File: ca.md

package info (click to toggle)
rust-ntpd 1.6.2-3
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 2,904 kB
  • sloc: sh: 57; makefile: 28
file content (161 lines) | stat: -rw-r--r-- 5,987 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
# Private CA and certificate

!!! Danger

    Setting up your own CA is not recommended except for development purposes
    and setting up internal-only networks. For all other purposes, we would
    recommend to use a widely trusted CA for issuing certificates. See the
    [NTS guide](../guide/nts.md) for more information.

Setting up NTS-KE when your server has no public domain name is still possible
by creating your own certificate authority (CA). To setup a CA and the
certificate for our server we will use the OpenSSL command line tools. They are
available through most package managers as the `openssl` package.

## Root certificate
We will start by generating a CA root key and certificate. To start, create a
directory where we will store all our certificate data:

```sh
mkdir "/path/to/some/ca-data"
cd "/path/to/some/ca-data"
```

To generate the root key, use this OpenSSL command:

```sh
openssl genrsa -des3 -out ca.key 2048
```

This will ask for a password for the root key. It is recommended that you set
one, as this will prevent others from directly using your CA key should it ever
leak. However, for development purposes you may opt to omit a password by
removing the `-des3` CLI flag. Once the key is generated, we can generate a CA
root certificate by using this command:

```sh
openssl req -x509 -new -nodes -key ca.key -sha256 -days 1825 -out ca.pem
```

Here, `-days` is the number of days that this certificate is valid, the value in
the command here results in a validity of five years. OpenSSL will ask for
several pieces of information during the setup of the root certificate. The
ntpd-rs daemon does not impose particular requirements to the information in
your root certificate, so feel free to leave things empty. Note that this
command bases the certificate validity based on the current system time, so make
sure that it is reasonably accurate.

## Server certificate
Once our CA root is setup, we can continue generating the server key and
certificate. First, we start by generating a private key for the server:

```sh
openssl genrsa -out ntpd-rs.test.key 2048
```

This time we omit the `-des3` CLI flag, so the private key is not protected with
a password. The ntpd-rs daemon does not support password encrypted private keys,
so we cannot password protect our private key. Once the private key is
generated, we need to create a certificate signing request. We again can use
openssl to do this for us:

```sh
openssl req -new -key ntpd-rs.test.key -out ntpd-rs.test.csr
```

OpenSSL will once again ask for some information, but ntpd-rs once again does
not impose any requirements on the information requested, so feel free to leave
things empty once again. With the certificate signing request generated, we now
only need a little bit of configuration to tell the CA root how the generated
certificate will be used, to do this, create a file called `ntpd-rs.ext` with
the following contents, replacing the `ntpd-rs.test` domain name with your own
domain name.

```ini title="/path/to/some/ca-data/ntpd-rs.ext"
authorityKeyIdentifier=keyid,issuer
basicConstraints=CA:FALSE
keyUsage = keyEncipherment
subjectAltName = @alt_names

[alt_names]
DNS.1 = ntpd-rs.test
```

Note that the domain name does not actually have to exist, but it will be the
domain name that clients somehow have to connect to (e.g. by setting an
`/etc/hosts` entry). We now have enough information to generate a certificate:

```sh
openssl x509 -req -in ntpd-rs.test.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out ntpd-rs.test.crt -days 1825 -sha256 -extfile ntpd-rs.ext
```

The above command gives the certificate a period validity of 5 years. If a
different lifetime is desired, change the number following the `-days` argument
to the number of days the certificate should be valid. The generated certificate
should be concatenated together with the CA certificate, as ntpd-rs needs the
full certificate chain in order to operate. We can use a simple command to do
this:

```sh
cat ntpd-rs.test.crt ca.pem > ntpd-rs.test.chain.pem
```

## Using the generated certificate
We are now ready to configure the key exchange part of NTS with our generated
certificate. Simply update your `/etc/ntpd-rs/ntp.toml` configuration with the
following `[[nts-ke-server]]` section (or update an existing section):

```toml title="/etc/ntpd-rs/ntp.toml"
# ...

[[nts-ke-server]]
listen = "[::]:4460"
certificate-chain-path = "/path/to/some/ca-data/ntpd-rs.test.chain.pem"
private-key-path = "/path/to/some/ca-data/ntpd-rs.test.key"

# ...
```

Finally, restart your ntpd-rs daemon by running `systemctl restart ntpd-rs`.
Your server should now be ready to handle NTS!

!!! Danger

    When configured as above, it is important to ensure that the TLS private key
    can only be read by ntpdaemon and trusted system administrators. An attacker
    can use this key material to compromise all connections to clients.

## Client setup
Once your server was setup, you will need to distribute the certificate
authority root certificate to clients that will be using the NTS server. Note
that you should only ever share the `ca.pem` file and never the `ca.key` file!

In your client, now you will need to make sure that the domain name under which
you reach the server is the same as the domain name for which you configured
the server certificate. In our example above we used the domain name
`ntpd-rs.test`. If we wanted the server to be able to reach itself, we can
simply add a `/etc/hosts` entry for this, like such:

```txt title="/etc/hosts" hl_lines="3"
...
127.0.0.1   localhost
127.0.0.1   ntpd-rs.test
...
```

Now in your client configuration, you can setup a NTS source with our private
CA root certificate:

```toml title="/etc/ntpd-rs/ntp.toml"
# ...

[[source]]
mode = "nts"
address = "ntpd-rs.test"
certificate-authority = "/path/to/some/ca-data/ca.pem"

# ...
```

Of course, if you are setting up another client, do not forget to copy the
`ca.pem` file to that client!