From 81bb16b302a04a072595723fb2007a9e614e30c6 Mon Sep 17 00:00:00 2001 From: "Richard W.M. Jones" Date: Mon, 18 Jun 2007 16:00:16 +0000 Subject: [PATCH] Mon Jun 18 16:59:00 BST 2007 Richard W.M. Jones * docs/libvir.html (Remote): Updated certificate documentation to use GnuTLS certtool instead of CA.pl / openssl. --- ChangeLog | 5 + docs/libvir.html | 311 +++++++++++++++++------------------------------ 2 files changed, 118 insertions(+), 198 deletions(-) diff --git a/ChangeLog b/ChangeLog index 34ac3befd6..dccc54ccc9 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,8 @@ +Mon Jun 18 16:59:00 BST 2007 Richard W.M. Jones + + * docs/libvir.html (Remote): Updated certificate documentation + to use GnuTLS certtool instead of CA.pl / openssl. + Mon Jun 18 10:32:14 CEST 2007 Daniel Veillard * src/virsh.c: applied SetMem cleanup patch from Mark Johnson diff --git a/docs/libvir.html b/docs/libvir.html index 0d88211848..fcff4f7fdc 100644 --- a/docs/libvir.html +++ b/docs/libvir.html @@ -1376,15 +1376,6 @@ too if the issue looks serious, thanks !

Remote support

-

-NB. Remote support is available only as a series of -patches posted on libvir-list against libvirt CVS. It is only -for experimental use at the moment. -— Richard Jones, 2007-04-18. -

-

Libvirt allows you to access hypervisors running on remote machines through authenticated and encrypted connections. @@ -1735,89 +1726,58 @@ permissive, depending on your needs.

You will need the OpenSSL CA.pl Perl -script documented here. In Fedora, it is in the -openssl-perl package. In Debian and derivatives, it is -in the base openssl package. +href="http://www.gnu.org/software/gnutls/manual/html_node/Invoking-certtool.html">GnuTLS +certtool program documented here. In Fedora, it is in the +gnutls-utils package.

-

Notes:

+

+Create a private key for your CA: +

+ +
+certtool --generate-privkey > cakey.pem
+
+ +

+and self-sign it by creating a file with the +signature details called +ca.info containing: +

+ +
+cn = Name of your organization
+ca
+cert_signing_key
+
+ +and sign: + +
+certtool --generate-self-signed --load-privkey cakey.pem \
+  --template ca.info --outfile cacert.pem
+
+ +

+(You can delete ca.info file now if you +want). +

+ +

+Now you have two files which matter: +

  • -You may find it -better to start with the basic CA.pl script from OpenSSL -itself, as Linux distributors seem to supply a hacked/broken one. +cakey.pem - Your CA's private key (keep this very secret!)
  • -A second confounding factor may be the default -openssl.cnf file supplied with your -Linux distribution. You can switch to a custom -file by doing: -
    -export SSLEAY_CONFIG="-config your_config_file"
    -
    +cacert.pem - Your CA's certificate (this is public).

-These instructions assume that CA.pl is in an empty -directory (because you will probably need to edit this script). -Please read the CA.pl manpage -carefully before starting. -

- -

-Copy CA.pl into an empty directory and edit it. Near the top you will -find various variables: -

- -

-$DAYS defaults to "-days 365". You may wish -to increase this, otherwise your CA and certificates will expire after -a year, suddenly leaving your systems unmanageable. -

- -

-$CATOP may be set to "./demoCA" or some -other directory. If you want you can change the name to a suitable -directory name for your organisation. -

- -

-Now run: -

- -
-./CA.pl -newca
-CA certificate filename (or enter to create)
-[press enter key]
-Making CA certificate ...
-Generating a 1024 bit RSA private key
-...++++++
-.......................++++++
-writing new private key to './demoCA/private/cakey.pem'
-Enter PEM pass phrase: [type a passphrase]
-Verifying - Enter PEM pass phrase: [type a passphrase]
-
- -

