Skip to content

Commit

Permalink
Merge pull request #194 from astoorangi/doc-fixes
Browse files Browse the repository at this point in the history
Doc fixes
  • Loading branch information
franku committed Jun 27, 2019
2 parents 5050a10 + 22c2c45 commit f68ebe1
Show file tree
Hide file tree
Showing 3 changed files with 13 additions and 7 deletions.
Expand Up @@ -81,5 +81,6 @@ Products
|postgresql|, ``|postgresql|``
reST, reST
|sqlite|, ``|sqlite|``
TLS-PSK, TLS-PSK
|vmware|, ``|vmware|``
|vsphere|, ``|vsphere|``
Expand Up @@ -151,7 +151,7 @@ This assumes, |dir| and |webui| are installed on the same host.
*<input>reload</input>
reloaded
*<input>configure add console name=admin password=secret profile=webui-admin</input>
*<input>configure add console name=admin password=secret profile=webui-admin tlsenable=false</input>
Of course, you can choose other names and passwords. For details, see :ref:`section-webui-console`.

Expand Down Expand Up @@ -180,6 +180,7 @@ To allow a user with name **admin** and password **secret** to access the |dir|
Name = "admin"
Password = "secret"
Profile = "webui-admin"
TlsEnable = false
}
To enable this, reload or restart your |dir|.
Expand All @@ -188,10 +189,12 @@ To allow a user with name **admin** and password **secret** to access the |dir|

.. code-block:: bconsole
*<input>configure add console name=admin password=secret profile=webui-admin</input>
*<input>configure add console name=admin password=secret profile=webui-admin tlsenable=false</input>
If the profile could not be found, reload or restart your |dir|.

TLS-PSK is not available between the |webui| and the |dir|. To enable TLS with certificates, see :ref:`TransportEncryptionWebuiBareosDirChapter`.

For details, please read :ref:`DirectorResourceConsole`.

.. _section-webui-profile:
Expand Down
12 changes: 7 additions & 5 deletions docs/manuals/source/TasksAndConcepts/TransportEncryption.rst
Expand Up @@ -11,7 +11,7 @@ Transport Encryption

Bareos uses TLS (Transport Layer Security) to provide secure network transport. For data encryption in contrast, please see the :ref:`DataEncryption` chapter. The initial Bacula encryption implementation has been written by Landon Fuller.

With :sinceVersion:`18.2:""` the TLS code has been enhanced by the TLS PSK (Pre Shared Keys) feature which allows the daemons to setup an encrypted connection directly without using certificates. The library used for TLS is openSSL.
With :sinceVersion:`18.2:""` the TLS code has been enhanced by the TLS-PSK (Pre Shared Keys) feature which allows the daemons to setup an encrypted connection directly without using certificates. The library used for TLS is openSSL.

.. _TlsDirectives:

Expand Down Expand Up @@ -224,7 +224,7 @@ Compatibility with |bareosFD|
|bareosFD| connection handshake probing
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

As from Bareos 18.2 all components by default establish a secure connection with encryption first, followed by the proprietary Bareos protocol. This is accomplished using TLS PSK. Older components of Bareos than version 18.2 start a connection with a cleartext handshake without encryption.
As from Bareos 18.2 all components by default establish a secure connection with encryption first, followed by the proprietary Bareos protocol. This is accomplished using TLS-PSK. Older components of Bareos than version 18.2 start a connection with a cleartext handshake without encryption.

For downward compatibility Bareos Director Daemons and Bareos Storage Daemons are able to connect to Bareos File Daemons older than version 18.2. In this case Director and Storage switch to the old protocol.

Expand Down Expand Up @@ -304,7 +304,7 @@ The following sequence is used to figure out the right protocol version and to s

|bareosFD| :sinceVersion:`18.2:""` can be used on a Bareos system before Bareos-18.2.

The *older* |bareosDir| and |bareosSD| connect to |bareosFD| using the cleartext Bareos handshake before they can switch to TLS. If you want transport encryption then only TLS with certificates can be used. TLS PSK is not possible with |bareosDir| and |bareosSd| before Bareos-18.2.
The *older* |bareosDir| and |bareosSD| connect to |bareosFD| using the cleartext Bareos handshake before they can switch to TLS. If you want transport encryption then only TLS with certificates can be used. TLS-PSK is not possible with |bareosDir| and |bareosSd| before Bareos-18.2.

However, it is also possible to disable transport encryption and use cleartext transport using the following configuration changes:

Expand Down Expand Up @@ -406,6 +406,8 @@ However, it is also possible to disable transport encryption and use cleartext t

Transport encryption between |bareosWebui| and a |bareosDir| can be configured on a per restricted named console basis.

TLS-PSK is not available between the Bareos WebUI and the Bareos Director, in the following you will set up TLS with certificates.


Please check the following configuration examples. A complete table of the directives in the :file:`directors.ini` file see: :ref:`directors-ini-directives`

Expand Down Expand Up @@ -534,8 +536,8 @@ Overview of the settings in the |bareosWebui| :file:`directors.ini` file

Directive , Type , Default value , Remark , Description
tls_verify_peer , boolean , false , Optional , TLS verif peer
server_can_do_tls , boolean , false , Required , Server can do TLS
server_requires_tls , boolean , false , Required , Server requires TLS
server_can_do_tls , boolean , false , Required , Server (|dir|) can do TLS
server_requires_tls , boolean , false , Required , Server (|dir|) requires TLS
client_can_do_tls , boolean , false , Required , Client can do TLS
client_requires_tls , boolean , false , Required , Client requires TLS
ca_file , string , , Required , Certificate authority file
Expand Down

0 comments on commit f68ebe1

Please sign in to comment.