tripleo-image-elements/elements/openstack-ssl
Tom Cammann f1816836f3 Disable SSLv3 in Stunnel
In light of the POODLE vulnerability SSLv3 should be disabled.

Change-Id: Ic5de6683b6798682844e4801ccdf5577e9a65dac
2014-10-16 11:04:12 +01:00
..
os-apply-config/etc Disable SSLv3 in Stunnel 2014-10-16 11:04:12 +01:00
os-refresh-config/pre-configure.d Extract stunnel from openstack-ssl 2014-09-17 08:56:34 +01:00
README.md Extract stunnel from openstack-ssl 2014-09-17 08:56:34 +01:00
element-deps Extract stunnel from openstack-ssl 2014-09-17 08:56:34 +01:00

README.md

Configure stunnel4 for local services.

Configuration

stunnel: cert: certdata key: keydata ports:

  • name: 'ec2' accept: 13773 connect: 8773
  • name: 'image' accept: 13292 connect: 9292
  • name: 'identity' accept: 13000 connect: 5000
  • name: 'network' accept: 13696 connect: 9696
  • name: 'compute' accept: 13774 connect: 8774
  • name: 'swift-proxy' accept: 13080 connect: 8080
  • name: 'cinder' accept: 13776 connect: 8776 connect_host: localhost

The certificate and key data will be written to /etc/ssl/from-heat.{crt,key}.

The certificate and key will be held persistently by Heat, so only use this with an SSL enabled heat, and as soon as bug 1269999 is fixed, we will migrate away from this implementation.

Note that the public API endpoints in keystone need to be registered with https urls, which is outside the scope of the local machine configuration process.

See the stunnel man page for documentation on crt and key formats etc.