Re: [Users] RHEV-m hosts with certs configured

2013-09-17 Thread Dan Kenigsberg
On Thu, Aug 22, 2013 at 06:28:20AM -0400, Itamar Heim wrote:
> On 08/16/2013 04:14 AM, navin p wrote:
> >Hi,
> >I have couple of RHEV hosts (ovpxen,RHV2, RHV10 etc)  and i'm trying
> >to connect from one of the client machine (C1). All the RHEV host have
> >libvirt modified by vdsm. It looks like the below
> >
> >
> >## beginning of configuration section by vdsm-4.10.2
> >listen_addr="0.0.0.0"
> >unix_sock_group="kvm"
> >unix_sock_rw_perms="0770"
> >auth_unix_rw="sasl"
> >host_uuid="036118ab-705f-4aeb-9a13-013dc8af6b41"
> >keepalive_interval=-1
> >log_outputs="1:file:/var/log/libvirtd.log"
> >log_filters="3:virobject 3:virfile 2:virnetlink 3:cgroup 3:event 3:json
> >1:libvirt 1:util 1:qemu"
> >ca_file="/etc/pki/vdsm/certs/cacert.pem"
> >cert_file="/etc/pki/vdsm/certs/vdsmcert.pem"
> >key_file="/etc/pki/vdsm/keys/vdsmkey.pem"
> >## end of configuration section by vdsm-4.10.2
> >
> >
> >
> >
> ># ls
> >bkp-2013-08-16_110734_cacert.pemcacert.pem vdsmcert.pem
> >bkp-2013-08-16_110734_vdsmcert.pem  engine_web_ca.pem
> >[root@ovpxen certs]# pwd
> >/etc/pki/vdsm/certs
> >[root@ovpxen certs]# certtool -i --infile engine_web_ca.pem  | head
> >X.509 Certificate Information:
> > Version: 3
> > Serial Number (hex): 09
> > Issuer: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
> > Validity:
> > Not Before: Wed Jan 23 13:24:14 UTC 2013
> > Not After: Sun Jan 22 07:54:14 UTC 2023
> > Subject: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
> > Subject Public Key Algorithm: RSA
> > Modulus (bits 1024):
> >
> >certtool -i --infile cacert.pem | head
> >X.509 Certificate Information:
> > Version: 3
> > Serial Number (hex): 09
> > Issuer: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
> > Validity:
> > Not Before: Wed Jan 23 13:24:14 UTC 2013
> > Not After: Sun Jan 22 07:54:14 UTC 2023
> > Subject: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
> > Subject Public Key Algorithm: RSA
> > Modulus (bits 1024):
> >[root@ovpxen certs]# certtool -i --infile vdsmcert.pem | head
> >X.509 Certificate Information:
> > Version: 3
> > Serial Number (hex): 0c
> > Issuer: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
> > Validity:
> > Not Before: Thu Aug 15 11:09:22 UTC 2013
> > Not After: Wed Aug 15 05:39:22 UTC 2018
> > Subject: O=HP,CN=16.184.46.53
> > Subject Public Key Algorithm: RSA
> > Modulus (bits 2048):
> >
> >
> >Now from the client C1 which cert should i place in
> >/etc/pki/CA/cacert.pem so that i can access from the client using the URI
> >qemu+tls://ovpxen.ind.hp.com/system .
> >  Please note the host IWFVM00772.hpswlabs.adapps.hp.com
> > is ovirt managed host. It is
> >not the client.
> >
> >
> >My problem here is i can't change the hypervisor hosts as there are too
> >many of them and it is configured by vdsm . What certs should i take
> >from host so that i can use it in the client so that i can connect to
> >multiple hosts from the client using virsh or virt-manager . I need tls
> >as remote protocol as i'm trying to automate commands.
> >
> 
> you should be able to do read-only access without special config iirc.
> taking actions requires the vdsm password, but worth discussing if
> you want to take actions under the feet of vdsm what they would be.

As Itamar said, you should really know what you are doing - an oVirt
cluster should have only ONE manager, which is Engine. Direct connection
to Vdsm/libvirt/qemu can easily lead to DoS and data corruption.

But to your question: C1 should not only have a cert, it should have its
own Engine-certified key as well. Your easiest way to get it is to add
C1 as an oVirt host. This generates a key/cert pair and configures
libvirt to use them as a client.

Dan.
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [Users] RHEV-m hosts with certs configured

2013-08-22 Thread Itamar Heim

On 08/16/2013 04:14 AM, navin p wrote:

Hi,
I have couple of RHEV hosts (ovpxen,RHV2, RHV10 etc)  and i'm trying
to connect from one of the client machine (C1). All the RHEV host have
libvirt modified by vdsm. It looks like the below


## beginning of configuration section by vdsm-4.10.2
listen_addr="0.0.0.0"
unix_sock_group="kvm"
unix_sock_rw_perms="0770"
auth_unix_rw="sasl"
host_uuid="036118ab-705f-4aeb-9a13-013dc8af6b41"
keepalive_interval=-1
log_outputs="1:file:/var/log/libvirtd.log"
log_filters="3:virobject 3:virfile 2:virnetlink 3:cgroup 3:event 3:json
1:libvirt 1:util 1:qemu"
ca_file="/etc/pki/vdsm/certs/cacert.pem"
cert_file="/etc/pki/vdsm/certs/vdsmcert.pem"
key_file="/etc/pki/vdsm/keys/vdsmkey.pem"
## end of configuration section by vdsm-4.10.2




