laurivosandi / certidude

Easy to use Certificate Authority web service for OpenVPN, StrongSwan and HTTPS
MIT License
126 stars 30 forks source link
apache2 kerberos ldap nginx openssl openvpn python strongswan x509

Certidude

.. image:: https://travis-ci.org/laurivosandi/certidude.svg?branch=master :target: https://travis-ci.org/laurivosandi/certidude

.. image:: http://codecov.io/github/laurivosandi/certidude/coverage.svg?branch=master :target: http://codecov.io/github/laurivosandi/certidude?branch=master

Introduction

Certidude is a minimalist X.509 Certificate Authority management tool with Kerberos authentication mainly designed for OpenVPN gateway operators to make VPN client setup on laptops, desktops and mobile devices as painless as possible.

.. figure:: doc/certidude.png

Certidude can also be used to manage IPSec certifcates (StrongSwan) or HTTPS client certificates to limit access to eg. intranet websites. For a full-blown CA you might want to take a look at EJBCA <http://www.ejbca.org/features.html> or OpenCA <https://pki.openca.org/>.

Usecases

.. figure:: doc/usecase-diagram.png

Following usecases are covered:

Features

Common:

Virtual private networking:

HTTPS:

Install

To install Certidude server you need certain system libraries in addition to regular Python dependencies.

System dependencies for Ubuntu 16.04:

.. code:: bash

apt install -y python3-click python3-jinja2 python3-markdown \
    python3-pip python3-mysql.connector python3-requests python3-pyxattr

System dependencies for Fedora 25+:

.. code:: bash

yum install redhat-rpm-config python-devel openssl-devel openldap-devel

At the moment package at PyPI is rather outdated. Please proceed down to Development <#development>_ section to install Certidude from source.

Setting up authority

First make sure the machine used for certificate authority has fully qualified domain name set up properly. You can check it with:

.. code:: bash

hostname -f

The command should return ca.example.com. If necessary tweak machine's fully qualified hostname in /etc/hosts:

.. code::

127.0.0.1 localhost
127.0.1.1 ca.example.com ca

Certidude will submit e-mail notifications to locally running MTA. Install Postfix and configure it as Satellite system:

.. code:: bash

apt install postfix

Certidude can set up certificate authority relatively easily. Following will set up certificate authority in /var/lib/certidude/, configure systemd service for your platform, nginx in /etc/nginx/sites-available/certidude.conf, cronjobs in /etc/cron.hourly/certidude and much more:

.. code:: bash

certidude provision authority

Tweak the configuration in /etc/certidude/server.conf until you meet your requirements, to apply changes run:

.. code:: bash

systemctl restart certidude

Setting up PAM authentication

Following assumes the OS user accounts are used to authenticate users. This means users can be easily managed with OS tools such as adduser, usermod, userdel etc.

Make sure you insert AllowUsers administrator-account-username to SSH server configuration if you have SSH server installed on the machine to prevent regular users from accessing the command line of certidude. Note that in future we're planning to add command-line interaction in which case SSH access makes sense.

If you're planning to use PAM for authentication you need to install corresponding Python modules:

.. code:: bash

pip3 install simplepam

The default configuration generated by certidude provision should make use of the PAM.

Setting up Active Directory authentication

Following assumes you have already set up Kerberos infrastructure and Certidude is simply one of the servers making use of that infrastructure.

Install additional dependencies:

.. code:: bash

apt-get install samba-common-bin krb5-user ldap-utils python-gssapi

Reset Samba client configuration in /etc/samba/smb.conf, adjust workgroup and realm accordingly:

.. code:: ini

[global]
security = ads
netbios name = CA
workgroup = EXAMPLE
realm = EXAMPLE.COM
kerberos method = system keytab

Reset Kerberos client configuration in /etc/krb5.conf:

.. code:: ini

[libdefaults]
default_realm = EXAMPLE.COM
dns_lookup_realm = true
dns_lookup_kdc = true

Initialize Kerberos credentials:

.. code:: bash

kinit administrator

Join the machine to domain:

.. code:: bash

net ads join -k

Set up Kerberos keytab for the web service:

.. code:: bash

KRB5_KTNAME=FILE:/etc/certidude/server.keytab net ads keytab add HTTP -k
chown root:certidude /etc/certidude/server.keytab
chmod 640 /etc/certidude/server.keytab

Reconfigure /etc/certidude/server.conf so kerberos backend is used for authentication, and ldap backend is used for accoutns and authorization. Adjust related options as necessary. Also make sure there is cron.hourly job for creating GSSAPI credential cache - that's necessary for querying LDAP using Certidude machine's credentials.

