On 10/07/2013 05:19 AM, Oleg Antonenko wrote:

Hi Nathan, Dmitri,

Thanks for the info and your comments. Please see my answers inline in red…

 

From: Nathan Kinder [mailto:nkinder@redhat.com]
Sent: 04 October 2013 20:53
To: dpal@redhat.com
Cc: Oleg Antonenko; Ciaran Bradley; pki-users@redhat.com
Subject: Re: [Pki-users] will the new version of RHCS support RHEL6?

 

On 10/04/2013 11:37 AM, Dmitri Pal wrote:

On 10/04/2013 02:06 PM, Nathan Kinder wrote:

On 10/04/2013 10:44 AM, Dmitri Pal wrote:

On 10/04/2013 12:12 PM, Oleg Antonenko wrote:

That’s all clear now, thank you Dmitri!

 

Regarding our wish list J

 

Basically we just have evaluated ejbCA, so we want something similar but without EJB and heavy weight app server… i.e. -

UI for managing certs


Can you define workflows and actors?

[OA] Workflow for iOS devices is well defined in the Apple’s guide referenced below. We will be building similar for Android – but simpler without a Profile Server. We use an MDM system for distributing SCEP profile/configuration to devices…


Who does what when to the certs?

[OA] Device itself plays a role of a SCEP client. After obtaining a cert devices would you use for setting up a VPN channel. Normally we are not planning actively manage certs for devices, except revocation. But for SSL servers we would have to issue certs manually, and then export full keysotre for manual deployment.


Are certs associated to users or to devices?

[OA] To devices, so the CN will contain a device ID. At the same time subjectAltName will be set to user’s email. So in theory it would be good to manage users but that is for the future…


Do you track devices in the CA or somewhere else?

[OA] No, we will track them in our application, which will be integrated with MDM for device enrolment and configuration (e.g. installing our VPN Client App & setting up SCEP Profile). So we will need the CA API only for revoking certs.
Are users enterprise users (belong to one company) or internet users (any user from the street)?

[OA] Enterprise




Support SCEP & OCSP


Dogtag supports both. First as a protocol the second one is the component that can be installed and turned on.

[OA] Those are reasons for selecting it

For SCEP do you actually need a SCEP client ? What do you use a SEP client?

[OA] For iOS I presume there is an embedded client? For Android we’re developing our own.

Are there any specific features of the SCEP protocol that are required that are currently natively not supported by the Dogtag CA?
[OA] There is one area I still don’t have full understanding of.

In the SCEP specs they say that a request for a cert is a PKCS#7 structure signed by either –

·         A cert issued earlier by the requested CA (re-issuance)

·         Self-signed cert

·         A 3rd party cert signed by a trusted CA (e.g. a generic transport cert)

The P7 structure contains a P10 request encrypted with the requested CA pub key.

When testing issuing certs for iOS devices in dogtag our developers had an impression that the P10 is not encrypted, and the P7 is not signed. I’m frankly not convinced by their words. Could you confirm please that the SCEP cert request is processed in dogtag as above?



I would leave this to Nathan to confirm.


API for issuing and revoking certs (cert-based request auth is preferrable) – as we want to integrate out product for revoking certs


The product can be given a keytab and authenticate kerberos to the IPA. It is very simple and would be easier to accomplish.
API for managing serts for hosts and services already available in IPA so the question is what the certs are associated with is very important.
Also certmonger can be used for fetching certs and storing them in the files or DBs you need.
Are you aware of certmonger?

[OA] No, did not hear before. As I understand it has a command line / d-bus interfaces? We need something like a WS or REST.


The point is that you can create a simple WS or REST server around it very easily.


It can be effectively a whole alternative solution. From your portal you call Certmonger on the local system via CLI or D-BUS interface and it gets a cert for you.
But I need to understand the workflow better. If you generate he PKI pair on you portal and deliver them to a device it is a perfect solution. If you use client side software on the mobile platform to send the signing request then it is a different workflow and you need to send such request to CA.
[OA] Yes, the latter…


I see.



Desirable - Export a key store (including cert) as PKCS#12, PEM (for manual deployment of certs on e.g. SSL servers).


When and where? During issuance or ability to later export it from the back end store?

