You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: index.html.md.erb
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -5,15 +5,15 @@ owner: Security Engineering
5
5
6
6
<strong><%=modified_date%></strong>
7
7
8
-
This guide describes the [Pivotal Cloud Foundry®](https://network.pivotal.io/products/pivotal-cf) (PCF) IPsec add-on. The topics included in this guide cover installation and configuration, troubleshooting, and credential rotation. Your organization may require IPSec if you transmit sensitive data.
8
+
This guide describes the [Pivotal Cloud Foundry](https://network.pivotal.io/products/pivotal-cf) (PCF) IPsec add-on. The topics included in this guide cover installation and configuration, troubleshooting, and credential rotation. Your organization may require IPSec if you transmit sensitive data.
9
9
10
-
<pclass="note"><strong>Note</strong>: If you apply the IPsec add-on to your PCF deployment, you cannot remove IPsec without removing and reinstalling the entire deployment.</p>
10
+
<pclass="note"><strong>Note</strong>: If you apply the IPsec add-on to your PCF deployment, you cannot remove IPsec without removing and reinstalling the entire deployment.</p>
11
11
12
12
## Overview ##
13
13
14
-
The IPsec add-on for PCF provides security to the network layer of the OSI model with a [strongSwan](https://www.strongswan.org/) implementation of IPsec. The IPsec add-on provides a strongSwan job to each BOSH-deployed virtual machine (VM).
14
+
The IPsec add-on for PCF provides security to the network layer of the OSI model with a [strongSwan](https://www.strongswan.org/) implementation of IPsec. The IPsec add-on provides a strongSwan job to each BOSH-deployed virtual machine (VM).
15
15
16
-
IPsec encrypts IP data flow between hosts, between security gateways, and between security gateways and hosts. The PCF IPsec add-on secures network traffic within a Cloud Foundry deployment and provides internal system protection if a malicious actor breaches your firewall.
16
+
IPsec encrypts IP data flow between hosts, between security gateways, and between security gateways and hosts. The PCF IPsec add-on secures network traffic within a Cloud Foundry deployment and provides internal system protection if a malicious actor breaches your firewall.
17
17
18
18
## PCF IPsec Implementation Details ##
19
19
The PCF IPsec add-on implements the following cryptographic suite:
Copy file name to clipboardExpand all lines: installing.html.md.erb
+19-19Lines changed: 19 additions & 19 deletions
Original file line number
Diff line number
Diff line change
@@ -1,28 +1,28 @@
1
1
---
2
-
title: Installing the Pivotal Cloud Foundry® IPSec Add-On
2
+
title: Installing the Pivotal Cloud Foundry IPSec Add-On
3
3
owner: Security Engineering
4
4
---
5
5
6
6
<strong><%=modified_date%></strong>
7
7
8
-
This topic describes how to prepare your network for IPsec, create an IPsec manifest, and add IPsec to your deployment.
8
+
This topic describes how to prepare your network for IPsec, create an IPsec manifest, and add IPsec to your deployment.
9
9
##<aid="prereqs"></a>Prerequisites
10
10
11
-
To complete the IPsec installation, check that you have satisfied the following prerequisites before you begin:
11
+
To complete the IPsec installation, check that you have satisfied the following prerequisites before you begin:
12
12
13
-
* AWS, vSphere, or OpenStack as your IaaS
13
+
* AWS, vSphere, or OpenStack as your IaaS
14
14
15
-
* Pivotal Cloud Foundry® (PCF) operator administration rights
15
+
* Pivotal Cloud Foundry (PCF) operator administration rights
16
16
17
17
* BOSH deployed through Ops Manager 1.7 or higher
18
18
19
19
<pclass="note"><strong>Note</strong>: You must install the IPsec add-on before installing any other tiles to enable
20
-
the IPsec functionality. Pivotal recommends installing IPsec immediately after Ops Manager, and before installing the
20
+
the IPsec functionality. Pivotal recommends installing IPsec immediately after Ops Manager, and before installing the
21
21
Elastic Runtime tile. </p>
22
22
23
23
<pclass="note"><strong>Note</strong>: IPsec may affect the functionality of other service tiles. As a result, Pivotal recommends deploying Elastic Runtime and each service tile to different isolated subnets. Alternatively, you can minimally deploy all service tiles to a single isolated subnet, apart from the Elastic Runtime subnet.</p>
24
24
25
-
<pclass="note"><strong>Note</strong>: For IPsec, Pivotal recommends any Ubuntu stemcells for vSphere and OpenStack, and HVM stemcells for AWS. These stemcells are available on <ahref="https://network.pivotal.io/products/stemcells">Pivotal Network</a>. If you are using PV stemcells obtained from <ahref="https://bosh.io">bosh.io</a>, see <ahref="./troubleshooting.html#ipsec-installation-issues">Preventing Packet Loss</a> in the Troubleshooting topic to adjust MTU values. Pivotal recommends MTU values of 1354 on OpenStack, and the default values on AWS and vSphere.</p>
25
+
<pclass="note"><strong>Note</strong>: For IPsec, Pivotal recommends any Ubuntu stemcells for vSphere and OpenStack, and HVM stemcells for AWS. These stemcells are available on <ahref="https://network.pivotal.io/products/stemcells">Pivotal Network</a>. If you are using PV stemcells obtained from <ahref="https://bosh.io">bosh.io</a>, see <ahref="./troubleshooting.html#ipsec-installation-issues">Preventing Packet Loss</a> in the Troubleshooting topic to adjust MTU values. Pivotal recommends MTU values of 1354 on OpenStack, and the default values on AWS and vSphere.</p>
Refer to the appropriate section below for your IaaS network configuration details.
