tripleo-docs/doc/source/advanced_deployment/tls_everywhere.rst
Rob Crittenden 9353c0a6ae Small fixups for the TLS everywhere documentation
Change-Id: Iac353cf9dd8914613a4c8b6de685befcc518aa2e
2017-03-24 11:07:59 -04:00

201 lines
8.6 KiB
ReStructuredText

TLS everywhere for the overcloud
================================
It is possible to deploy most of the services to use TLS for communications in
the internal network as well. This, however, needs several more certificates
than the public approach, with the number being dependant on the number of
nodes in your deployment. This complicates certificate and key management to
the extent where it's not sustainable to have the deployer inject all the
certificates and keys needed and then have to handle all their lifecycles.
Then, we have to take into account that a certificate revocation might be
needed at some point. So, from both the maintenance and security standpoints
this is not sustainable.
For the aforementioned reasons, we decided to rely on `certmonger`_ to get the
certificates from an actual CA. Certmonger will do the certificate requests and
do the certificate renewals when it's needed, thus reducing the maintenance
burden.
FreeIPA has been chosen as the default CA. Certmonger already has a plugin for
it, and it has the added value that, besides being able to automatically
provide the certificates we need, we can also keep track of the nodes and have
an identity for them.
.. note:: The default CA can be overriden via the **CertmongerCA** parameter.
However, the CA has to be something that certmonger understands, so
there are adjustments to be done. For more information on how to
change it you can consult the `certmonger`_ documentation
Communicating with the CA (FreeIPA) requires the nodes to have proper
credentials, and these credentials also need to be transported into the
overcloud nodes in a secure manner. To address this, we use a
`Nova vendordata plugin`_ called `novajoin`_ whose purpose is to detect the
nodes that are created by nova, register or join them in FreeIPA and provide an
OTP that the node can subsequently use to enroll to FreeIPA. The node
subsequently enrolls by loading the vendordata-provided JSON via the
config-drive, which ends up executing a cloud-init script to do this. With the
node enrolled, certificates can be requested securely. Novajoin can also
receive extra entries from nova metadata to create extra principals that the
services will need. These create service principals for services such as httpd,
mysql and haproxy, and are used to requests the certificates for the specific
service users with the correct SubjectAltNames.
Deployment workflow
-------------------
The following are instructions assuming the default CA, which is FreeIPA.
CA setup
~~~~~~~~
The undercloud needs to be enrolled to FreeIPA, and we need to create some
extra privileges/permissions to be used by the novajoin services. Assuming
there's an already existing FreeIPA installation, we can use a script that
comes with the python-novajoin package::
sudo /usr/libexec/novajoin-ipa-setup \
--principal admin \
--password < freeipa admin password > \
--server < freeipa server hostname > \
--realm < overcloud cloud domain in upper case > \
--domain < overcloud cloud domain > \
--hostname < undercloud hostname > \
--precreate
This command will give us a One-Time Password (OTP) that we can then use
for the undercloud enrollment. We can also specify the command to output
the OTP into a file by using the ``--otp-file`` option.
.. note:: This can be run from either the undercloud node itself or the FreeIPA
node. Just note that the example provided is using the FreeIPA admin
credentials. This can be done using another principal if it has the
approprite permissions.
Undercloud setup
~~~~~~~~~~~~~~~~
Now that we have an OTP we can either deploy or update the undercloud. The
following settings in **undercloud.conf** will get the undercloud to enroll
to FreeIPA and deploy novajoin::
enable_novajoin = True
ipa_otp = < OTP provided by the novajoin-ipa-setup script >
The undercloud fully-qualified hostname should also be set in
**undercloud.conf**, since this is the host that will be used to enroll
to FreeIPA. It should match the one provided in the novajoin-ipa setup
script. We can set it like this::
undercloud_hostname = < undercloud FQDN >
It is useful to have FreeIPA set as the DNS server since this will
automatically: discover the FreeIPA server hostname, set up the Kerberos
realm/domain automatically, and it will set the DNS entries of the
overcloud nodes once they're deployed. We can set it in **undercloud.conf**
with the following setting::
undercloud_nameservers = < FreeIPA IP >
.. note:: This takes a comma-separated list, so we can set another nameserver
with this configuration option.
