Hi, Security wise I can understand that.
Yes I have read about that... but that would let me use the loadbalancer to connect ? I was not sure if the SAN would "connect" as "other" host. 2015-03-12 15:07 GMT+01:00 Rob Crittenden <rcrit...@redhat.com>: > Matt . wrote: >> Hi Guys, >> >> Is Rob able to look at this ? I hope he has some sparetime as I'm >> kinda stuck with this issue. > > Wildcard certs are not supported. > > You can request a SAN with certmonger using -D <FQDN>. That will work > with IPA 4.x for sure, maybe 3.3.5. > > rob > >> >> Thanks! >> >> >> >> 2015-03-08 12:30 GMT+01:00 Matt . <yamakasi....@gmail.com>: >>> I'm reviewing some things. >>> >>> When I'm using a loadbalancer, which I prefer in this setup I need to >>> have the same certificates on both servers. Maybe a wildcard for my >>> domain could do instead of having only both fqdn's of the servers >>> including the loadbalancer's fqdn. >>> >>> But the question remains, how? >>> >>> >>> >>> 2015-03-07 10:37 GMT+01:00 Matt . <yamakasi....@gmail.com>: >>>> Hi, >>>> >>>> I will balance with IP persistance so I think there won't be any >>>> mixing as long as that "used" server is online. >>>> >>>> 2015-03-06 19:16 GMT+01:00 Dmitri Pal <d...@redhat.com>: >>>>> On 03/06/2015 11:05 AM, Matt . wrote: >>>>>> >>>>>> OK, understood. >>>>>> >>>>>> But when a webservice does execute a command (from scripting) to a SVR >>>>>> record and the first is not reacable, would it try to do it again or >>>>>> will handle DNS this in front of it ? >>>>>> >>>>>> I do a kinit against an IPA server using a keytab after I first >>>>>> checked if the user was able to auth himself using his ldap >>>>>> credentials, if so, this kinit exec is fired and I do some CURL stuff >>>>>> to the IPA server. >>>>>> >>>>>> That's why I wanted a loadbalancer, the loadbalancer sees if a server >>>>>> is down and doesn't even try to direct any of the commands to it... >>>>>> I'm not sure if the SRV will handle this well when doing these command >>>>>> from PHP for an example. Building in extra checks in front could be >>>>>> done but it not ideal as a loadbalancer can handle such things much >>>>>> better. >>>>> >>>>> >>>>> OK, this makes things much more clear. Thanks for the explanation. >>>>> Rob. What is our failover logic for API? >>>>> >>>>> For CLI we use a negotiation and then we store a cookie so as long as the >>>>> whole conversation goes to the same server you should be fine. I do not >>>>> think you need to re-encrypt the traffic at load balancer and thus have a >>>>> cert there then if you can enforce the use of the same server in this >>>>> case. >>>>> >>>>> The issue I anticipate is with Kerberos. I think you should not load >>>>> balance >>>>> the Kerberos traffic, only the API commands starting with the negotiation. >>>>> >>>>> Rob does that make sense for you? >>>>> >>>>> >>>>>> >>>>>> Thanks! >>>>>> >>>>>> Cheers, >>>>>> >>>>>> Matt >>>>>> >>>>>> 2015-03-06 16:41 GMT+01:00 Dmitri Pal <d...@redhat.com>: >>>>>>> >>>>>>> On 03/06/2015 10:24 AM, Matt . wrote: >>>>>>>> >>>>>>>> Hi, >>>>>>>> >>>>>>>> I'm really bound to a loadbalancer, as it's HA setup of loadbalancers, >>>>>>>> SRV won't fit here sorry to say. >>>>>>>> >>>>>>>> I auth users, so their keytab should be the same between two masters I >>>>>>>> believe ? >>>>>>> >>>>>>> >>>>>>> Each entity in Kerberos exchange has its own identity and key. >>>>>>> If you send a ticket that is destined to service A instead to service B >>>>>>> it >>>>>>> would not work unless they share the same keys and identity. Sharinf >>>>>>> same >>>>>>> keys and identities between the servers just would not work with IPA. >>>>>>> Keep in mind that IPA clients and server need to work and fail over if >>>>>>> you >>>>>>> do not have any load balancers and this is the common case. You are >>>>>>> trying >>>>>>> to add one where it is really not needed creating overhead for yourself. >>>>>>> >>>>>>> >>>>>>> >>>>>>>> In that case... I need to add the altnames to the certs, but I'm not >>>>>>>> 100% there in step 6 >>>>>>>> >>>>>>>> Thanks again! >>>>>>>> >>>>>>>> Cheers, >>>>>>>> >>>>>>>> Matthijs >>>>>>>> >>>>>>>> 2015-03-06 16:16 GMT+01:00 Petr Spacek <pspa...