Skip to content
Snippets Groups Projects
Verified Commit 3340418e authored by anarcat's avatar anarcat
Browse files

document some of my research on TLS cert management in Puppet

parent 445d71f8
No related branches found
No related tags found
No related merge requests found
......@@ -459,10 +459,28 @@ systems and see if we can reduce the number of CAs.
## Alternatives considered
The `auto-ca` machinery could be replaced by Puppet code. We could
also leverage the ACME protocol designed by letsencrypt to run our own
CA instead of just OpenSSL, although that might be overkill. In
general it might be preferable to reuse an existing solution than
The `auto-ca` machinery could be replaced by Puppet code. Here are
modules that might be relevant:
- [mmack/cfssl](https://forge.puppet.com/modules/mmack/cfssl/): interfaces [Cloudflare's cfssl](https://github.com/cloudflare/cfssl) "PKI/TLS swiss
army knife"
- [rehan/easyrsa](https://forge.puppet.com/modules/rehan/easyrsa): wrapper around [easy-rsa](https://github.com/OpenVPN/easy-rsa), itself a wrapper
around OpenSSL, not well documented
- [Aethylred/keymaster](https://forge.puppet.com/modules/Aethylred/keymaster/readme): handle X509 CAs, but also SSH host keys,
which might be in conflict with our existing code
- [puppet/openssl](https://forge.puppet.com/modules/puppet/openssl): a bit bare-bones, no revocation support
Trocla also has support for [x509 certs](https://github.com/duritong/trocla#x509) although it assumes there
is already a CA present, and it [does not support EC keys](https://github.com/duritong/trocla/issues/82).
We could also leverage the ACME protocol designed by Let's Encrypt to
run our own CA instead of just OpenSSL, although that might be
overkill.
In general, it would be preferable to reuse an existing solution than
maintain our own software in Make.
### Other Certificate Authorities
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment