SSL/TLS Certificates Avi Networks — Technical Reference (20.1)
Total Page:16
File Type:pdf, Size:1020Kb
Page 1 of 7 SSL/TLS Certificates Avi Networks — Technical Reference (20.1) SSL/TLS Certificates view online Overview Avi Vantage supports terminating client SSL and TLS connections at the virtual service. This requires Avi Vantage to send a certificate to clients that authenticates the site and establishes secure communications. A virtual service that handles secure connections will require both of the following: SSL/TLS Profile - Determines the supported ciphers and versions. ssl_ciphers HIGH:!aNULL:!MD5:+SHA1; and DHE 1024, 2048 etc. are the supported ciphers and cipher sizes. Refer SSL Profile for more details on SSL/TLS profiles. SSL Certificate - A certificate is presented to clients connecting to the site. SSL certificates may also be used to present to administrators connecting to the Avi Vantage web interface or API, and also for Avi Service Engines to present to servers when SE-to-server encryption is required with client (the SE) authentication. The SSL Certifications tab on Templates > Security page shown below supports import, export, and generation of SSL certificates or certificate requests. From this page different kinds of certificates may be created: Newly-created certificates may be either self-signed by Avi Vantage or created as a certificate signing request (CSR) that must be sent to a trusted certificate authority (CA), which then generates a trusted certificate. Creating a self-signed certificate generates both the certificate and a corresponding private key. Copyright © 2020 Avi Networks, Inc. Page 2 of 7 SSL/TLS Certificates Avi Networks — Technical Reference (20.1) Imported existing certificates are not valid until a matching key has been supplied. Avi Vantage supports PEM and PKCS #12 formatted certificates. SSL/TLS Certificates Page Select Templates > SSL/TLS Certificates to open SSL/TLS Certificates page. This page includes the usual functions, search, create, edit, and delete. Clicking on Export option opens a page with the private key and public certificate. Viewing or exporting the private key generates a system event, tracking the administrator's export action. Avi Networks recommends using role-based access to control which users are allowed to use a certificate versus export the key. Copyright © 2020 Avi Networks, Inc. Page 3 of 7 SSL/TLS Certificates Avi Networks — Technical Reference (20.1) The table on the certificates page contains the following information for each certificate: Name ? User-friendly name of the certificate. Mousing over the name of the certificate will display any intermediate certificate that has been automatically associated with the certificate. Status ? The known status of the certificate. This is green for good, or yellow, orange, or red if the certificate is expiring soon or has already expired, and gray if the certificate is incomplete. Common Name ? Fully-qualified name of the site to which the certificate applies. For the site to be considered trusted, this entry must match the hostname the client enters in their browser. Email ? Specify the email ID. Copyright © 2020 Avi Networks, Inc. Page 4 of 7 SSL/TLS Certificates Avi Networks — Technical Reference (20.1) Organization Unit ? Specify the department name. Organization Name ? Specify the organization name. Locality or City ? Specify the locality name. State Name or Province ? Specify the name of the state. Country ? Specify the name of the country. Subject Alternate Name ? Specify the subject alternate name. This can be a domain name or IP address. This field is added while creating a CSR. Note: During TLS connections, Chrome browser ensures if the connection to the site is using a secure connection. Chrome uses Subject Alternate Name to match the domain name and site certificate. If this filed is left blank, then Chrome and Firefox would consider this particular site as an insecure connection and the system displays a warning message. Also, if the certificate does not have the correct subject alternate name extension, then the system NET:: ERR_CERT_COMMON_NAME_INVALID error to indicate that the connection is not private. Algorithm ? This will be either EC (elliptic curve cryptography) or RSA. Key Size ? Select the key size from the drop-down list. Create Certificate When creating a new certificate, you can select any of the following certificates: Root/Intermediate CA Certificate - This certificate type is used to automatically create the certificate chain for application certificates. There are no configuration options other than import the certificate via a file or paste the text. The root/intermediate certificate will show up in a separate table at the bottom of SSL Certificates page. It is recommended to import the root/intermediate certificate