In bringing up a remote hekad instance on untrusted networks, I'm looking
into client certs and how to get authentication working.

Even creating the right type of cert w/ the correct extensions has been a
challenge. I finally found some info on the necessary openssl invocations:
https://github.com/coreos/etcd/issues/209#issuecomment-25945639

So with RequireAndVerifyClientCert, will hekad actually authenticate
somehow or just check the validity of the client cert and
that x509.ExtKeyUsageClientAuth is set in ExtKeyUsage[]? Is there something
I'm missing about how it will actually restrict to a specific CN or can it
require a shared intermediary?

Also, how would one convey a CRL to hekad so as to clean up after any
compromised private keys?

Apologies if I've mis-used any of these terms, I'm pretty ignorant WRT to
SSL/TLS. I know just enough to be dangerous.
_______________________________________________
Heka mailing list
[email protected]
https://mail.mozilla.org/listinfo/heka

Reply via email to