+1

> On Nov 30, 2018, at 3:47 PM, Dave Neuman <[email protected]> wrote:
> 
> Traffic Control only supports a very limited few (one, maybe two), so we
> shouldn't need to worry about that.
> 
> On Fri, Nov 30, 2018 at 3:14 PM Gray, Jonathan <[email protected]>
> wrote:
> 
>> The instructions on adding a custom root CA to a server trust store are
>> going to vary by OS, Distro, and Major Rev.
>> 
>> Jonathan G
>> 
>> 
>> On 11/30/18, 2:55 PM, "Rawlin Peters" <[email protected]> wrote:
>> 
>>    On Fri, Nov 30, 2018 at 12:56 PM Hank Beatty <[email protected]>
>> wrote:
>>> 
>>> +1
>>> 
>>> On 11/30/2018 02:43 PM, Rawlin Peters wrote:
>>>> If you want your self-signed certs to be fully validated by the
>> API,
>>>> you will need to create an internal signing authority, sign your
>>>> created certs using that internal signing authority, and install
>> the
>>>> internal signing authority certs on your TO servers. This is what I
>>>> would recommend as it provides full verification of your
>> "self-signed"
>>>> certs because they will appear to be "real" certs and won't emit a
>>>> warning from the API. That exercise is left up to the
>> administrator.
>>> 
>>> I know that this is outside Traffic Control but, do you know where I
>>> could find some documentation on doing what you describe above?
>>> 
>>> Thanks,
>>> Hank
>> 
>>    I briefly skimmed over these pages, but they seemed like they'd do the
>> job:
>> 
>> https://deliciousbrains.com/ssl-certificate-authority-for-local-https-development/
>>    https://thomas-leister.de/en/how-to-import-ca-root-certificate/
>> 
>>    For cert validation purposes only, your internal root CA cert would
>>    only have to be installed on your TO servers (whether it be your local
>>    TO on your laptop or Prod TO) since TO will be validating the cert
>>    against the root CAs that have been installed on its system.
>> 
>>    - Rawlin
>> 
>> 
>> 

Reply via email to