-It will ask some further questions about your organisation and then -create a CA directory structure (usually called demoCA -unless you changed it above). Some highlights of this directory: -

- -
-demoCA/newcerts             Certificates issued by the CA
-demoCA/crl                  Certificates revoked by the CA
-demoCA/cacert.pem           The CA's own certificate (this is public)
-demoCA/private/cakey.pem    The CA's private key (keep this secret)
-
- -

-The important file is cacert.pem which is your new CA's -X.509 certificate. This file has to be installed on clients and +cacert.pem has to be installed on clients and server(s) to let them know that they can trust certificates issued by your CA.

@@ -1832,26 +1792,25 @@ To see the contents of this file, do:

-openssl x509 -in demoCA/cacert.pem -text
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            dd:b4:0f:d0:58:0e:08:fa
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=GB, ST=London, L=London, O=Red Hat UK Ltd, OU=Emerging Technologies, CN=Red Hat/emailAddress=rjones@redhat.com
-        Validity
-            Not Before: May 10 10:26:47 2007 GMT
-            Not After : May  7 10:26:47 2017 GMT
-        Subject: C=GB, ST=London, L=London, O=Red Hat UK Ltd, OU=Emerging Technologies, CN=Red Hat/emailAddress=rjones@redhat.com
+certtool -i --infile cacert.pem
 
+X.509 certificate info:
+
+Version: 3
+Serial Number (hex): 00
+Subject: CN=Red Hat Emerging Technologies
+Issuer: CN=Red Hat Emerging Technologies
+Signature Algorithm: RSA-SHA
+Validity:
+        Not Before: Mon Jun 18 16:22:18 2007
+        Not After: Tue Jun 17 16:22:18 2008
 [etc]
 

-This is all that is required to set up your CA. Keep this directory -structure and the passphrase safe as you will require them later when -issuing certificates. +This is all that is required to set up your CA. Keep the CA's private +key carefully as you will need it when you come to issue certificates +for your clients and servers.

Issuing server certificates

@@ -1870,121 +1829,74 @@ server using a URI of

-First move to the directory above the CA directory (from the example -in the last section, demoCA would be a subdirectory). -

- -

-Make a private key and a request for a new certificate: +Make a private key for the server:

-./CA.pl -newreq
-Generating a 1024 bit RSA private key
-...++++++
-....................++++++
-writing new private key to 'newreq.pem'
-Enter PEM pass phrase: [enter a passphrase]
-Verifying - Enter PEM pass phrase: [enter a passphrase]
+certtool --generate-privkey > serverkey.pem
 

-You will be asked additional details about the certificate. -The single important field is "Common Name" which as explained -above must contain the server's hostname as clients -see it. -

- -

-The operation creates a request file called newreq.pem -which has both the private key and the unsigned certificate. -In the situation of a "real" CA, you would send the certificate -part off to be signed (along with lots of $$$). Instead we are -going to act as CA and sign it ourselves: +and sign that key with the CA's private key by first +creating a template file called server.info +(only the CN field matters, which as explained above must +be the server's hostname):

-./CA.pl -signreq
-Enter pass phrase for demoCA/private/cakey.pem: [enter CA passphrase]
-Check that the request matches the signature
-Signature ok
-Certificate Details:
-        Serial Number:
-            dd:b4:0f:d0:58:0e:08:fb
-        Validity
-            Not Before: May 10 11:10:40 2007 GMT
-            Not After : May  9 11:10:40 2008 GMT
-        Subject:
-            countryName               = GB
-            stateOrProvinceName       = London
-            localityName              = London
-            organizationName          = Red Hat UK Ltd
-            organizationalUnitName    = Emerging Technologies
-            commonName                = oirase
-            emailAddress              = rjones@redhat.com
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                DE:08:0D:12:73:76:06:97:EC:57:EF:8D:1B:48:ED:53:9A:1A:FE:7F
-            X509v3 Authority Key Identifier: 
-                keyid:F6:84:4C:1B:2B:59:10:89:3F:0B:AB:05:7F:57:85:A6:33:C7:7A:60
-
-Certificate is to be certified until May  9 11:10:40 2008 GMT (365 days)
-Sign the certificate? [y/n]:y
-
-
-1 out of 1 certificate requests certified, commit? [y/n]y
-Write out database with 1 new entries
-Data Base Updated
-Signed certificate is in newcert.pem
+organization = Name of your organization
+cn = oirase
+tls_www_server
+encryption_key
+signing_key
 

