sijie commented on a change in pull request #350: Issue 349: Documentation for 
security feature in 4.5.0

 File path: site/docs/security/
 @@ -0,0 +1,178 @@
+title: Encryption and Authentication using TLS
+prev: ../index.html
+next: ../sasl
+Apache BookKeeper allows clients and autorecovery daemons to communicate over 
TLS, although this is not enabled by default.
+## Overview
+The bookies and clients need their own key and certificate in order to use 
TLS. The key is used for encryption, while the
+certificate is used for identification. Each bookie or client can also be 
configured with a truststore, which is used to
+determine which certificates (bookie or client identities) to trust 
+The truststore can be configured in many ways. To understand the truststore, 
consider the following two examples:
+1. the truststore contains one or many certificates;
+2. it contains a certificate authority (CA).
+In (1), with a list of certificates, the bookie or client will trust any 
certificate listed in the truststore.
+In (2), with a CA, the bookie or client will trust any certificate that was 
signed by the CA in the truststore.
+(TBD: benefits)
+## <a name="bookie-keystore"></a> Generate TLS key and certificate
+The first step of deploying TLS is to generate the key and the certificate for 
each machine in the cluster.
+You can use Java?s `keytool` utility to accomplish this task. We will generate 
the key into a temporary keystore
+initially so that we can export and sign it later with CA.
+    keytool -keystore bookie.keystore.jks -alias localhost -validity 
{validity} -genkey
+You need to specify two parameters in the above command:
+1. `keystore`: the keystore file that stores the certificate. The *keystore* 
file contains the private key of
+    the certificate; hence, it needs to be kept safely.
+2. `validity`: the valid time of the certificate in days.
+<div class="alert alert-success">
+Ensure that common name (CN) matches exactly with the fully qualified domain 
name (FQDN) of the server.
+The client compares the CN with the DNS domain name to ensure that it is 
indeed connecting to the desired server, not a malicious one.
+## Creating your own CA
+After the first step, each machine in the cluster has a public-private key 
pair, and a certificate to identify the machine.
+The certificate, however, is unsigned, which means that an attacker can create 
such a certificate to pretend to be any machine.
+Therefore, it is important to prevent forged certificates by signing them for 
each machine in the cluster.
+A `certificate authority (CA)` is responsible for signing certificates. CA 
works likes a government that issues passports ?
+the government stamps (signs) each passport so that the passport becomes 
difficult to forge. Other governments verify the stamps
+to ensure the passport is authentic. Similarly, the CA signs the certificates, 
and the cryptography guarantees that a signed
+certificate is computationally difficult to forge. Thus, as long as the CA is 
a genuine and trusted authority, the clients have
+high assurance that they are connecting to the authentic machines.
+    openssl req -new -x509 -keyout ca-key -out ca-cert -days 365
+The generated CA is simply a *public-private* key pair and certificate, and it 
is intended to sign other certificates.
+The next step is to add the generated CA to the clients' truststore so that 
the clients can trust this CA:
+    keytool -keystore bookie.truststore.jks -alias CARoot -import -file ca-cert
+NOTE: If you configure the bookies to require client authentication by setting 
`sslClientAuthentication` to `true` on the
+[bookie config](../../reference/config), then you must also provide a 
truststore for the bookies and it should have all the CA
+certificates that clients keys were signed by.
+    keytool -keystore client.truststore.jks -alias CARoot -import -file ca-cert
+In contrast to the keystore, which stores each machine?s own identity, the 
truststore of a client stores all the certificates
+that the client should trust. Importing a certificate into one?s truststore 
also means trusting all certificates that are signed
+by that certificate. As the analogy above, trusting the government (CA) also 
means trusting all passports (certificates) that
+it has issued. This attribute is called the chain of trust, and it is 
particularly useful when deploying TLS on a large BookKeeper cluster.
+You can sign all certificates in the cluster with a single CA, and have all 
machines share the same truststore that trusts the CA.
+That way all machines can authenticate all other machines.
+## Signing the certificate
+The next step is to sign all certificates in the keystore with the CA we 
generated. First, you need to export the certificate from the keystore:
+    keytool -keystore bookie.keystore.jks -alias localhost -certreq -file 
+Then sign it with the CA:
+    openssl x509 -req -CA ca-cert -CAkey ca-key -in cert-file -out cert-signed 
-days {validity} -CAcreateserial -passin pass:{ca-password}
 Review comment:
This is an automated message from the Apache Git Service.
To respond to the message, please log on GitHub and use the
URL above to go to the specific comment.
For queries about this service, please contact Infrastructure at:

With regards,
Apache Git Services

Reply via email to