diff options
Diffstat (limited to 'roles')
| -rw-r--r-- | roles/common-LDAP/tasks/main.yml | 34 | ||||
| -rw-r--r-- | roles/common-LDAP/templates/etc/ldap/database.ldif.j2 | 2 | ||||
| -rwxr-xr-x | roles/common/files/usr/local/bin/genkeypair.sh | 10 | 
3 files changed, 28 insertions, 18 deletions
| diff --git a/roles/common-LDAP/tasks/main.yml b/roles/common-LDAP/tasks/main.yml index 37edb0b..e17bc3a 100644 --- a/roles/common-LDAP/tasks/main.yml +++ b/roles/common-LDAP/tasks/main.yml @@ -13,100 +13,108 @@      - libnet-ldap-perl      - libauthen-sasl-perl  - name: Configure slapd    template: src=etc/default/slapd.j2              dest=/etc/default/slapd              owner=root group=root              mode=0644    register: r1    notify:      - Restart slapd  - name: Create directory /etc/ldap/ssl    file: path=/etc/ldap/ssl          state=directory          owner=root group=root          mode=0755    tags:      - genkey -# XXX: It's ugly to list all roles here, and to prunes them with a -# conditional...  - name: Generate a private key and a X.509 certificate for slapd -  # XXX: GnuTLS (libgnutls26 2.12.20-8+deb7u2, found in Wheezy) doesn't -  # support ECDSA; and slapd doesn't seem to support DHE (!?) so -  # we're stuck with "plain RSA" Key-Exchange. Also, there is a bug with -  # SHA-512.    command: genkeypair.sh x509                           --pubkey=/etc/ldap/ssl/{{ item.name }}.pem                           --privkey=/etc/ldap/ssl/{{ item.name }}.key                           --ou=LDAP {{ item.ou }} --cn={{ item.name }} -                         --usage=digitalSignature,keyEncipherment,keyCertSign -                         -t rsa -b 4096 -h sha256 +                         --usage=digitalSignature,keyEncipherment +                         -t ed25519                           --owner=root --group=openldap --mode=0640    register: r2    changed_when: r2.rc == 0    failed_when: r2.rc > 1    with_items:      - { group: 'LDAP_provider', name: ldap.fripost.org, ou:               }      - { group: 'MX',            name: mx,               ou: --ou=SyncRepl }      - { group: 'lists',         name: lists,            ou: --ou=SyncRepl }    when: "item.group in group_names" +  notify: +    - Restart slapd +  tags: +    - genkey + +- name: Fetch the SyncProv's X.509 certificate +  # Ensure we don't fetch private data +  become: False +  fetch_cmd: cmd="openssl x509" +             stdin=/etc/ldap/ssl/ldap.fripost.org.pem +             dest=certs/ldap/ldap.fripost.org.pem +  when: "'LDAP_provider' in group_names"    tags:      - genkey  - name: Fetch slapd's X.509 certificate    # Ensure we don't fetch private data    become: False    fetch_cmd: cmd="openssl x509"               stdin=/etc/ldap/ssl/{{ item.name }}.pem -             dest=certs/ldap/{{ item.name }}.pem +             dest=certs/ldap/syncrepl/{{ item.name }}@{{ inventory_hostname_short }}.pem    with_items: -    - { group: 'LDAP_provider', name: ldap.fripost.org }      - { group: 'MX',            name: mx               }      - { group: 'lists',         name: lists            }    when: "item.group in group_names"    tags:      - genkey  - name: Copy the SyncProv's server certificate    copy: src=certs/ldap/ldap.fripost.org.pem          dest=/etc/ldap/ssl/ldap.fripost.org.pem          owner=root group=root          mode=0644    when: "'LDAP_provider' not in group_names"    tags:      - genkey  - name: Copy the SyncRepls's client certificates -  assemble: src=certs/ldap remote_src=no -            dest=/etc/ldap/ssl/clients.pem +  assemble: