2018-02-28 18:04:08 +00:00
|
|
|
|
Network permissioning
|
2017-11-24 18:06:01 +00:00
|
|
|
|
=====================
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2017-11-24 18:06:01 +00:00
|
|
|
|
.. contents::
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2017-11-24 18:06:01 +00:00
|
|
|
|
Corda networks are *permissioned*. To connect to a network, a node needs three keystores in its
|
|
|
|
|
``<workspace>/certificates/`` folder:
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2017-11-24 18:06:01 +00:00
|
|
|
|
* ``truststore.jks``, which stores trusted public keys and certificates (in our case, those of the network root CA)
|
|
|
|
|
* ``nodekeystore.jks``, which stores the node’s identity keypairs and certificates
|
|
|
|
|
* ``sslkeystore.jks``, which stores the node’s TLS keypairs and certificates
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2018-02-28 18:04:08 +00:00
|
|
|
|
Production deployments require a secure certificate authority.
|
2017-11-27 13:36:52 +00:00
|
|
|
|
Most production deployments will use an existing certificate authority or construct one using software that will be
|
|
|
|
|
made available in the coming months. Until then, the documentation below can be used to create your own certificate
|
|
|
|
|
authority.
|
2016-12-09 19:07:32 +00:00
|
|
|
|
|
2018-02-28 18:04:08 +00:00
|
|
|
|
Certificate hierarchy
|
|
|
|
|
---------------------
|
|
|
|
|
A Corda network has four types of certificate authorities (CAs):
|
2017-11-27 13:36:52 +00:00
|
|
|
|
|
|
|
|
|
* The **root network CA**
|
2018-02-28 18:04:08 +00:00
|
|
|
|
* The **doorman CA**
|
2017-11-27 13:36:52 +00:00
|
|
|
|
|
2018-02-28 18:04:08 +00:00
|
|
|
|
* The doorman CA is used instead of the root network CA for day-to-day
|
2017-11-27 13:36:52 +00:00
|
|
|
|
key signing to reduce the risk of the root network CA's private key being compromised
|
|
|
|
|
|
|
|
|
|
* The **node CAs**
|
|
|
|
|
|
|
|
|
|
* Each node serves as its own CA in issuing the child certificates that it uses to sign its identity
|
2017-12-14 12:30:07 +00:00
|
|
|
|
keys and TLS certificates
|
|
|
|
|
|
2018-02-28 18:04:08 +00:00
|
|
|
|
* The **legal identity CAs**
|
|
|
|
|
|
|
|
|
|
* Node's well-known legal identity, apart from signing transactions, can also issue certificates for confidential legal identities
|
|
|
|
|
|
|
|
|
|
The following constraints are also imposed:
|
|
|
|
|
|
|
|
|
|
* Doorman certificates are issued by a network root which certificate doesn't contain the extension
|
|
|
|
|
* Well-known service identity certificates are issued by an entity with a Doorman certificate
|
|
|
|
|
* Node CA certificates are issued by an entity with a Doorman certificate
|
|
|
|
|
* Well known legal identity/TLS certificates are issued by a certificate marked as node CA
|
|
|
|
|
* Confidential legal identity certificates are issued by a certificate marked as well known legal identity
|
|
|
|
|
* Party certificates are marked as either a well known identity or a confidential identity
|
|
|
|
|
* The structure of certificates above Doorman/Network map is intentionally left untouched, as they are not relevant to
|
|
|
|
|
the identity service and therefore there is no advantage in enforcing a specific structure on those certificates. The
|
|
|
|
|
certificate hierarchy consistency checks are required because nodes can issue their own certificates and can set
|
|
|
|
|
their own role flags on certificates, and it's important to verify that these are set consistently with the
|
|
|
|
|
certificate hierarchy design. As as side-effect this also acts as a secondary depth restriction on issued
|
|
|
|
|
certificates
|
|
|
|
|
|
|
|
|
|
All the certificates must be issued with the custom role extension (see below).
