Bacula-users

Re: [Bacula-users] Data Encryption - subjectKeyIdentifier extension?

2011-11-17 03:20:48
Subject: Re: [Bacula-users] Data Encryption - subjectKeyIdentifier extension?
From: Manuel Schleiffelder <manuel.schleiffelder AT univie.ac DOT at>
To: bacula-users AT lists.sourceforge DOT net
Date: Thu, 17 Nov 2011 09:18:48 +0100
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 2011-11-16 18:31, Oliver Hoffmann wrote:
> Hi list,
> 
> after I set up TLS successfully, I tried to get data encryption
> running.
> 
> I started with the official documentation:
> 
> http://www.bacula.org/en/dev-manual/main/main/Data_Encryption.html
> 
> ldd `which bacula-fd` shows:
> 
> ... libssl.so.0.9.8 => /lib/libssl.so.0.9.8 (0x00673000) 
> libcrypto.so.0.9.8 => /lib/libcrypto.so.0.9.8 (0x00c6f000) ...
> 
> So, I made the master.cert and the pem file for the client (on the 
> bacula server) and set the following in the FileDaemon stanza of
> the bacula-fd.conf:
> 
> PKI Signatures = Yes            # Enable Data Signing PKI
> Encryption = Yes            # Enable Data Encryption PKI Keypair =
> "/etc/bacula/certs/PKI/my-fd.pem" # Public and Private Keys PKI
> Master Key = "/etc/bacula/certs/PKI/master.cert"  # ONLY the Public
> Key
> 
> Starting the bacula-fd gives me:
> 
> * Starting Bacula File daemon... 16-Nov 17:49 my-fd JobId 0: Error:
> crypto.c:462 Provided certificate does not include the required
> subjectKeyIdentifier extension.16-Nov 17:49 my-fd: Fatal Error at
> filed.c:415 because: Failed to load public certificate for File
> daemon "my-fd" in /etc/bacula/bacula-fd.conf. 16-Nov 17:49 d830-fd:
> ERROR in filed.c:221 Bitte die Konfigurationsdatei korrigieren:
> /etc/bacula/bacula-fd.conf *** glibc detected ***
> /usr/sbin/bacula-fd: double free or corruption (fasttop): 
> 0x0908d1b8 ***
> 
> Then there follows a backtrace which ends with Kaboom!
> 
> Neither there was anything useful (in terms of setting a 
> subjectKeyIdentifier extension) to be found, nor a better 
> bacula-PKI-howto.
> 
> Could someone give me a hint?
> 
> Thanks and greetings,
> 
> Oliver


hi Oliver,

basically this is what i do for PKI (as i assume TLS was already
working); maybe aes256 and 4096bit rsa is overkill ... anyhow:

Generate a Master Key Pair with:

> openssl genrsa -aes256 -out master.key 4096 openssl req -new -key
> master.key -x509 -out master.cert

Generate a File Daemon Key Pair for each FD:

> openssl genrsa -aes256 -out fd-example.key 4096 openssl req -new
> -key fd-example.key -x509 -out fd-example.cert openssl rsa -in
> fd-example.key -out fd-example.nopass.key cat fd-example.nopass.key
> fd-example.cert >fd-example.pem


did you get rid of the my-fd.key password?

manuel

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk7Ew2UACgkQXYFIxKyMLDSjOwCfULMuXOx1/fbOXcWV6HQGvAQR
UpIAoLdnB1qEG9YRp0OUB3eV07ToW4Pc
=GCIw
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Bacula-users mailing list
Bacula-users AT lists.sourceforge DOT net
https://lists.sourceforge.net/lists/listinfo/bacula-users