16.2. CA Server Access

Overview

Certificate validation can be done by accessing a separate Certifícate Server (CA). For example, the two sides of an IPsec tunnel would exchange their certificates during the tunnel setup negotiation and either side might then try to validate the received certificate by accessing a CA server.

A certificate contains a Fully Qualified Domain Name (FQDN) which specifies the textual address of the validating CA server as well as the protocol used for accessing the server. For example, server access could require an HTTP request or possibly an LDAP request.

CA Server Types

CA servers can be one of the following two types:

Access Considerations

The following considerations should be taken into account for CA server access to succeed:

[Note] CA servers with IPv4 or IPv6 addresses are Supported

If the DNS resolution of a CA server name results in an IPv6 address instead of an IPv4 address then this is fully supported by cOS Stream. CRL lookup can be performed using either IPv4 or IPv6 addresses.

Placement of Private CA Servers

The simplest solution for placement of a private CA server is to have it on the unprotected side of the Clavister NetShield Firewall. This however, is not recommended from a security viewpoint. It is better to place it on the inside (or preferably in the DMZ if available) and to have cOS Stream control access to it.

As explained previously, the FQDN address of the private CA server must be resolvable through public DNS servers for certificate validation requests coming from the public Internet. If the certificate queries are coming only from the Clavister NetShield Firewall and the CA server is on the internal side of the firewall then the IP address of the internal DNS server must be configured in cOS Stream so that these requests can be resolved and this is the case in the LTE telecoms scenario.

CA server access with LTE configuration is described further in the separate Clavister NetShield Firewall Use Case Guide.

Certificate Validation Components

Figure 16.1. Certificate Validation Components

Turning Off Certificate Validation

One of the ways to troubleshoot problems with CA server access can be done by turning off the requirement to validate certificates. By default, checking is always enabled.

Attempts to access CA servers by cOS Stream can be disabled by setting the CRLChecks option for a certificate object to Disabled (the default is Yes. For example:

System:/> cc CertificateStore ipsec
System:/CertificateStore/ipsec> set Certificate my_cert
			CRLChecks=Disabled

This means that checking against the CA server's revocation list (CRL) will be turned off and access to the server will not be attempted.

When switching off CRL checking, it may not be necessary to apply the CRLChecks=Disabled option to all certificates. This option follows the chain of certificate dependency. If it is applied to the root certificate of the chain then it is automatically applied to all dependent certificates.

Configuring LDAP Servers

If the FQDN in a certificate uses the LDAP protocol, then this can be specified in one of two ways:

In the second case where the LDAP URL is not specified, the LDAP server to use is specified with the LDAPServer property of the certificate object. This property is set to a single LDAPServer object (a list of servers is not possible) which has already been defined in the configuration. The LDAPServer object specifies the IPv4 or IPv6 address of the server.

Example 16.1. Specifying an LDAP Server

This example creates an LDAPServer object called my_ldap_server which is then assigned to the Certificate object my_cert.

It is assumed that the IPv4 address of the LDAP server is 192.168.1.10. It is also assumed that the Certificate object my_cert already exists is located in the CertificateStore called ipsec.

Command-Line Interface

First, define the LDAPServer object:

System:/> add LDAPServer my_ldap_server IPAddress=192.168.1.10

Next, assign this server to the certificate:

System:/> cc CertificateStore ipsec
System:/CertificateStore/ipsec> set Certificate my_cert
			LDAPServer=my_ldap_server

CA Server Redundancy

It is possible to have redundancy of CA servers with any of the following methods:

However, there can only be a single LDAP server explicitly specified in the LDAPServer property of a Certificate object.