Closed andydowling-ie closed 8 years ago
Thanks!
It's only the first version of the documentation. Of course - we can revise it in the next version, if we find any security concerns. Once we identify them we can also start a separate thread (issue) for each of them. But it's okay to have a general discussion too.
One more argument for (3) - one Common Name can cover multiple certificates.
Also note, that I am playing with an idea of registry pushing every catalogue change into some public Git repository. This way, every change would be recorded, and every partner will be able to analyze it later.
With self-signed certs, the Registry maintainers would need to take the hit.
Since we are talking about client certificates only, I see no way avoiding such hit. Without the help of the Registry, how could the server know if the request is coming from within the EWP Network? EDIT: What I mean is that they'll need the registry even if we're not using self-signed certs.
I think we can only attempt to reduce this hit (hence the requirement of caching on the client side). Serving DNS Common Names (instead of whole certificates) also seems a good way of reducing the registry load (and has some other benefits).
Made separate issues for each of these discussions. Please comment there. Closing this one.
Great work on this!
A few points:
1) Geir made the point that self-signed certs should not be used in production in his email earlier today. I'd tend to agree. Although technically self-signed certs could be used if their fingerprints are explicitly trusted by the Registry (i.e. akin to importing a new root CA in your browser), each of these certs needs to be explicitly vetted before being added to the registry. At least if certs are issued by valid CAs, some of this work has been done, and it makes it easier to scale.
2) Suggest we replace SHA-1 (being deprecated) with SHA-256 or better for certificate fingerprints
3) We need to be careful when performing certificate matching. Considering the Registry is storing actual copies of the X.509 certs in the catalogue.xml, then its better to match based on cert fingerprint, rather than Common Name. (Although Common Name can be used to index the certs when searching the Registry for a match).