Hi Ana,

 Have you configured TLS for this client at bacula-dir.conf?



That was it!! Somehow I missed configuring TLS for this client in
bacula-dir.conf. It's working now.

Thank you!!

Cheers,
Tim

On Mon, Jun 15, 2015 at 8:36 PM, Ana Emília M. Arruda <
emiliaarr...@gmail.com> wrote:

> Hi Tim,
>
> Have you configured TLS for this client at bacula-dir.conf?
>
> Best regards,
> Ana
>
> On Mon, Jun 15, 2015 at 10:47 AM, Heitor Faria <hei...@bacula.com.br>
> wrote:
>
>> Hey all,
>>
>> Hello Tim,
>>
>>
>>  I'm adding some new servers to the backup pool now that I'm successfully
>> backing up to S3. Now that space to keep my tapes on is less of an issue,
>> it'll be nice to get some more hosts into the backup pool that were
>> previously neglected.
>>
>> I added one host to the pool without any issue at all. But I keep getting
>> stuck on the second host I'm trying to add. Bacula keeps complaining about
>> a TLS issue, even tho the cert and key appears to be completely kosher.
>>
>> When I test the second new client with 'st client' this is the response I
>> get from bacula:
>>
>> Select Client (File daemon) resource (1-4): 4
>> Connecting to Client logs.jokefire.com at logs.jokefire.com:9102
>> Failed to connect to Client logs.jokefire.com.
>>
>> I've verified that the port is open from the client to the bacula server:
>>
>> [root@ops:~] #telnet logs.jokefire.com 9102
>> Trying 216.120.248.98...
>> Connected to logs.jokefire.com.
>> Escape character is '^]'.
>>
>> And I've been able to verify that the cert and key on the new client are
>> ok using this tool:
>>
>> https://www.sslshopper.com/certificate-key-matcher.html
>>
>> Which does the checking for you and seems reliable.
>>
>> These are the ownership and permissions on the cert and key on the client
>> host:
>>
>> [root@logs:~] #ls -l /etc/pki/tls/{certs,private}/logs.jokefire.com.*
>> -r--------. 1 bacula bacula 1444 Jun 14 22:33
>> /etc/pki/tls/certs/logs.jokefire.com.crt
>> -r--------. 1 bacula bacula 1708 Jun 14 22:33
>> /etc/pki/tls/private/logs.jokefire.com.key
>>
>> And this is the config file I'm using for bacula-fd on the client:
>>
>> [root@logs:~] #grep -v '#' /etc/bacula/bacula-fd.conf
>>
>> Director {
>>   Name = ops.jokefire.com
>>   Password = secret
>>   TLS Certificate = /etc/pki/tls/certs/logs.jokefire.com.crt
>>   TLS Key = /etc/pki/tls/private/logs.jokefire.com.key
>>   TLS CA Certificate File = /etc/pki/CA/certs/ca.crt
>>   TLS Enable = yes
>>   TLS Require = yes
>> }
>>
>>   Name = logs.jokefire.com
>>   WorkingDirectory = /var/bacula
>>   Pid Directory = /var/run
>>   Maximum Concurrent Jobs = 20
>>   TLS Certificate = /etc/pki/tls/certs/logs.jokefire.com.crt
>>   TLS Key = /etc/pki/tls/private/logs.jokefire.com.key
>>   TLS CA Certificate File = /etc/pki/CA/certs/ca.crt
>>   TLS Enable = yes
>>   TLS Require = yes
>> }
>>
>> Messages {
>>   Name = Standard
>>   director = cloud-dir = all, !skipped, !restored
>> }
>>
>>
>> I basically followed these exact steps to create the key, csr and cert
>> that were provided to my by Ana on the list some ages ago!
>>
>>  Create CA key
>> 1) openssl genrsa -des3 -out ca.key 4096
>>
>> Create CA cert
>> 2) openssl req -new -x509 -days 3650 -key ca.key -out ca.crt
>>
>> Create director1 key and certificate signing request
>> 3) openssl genrsa -des3 -out director1key.key 4096
>> 4) openssl req -new -key director1.key -out director1.csr
>>
>> Sign the director1 certificate
>> 5) openssl x509 -req -days 3650 -in director1.csr -CA ca.crt -CAkey
>> ca.key -set_serial 01 -out director1.crt
>>
>> Don´t know if it is necessary, but converted .crt to .pem
>> 6) openssl x509 -in director1.crt -out director1.pem
>> 7) openssl x509 -in ca.crt -out ca.pem
>>
>> Really important! Remove the password from the director1 private key
>> 8) openssl rsa -in director1key.key -out director1.key
>>
>> These steps have always worked for me. Until now!!
>>
>> Maybe openssl configuration files? It is very tricky. E.g.: you need to
>> use a different "nsCertType" if you are self signing your certificates.
>> I just use the key and cert in the same files. This is my procedure:
>> http://www.bacula.com.br/criptografia-das-comunicacoes-do-bacula-tls/?lang=en
>>
>> Regards,
>>
>> ===========================================================================
>> Heitor Medrado de Faria - LPIC-III | ITIL-F |  Bacula Systems Certified
>> Administrator II
>> I'm a Bacula/SysAdmin looking for a job in USA or Europe. Please
>> recommend me.
>> Need Bacula training?
>> https://www.udemy.com/bacula-backup-software/?couponCode=bacula-list
>> +55 61 <%2B55%2061%202021-8260>8268-4220 <%2B55%2061%208268-4220>
>> Site: www.bacula.com.br | FB: heitor.faria
>> <http://www.facebook.com/heitor.faria>
>>
>> ===========================================================================
>>
>>
>> To make matters even more confusing is that I have a really nice bacula
>> puppet module that I created myself which does a nice job of getting bacula
>> clients to work with a bacula server. It's never failed me. Until now!
>>
>> I'm wondering if there's something I missed that could get this working
>> correctly.
>>
>> Thanks!
>> Tim
>> --
>> GPG me!!
>>
>> gpg --keyserver pool.sks-keyservers.net --recv-keys F186197B
>>
>>
>>
>> ------------------------------------------------------------------------------
>>
>> _______________________________________________
>> Bacula-users mailing list
>> Bacula-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/bacula-users
>>
>>
>>
>>
>> ------------------------------------------------------------------------------
>>
>> _______________________________________________
>> Bacula-users mailing list
>> Bacula-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/bacula-users
>>
>>
>


-- 
GPG me!!

gpg --keyserver pool.sks-keyservers.net --recv-keys F186197B
------------------------------------------------------------------------------
_______________________________________________
Bacula-users mailing list
Bacula-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-users

Reply via email to