Sophie

Sophie

distrib > Fedora > 16 > i386 > by-pkgid > df754e4e6f7f5fc8ab9d6ed8559f3e3d > files > 248

bacula-docs-5.0.3-19.fc16.noarch.rpm

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">

<!--Converted with LaTeX2HTML 2008 (1.71)
original version by:  Nikos Drakos, CBLU, University of Leeds
* revised and updated by:  Marcus Hennecke, Ross Moore, Herb Swan
* with significant contributions from:
  Jens Lippmann, Marek Rouchal, Martin Wilck and others -->
<HTML>
<HEAD>
<TITLE>Using Stunnel to Encrypt Communications</TITLE>
<META NAME="description" CONTENT="Using Stunnel to Encrypt Communications">
<META NAME="keywords" CONTENT="misc">
<META NAME="resource-type" CONTENT="document">
<META NAME="distribution" CONTENT="global">

<META NAME="Generator" CONTENT="LaTeX2HTML v2008">
<META HTTP-EQUIV="Content-Style-Type" CONTENT="text/css">

<LINK REL="STYLESHEET" HREF="misc.css">

<LINK REL="next" HREF="DVD_Volumes.html">
<LINK REL="previous" HREF="Variable_Expansion.html">
<LINK REL="up" HREF="Bacula_Miscellaneous_Guide.html">
<LINK REL="next" HREF="DVD_Volumes.html">
</HEAD>

<BODY >
<!--Navigation Panel-->
<A NAME="tex2html193"
  HREF="DVD_Volumes.html">
<IMG WIDTH="37" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="next" SRC="next.png"></A> 
<A NAME="tex2html187"
  HREF="Bacula_Miscellaneous_Guide.html">
<IMG WIDTH="26" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="up" SRC="up.png"></A> 
<A NAME="tex2html181"
  HREF="Variable_Expansion.html">
<IMG WIDTH="63" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="previous" SRC="prev.png"></A> 
<A NAME="tex2html189"
  HREF="Contents.html">
<IMG WIDTH="65" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="contents" SRC="contents.png"></A> 
<A NAME="tex2html191"
  HREF="Index.html">
<IMG WIDTH="43" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="index" SRC="index.png"></A> 
<BR>
<B> Next:</B> <A NAME="tex2html194"
  HREF="DVD_Volumes.html">DVD Volumes</A>
<B> Up:</B> <A NAME="tex2html188"
  HREF="Bacula_Miscellaneous_Guide.html">Bacula Miscellaneous Guide</A>
<B> Previous:</B> <A NAME="tex2html182"
  HREF="Variable_Expansion.html">Variable Expansion</A>
 &nbsp; <B>  <A NAME="tex2html190"
  HREF="Contents.html">Contents</A></B> 
 &nbsp; <B>  <A NAME="tex2html192"
  HREF="Index.html">Index</A></B> 
<BR>
<BR>
<!--End of Navigation Panel-->
<!--Table of Child-Links-->
<A NAME="CHILD_LINKS"><STRONG>Subsections</STRONG></A>

<UL>
<LI><A NAME="tex2html195"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION00410000000000000000">Communications Ports Used</A>
<LI><A NAME="tex2html196"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION00420000000000000000">Encryption</A>
<LI><A NAME="tex2html197"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION00430000000000000000">A Picture</A>
<LI><A NAME="tex2html198"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION00440000000000000000">Certificates</A>
<LI><A NAME="tex2html199"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION00450000000000000000">Securing the Data Channel</A>
<LI><A NAME="tex2html200"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION00460000000000000000">Data Channel Configuration</A>
<LI><A NAME="tex2html201"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION00470000000000000000">Stunnel Configuration for the Data Channel</A>
<LI><A NAME="tex2html202"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION00480000000000000000">Starting and Testing the Data Encryption</A>
<LI><A NAME="tex2html203"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION00490000000000000000">Encrypting the Control Channel</A>
<LI><A NAME="tex2html204"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION004100000000000000000">Control Channel Configuration</A>
<LI><A NAME="tex2html205"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION004110000000000000000">Stunnel Configuration for the Control Channel</A>
<LI><A NAME="tex2html206"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION004120000000000000000">Starting and Testing the Control Channel</A>
<LI><A NAME="tex2html207"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION004130000000000000000">Using stunnel to Encrypt to a Second Client</A>
<LI><A NAME="tex2html208"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION004140000000000000000">Creating a Self-signed Certificate</A>
<LI><A NAME="tex2html209"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION004150000000000000000">Getting a CA Signed Certificate</A>
<LI><A NAME="tex2html210"
  HREF="Using_Stunnel_Encrypt_Commu.html#SECTION004160000000000000000">Using ssh to Secure the Communications</A>
</UL>
<!--End of Table of Child-Links-->
<HR>

