Hi:

Thanks for the rapid reply.

Is there another way to do the same thing? That is, provide some form of
authentication for the requests for host/service certificates, while keeping
the request of user certificates open.

Or maybe I am thinking about it all wrong, and there are completely
different (better?) ways of doing the same thing.

     Roger
 

Massimiliano Pala-3 wrote:
> 
> Hello Roger,
> 
> unfortunately I have to say that the issue has not been addressed. This
> is for many reasons, actually.
> 
> Because of the problems exposed here, I decided to provide a more
> fine-grained
> access support with the next releases of OpenCA. The problem I am facing
> at the moment is the lack of spare time to dedicate to the project
> (strangely
> enough, we do not have any supporters at the moment.. so, it is all
> voluntary
> work!).
> 
> The idea is to have a per-user *and* per-role fine-grained access control
> system that is accessible from within the single commands to allow the
> type
> of operations listed in this email.
> 
> Because of this, there are several new commands that need to be added to
> the RA/CA interfaces that will allow for users management. This is a lot
> of work, unfortunately.
> 
> Don't expect the solution to be ready soon, there's a lot of "meat" on the
> fire at the moment and not many resources available.. of course, if there
> are some people who would like to volunteer... :D
> 
> Cheers,
> Max
> 
> 
> On 08/19/2010 02:32 PM, RogerImpey wrote:
>> Hi: Was this post's question answered? I have exactly the same problem.
>> Is there a good way around? Roger
>>
>>     Arsen Hayrapetyan wrote:
>>     Hi all (especially developers), Long ago I posted a question about
>>     restriction of access to parts of the openca interfaces. There was
>>     no solution to it. I am trying to do this with RBAC, but the system
>>     is too rigid. The problem is following. I have two web-pages on my
>>     openca Public interface: 1) Page for users to request certificates
>>     2) Page for administrators to request certificates for their hosts
>>     The first page is of public access, everybody can send a request for
>>     user certificate. However, the second page should be available to
>>     those users only (administrators), who posess valid user certificate
>>     from my CA. This is a common practice: to oblige host certificate
>>     requesters to have already the certificate from the given CA. I
>>     tried to use OpenCA RBAC mechanism to restrict access to the second
>>     page. For that I added a separate command HostCSR(basically the copy
>>     of basic_csr script for CSR generation) and modified
>>     rbac/acl.xml.template file to have the following:
>>     =============================================================
>>     (0|@pub_module_id@) .* csr new .* (0|@pub_module_id@) User csr new
>>     for hosts or services .*
>>     ============================================================= As one
>>     can see everybody (regardless of the role assigned to their
>>     certificate/login name) is allowed to execute basic_csr script
>>     (first part), and only those with 'User' role are allowd ro execute
>>     the HostCSR (second part). Now when I log in with my User
>>     certificate (which is issued by my CA, registered with database on
>>     Public interface node, and has the role 'User' assigned), my
>>     certificate IS NOT retrieved from database and the role assigned to
>>     it IS NOT changed, because in access_control/pub.xml file which
>>     controls the authentication method for the interface I have
>>     ====================== none ====================== Apparently, I
>>     cannot have other authentication method because I need UNRESTRICTED
>>     access to user certificate request page. Later when it comes to
>>     execution of HostCSR command, the system examins the acl.xml file,
>>     fetches the role 'User' and compares it with the role of host
>>     certificate requester, which is EMPTY. As a result I have:
>>     "Permission denied" error. In fact the access control is controlled
>>     on the interface level (pub, ra, node), not at the level of
>>     commands. This is too rigid. What developers think about making
>>     access control more fine-grained? I would appreciate also any
>>     solution to this problem (currently I am implementing one: getting
>>     the DN of certificate which user uses to access the host CSR
>>     generation page from apache, searching for it in the database, check
>>     the role of the certificate found and granting access to the page,
>>     if the role is 'User'. But this solution is clumsy. I would like
>>     more light-weight one.) I am asking specially implementers of openca
>>     RBAC system not to ignore this e-mail. Thanks, Arsen.
>>    
>> -------------------------------------------------------------------------
>>     This SF.net email is sponsored by: Microsoft Defy all challenges.
>>     Microsoft(R) Visual Studio 2005.
>>     http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
>>     _______________________________________________ Openca-Users mailing
>>     list Openca-Users@lists.sourceforge.net
>>     https://lists.sourceforge.net/lists/listinfo/openca-users
>>
>>
>> ------------------------------------------------------------------------
>> View this message in context: Re: Role-based access control (RBAC)
>> system of OpenCA is too strict
>> <http://old.nabble.com/Role-based-access-control-%28RBAC%29-system-of-OpenCA-is-too-strict-tp12642086p29485118.html>
>> Sent from the openca-users mailing list archive
>> <http://old.nabble.com/openca-users-f3692.html> at Nabble.com.
>>
>>
>>
>> ------------------------------------------------------------------------------
>> This SF.net email is sponsored by
>>
>> Make an app they can't live without
>> Enter the BlackBerry Developer Challenge
>> http://p.sf.net/sfu/RIM-dev2dev
>>
>>
>>
>> _______________________________________________
>> Openca-Users mailing list
>> Openca-Users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/openca-users
> 
> 
> -- 
> 
> Best Regards,
> 
>       Massimiliano Pala
> 
> --o------------------------------------------------------------------------
> Massimiliano Pala [OpenCA Project Manager]                  
> ope...@acm.org
>                                                  
> project.mana...@openca.org
> 
> Dartmouth Computer Science Dept               Home Phone: +1 (603)
> 369-9332
> PKI/Trust Laboratory                          Work Phone: +1 (603)
> 646-8734
> --o------------------------------------------------------------------------
> People who think they know everything are a great annoyance to those of us
> who do.
>                                                          -- Isaac Asimov
> 
> 
>  
> ------------------------------------------------------------------------------
> This SF.net email is sponsored by 
> 
> Make an app they can't live without
> Enter the BlackBerry Developer Challenge
> http://p.sf.net/sfu/RIM-dev2dev 
> _______________________________________________
> Openca-Users mailing list
> Openca-Users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/openca-users
> 
> 

-- 
View this message in context: 
http://old.nabble.com/Role-based-access-control-%28RBAC%29-system-of-OpenCA-is-too-strict-tp12642086p29485612.html
Sent from the openca-users mailing list archive at Nabble.com.


------------------------------------------------------------------------------
This SF.net email is sponsored by 

Make an app they can't live without
Enter the BlackBerry Developer Challenge
http://p.sf.net/sfu/RIM-dev2dev 
_______________________________________________
Openca-Users mailing list
Openca-Users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openca-users

Reply via email to