[OA] For SSL serves terminating VPN connection from mobile devices. So we would create them before and parallel to issuing to devices… I think it’s going to be like an admin would login into the UI, enter machine details for the cert & key store. In response the CA would generate a keypair and issue a cert. Then we would need to export the keystore either as p12 or PEM file…


You might want to consider using IPA to mange servers and their certs. AFAIR IPA allows you to save certs in a PEM file.
Then for the devices you will use Dogtag directly but for servers you will leverage all the advantages of IPA. Seems like a double win.

 

 

As mentioned earlier we are planning to use a CA for issuing and delivering certs to mobile devices via SCEP.


I am sorry I am not familiar with the details of the workflow in this case.
Can you describe the chain of communication between mobile device, your portal and CA and what protocols used where?

iOS devices uses SCEP to enroll for certificates.  The basic flow is that you have a "Profile Server", which is responsible for delivering a XML profile onto the authenticated iOS device.  This XML profile contains details on how the iOS device should contact the CA via SCEP.  When the profile is installed, the SCEP request is made and the returned certificate is installed.  There is a good visual workflow of this process in this document:

https://developer.apple.com/library/ios/documentation/networkinginternet/conceptual/iphoneotaconfiguration/OTASecurity/OTASecurity.html#//apple_ref/doc/uid/TP40009505-CH3-SW1


This is very helpful.
So it seems that IPA CA might be used for this as is. The certs would just not be associeted with any specific entry and leave in the CA storage.
Do I get it right?

I think so.[OA] Yes, correct. Btw, what storage the CA is using? Ldap?


Yes.



The trick might be to add additional profile to IPA CA after IPA installation and use that profile instead of the default one in SCEP requests.

Yes, getting the profile set up would be then main thing to tackle.

[OA] Could you give me a bit more insight what is advantage/why to use an additional SCEP profile?


Cert profile is a template for issuing certs.
Dogtag allows you to have more than a single template.
This makes possible to issue certs containing different contents and used for different purposes: VPN, authentication, message signing etc.
IPA installs just one profile. I suspect that mobile devices would need to have certs with specific attributes in them. For that you would need to either modify the existing profile or add another one. Latest versions of Dogtag CA have REST API to manage these profiles programmatically but this capability is not integrated into IPA yet. So with existing IPA version you would need to either modify existing profile or add a new one manually. If you start with latest Dogtag and version in Fedora 19 that will be a part of RHEL7 you can probably use REST API directly and add/modify profiles as you need. In future IPA will provide API/CLI/UI that would wrap this REST API and allow you to mange this consistently with the rest of the IPA objects.



Since with Dogtag 10 you have REST API and CLI to add and manage those profiles and the data is sort of orthogonal to IPA data I do not see a reason why portal can't integrate those and use them directly.

To clarify, profile management REST interfaces are in Dogag 10.1 (not 10.0).  Regardless, profiles can be configured without the REST interfaces and be used directly with IPA being none the wiser.
[OA] We would configure the CA manually. API is needed for cert revocation only. Does dogtag 9 supports REST for revocation?

Dogtag 9 does not support any REST API.




-NGK



So far we managed to issue certs for iphones via SCEP in ejbCA and Dogtag (pki-ca 9.0.3-30 package).

 

Dogtag wins provided we can carry on using standalone CA services in the future for free as a part of RHEL IPA…


Yes this is a clear winner keeping in mind that we had some distant plans about the use case you are describing. Unfortunately we were not able to get a good understanding of the details of the use case in the past thus so many questions. Sorry.
[OA] That’s cool, it seems you’ve got it right…


We would like to help you as much as possible with what we have now and give you a clear migration path for the solutions we are building. This is why Dogtag 10+ and IPA 3.2+ is probably the best starting point.



Thanks
Dmitri


 

Thanks,

Oleg

 

 

 

From: Dmitri Pal [mailto:dpal@redhat.com]
Sent: 04 October 2013 16:54
To: Oleg Antonenko
Cc: Nathan Kinder (nkinder@redhat.com); Ciaran Bradley; pki-users@redhat.com
Subject: Re: [Pki-users] will the new version of RHCS support RHEL6?

 

On 10/04/2013 11:48 AM, Oleg Antonenko wrote:

Hi Dmitri, Nathan,

Thank you for speedy responses.

 

Could you please confirm my understanding?

