You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/background/index.markdown
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,14 +6,14 @@ toc: false
6
6
7
7
8
8
This page collects information about foundational technologies and practices.
9
-
These are not tied to any specific Puppet product, but we believe many of our users will either need to or want to be familiar with them.
9
+
These are not tied to any specific OpenVox product, but we believe many of our users will either need to or want to be familiar with them.
10
10
11
11
## [SSL and Related Topics](./ssl/)
12
12
13
-
Puppet relies on HTTPS to secure its communications and identify nodes.
14
-
Using it effectively requires familiarity with concepts like certificates and public key cryptography, which can sometimes present a steep learning curve for new Puppet users.
13
+
OpenVox relies on HTTPS to secure its communications and identify nodes.
14
+
Using it effectively requires familiarity with concepts like certificates and public key cryptography, which can sometimes present a steep learning curve for new OpenVox users.
15
15
16
-
This series of articles explains the foundations of Puppet's security model, which is also used by many other systems across the internet.
16
+
This series of articles explains the foundations of OpenVox's security model, which is also used by many other systems across the internet.
17
17
18
18
-[Index](./ssl/index.html)
19
19
-[What is Public Key Cryptography?](./ssl/public_key.html)
Copy file name to clipboardExpand all lines: docs/background/ssl/cert_anatomy.markdown
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,7 +85,7 @@ To inspect a certificate, you must first dump it to a text format.
85
85
86
86
* On the CA OpenVox server node, this can be done with the `puppetserver ca print --certname <name>` command.
87
87
* The `openssl x509 -text -noout -in <file>` command will also work and is not restricted to the CA puppet master, although it requires a full file path.
88
-
Note that it also will not use friendly names for any Puppet-specific certificate extensions (explained further below).
88
+
Note that it also will not use friendly names for any OpenVox-specific certificate extensions (explained further below).
89
89
90
90
Here's the certificate from above in human-readable form:
Copy file name to clipboardExpand all lines: docs/background/ssl/certificates_pki.markdown
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -94,7 +94,7 @@ The traditional way to manage revocation info is with a **certificate revocation
94
94
95
95
Participants in the PKI should regularly retrieve a copy of each CA's CRL, and should double-check certificates against it when checking their validity.
96
96
97
-
This is the method of revocation checking that Puppet uses.
97
+
This is the method of revocation checking that OpenVox uses.
98
98
99
99
### Online Certificate Status Protocol (OCSP)
100
100
@@ -190,7 +190,7 @@ Sometimes this agreement is active; other times, it's tacit, like when you insta
190
190
* Because the CA approves all certificate metadata, participants don't have to keep a list of all the public keys they'll need to know about; instead, they can just trust any valid certificate they are shown.
191
191
* Because certificates include public keys, only their rightful owner can present them as ID. A stolen cert is inert without a stolen private key.
192
192
* The CA can also revoke certificates, but that only works if everybody regularly checks for revoked certificates (via a traditional CRL or more modern means). This is even harder to ensure than it sounds.
193
-
*Puppet has built-in tools to make managing a CA easier. These are covered in other documentation.
193
+
*OpenVox has built-in tools to make managing a CA easier. These are covered in other documentation.
Copy file name to clipboardExpand all lines: docs/background/ssl/https.markdown
+1-9Lines changed: 1 addition & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,16 +72,8 @@ When the proxy receives a reply, it will forward it to the client along the orig
72
72
73
73
If the application needs any SSL or certificate data, the proxy can be configured to publish it by inserting the data into the HTTP headers of the request it sends to the backend application server.
74
74
75
-
An example of this is a puppet master running with the Nginx + Unicorn stack:
76
-
77
-
* Nginx terminates SSL, and inserts the SSL client authentication status and client certificate DN into the HTTP headers of a new request. It sends this request to the Unicorn workers.
78
-
* A Unicorn worker receives the unencrypted request, and, according to the common gateway interface (CGI) standard, publishes all HTTP header information as CGI variables,
79
-
including the SSL information inserted by Nginx. It uses the Rack interface to translate the HTTP request into a request to the puppet master application.
80
-
* The puppet master application reads SSL information from pre-arranged environment variables, and uses its auth.conf configuration to decide whether to serve the request.
81
-
If yes, it uses its own application logic to decide what the request should be. Any response passes back through the Unicorn worker and Nginx to make its way to the puppet agent client.
82
-
83
75
## End of Series
84
76
85
-
At this point, you should understand enough about the fundamentals to understand any documentation on this site about managing Puppet's certificates, CA, and HTTPS authorization tools.
77
+
At this point, you should understand enough about the fundamentals to understand any documentation on this site about managing OpenVox's certificates, CA, and HTTPS authorization tools.
86
78
87
79
For a little more practical depth, you may also want to see the [appendix on certificate anatomy.][certificate_anatomy]
Copy file name to clipboardExpand all lines: docs/background/ssl/tls_ssl.markdown
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ SSL ("secure socket layer") is an older version of that same protocol, which is
14
14
15
15
> ## A Note on Names
16
16
>
17
-
> "TLS" and "SSL" both refer to essentially the same thing. Informally, many people (including us at Puppet Labs) often just say "SSL" to refer to any combination of TLS and SSL, mostly because old habits die hard.
17
+
> "TLS" and "SSL" both refer to essentially the same thing. Informally, many people often just say "SSL" to refer to any combination of TLS and SSL, mostly because old habits die hard.
18
18
>
19
19
> Most tools can use multiple versions of the protocol, and the combination of versions they support will often cross the arbitrary TLS/SSL boundary. (Usually something like SSL 3.0, TLS 1.0, and TLS 1.1.)
20
20
> Since clients and servers can negotiate versions on the fly, the exact protocol you'll be using at any given moment depends on the configuration of every tool that might interact with the system.
@@ -42,7 +42,7 @@ After a client starts the process, an SSL connection involves the following proc
42
42
* The client software validates that certificate, based on its list of trustworthy CAs, the CRLs it has available, and the validity period of the certificate. If it won't validate, the client bails.
43
43
***Optionally,** the client can present a certificate of its own to the server.
44
44
The client will also sign a piece of server-provided data to prove that it possesses the corresponding private key. The server will validate the client certificate before continuing.
45
-
* This only happens if the server explicitly requests **client authentication.** Most HTTPS sites on the web don't require client authentication. Puppet, however, does (for some services).
45
+
* This only happens if the server explicitly requests **client authentication.** Most HTTPS sites on the web don't require client authentication. OpenVox, however, does (for some services).
46
46
* The client sends a temporary "session" key to the server, encrypted so that only the owner of the server certificate can read it.
47
47
* Both client and server use that session key to encrypt all subsequent traffic in the connection, using a symmetric cypher.
48
48
(Using a public key cypher wouldn't be appropriate, since the client doesn't always provide a public key.)
0 commit comments