Skip to content

Commit 1f8af03

Browse files
author
Kim Hoffman
committed
Correcting trademark symbols
1 parent 6bd0e5a commit 1f8af03

File tree

4 files changed

+53
-53
lines changed

4 files changed

+53
-53
lines changed

index.html.md.erb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,15 @@ owner: Security Engineering
55

66
<strong><%= modified_date %></strong>
77

8-
This guide describes the [Pivotal Cloud Foundry&reg;](https://network.pivotal.io/products/pivotal-cf) (PCF) IPsec add-on. The topics included in this guide cover installation and configuration, troubleshooting, and credential rotation. Your organization may require IPSec if you transmit sensitive data.
8+
This guide describes the [Pivotal Cloud Foundry](https://network.pivotal.io/products/pivotal-cf) (PCF) IPsec add-on. The topics included in this guide cover installation and configuration, troubleshooting, and credential rotation. Your organization may require IPSec if you transmit sensitive data.
99

10-
<p class="note"><strong>Note</strong>: If you apply the IPsec add-on to your PCF deployment, you cannot remove IPsec without removing and reinstalling the entire deployment.</p>
10+
<p class="note"><strong>Note</strong>: If you apply the IPsec add-on to your PCF deployment, you cannot remove IPsec without removing and reinstalling the entire deployment.</p>
1111

1212
## Overview ##
1313

14-
The IPsec add-on for PCF provides security to the network layer of the OSI model with a [strongSwan](https://www.strongswan.org/) implementation of IPsec. The IPsec add-on provides a strongSwan job to each BOSH-deployed virtual machine (VM).
14+
The IPsec add-on for PCF provides security to the network layer of the OSI model with a [strongSwan](https://www.strongswan.org/) implementation of IPsec. The IPsec add-on provides a strongSwan job to each BOSH-deployed virtual machine (VM).
1515

16-
IPsec encrypts IP data flow between hosts, between security gateways, and between security gateways and hosts. The PCF IPsec add-on secures network traffic within a Cloud Foundry deployment and provides internal system protection if a malicious actor breaches your firewall.
16+
IPsec encrypts IP data flow between hosts, between security gateways, and between security gateways and hosts. The PCF IPsec add-on secures network traffic within a Cloud Foundry deployment and provides internal system protection if a malicious actor breaches your firewall.
1717

1818
## PCF IPsec Implementation Details ##
1919
The PCF IPsec add-on implements the following cryptographic suite:

installing.html.md.erb

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,28 @@
11
---
2-
title: Installing the Pivotal Cloud Foundry&reg; IPSec Add-On
2+
title: Installing the Pivotal Cloud Foundry IPSec Add-On
33
owner: Security Engineering
44
---
55

66
<strong><%= modified_date %></strong>
77

8-
This topic describes how to prepare your network for IPsec, create an IPsec manifest, and add IPsec to your deployment.
8+
This topic describes how to prepare your network for IPsec, create an IPsec manifest, and add IPsec to your deployment.
99
##<a id="prereqs"></a>Prerequisites
1010

11-
To complete the IPsec installation, check that you have satisfied the following prerequisites before you begin:
11+
To complete the IPsec installation, check that you have satisfied the following prerequisites before you begin:
1212

13-
* AWS, vSphere, or OpenStack as your IaaS
13+
* AWS, vSphere, or OpenStack as your IaaS
1414

15-
* Pivotal Cloud Foundry&reg; (PCF) operator administration rights
15+
* Pivotal Cloud Foundry (PCF) operator administration rights
1616

1717
* BOSH deployed through Ops Manager 1.7 or higher
1818

1919
<p class="note"><strong>Note</strong>: You must install the IPsec add-on before installing any other tiles to enable
20-
the IPsec functionality. Pivotal recommends installing IPsec immediately after Ops Manager, and before installing the
20+
the IPsec functionality. Pivotal recommends installing IPsec immediately after Ops Manager, and before installing the
2121
Elastic Runtime tile. </p>
2222

2323
<p class="note"><strong>Note</strong>: IPsec may affect the functionality of other service tiles. As a result, Pivotal recommends deploying Elastic Runtime and each service tile to different isolated subnets. Alternatively, you can minimally deploy all service tiles to a single isolated subnet, apart from the Elastic Runtime subnet.</p>
2424

25-
<p class="note"><strong>Note</strong>: For IPsec, Pivotal recommends any Ubuntu stemcells for vSphere and OpenStack, and HVM stemcells for AWS. These stemcells are available on <a href="https://network.pivotal.io/products/stemcells">Pivotal Network</a>. If you are using PV stemcells obtained from <a href="https://bosh.io">bosh.io</a>, see <a href="./troubleshooting.html#ipsec-installation-issues">Preventing Packet Loss</a> in the Troubleshooting topic to adjust MTU values. Pivotal recommends MTU values of 1354 on OpenStack, and the default values on AWS and vSphere.</p>
25+
<p class="note"><strong>Note</strong>: For IPsec, Pivotal recommends any Ubuntu stemcells for vSphere and OpenStack, and HVM stemcells for AWS. These stemcells are available on <a href="https://network.pivotal.io/products/stemcells">Pivotal Network</a>. If you are using PV stemcells obtained from <a href="https://bosh.io">bosh.io</a>, see <a href="./troubleshooting.html#ipsec-installation-issues">Preventing Packet Loss</a> in the Troubleshooting topic to adjust MTU values. Pivotal recommends MTU values of 1354 on OpenStack, and the default values on AWS and vSphere.</p>
2626

