Skip to main content

Quick Friday Veeam B&R Check


dips
Forum|alt.badge.img+7
  • Veeam Legend
  • 808 comments

Hey folks, 

Here is a quick check for a Friday afternoon when it comes to your Veeam B&R installations. If you have installed Veeam B&R years and years ago and keep updating to the latest version of Veeam, have a look at the default Veeam generated Self-Signed certificate.

This can be found under the Main Menu > Options > Certificate

Inspect the ‘Signature hash algorithm’ attribute and if it shows as ‘sha1’ it might be worth re-generating the certificate. If you have vulnerability scanners, it should pick this up.

Even better, instead of using the Self-Signed Certificate, replace it with one signed by your Internal CA - https://helpcenter.veeam.com/docs/backup/vsphere/tls_internal_ca.html?ver=120

To re-generate the certificate, some instructions can be found here - https://helpcenter.veeam.com/docs/backup/vsphere/self_signed_tls.html?ver=120

Just bear in mind the following:

IMPORTANT

If you update the TLS certificate used on the backup server, you must also update info about the certificate on the following backup infrastructure components:

For AHV Backup proxies, pass through the Edit Nutanix Proxy wizard. To do this, in the Backup Infrastructure view, right-click a proxy and select Properties. In the wizard, click Finish. Also, restart the Veeam AHV Service.
For RHV Backup proxies, pass through the Edit Red Hat Virtualization Proxy wizard. To do this, in the Backup Infrastructure view, right-click a proxy and select Properties. In the wizard, click Finish.
For VMware clusters, pass through the I/O filter Management wizard as described in section Installing I/O Filter.
For VMware CDP proxies, pass through the Edit VMware CDP Proxy wizard. To do this, in the Backup Infrastructure view, right-click a proxy and select Properties. In the wizard, click Finish.
If you remove the old certificate from the Microsoft Windows certificate store, you must also reconfigure Veeam Agents added to the Computers with pre-installed agents protection group. To do this, repeat the configuration step of the Veeam Agent deployment scenario as described in the subsections of the Deploying Veeam Agents Using Generated Setup Files section. Other protection groups will be automatically reconfigured during the next rescan operation.

If you do not remove the old certificate from the Microsoft Windows certificate store, all protection groups will be automatically reconfigured the next time Veeam Agents connect to the backup server.

https://helpcenter.veeam.com/docs/backup/vsphere/backup_server_certificate.html?ver=120

 

So why not use SHA-1 anymore? That is because it is vulnerable to ‘collision’ vulnerabilities. With the increase in computing power available currently, it is now possible re-create a hash the matches the original hash, even though it is fraudulent. For example, if an email is encrypted with a SHA-1 algorithm, a malicious actor can potentially read the message and the recipient would not be any wiser that the message was intercepted. The third party is able to re-generate the same hash, even though the original message was tampered with. 

13 comments

dips
Forum|alt.badge.img+7
  • Author
  • Veeam Legend
  • 808 comments
  • March 22, 2024

TylerJurgens
Forum|alt.badge.img+7
  • Influencer
  • 161 comments
  • March 22, 2024

Nice @dips - great reminder. Any chance you have links to setting this up with Letsencrypt?


Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8402 comments
  • March 22, 2024

Great tip on this one Dips.  We use internal CA certs for many things now.


coolsport00
Forum|alt.badge.img+20
  • Veeam Legend
  • 4109 comments
  • March 22, 2024

Thanks for sharing Dipen. We're same as Chris, thankfully. 


dips
Forum|alt.badge.img+7
  • Author
  • Veeam Legend
  • 808 comments
  • March 22, 2024
TylerJurgens wrote:

Nice @dips - great reminder. Any chance you have links to setting this up with Letsencrypt?

I don’t but it’s sounds like an idea. On the other hand I’d isolate the B&R server from the internet as much as possible. 
 

 


dips
Forum|alt.badge.img+7
  • Author
  • Veeam Legend
  • 808 comments
  • March 22, 2024

I’m curious @coolsport00 @Chris.Childerhose 

Do you use any particular tool to track certificate expiration?


coolsport00
Forum|alt.badge.img+20
  • Veeam Legend
  • 4109 comments
  • March 22, 2024

Nothing other than documenting - Excel 🤷🏼‍♂️


Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8402 comments
  • March 22, 2024

We document the issued certs in a tool we use for our Service Desk tickets, etc. as it does management of tons of other things, and we can do workflows in it.  Same with all our external SSLs we have for services.


dips
Forum|alt.badge.img+7
  • Author
  • Veeam Legend
  • 808 comments
  • March 22, 2024

MarkBoothman
Forum|alt.badge.img+7
  • Veeam Legend
  • 197 comments
  • March 25, 2024

@dips for tracking certs I’ve used Powershell scripts previously. These were integrated into Nagios and you could configure the thresholds and also ignore thumbprints to cut out the false positives.

 


dips
Forum|alt.badge.img+7
  • Author
  • Veeam Legend
  • 808 comments
  • March 25, 2024

Thanks @MarkBoothman 

Are there any options for auto-renewal of certs in Nagios?


MarkBoothman
Forum|alt.badge.img+7
  • Veeam Legend
  • 197 comments
  • March 25, 2024

@dips not as far as I am aware but it's possible a trigger could be created and scripted although I’ve not done that personally. Would it not be better to review which certs need renewing before auto-renewing them?


dips
Forum|alt.badge.img+7
  • Author
  • Veeam Legend
  • 808 comments
  • March 25, 2024

Yea, definitely @MarkBoothman 

I do see a lot of automation of certs now with 30 - 60 day validity now rather than the usual 1 year.