Hi Federico,

A lot of good ideas to dig but right now I also need to put my energy on 
other priorities.
I know the problem and will see on time how to address that.

Thanks

Le vendredi 17 février 2017 14:54:53 UTC+5:30, Federico Capoano a écrit :
>
> Hi Xavier
>
> See inline replies
>
> On Fri, Feb 17, 2017 at 5:27 AM Xavier Maysonnave <x.mays...@gmail.com 
> <javascript:>> wrote:
>
>> Hi Federico,
>>
>> I was thinking a little deeper about this topic and here are my thoughts.
>>
>> Originally I started with a crytpic issue I got at the router level a 
>> curl error code 60 because I didn't thought to use the appropriate 
>> directive in my playbook.
>> Then I started to figure out how to address that.
>>
>> In my plan I would like to identify my routers with a hostname like 
>> xx-yy-zz-sequence.mydomain. 
>>
>
> Nice!
>  
>
>> As LEDE or OpenWRT generates their own self-signed certificates as 
>> OpenWisp do I started to wonder if the controller could help in that matter.
>> The aim of the controller is to control the routers.
>>
>  
> It could help. OpenWISP can already automatically generate VPN 
> certificates for VPN clients so there's a mechanism to deal with this kind 
> of functionality, although it was designed for VPNs and not for TLS, but it 
> could be adapted by somebody willing to work on it.
>
> On the other side such tools are meant to be part of an infrastructure and 
>> probably not accessible publicly.
>> Routers will use a PPTP or an OpenVPN tunnel to talk with servers 
>> (managers, db, freeradius, controllers, monitoring, etc...)
>> This approach limits the needs of a public Letsencrypt system as you 
>> pointed out.
>>
>  
> Cool. If you want to use an OpenVPN tool, OpenWISP2 provides an automated 
> way to create a VPN template which is bound to a CA and generates client 
> certificates automatically.
>
> We haven't built in out of the box support for PPTP yet.
>
> In my organization we use our own CA and as such only the people who 
>> manage the servers will need to load the appropriate CA in their browser.
>> If the controller can generates certificates with a loaded CA and help to 
>> deploy the certificates it will be very convenient.
>>
>
> For the long-term, some automated mechanism can be implemented with some 
> work. But we need to attract more contributors in order to be able to 
> achieve this. I cannot work on this feature right now because my company 
> (which runs the public wifi service from which OpenWISP was born) doesn't 
> need this right now.
>
> For the short term, you can probably get away by using the same self 
> signed certificate (maybe a *.mydomain.com?) and putting that certificate 
> into a template in OpenWISP2, which overwrites the default certificate 
> auto-generated by luci-ssl. Not 100% sure it would work because I'm not 
> sure if the browser would complain for some reason anyway, but it wouldn't 
> cost a lot for you to try.
>  
>
>> I would say that from a letencrypt point of view the effort is useless 
>> however from an infrastructure point of view the appropriate tooling at the 
>> controller level will be very useful.
>>
>
> Yes. A few months ago I thought about a generic and extensible way to add 
> this kind of functionality via a concept called "generator templates".
>
> Immagine it like a template, but instead of putting in static values, the 
> generator references some kind of generator backend (like a configuration 
> backend) which takes some parameters as input and returns some output each 
> time it is associated to a configuration. Here's a few examples of how it 
> could work.
>
> Example1: TLS certificate generator
> you setup this generator once, setting stuff like CA and other input 
> parameters, and each time it is associated to a configuration it will 
> generate a new TLS certificate that will be used by luci
>
> Example2: Ip address generator
> there could be a generator that talks to an external service like 
> https://phpipam.net/, so you could set in the generator the parameters 
> for the connection to its API, and the generator could automatically figure 
> out an ip address to allocate for each configuration
>
> Example3: VPN client certificate generator
> the automatic VPN client feature that is now built with an adhoc 
> implementation could be implemented with a generator and the adhoc 
> implementation could be removed. This would be very similar to the TLS 
> certificate generator.
>
> This would be a very powerful feature. But let's be realistic: we don't 
> have enough resources to implement this right now. But I want to keep this 
> idea for the future. If we can implement this in a year or so, this feature 
> can really alleviate a lot of pain that small organisations face when 
> managing networks. They do a lot of stuff by hand that never gets updated 
> because those who work on it either do not have the time or are terrified 
> of breaking stuff.
>
> The other face of the medal is that this kind of automation is hard to 
> build and hard to use. It would take many iterations and a lot of patience 
> to get right.
>
> Federico
>

-- 
You received this message because you are subscribed to the Google Groups 
"OpenWISP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to openwisp+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to