I am currently working on these issues and will share the PR when it is in a 
stable and acceptable state. Because of the way the toolkit is currently 
structured, 5460 needs 5462 to happen first. This is why the feature parity 
doesn’t exist; I added the feature to standalone mode but client/server mode 
needs additional changes to make it work. 

Andy LoPresto
alopre...@apache.org
alopresto.apa...@gmail.com
PGP Fingerprint: 70EC B3E5 98A6 5A3F D3C4  BACE 3C6E F65B 2F7D EF69

> On Feb 13, 2019, at 7:55 AM, Erik Anderson <eand...@pobox.com> wrote:
> 
>> Andy LoPresto
>> alopre...@apache.org
>> alopresto.apa...@gmail.com
> 
> Thanks for the reply. I tried the steps you lined but but the only feasible 
> option is as lined out below, feature parity with the standalone mode.
> 
>> The quick answer is that there is currently a feature availability 
>> difference between the standalone mode and the client/server mode of 
>> the TLS Toolkit. The behavior you are requesting is currently in the 
>> standalone mode but not in the client/server mode. This is due to a 
>> difference in their implementation logic, which is being addressed as 
>> part of a larger refactoring under NIFI-5462 [1], which is a component 
>> of the TLS Toolkit epic NIFI-5458 [2]. 
> 
> Is this in progress? I am happy to pick this up and do it per guidance. Its 
> an important feature.
> 
>> Example keytool output for keystore with external CA public certificate 
>> in chain:  
> 
>> Owner: CN=intermediate_signed.nifi.apache.org, OU=NIFI
>> Issuer: CN=Intermediate CA
> 
>> Owner: CN=Intermediate CA
>> Issuer: CN=Root CA
> 
> In my experience, getting a Sub-CA in an enterprise organization is a 
> challenge and it exposes other risks. Its easier for me to code up a solution 
> for everyone. :)
> 
>> The NiFi TLS Toolkit was designed to facilitate the deployment and 
>> configuration of TLS behavior _in an environment lacking an enterprise 
>> security team_.
> 
> I wish an enterprise was that simple. Many times people need to take 
> ownership themselves. Thats why offer to code up feature parity.
> 
>> I am sorry the PKIX error message is unclear. The error is a 
>> Java-native exception and we can make an effort to capture it and 
>> provide a more user-friendly message in the future. However, searching 
>> "PKIX path building failed nifi” [7] does return a number of helpful 
>> articles and Q/A posts with instructions to resolve the issue. 
> 
> I usually catch the error, add a little more content to the error message, 
> and re-throw it. It does give the bes of both worlds.
> 
>> I encourage you to share further thoughts on concrete steps to improve 
>> this process that do not open users up to unseen security risks, and to 
>> follow the Jiras discussed above for further developments in improving 
>> the behavior and ease-of-use of the TLS Toolkit. 
> 
> I agree. If there is no one working on
>  - https://issues.apache.org/jira/browse/NIFI-5460
> 
> I will happily help and coordinate with whomever is working on 
>  - https://issues.apache.org/jira/browse/NIFI-5462
> 
> Erik Anderson
> Bloomberg
> https://www.linkedin.com/in/erikanderson/

Reply via email to