Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
Wiki Replica
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Container Registry
Model registry
Operate
Environments
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
The Tor Project
TPA
Wiki Replica
Commits
c742ed76
Verified
Commit
c742ed76
authored
5 years ago
by
anarcat
Browse files
Options
Downloads
Patches
Plain Diff
clarify the design section
split each step more clearly
parent
d994a178
No related branches found
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
tsa/howto/letsencrypt.mdwn
+29
-26
29 additions, 26 deletions
tsa/howto/letsencrypt.mdwn
with
29 additions
and
26 deletions
tsa/howto/letsencrypt.mdwn
+
29
−
26
View file @
c742ed76
...
...
@@ -83,10 +83,11 @@ Then run Puppet on all affected hosts, for example the static mirrors:
How is this built anyways?
When you push to the git repository:
When you push to the git repository on the `git-rw.torproject.org`
server (currently `cupani`):
1. a per-repository hook gets called in
`/srv/git.torproject.org/git-helpers/post-receive-per-repo.d/`
`/srv/git.torproject.org/git-helpers/post-receive-per-repo.d/
admin\%letsencrypt-domains/trigger-letsencrypt-server
`
2. this hooks hits the DNS master over SSH (`letsencrypt@nevii`) and
there the `authorized_keys` file hardcodes the command to
...
...
@@ -100,27 +101,29 @@ When you push to the git repository:
points dehydrated at our configuration, in
`etc/dehydrated-config`, again in the same directory
Through that special configure, the dehydrated command is configured
to call a custom hook (`bin/le-hook`) which implements logic around
the DNS-01 authentication challenge, notably adding challenges,
bumping serial numbers in the primary nameserver, and waiting for
secondaries to sync.
Note that there's a configuration file for that hook in
`/etc/dsa/le-hook.conf`.
The `le-hook` also pushes the changes around. The hook calls the
`bin/deploy` file which installs the certificates files in
`var/result`. It also generates a Public Key Pin (PKP) hash with the
`bin/get-pin` command and appends Diffie-Hellman paramets
(`dh-$size.pem`) to the certificate chain. It finally calls the
`bin/push` command which runs `rsync` to the Puppet server, which in
turns hardcodes the place where those files are dumped (in
`pauli:/srv/puppet.torproject.org/from-letsencrypt`) through its
`authorized_keys` file.
Finally, those certificates are collected by Puppet through the `ssl`
module. Pay close attention to how the
`tor-puppet/modules/apache2/templates/ssl-key-pins.erb` template
works: it will not deploy key pinning if the backup `.pin` file is
missing.
5. Through that special configuration, the dehydrated command is
configured to call a custom hook (`bin/le-hook`) which implements
logic around the DNS-01 authentication challenge, notably adding
challenges, bumping serial numbers in the primary nameserver, and
waiting for secondaries to sync. Note that there's a configuration
file for that hook in `/etc/dsa/le-hook.conf`.
6. The `le-hook` also pushes the changes around. The hook calls the
`bin/deploy` file which installs the certificates files in
`var/result`.
7. It also generates a Public Key Pin (PKP) hash with the
`bin/get-pin` command and appends Diffie-Hellman paramets
(`dh-$size.pem`) to the certificate chain.
8. It finally calls the `bin/push` command which runs `rsync` to the
Puppet server, which in turns hardcodes the place where those
files are dumped (in
`pauli:/srv/puppet.torproject.org/from-letsencrypt`) through its
`authorized_keys` file.
9. Finally, those certificates are collected by Puppet through the
`ssl` module. Pay close attention to how the
`tor-puppet/modules/apache2/templates/ssl-key-pins.erb` template
works: it will not deploy key pinning if the backup `.pin` file is
missing.
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment