On Wed, Mar 11, 2020, at 2:58 PM, Brian Bouterse wrote:
> 
> 
> On Wed, Mar 11, 2020 at 2:34 PM Justin Sherrill <jsher...@redhat.com> wrote:
> > We had discussed base64 encoding the cert in the webserver on the way in 
> > and then letting cert guard decode it. While that's not ideal I think it 
> > has some advantages over moving the full auth into the webserver. What was 
> > your motivation for going with that approach over the base64 encoding 
> > approach? 
> 
> Thank you for this question! I ended up with a few different concerns 
> about the base64 encode-and-forward idea. Architecturally the concern 
> with it is that it's frowned upon to forward the client's TLS cert 
> beyond the TLS termination point because that is what MITM software 
> does. Also, there are some practical concerns: one, I don't think nginx 
> can provide a similar runtime base64 encoding feature. Also I was 
> concerned with header length truncation and what happens when the 
> certificates get longer.
> 
> Overall having auth that is based on TLS certificates brought me to the 
> conclusion that we need to auth where the TLS is terminated. What do 
> you think?
> 
> More thoughts and questions are welcome. This is a good discussion.
> 

I agree with your points.

Also, having the auth in the web server would allow me (random bystander) to 
use the functionality without actually running a full pulp; just plain 
candlepin with yum repos behind a web server.


V/r,
James Cassell

> 
> > On 3/11/20 2:11 PM, Brian Bouterse wrote:
> >> tl;dr: What we have today cannot work with rhsm certificates which Katello 
> >> uses. To resolve, we need to have content guard checking moved to the 
> >> webserver configs for apache and nginx and not done in pulp-content as it 
> >> is today. https://pulp.plan.io/issues/6323
> >> 
> >> We need to bring the auth to where TLS is terminated because we can't 
> >> being the client certs to pulp-content due to invalid header characters. 
> >> As is, pulp-certguard cannot work with Katello's cert types (rhsm certs) 
> >> so that is driving my changes.
> >> 
> >> If anyone has major concerns or other ideas please let me know. In the 
> >> meantime I'm proceeding moving the authorization to the webserver and then 
> >> updating pulp-certguard to work with that. This will make pulp-certguard's 
> >> GA tied to pulpcore 3.3.0. Feedback is welcome.
> >> 
> >> [0]: https://pulp.plan.io/issues/6323
> >> 
> >> Thanks,
> >> Brian
> >> 


_______________________________________________
Pulp-dev mailing list
Pulp-dev@redhat.com
https://www.redhat.com/mailman/listinfo/pulp-dev

Reply via email to