On 12/13/2011 02:40 PM, Daniel Pittman wrote:
On Tue, Dec 13, 2011 at 05:11, Dan White<y...@comcast.net> wrote:
I am dealing with SSL certificates for secure rsyslog that need to be created
on each machine and then collected onto the logging server.
Getting a file from puppetmaster to client is trivial, but how do I reverse the
process ?
Can you reverse that, generate the certificates on the master, and
push them out? There are plenty of tools to hook in on the master
side to let you do that effectively.
ssh::auth works something like this, or so I gather. I never actually
tried it:
http://projects.puppetlabs.com/projects/1/wiki/Module_Ssh_Auth_Patterns
The problem with doing it this way is it takes the "a" out of
"asymmetric key". Sure, the master could "forget" the private key after
it has sent it to the client, but if the master has been compromised,
maybe someone intercepts it before you delete it. IE, someone can
compromise the puppet master or the client to gain the information
needed to impersonate the client. You might as well just generate a long
random key and share it, because it has the same properties, but is simpler.
Also, consider that distributing certs with Puppet merely shifts your
trust to the puppet certs. If an attacker gains access to a puppet
client's private key, he can impersonate the puppet client and have the
master push the syslog private key to the attacker's system. Obviously
an attacker gaining access to the puppet master private key is even
worse. Since puppet master <-> client communications are already secured
via SSL, perhaps it would be more convenient to just use those certs.
Your master already knows the public keys of all the clients.
--
You received this message because you are subscribed to the Google Groups "Puppet
Users" group.
To post to this group, send email to puppet-users@googlegroups.com.
To unsubscribe from this group, send email to
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at
http://groups.google.com/group/puppet-users?hl=en.