On 8/26/25 00:54, Fraser Tweedale wrote:
On Tue, Aug 26, 2025 at 03:40:47PM +1000, Fraser Tweedale wrote:
Hi Harry,
Here are the rules for validation of iPAddressName values in the SAN
extension:
1. Each iPAddressName value must be the result of resolving at least
one of the dNSName values.
2. Each iPAddressName value must have a PTR record that returns a
name that resolves back to that IP address.
3. Only the IPA DNS records are consulted, because only data in the
IPA database is trusted for CSR validation.
Would freeipa be able to issue IPs in certificates if I enabled freeipa's
dns system but pointed it off-host for all resolutions? Or is it required
the DNS records be in local LDAP 'no matter what'.
Yes, that is required. There is no "force" option. Trusting
external DNSSec is something that could be considered, but we are
unlikely to implement this unless there is a compelling driver.
Feel free to file an RFE, especially if you or your organisation may
be able to help deliver it. (These are not empty words - the
current SAN IP support was also a community contribution).
I should mention one more thing: there is a ticket to add support
for the IP identifier type to the Dogtag ACME server:
https://issues.redhat.com/browse/IDM-2313. If ACME could work for
your use case feel free to add a comment to that ticket.
Cheers,
Fraser
Hi Fraser
Thanks for the focus here.
Consider whether it is in keeping with the intent of the RFC's to, with
a flag making the request, allow certificates with IP addresses in the
SAN for non-routable IPs to confirm via whatever DNS is configured in
the host. In the alternative, a flag to check against /etc/hosts
before failing SAN IPs not in DNS.
I think it would demonstrate the reality it is the local admins, not
freeipa devs, who are responsible for what use is made of Freeipa.
To manage my deadlines, I've already patched my code here to use
whatever DNS the host uses for IPs in the SAN. If the local admins want
that to be freeipa, then freeipa can accept the responsibility according
to the rationales you've mentioned above (I like the ACME add-on, but
it's not important to my use case).
Motivations:
DNS is long known to be the problem behind most admin's longest trouble
hunts. The SAN provides a way for an site-local long-term critical
subsystem or IOT device to learn the 'correct local IP for the important
thing' having only to check it against a local CA copy. And without
relying on whether DNS is up and running, correct, accessible,
hacked... It's a good middle ground between hard-coding non-routeable
IPs in such as /etc/hosts and hoping DNS isn't having a problem. The
revocation mechanism is critically important for routable IPs, but the
whole point of non-routeable IPs is the local admin is the authority.
Adding some multi-year reality to this: You might look at the history
of freeipa's dnssec, especially in terms of it's long-term stability and
robustness, especially when there's more than one freeipa host. Let a
system go down at any of many 'wrong moments' and it's 'restore from a
backup' if it's the 'master' or 'zap and rebuild the downstream host'
otherwise -- only noticeable when people complain later on.
--
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it:
https://pagure.io/fedora-infrastructure/new_issue