You are browsing a read-only backup copy of Wikitech. The live site can be found at wikitech.wikimedia.org

PKI/Policy: Difference between revisions

From Wikitech-static
< PKI
Jump to navigation Jump to search
imported>Majavah
(fix headings)
 
imported>Muehlenhoff
(→‎ROOT CA: typo)
Line 1: Line 1:
== ROOT CA ==
== ROOT CA ==
The [[PKI/root ca|root CA]] is managed on a dedicate server.  New intermediated certificates need to be created on this server and copied into puppet manually as described on the [[PKI/root ca|root CA]] page
The [[PKI/root ca|root CA]] is managed on a dedicated server.  New intermediated certificates need to be created on this server and copied into puppet manually as described on the [[PKI/root ca|root CA]] page


=== Certificate Parameters ===
=== Certificate Parameters ===

Revision as of 11:18, 9 March 2021

ROOT CA

The root CA is managed on a dedicated server. New intermediated certificates need to be created on this server and copied into puppet manually as described on the root CA page

Certificate Parameters

The root Ca is configured with the following parameters

  • Algorithm: ecdsa-with-SHA512
  • Size: 521
  • Key Usage: Certificate Sign, CRL Sign
  • pathlen: N/A
  • Expiry: 10 years

Intermediate CA

The intermediate CA's are managed via puppet with the private key distributed via the puppet private repo. Hosts with a puppet agent certificate are able to requests certificates via the cfssl api at https://pki.descover.wmnet:8888 or by using the puppet profile profile::pki::client


When to create a new intermediate CA

We should create a new intermediate CA for every unique services that requires TLS terminations this means for example that we would have separate intermediate CA’s for e.g. debmonitor, database connections, backups etc. Engineers should use the default profiles and options unless there is a reason not to. e.g. the expiry time is to short as we can easily restart services

certificate parameters (defaults)

  • Algorithm:ecdsa-with-SHA512
  • Size: 521
  • Key Usage: Certificate Sign, CRL Sign
  • pathlen: 1
  • Expiry: 5 Years

Default signing policies

By default intermidiate CA's are use the following defaults for all signing requests.

The defaults can also be overridden by specifying a profile to use. by default we configure additional ocsp and server profiles

Overtime we hope to reduce the expiry down to 24 hours however we would like to get more operational experience first

OCSP profile

This policy is only used for creating the ocsp signing certificate for the specific intermediate CA

  • Key Usage: digital signature, ocsp signing
  • Expiry: 43800h

Server profile

This policy is only used for creating the ocsp signing certificate for the specific intermediate CA

  • Key Usage: digital signature, key encipherment, server auth
  • Expiry: 96h


OCSP Responder

Currently the OCSP responder runs on the same host as intermediate signing server. We currently maintain a patch so that the ocsp refresh services is able to work with the same databased used but cfssl-multirootca

CA Bundles

Ca bundles are maintained and available via http://pki.descover.wmnet/bundles/$ca.pem. Please not the short comings we currently have around bundles and intermediated certificates documented on the Root ca page