src=certs/ldap/syncrepl remote_src=no +            dest=/etc/ldap/ssl/syncrepl.pem              owner=root group=root              mode=0644    when: "'LDAP_provider' in group_names"    tags:      - genkey +  register: r3 +  notify: +    - Restart slapd  - name: Start slapd    service: name=slapd state=started -  when: not (r1.changed or r2.changed) +  when: not (r1.changed or r2.changed or r3.changed)  - meta: flush_handlers  - name: Copy fripost & amavis' schema    copy: src=etc/ldap/schema/{{ item }}          dest=/etc/ldap/schema/{{ item }}          owner=root group=root          mode=0644    # It'd certainly be nicer if we didn't have to deploy amavis' schema    # everywhere, but we need the 'objectClass' in our replicates, hence    # they need to be aware of the 'amavisAccount' class.    with_items:      - fripost.ldif      - amavis.schema    tags:      - amavis  - name: Load amavis' schema    openldap: target=/etc/ldap/schema/amavis.schema              format=slapd.conf name=amavis diff --git a/roles/common-LDAP/templates/etc/ldap/database.ldif.j2 b/roles/common-LDAP/templates/etc/ldap/database.ldif.j2 index 2c0db0b..a0ac705 100644 --- a/roles/common-LDAP/templates/etc/ldap/database.ldif.j2 +++ b/roles/common-LDAP/templates/etc/ldap/database.ldif.j2 @@ -17,41 +17,41 @@  dn: cn=config  objectClass: olcGlobal  cn: config  olcArgsFile: /run/slapd/slapd.args  olcPidFile: /run/slapd/slapd.pid  olcLogLevel: none  olcToolThreads: 1  {% if ansible_processor_vcpus > 4 %}  olcThreads: {{ 2 * ansible_processor_vcpus }}  {% else %}  olcThreads: 8  {% endif %}  {% if 'LDAP_provider' in group_names %}  olcTLSCertificateFile: /etc/ldap/ssl/ldap.fripost.org.pem  olcTLSCertificateKeyFile: /etc/ldap/ssl/ldap.fripost.org.key  # If we are being offered a client cert, it has to be trusted (in which  # case we map the X.509 subject to a DN in our namespace), or we  # terminate the connection.  Not providing a certificate is fine for  # TLS-protected simple binds, though.  olcTLSVerifyClient: try -olcTLSCACertificateFile: /etc/ldap/ssl/clients.pem +olcTLSCACertificateFile: /etc/ldap/ssl/syncrepl.pem  olcAuthzRegexp: "^(cn=[^,]+,ou=syncRepl),ou=LDAP,ou=SSLcerts,o=Fripost$"                  "dn.exact:$1,dc=fripost,dc=org"  olcSaslSecProps: minssf=128,noanonymous,noplain,nodict  olcTLSCipherSuite: PFS:%LATEST_RECORD_VERSION:!CIPHER-ALL:+AES-128-GCM:+AES-256-GCM:!VERS-SSL3.0:!VERS-TLS1.0:!VERS-TLS1.1  olcTLSDHParamFile: /etc/ssl/dhparams.pem  {% endif %}  olcLocalSSF: 128  # /!\ This is not portable! But we only use glibc's crypt(3), which  # supports (salted, streched) SHA512  olcPasswordHash: {CRYPT}  olcPasswordCryptSaltFormat: $6$%s  dn: olcDatabase=monitor,cn=config  objectClass: olcDatabaseConfig  objectClass: olcMonitorConfig  olcRootDN: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth  olcAccess: to dn.subtree="cn=monitor"      by dn.exact="username=munin,cn=peercred,cn=external,cn=auth" sockurl.regex="^ldapi://" read      by * =0 diff --git a/roles/common/files/usr/local/bin/genkeypair.sh b/roles/common/files/usr/local/bin/genkeypair.sh index ad65aef..72102f4 100755 --- a/roles/common/files/usr/local/bin/genkeypair.sh +++ b/roles/common/files/usr/local/bin/genkeypair.sh @@ -102,48 +102,50 @@ while [ $# -gt 0 ]; do          -f) force=$(( 1 + $force ));;          --pubkey=?*) pubkey="${1#--pubkey=}";;          --privkey=?*) privkey="${1#--privkey=}";;          --usage=?*) usage="${usage:+$usage,}${1#--usage=}";;          --config=?*) config="${1#--config=}";;          --mode=?*) mode="${1#--mode=}";;          --owner=?