<H1><A NAME="SECTION00400000000000000000"></A>
<A NAME="StunnelChapter"></A>
<BR>
Using Stunnel to Encrypt Communications
</H1>
<A NAME="504"></A>

<P>
Prior to version 1.37, Bacula did not have built-in communications encryption.
Please see the TLS chapterCommEncryption if you are using Bacula
1.37 or greater.

<P>
Without too much effort, it is possible to encrypt the communications
between any of the daemons. This chapter will show you how to use <B>stunnel</B> to encrypt communications to your client programs. We assume the
Director and the Storage daemon are running on one machine that will be called
<B>server</B> and the Client or File daemon is running on a different machine
called <B>client</B>. Although the details may be slightly different, the same
principles apply whether you are encrypting between Unix, Linux, or Win32
machines. This example was developed between two Linux machines running
stunnel version 4.04-4 on a Red Hat Enterprise 3.0 system. 

<P>

<H1><A NAME="SECTION00410000000000000000">
Communications Ports Used</A>
</H1>
<A NAME="511"></A>
<A NAME="512"></A>

<P>
First, you must know that with the standard Bacula configuration, the Director
will contact the File daemon on port 9102. The File daemon then contacts the
Storage daemon using the address and port parameters supplied by the Director.
The standard port used will be 9103. This is the typical server/client view of
the world, the File daemon is a server to the Director (i.e. listens for the
Director to contact it), and the Storage daemon is a server to the File
daemon.

<P>

<H1><A NAME="SECTION00420000000000000000">
Encryption</A>
</H1>
<A NAME="514"></A>

<P>
The encryption is accomplished between the Director and the File daemon by
using an stunnel on the Director's machine (server) to encrypt the data and to
contact an stunnel on the File daemon's machine (client), which decrypts the
data and passes it to the client. 

<P>
Between the File daemon and the Storage daemon, we use an stunnel on the File
daemon's machine to encrypt the data and another stunnel on the Storage
daemon's machine to decrypt the data. 

<P>
As a consequence, there are actually four copies of stunnel running, two on the
server and two on the client. This may sound a bit complicated, but it really
isn't. To accomplish this, we will need to construct four separate conf files
for stunnel, and we will need to make some minor modifications to the
Director's conf file. None of the other conf files need to be changed. 

<P>

<H1><A NAME="SECTION00430000000000000000">
A Picture</A>
</H1>
<A NAME="516"></A>

<P>
Since pictures usually help a lot, here is an overview of what we will be
doing. Don't worry about all the details of the port numbers and such for the
moment. 

<P>
<PRE>
  File daemon (client):
                 stunnel-fd1.conf
                   |===========|
  Port 29102  &gt;----| Stunnel 1 |-----&gt; Port 9102
                   |===========|
                 stunnel-fd2.conf
                   |===========|
  Port 9103   &gt;----| Stunnel 2 |-----&gt; server:29103
                   |===========|
  Director (server):
                 stunnel-dir.conf
                   |===========|
  Port 29102  &gt;----| Stunnel 3 |-----&gt; client:29102
                   |===========|
                 stunnel-sd.conf
                   |===========|
  Port 29103  &gt;----| Stunnel 4 |-----&gt; 9103
                   |===========|
</PRE>
<P>

<H1><A NAME="SECTION00440000000000000000">
Certificates</A>
</H1>
<A NAME="520"></A>

<P>
In order for stunnel to function as a server, which it does in our diagram for
Stunnel 1 and Stunnel 4, you must have a certificate and the key. It is
possible to keep the two in separate files, but normally, you keep them in one
single .pem file. You may create this certificate yourself in which case, it
will be self-signed, or you may have it signed by a CA. 

