aboutsummaryrefslogtreecommitdiffstats
path: root/lib/ssl/doc/src/ssl_distribution.xml
blob: 1774bd8f777365e1c48d24f16a2b492951ad45fc (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE chapter SYSTEM "chapter.dtd">

<chapter>
  <header>
    <copyright>
      <year>2000</year><year>2017</year>
      <holder>Ericsson AB. All Rights Reserved.</holder>
    </copyright>
    <legalnotice>
      Licensed under the Apache License, Version 2.0 (the "License");
      you may not use this file except in compliance with the License.
      You may obtain a copy of the License at
 
          http://www.apache.org/licenses/LICENSE-2.0

      Unless required by applicable law or agreed to in writing, software
      distributed under the License is distributed on an "AS IS" BASIS,
      WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
      See the License for the specific language governing permissions and
      limitations under the License.
    
    </legalnotice>

    <title>Using TLS for Erlang Distribution</title>
    <prepared>P Nyblom</prepared>
    <responsible></responsible>
    <docno></docno>
    <approved></approved>
    <checked></checked>
    <date>2003-04-01</date>
    <rev>B</rev>
    <file>ssl_distribution.xml</file>
  </header>
  <p>This section describes how the Erlang distribution can use 
    TLS to get extra verification and security.</p>

    <p>The Erlang distribution can in theory use almost any 
      connection-based protocol as bearer. However, a module that 
      implements the protocol-specific parts of the connection setup is 
      needed. The default distribution module is <c>inet_tcp_dist</c> 
      in the Kernel application. When starting an
      Erlang node distributed, <c>net_kernel</c> uses this module to
      set up listen ports and connections.</p>

      <p>In the SSL application, an extra distribution
      module, <c>inet_tls_dist</c>, can be used as an
      alternative. All distribution connections will use TLS and
      all participating Erlang nodes in a distributed system must use
      this distribution module.</p>

      <p>The security level depends on the parameters provided to the
      TLS connection setup. Erlang node cookies are however always
      used, as they can be used to differentiate between two different
      Erlang networks.</p>

    <p>To set up Erlang distribution over TLS:</p>

      <list type="bulleted">
      <item><em>Step 1:</em> Build boot scripts including the
      SSL application.</item>
      <item><em>Step 2:</em> Specify the distribution module for 
      <c>net_kernel</c>.</item>
      <item><em>Step 3:</em> Specify the security options and other 
      SSL options.</item>
      <item><em>Step 4:</em> Set up the environment to always use TLS.</item>
    </list>

    <p>The following sections describe these steps.</p>

  <section>
    <title>Building Boot Scripts Including the SSL Application</title>
    <p>Boot scripts are built using the <c>systools</c> utility in the
      SASL application. For more information on <c>systools</c>,
      see the SASL documentation. This is only an example of
      what can be done.</p>

      <p>The simplest boot script possible includes only the Kernel 
      and STDLIB applications. Such a script is located in the 
      <c>bin</c> directory of the Erlang distribution. The source for the 
      script is found under the Erlang installation top directory under
      <c><![CDATA[releases/<OTP version>/start_clean.rel]]></c>.</p>

      <p>Do the following:</p>
      <list type="bulleted">
	<item><p>Copy that script to another location (and preferably another 
      name).</p></item>
        <item><p>Add the applications Crypto, Public Key, and 
	SSL with their current version numbers after the 
	STDLIB application.</p></item>
      </list>

    <p>The following shows an example <c>.rel</c> file with TLS 
    added:</p>
    <code type="none">
      {release, {"OTP  APN 181 01","R15A"}, {erts, "5.9"},
      [{kernel,"2.15"},
      {stdlib,"1.18"},
      {crypto, "2.0.3"},
      {public_key, "0.12"},
      {asn1, "4.0"},
      {ssl, "5.0"}
      ]}.
   </code>

   <p>The version numbers differ in your system. Whenever one of the 
   applications included in the script is upgraded, change the script.</p>

      <p>Do the following:</p>
      <list type="bulleted">
	<item><p>Build the boot script.</p>
	<p>Assuming the <c>.rel file</c> is stored in a file
	<c>start_ssl.rel</c> in the current directory, a boot script
	can be built as follows:</p></item>
      </list>
   <code type="none">
   1> systools:make_script("start_ssl",[]).    </code>

   <p>There is now a <c>start_ssl.boot</c> file in the current
   directory.</p>

   <p>Do the following:</p>
   <list type="bulleted">
     <item><p>Test the boot script. To do this, start Erlang with the
     <c>-boot</c> command-line parameter specifying this boot script
     (with its full path, but without the <c>.boot</c> suffix). In
     UNIX it can look as follows:</p></item>
   </list>
   <code type="none"><![CDATA[
$ erl -boot /home/me/ssl/start_ssl
Erlang (BEAM) emulator version 5.0
 
Eshell V5.0  (abort with ^G)
1> whereis(ssl_manager).
<0.41.0>    ]]></code>

    <p>The <c>whereis</c> function-call verifies that the SSL 
      application is started.</p>

