Skip to content

rothirschtec/Key-Distribution-Center

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

79 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Key distribution center

Using strongswan ipsec pki, ssh, rsync, owncloud,...

This project helps you manage your x.509 certificates created by the ipsec pki. The idea is that you install a separate server that serves as a Certificate Authority (CA). This server will be your highly confidential site. All created certificates are then sent to an IPSEC Gateway. There is also an owncloud instance installed for Out of Band key distribution on this gateway. We use a combination of 2 armbian devices but you can also use it with other linux distributions.

Explanation

Dependencies

First you have to build the latest strongswan version on both devices. https://blog.rothirsch.tech/strongswan/.

If you want to set up the ipsec gateway you also have to install owncloud. https://blog.rothirsch.tech/owncloud/

Other packages

apt install openssh-server rsync pwgen

And you should allow the CA to login to the IPSEC gateway via SSH without password. https://blog.rothirsch.tech/security/#!secure-ssh

Installation

  1. Simply clone the git repository

  2. Start the initialisation

    ./createCA

  3. Change into the newly created directory CAs/yourDomain/yourCA/ and start

Create

# Create certificate
./cert-create
# or with config
./cert-create CONFIGS/your.config.configs

Revoke

./cert-revoke STORE/certs/your.cert.pem

Transfer

./cert-transfer STORE/certs/your.cert.pem

Show info

./cert-info STORE/certs/your.cert.pem

The scripts are all self-explaining an create configuration files inside CONFIGS

Big thanks to

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published