On Jul 23, 2008, at 10:43 AM, Von Welch wrote:

I second Charles here. These is a definite need for a method for users to get bootstrapped with X.509 certificates without the whole overhead of a PKI.

We are probably to the point where a MyProxy on-line CA could do this better than SimpleCA (IMHO), but there is some documentation required.

I was willing to write the documentation for the onlineCA for the 4.2 quickstart, but I have the problem that MyProxy won't auto-build with PAM if it is available, so it doesn't make it into our source/binary installers without some tweaking. It has been suggested that I could detect PAM in my top-level configure and then tell MyProxy to build with PAM if I find it, but I obviously didn't get that done for 4.2.0. Is that something you guys might be able to help with? I absolutely love the PAM integration for passwords, it's great for the size/kind of thing the quickstart is aiming for.


Charles



Von

Charles Bacon wrote:
On Jul 23, 2008, at 8:37 AM, Alan Sill wrote:
These observations are correct. For any extended (i.e., non-test) grid with any intention to operate in a CA an accredited manner, however, the use of SimpleCA would not be recommended in any case.

Personally, I wish the Globus team would de-emphasize its inclusion of SimpleCA and decouple it from the Globus documentation.
If you can recommend an alternative that would get new users up and running in a demo environment, I would love to hear about it. The problem, to me, looks like a trade-off between users being turned off because they cannot get the software up and running to play with it and the problems users face when deciding to stop using simpleCA and use a real CA. I would much rather get people up and running as quickly as possible than have them decide not to try it at all because they do not know how to pick a CA to use or similar problems. If you look outside of the quickstart, I don't think we mention SimpleCA very much at all.
Charles
Alan

On Jul 22, 2008, at 3:53 PM, Joel Schneider wrote:

The following documents contain additional information relevant to this
topic:

http://www.ogf.org/documents/GFD.125.pdf
http://www.eurogrid.org/ca/eurogrid-ca-policy.pdf

The EUROGRID document describes steps taken in November 2002 to
discontinue usage of the "nsCertType" extension, and the OGF document specifies a policy that hash algorithms with known weaknesses, such as
MD5, must not be used in new certificates.

Alan Sill, Ph.D
TIGRE Senior Scientist, High Performance Computing Center
Adjunct Professor of Physics
TTU

====================================================================
:  Alan Sill, Texas Tech University  Office: Admin 233, MS 4-1167  :
:  e-mail: [EMAIL PROTECTED]   ph. 806-742-4350  fax 806-742-4358  :
====================================================================



Reply via email to