<P>
If you want your clients to verify that the server is in fact valid (Stunnel 2
and Stunnel 3), you will need to have the server certificates signed by a CA
(Certificate Authority), and you will need to have the CA's public certificate
(contains the CA's public key). 

<P>
Having a CA signed certificate is <B>highly</B> recommended if you are using
your client across the Internet, otherwise you are exposed to the man in the
middle attack and hence loss of your data. 

<P>
See below for how to create a self-signed certificate. 

<P>

<H1><A NAME="SECTION00450000000000000000">
Securing the Data Channel</A>
</H1>
<A NAME="523"></A>
<A NAME="524"></A>

<P>
To simplify things a bit, let's for the moment consider only the data channel.
That is the connection between the File daemon and the Storage daemon, which
takes place on port 9103. In fact, in a minimalist solution, this is the only
connection that needs to be encrypted, because it is the one that transports your
data. The connection between the Director and the File daemon is simply a
control channel used to start the job and get the job status. 

<P>
Normally the File daemon will contact the Storage daemon on port 9103
(supplied by the Director), so we need an stunnel that listens on port 9103 on
the File daemon's machine, encrypts the data and sends it to the Storage
daemon. This is depicted by Stunnel 2 above. Note that this stunnel is
listening on port 9103 and sending to server:29103. We use port 29103 on the
server because if we would send the data to port 9103, it would go directly to the
Storage daemon, which doesn't understand encrypted data. On the server
machine, we run Stunnel 4, which listens on port 29103, decrypts the data and
sends it to the Storage daemon, which is listening on port 9103. 

<P>

<H1><A NAME="SECTION00460000000000000000">
Data Channel Configuration</A>
</H1>
<A NAME="526"></A>
<A NAME="527"></A>

<P>
The Storage resource of the bacula-dir.conf normally looks something like the
following: 

<P>
<PRE>
Storage {
  Name = File
  Address = server
  SDPort = 9103
  Password = storage_password
  Device = File
  Media Type = File
}
</PRE>
<P>
Notice that this is running on the server machine, and it points the File
daemon back to server:9103, which is where our Storage daemon is listening. We
modify this to be: 

<P>
<PRE>
Storage {
  Name = File
  Address = localhost
  SDPort = 9103
  Password = storage_password
  Device = File
  Media Type = File
}
</PRE>
<P>
This causes the File daemon to send the data to the stunnel running on
localhost (the client machine). We could have used client as the address as
well. 

<P>

<H1><A NAME="SECTION00470000000000000000">
Stunnel Configuration for the Data Channel</A>
</H1>
<A NAME="533"></A>

<P>
In the diagram above, we see above Stunnel 2 that we use stunnel-fd2.conf on the
client. A pretty much minimal config file would look like the following: 

<P>
<PRE>
client = yes
[29103]
accept = localhost:9103
connect = server:29103
</PRE>
<P>
The above config file does encrypt the data but it does not require a
certificate, so it is subject to the man in the middle attack. The file I
actually used, stunnel-fd2.conf, looked like this: 

<P>
<PRE>
#
# Stunnel conf for Bacula client -&gt; SD
#
pid = /home/kern/bacula/bin/working/stunnel.pid
#
# A cert is not mandatory here. If verify=2, a
#  cert signed by a CA must be specified, and
#  either CAfile or CApath must point to the CA's
#  cert
#
cert = /home/kern/stunnel/stunnel.pem
CAfile = /home/kern/ssl/cacert.pem
verify = 2
client = yes
# debug = 7
# foreground = yes
[29103]
accept = localhost:9103
connect = server:29103
</PRE>
<P>
You will notice that I specified a pid file location because I ran stunnel
under my own userid so I could not use the default, which requires root
permission. I also specified a certificate that I have as well as verify level
2 so that the certificate is required and verified, and I must supply the
location of the CA (Certificate Authority) certificate so that the stunnel
certificate can be verified. Finally, you will see that there are two lines
commented out, which when enabled, produce a lot of nice debug info in the
command window. 