*) owner="${1#--owner=}";;          --group=?*) group="${1#--group=}";;          --help) usage; exit;;          *) echo "Unrecognized argument: $1" >&2; exit 2      esac      shift;  done  case "$type" in      # XXX: genrsa and dsaparam have been deprecated in favor of genpkey.      # genpkey can also create explicit EC parameters, but not named. -    rsa) genkey=genrsa; genkeyargs="-f4 ${bits:-2048}";; -    dsa) genkey=dsaparam; genkeyargs="-noout -genkey ${bits:-1024}";; +    rsa) genkey=genrsa; genkeyargs="-rand /dev/urandom -f4 ${bits:-2048}";; +    dsa) genkey=dsaparam; genkeyargs="-rand /dev/urandom -noout -genkey ${bits:-1024}";;      # See 'openssl ecparam -list_curves' for the list of supported      # curves. StrongSwan doesn't support explicit curve parameters      # (however explicit parameters might be required to make exotic      # curves work with some clients.)      ecdsa) genkey=ecparam -           genkeyargs="-noout -name ${bits:-secp224r1} -param_enc named_curve -genkey";; +           genkeyargs="-rand /dev/urandom -noout -name ${bits:-secp224r1} -param_enc named_curve -genkey";; +    x25519|x448|ed25519|ed448) genkey=genpkey +                               genkeyargs="-algorithm $type";;      *) echo "Unrecognized key type: $type" >&2; exit 2  esac  if [ "$cmd" = x509 -o "$cmd" = csr ]; then      case "$hash" in          md5|rmd160|sha1|sha224|sha256|sha384|sha512|'') ;;          *) echo "Invalid digest algorithm: $hash" >&2; exit 2;      esac      [ "$cn" ] || cn="$(hostname --fqdn)"      [ ${#cn} -le 64 ] || { echo "CommonName too long: $cn" >&2; exit 2; }  fi  if [ -z "$config" -a \( "$cmd" = x509 -o "$cmd" = csr \) ]; then      config=$(mktemp) || exit 2      trap 'rm -f "$config"' EXIT      # see /usr/share/ssl-cert/ssleay.cnf      cat >"$config" <<- EOF  		[ req ] @@ -156,40 +158,40 @@ if [ -z "$config" -a \( "$cmd" = x509 -o "$cmd" = csr \) ]; then  		[ req_distinguished_name ]  		organizationName       = Fripost  		organizationalUnitName = SSLcerts  		$(echo "$ou")  		commonName             = ${cn:-/}  		[ v3_req ]  		subjectAltName       = email:admin@fripost.org${dns:+, $dns}  		basicConstraints     = critical, CA:FALSE  		# https://security.stackexchange.com/questions/24106/which-key-usages-are-required-by-each-key-exchange-method  		keyUsage             = critical, ${usage:-digitalSignature, keyEncipherment, keyCertSign}  		subjectKeyIdentifier = hash  	EOF  fi  if [ -s "$privkey" -a $force -eq 0 ]; then      echo "Error: private key exists: $privkey" >&2      exit 1  elif [ ! -s "$privkey" -o $force -ge 2 ]; then      install --mode="${mode:-0600}" ${owner:+--owner="$owner"} ${group:+--group="$group"} /dev/null "$privkey" || exit 2 -    openssl $genkey -rand /dev/urandom $genkeyargs >"$privkey" || exit 2 +    openssl $genkey $genkeyargs >"$privkey" || exit 2      [ "$cmd" = dkim ] && exit  fi  if [ "$cmd" = x509 -a "$pubkey" = "$privkey" ]; then      pubkey=$(mktemp)      openssl req -config "$config" -new -x509 ${hash:+-$hash} -days 3650 -key "$privkey" >"$pubkey" || exit 2      cat "$pubkey" >>"$privkey" || exit 2      rm -f "$pubkey"  elif [ "$cmd" = x509 -o "$cmd" = csr ]; then      if [ -s "$pubkey" -a $force -eq 0 ]; then          echo "Error: public key exists: $pubkey" >&2          exit 1      else          [ "$cmd" = x509 ] && x509=-x509 || x509=          openssl req -config "$config" -new $x509 ${hash:+-$hash} -days 3650 -key "$privkey" >"$pubkey" || exit 2      fi  elif [ "$cmd" = keypair -a "$pubkey" ]; then      openssl pkey -pubout <"$privkey" >"$pubkey"  fi | 