      <p>As an alternative to building a bootscript, you can explicitly
      add the path to the SSL <c>ebin</c> directory on the command
      line. This is done with command-line option <c>-pa</c>. This
      works as the SSL application does not need to be started for the
      distribution to come up, as a clone of the SSL application is
      hooked into the Kernel application. So, as long as the
      SSL application code can be reached, the distribution starts. 
      The <c>-pa</c> method is only recommended for testing purposes.</p>

      <note><p>The clone of the SSL application must
      enable the use of the SSL code in such an early bootstage as
      needed to set up the distribution. However, this makes it
      impossible to soft upgrade the SSL application.</p></note>
  </section>

  <section>
    <title>Specifying Distribution Module for net_kernel</title>
    <p>The distribution module for SSL/TLS is named <c>inet_tls_dist</c>
      and is specified on the command line with option <c>-proto_dist</c>.
      The argument to <c>-proto_dist</c> is to be the module
      name without suffix <c>_dist</c>. So, this distribution
      module is specified with <c>-proto_dist inet_tls</c> on the
      command line.</p>

    <p>Extending the command line gives the following:</p>
    <code type="none">
$ erl -boot /home/me/ssl/start_ssl -proto_dist inet_tls    </code>

<p>For the distribution to be started, give the emulator a name as well:</p>
    <code type="none">
$ erl -boot /home/me/ssl/start_ssl -proto_dist inet_tls -sname ssl_test
Erlang (BEAM) emulator version 5.0 [source]
 
Eshell V5.0  (abort with ^G)
(ssl_test@myhost)1>     </code>

    <p>However, a node started in this way refuses to talk
      to other nodes, as no TLS parameters are supplied
      (see the next section).</p>
  </section>

  <section>
    <title>Specifying SSL/TLS Options</title>

    <p>
      The SSL/TLS distribution options can be written into a file
      that is consulted when the node is started.  This file name
      is then specified with the command line argument
      <c>-ssl_dist_optfile</c>.
    </p>
    <p>
      Any available SSL/TLS option can be specified in an options file,
      but note that options that take a <c>fun()</c> has to use
      the syntax <c>fun Mod:Func/Arity</c> since a function
      body cannot be compiled when consulting a file.
    </p>
    <p>
      Do not tamper with the socket options
      <c>list</c>, <c>binary</c>, <c>active</c>, <c>packet</c>,
      <c>nodelay</c> and <c>deliver</c> since they are used
      by the distribution protocol handler itself.
      Other raw socket options such as <c>packet_size</c> may
      interfere severely, so beware!
    </p>
    <p>
      For SSL/TLS to work, at least a public key and a certificate
      must be specified for the server side.
      In the following example, the PEM file
      <c>"/home/me/ssl/erlserver.pem"</c> contains both
      the server certificate and its private key.
    </p>
    <p>
      Create a file named for example
      <c>"/home/me/ssl/[email protected]"</c>:
    </p>
    <code type="none"><![CDATA[
[{server,
  [{certfile, "/home/me/ssl/erlserver.pem"},
   {secure_renegotiate, true}]},
 {client,
  [{secure_renegotiate, true}]}].]]>
    </code>
    <p>
      And then start the node like this
      (line breaks in the command are for readability,
      and shall not be there when typed):
    </p>
    <code type="none"><![CDATA[
$ erl -boot /home/me/ssl/start_ssl -proto_dist inet_tls
  -ssl_dist_optfile "/home/me/ssl/[email protected]"
  -sname ssl_test]]>
    </code>
    <p>
      The options in the <c>{server, Opts}</c> tuple are used
      when calling <c>ssl:ssl_accept/3</c>, and the options in the
      <c>{client, Opts}</c> tuple are used when calling
      <c>ssl:connect/4</c>.
    </p>
    <p>
      For the client, the option
      <c>{server_name_indication, atom_to_list(TargetNode)}</c>
      is added when connecting.
      This makes it possible to use the client option
      <c>{verify, verify_peer}</c>,
      and the client will verify that the certificate matches
      the node name you are connecting to.
      This only works if the the server certificate is issued
      to the name <c>atom_to_list(TargetNode)</c>.
    </p>
    <p>
      For the server it is also possible to use the option
      <c>{verify, verify_peer}</c> and the server will only accept
      client connections with certificates that are trusted by
      a root certificate that the server knows.
      A client that presents an untrusted certificate will be rejected.
      This option is preferably combined with
      <c>{fail_if_no_peer_cert, true}</c> or a client will
      still be accepted if it does not present any certificate.
    </p>
    <p>
      A node started in this way is fully functional, using TLS
      as the distribution protocol.
    </p>
  </section>

  <section>
    <title>Specifying SSL/TLS Options (Legacy)</title>

    <p>
      As in the previous section the PEM file
      <c>"/home/me/ssl/erlserver.pem"</c> contains both
      the server certificate and its private key.
    </p>