<P>
If you do not have a signed certificate (stunnel.pem), you need to delete the
cert, CAfile, and verify lines. 

<P>
Note that the stunnel.pem, is actually a private key and a certificate in a
single file. These two can be kept and specified individually, but keeping
them in one file is more convenient. 

<P>
The config file, stunnel-sd.conf, needed for Stunnel 4 on the server machine
is: 

<P>
<PRE>
#
# Bacula stunnel conf for Storage daemon
#
pid = /home/kern/bacula/bin/working/stunnel.pid
#
# A cert is mandatory here, it may be self signed
#  If it is self signed, the client may not use
#  verify
#
cert   = /home/kern/stunnel/stunnel.pem
client = no
# debug = 7
# foreground = yes
[29103]
accept = 29103
connect = 9103
</PRE>
<P>

<H1><A NAME="SECTION00480000000000000000">
Starting and Testing the Data Encryption</A>
</H1>
<A NAME="541"></A>
<A NAME="542"></A>

<P>
It will most likely be the simplest to implement the Data Channel encryption
in the following order: 

<P>

<UL>
<LI>Setup and run Bacula backing up some data on your  client machine
   without encryption.  
</LI>
<LI>Stop Bacula.  
</LI>
<LI>Modify the Storage resource in the Director's conf  file.  
</LI>
<LI>Start Bacula  
</LI>
<LI>Start stunnel on the server with:  

<P>
<PRE>
     stunnel stunnel-sd.conf
</PRE>
<P>
</LI>
<LI>Start stunnel on the client with:  

<P>
<PRE>
    stunnel stunnel-fd2.conf
</PRE>
<P>
</LI>
<LI>Run a job.  
</LI>
<LI>If it doesn't work, turn debug on in both stunnel conf files,  restart
   the stunnels, rerun the job, repeat until it works. 
   
</LI>
</UL>

<P>

<H1><A NAME="SECTION00490000000000000000">
Encrypting the Control Channel</A>
</H1>
<A NAME="550"></A>
<A NAME="551"></A>

<P>
The Job control channel is between the Director and the File daemon, and as
mentioned above, it is not really necessary to encrypt, but it is good
practice to encrypt it as well. The two stunnels that are used in this case
will be Stunnel 1 and Stunnel 3 in the diagram above. Stunnel 3 on the server
might normally listen on port 9102, but if you have a local File daemon, this
will not work, so we make it listen on port 29102. It then sends the data to
client:29102. Again we use port 29102 so that the stunnel on the client
machine can decrypt the data before passing it on to port 9102 where the File
daemon is listening. 

<P>

<H1><A NAME="SECTION004100000000000000000">
Control Channel Configuration</A>
</H1>
<A NAME="553"></A>

<P>
We need to modify the standard Client resource, which would normally look
something like: 

<P>
<PRE>
Client {
  Name = client-fd
  Address = client
  FDPort = 9102
  Catalog = BackupDB
  Password = "xxx"
}
</PRE>
<P>
to be: 

<P>
<PRE>
Client {
  Name = client-fd
  Address = localhost
  FDPort = 29102
  Catalog = BackupDB
  Password = "xxx"
}
</PRE>
<P>
This will cause the Director to send the control information to
localhost:29102 instead of directly to the client. 