2727
##<a id="config-network"></a>Configure Network Security
2828
Refer to the appropriate section below for your IaaS network configuration details.
@@ -68,7 +68,7 @@ Confirm that your network allows protocols 50 and 51 and UDP on port 500.
6868

6969
###<a id="openstack"></a>OpenStack
7070

71-
<p class="note"><strong>Note</strong>: The following network configuration is optimized for Mirantis OpenStack, but other OpenStack distributions have a similar workflow.</p>
71+
<p class="note"><strong>Note</strong>: The following network configuration is optimized for Mirantis OpenStack, but other OpenStack distributions have a similar workflow.</p>
7272

7373
For Mirantis OpenStack, follow these steps:
7474

@@ -105,7 +105,7 @@ For Mirantis OpenStack, follow these steps:
105105

106106
Follow these steps to create the IPsec manifest for your deployment:
107107

108-
1. Create an IPsec manifest file `ipsec-addon.yml` starting with the code below as a template.
108+
1. Create an IPsec manifest file `ipsec-addon.yml` starting with the code below as a template.
109109
<pre>releases:
110110
\- {name: ipsec, <strong>version</strong>: 1.0.0}<br>
111111
addons:
@@ -143,20 +143,20 @@ Follow these steps to create the IPsec manifest for your deployment:
143143
<strong>prestart\_timeout</strong>: 30 </pre>
144144

145145
2. Replace the properties listed in the file as follows:
146-
* <code>releases: - version:</code> Specify the version number of your IPsec download from Pivotal Network.
147-
* <code>jobs: - name:</code> Do not change the name of this job. It must be `ipsec`.
146+
* <code>releases: - version:</code> Specify the version number of your IPsec download from Pivotal Network.
147+
* <code>jobs: - name:</code> Do not change the name of this job. It must be `ipsec`.
148148
* <code>ipsec\_subnets:</code> List the subnets that you want to be encrypted. You can include the entire deployment or a portion of the network. Encrypt any network that handles business-sensitive data.
149149
* <code>no\_ipsec\_subnets:</code> List the IP address of your BOSH director, and any other IPs in your PCF deployment that you want to communicate without encryption. Pivotal recommends that you list the subnets that are used for PCF managed services.
150-
* <code>instance\_certificate:</code> Paste in the signed certificate for use by all your instance VMs. You must use one of the CAs in the ca\_certificates property to sign this certificate. For a development or test environment, you can use a self-signed certificate. See the [Generate a Self-Signed Certificate](#self-signed) section.
151-
* <code>instance\_private\_key:</code> Paste in the private key that corresponds to the instance\_certificate above. The key must not use a pass phrase.
152-
* <code>ca\_certificates:</code> Paste in CA certificates for the instance VM to trust during the validation process. In most cases, you only need the CA certificate used to sign the instance certificate. During CA credential rotation, you need two CA certificates.
150+
* <code>instance\_certificate:</code> Paste in the signed certificate for use by all your instance VMs. You must use one of the CAs in the ca\_certificates property to sign this certificate. For a development or test environment, you can use a self-signed certificate. See the [Generate a Self-Signed Certificate](#self-signed) section.
151+
* <code>instance\_private\_key:</code> Paste in the private key that corresponds to the instance\_certificate above. The key must not use a pass phrase.
152+
* <code>ca\_certificates:</code> Paste in CA certificates for the instance VM to trust during the validation process. In most cases, you only need the CA certificate used to sign the instance certificate. During CA credential rotation, you need two CA certificates.
153153
* <code>prestart\_timeout:</code> You can optionally modify the 30 second default prestart timeout value. The value limits the number of seconds allowed for IPsec to start before failing the attempt.
154154

155155
<p class="note"><strong>Note:</strong> To modify <code>ipsec_subnets</code> or <code>no_ipsec_subnets</code> in an existing deployment, you must update the manifest file and redeploy.</p>
156156

157-
##<a id="download-deploy"></a>Download and Deploy the IPsec Add-on
157+
##<a id="download-deploy"></a>Download and Deploy the IPsec Add-on
158158

159-
1. Download the IPsec add-on software binary from the [Pivotal Network](https://network.pivotal.io/products/p-ipsec-addon) to your local machine.
159+
1. Download the IPsec add-on software binary from the [Pivotal Network](https://network.pivotal.io/products/p-ipsec-addon) to your local machine.
160160

161161
2. Copy the software binary to your Ops Manager instance.
162162
<pre class="terminal">$ scp -i PATH/TO/PRIVATE/KEY ipsec-release.tar.gz ubuntu@YOUR-OPS-MANAGER-VM-IP:</pre>
@@ -172,16 +172,16 @@ Follow these steps to create the IPsec manifest for your deployment:
172172
$ cd PATH-TO-BINARY</pre>
173173