@@ -68,7 +68,7 @@ Confirm that your network allows protocols 50 and 51 and UDP on port 500.
68
68
69
69
###<aid="openstack"></a>OpenStack
70
70
71
-
<pclass="note"><strong>Note</strong>: The following network configuration is optimized for Mirantis OpenStack, but other OpenStack distributions have a similar workflow.</p>
71
+
<pclass="note"><strong>Note</strong>: The following network configuration is optimized for Mirantis OpenStack, but other OpenStack distributions have a similar workflow.</p>
72
72
73
73
For Mirantis OpenStack, follow these steps:
74
74
@@ -105,7 +105,7 @@ For Mirantis OpenStack, follow these steps:
105
105
106
106
Follow these steps to create the IPsec manifest for your deployment:
107
107
108
-
1. Create an IPsec manifest file `ipsec-addon.yml` starting with the code below as a template.
108
+
1. Create an IPsec manifest file `ipsec-addon.yml` starting with the code below as a template.
@@ -143,20 +143,20 @@ Follow these steps to create the IPsec manifest for your deployment:
143
143
<strong>prestart\_timeout</strong>: 30 </pre>
144
144
145
145
2. Replace the properties listed in the file as follows:
146
-
* <code>releases: - version:</code> Specify the version number of your IPsec download from Pivotal Network.
147
-
* <code>jobs: - name:</code> Do not change the name of this job. It must be `ipsec`.
146
+
* <code>releases: - version:</code> Specify the version number of your IPsec download from Pivotal Network.
147
+
* <code>jobs: - name:</code> Do not change the name of this job. It must be `ipsec`.
148
148
* <code>ipsec\_subnets:</code> List the subnets that you want to be encrypted. You can include the entire deployment or a portion of the network. Encrypt any network that handles business-sensitive data.
149
149
* <code>no\_ipsec\_subnets:</code> List the IP address of your BOSH director, and any other IPs in your PCF deployment that you want to communicate without encryption. Pivotal recommends that you list the subnets that are used for PCF managed services.
150
-
* <code>instance\_certificate:</code> Paste in the signed certificate for use by all your instance VMs. You must use one of the CAs in the ca\_certificates property to sign this certificate. For a development or test environment, you can use a self-signed certificate. See the [Generate a Self-Signed Certificate](#self-signed) section.
151
-
* <code>instance\_private\_key:</code> Paste in the private key that corresponds to the instance\_certificate above. The key must not use a pass phrase.
152
-
* <code>ca\_certificates:</code> Paste in CA certificates for the instance VM to trust during the validation process. In most cases, you only need the CA certificate used to sign the instance certificate. During CA credential rotation, you need two CA certificates.
150
+
* <code>instance\_certificate:</code> Paste in the signed certificate for use by all your instance VMs. You must use one of the CAs in the ca\_certificates property to sign this certificate. For a development or test environment, you can use a self-signed certificate. See the [Generate a Self-Signed Certificate](#self-signed) section.
151
+
* <code>instance\_private\_key:</code> Paste in the private key that corresponds to the instance\_certificate above. The key must not use a pass phrase.
152
+
* <code>ca\_certificates:</code> Paste in CA certificates for the instance VM to trust during the validation process. In most cases, you only need the CA certificate used to sign the instance certificate. During CA credential rotation, you need two CA certificates.
153
153
* <code>prestart\_timeout:</code> You can optionally modify the 30 second default prestart timeout value. The value limits the number of seconds allowed for IPsec to start before failing the attempt.