<P>

<H1><A NAME="SECTION004110000000000000000">
Stunnel Configuration for the Control Channel</A>
</H1>
<A NAME="559"></A>

<P>
The stunnel config file, stunnel-dir.conf, for the Director's machine would
look like the following: 

<P>
<PRE>
#
# Bacula stunnel conf for the Directory to contact a client
#
pid = /home/kern/bacula/bin/working/stunnel.pid
#
# A cert is not mandatory here. If verify=2, a
#  cert signed by a CA must be specified, and
#  either CAfile or CApath must point to the CA's
#  cert
#
cert   = /home/kern/stunnel/stunnel.pem
CAfile = /home/kern/ssl/cacert.pem
verify = 2
client = yes
# debug = 7
# foreground = yes
[29102]
accept = localhost:29102
connect = client:29102
</PRE>
<P>
and the config file, stunnel-fd1.conf, needed to run stunnel on the Client
would be: 

<P>
<PRE>
#
# Bacula stunnel conf for the Directory to contact a client
#
pid = /home/kern/bacula/bin/working/stunnel.pid
#
# A cert is not mandatory here. If verify=2, a
#  cert signed by a CA must be specified, and
#  either CAfile or CApath must point to the CA's
#  cert
#
cert   = /home/kern/stunnel/stunnel.pem
CAfile = /home/kern/ssl/cacert.pem
verify = 2
client = yes
# debug = 7
# foreground = yes
[29102]
accept = localhost:29102
connect = client:29102
</PRE>
<P>

<H1><A NAME="SECTION004120000000000000000">
Starting and Testing the Control Channel</A>
</H1>
<A NAME="565"></A>
<A NAME="566"></A>

<P>
It will most likely be the simplest to implement the Control Channel
encryption in the following order: 

<P>

<UL>
<LI>Stop Bacula.  
</LI>
<LI>Modify the Client resource in the Director's conf  file.  
</LI>
<LI>Start Bacula  
</LI>
<LI>Start stunnel on the server with:  

<P>
<PRE>
     stunnel stunnel-dir.conf
</PRE>
<P>
</LI>
<LI>Start stunnel on the client with:  

<P>
<PRE>
    stunnel stunnel-fd1.conf
</PRE>
<P>
</LI>
<LI>Run a job.  
</LI>
<LI>If it doesn't work, turn debug on in both stunnel conf files,  restart
   the stunnels, rerun the job, repeat until it works. 
   
</LI>
</UL>

<P>

<H1><A NAME="SECTION004130000000000000000">
Using stunnel to Encrypt to a Second Client</A>
</H1>
<A NAME="574"></A>
<A NAME="575"></A>

<P>
On the client machine, you can just duplicate the setup that you have on the
first client file for file and it should work fine. 

<P>
In the bacula-dir.conf file, you will want to create a second client pretty
much identical to how you did for the first one, but the port number must be
unique. We previously used: 

<P>
<PRE>
Client {
  Name = client-fd
  Address = localhost
  FDPort = 29102
  Catalog = BackupDB
  Password = "xxx"
}
</PRE>
<P>
so for the second client, we will, of course, have a different name, and we
will also need a different port. Remember that we used port 29103 for the
Storage daemon, so for the second client, we can use port 29104, and the
Client resource would look like: 

<P>
<PRE>
Client {
  Name = client2-fd
  Address = localhost
  FDPort = 29104
  Catalog = BackupDB
  Password = "yyy"
}
</PRE>
<P>
Now, fortunately, we do not need a third stunnel to on the Director's machine,
we can just add the new port to the config file, stunnel-dir.conf, to make: 

<P>
<PRE>
#
# Bacula stunnel conf for the Directory to contact a client
#
pid = /home/kern/bacula/bin/working/stunnel.pid
#
# A cert is not mandatory here. If verify=2, a
#  cert signed by a CA must be specified, and
#  either CAfile or CApath must point to the CA's
#  cert
#
cert   = /home/kern/stunnel/stunnel.pem
CAfile = /home/kern/ssl/cacert.pem
verify = 2
client = yes
# debug = 7
# foreground = yes
[29102]
accept = localhost:29102
connect = client:29102
[29104]
accept = localhost:29102
connect = client2:29102
</PRE>
<P>
There are no changes necessary to the Storage daemon or the other stunnel so
that this new client can talk to our Storage daemon. 

