Distribution Security Using Signed Certificates and Digests

Policy and Distribution Services uses signed certificates to validate whether Distributions are from a trusted source, or have been tampered with. This security is automatically used by Policy and Distribution Services for all Distributions. However, there are actions you might need to take to get Policy and Distribution Services to create and process the certificates.

Policy and Distribution Services also provides optional Distribution security with digests. A digest is used by the Subscriber to determine whether a Distribution has been tampered with after it left the Distributor.

There are two features of TED that deal with security:

The following sections provide more information on understanding, creating, and using certificates and digests:


Understanding Digests

Important points about digests:


Understanding Certificate Usage in Policy and Distribution Services

A certificate is a security mechanism used by Policy and Distribution Services to ensure that the Distribution received by a Subscriber was actually sent by the Distributor owning that Distribution. Because configuration information can also be sent to the Subscriber, it ensures that the configuration information has been sent from a known Distributor and that the data has not changed.

All Subscribers must receive a valid security certificate from each Distributor that sends Distributions to them. Without a matching certificate, a Subscriber cannot receive Distributions from the Distributor.

The following illustrates the process of using certificates with Distributions:


Sending Regular Distributions - Resolving Certificates. The Distributor server on the left side creates the certificate file. Certificates are resolved. The Subscriber server on the right side receives the Distributor[apos  ]s certificate, which then becomes the Subscriber[apos  ]s certificate.

Before a Distribution should be sent, certificates must be resolved. This ensures that the Distribution received by a Subscriber was actually sent by the Distributor owning that Distribution.

After certificates have been resolved, the following illustrates how the Subscriber uses the certificate to ensure it is receiving a valid Distribution:


Sending Regular Distributions - Sending the Distribution. The Distributor server on the left side builds the Distribution. The Distribution is sent. The Subscriber server on the right side verifies the signaguture with the Distributor[apos  ]s certificate and its copy of that certificate. If the signature matches, the Distribution is received and extracted.


Important Points about Certificates

Important points about certificates:


Certificate File Locations

Certificates are stored in the ZENWORKS\PDS\TED\SECURITY directory on each Subscriber's server.

WARNING:  Make sure the ZENWORKS\PDS\TED\SECURITY directory is a non-public directory. This directory should not be read by anyone other than an administrator. The .KEYSTORE file is in the ZENWORKS\PDS\TED\SECURITY\PRIVATE directory and is by default hidden from non-administrative users.

Certificates are usually named after the fully-qualified DNS name of the Distributor server, such as Distributor_Server001.novell.com.cer or Distributor_Server001.novell.com.csr. The TCP/IP address of the server would be used for .CSR files if a DNS name could not be resolved. The certificate would then be named using its IP address, such as 155.55.155.55.csr.


Handling Invalid Certificates

A Subscriber cannot receive Distributions from a Distributor when the Distributor's certificate has become invalid. A Subscriber cannot receive encrypted Distributions when the Subscriber's encryption certificate has become invalid. For more information on encryption certificates, see Distribution Security Using Encryption .

A Distributor's certificate can become invalid when the DNS name or IP address of the Distributor has been changed. However, if your Distributor is configured to use DNS (the recommended addressing method), IP address changes on the Distributor will not invalidate its certificate. Also, if DNS addressing is being used, changes in a Subscriber's DNS name or IP address will not prevent the Subscriber from receiving Distributions.

However, a Subscriber's encryption certificate can become invalid when the DNS name or IP address of the Subscriber is changed, in which case a new encryption certificate needs to be created.

The following applies for DNS name changes where DNS is your installed addressing method, or for IP address changes where IP address is your installed addressing method:


Distributor DNS Name or IP Address Is Changed

Changing the DNS name or IP address of a Distributor causes the certificate created by the Distributor to be invalid for all Subscribers that have received the certificate from this Distributor. To re-create and resolve the Distributor's certificate, do the following:

  1. On the Distributor server, shut down the Distributor Agent.

    For information on stopping and starting agents, see Starting the Policy and Distribution Services Agents in Installing on NetWare and Windows Servers in Installing Policy and Distribution Services on NetWare and Windows Servers in the Installation guide; or, see Starting the Policy and Distribution Agents on UNIX and Stopping the Policy and Distribution Services Agents on UNIX in Installing Policy and Distribution Services on UNIX Servers in the Installation guide.

  2. In the ZENWORKS\PDS\TED\SECURITY\PRIVATE directory on the Distributor server, delete the .KEYSTORE file.

    This file contains the Distributor's certificate.

  3. Restart the Distributor Agent.

    A new certificate and .KEYSTORE file will be automatically created for the Distributor.

  4. To resolve certificates: in ConsoleOne, right-click the Distributor object > click Resolve Certificates > click OK.

    Make sure the Copy Certificates Automatically to Subscribers radio button is checked before clicking OK.

    This will copy the new certificate to each Subscriber so that it can receive Distributions from this Distributor.


Subscriber DNS Name or IP Address Is Changed

Changing the DNS name or IP address of a Subscriber causes all encryption certificates contained on the Subscriber to be invalid. Subscribers can have one encryption certificate for each Distributor that sends it encrypted Distributions.

Subscribers will continue to receive non-encrypted Distributions, even if the DNS name or IP address is changed.

To reproduce valid encryption certificates for the Subscriber, follow the instructions under Distribution Security Using Encryption .


Certificate and Private Key Directories

Certificates and private keys for Policy and Distribution Services are stored in the following locations:


Creating Security Certificates for Non-Encrypted Distributions

Security certificates are not normally encrypted. The creation process for encryption certificates is different. For more information, see Distribution Security Using Encryption .

To create a certificate on a Distributor and copy it to its associated Subscribers:

  1. On the server where a Distributor is installed, run its Java* process (use TED.NCF on a NetWare server, or restart the TED Distribution service on a Windows server).

    This process creates the certificate and writes it into eDirectory.

  2. Copy the certificate to each Subscriber using one of the following methods:

  3. Because each Distributor creates its own security certificate, repeat Step 1 and Step 2 for each Distributor object in the tree.

    Where Subscribers receive Distributions from multiple Distributors, the Subscribers will have one certificate from each Distributor.


Manually Copying Certificates for Non-Encrypted Distributions

To manually copy certificates to Subscribers using ConsoleOne®, do any of the following:



  Previous Page: Security in Policy and Distribution Services  Next Page: Distribution Security Using Encryption