Kern Sibbald wrote:
Hello,

Does anyone have any *real* bacula .conf examples of using the new TLS data encryption feature? I would like to add them to the manual.

Here are the TLS portions of my configuration files:

bacula-dir.conf:
  Director {                            # define myself
    Name = backup1-dir
    ...
    TLS Require = yes
    TLS Verify Peer = yes
    TLS Allowed CN = "[EMAIL PROTECTED]"
    TLS Allowed CN = "[EMAIL PROTECTED]"
    TLS CA Certificate File = /usr/local/etc/ssl/ca.pem
    # This is a server certificate, used for incoming
    # console connections.
    TLS Certificate = /usr/local/etc/ssl/backup1/cert.pem
    TLS Key = /usr/local/etc/ssl/backup1/key.pem
  }

  Storage {
    Name = File
    Address = backup1.example.com
    ...
    TLS Require = yes
    TLS CA Certificate File = /usr/local/etc/ssl/ca.pem
    # This is a client certificate, used by the director to
    # connect to the storage daemon
    TLS Certificate = /usr/local/etc/ssl/[EMAIL PROTECTED]/cert.pem
    TLS Key = /usr/local/etc/ssl/[EMAIL PROTECTED]/key.pem
  }

bacula-fd.conf:
  Director {
    Name = backup1-dir
    ...
    TLS Require = yes
    TLS Verify Peer = yes
    # Allow only the Director to connect
    TLS Allowed CN = "[EMAIL PROTECTED]"
    TLS CA Certificate File = /usr/local/etc/ssl/ca.pem\
    # This is a server certificate. It is used by connecting
    # directors to verify the authenticity of this file daemon
    TLS Certificate = /usr/local/etc/ssl/server1/cert.pem
    TLS Key = /usr/local/etc/ssl/server1/key.pem
  }

bacula-sd.conf:
  Storage {                             # definition of myself
    Name = backup1-sd
    ...
    # These TLS configuration options are used for incoming
    # file daemon connections. Director TLS settings are handled
    # below.
    TLS Require = yes
    # Peer certificate is not required/requested -- peer validity
    # is verified by the storage connection cookie provided to the
    # File Daemon by the director.
    TLS Verify Peer = no
    TLS CA Certificate File = /usr/local/etc/ssl/ca.pem
    # This is a server certificate. It is used by connecting
    # file daemons to verify the authenticity of this storage daemon
    TLS Certificate = /usr/local/etc/ssl/backup1/cert.pem
    TLS Key = /usr/local/etc/ssl/backup1/key.pem
  }

  #
  # List Directors who are permitted to contact Storage daemon
  #
  Director {
    Name = backup1-dir
    ...
    TLS Require = yes
    # Require the connecting director to provide a certificate
    # with the matching CN.
    TLS Verify Peer = yes
    TLS Allowed CN = "[EMAIL PROTECTED]"
    TLS CA Certificate File = /usr/local/etc/ssl/ca.pem
    # This is a server certificate. It is used by the connecting
    # director to verify the authenticity of this storage daemon
    TLS Certificate = /usr/local/etc/ssl/backup1/cert.pem
    TLS Key = /usr/local/etc/ssl/backup1/key.pem
  }

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to