On Thursday 15 March 2007 16:46, Jorj Bauer wrote:
> On Thu, Mar 15, 2007 at 12:04:00AM +0100, Kern Sibbald wrote:
> > On Wednesday 14 March 2007 22:29, Landon Fuller wrote:
> > > On Mar 14, 2007, at 13:41, Jorj Bauer wrote:
> > > > Let's take the DNS security issue off the table for the moment.
> > > > As I mentioned at some point, that's mostly paranoia. As you say,
> > > > you'd
> > > > have to compromise both DNS and one of the root CAs to exploit it. I
> > > > only mentioned it for those that are totally paranoid about securing
> > > > their clients. (I'm sure they're out there.)
> > >
> > > Sure -- this is the point of centralized x509 infrastructure. The
> > > best defense is limiting ones exposure by not trusting a wide array
> > > of CAs.
> > >
> > > In an ideal world, we'd have nice PGP-style web of, and levels, of
> > > trust.
> > >
> > > >> I don't understand your failure case -- the *entire purpose* of a CA
> > > >> is to sign certificates by validating the requesting party.
> > > >
> > > > Okay. Let's look at two features in Bacula. This gets to the heart
> > > > of my
> > > > original problem.
> > > >
> > > > (1) TLS. This requires that a FD be at a particular DNS name
> > > > (specifically, that the FD certificate's CN is the same as the
> > > > Address field in the Director's configuration, and the Address field
> > > > is used as
> > > > the DNS name to look up in order to connect to the FD).
> > >
> > > Either the CN, or the subjectAltName. For mobile clients, without
> > > dynamic DNS, this isn't really workable.
> > >
> > > > (2) The Director's "setip" command. This allows a client to change
> > > > its Address registered with the Director.
> > > >
> > > > If one uses (2) to change the address of the client, then (1) will
> > > > fail.
> > > > The only ways to avoid this are to
> > > >
> > > >   (a) issue new certificates every time the address changes;
> > > >
> > > >   or
> > > >
> > > >   (b) decouple validation from the DNS name by making the director
> > > > more
> > > >       flexible (i.e. separate the piece of information embedded in
> > > > the cert
> > > >       from the one that's used to connect to the client).
> > > >
> > > > Where (b) can be accomplished in at least two ways. One is to
> > > > separate the cert CN from the information used to connect to the
> > > > client (the CN contains something other than the hostname, and is
> > > > manually
> > > > validated).
> > > > The other is analogous: have the director keep a second string for
> > > > the address update via setip, and then connect to the alternate
> > > > string but validate the original one.
> > > >
> > > > The latter method doesn't solve a similar problem, though: what if a
> > > > device has to change name for a non-technical reason? For example, an
> > > > office move in an organization where the DNS names are tied to
> > > > geographic location. Using non-DNS information embedded in the
> > > > certificate here provides a significantly greater level of
> >
> > I don't have any objections with the feature enhancement, but at the
> > current time we cannot use the patch supplied because it is copyrighted
> > by the University, and they seem to be unlikely (to the best of my
> > knowledge) to sign or agree to the FLA.
>
> The University has verbally agreed to transfer copyright. I'm working on
> the paperwork now.

That's really great.  Thanks for your efforts!  :-)

Landon, at this point, as far as I am concerned, you can proceed with adding 
the code.  Also, if Jorj has other points (bugs), please don't hesitate to 
address them keeping me informed of you plans.

Thanks,

Kern

PS: Jorj, please let me know when the FLA is sent.  That helps me track it.  
Thanks.

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys-and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Bacula-users mailing list
Bacula-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-users

Reply via email to