Certmeister
Certmeister is a conditionally autosigning Certificate Authority. It was developed for use with the Puppet infrastructure at Hetzner PTY Ltd.
The service will autosign a certificate request when the configurable access policy permits. The reference access policy in use by Hetzner PTY Ltd is:
- the Common Name (CN) of the certificate is in the host-h.net domain,
- the service has no record of already having signed a certificate for that CN, and
- the requesting client IP address has forward confirmed reverse DNS that matches the CN.
- Requests to fetch certificates are always allowed.
- Requests to delete certificates are only allowed when they originate from a secure operator network.
This allows us the convenience of Puppet's autosign feature, without the horrendous security implications.
Certmeister is the core of a fancy web service that does this:
cat request/client.csr | openssl x509 -req -CA CA/ca.crt -CAkey CA/ca.key -CAcreateserial -addtrust clientAuth > CA/signed/<cn>.crt
To hit the service:
$ curl -L \
-d "psk=secretkey" \
-d "csr=$(perl -MURI::Escape -e 'print uri_escape(join("", <STDIN>));' < fixtures/client.csr)" \
http://certmeister.hetzner.co.za/certificate/axl.starjuice.net
Testing
Because we test both certmeister and certmeister-redis with rake spec, you need redis up if you want to run the tests. It's easy:
- Install redis-2.8.4 or later.
- Start redis.
- Run tests.
- Stop redis.
sudo yum install -y ansible
sudo ansible-playbook -i contrib/hosts contrib/redis.yml
redis-server --logfile /dev/null &
rake spec
kill 1; wait 1