Skip to content

Commit

Permalink
Merge pull request #91 from telefonicaid/hardening/84_self_signed_cer…
Browse files Browse the repository at this point in the history
…t_creation

hardening/84_self_signed_cert_creation
  • Loading branch information
gtorodelvalle committed Oct 2, 2015
2 parents 03149fa + 4138399 commit 9c58b0c
Show file tree
Hide file tree
Showing 2 changed files with 22 additions and 3 deletions.
2 changes: 2 additions & 0 deletions CHANGES_NEXT_RELEASE
Original file line number Diff line number Diff line change
Expand Up @@ -29,3 +29,5 @@
- [cosmos-gui] [BUG] Fix the path to the certificate and key files (#83)
- [cosmos-gui] [HARDENING] Add an annex about creating and installing a RSA identity (#87)
- [cosmos-gui] [BUG] Disable pseudo-terminal in ssh command executions (#88)
- [cosmos-gui] [HARDENING] Add an annex about creating a self-signed certificate (#84)

23 changes: 20 additions & 3 deletions cosmos-gui/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,8 @@
* [Logging traces](#loggingtraces)
* [Database](#database)
* [Annexes](#annexes)
* [Annex A](#annexa)
* [Annex A: Creating and installing a RSA identity](#annexa)
* [Annex B: Creating a self-signed certificate](#annexb)
* [Reporting issues and contact information](#contact)

##<a name="whatis"></a>What is cosmos-gui
Expand Down Expand Up @@ -192,7 +193,7 @@ cosmos-gui is configured through `conf/cosmos-gui.json`. There you will find a J
* **gui**:
* **port**: Specifies the listening port for the application. By default it is 80, but can be changed if such a port is being used in your deployment.
* **private\_key\_file**: File name containing the private key used to encrypt the communications with the clients.
* **certificate\_file**: File name containing the self-signed X509 certificate used by the server to send the clients the public counterpart of the above private key.
* **certificate\_file**: File name containing the self-signed X509 certificate used by the server to send the clients the public counterpart of the above private key (see [Annex B](#annexb)].
* **clusters**:
* **storage**
* **endpoint**: IP address or FQDN of the Namenode/HttpFS server of the storage cluster.
Expand Down Expand Up @@ -367,7 +368,7 @@ Information regarding registered users in Cosmos can be found in a MySQL table n
[Top](#top)

##<a name="annexes"></a>Annexes
###<a name="annexa"></a>Annex A: creating and installing a RSA identity
###<a name="annexa"></a>Annex A: Creating and installing a RSA identity

For this guide we will assume there is a server machine `server_vm` needed to be accessed by a client machine `client_vm`.

Expand Down Expand Up @@ -413,6 +414,22 @@ Finally, you can check the access from the client machine:

[Top](#top)

###<a name="annexb"></a>Annex B: Creating a self-signed certificate

First of all, create a private key; it may not be necessary if you already have one:

$ openssl genrsa -out private-key.pem 1024

Second, create a Certificate Signing Request (CSR) using the privte key:

$ openssl req -new -key private-key.pem -out csr.pem

Finally, create the self-signed certificate:

$ openssl x509 -req -in csr.pem -signkey private-key.pem -out public-cert.pem

[Top](#top)

##<a name="contact"></a>Reporting issues and contact information
There are several channels suited for reporting issues and asking for doubts in general. Each one depends on the nature of the question:

Expand Down

0 comments on commit 9c58b0c

Please sign in to comment.