IDP

Purpose

This system provides the CAcert OAuth2/OpenID Connect identity provider and will later provide a service for client registration.

Administration

System Administration

Application Administration

Application

Administrator(s)

IDP

Jan Dittberner

Contact

Additional People

No additional people have sudo access on that machine.

Basics

Physical Location

This system is located in an LXC container on physical machine Infra03.

Logical Location

IP Internet:

213.154.225.249

IP Intranet:

172.16.2.9

IP Internal:

10.0.3.17

IPv6:

2001:7b8:616:162:3::17

MAC address:

00:ff:8f:af:da:e1 (eth0)

See also

See Network

Monitoring

internal checks:

Monitoring checks for idp.infra.cacert.org

external checks:

Monitoring checks for idp.cacert.org

DNS

Name

Type

Content

idp.cacert.org

IN A

213.154.225.249

idp.cacert.org

IN AAAA

2001:7b8:616:162:3::17

idp.infra.cacert.org

IN A

10.0.3.17

Operating System

  • Debian GNU/Linux 12 Bookworm

Services

Listening services

Port

Service

Origin

Purpose

22/tcp

ssh

ANY

admin console access

25/tcp

smtp

local

mail delivery to local MTA

80/tcp

http

ANY

redirect to https

443/tcp

https

ANY

https for cacert-idp

5665/tcp

icinga2

monitor

remote monitoring service

Running services

Service

Usage

Start mechanism

cacert-idp

OpenID Connect IDP

systemd unit cacert-oidc-idp.service

cron

job scheduler

systemd unit cron.service

dbus-daemon

System message bus

systemd unit dbus.service

Exim

SMTP server for local mail submission

systemd unit exim4.service

icinga2

Icinga2 monitoring agent

systemd unit icinga2.service

nginx

Reverse proxy for Hydra

systemd unit nginx.service

openssh server

ssh daemon for remote administration

systemd unit ssh.service

Puppet agent

configuration management agent

systemd unit puppet.service

rsyslog

syslog daemon

systemd unit rsyslog.service

Connected Systems

Outbound network connections

  • DNS (53) resolver at 10.0.0.1 (Infra02)

  • Emailout as SMTP relay

  • Puppet (tcp/8140) as Puppet master

  • Proxyout as HTTP proxy for APT

  • crl.cacert.org (rsync) for getting CRLs

Security

SSH host keys

Algorithm

Fingerprints

RSA

SHA256:bY3W1vkxasbm6Gqpzh3Nnp9eEGlWGzJTOPCj8glFCDg, MD5:42:47:42:e6:44:c5:e1:68:56:8e:2a:ae:96:a9:21:7c

DSA

-

ECDSA

SHA256:VODnokveQvwmxYoLRx+DOoL3pUEEHxeHyWSm1mcQfQo, MD5:47:a9:64:23:8e:96:69:e5:b6:ec:ce:1c:6c:2d:a6:65

ED25519

SHA256:Z9B/MNSBJWKvxrpCQGXk+yMtCO/zjvjVniP9UprPx/w, MD5:ce:41:19:56:0d:81:19:fc:52:29:9f:54:06:34:3f:dd

Non-distribution packages and modifications

The main service on the system is the CAcert OpenID Connect Identity provider application. The code for the application is maintained at https://code.cacert.org/cacert/oidc-idp. The package is installed from an internal Debian repository on Webstatic.

Risk assessments on critical packages

Critical Configuration items

Keys and X.509 certificates

IDP configuration

The IDP application configuration is managed via Puppet.

Client registration configuration

Tasks

Changes

Planned

Todo

install client registration application

Additional documentation