 

RHCS is going to be shipped as a part of RHEL7.x in the foreseeable future;


It is not "a part" it is a stand alone product and not free.



IPA is a free part of RHEL 6.x and will remain as such in the foreseeable future;


Correct and same is true for RHEL7.x



RHEL 6.x does not ship RHCS, but includes only pki-ca packages in order to support IPA.


Correct



 

Could you also clarify your point here ?

 

The CA portion in RHEL is not supported by Red Hat for standalone use without an entitlement for the rest of RHCS, which isn't available on RHEL 6


RHCS is a layered product and can be acquired separately.
We do not ship a version of RHCS on top of RHEL6. It is a big product and takes a lot of time to deliver.
We decided to skip a major RHEL version.



 

Does it mean RHCS is not free?


Correct.


 

 

Regarding this -

We would be actually very interested if we can support this use case with core IPA.
Would you be interested in a conversation about this?



Yes, we’d love to.


Ok let us have one.
I am sorry, I have not been following the whole thread, just this mail caught my eye so what kind of functionality we are looking for?
Can you formulate a "wish list" for your use case assuming the CA is a part of IPA?




 

Many thanks,

Oleg

 

From: pki-users-bounces@redhat.com [mailto:pki-users-bounces@redhat.com] On Behalf Of Dmitri Pal
Sent: 04 October 2013 16:21
To: pki-users@redhat.com
Subject: Re: [Pki-users] will the new version of RHCS support RHEL6?

 

On 10/04/2013 11:08 AM, Oleg Antonenko wrote:

Hi Nathan,

Could you please shed some light on the future plans for the pki-ca portion of RHEL?

Will it be included in the standard RHEL distribution in the future?


Dogtag 10+ will become a RHSC product on top of RHEL7.x

Some of its portions will be gradually included into IPA that comes for free with RHEL.
IMO full blown IPA is not that "full blown" in this case.

We would be actually very interested if we can support this use case with core IPA.
Would you be interested in a conversation about this?

Thanks
Dmitri
 



 

I’m asking because we’re planning to use the CA bit only for issuing certificates to mobile devices via SCEP. We do not require any other services or the full blown IPA…

 

With thanks,

Oleg

 

From: pki-users-bounces@redhat.com [mailto:pki-users-bounces@redhat.com] On Behalf Of Nathan Kinder
Sent: 27 September 2013 20:03
To: pki-users@redhat.com
Subject: Re: [Pki-users] will the new version of RHCS support RHEL6?

 

On 09/26/2013 10:25 PM, 安 泱 wrote:

Hi all,

I'm a beginner of the dogtag certificate system, dogtagRHCSis a wonderful project, but I'm confused about RHCS, could you give any help?

The latest version of RHCS is 8.1, which is based on dogtag 8.1, it supports RHEL5.8, and in RHEL6, pki-ca 9.0.3 was included without the other 5 subsystems, could you show me the consideration why RHCS do not support RHEL6?
Is RHEL6 not secure enough or some other reasons

It was simply not a targeted platform (nor are there plans to release it there).  The pki-ca portion is included for use by IdM (based on the FreeIPA project).

Thanks,
-NGK





Regards.
An Yang






_______________________________________________
Pki-users mailing list
Pki-users@redhat.com
https://www.redhat.com/mailman/listinfo/pki-users

 






_______________________________________________
Pki-users mailing list
Pki-users@redhat.com
https://www.redhat.com/mailman/listinfo/pki-users






-- 
Thank you,
Dmitri Pal
 
Sr. Engineering Manager for IdM portfolio
Red Hat Inc.
 
 
-------------------------------
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/
 
 





-- 
Thank you,
Dmitri Pal
 
Sr. Engineering Manager for IdM portfolio
Red Hat Inc.
 
 
-------------------------------
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/
 
 




-- 
Thank you,
Dmitri Pal
 
Sr. Engineering Manager for IdM portfolio
Red Hat Inc.
 
 
-------------------------------
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/
 
 

 




-- 
Thank you,
Dmitri Pal
 
Sr. Engineering Manager for IdM portfolio
Red Hat Inc.
 
 
-------------------------------
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/
 
 

 



-- 
Thank you,
Dmitri Pal

Sr. Engineering Manager for IdM portfolio
Red Hat Inc.


-------------------------------
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/