prior to importing an application cert that relies on the intermediate for the chain. Application Certificate - This certificate is used for normal SSL termination and decryption on Avi Vantage. This option is also used to import or create a client certificate for Avi Vantage to present to a backend server when Avi Vantage needs to authenticate itself. Controller Certificate - This certificate is used for the GUI and API for the Controller cluster. Once uploaded, select the certification via Administration > Settings > Access Settings. To create a new application or controller certificate, specify the following fields: Name - Enter a unique, user-friendly name for the certificate. Type - Select the type of certificate from the following options:* Self Signed - Quickly create a test certificate that is signed by Avi Vantage. Client browsers will display an error that the certificate is not trusted. CSR - Create a valid certificate by first creating the certificate request. This request must be sent to a certificate authority, which will send back a valid certificate that must be imported back into Avi Vantage. Import - Import a completed certificate that was either received from a certificate authority or exported from another server. Self-Signed Certificates Avi Vantage can generate self-signed certificates. Client browsers do not trust these certificates and will warn the user that the virtual service's certificate is not part of a trust chain. Self-signed certificates are good for testing or environments where administrators control the clients and can safely bypass the browser's security alerts. Public websites should never use self- signed certificates. The virtual service health score may reflect a security penalty. If the HTTP application profile has HTTP Strict Transport Security (HSTS) enabled, clients may not be able to access a site with a self-signed certificate. Copyright © 2020 Avi Networks, Inc. Page 5 of 7 SSL/TLS Certificates Avi Networks — Technical Reference (20.1) To create a self-signed certificate, specify the following details: Common Name - Specify the fully-qualified name of the site, such as www.avinetworks.com. For the site to be considered trusted, this entry must match the hostname that the client entered in the browser. Organization - Specify the company or entity registering the certificate, such as Avi Networks, Inc. (optional). Organization Unit - Specify Group within the organization that is responsible for the certificate, such as Development (optional). Country - Country in which the organization is located (optional). State - State in which the organization is located (optional). Locality - City of the organization (optional). Email - The email contact for the certificate (optional). Subject Alternate Name (SAN) - The Subject Alternate Name (SAN) lets you specify additional host names to be protected by a single SSL certificate, such as example.com and example.org. The are essentially the alternative identities of the subject that is specified in the Certificate. Algorithm - Select either EC (elliptic curve cryptography) or RSA. RSA is older and considered less secure than ECC, but is more compatible with a broader array of older browsers. ECC is newer, less computationally expensive, and generally more secure; however, it is not yet accepted by all clients. Avi Vantage allows a virtual service to be configured with two certificates at a time, one each of RSA and ECC. This enables Avi Vantage to negotiate the optimal algorithm or cipher with the client. If the client supports ECC, Avi Vantage will prefer this algorithm, which gives the added benefit of supporting perfect forward secrecy, which brings better security at minimum additional computational cost. Key Size - Select the level of encryption to be used for handshakes: 2048-bit is recommended for RSA certificates. Higher values may provide stronger encryption, but dramatically increase the CPU resources required by both Avi Vantage and the client. For stronger encryption, use ECC certificates instead. secp256r1 is used for ECC certificates. Enable HSM Certificate - Rather than store the private key locally on the Avi Controller or Avi Service Engine, it is maintained in an external hardware security module. This option enables referencing an HSM profile containing information about communicating with the HSM. CSR Certificates The Certificate Signing Request (CSR) is the first step involved in creating a valid SSL/TLS certificate. The request contains the same parameters as a self-signed certificate. However, Avi Vantage does not sign the completed certificate. Rather, it must be signed by a certificate authority that is trusted by client browsers. The configuration options for a certificate signing request are the same as for self-signed certificates. Refer the descriptions