Hi,

Micah Anderson <mi...@riseup.net> writes:

> * Ansgar Burchardt <ans...@mathi.uni-heidelberg.de> [2009-04-27 10:24-0400]:
>> When puppet initially requests a certificate from puppetmaster, it will
>> overwrite the CA certificate even if it is already present.
>
> Do you mean to say that if you have a signed certificate on the
> puppetmaster for host 'foo.bar.org' and then you reinstall the system
> 'foo' and run puppet again you do not want the existing certificate
> re-generated?
>
> I'm a little confused by your use of the terms "CA certificate". To me,
> CA means "Certificate Authority" and I'm not sure how you are using that
> in this context.

I mean the public key of the certificate authority used to sign the
Puppetmaster's public key (the file "localcacert" refers to on the
client).  There is no reason to overwrite this key when Puppet gets a
new host key.

We have the following setup using two CAs:

 * example.com certification authority
   - signs: puppet.example.com
   - installed on clients as $localcacert before Puppet is started the
     first time.
   - should be trusted by clients

 * puppet.example.com certification authority
   - signs client certificates via puppetca
   - should *not* be trusted by clients
   - used by the server to identify client name

When puppet starts the first time on a client, it asks
puppet.example.com to sign the client.example.com certificate.
It will install the signed certificate, *but* it will also install the
puppet.example.com CA certificate, overwriting the example.com CA
certificate already present.  The client will then not trust the
puppet.example.com certificate...

I may miss some option to tell puppetca/puppetmaster which CA cert to
send to the clients, but there should be no need to overwrite the CA
certificate already installed on the clients in any case.

Regards,
Ansgar



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to