Enhance Enterprise Store’s security¶
Enable HTTPS¶
TLS termination is not enabled by default. This means that the Enterprise Store
listens only on port 80 for plain text HTTP traffic after installation. If the
Enterprise Store was registered with an --https
option, the
resulting assertion instructing client devices to connect to the
Enterprise Store instead of the upstream store, is pointing those devices to use
HTTPS to connect to the Enterprise Store.
This section explains how to enable and configure TLS termination in the Enterprise Store.
Certificate and Key¶
Obtain an x509 key and certificate pair for your Enterprise Store domain (as well as any relevant intermediate certificates if applicable). You can determine the domain by running:
snap-proxy config proxy.domain
This name will be the subject and should be one of the alternative names on the certificate as well.
How to obtain the certificate/key pair is out of scope of this document.
Importing the Key/Certificate pair¶
Running the below command will import the key/certificate pair (and any intermediate certificates as needed) and re-configure your Enterprise Store:
cat my.cert my.key [intermediate.cert ...] | sudo snap-proxy import-certificate
For example when configuring a Let’s Encrypt issued certificate, you’d want to
include the key, the certificate and intermediate certificates. Since Let’s
Encrypt provides fullchain.pem
that includes both the site and intermediate
certificates, you can use:
cat fullchain.pem my.key | sudo snap-proxy import-certificate
After this is done, TLS termination will be enabled, and any HTTP traffic to your Enterprise Store will be redirected to HTTPS. This command can be re-run as needed.
Self signed certificates¶
The TLS certificate above may be self signed or ultimately signed by a self signed root CA that is not included in the system certificate store on your client snap devices or the snap-store-proxy host itself. If this is true, then you need to make sure that the self signed certificates in question are added to:
the system certificate store on the snap-store-proxy host,
as well as its client devices.
On classic Ubuntu machines this might be achieved by placing the certificate in question in a specific directory:
sudo cp my-selfsigned-ca.crt /usr/local/share/ca-certificates/
(make sure that the certificate file extension is .crt
) then running:
sudo update-ca-certificates
If this is being done on the snap-store-proxy host, the snap-store-proxy has to be restarted:
sudo snap restart snap-store-proxy
After that, snap-store-proxy will be able to verify its status correctly.
For client machines, snapd
has to be restarted:
sudo systemctl restart snapd
After that, snapd
on the client device will be able to successfully verify the
snap-store-proxy certificate.
A more robust method of ensuring that client devices can talk to the
snap-store-proxy using a self signed certificate or one issued by a self signed
root is to configure the certificate in question using snapd
itself:
sudo snap set system store-certs.cert1="$(cat /path/to/my-cert-or-ca-cert.crt)"
The above method works both on classic systems as well as Ubuntu Core.
Next step¶
Once you’ve confirmed that your Enterprise Store is running and accepting HTTPS connections, you can configure client devices to use your Enterprise Store.
At any time, you can use:
snap-proxy status
to check the status of your Enterprise Store.
Restrict network access¶
This section lists necessary network traffic requirements for the Enterprise Store and example ways of restricting network access accordingly.
Ingress traffic¶
The Enterprise Store only expects incoming traffic on port 443 when it is configured to use HTTPS and port 80 when not.
To restrict access to the HTTPS port on the host machine itself on Ubuntu:
$ sudo ufw default deny incoming
$ sudo ufw allow in https
$ sudo ufw allow in ssh
$ sudo ufw enable
You might want to restrict ingress traffic to particular networks if needed. Example:
$ sudo ufw allow in from 10.126.46.0/24 to any port https
The above allows also incoming traffic to port 22 (ssh) for general host management access. The above ingress rules, or equivalent based on your firewall setup of choice are sufficient for the Enterprise Store itself.
Egress traffic¶
The Enterprise Store requires network access to the PostgreSQL database. To find out the address of currently configured database:
$ snap-store-proxy config | grep db\.connection
proxy.db.connection: postgresql://snapproxy:<redacted>@10.126.46.135:5432/snapproxy
The result should contain the location of the database. In the example above it’s 10.126.46.135. We can add a firewall rule to allow outgoing traffic to the database:
$ sudo ufw allow out from any to 10.126.46.135 port 5432
Note that by default, outgoing traffic is allowed by ufw
.
We can deny any other outgoing traffic from this host:
$ sudo ufw default deny outgoing
But this will impact its ability to:
work correctly in the online mode
and receive software updates.
So only do this when you’ve ensured that it can access the required resources. For Enterprise Store online (default) mode network requirements apply.
Note that it’s possible to configure the Enterprise Store to use an HTTP forwarding proxy (like Squid) to proxy any outgoing HTTPS traffic. Example:
$ sudo snap-store-proxy config proxy.https.proxy=http://squid.internal:3128
$ sudo ufw allow out from any to <squid IP address> 3128
By configuring Squid to only allow traffic to the required domains, and ensuring external communication is routed through the Squid proxy using appropriate firewall rules, you can limit the blast radius of potential vulnerabilities.
Offline mode¶
In offline mode, the Enterprise Store only requires network access to:
Its configured PostgreSQL database.
Any external device service if it’s needed. For example if you’re using
serial-vault-partners.canonical.com
for device registration.