With these settings, do the following command to set the desired configurations
and enable novajoin::
openstack undercloud install
Overcloud deployment
~~~~~~~~~~~~~~~~~~~~
The TLS-everywhere setup only works with FQDNs so we need to set the
appropriate entries for the overcloud endpoints as well as setting an
appropriate domain for the nodes that matches the one we set for FreeIPA.
We can do this by overriding some parameters via ``parameter_defaults``.
Assuming that the domain for our cloud is *example.com* We'll set the
following in a file we'll call **cloud-names.yaml** which we'll include
in our overcloud deploy command::
parameter_defaults:
CloudDomain: example.com
CloudName: overcloud.example.com
CloudNameInternal: overcloud.internalapi.example.com
CloudNameStorage: overcloud.storage.example.com
CloudNameStorageManagement: overcloud.storagemgmt.example.com
CloudNameCtlplane: overcloud.ctlplane.example.com
As with our undercloud, we also want the overcloud nodes' name server to point
to FreeIPA. We can do this by setting the ``DnsServers`` parameter via
parameter_defaults. You can create an environment file for it, however, since
you probably are deploying with network isolation, you can already set this
parameter in the **network-environment.yaml** file that's referenced in
:doc:`../advanced_deployment/network_isolation`. So that setting would look
like this::
parameter_defaults:
...
DnsServers: ["< FreeIPA IP >"]
...
Remembering that optionally we can set other nameservers with this parameter.
To tell the overcloud deployment to deploy the keystone endpoints (and
references) using DNS names instead of IPs, we need to add the following
environment to our overcloud deployment::
~/ssl-heat-templates/environments/tls-everywhere-endpoints-dns.yaml
Finally, to enable TLS in the internal network, we need to use the following
environment::
~/ssl-heat-templates/environments/enable-internal-tls.yaml
This will set the appropriate resources that enable the certificate requests
via certmonger and create the appropriate service principals for kerberos
(which are used by FreeIPA).
.. note:: As part of the enrollment, FreeIPA is set as a trusted CA, so we
don't need to do any extra steps for this.
Classic public TLS and certmonger-based internal TLS
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
**enable-internal-tls.yaml** will be used for the internal network
endpoints. One can still use the **enable-tls.yaml** environment for the
public endpoints if a specific certificate for the public endpoints is needed.
The arguments for a deployment using injected certificates for the public
endpoints, and certmonger-provided certificates for the internal endpoints
look like the following::
openstack overcloud deploy \
...
-e ~/ssl-heat-templates/environments/tls-everywhere-endpoints-dns.yaml \
-e ~/ssl-heat-templates/environments/enable-tls.yaml \
-e ~/ssl-heat-templates/environments/enable-internal-tls.yaml \
-e ~/cloud-names.yaml
Certmonger-based public and Internal TLS
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
It is also possible to get all your certificates from a CA. For this you
need to include the
**environments/services/haproxy-public-tls-certmonger.yaml** environment
file.
To do a deployment with both public and internal endpoints using
certificates provided by certmonger, we would need to issue a command similar
to the following::
openstack overcloud deploy \
...
-e ~/ssl-heat-templates/environments/tls-everywhere-endpoints-dns.yaml \
-e ~/ssl-heat-templates/environments/services/haproxy-public-tls-certmonger.yaml \
-e ~/ssl-heat-templates/environments/enable-internal-tls.yaml \
-e ~/cloud-names.yaml
.. References
.. _certmonger: https://pagure.io/certmonger
.. _Nova vendordata plugin: https://docs.openstack.org/developer/nova/vendordata.html
.. _novajoin: https://github.com/openstack/novajoin