Authenticate everything with SSL

le jeudi 28 mars 2013

Everyone should consider using SSL for everything

Notre prochain webinar

Lots of server tools were made for private hosting. Behind your firewall, nobody knows you are naked. But, in 2013, it's Cloud time, everybody got its own naked virtual server, flavored with some SAAS. Some major services, like memcached recently got its authenticated version, REST ones can be easily proxified, but others, with classical sockets, remain unauthenticated : patching protocols is painful. UDP services don't like authentication, just use them in localhost, and forget mutualized hosting, LXC is now trendy. Mutualized hosting is like the subway, just use a light container like Velib (parisian bike as a service). TCP services can easily handle some authentication. With a persistent connection, it's easier, it's just a simple FSM (Finite State Machine), first give some credentials, and switch from not authenticated state to authenticated state. Mysql can do it, so you can. If you like standards, use SASL, and don't bother, just handle PLAIN authentication, nobody can beat shared secret or SSL for security. SSL is also a secret weapon, it replaces a classical socket with a secured none. SSL is a protocol which handles protocols. SSL can use authentication with certificates, and magically add authentication without modifying the guest protocol. SSL authentication is hard to use with public users, and you have to buy certificates. Inside your hosting solution, it's easier, you own the certificate authority, sign certificates for the servers and the clients. OpenVPN is a good example of certificate authentication. SSL is a complex beast, anything you do without understanding it can cause drama. Easy-RSA provides simple tools to handle certificates with good practices. Stunnel provides a simple proxy for adding SSL communication to any client or server. Don't try to handle broken or weak solutions, just use the best : if you own client and server side, you are the king of your mountain!

Here is samples for authenticating Carbon service, from Graphite project.

Easy-RSA

In a trusted computer, build your own PKI.

git clone git://github.com/OpenVPN/easy-rsa.git
cd easy-rsa/easy-rsa/2.0/

Edit vars file, and sets informations about your country, company...

source vars
./build-ca

CA private key is the weakest link in your security chain, be careful. Build a server certificate

./build-key-server

And some clients

./build-key client_name

.key files are private keys, be kind with them, .crt and .csr are public.

Stunnel

Stunnel is an old beast, born when inetd still ruled servers, but don't be afraid, it's still the best tool. Watch for HAproxy 1.5, it will handles SSL, and challenge Stunnel the elder.

Use a simple config file, with contemporary settings, no compatibility tricks. Here is a server config for wrapping Carbon server.

# vim:ft=dosini
sslVersion = SSLv3
#public
cert = /opt/graphite/ssl/carbon.crt
#private
key = /opt/graphite/ssl/carbon.key
chroot = /var/lib/stunnel4/
setuid = stunnel4
setgid = stunnel4
; PID is created inside the chroot jail
pid = /stunnel4.pid
socket = l:TCP_NODELAY=1
socket = r:TCP_NODELAY=1
# This enables the mutual authentication
verify = 2
# public CA, for client validation
CAfile = /opt/graphite/ssl/ca.crt
compression = zlib
#debug = 5
output=/var/log/stunnel.log
# Some cargo cult settings
options = NO_SSLv2
options = SINGLE_ECDH_USE
options = SINGLE_DH_USE
[carbons]
# the public port
accept = 2103
# server just listen localhost
connect = 127.0.0.1:2003

Client side is quite similar:

# vim:ft=dosini
sslVersion = SSLv3
cert = client1.crt
key = client1.key
#setuid = stunnel4
#setgid = stunnel4
pid = /tmp/stunnel.pid
socket = l:TCP_NODELAY=1
socket = r:TCP_NODELAY=1
CAfile = ca.crt
debug = 5
foreground = yes
options = NO_SSLv2
options = SINGLE_ECDH_USE
options = SINGLE_DH_USE
[carbons]
client = yes
accept = 2003
connect = my.public.server.com:2103

It's just a test from a mac, no chown, no pid, no detach. If I connect my telnet to localhost:2003, the real server behind ssl answers. Client checks that the server certificate is signed with my own trusted authority, no risk of man in the middle with a forged certificate.

SSL can revoke certificates, just read the documentation.

Python and SSL

In this example, I don't want to modify the server side, Graphite stack is a bit messy and large, and I fear Twisted code, so, stunnel wraps graphite as a black box. But client side, it's easier, carbon protocol is dummy, and gstatsd, a python gevent Statsd clone is easy to hack.

Python handles SSL nicely, just like gevent.

#!/usr/bin/env python
import socket
import ssl
import time
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
ssl_sock = ssl.wrap_socket(s,
                           certfile="./client1.crt",
                           keyfile="./client1.key",
                           ca_certs="./ca.crt",
                           ssl_version=ssl.PROTOCOL_SSLv3,
                           cert_reqs=ssl.CERT_REQUIRED)
ssl_sock.connect(('my.public.server.com', 2103))
now = int(time.time())
ssl_sock.write("local.test.toto 22 %d\n" % now)

You build a socket, wrap it with ssl (and your client certificates), and use it like a plain old socket.

The patch for Gstasd is as simple as this example.

I don't fear patching any Statsd clone (em ruby, nodejs, go ...), ssl is a standard, and Openssl is almost universal.

Http is not the only way to proxying stuff, like obfuscurity suggests with its backstop.

Ssl can already be used as a proxy instead of http.

Keep it simple, secure.

Service Conseil et accompagnement memcached

Bearstech vous propose ses services Conseil et accompagnement memcached

Découvrir ce service

Partager cet article

Flux RSS

flux rss

Partager cet article :

Nos expertises technologiques