificate File = /path/to/system/cafile
> 
> 
> As for a MiTM attack, keep in mind that an active attack is harder than a 
> passive attack. Even opportunistic encryption with self-signed certs protects 
> against passive snooping. Protecting against an active MiTM attack requires 
> authentication. Heartbleed bug aside, level 3 means that the attacker must 
> somehow acquire certificates signed by a CA in the TLS CA Certificate Files 
> of both client and server. Level 4 means that she must steal particular 
> certificates. So level 4 makes a MiTM attack very difficult.
> 
> That said, the real danger is a valid certificate that is stolen or 
> compromised. The CA can revoke a certificate, but this does no good because, 
> as far as I can tell, Bacula does not check CRLs! Level 3 is not very useful 
> without CRL checks. Therefore, always use level 4, at least until Bacula 
> supports CRL checks, since then a  can be avoided by removing its CN from the 
> TLS Allowed CN list. If you are not wrorried about MiTM attacks and just want 
> to prevent snooping, then level 2 will suffice.
> 
> 
> 
> 
> ------------------------------------------------------------------------------
> 
> _______________________________________________
> Bacula-users mailing list
> Bacula-users@lists.sourceforge.net <mailto:Bacula-users@lists.sourceforge.net>
> https://lists.sourceforge.net/lists/listinfo/bacula-users 
> <https://lists.sourceforge.net/lists/listinfo/bacula-users>
> 
> 
> ------------------------------------------------------------------------------
> _______________________________________________
> Bacula-users mailing list
> Bacula-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/bacula-users

------------------------------------------------------------------------------
_______________________________________________
Bacula-users mailing list
Bacula-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-users

Reply via email to