On 04/12/2016 03:43 PM, Hongbin Lu wrote:

Hi all,

In short, some Magnum team members proposed to store TLS certificates in Keystone credential store. As Magnum PTL, I want to get agreements (or non-disagreement) from OpenStack community in general, Keystone community in particular, before approving the direction.

In details, Magnum leverages TLS to secure the API endpoint of kubernetes/docker swarm. The usage of TLS requires a secure store for storing TLS certificates.

No it does not.

Nothing required "secure storing of certificates."

What is required is "secure storing of private keys." Period. Nothing else needs to be securely stored.

Next step is the "signing" of X509 certificates, and this requires a CA. Barbican is the OpenStack abstraction for a CA, but still requires a "real" implementation to back to. Dogtag is available for this role.


Now, what Keystone can and should do is provide a way to map an X509 Certificate to a user. This is actually much better done using the Federation approach than the Credentials store.

Credentials kinda suck. They should die in a fire. They can't, but they should. Different rant though.

So, to nail it down specifically: Keystone's sole role here is to map the Subject from an X509 certificate to a user_id. If you try to do anything more than that with Keystone, you are in a state of sin.

So, if what you want to do is to store an X509 Certificate in the Keystone Credentials API, go for it, but I don;'t know what it would buy you, as only the "owner" of that cert would then be able to retrieve it.


If, on the other hand, what you want to do is to decouple the request/approval of X509 dfrom Barbican, I would suggest you use Certmonger. It is an Operating system level tool for exactly this purpose. And then we should make sure that Barbican can act as a CA for Certmonger (I know that Dogtag can already).


There is nothing Magnum specific about this. We need to solve the Cert story for OpenStack in general. We need TLS for The Message Broker and the Database connections as well as any HTTPS servers we have.




Currently, we leverage Barbican for this purpose, but we constantly received requests to decouple Magnum from Barbican (because users normally don’t have Barbican installed in their clouds). Some Magnum team members proposed to leverage Keystone credential store as a Barbican alternative [1]. Therefore, I want to confirm what is Keystone team position for this proposal (I remembered someone from Keystone mentioned this is an inappropriate use of Keystone. Would I ask for further clarification?). Thanks in advance.

[1] https://blueprints.launchpad.net/magnum/+spec/barbican-alternative-store

Best regards,

Hongbin



__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: [email protected]?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: [email protected]?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to