# ls
bkp-2013-08-16_110734_cacert.pemcacert.pem vdsmcert.pem
bkp-2013-08-16_110734_vdsmcert.pem  engine_web_ca.pem
[root@ovpxen certs]# pwd
/etc/pki/vdsm/certs
[root@ovpxen certs]# certtool -i --infile engine_web_ca.pem  | head
X.509 Certificate Information:
 Version: 3
 Serial Number (hex): 09
 Issuer: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
 Validity:
 Not Before: Wed Jan 23 13:24:14 UTC 2013
 Not After: Sun Jan 22 07:54:14 UTC 2023
 Subject: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
 Subject Public Key Algorithm: RSA
 Modulus (bits 1024):

certtool -i --infile cacert.pem | head
X.509 Certificate Information:
 Version: 3
 Serial Number (hex): 09
 Issuer: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
 Validity:
 Not Before: Wed Jan 23 13:24:14 UTC 2013
 Not After: Sun Jan 22 07:54:14 UTC 2023
 Subject: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
 Subject Public Key Algorithm: RSA
 Modulus (bits 1024):
[root@ovpxen certs]# certtool -i --infile vdsmcert.pem | head
X.509 Certificate Information:
 Version: 3
 Serial Number (hex): 0c
 Issuer: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
 Validity:
 Not Before: Thu Aug 15 11:09:22 UTC 2013
 Not After: Wed Aug 15 05:39:22 UTC 2018
 Subject: O=HP,CN=16.184.46.53
 Subject Public Key Algorithm: RSA
 Modulus (bits 2048):


Now from the client C1 which cert should i place in
/etc/pki/CA/cacert.pem so that i can access from the client using the URI
qemu+tls://ovpxen.ind.hp.com/system .
  Please note the host IWFVM00772.hpswlabs.adapps.hp.com
 is ovirt managed host. It is
not the client.


My problem here is i can't change the hypervisor hosts as there are too
many of them and it is configured by vdsm . What certs should i take
from host so that i can use it in the client so that i can connect to
multiple hosts from the client using virsh or virt-manager . I need tls
as remote protocol as i'm trying to automate commands.



you should be able to do read-only access without special config iirc.
taking actions requires the vdsm password, but worth discussing if you 
want to take actions under the feet of vdsm what they would be.


___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


[Users] RHEV-m hosts with certs configured

2013-08-17 Thread navin p
Hi,
   I have couple of RHEV hosts (ovpxen,RHV2, RHV10 etc)  and i'm trying to
connect from one of the client machine (C1). All the RHEV host have libvirt
modified by vdsm. It looks like the below


## beginning of configuration section by vdsm-4.10.2
listen_addr="0.0.0.0"
unix_sock_group="kvm"
unix_sock_rw_perms="0770"
auth_unix_rw="sasl"
host_uuid="036118ab-705f-4aeb-9a13-013dc8af6b41"
keepalive_interval=-1
log_outputs="1:file:/var/log/libvirtd.log"
log_filters="3:virobject 3:virfile 2:virnetlink 3:cgroup 3:event 3:json
1:libvirt 1:util 1:qemu"
ca_file="/etc/pki/vdsm/certs/cacert.pem"
cert_file="/etc/pki/vdsm/certs/vdsmcert.pem"
key_file="/etc/pki/vdsm/keys/vdsmkey.pem"
## end of configuration section by vdsm-4.10.2




# ls
bkp-2013-08-16_110734_cacert.pemcacert.pem vdsmcert.pem
bkp-2013-08-16_110734_vdsmcert.pem  engine_web_ca.pem
[root@ovpxen certs]# pwd
/etc/pki/vdsm/certs
[root@ovpxen certs]# certtool -i --infile engine_web_ca.pem  | head
X.509 Certificate Information:
Version: 3
Serial Number (hex): 09
Issuer: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
Validity:
Not Before: Wed Jan 23 13:24:14 UTC 2013
Not After: Sun Jan 22 07:54:14 UTC 2023
Subject: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
Subject Public Key Algorithm: RSA
Modulus (bits 1024):

certtool -i --infile cacert.pem | head
X.509 Certificate Information:
Version: 3
Serial Number (hex): 09
Issuer: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
Validity:
Not Before: Wed Jan 23 13:24:14 UTC 2013
Not After: Sun Jan 22 07:54:14 UTC 2023
Subject: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
Subject Public Key Algorithm: RSA
Modulus (bits 1024):
[root@ovpxen certs]# certtool -i --infile vdsmcert.pem | head
X.509 Certificate Information:
Version: 3
Serial Number (hex): 0c
Issuer: C=US,O=HP,CN=CA-IWFVM00772.hpswlabs.adapps.hp.com.64431
Validity:
Not Before: Thu Aug 15 11:09:22 UTC 2013
Not After: Wed Aug 15 05:39:22 UTC 2018
Subject: O=HP,CN=16.184.46.53
Subject Public Key Algorithm: RSA
Modulus (bits 2048):


Now from the client C1 which cert should i place in /etc/pki/CA/cacert.pem
so that i can access from the client using the URI
qemu+tls://ovpxen.ind.hp.com/system.  Please note the host
IWFVM00772.hpswlabs.adapps.hp.com is ovirt managed host. It is not the
client.


My problem here is i can't change the hypervisor hosts as there are too
many of them and it is configured by vdsm . What certs should i take from
host so that i can use it in the client so that i can connect to multiple
hosts from the client using virsh or virt-manager . I need tls as remote
protocol as i'm trying to automate commands.

Regards,
Navin
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users