Common pitfalls:

Setting up services

Set up services as usual (OpenVPN, Strongswan, etc), when setting up certificates See Certidude admin interface how to submit CSR-s and retrieve signed certificates.

Setting up clients

This example works for Ubuntu 16.04 desktop with corresponding plugins installed for NetworkManager.

Configure Certidude client in /etc/certidude/client.conf:

.. code:: ini

[ca.example.com]
trigger = interface up
hostname = $HOSTNAME

Configure services in /etc/certidude/services.conf:

.. code:: bash

[OpenVPN to gateway.example.com]
authority = ca.example.com
service = network-manager/openvpn
remote = gateway.example.com

[IPSec to gateway.example.com]
authority = ca.example.com
service = network-manager/strongswan
remote = gateway.example.com

To request certificate:

.. code:: bash

certidude enroll

The keys, signing requests, certificates and CRL-s are placed under /etc/certidude/authority/ca.example.com/

The VPN connection should immideately become available under network connections.

Development

To use dependencies from pip:

.. code:: bash

apt install build-essential python-dev cython libffi-dev libssl-dev \
    libkrb5-dev ldap-utils krb5-user libsasl2-modules-gssapi-mit \
    libsasl2-dev libldap2-dev

Clone the repository:

.. code:: bash

git clone https://github.com/laurivosandi/certidude /srv/certidude
cd /srv/certidude

Install dependencies as shown above and additionally:

.. code:: bash

pip3 install -r requirements.txt

To install the package from the source tree:

.. code:: bash

pip3 install -e .

To run tests and measure code coverage grab a clean VM or container, set hostname to ca.example.lan, export environment variable COVERAGE_PROCESS_START globally and run:

.. code:: bash

pip3 install codecov pytest-cov
rm /tmp/.coverage*
COVERAGE_PROCESS_START=/srv/certidude/.coveragerc  py.test tests --capture=sys
coverage combine
coverage report
coverage html -i

To uninstall:

.. code:: bash

pip3 uninstall certidude

Docker

.. code:: bash

git clone https://github.com/laurivosandi/certidude
cd certidude
docker build .
docker run --name ca --hostname ca.example.lan

Offline install

To prepare packages for offline installation use following snippet on a vanilla Ubuntu 16.04 or container:

.. code:: bash

rm -fv /var/cache/apt/archives/*.deb /var/cache/certidude/wheels/*.whl
apt install python3-pip
pip3 wheel --wheel-dir=/var/cache/certidude/wheels -r requirements.txt
pip3 wheel --wheel-dir=/var/cache/certidude/wheels .
tar -cf certidude-client.tar /var/cache/certidude/wheels
add-apt-repository -y ppa:nginx/stable
apt-get update -q
apt install --download-only python3-markdown python3-pyxattr python3-jinja2 python3-cffi software-properties-common libnginx-mod-nchan nginx-full
pip3 wheel --wheel-dir=/var/cache/certidude/wheels falcon humanize ipaddress simplepam user-agents python-ldap gssapi
tar -cf certidude-server.tar /var/lib/certidude/assets/ /var/cache/apt/archives/ /var/cache/certidude/wheels

Transfer certidude-server.tar or certidude-client.tar to the target machine and execute:

.. code:: bash

rm -fv /var/cache/apt/archives/*.deb /var/cache/certidude/wheels/*.whl
tar -xvf certidude-*.tar -C /
dpkg -i /var/cache/apt/archives/*.deb
pip3 install  --use-wheel --no-index --find-links /var/cache/certidude/wheels/*.whl

Proceed to bootstrap authority without installing packages or assembling assets:

.. code:: bash

certidude provision authority  --skip-packages --skip-assets [--elliptic-curve] [--organization "Mycorp LLC"]

Note it's highly recommended to enable nginx PPA in the target machine