-This step generates a server certificate signed by the CA -for the server oirase (NB. the commonName field -above). We can examine this certificate and its signature: +and sign:

-openssl x509 -in newcert.pem -text
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            dd:b4:0f:d0:58:0e:08:fb
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=GB, ST=London, L=London, O=Red Hat UK Ltd, OU=Emerging Technologies, CN=Red Hat/emailAddress=rjones@redhat.com
-        Validity
-            Not Before: May 10 11:10:40 2007 GMT
-            Not After : May  9 11:10:40 2008 GMT
-        Subject: C=GB, ST=London, L=London, O=Red Hat UK Ltd, OU=Emerging Technologies, CN=oirase/emailAddress=rjones@redhat.com
+certtool --generate-certificate --load-privkey serverkey.pem \
+  --load-ca-certificate cacert.pem --load-ca-privkey cakey.pem \
+  --template server.info --outfile servercert.pem
 

-Note the "Issuer" CN is "Red Hat" (the CA) and the "Subject" CN is -"oirase" (the server). +This gives two files:

+
    +
  • +serverkey.pem - The server's private key. +
  • +
  • +servercert.pem - The server's public key. +
  • +
+

-At this point we have newreq.pem which contains the -private key and unsigned certificate and newcert.pem -which contains the signed certificate. For the server we need just -the private key and signed certificate. For the clients we need just -the signed certificate. So there is one final step which is to -extract the private key from newreq.pem: +We can examine this certificate and its signature:

-openssl rsa -in newreq.pem -out serverkey.pem
-Enter pass phrase for newreq.pem:
-writing RSA key
+certtool -i --infile servercert.pem
+X.509 certificate info:
 
-mv newcert.pem servercert.pem
+Version: 3
+Serial Number (hex): 00
+Subject: O=Red Hat Emerging Technologies,CN=oirase
+Issuer: CN=Red Hat Emerging Technologies
+Signature Algorithm: RSA-SHA
+Validity:
+        Not Before: Mon Jun 18 16:34:49 2007
+        Not After: Tue Jun 17 16:34:49 2008
 
+

+Note the "Issuer" CN is "Red Hat Emerging Technologies" (the CA) and +the "Subject" CN is "oirase" (the server). +

+

Finally we have two files to install:

@@ -2027,26 +1939,29 @@ steps.
  1. -Make a private key and a request for a new certificate: +Make a private key:
    -./CA.pl -newreq
    -
    -Set the DN fields as required. -
  2. - -
  3. -Act as CA and sign the certificate: -
    -./CA.pl -signreq
    +certtool --generate-privkey > clientkey.pem
     
  4. -Extract the private key for the client and rename the -signed certificate: +Act as CA and sign the certificate. Create client.info containing:
    -openssl rsa -in newreq.pem -out clientkey.pem
    -mv newcert.pem clientcert.pem
    +country = GB
    +state = London
    +locality = London
    +organization = Red Hat
    +cn = client1
    +tls_www_client
    +encryption_key
    +signing_key
    +
    +and sign by doing: +
    +certtool --generate-certificate --load-privkey clientkey.pem \
    +  --load-ca-certificate cacert.pem --load-ca-privkey cakey.pem \
    +  --template client.info --outfile clientcert.pem