健全性检查 - 我的 EC2 公共 AMI 是否应该在首次启动时生成新的 Apache SSL 证书?
我想在 Amazon Web Services EC2 上提供可立即部署的公共 Ubuntu Lucid AMI。由于这些 AMI 使用开源 Web 应用程序,我想预先配置 apache mod_ssl 并强制所有流量通过 https。这很容易。
我对完整性检查感兴趣:如果没有首次运行脚本来生成新的 CSR 和 server.key / server.crt 文件,那么部署会有多不安全? (即,访问 AMI 的任何人都将获得由运行从此 AMI 启动的实例的其他人使用的 server.key 的副本?
我还没有看到来自信誉良好的社区/企业公司的公共 AMI 以这种方式提供 AMI - 事实上大多数都根本不提供 mod_ssl - 将其留给系统管理员
-Jack Murgia 。
I want to offer ready-to-deploy Public Ubuntu Lucid AMIs on Amazon Web Services EC2. As these AMIs use open-source web apps, I want to pre-configure apache mod_ssl and force all traffic over https. That's easy enough.
I'm interested in a sanity check: just how insecure would it be to deploy without a first run script that generates a new CSR and server.key / server.crt files? (i.e., anyone who accesses the AMI will get a copy of the server.key used by anyone else running an instance launched from this AMI?
I have yet to see public AMIs from reputable community/enterprise companies offer AMIs in this manner- in fact most offer them without mod_ssl at all- leaving that up to the sys admin.
-Jack Murgia
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
我肯定会在公共实例的首次启动时生成一个唯一的密钥。人们很可能很懒,只使用您为他们提供的任何证书。由于它们都拥有相同的证书(和私钥),这意味着它们中的任何一个都可以冒充同一 AMI 的任何其他实例。这还意味着它们中的任何一个都可以 MITM 或解密发送到或来自任何其他实例的网络流量。
一般来说,您可能应该始终为公共 AMI 的每次初始启动生成新的加密材料。
I would definitely generate a unique key on primary launch of the public instance. People are way too likely to be lazy and just use whatever certificate you provide for them. Since they'd all of the same certificate (and private key), it means that any of them could impersonate any other instance of the same AMI. It also means that any of them could MITM or decrypt the web traffic sent to or from any of the other instances.
In general, you should probably always generate fresh cryptographic materials for each initial launch of a public AMI.