<P>

<H1><A NAME="SECTION004140000000000000000">
Creating a Self-signed Certificate</A>
</H1>
<A NAME="583"></A>
<A NAME="584"></A>

<P>
You may create a self-signed certificate for use with stunnel that will permit
you to make it function, but will not allow certificate validation. The .pem
file containing both the certificate and the key can be made with the
following, which I put in a file named <B>makepem</B>: 

<P>
<PRE>
#!/bin/sh
#
# Simple shell script to make a .pem file that can be used
# with stunnel and Bacula
#
OPENSSL=openssl
   umask 77
   PEM1="/bin/mktemp openssl.XXXXXX"
   PEM2="/bin/mktemp openssl.XXXXXX"
   ${OPENSSL} req -newkey rsa:1024 -keyout $PEM1 -nodes \
       -x509 -days 365 -out $PEM2
   cat $PEM1 &gt; stunnel.pem
   echo ""   &gt;&gt;stunnel.pem
   cat $PEM2 &gt;&gt;stunnel.pem
   rm $PEM1 $PEM2
</PRE>
<P>
The above script will ask you a number of questions. You may simply answer
each of them by entering a return, or if you wish you may enter your own data.

<P>

<H1><A NAME="SECTION004150000000000000000">
Getting a CA Signed Certificate</A>
</H1>
<A NAME="589"></A>
<A NAME="590"></A>

<P>
The process of getting a certificate that is signed by a CA is quite a bit
more complicated. You can purchase one from quite a number of PKI vendors, but
that is not at all necessary for use with Bacula. 

<P>
To get a CA signed
certificate, you will either need to find a friend that has setup his own CA
or to become a CA yourself, and thus you can sign all your own certificates.
The book OpenSSL by John Viega, Matt Mesier &amp; Pravir Chandra from O'Reilly
explains how to do it, or you can read the documentation provided in the
Open-source PKI Book project at Source Forge: 

http://ospkibook.sourceforge.net/docs/OSPKI-2.4.7/OSPKI-html/ospki-book.htm
http://ospkibook.sourceforge.net/docs/OSPKI-2.4.7/OSPKI-html/ospki-book.htm.
Note, this link may change. 

<P>

<H1><A NAME="SECTION004160000000000000000">
Using ssh to Secure the Communications</A>
</H1>
<A NAME="594"></A>
<A NAME="595"></A>

<P>
Please see the script <B>ssh-tunnel.sh</B> in the <B>examples</B> directory. It
was contributed by Stephan Holl. 

<P>
<HR>
<!--Navigation Panel-->
<A NAME="tex2html193"
  HREF="DVD_Volumes.html">
<IMG WIDTH="37" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="next" SRC="next.png"></A> 
<A NAME="tex2html187"
  HREF="Bacula_Miscellaneous_Guide.html">
<IMG WIDTH="26" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="up" SRC="up.png"></A> 
<A NAME="tex2html181"
  HREF="Variable_Expansion.html">
<IMG WIDTH="63" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="previous" SRC="prev.png"></A> 
<A NAME="tex2html189"
  HREF="Contents.html">
<IMG WIDTH="65" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="contents" SRC="contents.png"></A> 
<A NAME="tex2html191"
  HREF="Index.html">
<IMG WIDTH="43" HEIGHT="24" ALIGN="BOTTOM" BORDER="0" ALT="index" SRC="index.png"></A> 
<BR>
<B> Next:</B> <A NAME="tex2html194"
  HREF="DVD_Volumes.html">DVD Volumes</A>
<B> Up:</B> <A NAME="tex2html188"
  HREF="Bacula_Miscellaneous_Guide.html">Bacula Miscellaneous Guide</A>
<B> Previous:</B> <A NAME="tex2html182"
  HREF="Variable_Expansion.html">Variable Expansion</A>
 &nbsp; <B>  <A NAME="tex2html190"
  HREF="Contents.html">Contents</A></B> 
 &nbsp; <B>  <A NAME="tex2html192"
  HREF="Index.html">Index</A></B> 
<!--End of Navigation Panel-->
<ADDRESS>

2012-01-24
</ADDRESS>
</BODY>
</HTML>