Bug 694612 - Need SSL and/or WS-Security enabled for aviary components
Summary: Need SSL and/or WS-Security enabled for aviary components
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise MRG
Classification: Red Hat
Component: condor-aviary
Version: 2.0
Hardware: Unspecified
OS: Linux
high
high
Target Milestone: 2.1
: ---
Assignee: Pete MacKinnon
QA Contact: Martin Kudlej
URL:
Whiteboard:
Depends On: 726484 746251
Blocks: 733447 743350
TreeView+ depends on / blocked
 
Reported: 2011-04-07 18:52 UTC by Pete MacKinnon
Modified: 2012-02-07 08:45 UTC (History)
6 users (show)

Fixed In Version: condor-7.6.5-0.1
Doc Type: Enhancement
Doc Text:
Previously, Aviary could only be operated within a secure local network in order to secure communication between Aviary clients and servers. This update includes upstream code enhancements that integrate OpenSSL more fully into the Axis2C SOAP (Simple Object Access Protocol) engine used by the Aviary server implementation. Aviary clients and servers can now exchange x509 certificates to authenticate each side and establish a secure link.
Clone Of:
Environment:
Last Closed: 2012-01-23 17:26:15 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHEA-2012:0045 0 normal SHIPPED_LIVE Red Hat Enterprise MRG Grid 2.1 bug fix and enhancement update 2012-01-23 22:22:58 UTC

Description Pete MacKinnon 2011-04-07 18:52:39 UTC
We will need to secure access to the Aviary components (plug-in and query server I presume). Initial config should be mutual client/server authentication over SSL/TLS with style points awarded for Rampart enablement (Axis2/C WS-Security module).

Customers would provide and configure their own certs in both cases. Auth config is the domain of the axis2.xml file.

Comment 6 Pete MacKinnon 2011-10-04 19:40:37 UTC
    Technical note added. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    New Contents:
Cause: Desire for secure and authenticated communication between Aviary clients and servers.
Consequence: Aviary could previously only be operated within a secure local network.
Change: OpenSSL was more fully integrated into the Axis2C SOAP engine used by the Aviary server implementation. This required upstream code enhancements.
Result: Aviary clients and servers can exchange x509 certificates to authenticate each side and establish a secure link.

Comment 11 Martin Kudlej 2011-11-10 13:00:39 UTC
All dependencies are verified -->VERIFIED

Comment 12 Douglas Silas 2011-11-17 00:31:26 UTC
    Technical note updated. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    Diffed Contents:
@@ -1,4 +1 @@
-Cause: Desire for secure and authenticated communication between Aviary clients and servers.
+Previously, Aviary could only be operated within a secure local network in order to secure communication between Aviary clients and servers. This update includes upstream code enhancements that integrate OpenSSL more fully into the Axis2C SOAP (Simple Object Access Protocol) engine used by the Aviary server implementation. Aviary clients and servers can now exchange x509 certificates to authenticate each side and establish a secure link.-Consequence: Aviary could previously only be operated within a secure local network.
-Change: OpenSSL was more fully integrated into the Axis2C SOAP engine used by the Aviary server implementation. This required upstream code enhancements.
-Result: Aviary clients and servers can exchange x509 certificates to authenticate each side and establish a secure link.

Comment 13 errata-xmlrpc 2012-01-23 17:26:15 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHEA-2012-0045.html


Note You need to log in before you can comment on or make changes to this bug.