    <p>On the <c>erl</c> command line you can specify options that the
    SSL/TLS distribution adds when creating a socket.</p>

    <p>The simplest SSL/TLS options in the following list can be specified 
    by adding the 
    prefix <c>server_</c> or <c>client_</c> to the option name:</p>
    <list type="bulleted">
      <item><c>certfile</c></item>
      <item><c>keyfile</c></item>
      <item><c>password</c></item>
      <item><c>cacertfile</c></item>
      <item><c>verify</c></item>
      <item><c>verify_fun</c> (write as <c>{Module, Function, InitialUserState}</c>)</item>
      <item><c>crl_check</c></item>
      <item><c>crl_cache</c> (write as Erlang term)</item>
      <item><c>reuse_sessions</c></item>
      <item><c>secure_renegotiate</c></item>
      <item><c>depth</c></item>
      <item><c>hibernate_after</c></item>
      <item><c>ciphers</c> (use old string format)</item>
    </list>

    <p>Note that <c>verify_fun</c> needs to be written in a different
    form than the corresponding SSL/TLS option, since funs are not
    accepted on the command line.</p>

    <p>The server can also take the options <c>dhfile</c> and
    <c>fail_if_no_peer_cert</c> (also prefixed).</p>

    <p><c>client_</c>-prefixed options are used when the distribution 
    initiates a connection to another node. <c>server_</c>-prefixed 
    options are used when accepting a connection from a remote node.</p>

    <p>Raw socket options, such as <c>packet</c> and <c>size</c> must not 
    be specified on the command line.</p>

    <p>The command-line argument for specifying the SSL/TLS options is named
    <c>-ssl_dist_opt</c> and is to be followed by pairs of
    SSL options and their values. Argument <c>-ssl_dist_opt</c> can
    be repeated any number of times.</p>

    <p>
      An example command line doing the same as the example
      in the previous section can now look as follows
      (line breaks in the command are for readability, 
      and shall not be there when typed):
    </p>
    <code type="none"><![CDATA[
$ erl -boot /home/me/ssl/start_ssl -proto_dist inet_tls
  -ssl_dist_opt server_certfile "/home/me/ssl/erlserver.pem"
  -ssl_dist_opt server_secure_renegotiate true client_secure_renegotiate true
  -sname ssl_test
Erlang (BEAM) emulator version 5.0 [source]

Eshell V5.0  (abort with ^G)
(ssl_test@myhost)1>]]>
    </code>
  </section>

  <section>
    <title>Setting up Environment to Always Use SSL/TLS (Legacy)</title>
    <p>A convenient way to specify arguments to Erlang is to use environment 
      variable <c>ERL_FLAGS</c>. All the flags needed to
      use the SSL/TLS distribution can be specified in that variable and are
      then interpreted as command-line arguments for all
      subsequent invocations of Erlang.</p>

    <p>In a Unix (Bourne) shell, it can look as follows (line breaks are for
      readability, they are not to be there when typed):</p>
    <code type="none">
$ ERL_FLAGS="-boot /home/me/ssl/start_ssl -proto_dist inet_tls
  -ssl_dist_opt server_certfile /home/me/ssl/erlserver.pem
  -ssl_dist_opt server_secure_renegotiate true client_secure_renegotiate true"
$ export ERL_FLAGS
$ erl -sname ssl_test
Erlang (BEAM) emulator version 5.0 [source]
 
Eshell V5.0  (abort with ^G)
(ssl_test@myhost)1> init:get_arguments().
[{root,["/usr/local/erlang"]},
 {progname,["erl "]},
 {sname,["ssl_test"]},
 {boot,["/home/me/ssl/start_ssl"]},
 {proto_dist,["inet_tls"]},
 {ssl_dist_opt,["server_certfile","/home/me/ssl/erlserver.pem"]},
 {ssl_dist_opt,["server_secure_renegotiate","true",
                "client_secure_renegotiate","true"]
 {home,["/home/me"]}]    </code>

    <p>The <c>init:get_arguments()</c> call verifies that the correct
      arguments are supplied to the emulator.</p>
  </section>

  <section>
    <title>Using SSL/TLS distribution over IPv6</title>
    <p>It is possible to use SSL/TLS distribution over IPv6 instead of
    IPv4. To do this, pass the option <c>-proto_dist inet6_tls</c>
    instead of <c>-proto_dist inet_tls</c> when starting Erlang,
    either on the command line or in the <c>ERL_FLAGS</c> environment
    variable.</p>

    <p>An example command line with this option would look like this:</p>
    <code type="none"><![CDATA[
$ erl -boot /home/me/ssl/start_ssl -proto_dist inet6_tls
  -ssl_dist_optfile "/home/me/ssl/[email protected]"
  -sname ssl_test]]>
    </code>

    <p>A node started in this way will only be able to communicate with
    other nodes using SSL/TLS distribution over IPv6.</p>
  </section>
</chapter>