[openstack-dev] [All] Use of self signed certs in endpoints
Adam Young
ayoung at redhat.com
Sun Nov 15 15:26:53 UTC 2015
On 11/14/2015 03:09 AM, Xav Paice wrote:
> Hi,
>
> I'm sure I'm not the only one that likes to use SSL everywhere
> possible, and doesn't like to pay for 'real' ssl certs for dev
> environments. Figuring out how to get requests to allow connection to
> the self signed cert would have paid for a real cert many times over.
>
> When I use an SSL cert with a CA not in the Mozilla bundle, and use
> keystonemiddleware to access Keystone endpoints, the ssl verification
> rightly fails. It turns out requests doesn't use the system ca cert
> bundle, but has it's own. It's also got a nice easy config option to
> set which ca cert bundle you want to use -
> http://docs.python-requests.org/en/latest/user/advanced/?highlight=ca_bundle#ssl-cert-verification
>
> How do people feel about having that as a config option set somewhere,
> so we can specify a ca cert in, say, heat.conf, so that we can
> continue with the self signed certs of cheapness without needing to
> hack up the cacert.pem that comes with requests, or find a way to pass
> in environment variables?
>
> Am I barking up the wrong tree here? How would I go about writing a
> blueprint for this, and for which project? I guess it's something
> that would need to be added to all the projects in the
> keystone_authtoken section? Or is there a central place where common
> configs like this can live?
I would say that the right approach is to add the CA to the system
bundle for the calling machine. Requests not using the System defaults
is a Bug.
I suspect that the reason that they do this is the unwillingness of the
Requests developers to have to battle NSS: The Dogtag developers have a
write up including the steps necessary to get NSS support into Requests.
http://pki.fedoraproject.org/wiki/Support_NSSDB_in_Python_API
On a Fedora system, the python-requests RPM depends on ca-certificates,
which is updated more frequently than that document indicates;
rpm --query --list ca-certificates
Shows that it manages the /ec/pki/[ca-trust java tls ] subdirectoies as
well as /etc/ssl and /usr/share/pki
I suspect that Debian based systems do something comparable, although I
don't have on handy to chack.
So, short answer: use the system tools to update. Lets not make an end
run around system security. A config value is another path to Audit.
>
>
>
>
>
>
> __________________________________________________________________________
> OpenStack Development Mailing List (not for usage questions)
> Unsubscribe: OpenStack-dev-request at lists.openstack.org?subject:unsubscribe
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack-dev/attachments/20151115/9927013e/attachment.html>
More information about the OpenStack-dev
mailing list