154
154
155
155
<pclass="note"><strong>Note:</strong> To modify <code>ipsec_subnets</code> or <code>no_ipsec_subnets</code> in an existing deployment, you must update the manifest file and redeploy.</p>
156
156
157
-
##<aid="download-deploy"></a>Download and Deploy the IPsec Add-on
157
+
##<aid="download-deploy"></a>Download and Deploy the IPsec Add-on
158
158
159
-
1. Download the IPsec add-on software binary from the [Pivotal Network](https://network.pivotal.io/products/p-ipsec-addon) to your local machine.
159
+
1. Download the IPsec add-on software binary from the [Pivotal Network](https://network.pivotal.io/products/p-ipsec-addon) to your local machine.
160
160
161
161
2. Copy the software binary to your Ops Manager instance.
Copy file name to clipboardExpand all lines: release-notes.html.md.erb
+6-6Lines changed: 6 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -5,9 +5,9 @@ owner: Security Engineering
5
5
6
6
<strong><%=modified_date%></strong>
7
7
8
-
This topic contains release notes for the Pivotal Cloud Foundry ® (PCF) IPsec add-on.
8
+
This topic contains release notes for the Pivotal Cloud Foundry (PCF) IPsec add-on.
9
9
10
-
## v1.5.31
10
+
## v1.5.31
11
11
12
12
### New Features
13
13
@@ -27,18 +27,18 @@ This topic contains release notes for the Pivotal Cloud Foundry ® (PCF) IPse
27
27
28
28
These messages are both expected, and harmless. As a caution to end users, the StrongSwan software now emits a warning message when it detects that the installation includes a manually configured set of plug-ins. As a matter of security hygiene best practices, the IPsec add-on has always used a manual (explicit) configuration, and loads a restricted set of StrongSwan plug-ins. Any unused plug-ins are not loaded. The newest version of StrongSwan now issues this warning message when it detects that situation. The actual list of plug-ins in use has been determined to be appropriate for use of StrongSwan in the PCF environment. This warning is expected, and should be ignored.
29
29
30
-
* **Certificate Verification**: There is a known issue with the CA certificate validation. The IPsec add-on supports credential rotation with minimal downtime. The host instance certificate can be rotated at any time by doing a deployment. In addition, the CA certificate that is used to verify trust in the host certificates can be rotated with minimal downtime by doing multiple deployments.
30
+
* **Certificate Verification**: There is a known issue with the CA certificate validation. The IPsec add-on supports credential rotation with minimal downtime. The host instance certificate can be rotated at any time by doing a deployment. In addition, the CA certificate that is used to verify trust in the host certificates can be rotated with minimal downtime by doing multiple deployments.
31
31
<br><br>
32
-
However, because all VMs typically share the same instance certificate, they will trust each other without relying upon the CA certificate. The CA certificate is not actually needed until the operator does a deployment to rotate the instance certificate(s). While that deployment is running, some of the VMs will have received a new instance certificate, while other VMs are still operating using the prior instance certificate. During this time, while the instance certificates are different, the validation of the peer instance certificate will rely upon the common CA certificate in order to establish trust in the counterparty.
32
+
However, because all VMs typically share the same instance certificate, they will trust each other without relying upon the CA certificate. The CA certificate is not actually needed until the operator does a deployment to rotate the instance certificate(s). While that deployment is running, some of the VMs will have received a new instance certificate, while other VMs are still operating using the prior instance certificate. During this time, while the instance certificates are different, the validation of the peer instance certificate will rely upon the common CA certificate in order to establish trust in the counterparty.
33
33
<br><br>
34
34
If the CA certificate is malformed, or otherwise invalid, this problem will remain latent until the time when the instance certificate is being rotated. It is only during that deployment when the operator will discover that the CA certificate is not valid. Of course, as long as the CA certificate is valid, there is no problem.
35
35
<br><br>
36
-
It is recommended that operators use a tool such as OpenSSL to verify that the CA certificate they are choosing to configure is in fact valid, and contains the appropriate details for proper end-entity authentication of the VM in the deployment (such as subjectName, issuerName, and validity dates, etc).
36
+
It is recommended that operators use a tool such as OpenSSL to verify that the CA certificate they are choosing to configure is in fact valid, and contains the appropriate details for proper end-entity authentication of the VM in the deployment (such as subjectName, issuerName, and validity dates, etc).
37
37
<br><br>
38
38
Operators can use their favorite certificate management tool to confirm that their certificate matches what they expect. Using OpenSSL, one can issue the command:
39
39
<preclass="terminal">
40
40
$ openssl x509 -in myCA.crt -text
41
41
</pre>
42
-
If this command produces valid output, then the certificate will be OK when configured for IPsec.
42
+
If this command produces valid output, then the certificate will be OK when configured for IPsec.
43
43
44
44
* **MTU Sizing**: Use 1354 on OpenStack. Keep the default on AWS and vSphere.
0 commit comments