-
Notifications
You must be signed in to change notification settings - Fork 8.9k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Allow TLS conn. between the client and the CA services
Fixes FAB-392 Supporting TLS between the ACA client the rest of the CA services. This feature requires changes to the configuration of the Membership Services (YAML file), adding the support for two newly added (YAML) configuration parameters under the security section of membersrvc.yaml. To enable this feature (TLS connectivity), one needs to specify that tls_enabled (=true) and a path to a PEM-encoded certificate file to use. There is also the option to use the serverhostname override, enforcing that the same TLS Server Certificate's Common Name to be used. Change-Id: I64444d0e21615a47662ba1388cd6901ff787b408 Signed-off-by: ASHUTOSH KUMAR <ashutosh_kumar@hotmail.com> Signed-off-by: JonathanLevi <jonathan@levi.name> Signed-off-by: Gari Singh <gari.r.singh@gmail.com>
- Loading branch information
1 parent
de2cade
commit 925f4d9
Showing
5 changed files
with
201 additions
and
8 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,66 @@ | ||
### Steps to enable TLS for all sever (ECA , ACA , TLSCA , TCA) and between ACA client to server communications. | ||
|
||
1. Go to **memebersrvc.yaml** file under the fabric/membersrvc directory and edit security section, that is: | ||
``` | ||
security: | ||
serverhostoverride: | ||
tls_enabled: false | ||
client: | ||
cert: | ||
file: | ||
``` | ||
To enable TLS between the ACA client and the rest of the CA Services set the `tls_enbabled` flag to `true`. | ||
|
||
2. Next, set **serverhostoverride** field to match **CN** (Common Name) of TLS Server certificate. To extract the Common Name from TLS Server's certificate, for example using OpenSSL, you can use the following command: | ||
|
||
``` | ||
openssl x509 -in <<certificate.crt -text -noout | ||
``` | ||
where `certficate.crt` is the Server Certificate. If you have openssl installed on the machine and everything went well, you should expect an output of the form: | ||
|
||
``` | ||
Certificate: | ||
Data: | ||
Version: 3 (0x2) | ||
Serial Number: | ||
4f:39:0f:ac:7b:ce:2b:9f:28:57:52:4a:bb:94:a6:e5:9c:69:99:56 | ||
Signature Algorithm: ecdsa-with-SHA256 | ||
Issuer: C=US, ST=California, L=San Francisco, O=Internet Widgets, Inc., OU=WWW | ||
Validity | ||
Not Before: Aug 24 16:27:00 2016 GMT | ||
Not After : Aug 24 16:27:00 2017 GMT | ||
**Subject**: C=US, ST=California, L=San Francisco, O=example.com, **CN=www.example.com** | ||
Subject Public Key Info: | ||
Public Key Algorithm: id-ecPublicKey | ||
EC Public Key: | ||
pub: | ||
04:38:d2:62:75:4a:18:d9:f7:fe:6a:e7:df:32:e2: | ||
15:0f:01:9c:1b:4f:dc:ff:22:97:5c:2a:d9:5c:c3: | ||
a3:ef:e3:90:3b:3c:8a:d2:45:b1:60:11:94:5e:a7: | ||
51:e8:e5:5d:be:38:39:da:66:e1:99:46:0c:d3:45: | ||
3d:76:7e:b7:8c | ||
ASN1 OID: prime256v1 | ||
X509v3 extensions: | ||
X509v3 Key Usage: critical | ||
Digital Signature, Key Encipherment | ||
X509v3 Extended Key Usage: | ||
TLS Web Server Authentication | ||
X509v3 Basic Constraints: critical | ||
CA:FALSE | ||
X509v3 Subject Key Identifier: | ||
E8:9C:86:81:59:D4:D7:76:43:C7:2E:92:88:30:1B:30:A5:B3:A4:5C | ||
X509v3 Authority Key Identifier: | ||
keyid:5E:33:AC:E0:9D:B9:F9:71:5F:1F:96:B5:84:85:35:BE:89:8C:35:C2 | ||
X509v3 Subject Alternative Name: | ||
DNS:www.example.com | ||
Signature Algorithm: ecdsa-with-SHA256 | ||
30:45:02:21:00:9f:7e:93:93:af:3d:cf:7b:77:f0:55:2d:57: | ||
9d:a9:bf:b0:8c:9c:2e:cf:b2:b4:d8:de:f3:79:c7:66:7c:e7: | ||
4d:02:20:7e:9b:36:d1:3a:df:e4:d2:d7:3b:9d:73:c7:61:a8: | ||
2e:a5:b1:23:10:65:81:96:b1:3b:79:d4:a6:12:fe:f2:69 | ||
``` | ||
|
||
Now you can use that CN value (**www.example.com** above, for example) from the output and use it in the **serverhostoverride** field (under the security section of the membersrvc.yaml file) | ||
|
||
3. Last, make sure that path to the corresponding TLS Server Certificate is specified under `security.client.cert.file` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters