Seperate out CFSSL server components from cf_impl_cfssl
See original GitHub issueCurrently CFSSL is automatically set up and run from ca_impl_cfssl.py
I think we should separate out the server components start_cfssl
and stop_cfssl
and instead just have the ip and port configurable and the operator runs their own cfssl instance wherever they like (it might be on a different host to the keylime_verifier
), perhaps behind its own firewall etc. Either way I don’t think it should not be possible to run it separately.
In time we should also look to make CA’s plugable, so different PKI systems can be utilised.
@jetwhiz @nabilschear - any objections to the above? If not I will give it a key_feature label.
Issue Analytics
- State:
- Created 4 years ago
- Comments:7 (6 by maintainers)
Top Results From Across the Web
CFSSL: Cloudflare's PKI and TLS toolkit - GitHub
CFSSL is CloudFlare's PKI/TLS swiss army knife. It is both a command line tool and an HTTP API server for signing, verifying, and...
Read more >How to use cfssl to create self signed certificates
Typically this is used to create one or more intermediate certificate authorities. These intermediates are used to sign certificates for clients, servers and ......
Read more >Introducing CFSSL - CloudFlare's PKI toolkit
CFSSL is used internally by CloudFlare for bundling TLS/SSL certificates ... An SSL certificate will bind domain names to server names, ...
Read more >Enable TLS for the MySQL Client - PingCAP Docs
When TLS is enabled, these components can use certificates to request the TiDB server, each with a separate certificate. The four components are...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
i think this sounds like a great idea. We were trying to make the cert support pluggable already, but it was mostly to fix the limitations of openssl (i.e., no crl support in m2crypto). A new look at what the interface should look like might be in order.
#1012 removed CFSSL support.