|
|
|
|
|
|
2017-12-14 12:30:07 +00:00
|
|
|
|
We can visualise the permissioning structure as follows:
|
|
|
|
|
|
|
|
|
|
.. image:: resources/certificate_structure.png
|
|
|
|
|
:scale: 55%
|
|
|
|
|
:align: center
|
2017-11-27 13:36:52 +00:00
|
|
|
|
|
|
|
|
|
Keypair and certificate formats
|
|
|
|
|
-------------------------------
|
2017-11-24 18:06:01 +00:00
|
|
|
|
You can use any standard key tools or Corda's ``X509Utilities`` (which uses Bouncy Castle) to create the required
|
|
|
|
|
public/private keypairs and certificates. The keypairs and certificates should obey the following restrictions:
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2017-11-24 18:06:01 +00:00
|
|
|
|
* The certificates must follow the `X.509 standard <https://tools.ietf.org/html/rfc5280>`_
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2017-11-24 18:06:01 +00:00
|
|
|
|
* We recommend X.509 v3 for forward compatibility
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2017-11-24 18:06:01 +00:00
|
|
|
|
* The TLS certificates must follow the `TLS v1.2 standard <https://tools.ietf.org/html/rfc5246>`_
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2018-02-28 18:04:08 +00:00
|
|
|
|
* The root network CA, doorman CA and node CA keys, as well as the node TLS
|
2017-12-14 12:30:07 +00:00
|
|
|
|
keys, must follow one of the following schemes:
|
|
|
|
|
|
|
|
|
|
* ECDSA using the NIST P-256 curve (secp256r1)
|
|
|
|
|
|
|
|
|
|
* RSA with 3072-bit key size
|
|
|
|
|
|
2018-02-28 18:04:08 +00:00
|
|
|
|
Certificate role extension
|
|
|
|
|
--------------------------
|
|
|
|
|
Corda certificates have a custom X.509 v3 extension that specifies the role the certificate relates to. This extension
|
2018-03-07 10:39:03 +00:00
|
|
|
|
has the OID ``1.3.6.1.4.1.50530.1.1`` and is non-critical, so implementations outside of Corda nodes can safely ignore it.
|
2018-02-28 18:04:08 +00:00
|
|
|
|
The extension contains a single ASN.1 integer identifying the identity type the certificate is for:
|
|
|
|
|
|
|
|
|
|
1. Doorman
|
|
|
|
|
2. Network map
|
2018-03-07 10:39:03 +00:00
|
|
|
|
3. Service identity (currently only used as the shared identity in distributed notaries)
|
|
|
|
|
4. Node certificate authority (from which the TLS and well-known identity certificates are issued)
|
|
|
|
|
5. Transport layer security
|
|
|
|
|
6. Well-known legal identity
|
|
|
|
|
7. Confidential legal identity
|
2018-02-28 18:04:08 +00:00
|
|
|
|
|
|
|
|
|
In a typical installation, node administrators needn't be aware of these. However, when node certificates are managed
|
|
|
|
|
by external tools (such as an existing PKI solution deployed within an organisation), it is important to understand
|
|
|
|
|
these constraints.
|
|
|
|
|
|
|
|
|
|
Certificate path validation is extended so that a certificate must contain the extension if the extension was present
|
|
|
|
|
in the certificate of the issuer.
|
|
|
|
|
|
|
|
|
|
Creating the root and doorman CAs
|
|
|
|
|
---------------------------------
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2017-11-27 13:36:52 +00:00
|
|
|
|
Creating the root network CA's keystore and truststore
|
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2017-11-24 18:06:01 +00:00
|
|
|
|
1. Create a new keypair
|
2017-04-24 13:16:00 +00:00
|
|
|
|
|
2017-11-27 13:36:52 +00:00
|
|
|
|
* This will be used as the root network CA's keypair
|
2017-04-24 13:16:00 +00:00
|
|
|
|
|
2017-11-24 18:06:01 +00:00
|
|
|
|
2. Create a self-signed certificate for the keypair. The basic constraints extension must be set to ``true``
|
2017-04-24 13:16:00 +00:00
|
|
|
|
|
2017-11-27 13:36:52 +00:00
|
|
|
|
* This will be used as the root network CA's certificate
|
2017-04-24 13:16:00 +00:00
|
|
|
|
|
2017-11-27 13:36:52 +00:00
|
|
|
|
3. Create a new keystore and store the root network CA's keypair and certificate in it for later use
|
2017-04-24 13:16:00 +00:00
|
|
|
|
|
2018-02-28 18:04:08 +00:00
|
|
|
|
* This keystore will be used by the root network CA to sign the doorman CA's certificate
|
2017-04-24 13:16:00 +00:00
|
|
|
|
|
2017-11-27 13:36:52 +00:00
|
|
|
|
4. Create a new Java keystore named ``truststore.jks`` and store the root network CA's certificate in it using the
|
|
|
|
|
alias ``cordarootca``
|
2017-04-24 13:16:00 +00:00
|
|
|
|
|
2018-02-28 18:04:08 +00:00
|
|
|
|
* This keystore must then be provisioned to the individual nodes later so they can store it in their ``certificates`` folder
|
2017-11-27 13:36:52 +00:00
|
|
|
|
|
|
|
|
|
.. warning:: The root network CA's private key should be protected and kept safe.
