On 12/18/2015 06:46 PM, H. Steuer
wrote:
Hello Kern,
thanks for your comment. Probably I did not understand the
security model of Bacula so far. Furthermore, you misread my
post. The point is not anybody having root access to the Bacula
server - thats absolutely not the case. And there are just very
few users with root access on servers. But lets assume an
administrator that manages mail servers only has root privileges
on its mail servers (not on any other maching, just his few mail
servers).
This mail server has a file daemon configuration locally where
the director password is stored. That nessecary for the director
to connect to this particular client. So far so good. For my
understanding, and please correct my if I'm wrong, I can use the
same password that is part of the file daemon configuration in
the bconsole.conf to gain anonymous console.
So an evil administrator could read the password our of the
bacula-fd.conf, install bconsole and create just a bconsole.conf
with the same password he extracted from the bacula-fd.conf.
Probably I just missed the point here and my assumption is
wrong. At least my local tests confirmed that this is the case.
Can you please leave a comment on this?
Yes, you have very likely "misconfigured" your File Daemon. In the
Director resource of the FD, you should put the password that is in
the Client resource of the bacula-dir.conf file and definitely not
the password that is in the Director resource of the bacula-dir.conf
file. It may seem a bit confusing at the beginning, but the FD
Director resource should have the password that the Director will
use when connecting to the Client (i.e. the bacula-dir.conf Client
password).
The password that is in the Director resource of bacula-dir.conf
should *only* be used in the bconsole.conf file on machines where
you want the administrator to have full control of Bacula.
Once you "get" this, your security concerns mentioned in these
emails about Bacula will most likely go away.
This arrangement is shown in various diagrams in the Bacula manual,
but Dan Languille has a much clearer diagram of this process that
may help you.
Best regards,
Kern
Thanks,
Heri
On 18.12.2015 17:56, Kern Sibbald wrote:
Hello,
If you have hundreds of users with root access and they can
access the Bacula Director machine as root, you have a far
bigger security problem than just Bacula, since they can do
anything to your machines and the Bacula Director machine, and
there is no way Bacula could ever avoid it.
Root access to your Bacula Director machine gives the person
access to everything including everything in Bacula. On *nix
machines that is normal and it is unavoidable.
Thus in a network such as yours you must be careful never to
allow external root access to any machine you want to be
secure. Access should always be via a user id and password,
and sudo root access should always be disallowed to everyone
except trusted administrators. There are, of course, other
more complicated ways to accomplish the same thing.
Bacula has been around for 15 years now, and if there were a
serious security design error, it would have been pointed out
a long time ago. I assume you already understand my comments
about sudo and root access, and I am sure when you fully
understand Bacula's security and apply "normal" *nix security
(sudo, ...) on top of it, you will have a secure backup
system.
Best regards,
Kern
On 12/18/2015 05:34 PM, H. Steuer wrote:
Hello Bill,
you are right, but there is a serious side effect. Heres a
statement from the Bacula docs:
The first console type is an anonymous
or default console, which has full privileges. There
is no console resource necessary for this type since
the password is specified in the Director resource.
Typically you would use this anonymous console only
for administrators.
So this means that - as there is no configuration item for
the anonymous console in the "bacula-dir.conf", it uses
the password from the "Director" section. As this is
also the password thats used for the director to access
the client file
daemon, we have now the result that this is the same
password that can be used in a "Director" section of the
bconsole.conf. I just gave it a try and changed the
password in the Director section of the bacula-dir.conf.
Then I have
chosen a random client, installed bconsole, created a
bconsole.conf with the same password and voila - had full
access
to all the backups.
So the final result is that you can always use the same
password in the bconsole.conf Director section as the one
thats
configured in your bacula-fd.conf Director section which
then grants you administrative privileges in the director.
Thanks for your support so far, let me know your
thoughts....
Cheers,
Heri
On 18.12.2015 17:19, Bill Arlofski wrote:
On 12/18/2015 10:30 AM, H. Steuer wrote:
Hello Bill,
thanks for your explanation. I fully understand your point. However, if a user
has root privileges on one host which is backed up, there is already a file
daemon config that holds
the director password. Please correct me if I´m wrong, but my understanding is
that the anonymous console does not require (and cannot have) a "Console"
configuration
on the director. Therefore such a root user could install the bconsole client
on his host, configure the bconsole towards the director with the password
grabbed from the
file daemon and then connect to the director.
The password in the Director {} resource of the bacula-fd.conf file on a
client is the password that the Director must supply to connect to the FD, not
the other way around.
Try it. :) Try using this password in a bconsole.conf file and attempt to
connect to the Director. You will be denied access.
On the Director, a Client {} resource needs to be created where a matching
password is set for each FD.
Hope this makes it a little more clear.
Bill
------------------------------------------------------------------------------
_______________________________________________
Bacula-users mailing list
Bacula-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-users
--
PATRONAS Financial
Systems GmbH
Schnewlinstr. 4
79098 Freiburg
fon +49 (0)761 400688-11
fax +49 (0)761 400688-61
ste...@patronas.com
http://www.patronas.com
PGP: 47AB0548
commercial register: Amtsgericht Freiburg, HRB 7212
executive board: Heribert Steuer, Carsten Osswald
This e-mail may contain confidential and/or privileged
information. If you are not the intended recipient (or
have received this e-mail in error)
please notify the sender immediately and destroy this
e-mail. Any unauthorized copying, disclosure or
distribution of the material in this e-mail is strictly
forbidden.
|