Re: [Bacula-users] Bacula security

2013-07-03 Thread Martin Simmons
On Tue, 02 Jul 2013 13:46:02 -0400, Josh Fisher said: Authentication-Results: mail.pvct.com; dkim=none reason=no signature; On 7/2/2013 11:03 AM, Martin Simmons wrote: On Tue, 02 Jul 2013 08:32:43 -0400, Josh Fisher said: Using PKI data encryption together with the ability to

Re: [Bacula-users] Bacula security

2013-07-02 Thread Josh Fisher
On 7/1/2013 4:09 PM, Kern Sibbald wrote: Hello, This is an interesting subject and what everyone says is correct. I have been thinking over the past few months about how to improve security, and although we already have one way that the FD can drop permissions to become a backup only FD, I

Re: [Bacula-users] Bacula security

2013-07-02 Thread Martin Simmons
On Tue, 02 Jul 2013 08:32:43 -0400, Josh Fisher said: Using PKI data encryption together with the ability to disable scripts would allow for fairly safe restores, since the FD's private key would be needed to alter any files being restored and a compromised Dir could not run

Re: [Bacula-users] Bacula security

2013-07-02 Thread Josh Fisher
On 7/2/2013 11:03 AM, Martin Simmons wrote: On Tue, 02 Jul 2013 08:32:43 -0400, Josh Fisher said: Using PKI data encryption together with the ability to disable scripts would allow for fairly safe restores, since the FD's private key would be needed to alter any files being

Re: [Bacula-users] Bacula security

2013-07-01 Thread Martin Simmons
On Sat, 29 Jun 2013 07:24:36 -0700, Grant said: I'm currently pushing backups from each system to a central backup server via rdiff-backup. However, I realized that push backups are not safe because if one of the systems is compromised, the infiltrator could delete all of that system's

Re: [Bacula-users] Bacula security

2013-07-01 Thread Grant
I'm currently pushing backups from each system to a central backup server via rdiff-backup. However, I realized that push backups are not safe because if one of the systems is compromised, the infiltrator could delete all of that system's backups with a command like this: rdiff-backup

Re: [Bacula-users] Bacula security

2013-07-01 Thread lst_hoe02
Zitat von Grant emailgr...@gmail.com: I'm currently pushing backups from each system to a central backup server via rdiff-backup. However, I realized that push backups are not safe because if one of the systems is compromised, the infiltrator could delete all of that system's backups with a

Re: [Bacula-users] Bacula security

2013-07-01 Thread Grant
Bacula does have root read (and write) privileges on every backed-up system, but you can encrypt the backups before sending them to the central server. Bacula can also sign the backups, so the client can verify that a restore doesn't contain modified data. You still have to keep the

Re: [Bacula-users] Bacula security

2013-07-01 Thread Jérôme Blion
Le 2013-07-01 13:07, Martin Simmons a écrit : Bacula does have root read (and write) privileges on every backed-up system, but you can encrypt the backups before sending them to the central server. Bacula can also sign the backups, so the client can verify that a restore doesn't contain

Re: [Bacula-users] Bacula security

2013-07-01 Thread Phil Stracchino
On 07/01/13 09:11, Grant wrote: Bacula does have root read (and write) privileges on every backed-up system, but you can encrypt the backups before sending them to the central server. Bacula can also sign the backups, so the client can verify that a restore doesn't contain modified data.

Re: [Bacula-users] Bacula security

2013-07-01 Thread Martin Simmons
On Mon, 01 Jul 2013 15:25:23 +0200, Jérôme Blion said: Le 2013-07-01 13:07, Martin Simmons a écrit : Bacula does have root read (and write) privileges on every backed-up system, but you can encrypt the backups before sending them to the central server. Bacula can also sign the

Re: [Bacula-users] Bacula security

2013-07-01 Thread Jérôme Blion
Le 2013-07-01 15:53, Martin Simmons a écrit : On Mon, 01 Jul 2013 15:25:23 +0200, Jérôme Blion said: Le 2013-07-01 13:07, Martin Simmons a écrit : Bacula does have root read (and write) privileges on every backed-up system, but you can encrypt the backups before sending them to the central

Re: [Bacula-users] Bacula security

2013-07-01 Thread Martin Simmons
On Mon, 01 Jul 2013 16:25:06 +0200, Jérôme Blion said: Le 2013-07-01 15:53, Martin Simmons a écrit : On Mon, 01 Jul 2013 15:25:23 +0200, Jérôme Blion said: Le 2013-07-01 13:07, Martin Simmons a écrit : Bacula does have root read (and write) privileges on every backed-up system,

Re: [Bacula-users] Bacula security

2013-07-01 Thread Josh Fisher
On 7/1/2013 9:11 AM, Grant wrote: Bacula does have root read (and write) privileges on every backed-up system, but you can encrypt the backups before sending them to the central server. Bacula can also sign the backups, so the client can verify that a restore doesn't contain modified data.

Re: [Bacula-users] Bacula security

2013-07-01 Thread Jérôme Blion
Le 2013-07-01 17:07, Martin Simmons a écrit : It can be secured via ACL too. You can manage what a client has access to. And so, ensure no critical data pieces can be stolen through that way. Yes, that works as long as the Director is secure -- otherwise the attacker can just write

Re: [Bacula-users] Bacula security

2013-07-01 Thread Kern Sibbald
Hello, This is an interesting subject and what everyone says is correct. I have been thinking over the past few months about how to improve security, and although we already have one way that the FD can drop permissions to become a backup only FD, I have been thinking about two additions: 1. A

[Bacula-users] Bacula security

2013-06-29 Thread Grant
I'm currently pushing backups from each system to a central backup server via rdiff-backup. However, I realized that push backups are not safe because if one of the systems is compromised, the infiltrator could delete all of that system's backups with a command like this: rdiff-backup

[Bacula-users] Bacula : Security Vulnerabilities

2013-02-07 Thread Ralf Brinkmann
Bacula : Security Vulnerabilities http://www.cvedetails.com/vulnerability-list/vendor_id-3343/Bacula.html; (The vulnerability requires an attacker to be logged into the system (such as at a command line or via a desktop session or web interface).) - Products Affected By CVE-2012-4430 #

Re: [Bacula-users] Bacula : Security Vulnerabilities

2013-02-07 Thread Marco van Wieringen
Ralf Brinkmann ralf.brinkmann at wemhoener.de writes: hi folks, director and file daemon of Bacula can be of different version. What does the vulnerability affect? - the director or the file daemon? Director only as its related to the acl handling which only the director does. Marco