Use cases
- Your company's network has tight security, that incorporates firewalls or deep packet inspection software which interferes only with encrypted traffic. In this case, Acronis Connection Verification Tool will report the connection to be successful, yet the backup will fail. Once an unknown certificate is present in the chain, Acronis Storage rejects the connection.
- On MacOS, there is no Acronis Connection Verification Tool yet. OpenSSL can be used as a replacement for it.
About OpenSSL
OpenSSL is a freeware tool with a lot of commands and possible uses. In this article we focus on its ability to perform SSL Handshake and show the certificates it receives.
OpenSSL both for 32bit and 64bit Windows OS is available at http://wiki.overbyte.eu/wiki/index.php/ICS_Download#Download_OpenSSL_Bin...
On MacOS and Linux, it is most likely enabled by default.
Usage
On the affected machine, run this OpenSSL command:
openssl s_client -showcerts -connect <address>:<port>
where <address> is the address that needs to be checked
When you check connection to storage, the port is 44445
For example: openssl s_client -showcerts -connect baas-fes-eu.acronis.com:44445
When you check connection to management components, ports are 443 and 8443
For example: openssl s_client -showcerts -connect eu-cloud.acronis.com:8443
openssl s_client -showcerts -connect eu-cloud.acronis.com:443
Additionally, you can write output to a file, for example:
openssl s_client -showcerts -connect baas-fes-eu.acronis.com:44445 > output3.txt
If the connection fails, the port is completely closed and needs to be opened.
If the connection is established a certificate chain is returned:
openssl.exe s_client -showcerts -connect us-cloud.acronis.com:443
CONNECTED(00000168)
depth=2 C = US, ST = Arizona, L = Scottsdale, O = "GoDaddy.com, Inc.", CN = Go Daddy Root Certificate Authority - G2
verify error:num=19:self signed certificate in certificate chain
---
Certificate chain
0 s:OU = Domain Control Validated, CN = *.acronis.com
i:C = US, ST = Arizona, L = Scottsdale, O = "GoDaddy.com, Inc.", OU = http://certs.godaddy.com/repository/, CN = Go Daddy Secure Certificate Authority - G2
-----BEGIN CERTIFICATE-----
MIIFLTCCBBWgAwIBAgIJAPghs/Ty/UwVMA0GCSqGSIb3DQEBCwUAMIG0MQswCQYD
<.....>
KYMFvd0OVQYeSFNQAlbLExryqZkWcHZlyjy3ypeO4Ojx
-----END CERTIFICATE-----
1 s:C = US, ST = Arizona, L = Scottsdale, O = "GoDaddy.com, Inc.", CN = Go Daddy Root Certificate Authority - G2
i:C = US, ST = Arizona, L = Scottsdale, O = "GoDaddy.com, Inc.", CN = Go Daddy Root Certificate Authority - G2
-----BEGIN CERTIFICATE-----
MIIDxTCCAq2gAwIBAgIBADANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhMCVVMx
<.....>
4uJEvlz36hz1
-----END CERTIFICATE-----
2 s:C = US, ST = Arizona, L = Scottsdale, O = "GoDaddy.com, Inc.", OU = http://certs.godaddy.com/repository/, CN = Go Daddy Secure Certificate Authority - G2
i:C = US, ST = Arizona, L = Scottsdale, O = "GoDaddy.com, Inc.", CN = Go Daddy Root Certificate Authority - G2
<.....>
---
In this case, the connection was established successfully. It can be seen by checking this part:
Certificate chain
0 s:OU = Domain Control Validated, CN = *.acronis.com
i:C = US, ST = Arizona, L = Scottsdale, O = "GoDaddy.com, Inc.", OU = http://certs.godaddy.com/repository/, CN = Go Daddy Secure Certificate Authority - G2
If, for some reason, another certificate is injected based on the "man in the middle" principle, it will be visible in the chain. In that case, it is necessary to add either Acronis Backup Cloud processes or ports, hostnames and addresses to the whitelist of the software used.