Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CRLs: Add crl storage proxy #6162

Closed
aarongable opened this issue Jun 14, 2022 · 0 comments · Fixed by #6264
Closed

CRLs: Add crl storage proxy #6162

aarongable opened this issue Jun 14, 2022 · 0 comments · Fixed by #6264
Assignees

Comments

@aarongable
Copy link
Contributor

The crl updater which manages the whole crl generation process needs to talk both to the CA (for signing) and to the public internet (for uploading). That's unfortunate. Instead, create a crl storage "proxy" (filling a role similar to the ocsp-responder) which can live in a less-privileged network segment, and which handles all talking to the public internet.

@aarongable aarongable added this to the Sprint 2022-07-26 milestone Jul 26, 2022
@aarongable aarongable self-assigned this Jul 26, 2022
aarongable added a commit that referenced this issue Aug 8, 2022
Create a new crl-storer service, which receives CRL shards via gRPC and
uploads them to an S3 bucket. It ignores AWS SDK configuration in the
usual places, in favor of configuration from our standard JSON service
config files. It ensures that the CRLs it receives parse and are signed
by the appropriate issuer before uploading them.

Integrate crl-updater with the new service. It streams bytes to the
crl-storer as it receives them from the CA, without performing any
checking at the same time. This new functionality is disabled if the
crl-updater does not have a config stanza instructing it how to connect
to the crl-storer.

Finally, add a new test component, the s3-test-srv. This acts similarly
to the existing mail-test-srv: it receives requests, stores information
about them, and exposes that information for later querying by the
integration test. The integration test uses this to ensure that a
newly-revoked certificate does show up in the next generation of CRLs
produced.

Fixes #6162
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant