Skip to content

Commit 742ccf5

Browse files
committed
more rewording from puppet to OpenVox
Signed-off-by: Martin Alfke <ma@betadots.de>
1 parent 09e2998 commit 742ccf5

5 files changed

Lines changed: 10 additions & 18 deletions

File tree

docs/background/index.markdown

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,14 @@ toc: false
66

77

88
This page collects information about foundational technologies and practices.
9-
These are not tied to any specific Puppet product, but we believe many of our users will either need to or want to be familiar with them.
9+
These are not tied to any specific OpenVox product, but we believe many of our users will either need to or want to be familiar with them.
1010

1111
## [SSL and Related Topics](./ssl/)
1212

13-
Puppet relies on HTTPS to secure its communications and identify nodes.
14-
Using it effectively requires familiarity with concepts like certificates and public key cryptography, which can sometimes present a steep learning curve for new Puppet users.
13+
OpenVox relies on HTTPS to secure its communications and identify nodes.
14+
Using it effectively requires familiarity with concepts like certificates and public key cryptography, which can sometimes present a steep learning curve for new OpenVox users.
1515

16-
This series of articles explains the foundations of Puppet's security model, which is also used by many other systems across the internet.
16+
This series of articles explains the foundations of OpenVox's security model, which is also used by many other systems across the internet.
1717

1818
- [Index](./ssl/index.html)
1919
- [What is Public Key Cryptography?](./ssl/public_key.html)

docs/background/ssl/cert_anatomy.markdown

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ To inspect a certificate, you must first dump it to a text format.
8585

8686
* On the CA OpenVox server node, this can be done with the `puppetserver ca print --certname <name>` command.
8787
* The `openssl x509 -text -noout -in <file>` command will also work and is not restricted to the CA puppet master, although it requires a full file path.
88-
Note that it also will not use friendly names for any Puppet-specific certificate extensions (explained further below).
88+
Note that it also will not use friendly names for any OpenVox-specific certificate extensions (explained further below).
8989

9090
Here's the certificate from above in human-readable form:
9191

docs/background/ssl/certificates_pki.markdown

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ The traditional way to manage revocation info is with a **certificate revocation
9494

9595
Participants in the PKI should regularly retrieve a copy of each CA's CRL, and should double-check certificates against it when checking their validity.
9696

97-
This is the method of revocation checking that Puppet uses.
97+
This is the method of revocation checking that OpenVox uses.
9898

9999
### Online Certificate Status Protocol (OCSP)
100100

@@ -190,7 +190,7 @@ Sometimes this agreement is active; other times, it's tacit, like when you insta
190190
* Because the CA approves all certificate metadata, participants don't have to keep a list of all the public keys they'll need to know about; instead, they can just trust any valid certificate they are shown.
191191
* Because certificates include public keys, only their rightful owner can present them as ID. A stolen cert is inert without a stolen private key.
192192
* The CA can also revoke certificates, but that only works if everybody regularly checks for revoked certificates (via a traditional CRL or more modern means). This is even harder to ensure than it sounds.
193-
* Puppet has built-in tools to make managing a CA easier. These are covered in other documentation.
193+
* OpenVox has built-in tools to make managing a CA easier. These are covered in other documentation.
194194

195195
## Next in This Series
196196

docs/background/ssl/https.markdown

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -72,16 +72,8 @@ When the proxy receives a reply, it will forward it to the client along the orig
7272

7373
If the application needs any SSL or certificate data, the proxy can be configured to publish it by inserting the data into the HTTP headers of the request it sends to the backend application server.
7474

75-
An example of this is a puppet master running with the Nginx + Unicorn stack:
76-
77-
* Nginx terminates SSL, and inserts the SSL client authentication status and client certificate DN into the HTTP headers of a new request. It sends this request to the Unicorn workers.
78-
* A Unicorn worker receives the unencrypted request, and, according to the common gateway interface (CGI) standard, publishes all HTTP header information as CGI variables,
79-
including the SSL information inserted by Nginx. It uses the Rack interface to translate the HTTP request into a request to the puppet master application.
80-
* The puppet master application reads SSL information from pre-arranged environment variables, and uses its auth.conf configuration to decide whether to serve the request.
81-
If yes, it uses its own application logic to decide what the request should be. Any response passes back through the Unicorn worker and Nginx to make its way to the puppet agent client.
82-
8375
## End of Series
8476

85-
At this point, you should understand enough about the fundamentals to understand any documentation on this site about managing Puppet's certificates, CA, and HTTPS authorization tools.
77+
At this point, you should understand enough about the fundamentals to understand any documentation on this site about managing OpenVox's certificates, CA, and HTTPS authorization tools.
8678

8779
For a little more practical depth, you may also want to see the [appendix on certificate anatomy.][certificate_anatomy]

docs/background/ssl/tls_ssl.markdown

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ SSL ("secure socket layer") is an older version of that same protocol, which is
1414

1515
> ## A Note on Names
1616
>
17-
> "TLS" and "SSL" both refer to essentially the same thing. Informally, many people (including us at Puppet Labs) often just say "SSL" to refer to any combination of TLS and SSL, mostly because old habits die hard.
17+
> "TLS" and "SSL" both refer to essentially the same thing. Informally, many people often just say "SSL" to refer to any combination of TLS and SSL, mostly because old habits die hard.
1818
>
1919
> Most tools can use multiple versions of the protocol, and the combination of versions they support will often cross the arbitrary TLS/SSL boundary. (Usually something like SSL 3.0, TLS 1.0, and TLS 1.1.)
2020
> Since clients and servers can negotiate versions on the fly, the exact protocol you'll be using at any given moment depends on the configuration of every tool that might interact with the system.
@@ -42,7 +42,7 @@ After a client starts the process, an SSL connection involves the following proc
4242
* The client software validates that certificate, based on its list of trustworthy CAs, the CRLs it has available, and the validity period of the certificate. If it won't validate, the client bails.
4343
* **Optionally,** the client can present a certificate of its own to the server.
4444
The client will also sign a piece of server-provided data to prove that it possesses the corresponding private key. The server will validate the client certificate before continuing.
45-
* This only happens if the server explicitly requests **client authentication.** Most HTTPS sites on the web don't require client authentication. Puppet, however, does (for some services).
45+
* This only happens if the server explicitly requests **client authentication.** Most HTTPS sites on the web don't require client authentication. OpenVox, however, does (for some services).
4646
* The client sends a temporary "session" key to the server, encrypted so that only the owner of the server certificate can read it.
4747
* Both client and server use that session key to encrypt all subsequent traffic in the connection, using a symmetric cypher.
4848
(Using a public key cypher wouldn't be appropriate, since the client doesn't always provide a public key.)

0 commit comments

Comments
 (0)