Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

All about SSL/TLS certificates #320

Open
wants to merge 37 commits into
base: main
Choose a base branch
from
Open

Conversation

tbazant
Copy link
Collaborator

@tbazant tbazant commented Mar 28, 2024

Description

A new article that explains and shows what TLS is and how to implement it on SUSE hosts

Are there any relevant issues/feature requests?

  • bsc#1194130
  • jsc#DOCTEAM-480

Is this (based on) existing content?

no

@tbazant tbazant self-assigned this Mar 28, 2024
@tbazant tbazant marked this pull request as draft March 28, 2024 12:54
@tbazant tbazant marked this pull request as ready for review April 18, 2024 08:16
@jirib
Copy link

jirib commented Apr 18, 2024

My 2 cents:

/usr/sbin/apache2-systemd-ask-pass:exec /usr/bin/systemd-ask-password "Enter SSL pass phrase for $1 ($2): "
  • 7 - iiuc there are openssl and gnutls stores; 7.3 is gnutls
  • 6 - not sure but java used to have its own trust store but on SLES it uses the system one
  • there should be an example how to query if a cert is present in the trust store
# an example
$ awk -v cmd='openssl x509 -noout -subject -startdate -enddate' '/BEGIN/{close(cmd)}; { print | cmd }' \
    < /etc/ssl/ca-bundle.pem  2>/dev/null | grep -C 1 'DigiCert Global Root CA'
notAfter=Jan 15 12:00:00 2038 GMT
subject=C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA
notBefore=Nov 10 00:00:00 2006 GMT
$ tshark -G protocols 2>/dev/null | grep -P '\bTLS\s+tls\b'
Transport Layer Security        TLS     tls

$  # tshark -i jbelka -f 'tcp port 443' -Y tls                                                                   ������������������������������������������������������������������������������������������������      
Running as user "root" and group "root". This could be dangerous.                                                       
Capturing on 'jbelka'                                                                                                   
 ** (tshark:11479) 11:16:09.323193 [Main MESSAGE] -- Capture started.                                                   
 ** (tshark:11479) 11:16:09.323315 [Main MESSAGE] -- File: "/tmp/wireshark_jbelkaVJHJM2.pcapng"                         
    4 0.000799229 192.168.252.100 → 192.168.252.1 TLSv1 583 Client Hello                                                
    6 0.003643118 192.168.252.1 → 192.168.252.100 TLSv1.3 2574 Server Hello, Change Cipher Spec, Application Data, App:2lication Data, Application Data, Application Data                                                                       
    8 0.004548144 192.168.252.100 → 192.168.252.1 TLSv1.3 146 Change Cipher Spec, Application Data                      
   10 0.004677386 192.168.252.100 → 192.168.252.1 TLSv1.3 356 Application Data                                          
   12 0.004762303 192.168.252.1 → 192.168.252.100 TLSv1.3 369 Application Data                                          
   14 0.004865502 192.168.252.1 → 192.168.252.100 TLSv1.3 369 Application Data                   
...

Copy link
Contributor

@dariavladykina dariavladykina left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi, please see some suggestions here. Thanks!

articles/tls-certificates.asm.xml Outdated Show resolved Hide resolved
articles/tls-certificates.asm.xml Outdated Show resolved Hide resolved
snippets/tls-certificates-introduction.xml Outdated Show resolved Hide resolved
concepts/tls-certificates.xml Outdated Show resolved Hide resolved
concepts/tls-certificates.xml Outdated Show resolved Hide resolved
tasks/tls-troubleshooting.xml Outdated Show resolved Hide resolved
tasks/tls-troubleshooting.xml Outdated Show resolved Hide resolved
tasks/tls-troubleshooting.xml Outdated Show resolved Hide resolved
tasks/tls-troubleshooting.xml Outdated Show resolved Hide resolved
tasks/tls-troubleshooting.xml Outdated Show resolved Hide resolved
tbazant and others added 3 commits May 2, 2024 12:00
Co-authored-by: Daria Vladykina <daria.vladykina@suse.com>
Co-authored-by: Daria Vladykina <daria.vladykina@suse.com>
Co-authored-by: Daria Vladykina <daria.vladykina@suse.com>
@lvicoun
Copy link
Contributor

lvicoun commented May 10, 2024

Hi Tomas,
great job! Just a few suggestion. I'd prefer to have two "procedures" in this article - one for install TLS on a trusted CA and one to install the certificate using a private CA. Even though the procedure is outlined in sec 2 I still had problems to follow the flow. I think with the modular approach it is easy to achieve.
Sec 7 System-wide CA certificate store stands there as a concept where I'd expect a procedural part - that is in sec 8. Probably using the concept as part of sec 8 not a standalone section here would work.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The image has SSL instead of TLS as used in the rest of the article.

tasks/tls-troubleshooting.xml Show resolved Hide resolved
tasks/tls-troubleshooting.xml Show resolved Hide resolved
tasks/tls-troubleshooting.xml Show resolved Hide resolved
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
5 participants