174174
6. Target your BOSH director instance with BOSH.<pre class="terminal">
175-
$ bosh target YOUR-OPS-MANAGER-DIRECTOR-IP
175+
$ bosh target YOUR-OPS-MANAGER-DIRECTOR-IP
176176
Target set to 'Ops Manager'
177177
Your username: director
178178
Enter password: ******************
179179
Logged in as 'director'
180-
</pre>
180+
</pre>
181181

182182
7. Upload your release.<pre class="terminal">$ bosh upload release PATH-TO-BINARY/BINARY-NAME.tar</pre>
183183

184-
8. Optionally, from the command line, confirm that the upload of the IPsec software binary completed. You should see the IPsec binary file.
184+
8. Optionally, from the command line, confirm that the upload of the IPsec software binary completed. You should see the IPsec binary file.
185185
<pre class="terminal">$ bosh releases</pre>
186186

187187
9. Update your runtime configuration to include the IPsec add-on.

release-notes.html.md.erb

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ owner: Security Engineering
55

66
<strong><%= modified_date %></strong>
77

8-
This topic contains release notes for the Pivotal Cloud Foundry &reg; (PCF) IPsec add-on.
8+
This topic contains release notes for the Pivotal Cloud Foundry (PCF) IPsec add-on.
99

10-
## v1.5.31
10+
## v1.5.31
1111

1212
### New Features
1313

@@ -27,18 +27,18 @@ This topic contains release notes for the Pivotal Cloud Foundry &reg; (PCF) IPse
2727

2828
These messages are both expected, and harmless. As a caution to end users, the StrongSwan software now emits a warning message when it detects that the installation includes a manually configured set of plug-ins. As a matter of security hygiene best practices, the IPsec add-on has always used a manual (explicit) configuration, and loads a restricted set of StrongSwan plug-ins. Any unused plug-ins are not loaded. The newest version of StrongSwan now issues this warning message when it detects that situation. The actual list of plug-ins in use has been determined to be appropriate for use of StrongSwan in the PCF environment. This warning is expected, and should be ignored.
2929

30-
* **Certificate Verification**: There is a known issue with the CA certificate validation. The IPsec add-on supports credential rotation with minimal downtime. The host instance certificate can be rotated at any time by doing a deployment. In addition, the CA certificate that is used to verify trust in the host certificates can be rotated with minimal downtime by doing multiple deployments.
30+
* **Certificate Verification**: There is a known issue with the CA certificate validation. The IPsec add-on supports credential rotation with minimal downtime. The host instance certificate can be rotated at any time by doing a deployment. In addition, the CA certificate that is used to verify trust in the host certificates can be rotated with minimal downtime by doing multiple deployments.
3131
<br><br>
32-
However, because all VMs typically share the same instance certificate, they will trust each other without relying upon the CA certificate. The CA certificate is not actually needed until the operator does a deployment to rotate the instance certificate(s). While that deployment is running, some of the VMs will have received a new instance certificate, while other VMs are still operating using the prior instance certificate. During this time, while the instance certificates are different, the validation of the peer instance certificate will rely upon the common CA certificate in order to establish trust in the counterparty.
32+
However, because all VMs typically share the same instance certificate, they will trust each other without relying upon the CA certificate. The CA certificate is not actually needed until the operator does a deployment to rotate the instance certificate(s). While that deployment is running, some of the VMs will have received a new instance certificate, while other VMs are still operating using the prior instance certificate. During this time, while the instance certificates are different, the validation of the peer instance certificate will rely upon the common CA certificate in order to establish trust in the counterparty.
3333
<br><br>
3434
If the CA certificate is malformed, or otherwise invalid, this problem will remain latent until the time when the instance certificate is being rotated. It is only during that deployment when the operator will discover that the CA certificate is not valid. Of course, as long as the CA certificate is valid, there is no problem.
3535
<br><br>
36-
It is recommended that operators use a tool such as OpenSSL to verify that the CA certificate they are choosing to configure is in fact valid, and contains the appropriate details for proper end-entity authentication of the VM in the deployment (such as subjectName, issuerName, and validity dates, etc).
36+
It is recommended that operators use a tool such as OpenSSL to verify that the CA certificate they are choosing to configure is in fact valid, and contains the appropriate details for proper end-entity authentication of the VM in the deployment (such as subjectName, issuerName, and validity dates, etc).
3737
<br><br>
3838
Operators can use their favorite certificate management tool to confirm that their certificate matches what they expect. Using OpenSSL, one can issue the command:
3939
<pre class="terminal">
4040
$ openssl x509 -in myCA.crt -text
4141
</pre>
42-
If this command produces valid output, then the certificate will be OK when configured for IPsec.
42+
If this command produces valid output, then the certificate will be OK when configured for IPsec.
4343

4444
* **MTU Sizing**: Use 1354 on OpenStack. Keep the default on AWS and vSphere.

0 commit comments

Comments
 (0)