The open source enterprise PKI software EJBCA has received support for EU EAC ePassports. The Swedish National Police Board has developed the cert-cvc java library used for the implementation, and contributes the library to the open source project under the LGPL license. The Police Board also supported the development to integrate the library into EJBCA.
EAC, short for Extended Access Control, is the standard developed in the EU to protect fingerprint and iris data stored on electronic travel documents (passports). Fingerprints will be stored on all EU passport within a few years, with pilot project starting this year. Releasing the library to the open source means that other EU member states does not have to develop everything themselves, and could make implementation much easier and less expensive.
A perfect example of openness and cooperation.
This release is feature complete for EU EAC ePassports using RSA algorithm. ECC support is still not complete. Any help in the ECC area is welcome.
The library is released, with full source, and can be downloaded from sourceforge — http://sourceforge.net/projects/ejbca/."
Friday, July 11, 2008
Saturday, July 5, 2008
EJBCA HA best practices
There are many ways to design a HA system taking all considerations into account. After dealing with this issue for a couple of years, here is our teams experience on what works and what doesn't work.
There are two important components in a HA EJBCA setup:
In case of failure, everything can be re-created from the EJBCA distribution except the database contents.
A full HA setup would look like:
Most shops however simply don't want, don't need, or can't handle that kind of complexity.
Another alternative, that does not provide full HA, but that does provide very good data safety with short fail over times is:
In our experience this is not a good idea!
In most cases this setup will cause more problems than it solves and your issues will originate from the load balancing software/fail-over scripts not working instead of the database/EJBCA not working.
If you are not sure what you are doing and has done this kind of setups several times before, stay away from it.
There are two important components in a HA EJBCA setup:
- Database
- EJBCA application server
In case of failure, everything can be re-created from the EJBCA distribution except the database contents.
A full HA setup would look like:
- Load balancers in front of the EJBCA app servers
- EJBCA app servers using a single HA database on a single ip
- Load balancers in front of the database cluster
- A HA database cluster
Most shops however simply don't want, don't need, or can't handle that kind of complexity.
Another alternative, that does not provide full HA, but that does provide very good data safety with short fail over times is:
- Two combined EJBCA/database servers with three ip's, one real for each server and one "virtual" that can be moved.
- Node 1 has the virtual ip by default.
- Database master on node 1 that replicates, in real time, to node 2.
- EJBCA running on both nodes using the "virtual" ip as database ip.
- If node 1 fails, a script must be manually run that changes the virtual ip to node 2, and restarts app server on node 2. Now node 2 is master and single point of failure while node 1 is brought up again.
- When node 1 is brought up again the system is either restored to original state with node 1 as master (requires restoring database on node 1 and reseting replication), or node 2 is now the master and replicates to node 1 (requires starting replication in that direction).
In our experience this is not a good idea!
In most cases this setup will cause more problems than it solves and your issues will originate from the load balancing software/fail-over scripts not working instead of the database/EJBCA not working.
If you are not sure what you are doing and has done this kind of setups several times before, stay away from it.
Subscribe to:
Posts (Atom)