On Thu, Mar 15, 2007 at 12:04:00AM +0100, Kern Sibbald wrote:
> On Wednesday 14 March 2007 22:29, Landon Fuller wrote:
> > On Mar 14, 2007, at 13:41, Jorj Bauer wrote:
> > > Let's take the DNS security issue off the table for the moment.
> > > As I mentioned at some point, that's mostly paranoia. As you say,
> > > you'd
> > > have to compromise both DNS and one of the root CAs to exploit it. I
> > > only mentioned it for those that are totally paranoid about securing
> > > their clients. (I'm sure they're out there.)
> >
> > Sure -- this is the point of centralized x509 infrastructure. The
> > best defense is limiting ones exposure by not trusting a wide array
> > of CAs.
> >
> > In an ideal world, we'd have nice PGP-style web of, and levels, of
> > trust.
> >
> > >> I don't understand your failure case -- the *entire purpose* of a CA
> > >> is to sign certificates by validating the requesting party.
> > >
> > > Okay. Let's look at two features in Bacula. This gets to the heart
> > > of my
> > > original problem.
> > >
> > > (1) TLS. This requires that a FD be at a particular DNS name
> > > (specifically, that the FD certificate's CN is the same as the Address
> > > field in the Director's configuration, and the Address field is
> > > used as
> > > the DNS name to look up in order to connect to the FD).
> >
> > Either the CN, or the subjectAltName. For mobile clients, without
> > dynamic DNS, this isn't really workable.
> >
> > > (2) The Director's "setip" command. This allows a client to change its
> > > Address registered with the Director.
> > >
> > > If one uses (2) to change the address of the client, then (1) will
> > > fail.
> > > The only ways to avoid this are to
> > >
> > >   (a) issue new certificates every time the address changes;
> > >
> > >   or
> > >
> > >   (b) decouple validation from the DNS name by making the director
> > > more
> > >       flexible (i.e. separate the piece of information embedded in
> > > the cert
> > >       from the one that's used to connect to the client).
> > >
> > > Where (b) can be accomplished in at least two ways. One is to separate
> > > the cert CN from the information used to connect to the client (the CN
> > > contains something other than the hostname, and is manually
> > > validated).
> > > The other is analogous: have the director keep a second string for the
> > > address update via setip, and then connect to the alternate string but
> > > validate the original one.
> > >
> > > The latter method doesn't solve a similar problem, though: what if a
> > > device has to change name for a non-technical reason? For example, an
> > > office move in an organization where the DNS names are tied to
> > > geographic location. Using non-DNS information embedded in the
> > > certificate here provides a significantly greater level of
> I don't have any objections with the feature enhancement, but at the current 
> time we cannot use the patch supplied because it is copyrighted by the 
> University, and they seem to be unlikely (to the best of my knowledge) to 
> sign or agree to the FLA.

The University has verbally agreed to transfer copyright. I'm working on 
the paperwork now.

-- Jorj

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys-and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Bacula-users mailing list
Bacula-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-users

Reply via email to