[tech] SSL on various services with LetsEncrypt

Felix von Perger frekk at ucc.asn.au
Fri Dec 7 18:50:11 AWST 2018


Hi all,

[CFE] and I worked on enabling / fixing SSL on a bunch of services 
today. This hopefully hasn't broken anything significant.

  * Wiki on mooneye using acmetool
      o acmetool want wiki.ucc.asn.au wiki.ucc.gu.uwa.edu.au
        wikisfa.ucc.gu.uwa.edu.au wikisfa.ucc.asn.au
      o Added redirects to HTTPS versions of the above domains in
        /etc/apache2/sites-enabled/wiki.conf
  * Attempted to migrate AD domain controller host certificates on samson
      o Using certbot and custom scripts calling samba-tool to manually
        update a TXT record for _acme-challenge.ad.ucc.gu.uwa.edu.au
      o In order to allow acme to issue a wildcard certificate for
        *.ad.ucc.gu.uwa.edu.au, the TXT record must be resolvable
        externally;
          + Done by setting allow-recursion {any;} in
            mooneye:/etc/bind/named.conf.options
          + There doesn't seem to be a way to have more fine-grained
            access control to recursion/forwarding queries to forward
            zones while using bind, so this seems like the only option
            that would work
          + It also means that anyone can ask mooneye to do DNS lookups
            for any domain. Is this a bad thing?!
      o It may be possible to request certificates using HTTP port 80 as
        the proof of ownership mechanism - however we cannot generate
        wildcard certificates this way.
          + Nothing else listens on port 80 on AD DCs
          + samson.ad.ucc.gu.uwa.edu.au still needs to be externally
            resolvable - which can only be done in our current software
            configuration by allow-recursion {any;}
  * Proxmox (maltair, medico and loveday) - see
    https://pve.proxmox.com/wiki/Certificate_Management
      o using `pvenode config set --acme
        domains=$HOST.ucc.gu.uwa.edu.au;$HOST.ucc.asn.au`
      o and `pvenode acme cert order`
      o This is also integrated into the Proxmox web UI, and once acme
        is configured it will automatically renew certificates when
        necessary
  * Also planned to generate an SSL certificate for RADIUS (also on
    samson) using HTTP
      o Windows will not break when connecting to wifi if a valid
        (trusted) server certificate is presented for the RADIUS server
        hostname (AFAIK).
      o Note: this can be done using samson.ucc.gu.uwa.edu.au rather
        than samson.ad.ucc.gu.uwa.edu.au (since subdomains of ad.ucc may
        not be resolvable externally)
      o Alternatively RADIUS could be configured to use the same
        wildcard certificate as AD, provided it is possible to generate one.
          + Why not just do that? It /would/ probably work but only if
            the AD wildcard certificates work as well, which they don't
            seem to currently.

Please feel free to contact either myself or [CFE] regarding breakages 
or security hazards introduced by the above changes.

Best regards,
Felix von Perger [FVP]
UCC Wheel Member


-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.ucc.gu.uwa.edu.au/pipermail/tech/attachments/20181207/842f7d3d/attachment.htm 


More information about the tech mailing list