Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add optional SSL support #46

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open

Conversation

fsagbuya
Copy link
Contributor

@fsagbuya fsagbuya commented Oct 2, 2024

Description

Add optional SSL/TLS support with mutual authentication. SSL is enabled when certificate files are provided.

  • Add SSL context creation in AsyncioServer requiring both server and client certificates
  • Update Client, AsyncioClient, and BestEffortClient classes to support mutual SSL authentication
  • Modify simple_server_loop to handle certificate verification
  • Add SSL parameter support to sipyco_rpctool (--cert, --key, --cafile)
  • Add documentation for SSL setup and usage including certificate generation

Related issue:

m-labs/artiq#2577

@sbourdeauducq
Copy link
Member

Needs documentation (docstring update).

@sbourdeauducq
Copy link
Member

Many things missing, e.g.

  • support in rpctool
  • support in other sipyco protocols: sync_struct, logging, broadcast
  • documentation about how to generate certificates

@sbourdeauducq
Copy link
Member

You could do the protocols one by one if you prefer, and then we merge those PRs to a separate branch first.

@fsagbuya fsagbuya marked this pull request as draft October 9, 2024 06:56
@fsagbuya fsagbuya force-pushed the ssl-support branch 2 times, most recently from 98e30d6 to 2bdae90 Compare October 9, 2024 07:58
@fsagbuya fsagbuya marked this pull request as ready for review October 9, 2024 07:58
@sbourdeauducq
Copy link
Member

This doesn't authenticate the client, does it?
The main point of having SSL is preventing unwanted users from connecting to sipyco servers.

@sbourdeauducq
Copy link
Member

sbourdeauducq commented Oct 21, 2024

I think you can add a client certificate (with different SSL API calls), or just a password.

@fsagbuya fsagbuya marked this pull request as ready for review November 7, 2024 03:40
@fsagbuya fsagbuya force-pushed the ssl-support branch 2 times, most recently from 12ac4f4 to 2a7f45f Compare November 8, 2024 06:54
@fsagbuya fsagbuya force-pushed the ssl-support branch 2 times, most recently from 01b8a9b to 800e8a8 Compare March 20, 2025 08:42
Copy link

@architeuthidae architeuthidae left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

All this limits the server to connecting to only one client, no? Is that a limitation we're accepting? If so, it should probably be documented.

@sbourdeauducq
Copy link
Member

Yeah I'm not convinced of this certificate setup with IP addresses in them. We do want to allow several clients on one server, but I suppose they could share the same client certificate (if this IP address business doesn't get in the way).

@architeuthidae
Copy link

We do want to allow several clients on one server, but I suppose they could share the same client certificate (if this IP address business doesn't get in the way).

If they don't share an IP address and check_hostname is on I assume it'd cause problems. I figure theoretically the cleanest solution is to sign further client certificates CA-style but sharing the certificate (and disabling check_hostname) may be more user-friendly. At that point though it might also be friendliest to just disable the certificate check entirely and just use a password on top of basic TLS, that way nobody has to worry too much about the PKI stuff.

@sbourdeauducq
Copy link
Member

At that point though it might also be friendliest to just disable the certificate check entirely and just use a password on top of basic TLS

This still needs some certificates, no?

@architeuthidae
Copy link

This still needs some certificates, no?

Yes, but it no longer matters what certificate, or who they're signed by. At that point it's just a way to trade public keys.

@sbourdeauducq
Copy link
Member

Yes, but it no longer matters what certificate

Then what prevents a MITM attack that intercepts the password?

@architeuthidae
Copy link

Then what prevents a MITM attack that intercepts the password?

Hmm, nothing. Nevermind.

@sbourdeauducq
Copy link
Member

Sounds like we should try to go for shared client certificates (created without IP address/hostname fields) and check_hostname=False then?

@fsagbuya
Copy link
Contributor Author

Sounds like we should try to go for shared client certificates (created without IP address/hostname fields) and check_hostname=False then?

Based on the previous discussion, this is the simplest solution. Otherwise, a full private CA setup is an option, but it wouldn't be user-friendly.

@sbourdeauducq
Copy link
Member

Add asyncio_tools that imports tools with a DeprecationWarning for backward compatibility.

@fsagbuya fsagbuya force-pushed the ssl-support branch 2 times, most recently from 345c84b to 1c20eae Compare March 26, 2025 10:45
Signed-off-by: Florian Agbuya <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants