<br><tt><font size=2>"openbmc" <openbmc-bounces+hramasub=in.ibm.com@lists.ozlabs.org>
wrote on 07/31/2018 11:21:27 PM:<br><br>> From: Ed Tanous <ed.tanous@intel.com></font></tt><br><tt><font size=2>> To: Jayanth Othayoth <ojayanth@gmail.com>,
openbmc@lists.ozlabs.org,<br>> bradleyb@fuzziesquirrel.com</font></tt><br><tt><font size=2>> Date: 07/31/2018 11:21 PM</font></tt><br><tt><font size=2>> Subject: Re: SSL Certificate management proposal.</font></tt><br><tt><font size=2>> Sent by: "openbmc" <openbmc-bounces+hramasub=in.ibm.com@lists.ozlabs.org></font></tt><br><tt><font size=2>> <br>> On 07/31/2018 07:49 AM, Jayanth Othayoth wrote:<br>> > <br>> > The workflow for updating a signed certificate on the BMC consists
of:<br>> > 1. Generating a CSR on the BMC<br>> > 2. Exporting the CSR from the BMC onto the user’s storage device<br>> > 3. Obtaining a singed certificate corresponding to the CSR from
a CA<br>> > 4. Importing the signed certificate on the BMC<br>> > <br>> <br>> This workflow is somewhat of a non starter for a lot of organizations
<br>> and IT departments. </font></tt><br><tt><font size=2>Could you please share your thoughts on why this is
so ?</font></tt><br><br><tt><font size=2>> First, it requires that every BMC have its own
<br>> private key, which isn't always desired.</font></tt><br><tt><font size=2>_Sharing_ the private is a potential security risk.
If the private key were to be compromised, then _all_ systems sharing the
key are exposed. Hence I'm inclined to argue that private key should not
be shared.</font></tt><br><tt><font size=2><br>> Second, it means that you either have to be able to specify all <br>> parameters that a user would want to specify about his key (number
of <br>> bits, EC vs RSA, ect).</font></tt><br><tt><font size=2>What really is the concern here ? What's the challenge
in invoking the REST API with a json body describing the key type &
size ?<br></font></tt><br><tt><font size=2>> Third, it requires that every BMC be provisioned
by the intermediate <br>> authority, which can be difficult if keys either have a cost associated
<br>> with them, or are difficult to acquire.</font></tt><br><tt><font size=2>The cost considerations could potentially be different
for Enterprise class servers and servers deployed on the cloud ? I presume
enterprises would favour security to cost.<br></font></tt><BR>