|
|
|
|
|
|
2018-02-28 18:04:08 +00:00
|
|
|
|
Creating the doorman CA's keystore
|
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
2017-04-24 13:16:00 +00:00
|
|
|
|
|
2017-11-24 18:06:01 +00:00
|
|
|
|
1. Create a new keypair
|
2017-04-24 13:16:00 +00:00
|
|
|
|
|
2018-02-28 18:04:08 +00:00
|
|
|
|
* This will be used as the doorman CA's keypair
|
2017-11-27 13:36:52 +00:00
|
|
|
|
|
|
|
|
|
2. Obtain a certificate for the keypair signed with the root network CA key. The basic constraints extension must be
|
|
|
|
|
set to ``true``
|
2017-04-24 13:16:00 +00:00
|
|
|
|
|
2018-02-28 18:04:08 +00:00
|
|
|
|
* This will be used as the doorman CA's certificate
|
2017-04-24 13:16:00 +00:00
|
|
|
|
|
2018-02-28 18:04:08 +00:00
|
|
|
|
3. Create a new keystore and store the doorman CA's keypair and certificate chain
|
|
|
|
|
(i.e. the doorman CA certificate *and* the root network CA certificate) in it for later use
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2018-02-28 18:04:08 +00:00
|
|
|
|
* This keystore will be used by the doorman CA to sign the nodes' identity certificates
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2017-11-24 18:06:01 +00:00
|
|
|
|
Creating the node CA keystores and TLS keystores
|
2017-11-27 13:36:52 +00:00
|
|
|
|
------------------------------------------------
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2017-11-24 18:06:01 +00:00
|
|
|
|
Creating the node CA keystores
|
2017-11-27 13:36:52 +00:00
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2017-11-27 13:36:52 +00:00
|
|
|
|
1. For each node, create a new keypair
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2018-02-28 18:04:08 +00:00
|
|
|
|
2. Obtain a certificate for the keypair signed with the doorman CA key. The basic constraints extension must be
|
2017-11-24 18:06:01 +00:00
|
|
|
|
set to ``true``
|
2016-11-24 16:38:40 +00:00
|
|
|
|
|
2017-11-27 13:36:52 +00:00
|
|
|
|
3. Create a new Java keystore named ``nodekeystore.jks`` and store the keypair in it using the alias ``cordaclientca``
|
|
|
|
|
|
|
|
|
|
* The node will store this keystore locally to sign its identity keys and anonymous keys
|
2017-03-28 15:27:53 +00:00
|
|
|
|
|
2017-11-24 18:06:01 +00:00
|
|
|
|
Creating the node TLS keystores
|
2017-11-27 13:36:52 +00:00
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
2017-03-28 15:27:53 +00:00
|
|
|
|
|
2017-11-27 13:36:52 +00:00
|
|
|
|
1. For each node, create a new keypair
|
2017-03-28 15:27:53 +00:00
|
|
|
|
|
2017-11-24 18:06:01 +00:00
|
|
|
|
2. Create a certificate for the keypair signed with the node CA key. The basic constraints extension must be set to
|
|
|
|
|
``false``
|
2017-03-28 15:27:53 +00:00
|
|
|
|
|
2017-11-27 13:36:52 +00:00
|
|
|
|
3. Create a new Java keystore named ``sslkeystore.jks`` and store the key and certificates in it using the alias
|
|
|
|
|
``cordaclienttls``
|
2017-03-28 15:27:53 +00:00
|
|
|
|
|
2017-11-27 13:36:52 +00:00
|
|
|
|
* The node will store this keystore locally to sign its TLS certificates
|
2017-03-28 15:27:53 +00:00
|
|
|
|
|
2017-11-27 13:36:52 +00:00
|
|
|
|
Installing the certificates on the nodes
|
|
|
|
|
----------------------------------------
|
|
|
|
|
For each node, copy the following files to the node's certificate directory (``<workspace>/certificates/``):
|
2017-03-28 15:27:53 +00:00
|
|
|
|
|
2017-11-27 13:36:52 +00:00
|
|
|
|
1. The node's ``nodekeystore.jks`` keystore
|
|
|
|
|
2. The node's ``sslkeystore.jks`` keystore
|
|
|
|
|
3. The root network CA's ``truststore.jks`` keystore
|