@redhat.com>: >>>>>>>>> >>>>>>>>> On 6.3.2015 15:39, Matt . wrote: >>>>>>>>>> >>>>>>>>>> I have 2 IPA servers where I kinit to and post to the api using >>>>>>>>>> curl/json. >>>>>>>>> >>>>>>>>> If we are talking purely about scripting, you can use IPA Python API. >>>>>>>>> It >>>>>>>>> will >>>>>>>>> handle fail over for you even without any load balancer. That would be >>>>>>>>> easiest >>>>>>>>> way. >>>>>>>>> >>>>>>>>>> As I need redundancy and don't want to have it script managed, but >>>>>>>>>> one >>>>>>>>>> central point where I can tal to I use a loadbalancer. >>>>>>>>> >>>>>>>>> Well, if you can control clients then the easiest and most universal >>>>>>>>> way >>>>>>>>> is to >>>>>>>>> use DNS SRV records and add failover logic to clients. That solution >>>>>>>>> works >>>>>>>>> even when servers are geographically distributed/in different networks >>>>>>>>> and >>>>>>>>> does not have single point of failure (the load balancer). >>>>>>>>> >>>>>>>>>> As I connect to the loadbalancer using DNAT, so the client IP is >>>>>>>>>> known >>>>>>>>>> on the IPA server because this is needed for the http service >>>>>>>>>> principals I need to add the loadbalancer hostname to my IPA server >>>>>>>>>> and make it as an ALT name to it's Certificate. >>>>>>>>>> >>>>>>>>>> As the users are the same on both servers I would asume i can use a >>>>>>>>>> keytab for a user against both servers from my clients. >>>>>>>>> >>>>>>>>> I'm talking about keytabs on the FreeIPA servers - services running on >>>>>>>>> IPA >>>>>>>>> server have their own keytabs too. Every service on every server has >>>>>>>>> own >>>>>>>>> keytab with different key. >>>>>>>>> >>>>>>>>> You need to talk with Simo or some other Kerberos guru about >>>>>>>>> possibility >>>>>>>>> of >>>>>>>>> sharing keytabs between IPA services. >>>>>>>>> >>>>>>>>>> Does this make it more clear ? >>>>>>>>> >>>>>>>>> I'm still not sure if you want to have human users too or just API >>>>>>>>> clients. >>>>>>>>> >>>>>>>>> Petr^2 Spacek >>>>>>>>> >>>>>>>>>> 2015-03-06 15:31 GMT+01:00 Petr Spacek <pspa...@redhat.com>: >>>>>>>>>>> >>>>>>>>>>> On 6.3.2015 15:13, Matt . wrote: >>>>>>>>>>>> >>>>>>>>>>>> Hi, >>>>>>>>>>>> >>>>>>>>>>>> But as the user is the same, I could use the same keytab for each >>>>>>>>>>>> ipa >>>>>>>>>>>> server ? >>>>>>>>>>>> >>>>>>>>>>>> I need to use the API indeed, so need to issue the http service. >>>>>>>>>>>> >>>>>>>>>>>> Any other options ? >>>>>>>>>>> >>>>>>>>>>> I do not really understand your use case. Could you describe it in >>>>>>>>>>> detail, please? >>>>>>>>>>> >>>>>>>>>>> Petr^2 Spacek >>>>>>>>>>> >>>>>>>>>>>> 2015-03-06 14:24 GMT+01:00 Petr Spacek <pspa...@redhat.com>: >>>>>>>>>>>>> >>>>>>>>>>>>> On 6.3.2015 14:08, Martin Kosek wrote: >>>>>>>>>>>>>> >>>>>>>>>>>>>> I'm figuring out how to regenerate the webserver certificates so >>>>>>>>>>>>>> I >>>>>>>>>>>>>> can >>>>>>>>>>>>>> use a loadbalancer in front of my ipa servers. >>>>>>>>>>>>> >>>>>>>>>>>>> Are you talking about FreeIPA web interface? It is technically >>>>>>>>>>>>> possible to use >>>>>>>>>>>>> load-balancer but it will be really hacky. You would have to solve >>>>>>>>>>>>> certificates and also distribute shared keytabs and so on. >>>>>>>>>>>>> >>>>>>>>>>>>> I would recommend you to use "something" which issues HTTP >>>>>>>>>>>>> redirect >>>>>>>>>>>>> to ipa >>>>>>>>>>>>> server 1/2/3/4/5 according to current state instead of using >>>>>>>>>>>>> classical load >>>>>>>>>>>>> balancer on the network level. Normal HTTP redirect will not force >>>>>>>>>>>>> you to mess >>>>>>>>>>>>> with certs and keytabs. >>>>>>>>>>>>> >>>>>>>>>>>>> -- >>>>>>>>>>>>> Petr^2 Spacek >>>>>>>>> >>>>>>>>> >>>>>>>>> -- >>>>>>>>> Petr Spacek @ Red Hat >>>>>>> >>>>>>> >>>>>>> >>>>>>> -- >>>>>>> Thank you, >>>>>>> Dmitri Pal >>>>>>> >>>>>>> Sr. Engineering Manager IdM portfolio >>>>>>> Red Hat, Inc. >>>>>>> >>>>>>> >>>>>>> -- >>>>>>> Manage your subscription for the Freeipa-users mailing list: >>>>>>> https://www.redhat.com/mailman/listinfo/freeipa-users >>>>>>> Go to http://freeipa.org for more info on the project >>>>> >>>>> >>>>> >>>>> -- >>>>> Thank you, >>>>> Dmitri Pal >>>>> >>>>> Sr. Engineering Manager IdM portfolio >>>>> Red Hat, Inc. >>>>> >>>>> -- >>>>> Manage your subscription for the Freeipa-users mailing list: >>>>> https://www.redhat.com/mailman/listinfo/freeipa-users >>>>> Go to http://freeipa.org for more info on the project > -- Manage your subscription for the Freeipa-users mailing list: https://www.redhat.com/mailman/listinfo/freeipa-users Go to http://freeipa.org for more info on the project