Mark,

On 2/17/21 12:25, Mark Thomas wrote:
On 17/02/2021 17:16, Christopher Schultz wrote:
Mark,

Why not simply mint a self-signed cert that lasts a long time? They are
self-signed so global trust isn't important. If global-trust isn't
important then it's okay if someone "steals" them any time they like.

Mainly to act as a deterrent to anyone using these certs in any sort of
production system. Yes, that would be a monumentally bad idea but I
wouldn't be surprised if it happened.

It is also nice to see things expiring. It reassures me that stuff is
working as it should :)

Having to re-generate the certs is just a nuissance and causes
revision-churn.

Updating the certs is trivial. Just copy and past a handful of commands
in the text file in the PMC repo. Given the ever changing requirements
of server certs, I don't think the revision churn would be that
different with longer expiry times.

I think it would be better to either mint the certs as needed (e.g. in
the tests themselves) or just use a cert that lasts a long time (e.g. 30
years). Minting on-demand might kill the entropy on the server, so
that's not a great idea.

Yeah, creation on demand would be nice but it currently requires OpenSSL
which isn't guaranteed to be available.

Why not keytool or a "simple" Java driver to do the same?

> The entropy issue is a larger concern.

Yup. Unless we can convince the system to use /dev/urandom for key generation, which is something we *always* recommend against, and for good reason.

If we write our own cert-creator, perhaps we can rig it to use an awful source of entropy so it's nice and fast.

-chris

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to