On Wed, Aug 24, 2011 at 7:32 AM, It Dept <i...@ukcrd.com> wrote:
> Hello,
>
> We are  attempting to set up a completely secure puppet based system.
> Puppet's encrypted communications between the master and the client is
> ideal, but its client joining and certificate transfer mechanism is
> not. The client certificate request and signed certificate response is
> vulnerable to man-in-the-middle attacks since the CA is not verified.

The CA pub keys should be deployed to the agent as part of the
provisioning process. This is no different than how your browser trust
a well known certificate signing authority, it has to be deployed to
the client in advance. Ideally, roll it into a package and generate it
with a sufficiently long TTL.

> We would like a system which could not be compromised by the removal
> of a file from a client coupled with a man-in-the-middle attack. Does
> anyone know of any magic "force secure connections" options or
> similar?

Man in the middle in itself doesn't pose an issue, however if the
attacker have access to the agent system to replace the entire ssl
directory, I think you have bigger problem on your hand, and it's not
something certificates were designed to protect you against. This is
no different then asking the question, if someone replaced my web
browser certificate trust and hijacks my DNS, how do I know he's not
acting as man in a middle as my bank's website?

Thanks,

Nan

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to