[TriLUG] [Maybe OT]: SSL certificates

Ryan Leathers ryan.leathers at globalknowledge.com
Thu Sep 4 08:51:30 EDT 2003


Jon,

I for one would love to see anything you have written.

On Wed, 2003-09-03 at 14:47, Jon Carnes wrote:
> I've just setup a client for using his own CA and wrote out the specs in
> a how-to like fashion.  If you want, I'll be happy to share them (with
> the client specifics removed).
> 
> If you are doing DNS round-robin then that is going to be the best way
> of doing SSL - unless you simply use a separate host name for the SSL
> and only have it done on one server.
> 
> When I set this up for a former employer, I used the LVS to front-end
> for several back-end servers, including servers running SSL.  The
> front-end was all one IP Address so we only needed one cert, and then we
> put that cert on each of the back-end boxes.  That was years ago and
> it's still up and running without any problems.  
> 
> The nice thing about using the LVS was that you could maintain state
> (the end-user would end up at the same back-end server as long as they
> made a request before a specific time-out period), but if the server
> went down, they were transparently shuttled to a new server.  
> 
> I don't think you get that with a DNS-round-robin; but it is a simpler
> setup.
> 
> Jon
> 
> On Wed, 2003-09-03 at 13:56, Joseph Tate wrote:
> > ryan wheaton wrote:
> > 
> > > It's only maybe OT cause I'm using apache on linux servers :-)
> > >
> > > but...  i'm new to SSL certificates, and was wondering if there was a 
> > > way to get a site wide SSL certificate instead of having one per 
> > > machine.  We're going to have a web server environment with multiple 
> > > servers behind a load balancer, and we don't want our customers to 
> > > have to accept a certificate 4 or 5 times depending on which machine 
> > > they hit on that particular occasion.
> > > i was thinking that I could just do a DNS round robin set up as a 
> > > "load balancer" so that the user hit the same machine every time they 
> > > goto the site, that way we can have one certificate per machine and 
> > > our users will only have to accept it once.
> > > any idears on this?
> > >
> > > -ryan
> > >
> > I think that's the way to go.  There is such a thing as a wild card 
> > certificate, but they're still sold on a per machine basis.  If you're 
> > not going to go through Verisign or Thawte or Geotrust or any of the 
> > other certifiers, you could sign all your keys using a self signed CA 
> > certificate, and have all your users import that CA certificate.  I.e. 
> > all my users go to http://www.dragonstrider.com/security/cacert.pem
> > import the CA required to trust the certificates on  
> > https://www.dragonstrider.com as well as to use IMAPS or POP3S services 
> > though those services use separate certificates.
> > 
> > The openssl docs can help you on the exact sequence and commands required.
> > 
> > Joseph
-- 
Ryan Leathers <ryan.leathers at globalknowledge.com>
Global Knowledge
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <http://www.trilug.org/pipermail/trilug/attachments/20030904/27873d19/attachment.pgp>


More information about the TriLUG mailing list