[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Qemu-devel] [PATCH] doc: switch to modern syntx for VNC TLS setup
From: |
Daniel P . Berrangé |
Subject: |
Re: [Qemu-devel] [PATCH] doc: switch to modern syntx for VNC TLS setup |
Date: |
Thu, 28 Jun 2018 14:17:22 +0100 |
User-agent: |
Mutt/1.10.0 (2018-05-17) |
Ping, anyone have comments on this, besides the typo in $SUBJECT,
also repeated in commit msg
On Thu, Jun 07, 2018 at 11:10:19AM +0100, Daniel P. Berrangé wrote:
> The use of 'tls', 'x509' and 'x509verify' properties is the legacy
> backcompat syntx, replaced by use of TLS creds objects.
>
> Signed-off-by: Daniel P. Berrangé <address@hidden>
> ---
> qemu-doc.texi | 20 +++++++++++++++-----
> 1 file changed, 15 insertions(+), 5 deletions(-)
>
> diff --git a/qemu-doc.texi b/qemu-doc.texi
> index f00706b999..d526870479 100644
> --- a/qemu-doc.texi
> +++ b/qemu-doc.texi
> @@ -1097,7 +1097,9 @@ support provides a secure session, but no
> authentication. This allows any
> client to connect, and provides an encrypted session.
>
> @example
> -qemu-system-i386 [...OPTIONS...] -vnc :1,tls,x509=/etc/pki/qemu -monitor
> stdio
> +qemu-system-i386 [...OPTIONS...] \
> + -object
> tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=no \
> + -vnc :1,tls-creds=tls0 -monitor stdio
> @end example
>
> In the above example @code{/etc/pki/qemu} should contain at least three
> files,
> @@ -1112,10 +1114,14 @@ only be readable by the user owning it.
> Certificates can also provide a means to authenticate the client connecting.
> The server will request that the client provide a certificate, which it will
> then validate against the CA certificate. This is a good choice if deploying
> -in an environment with a private internal certificate authority.
> +in an environment with a private internal certificate authority. It uses the
> +same syntax as previously, but with @code{verify-peer} set to @code{yes}
> +instead.
>
> @example
> -qemu-system-i386 [...OPTIONS...] -vnc :1,tls,x509verify=/etc/pki/qemu
> -monitor stdio
> +qemu-system-i386 [...OPTIONS...] \
> + -object
> tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=yes \
> + -vnc :1,tls-creds=tls0 -monitor stdio
> @end example
>
>
> @@ -1126,7 +1132,9 @@ Finally, the previous method can be combined with VNC
> password authentication
> to provide two layers of authentication for clients.
>
> @example
> -qemu-system-i386 [...OPTIONS...] -vnc
> :1,password,tls,x509verify=/etc/pki/qemu -monitor stdio
> +qemu-system-i386 [...OPTIONS...] \
> + -object
> tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=yes \
> + -vnc :1,tls-creds=tls0,password -monitor stdio
> (qemu) change vnc password
> Password: ********
> (qemu)
> @@ -1163,7 +1171,9 @@ credentials. This can be enabled, by combining the
> 'sasl' option
> with the aforementioned TLS + x509 options:
>
> @example
> -qemu-system-i386 [...OPTIONS...] -vnc :1,tls,x509,sasl -monitor stdio
> +qemu-system-i386 [...OPTIONS...] \
> + -object
> tls-creds-x509,id=tls0,dir=/etc/pki/qemu,endpoint=server,verify-peer=yes \
> + -vnc :1,tls-creds=tls0,sasl -monitor stdio
> @end example
>
> @node vnc_setup_sasl
> --
> 2.17.0
>
Regards,
Daniel
--
|: https://berrange.com -o- https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o- https://fstop138.berrange.com :|
|: https://entangle-photo.org -o- https://www.instagram.com/dberrange :|