Thank you all, the feature has been merged into master with extensive testing. 
I'll now proceed with sending a doc PR to document this feature, and usage of 
scripts.


- Rohit

________________________________
From: ilya <[email protected]>
Sent: Thursday, August 24, 2017 12:20:41 AM
To: [email protected]
Subject: Re: [DISCUSS][SECURITY] Feature: Secure CloudStack Communications

Awesome work - thank you Rohit.

On 8/23/17 12:49 PM, Rohit Yadav wrote:
> All,
>
>
> No regression is seen in the smoke test run, however, I'll leave the PR open 
> for some time to gather further feedback and reviews.
>
>
> - Rohit
>
> ________________________________
> From: Rohit Yadav <[email protected]>
> Sent: Friday, August 18, 2017 4:09:30 PM
> To: [email protected]
> Subject: Re: [DISCUSS][SECURITY] Feature: Secure CloudStack Communications
>
> All,
>
>
> The feature is ready for your review, please see:
>
> https://github.com/apache/cloudstack/pull/2239
>
>
> Thanks and regards.
>
> ________________________________
> From: Rohit Yadav <[email protected]>
> Sent: Thursday, July 13, 2017 12:59:02 PM
> To: [email protected]
> Subject: [DISCUSS][SECURITY] Feature: Secure CloudStack Communications
>
> All,
>
>
> With upcoming features such as the application service (container service), 
> and existing features such as SAML, they all need some sort of certificate 
> management and the idea with the proposed feature is to build a pluggable 
> certificate authority manager (CA Manager). I would like to kick an initial 
> discussion around how we can secure components of CloudStacks. A CA 
> service/manager that can create/provision/deploy certificates providing both 
> automated and semi-automated ways for deploying/setup of certificates using 
> in-band (ssh, command-answer pattern) and out-of-band (ssh, ansible, chef 
> etc) to CloudStack services (such as systemvm agents, KVM agents, possible 
> webservices running in systemvms, VRs etc).
>
>
> While we do have some APIs and mechanisms to secure user/external facing 
> services where we can use custom or failsafe SSL/TLS certificates, it's far 
> from a complete solution. The present communications between CloudStack 
> management server, its peers and agents (served on port 8250) is one way SSL 
> handshaked connection, is not authenticated while may be secure by insecure 
> certificates.
>
>
> As a first step, it is proposed to create a general purpose pluggable CA 
> service with a default plugin implementation where CloudStack becomes a 
> Root-CA and can issue self-signed certificates. Such certificates may be 
> consumed by CloudStack agents (CPVM/SSVM/KVM) and other components/services 
> (such as SAML, container services etc). The pluggable CA framework should 
> allow developers to extend the functionality by implementing provider plugins 
> that may work with other CA providers such as LetsEncrypt, an 
> existing/internal CA infrastructure, or other certificate vendors.
>
>
> Please see an initial FS and ideas on implementation in the following FS. 
> Looking forward to your feedback.
>
>
> FS: 
> https://cwiki.apache.org/confluence/display/CLOUDSTACK/Secure+Agent+Communications
>
> JIRA: https://issues.apache.org/jira/browse/CLOUDSTACK-9993
>
>
> Regards.
>
> [email protected]
> www.shapeblue.com<http://www.shapeblue.com>
> 53 Chandos Place, Covent Garden, London  WC2N 4HSUK
> @shapeblue
>
>
>
>
> [email protected]
> www.shapeblue.com<http://www.shapeblue.com>
> 53 Chandos Place, Covent Garden, London  WC2N 4HSUK
> @shapeblue
>
>
>
>
> [email protected]
> www.shapeblue.com<http://www.shapeblue.com>
> 53 Chandos Place, Covent Garden, London  WC2N 4HSUK
> @shapeblue
>
>
>
>

[email protected] 
www.shapeblue.com
53 Chandos Place, Covent Garden, London  WC2N 4HSUK
@shapeblue
  
 

Reply via email to